Traumatic brain injury (TBI) occurs due to the disruption in the normal functioning of the brain by sudden external forces. The primary and secondary injuries due to TBI include intracranial hematoma (ICH), raised intracranial pressure (ICP), and midline shift (MLS), which can result in significant lifetime disabilities and death. Hence, early diagnosis of TBI is crucial to improve patient outcome. Computed tomography (CT) is the preferred modality of choice to assess the severity of TBI. However, manual visualization and inspection of hematoma and its complications from CT scans is a highly operator-dependent and time-consuming task, which can lead to an inappropriate or delayed prognosis. The development of computer aided diagnosis (CAD) systems could be helpful for accurate, early management of TBI. In this paper, a systematic review of prevailing CAD systems for the detection of hematoma, raised ICP, and MLS in non-contrast axial CT brain images is presented. We also suggest future research to enhance the performance of CAD for early and accurate TBI diagnosis.
Deep sequencing based genetic mapping has greatly enhanced the ability to catalog variants with plausible disease association. The bigger challenge now is to ascertain pathological significance to the array of identified variants to specific disease conditions. Differential selection pressure may impact frequency of genetic variations, and thus the detection of association with disease conditions, across populations. To understand the genotype to phenotype correlations, it thus becomes important to first understand the genetic variation spectrum of a population by creating a reference map.In this study, we report the development of phase I of a new database of coding variations, from the Indian population, with an aim to establish a centralized database of integrated information. This could be useful for researchers involved in studying disease mechanism at the clinical, genetic and cellular level.
The study of structural damage of organs or tissues is an integral part of pollution toxicology. The present work was conducted to study the effect of the pyrethroid insecticide, lambda-cyhalothrin on the kidney of the pearlspot “Etroplus suratensis”. The dilation of the kidney tubules, degeneration in kidney tissue, rupture in the collecting tubules and necrosis were observed in the present investigation after lambdacyhalothrin treatment
Encryption in an important evolving technology, used to protect private data in computers, over private and public network. Encryption is the method of transforming information in order to secure it from intruders. Encrypting entire database can be inefficient because it is challenging to selectively access a part of the encrypted data in an encrypted file. It would be desirable to apply cryptographic techniques specifically on the selected fields in the database. Conventional encryption scheme changes the database structure and applications related to the database. It requires re-engineering of databases and applications in order to store the modified data size and formats. In order to overcome the drawbacks of the conventional database encryption schemes, a new secure and efficient Format preserving encryption scheme is proposed. In format preserving encryption the data type, length and format of the plaintext is conserved during the encryption process. The structure of the database, applications and the existing queries never modify by the encrypted data. Index Terms: Deterministic Encryption, Format preserving encryption, I. INTRODUCTIONEncryption at rest should be compulsory for any media that can possibly leave the physical limits of the infrastructure. Cryptography can be implemented on the physical storage the databases are stored. Data encryption keys should be updated frequently. Data in transit is data being accessed over the network, and therefore could be disturbed by someone else on the network or with access to the physical media the network uses. Encryption can take place in three different levels such as physical storage, database, and application. The lowest level of encryption is encryption of physical storage. It encrypts disk and tape storage that is data stored gets encrypted while anything retrieved from storage gets decrypted. The stored data is protected from unauthorized access. Encrypt the entire database, so that any data in the database are encrypted and any data fetch from the database are decrypted. When encrypting sensitive data within database tables one should consider the difference between encrypting at the column level versus encrypting an entire database file. File encryption schemes apply to entire files and provide access control and auditing capabilities on the entire file only. Column-level encryption solutions provide much more granularity and enable access control, auditing, and security policies for particular columns within a database. It is more flexible in selecting a particular field to encrypt. Applications can be written to control when, where, by whom, and how data is viewed [1]. Different columns (and even different rows) can be encrypted with different keys. The top level of the data encryption is the application level. At this level, individual applications protect data that they use. The data used by the application is get encrypted and after the completion of application it is decrypted.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.