Background: Diabetes mellitus is a disease was known since ancient time and all system of medicine over world were tried to cure this disease. Unfortunately the numbers of diabetes patients are increasing day by day due to many risk factors such as sedentary life, obesity etc.Methods: A total of 120 patients with newly diagnosed type 2 diabetes mellitus attending OPD of UPUMS, Saifai, Etawah, Uttar Pradesh, India, were included in the study. Patients were divided into 4 groups. Group-1, 2, 3 and 4 received Aloevera, Vijaysar, Aloevera + Vijaysar and Glimepiride respectively for thirteen weeks. Sample for fasting blood sugar and postprandial blood sugar were measured at baseline, 1st, 2nd, 3rd, 5th, 8th and at 13th week. HbA1c and Lipid profile were measured at baseline and at thirteen week.Results: Significant decrease in FPG, 2hPG, and HbA1c level were achieved in all groups but effects was maximum in Glimepiride group. Vijaysar had shown better glucose control than Aloevera as well as Aloevera + Vijaysar group. Synergism was shown by both herbal drugs for FPG control but not for 2hPG. The Effect of Vijaysar alone on 2hPG was similar to Glimepiride.Conclusions: Vijaysar could be a promising herbal drug for the treatment of mild uncomplicated cases of type-2 diabetes mellitus; however both drugs have shown synergism for FPG control. Both herbal drugs were safe during our study, only one patient of Vijaysar group had complaint of diarrhoea, which was subsided one week later.
In transparent database data are stored at different severs which is easily visible and accessible to every user. End users usually access information through applications that intermediate between the user and the database. These applications provide interface to access the database system i.e. transparent to end users. This is expected and even logical aspect of the nature of most database management systems (DBMS). There is always possibility of data loss and data theft by an unauthorized user. Now-a-days research on Distributed database management system (DDBMS) found to best match to handling the transparent type database storage and processing rules via communication links. In this paper, we have introduced a method of encrypting the transparent database files and data. The prime purpose here is to prevent an unauthorized access to the data by restoring the files from another server. These physical files include the database file (.mdf), the transaction log file (.ldf) and the backup files (.bak).
An efficient method for the construction of hydrocarbazoles bearing three continuous sterically hindered stereocenters, two quaternary and one tertiary, via a highly diastereoselective palladium-catalyzed [4 + 2]-cycloaddition/dearomatization of 3-nitroindoles has been developed. The cycloaddition of 3-nitroindoles occurs at ambient conditions with a 1,4-zwitterionic intermediate, in situ generated from γ-methylidene-δ-valerolactones. The further synthetic utility of this method is demonstrated by the multifaceted transformations possible from the products. The catalytic asymmetric aspect of this transformation has also been explored.
Abstract-n wireless media, congestion is usual phenomenon that arises due abruptly raised subscribers demand to establish connections congruently in particular cell at mean real time. Generally, the congestion problem occurs in cellular network traffic and almost persists in every generation. Every mobile network operators is facing this problem every day and struggling to resolve this issue but not being success yet. As more advance cellular devices are being in demand and its users are also being increasing which turns to demand larger bandwidth requirements from cellular subscriber. Presently for cellular network, both at infrastructures level and manual configuration, the network management strategy founds to be inefficient to resolve these issues effective way. While trying to resolve, at certain critical peak hours and occasions, situation gets worse. Since, every cellular operator are being facing strong criticism from both user and regulating authorities on this issue. An effort from subscriber's end is to done only minor infrastructural changes to operate and maintain the network at low cost which found to ineffective and being failed to handle the communication demands of higher Quality of Service (QoS). One way of handling congestion would be through hardware amendment like sectorial design, cell partition, or some software enabled functions use to organize to automate the configuration, optimize and maintenance of cellular networks, But these changes involves heavy investment by subscriber which in turns to cost from user for its services. Concerning on this unresolved issue, our prime motive is to forward innovative effort work that could effectively and sustainable to manage the congestion for long duration. In this paper, we first review the various load sharing and balancing techniques those are used to resolve traffic congestion occurrences in mobile networks. And further presents an algorithm design that would helpful to develop a reliable, flexible, highly efficient load balancing and sharing system. The system based on proposed schema could manage the cell network resources with special emphasis techniques having suitable self optimization feature for future wireless cellular networks.
In this project emotion detection using its facial expressions will be detected. It can be derived from the live feed via system’s camera or any pre-existing image available in the memory. Emotions possessed by humans can be detect by machine and has a vast scope of study in the computer vision industry upon which several research have already been done. The work has been implemented using Anaconda (Jupyter Notebook) (3.10), Open-Source Computer Vision Library (OpenCV) and NumPy. The code check the video (testing dataset) is being compared to training dataset and thus emotion is predicted. The objective of this paper is to develop a system which can analyze the image and run time video and predict the expression of the person. The study proves that this project and code is workable and produces valid results.in this project we have make change to the accuracy of the running project by using the different models of python and deep learning.
Background: Laparotomy is a major surgical procedure in emergency settings. There is paucity of data regarding abdominal fascia closure in emergency laparotomies in Indian population. This study was planned to compare two techniques of fascial closure namely continuous and interrupted using polydioxanone in patients undergoing midline emergency laparotomies in our institute.Methods: This prospective study was conducted in Surgery Department, MMC&H, Muzaffarnagar, from January 2017 to June 2018. 60 patients undergoing emergency laparotomies were divided into two groups of 30 each. Group I (study group) patients underwent interrupted suture abdominal closure; Group II (control group) patients underwent continuous suture closure.Results: Commonest diagnoses were duodenal and enteric perforations. Mean closure time in Group 1 was 31.6 minutes and in Group 2 -17.3 minutes. Mean hospital stay in Group I and II were 12.88 and13.76 days respectively. 4 Group I patients developed wound discharge versus 6 patients in Group II. Burst abdomen occurred in 3 out of 60 patients. One Group I patient had localised fascial burst. One Group II patient had localized while one had complete fascial burst. One incisional hernia was observed in each group at 3rd month of follow up. Three patients in Group 1 and one in Group 2 developed suture sinus.Conclusions: Major complication is wound dehiscence leading to increased morbidity, hospital stay and cost. In our study, we used continuous and interrupted PDS sutures and found that interrupted suturing method of abdominal wall closure is better, though it takes more time.
Abstract-he data is the most valuable asset of any organization, it resides data in the database system that is used to store data of every running application. So the security of database is very important. One of the most widely used types of a database is Distributed Database which has the capabilities of both a relational database and distributed network architecture. Hence the security of database is of the prime concern and at the same time, it is very tough to ensure, because different types of attackers and hackers are trying everything to compromise the distributed database security. Various researches are done to preserve the distributed database security but some security problems are still unresolved. In this paper, we propose the use of Multi-scope based authentication and Enhanced Distributed firewall by which the integrity and security of distributed database can be achieved.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.