Evaluating different techniques for pneumoperitonium in comparison to Needle Scope, reaching a risk score for laparoscopy. Reaching best technique for pneumoperitonium for each individual patient..
Evaluating different techniques for pneumoperitonium in comparison to Needle Scope, reaching a risk score for laparoscopy. Reaching best technique for pneumoperitonium for each individual patient..
Kolkata National Prelims Antaragni-2014 Grand finaleSomnath Chanda
Team from IIM-Kolkata came 3rd, doctors from CMC came 2nd best and the winner was a cross college team (Techno India, Salt Lake + JU + Presidency College).
Kolkata National Prelims Antaragni-2014 Grand finaleSomnath Chanda
Team from IIM-Kolkata came 3rd, doctors from CMC came 2nd best and the winner was a cross college team (Techno India, Salt Lake + JU + Presidency College).
Skill development for assessing cognitive impairment in elderly 24 nov15Dr. Rakesh Tripathi
Skills required for cognitive assessment of an elderly is highlighted with some cognitive screening and detailed assessment tool. It may be useful for Psychologist, clinical Psychologist, psychiatrist and for trained professional in the field.
Architecture of message oriented middlewareSajan Sahu
The document discusses message oriented middleware (MOM) and compares implementations of MOM including JMS, MSMQ, and MQSeries. MOM facilitates asynchronous messaging between applications and components. JMS is part of Java and supports publish/subscribe and point-to-point messaging. MSMQ by Microsoft uses queues managed by queue managers. MQSeries by IBM refers to queues, queue managers, and channels as objects and shows how they interact in its architecture.
The document describes an insurance envoy project completed between December 2006 and March 2007. The project involved developing an intranet-based web application to help insurance companies streamline their policy and claims processes. The system has 7 modules and was designed to speed up workflows, increase accuracy and customer satisfaction, and make information retrieval easier. It provides secure, centralized access to customer, broker, policy and company data. The system was tested using black box and white box techniques at the unit, integration and system levels.
The document summarizes different types of computer memory. It discusses primary memory, which includes RAM and ROM that the computer uses to process data. RAM allows for immediate data manipulation and storage of currently running processes, programs, and data. ROM stores startup instructions and can only be written to once. Secondary memory includes magnetic tape, disks, and optical disks, which provide larger backup storage. Magnetic tape uses magnetic coating to store data segments while magnetic disks offer direct access and high storage capacity. Optical disks use reflective coatings read by lasers to store large amounts of data in small spaces.
Bikram Kumar Mishra presented on developing robotic tools to assist in automated aircraft inspection. The presentation covered establishing technical feasibility, developing robotic systems with mechanical, control, and sensor systems, and final phase development including eddy current sensors for inspection and video cameras for navigation. The goal was to create a robot that can walk over an aircraft, perform inspections identical to manual methods, and be remotely operated using sensor feedback to the inspector.
This document discusses data compression techniques. It begins with an introduction to data compression, explaining that it reduces file sizes by identifying repetitive patterns in data. It then discusses some common questions around data compression, its major steps, types including lossless and lossy compression, and some examples like Huffman coding and LZ-77 encoding. The document provides details on these techniques through examples and diagrams.
This document discusses deadlocks in operating systems. It defines deadlock as when multiple processes are waiting for resources held by each other in a cyclic manner, resulting in none of the processes making progress. It provides examples and describes the four necessary conditions for deadlock to occur: mutual exclusion, hold and wait, no preemption, and circular wait. It also discusses methods for handling deadlocks, including prevention, avoidance, and recovery techniques like terminating processes or preempting resources.
The document discusses a seminar on data warehousing presented by Sangram Keshari Swain. It defines a data warehouse as a subject-oriented, integrated, non-volatile collection of data used to support management decision making. The primary concept is separating nonvolatile data for analysis from operational systems. A data warehouse provides a single view of enterprise data optimized for reporting and analysis through extracting and integrating data from different sources.
The document discusses the various phases of information system development including problem recognition, planning, feasibility study, user specifications, system design, design of output and input systems, and processing design. It notes that problem recognition can come from dissatisfaction with existing systems, management directives, or requests for new systems. The planning phase includes assessing corporate culture and priority criteria. The feasibility study consists of organizing the study, searching for solutions, performing feasibility analysis, and choosing a solution. User specifications involve data collection, analysis, and creating requirements documentation. System design includes modeling, methodology selection, and documentation. Output design covers categories, media, equipment, and principles. Input design discusses data collection, preparation, offline and online entry, validation, and human factors
The document discusses DNA computing and its advantages over traditional computers. It begins with an introduction by Debadarshi Mishra on the topic. DNA computers use enzymes that react with DNA strands in a chain reaction to perform computations in parallel, unlike traditional computers that use binary. DNA computers are smaller, faster, and can solve problems with many possible solutions simultaneously. Their potential applications include monitoring health and generating customized drugs. While still in development, DNA computing represents a new approach to computation at the molecular level.
This presentation introduces the Wireless Application Protocol (WAP). WAP was created by mobile companies to provide an open standard for wireless information and services. It uses WML as its markup language. The presentation describes WAP's architecture including its protocol stack and WAP gateway. It also discusses how WAP addresses limitations of wireless devices and networks, such as small displays and low bandwidth. Examples of WAP services mentioned include banking, shopping, news and email. In conclusion, the presenter notes that WAP will become more efficient with the rollout of 3G networks like UMTS.
Blink detection and tracking of eyes for eye localisatSajan Sahu
This document presents a method for blink detection, eye tracking, and eye localization. It proposes using frame differencing, thresholding, and optical flow analysis to detect eye blinks. Key steps include obtaining motion regions through frame differencing, thresholding to find eye blobs, and computing optical flow fields to determine if dominant blob motion is upward or downward, indicating eye opening or closing. Eye tracking is then performed on localized eye regions using KLT tracking with 20 feature points. The method aims to accurately and quickly locate and track eyes for applications like human-computer interaction and security identification.
This document discusses database management systems (DBMS) and their key characteristics and components. It covers three main points:
1) It describes the main functions of a DBMS, including maintaining data integrity, enforcing access rules, providing backup/recovery procedures, and allowing shared data access across applications.
2) It outlines different database models like relational, network, and hierarchical and discusses logical and physical data independence.
3) It explores the architecture of a DBMS and how users and programs interact with the database through a DBMS interface to perform queries, updates, and other data management tasks.
GPRS is a packet-based mobile data service on the 2G and 3G cellular communication systems. It provides higher data transmission rates and efficient use of network resources compared to existing cellular networks. GPRS allows users to be continuously connected to the network and transfer data in bursts. It introduces packet-switched routing to the existing GSM infrastructure and supports applications like internet, email and file transfer through connections to external packet networks.
The document provides information about the BIOS (Basic Input/Output System) including what it does, its components, and setup. It discusses that the BIOS performs basic functions to start the computer like checking setup information, loading drivers and interrupt handlers, and performing POST (Power-On Self-Test). It also outlines the typical boot sequence, components of the setup utility, and some beep codes used for fault finding.
Bluetooth is a wireless technology standard that allows various digital devices to connect and exchange information over short distances without cables. It uses short-wavelength radio transmissions in the industrial, scientific and medical radio bands to facilitate connections between devices like mobile phones, headphones, laptops and printers. Key benefits of Bluetooth include its global acceptance, ability to connect a wide range of devices easily, secure connections, and low power consumption. It works by creating personal area networks between devices within about 30 feet of each other.
The document discusses the 802.11 specifications for wireless LANs. It describes the layers and protocols in the 802.11 architecture including the LLC, MAC, PHY and management layers. It provides details on the MAC protocol which uses CSMA/CA for channel access. It also describes the different physical layer specifications including DSSS, FHSS, IR and OFDM and key aspects of the DSSS PHY standard.
The document discusses the key steps for selecting and implementing an enterprise resource planning (ERP) system. It recommends establishing a major project with high priority and visibility. A project manager should be selected who is knowledgeable about the company and ERP systems. Requirements for the system should be thoroughly documented from all departments. Top candidates are reviewed through references, trial software, and selection criteria. Implementation involves training users on the system's concepts and software, establishing procedures, and maintaining data accuracy.
This document provides an overview of internet telephony (also known as voice over internet protocol or VoIP). It discusses how VoIP works by sending audio over the internet in real-time between computer users. The document also outlines the key factors and protocols that enable VoIP, including improvements in compression techniques, full-duplex sound cards, more powerful PCs, and protocols like SIP, RTP, and H.323. Both advantages and disadvantages of VoIP are presented, such as lower long distance costs but also potential issues with internet integration and latency.
Sangram Keshari Nayak presented a technical seminar on W-CDMA at the National Institute of Science and Technology. W-CDMA stands for Wideband Code Division Multiple Access, which is a 3G network that uses a 5MHz carrier spectrum and has higher capacity than previous networks. The presentation covered topics such as how CDMA works, the differences between CDMA variants, W-CDMA characteristics and parameters, design issues like turbo coding and interference cancellation, the WCDMA system, radio network functionality including power control and soft handover, and upgrading from GSM to WCDMA networks.
This document provides an overview of cryptography. It discusses traditional cryptography techniques like the Caesar cipher and shift ciphers. It also explains symmetric and asymmetric key cryptography, giving examples like DES, RSA, and their uses. Cryptographic services like authentication, data integrity, non-repudiation, and confidentiality are mentioned. The document notes how cryptography is widely used today in network security, banking transactions, and military communications.