Abstract Introduction MPAL (Multi Phenotypic Acute Leukemia), BAL (Biphenotypic Acute Leukemia), AUL (Acute Undifferentiated Leukemia), ALAL (Acute Leukemia of Ambiguous Lineage), HAL (Hybrid Acute ...Leukemia), HAL (Hybrid Acute Leukemia), MLL (Mixed Lineage Leukemia) and aBLL (acute BiLineal Leukemia) represent different names of the same pathology or do these entities represent completely separate disease processes? These rather uncommon manifestations of acute leukemia complicate strict taxonomical sub grouping as well as their management. Rapid identification & swift management may restrict further neurological damage, while achieving hematological remission. Case description A 16 year female presented with gradual onset paraplegia for 7 months, a history of multiple blood transfusions in the past 2 years, pancytopenia, atypical cells in peripheral smear; the hematological and bone marrow work up revealed a diagnosis of: MPAL, B/Myeloid , NOS Multi Phenotypic Acute Leukemia, B cell {lymphoid}/Myeloid, not otherwise specified. An ALL type induction regimen was started. The management strategy, it's rationale and the clinical outcome are discussed. Conclusion For routine neurosurgical practice, these entities are extremely rare; and hence a working knowledge is very essential for appropriate & timely management notwithstanding the neurosurgical desire to rule out the compressive lesions first. Neurological status deterioration may be halted with timely institution of appropriate chemotherapy. In the extensive literature review in pubmed, this may be only the 1st case of MPAL with extramedullary neurological manifestation, at the first clinical presentation.
Advance Chess Engine: an use of ML Approach Srivastava, Kushagra; Pandey, Trilok Nath; Dash, Bibhuti Bhusan ...
2024 3rd International Conference for Innovation in Technology (INOCON),
2024-March-1
Conference Proceeding
Several researchers have sought to create a software that can learn to play cognitive games with little or no prior understanding of the game's rules. A typical chess playing machine investigates all ...of the possible moves from a chessboard arrangement before deciding on the next best move. The Deep Blue chess engine's brute-force searching strategy has had a significant influence on artificial intelligence, although it has been discovered to be resource intensive. Using the evolutionary and adaptive computing strategy on learning from human grandmasters, this study proposes a relatively easy and fast approach to developing an intelligent chess engine that can aid and hint at probable moves inside the game. Chess-playing machines may now easily surpass human talent thanks to the introduction of Machine Learning, Deep Learning and Artificial Intelligence. The game of chess is examined through the prism of these algorithms in this study. The comparison of the model performance with the existing ones has been performed to show the efficacy of the model .
Background
India has the largest burden of drug‑resistant organisms compared with other countries around the world, including multiresistant and extremely drug‑resistant tuberculosis and resistant ...Gram‑negative and Gram‑positive bacteria. Antibiotic resistant bacteria are found in all living hosts and in the environment and move between hosts and ecosystems. An intricate interplay of infections, exposure to antibiotics, and disinfectants at individual and community levels among humans, animals, birds, and fishes triggers evolution and spread of resistance. The One Health framework proposes addressing antibiotic resistance as a complex multidisciplinary problem. However, the evidence base in the Indian context is limited.
Objective
This multisectoral, trans-species surveillance project aims to document the infection and resistance patterns of 7 resistant-priority bacteria and the risk factors for resistance following the One Health framework and geospatial epidemiology.
Methods
This hospital- and community-based surveillance adopts a cross-sectional design with mixed methodology (quantitative, qualitative, and spatial) data collection. This study is being conducted at 6 microbiology laboratories and communities in Khurda district, Odisha, India. The laboratory surveillance collects data on bacteria isolates from different hosts and their resistance patterns. The hosts for infection surveillance include humans, animals (livestock, food chain, and pet animals), birds (poultry), and freshwater fishes (not crustaceans). For eligible patients, animals, birds and fishes, detailed data from their households or farms on health care seeking (for animals, birds and fishes, the illness, and care seeking of the caretakers), antibiotic use, disinfection practices, and neighborhood exposure to infection risks will be collected. Antibiotic prescription and use patterns at hospitals and clinics, and therapeutic and nontherapeutic antibiotic and disinfectant use in farms will also be collected. Interviews with key informants from animal breeding, agriculture, and food processing will explore the perceptions, attitudes, and practices related to antibiotic use. The data analysis will follow quantitative (descriptive and analytical), qualitative, and geospatial epidemiology principles.
Results
The study was funded in May 2019 and approved by Institute Ethics Committees in March 2019. The data collection started in September 2019 and shall continue till March 2021. As of June 2020, data for 56 humans, 30 animals and birds, and fishes from 10 ponds have been collected. Data analysis is yet to be done.
Conclusions
This study will inform about the bacterial infection and resistance epidemiology among different hosts, the risk factors for infection, and resistance transmission. In addition, it will identify the potential triggers and levers for further exploration and action.
International Registered Report Identifier (IRRID)
DERR1-10.2196/23241
GPUs are becoming more and more appealing targets for side-channel attacks because of their high levels of parallelism and shared hardware resources. In order to reduce side-channel assaults on GPUs, ...we provide a unique dynamic shader termination and throttling approach in this research. The main concept is to use runtime profiling and heuristics to dynamically terminate and restrict the frequency and concurrency of shader programs. We use the open-source GPGPU simulator GPUOwl to implement the suggested method. Our findings show that the suggested method may successfully thwart a variety of side-channel assaults while having no influence on efficiency. Over a range of benchmarks, the average overhead introduced by the dynamic shader termination and throttling is 5.6%. At the same time, it successfully thwarts recently demonstrated cache-based and timing-based side-channel attacks on GPUs. Thus, the proposed technique offers an efficient software-based defence to enhance the side-channel security of GPUs.
The adoption of cloud computing has increased at an exponential rate over the past two decades, which has led to corresponding increases in the amount of energy utilised by data centres. Data centres ...that use a lot of energy have a huge impact on the environment in the form of a carbon footprint; consequently, cloud service providers (CSPs) have been working to develop energy-efficient data centres. This not only serves to decrease the impact that data centres have on the surrounding environment, but it also helps to balance the costs that those facilities incur. The solutions for the latency-sensitive applications can be found in fog assisted cloud computing environment. We use Harris Hawk's meta-heuristic task scheduling algorithm in order to reduce the amount of energy that is consumed and to enhance the Quality of Service (QoS) in conjunction with SLA. When compared to a variety of alternative algorithms, the suggested implementation provides superior results in terms of energy consumption, flow time, cost, makespan, the CO2 emission rate, and other relevant metrics
Energy Optimization in WSN Through Vacation Policy Patra, Smita; Mishra, Manoj Ranjan; Patra, Sudhansu Shekhar ...
2024 5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV),
2024-March-11
Conference Proceeding
A Wireless Sensor Network (WSN) is a system of linked sensors that may wirelessly interact with one another to track changes in the environment or in the real world. It is made up of tiny, ...self-sufficient sensor nodes that are outfitted with a variety of sensors to monitor and gather environmental data. The kind of data that must be gathered and the particular application will determine which sensors are best. A vacation strategy has been suggested to lower WSN energy usage and extend the nodes' battery life. Theoretical analysis is supported by experimental data, confirming the effectiveness of our strategy in extending the lifespan of WSN.
Sensors and Internet of Things (IoT) devices are being used for more and more purposes every day. To handle the processing and storage requirements of time-sensitive applications, a new computing ...paradigm known as "Fog Computing" has arisen. It makes use of low-powered end devices that are connected to the IoT and include sensors. The fog nodes' virtual computers (VMs) handle the IoT workloads' instant processing and analysis. Efficiently scaling fog centres to fulfil the maximum amount of client requests that the fog system can fulfil is one of the open research challenges. The service providers want to maintain consumer demands in the fog system by providing efficient services. A multi-server queueing model with a retention plan is modeled in order to assess the fog system's various performance metrics.
In a network design, the control plane and the data plane are separated by the architectural concept of software defined networking (SDN). A centralised controller that serves as the only point of ...control for the whole network is introduced by the SDN architecture. The controller serves as a logically centralized entity in charge of communicating the appropriate rules to a switch's flow table. Using a single controller to handle a lot of flows becomes insufficient. A lot of large-scale networks have employed multi-controller SDN to meet their objectives. In this research, we use a multi-controller infinite buffer waiting queue model to analyze the system performance metrics. Both numerical and simulated assessments are used to illustrate the proposed model.
Performance Analysis of queueing assisted Blockchain system Goswami, Veena; Mishra, M. R.; Kandpal, Meenakshi ...
2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N),
2022-Dec.-16
Conference Proceeding
Researchers, engineers, and institutions have given blockchains a lot of attention in recent years. The implementation of blockchains has begun to revive many applications ranging from e-finance and ...e-healthcare to smart homes and the Internet of Things, social security, and logistics, among other things. In this article, a queuing-assisted blockchain system is offered as a means of better understanding the functioning and theoretical elements of blockchain technology. It is possible to utilize the suggested system to represent a diverse range of queueing-assisted blockchain-based systems in a variety of applications. This paper replicated the transaction confirmation process of a blockchain system with a miner to better understand how the blockchain system works. Factors such as unfavorable transactions in the mining process are also considered. Here we consider the M/M/1 queueing assisted blockchain system. The analytical model validation was carried out using the software packages MATHEMATICA 9 and MAPLE 18 in order to investigate the findings obtained through queueing model.
The insurance sector in the healthcare industry rely on the insurer, insured, physicians, hospitals, and third-party service providers etc. Although this market is overgrowing, it lacks openness and ...trust. Because of this, there only appears to be controversy in a number of claim settlement instances. The increase in competition is pushing the insurance companies to use advanced technologies for addressing multiple challenges.In order to do this, blockchain technology can be applied to the insurance industry as an egressing system that provides transparent and secure data storage and transit. . The hybridization of IoT and blockchain technology (BT) can offer diverse benefits to the functioning to the health insurance and mediclaim sector. This article applies blockchain technology to the healthcare insurance industry. Transactions will be handled by contracting out the middlemen engaged in the transaction process and by facilitating quicker payments between stakeholders. We develop a queueing model in detail that evaluates an Insure Chain system's characteristics. We also measures the performance of the model, including the transactions that may be waiting in the unpooled buffer before entering in to the block, transaction waiting time and a transaction's confirmation time.