oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 4 )

2019 ( 405 )

2018 ( 518 )

2017 ( 535 )

Custom range...

Search Results: 1 - 10 of 325265 matches for " S. Lokanadham "
All listed articles are free for downloading (OA Articles)
Page 1 /325265
Display every page Item
Coronary dominance in south Indian population
Vasudeva Reddy J, Lokanadham S
International Journal of Medical Research and Health Sciences , 2013,
Abstract: Coronary artery anomalies are considered clinically insignificant and known to be associated with other congenital heart defects, myocardial ischemia and reduced life expectancy. Almost all elderly people have at least some impairment of coronary artery circulation. Therefore normal and pathological physiology of coronary circulation is one of the most important aspects in the entire field of medicine. In our study we dissected 80 human heart specimens to observe the coronary arteries from their origin to termination. We found 69 out of 80 are showing the right predominance (86.25%), 9 specimens with left predominance (11.26%) and remaining 2 of the balanced (2.5%) type of coronary circulation. The results of the study were compared with other literatures and variations are noted. In some cases we observed left predominance in males which indicates the reason for higher incidence of myocardial infarction in males when compared to females.
Sex determination AND morphometric parameters of human mandible
M. Punarjeevan Kumar,S. Lokanadham
International Journal of Research in Medical Sciences , 2013, DOI: 10.5455/2320-6012.ijrms20130511
Abstract: Goal: The knowledge about the anatomy of the mandible and its variations in age, sex and race will help physicians, surgeons, medico-legal authorities and anthropologists to give correct interpretations for the diagnostic procedures in living. Methods: We collected the human mandible bones (N=80) from the department of Anatomy, SVIMS university and around the Tirupati region to study the morphological and morphometric features by using 22 different parameters. Results: Among 22 parameters Six dominating parameters that possibly explain the nature of the mandible are height of the ramus, body thickness, anthropometric arch width, inter incisor width, mandibular index and mandibular angle are useful to determine the unknown sex of the mandible upto an extent of 75.2% in south Indian population. The incidence of the above mentioned sex determination parameters considered together and treated statistically. Conclusion: The present study reveals that the mandible of unknown gender can be sexed to the extent of 75% accuracy by six dominating parameters and not to consider these for complete sex determination of the mandible bone in osteometric studies. [Int J Res Med Sci 2013; 1(2.000): 93-96]
Vascular corrosion casting of human heart
J. Vasudeva Reddy,S. Lokanadham
International Journal of Research in Medical Sciences , 2013, DOI: 10.5455/2320-6012.ijrms20130837
Abstract: Variation in the morphological pattern of coronary arteries and their major branches is an important factor in the assessment and treatment of coronary heart disease. Detailed knowledge of the blood supply of the heart is necessary today because of the wider practice of cardiac surgery, and also for better understanding of the anomalous branches, anastomosis and dominance pattern in circulation caused by coronary vasculature. We utilized 80 human heart specimens and found right dominance in 69 specimens, left dominance in 9 specimens and balanced type of circulation in 2 specimens. We observed anastomosis between the major arteries in arteriogram but in vascular corrosion method we did not found because cast substance interpretation to minor vessels is too difficult. The present study acknowledges about Coronary vascular pattern, circulatory dominance of the arteries and by using the vascular corrosion method. [Int J Res Med Sci 2013; 1(3.000): 237-239]
Speckle interferometric observations of the collision of comet Shoemaker-Levy 9 with Jupiter
S. K. Saha,R Rajamohon,P Vivekananda Rao,G Som Sunder,R Swaminathan,B Lokanadham
Physics , 1999,
Abstract: Speckle interferometric technique has been used to obtain a series of short exposure images of the collision of comet Shoemaker-Levy 9 with Jupiter during the period of July 17-24, 1994 using the Nasmyth focus of 1.2 meter telescope of Japal-Rangapur Observatory, Hyderabad. The technique of Blind Iterative Deconvolution (BID) was used to remove the atmospherically induced point spread function (PSF) from these images to obtain diffraction limited informations of the impact sites on Jupiter.
Implementation of Integrity of Voice and face Recognition for Home Security by using GSM AND ZIGBEE
Chandrasekhar Lokanadham,B. Purna V. Subbarao,V. Santhisri
International Journal of Computer & Electronics Research , 2012,
Abstract: Home security is very popular in present days in its simplest form home controlling is the ability to control lighting , household and image reorganization appliances remotely with this device automation safety from theft, leak in of raw gas and fire is also the most important requirement of home for people by combining wireless sensor net work and GSM technology, In this proposes a new solution for remote home security and device control system. The system is composed of the ARM7 based WSN center node with GSM module, data collecting node , device control node and mobile phone. The WSN data collecting node module is connected with PIR, temperature sensor, smoke detector and gas sensor separately and send data to the data collecting node. Advances in the field of Information Technology also make Information Security an inseparable part of it. In order to deal with security, Authentication plays an important role. This paper presents a review on the Voice authentication techniques and some future possibilities in this field. In Voice & face, a human being needs to be identified based on some characteristic physiological parameters. A wide variety of systems require reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user, and not anyone else. By using Voice & ace it is possible to confirm or establish an individual’s identity. The position of biometrics in the current field of Security has been depicted in this work. We have also outlined options about the usability of voice and face authentication systems. The data collecting node will send encoded alarm signal to the WSN center node through WSN sensor network established in home . Once the WSN center node receives alarm signal, it will send alarm SMS to the users through the GSM module and GSM network immediately.
Study of the Structural and Electrical Properties of Cr-Doped BiFeO3 Ceramic  [PDF]
S. S. Arafat, S. Ibrahim
Materials Sciences and Applications (MSA) , 2017, DOI: 10.4236/msa.2017.810051
Abstract: Multiferroic BiFe1-xCrxO3 (x = 0.2 and 0.4) ceramics were synthesized in a single phase. The effects of Cr3+ substitution on the crystal structure, dielectric permittivity and leakage current were investigated. Preliminary X-ray structural studies revealed that the samples had a rhombohedral perovskite crystal structure. The dielectric constant ε' significantly increased while the dielectric loss tanδ was substantially decreased with the increase in Cr3+ substitution. The temperature effect on the dielectric properties exhibited an anomaly corresponding to magneto-electric coupling in the samples and was shifted to lower temperatures with the increase in Cr3+ substitution. The leakage current density also reduced in magnitude with the increase in the Cr3+ substitution.
Degree Splitting of Root Square Mean Graphs  [PDF]
S. S. Sandhya, S. Somasundaram, S. Anusa
Applied Mathematics (AM) , 2015, DOI: 10.4236/am.2015.66086
Abstract: Let \"\" be an injective function. For a vertex labeling f, the induced edge labeling \"\" is defined by, \"\" or \"\"; then, the edge labels are distinct and are from \"\". Then f is called a root square mean labeling of G. In this paper, we prove root square mean labeling of some degree splitting graphs.
A Parameter Estimation Model of G-CSF: Mathematical Model of Cyclical Neutropenia  [PDF]
S. Balamuralitharan, S. Rajasekaran
American Journal of Computational Mathematics (AJCM) , 2012, DOI: 10.4236/ajcm.2012.21002
Abstract: We investigate the FFT (Fast Fourier Transform) model and G-CSF (granulocyte colony-stimulating factor) treatment of CN (Cyclical Neutropenia). We collect grey collies and normal dog’s data from CN and analyze the G-CSF treatment. The model develops the dynamics of circulating blood cells before and after the G-CSF treatment. This is quite natural and useful for the collection of laboratory data for investigation. The proposed interventions are practical. This reduces the quantity of G-CSF required for potential maintenance. This model gives us good result in treatment. The changes would be practical and reduce the risk side as well as the cost of treatment in G-CSF.
Synthesis, Thermal Behaviour, XRD, and Luminescent Properties of Lighter Lanthanidethiodipropionate Hydrates Containing Aminogunidine as Neutral Ligand  [PDF]
S. Packiaraj, S. Govindarajan
Open Journal of Inorganic Chemistry (OJIC) , 2014, DOI: 10.4236/ojic.2014.43006
Abstract:
Aminoguanidine lanthanide thiodipropionate hydrates of composition [Ln(Agun)2(tdp)3·nH2O], Agun = Aminoguanidine, tdp = thiodipropionic acid, where Ln = La, Pr, Nd and Sm if n = 2, have been prepared and characterized by physic-chemical techniques.
Fuzzy Based Intelligent Monitoring of Critical Lines in the Restructured Power Market  [PDF]
S. Rajasekaran, S. Sathiyamoorthy
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.79191
Abstract: Restructured electric market environment allows the power wheeling transactions between the power producers and customers to meet the growing load demand. This will lead to the possible of congestion in the transmission lines. The possible contingencies of power components further worsen the scenario. This paper describes the methodology for the identification of critical transmission line by computing the real power and reactive power performance indices. It also demonstrates the importance of fuzzy logic technique used to rank the transmission lines according to the severity and demonstrated on IEEE-30 bus system.
Page 1 /325265
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.