Corona virus pandemic has swept a major section of the world population. In terms of infectivity it�s higher than any pandemic in the recent past. Corona virus, a member of the family Coronaviridae, spread from bat to human through an intermediate host pangolin. It has lower mortality rate than the previous pandemics in last 100 years such as Spanish Flu(1918-20),Asian Flu (1957-58), SARS Corona virus (SARS-Cov) (2003), H1N1 Swine Flu Pandemic(2009-10), Middle East Respiratory Syndrome (MERS) (2012), West African Ebola (2014-16) etc. Research shows Covid spike attaches ACE2 receptor; it leads to a release of cytokine into the blood capillaries near the alveoli and may ultimately turn into pneumonia. The alveoli get collapsed leading ARDF. The pulmonary inflammation proceeds to systemic inflammation that causes multiple organ failure. Drug like Chloroquine, Lopinavir/ritonavir, and Remdesivir may halt the spread of the virus in the body. Antipyretic is prescribed to reduce the temperature. This article comprises of detail mechanism of the dreadful disease along with its diagnosis and proposed treatment. This exploratory study mainly designed to generate awareness and provide information to the individuals who want to know the A to Z of Covid in nutshell. This article may create a pathway to number of upcoming scientific researches and may attract them to work on this field to enhance the probability of inventing appropriate vaccine and medicine to fight against this contagious disease and to win the battle against this Global Pandemic.
A performance analysis on a vapour compression refrigeration system with various refrigerants mixture of R152a, RE170, R600a, and R290 were done for various mixture ratios and their results were compared with R134a as possible alternative replacement. The results showed that all of the alternative refrigerants investigated in the analysis except R431A, [R 152a (29%), R290 (71%)] have a slightly higher performance coefficient (COP) than R134a for the condensation temperature of 500C and evaporating temperatures ranging between -300C and 100C.Refrigerant blend of R152a/RE170 (20/80 by wt%) instead of R134a was found to be a replacement refrigerant among other alternatives. The effects of the main parameters of performance analysis such as refrigerant type, degree of sub cooling and super heating on the refrigerating effect, coefficient of performance and volumetric refrigeration capacity were also investigated for various evaporating temperatures.
India is a country of immense diversity. It is home to people of many different racial, languages, ethnic, religious, and national backgrounds. Groups of people in India differ from each other not only in physical or demographic characteristics but also in distinctive patterns of behavior and these patterns are determined by social and cultural factors like language, region, religion, and caste. Apart from behaviour, economic development, level of education and political culture of the people in various social segments differ from region to region. More you can say that economy and cultures have been enriched by the contributions of migrants from round the globe. In an increasingly globalised world, migratory movements is continuously shaping the countries all over the world. Some countries like India and Ireland, which set the example of economic development and social integration, have the positive impact of the migration by globalisation and some countries like USA, which recently witness racism, xenophobia and discrimination have the negative impact on the migrants. It does not mean India do not face fragmentation and USA do not have cohesion. USA have many stories which show successful integration process, that facilitated the lives of immigrant communities, but being a developed country it still suffers from cultural alienation. In these countries, borders are built within borders to create cultural divides that do not allow people to integrate. Recently, this problem has become more prominent due to the rise of terrorism, clash of cultures in the world, leading to the glorification of stereotypes. People are becoming less accepting towards anyone who does not belong to their region. Migration does not stop after people move from one place to another place. The main question start after that ‘now what’ they will do. That is why this topic needs to be discussed thoroughly in order to find better solutions. This paper will begin with an analysis of different approaches to Migration, discuss the target groups for integration policies, provide indicators of the current situation of migrants and proceed to an analysis of integration tools: legislation, social policies and participatory processes. It will focus not only on the impact of migration but also on social integration, mix culture like indo-western culture in a comparative basis.
India is a country of immense diversity. It is home to people of many different racial, languages, ethnic, religious, and national backgrounds. Groups of people in India differ from each other not only in physical or demographic characteristics but also in distinctive patterns of behavior and these patterns are determined by social and cultural factors like language, region, religion, and caste. Apart from behaviour, economic development, level of education and political culture of the people in various social segments differ from region to region. More you can say that economy and cultures have been enriched by the contributions of migrants from round the globe. In an increasingly globalised world, migratory movements is continuously shaping the countries all over the world. Some countries like India and Ireland, which set the example of economic development and social integration, have the positive impact of the migration by globalisation and some countries like USA, which recently witness racism, xenophobia and discrimination have the negative impact on the migrants. It does not mean India do not face fragmentation and USA do not have cohesion. USA have many stories which show successful integration process, that facilitated the lives of immigrant communities, but being a developed country it still suffers from cultural alienation. In these countries, borders are built within borders to create cultural divides that do not allow people to integrate. Recently, this problem has become more prominent due to the rise of terrorism, clash of cultures in the world, leading to the glorification of stereotypes. People are becoming less accepting towards anyone who does not belong to their region. Migration does not stop after people move from one place to another place. The main question start after that ‘now what’ they will do. That is why this topic needs to be discussed thoroughly in order to find better solutions. This paper will begin with an analysis of different approaches to Migration, discuss the target groups for integration policies, provide indicators of the current situation of migrants and proceed to an analysis of integration tools: legislation, social policies and participatory processes. It will focus not only on the impact of migration but also on social integration, mix culture like indo-western culture in a comparative basis.
আলোচ্য প্রবন্ধের কালানুক্রমিক উৎস একটি ঔপনিবেশিকতার সীমাবদ্ধতায় থাকা ভূখণ্ড এবং সেই সমাজের মেয়েদের সভা, সমিতি ও আলোচনা সভা গঠন। স্বাধীনতার পূর্বকাল অর্থে, ১৯৪৭ সালের আগে পর্যন্ত সময়কাল। কালের নিরিখে প্রাক – স্বাধীনতা সময়কালের বিস্তার দীর্ঘ হলেও, এর আলোচনার সময়কাল কেবলমাত্র নারী সংগঠনের সূচনা বা উৎসের সময় থেকেই আলোচ্যের। সেই সময়কাল দুভাগে ভাগ করা যায়। এক, এদেশের মেয়েদের সভা – সমিতি গঠনের পূর্বকাল। দুই, এদেশের মেয়েদের সভা – সমিতি গঠনের শুরু। এক্ষেত্রে, আলোচ্য প্রবন্ধের নিরিখে আলোচনা করা যায় দু-প্রকারে। এক, উনিশ শতকের মেয়েদের তৈরি সভা, সমিতি ইত্যাদি। দুই, সমাজ-বহির্ভূত মন্দ মেয়েদের যোগদান করা সভা, সমিতি বা আলোচনা সভা। এক্ষেত্রে ভাষার ব্যবহার সূচিত – সভা হিসেবেই লিখিত ও আলোচিত হবে।
In this paper, investigations are made to analyze the human body temperature during wound healing process due to surgery. Wound is considered after the skin graft. Skin graft is a technique used in plastic surgery. Skin is the first line of defense between the human and environment, it is very susceptible to damage. Internal body or core temperature (Tb) is one of the clinical vital signs along with pulse and respiratory rates. Any disturbance in body temperature will drive complexities in wound healing process. These studies are important in the mechanism of establishing the limits of thermal regulation of human body during the healing process in different situations and conditions. The Finite element method is used to analyze tissues temperature for normal tissues (donor site) and abnormal tissues (tissues after surgery). Appropriate boundary conditions have been framed. Numerical results are obtained using Crank Nicolson Method.
This paper centers around how innovations adds to enhancing interoperability between IoT gadgets, and making effectively utilization of IoT gadgets. The proposed stage innovation gives semantic-based IoT data administrations, and semantic interoperability of IoT gadgets. This administration stage can be material to a great deal of semantic IoT administrations: gathering imperceptible data in genuine condition by brilliant gadgets, giving keen life benefits by sharing, taking an interest, circulating open detecting data.
Mobile pervasive environment interact with several devices at varying service ranges. The technical heterogeneity of pervasive environment is expected to increase the system flexibility and adaptability on modeling with context training phase. While working with context based training phase, time entity measure is considered as the significant issue. The evaluation of the services through numerous devices during training phase does not acquire an effective service monitoring on mobile pervasive environment. Mobile pervasive environment based information extraction fails to modify the patterns as activities change over time. To improve the flexibility of context training phase in mobile pervasive environment, an Active Context Source Discover Training Phase (ACSDTP) with Classifier Decision Tree Support (CDTS) mechanism is proposed in this paper. Our research work is to develop an effective modification (i.e., updation) of the pattern on training phase with real world context as per changes over time. Initially, the ACSDTP set up the available sensors in pervasive environment to work with the ever changing set of context users. The available sensors are maintained using the Active Discover process. Second, the CDTS mechanism is designed using weighted prediction for easy identification of context result on the training phase. Decision tree is operated separately using the learning techniques, where the identification is performed in a significant manner with minimal time factor. The learning process is performed to identify the inferred situations. Finally, the integration process is carried out to work with the complex association between the situations and sensor data in the mobile pervasive environment to achieve flexibility and adaptability factor. Experiment is conducted on factors such as time entity measure rate, precision ratio, and user context result determination level.
Introduction: The right lung has two fissures, an oblique and a horizontal, dividing it into three lobes namely the upper, middle, and lower. The nature of the fissure is of great importance in planning operative strategy for thoracoscopic pulmonary resection where an the incomplete fissure may contribute to post-operative air leakage Aim: To assess the gross morphological features of the right lung with special emphasis on the completeness of horizontal fissure. Material & Method: Material for the present study comprised of right lungs obtained from 50 well-embalmed adult human cadavers of both the sexes dissected as a part of 1 MBBS curriculum in the Department of Anatomy, Govt. Medical College, Amritsar. Results: Horizontal fissure was found to be complete in only 10% of the lungs while in rest 90% it was either incomplete or absent. Conclusion: Inferable from the huge variation in nonappearance or partial appearance of horizontal fissure in the right lung and to the absence of an acceptable classification of fissures, an endeavor has been made to give one such classification. In like manner, the horizontal fissure is evaluated from Grade zero to IV contingent on its absence and profundity from coastal surface to the hilum. Each evaluation is additionally divided into 3 subgrades relying on the culmination or incompleteness of these fissures with respect to their length.
A new reliable high throughput NOC router design is proposed with FSM based smart arbiter module for 4X4 Mesh architecture. This design is based the XY routing algorithm with prioritized round robin arbitration and synthesis of the proposed design is done on Spartan III FPGA. An enhanced work is also done in this paper to explore the drawbacks of the exceptional techniques of the existing generation and to research the scope for overall performance improvisation of the NoC designing
In addition to predatory journals and publishers, researchers now need to be wary of predatory conferences as well with the checklist given here to really check yourself.Because the predatory journals and publishers make target to the new researchers there must be need of that type of articles
A huge number of embedded devices offer their services to the end users in pervasive environments. Context-aware discovery is a rich and very dynamic system extensively applied for combining the different mobile devices, sensors, actuators and software functions. Existing knowledge-based system using the Common KADS (CKADS) system represent contextual information but algorithm are not effective in predicting the user behavior. Current Location-aware Private Service Discovery (LPSD) considers the discovery path for reducing the distributed topology and flooding operations. LPSD in pervasive environment is not effective in accurately locating the required service by searching method. To present an architecture principle for accurately predicting the user behavior in mobile-pervasive computing environment, Affluent Context Aware Systems based on the User Behavior (ACAS-UB) is proposed in this paper. ACAS-UB mechanism contains the class of mobile devices that can sense (i.e.,) search the physical pervasive environment. Affluent means effectively engaged mobile devices in ACAS-UB mechanism which uses the context information. The ACAS-UB context information contains the judgment of the similar users and also the response from the other users for improving the effectiveness in pervasive environment user behavior prediction. Master-slave concept is used in the ACAS-UB mechanism for the easy collection of response information from the different users. ACAS-UB mechanism construct the user profile initially from the context information, then performs the similarity measure and finally work is to predict the user behavior. ACAS-UB mechanism provides the hints which are necessary to explore different options, rather than just limiting the options in mobile-pervasive computing environment. ACASUB mechanism is experimented on the factors such as message overhead in pervasive environment, scalability and approximately 10 % lesser processing time.
Pets need special care and tracking system to track their path in case of lost. Due to our busy life style, this task is not simple as it used to be. The aim of this work is to design and implement smart pet house and tracking system. The objective of this paper is to allow pets owners to automate simple things like monitoring and tracking of the path of pets. Also lighting, feeding and air-conditioning controls. The proposed work addresses the implementation and analysis of a wireless sensor networks based pet location monitoring system for domestic scenarios. These systems describes, finding the path of lost pet using fitbit flex scale device and also using GPS tracker. Pet begin moving before you get a GPS signal, the tracker will calculate distance using steps and stride length as described above until a GPS signal is found.
Human being has lot of virtual mask in their behaviour (mind or brain). By the way of probability study alone, be able to find a person’s loyalty through their emotions, stress of speech, way of expressions and so on. It is not a novel technique to this world. The judgement and the hearings are finalizing in accordance to passed parameters (questions, transparent as well hidden test) and the result. Artificial Neural Network (ANN) is one of the best methods meant for speech stress analysing based cheap lie detection for the loyalty test. To show the results, polygraph is a comprehensible demonstration oriented approach. These methods are already used by the insurance fraud investigations and police. Through an individual’s stress (stress percentage or else range) voice as well their emotions are able to detect the loyalty. Lie detection techniques require being extremely confidential and dynamic. For the reason that voice stress analysis (VSA) parameters have to be an encrypted for avoiding speech practise with testing tool. Here this paper, outlooks by using for predicting the liars through Speech VSA.
The development of smart phone technology has lead to denigrate of the phone prepared with many sophisticated features such as sensors. Camera is one of the most extensively used sensors. Although the photographs capture by camera can be shared via Multimedia Message Service (MMS) which allows broadcast of files like photographs, audio and video. A major problem of MMS is, it doesn’t provide adequate safety mechanism. Because of this, the data of the people who wants to conceal confidential information from state-controlled systems that can be easily monitored. Video Steganography is a technique to hide any type of files in any extension into a Video file. The idea proposed in this paper is to embed any kind of data in another file, which is called carrier file. The carrier file must be image video file. Steganography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. In this paper, a steganography-based android mobile application that can insert the confidential information into an image, then into a video that can be send it to receiver. Finally we can extract the confidential information from the image in the receiver side.
A P2P network can be an ad hoc connection- a couple of computers connected via a Universal Serial Bus to transfer files. And these networks are vulnerable to peers. The traditional security techniques are insufficient for P2P networks as they are insecure by their very nature. There’s no centralized server controlling access to shared resources in a P2P network which have unique challenges including identity management of the peers, secure reputation data management, Sybil attacks, and above all, availability of reputation data. The future actions are predicted where peers are encapsulated in its digital reputation, based on the past behaviour of the peer.Thus a peer’s reputation allows it to cooperate and prevent from malicious activities. The cryptographic protocol is coupled with selfcertification and cryptographic mechanisms for identity management and countering Sybil attack.
The rapid growth of wireless devices introduces a diverse range of applications and requires intelligent hardware platforms that integrate computing, sensing, and wireless connectivity in a compact systemon- chip (SoC). This paper presents a low-power, high-performance SoC platform that supports dynamic power management and secure communication. The SoC platform consists of 16-/32-bit programmable ARM9 cores, a power management unit with multiple low-power modes, analog and digital peripherals, and security engines. A complete tool-chain with an automatic platform generator has also been developed to ease and accelerate the application development. Fabricated in a 65 nm CMOS technology, an implementation of the proposed platform occupies an area of 1.0 × 1.7 mm2.
The mobile adhoc network is a group of mobile nodes without having the fixed infrastructure. Due to the infrastructure less network and distributed nature, make mobile adhoc network susceptible to malicious attackers. So, we use an intrusion detection system called Enhanced Adaptive ACKnowledgement (EAACK) especially for mobile adhoc networks. Based on the digital signature algorithm (DSA) and RSA the EAACK is designed. To enhance the strength of the security in the mobile adhoc networks, we introduce an innovative approach called Hybrid Security Protocol that provides integrity, confidentiality and authentication. This Hybrid Security Protocol consists of Cryptography based on Elliptic curve, Dual-RSA algorithm and Message Digest MD5. Encryption is achieved by using Elliptic Curve Cryptography, Dual-RSA algorithm for authentication and MD-5 for integrity. By using a combination of both symmetric and asymmetric cryptographic techniques, we achieve better security with integrity.
For given condition of (temperature and humidity) of suction air, the delivery air condition depends on the system parameters (depth, radius, length and air mass flow rate), thermo physical properties of the surrounding earth (thermal conductivity and specific thermal capacity) and earth surface environment (ambient temperature, ambient humidity and solar irradiance)[1,3].Sensitivity analysis of system performance is essential for understanding the relative importance of different parameters of design of a optimum system [2,5]. For the steady state periodic input air condition and the performance of the system can be measured in terms of heating potential during the winter period and cooling potential during the summer period. Sensitivity of the system performance parameters (heating potential in winter and cooling potential in summer) to the changes in system parameters or thermo physical properties of the surrounding earth has been analysed and the result is present is in this paper.
Keeping an in depth tab of recent folks or folks on chair with bound health conditions for his or her health and safety is a very important task. With maturity, weak bones and weakness because of alternative health connected problems could lead to will increase risk of falling. A supervisor might not continually be on the market with them and if correct assistance is not provided at the correct time it should cause larger health considerations which will need extra resources for treatment. For this purpose we've projected a wise IOT Fall Detection System exploitation acceptable sensors that square measure integrated facilitate|to assist} report these incidents to assist avail help at the correct time to forestall additional injury to health. The same system uses sensors like associate degree measuring system to live the speed of the person, a rotating mechanism to live the person’s orientation so as to live their stability, a load sensing element once the system is employed by an individual employing a chair to live their weight, a Wi-Fi module and a microcontroller that sends the general readings to alert the involvedthose that shall give with the right suggests that to assist the person in want. The microcontroller receives all the info from the sensors and perpetually transmits and monitors the acceleration and also the orientation of the person. Any fast abrupt modification within the system which will result from a fall is taken into account as a ‘fall’ and is reported . a serious concern would be that not all fast movement may end up from a fall and be thought of as a matter of concern. To avoid this warning a napbutton is provided to snooze the system. This button will be ironed before a definite time say 15-30 seconds to prevent the system from causation the alert, thus avoiding any confusion and panic. this method will be mounted to the person’s chair or will be created compact to be created into a wearable device which will be worn on the hand.
Akwa Ibom State University
Stony Brook University
Nepal Philosophical Research Center