Ostéoïd ostéoma of the ulnar styloide. A case report and review of the literature
The authors bring back a case of ostéoïd ostéoma of the ulnar styloide. It was about a 26-year-old, military young man, who appeared in consultation for pain of the left wrist of inflammatory speed feigning monoarthritis. The diagnosis of the ostéoïd ostéoma was evoked to the standard radiography and the scanning, and confirmed by the anatomopathologique examination. The treatment was surgical by percutaneous resection under control scopique with good result.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Past trends and future prospects of fruits and vegetables in India
Fruits and vegetables are high value commercial crops grown in an area of about 16.19 million hectares with a production of 243.47 million tones in India in 2012-13. Over the years (2001-02 to 2013-14), there is an increase in area, production and productivity of fruits with compound growth rate of 5.71, 6.31 and 1.08 percent respectively. In addition, there is an increase in area, production as well as productivity of vegetables with compound growth rate of 3.99, 6.20 and 2.13 percent respectively. Seasonal variability in fruits and vegetables has shown inverse relationship between arrivals and prices. At the time of harvesting, there is glut in market that adversely affects the prices because of which seasonal indices for arrivals are maximum and corresponding prices are relatively low. Pre-harvest losses occur due to attack of insect- pest, rodents, birds and infestation of weeds and diseases. Post harvest losses for fruits and vegetables occur in different stages of marketing viz. picking/ plucking, assembling, grading, packing, storage, loading/ unloading, transport etc. In India, the scientific storage capacity is only 30 percent of the required capacity. Cold storage facility is available for only 10 percent of fruits and vegetables. Only 2-3 per cent of the produce is processed in India. Due to lack of proper handling (cleaning, sorting, grading and packaging) facilities at the village level with about 30 percent of fruits and vegetables and 10 percent of spices are lost before reaching the market. There is a wide scope of increase in processing capacity for fruit and vegetable industry.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Plant Derived Drugs and Use in Cancer Treatment
Plant derived components have a great significance and act as potent alternatives for the treatment of cancer without having harmful after effects on human body. There are about 250,000 plant species out of which more than one thousand plants possess significant anticancer properties which has been proven by scientists. Plant derived components such as Taxol, podophyllotoxin, etoposide, camptothecin, topotican, vinblastine, etc are of great contribution towards anti-cancer activity by plants
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Preparation and Characterization of ZnO Nano rods by Hydrothermal Method
In this study, a surface structure of zinc oxide (ZnO) nano rods prepared by hydrothermal method was investigated. The crystal structure of ZnO nano rods arrays were investigated by X-ray diffractometer (XRD) with Cu K? radiation. The surface morphologies were observed using Scanning Electron Microscope (SEM). The prepared ZnO nano rods have wide range of applications in Photo catalytic degradation of textile colouring dyes.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Presenting a model for identify of agile capabilities and ranking advertisement sites: real case study of Iran advertisement websites
Nowadays, due to global competition the growing, e-commerce is faced with increasingly complex challenges. E-commerce has been greatly influenced by online advertising sites. Online advertising is a form of promotion that uses the Internet and World Wide Web for the expressed purpose of delivering marketing messages to attract customers. However, the question is, do the IT managements know how to choose the best advertising site to introduce products and services? To answer this, it is necessary to recognize influential factors on choosing the best advertising site and current competition position based on agile capabilities. They have to, because managers cannot expect to find the method to achieve this goal, if they don’t have accurate data about the ranking of advertising sites. The goal of this paper is identify of agile capabilities and ranking advertisement sites by presenting a model based on the knowledge of multi criteria decision making. After determining criteria, weight devoting was performed by using the expert's views in the IT departments. Ultimately, ranking of advertisement sites was done by applying the algorithm of PROMETHEE .
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Reformation in higher education, with especial focus on reforming higher Education in Pakistan
Higher education has enormous potential to promote prosperity in the developing nations. The development of a modern society depends to a large extent on the nature and standard of higher education. This paper is about tracing global links in higher education reforms in all over the world. The paper tries to describe globalization and its general effects which are currently observable across the globe, encompassing nations which are culturally and economically very diverse. It particularly highlights the effects of globalization on higher education reforms, which are competitiveness-driven, finance-driven and equity-driven. Throughout the World, universities change the society and remain the center of change and development. In the context of Pakistan, various Education Commissions were set up so far theoretically emphasized on unlocking potential at all levels of society and creating a pool of highly trained individuals to contribute to the national development. But in practice these universities are weak and need amendment. Dedication of teachers and students can improve the culture of higher education in Pakistan. Initiate to free the universities from the clutches of politics can play a lot of the overall improvement of the higher education. In light of these global higher education reform patterns the paper explores the major educational reforms being pursued in Pakistan since 1947 in higher education. The paper argues that globalization has seriously challenged the national reform policies, which are now becoming more and more globally driven. Rather than out rightly rejecting all global policies, engaging critically with them is the stance of the authors and as the title indicates also, this paper is an attempt to analyze the problems and reforms in higher education system in Pakistan.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Relation between burnout components and CVD in poor job design
Burnout a multidimensional construct consisting of emotional exhaustion, physical fatigue and depersonalization was shown destructive to personal health. Job design feature of demand and control model cause burnout because of high demands of work (namely production responsibility, problem solving demand and monitoring demand) and lack of control (timing control and method control) over work. There is also evidence concerning The association between burnout and risk of cardiovascular disease. The aim of the current research was to verify these relations. The participants were 128 personnel of Isfahan Gas Company. job design inventory was used to form two groups. In two groups of inappropriate job design (low control and high demand) and appropriate job design group. Instruments were Burnout Questionnaire of Maslach. Lipid serum was measures as dependent (criterion) variables. Relations between burnout and dependent variables in two group was determined and transfer to Z-fisher to compare stronger relationship in poor job design group. It is concluded that burnout is dependent on the quality of social environment especially job design and burnout bring cardiovascular disease more in poor job design group so we advice managers enrich job design characteristics to ensure you have healthy workers.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Role of Management Accounting in Managerial the Decision Making of Enterprises
The managers use management accounting information and techniques to take decisions. The decision making process of most of managers consists of economical decision making and choosing the best alternative that lead to profit maximization as well as cost and expense minimization. Management accounting measures and produces economical information which is useful to users for conscious decision making. Management accounting writers tend to present management accounting as a loosely connected set of decision-making tools. Although the various textbooks on management accounting make no attempt to develop an integrated theory, there is a high degree of consistency and standardization in methodology of presentation. In this chapter, the concepts and assumptions which form the basis of management Accounting will be formulated in a comprehensive management accounting decision Model. The formulation of theory in terms of conceptual models is a common practice. Virtually all textbooks in business administration use some type of conceptual Framework or model to integrate the fundamentals being presented. In economic theory, there are conceptual models of the firm, markets, and the economy. In Management courses, there are models of organizational structure and managerial Functions. In marketing, there are models of marketing decision-making and channels of distribution. Even in financial accounting, models of financial statements are used As a framework for teaching the fundamentals of basic financial accounting. The tactical decisions which must be preceded by strategic decisions provide the Historical data from which the accountant prepares financial statements. In addition To being statements summarizing historical transactions, financial statements may be Regarded as a descriptive model for decision-making. Every item or elements on the financial statements are the result of a decision or decisions. For each decision, a management accounting tool is exist that may be used to make a good decision. However, the management accounting tools can be used only if the management Accountant is successful in providing the information demanded by the particular Tool.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Speech Generation Using Kinect To Aid The Mute In Public Addressing
Various new technologies and aiding instruments are always being introduced for the betterment of the challenged. This project focuses on aiding the mute in expressing their views and ideas in a much efficient and effective manner thereby creating their own place in this world. The proposed system focuses on using various gestures traced into texts which could in turn be transformed into speech. The gesture identification and mapping is performed by the Kinect device, which is found to cost effective and reliable. A suitable text to speech convertor is used to translate the texts generated from Kinect into a speech. The proposed system though cannot be applied to man-to-man conversation owing to the hardware complexities, but could find itself very much of use under addressing environments such as auditoriums, classrooms, etc
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
SRTURP: Secure routing through unobservable routing protocol for mobile Ad-hoc networks
A mobile ad hoc network consists of mobile nodes that communicate in an open wireless medium. Adversaries can launch analysis against the routing information embedded in the routing message and data packets to detect the traffic pattern of the communications; thereby they can obtain the sensitive information of the system, like the identity of a critical node. Privacy-preserving routing is crucial for some ad hoc networks that require stronger privacy protection. A number of schemes have been proposed to protect privacy in ad hoc networks. However, none of these schemes offer complete unlinkability or unobservability properties since data packets and control packets are still linkable and distinguishable in these schemes. In this paper, we define stronger privacy requirements regarding privacy-preserving routing in mobile ad hoc networks. Then we propose an unobservable secure routing scheme Secure Un-Obseravable Routing Protocol to offer complete unlinkability and content unobservability for all types of packets. On- Demand secure Routing protocol is efficient as it uses a novel combination of group signature and ID-based encryption for route discovery. Security analysis demonstrates that SRTURP can well protect user privacy against both inside and outside attackers. This Secure Routing Protocol is implemented on ns2, and evaluated its performance by comparing with Ad-hoc On Demand Distance Vector and MASK. The simulation results show that SRTURP not only has satisfactory performance compared to Ad-hoc On Demand Distance Vector, but also achieves stronger privacy protection than existing schemes like MASK.A mobile ad hoc network consists of mobile nodes that communicate in an open wireless medium. Adversaries can launch analysis against the routing information embedded in the routing message and data packets to detect the traffic pattern of the communications; thereby they can obtain the sensitive information of the system, like the identity of a critical node. Privacy-preserving routing is crucial for some ad hoc networks that require stronger privacy protection. A number of schemes have been proposed to protect privacy in ad hoc networks. However, none of these schemes offer complete unlinkability or unobservability properties since data packets and control packets are still linkable and distinguishable in these schemes. In this paper, we define stronger privacy requirements regarding privacy-preserving routing in mobile ad hoc networks. Then we propose an unobservable secure routing scheme Secure Un-Obseravable Routing Protocol to offer complete unlinkability and content unobservability for all types of packets. On- Demand secure Routing protocol is efficient as it uses a novel combination of group signature and ID-based encryption for route discovery. Security analysis demonstrates that SRTURP can well protect user privacy against both inside and outside attackers. This Secure Routing Protocol is implemented on ns2, and evaluated its performance by comparing with Ad-hoc On Demand Distance Vector and MASK. The simulation results show that SRTURP not only has satisfactory performance compared to Ad-hoc On Demand Distance Vector, but also achieves stronger privacy protection than existing schemes like MASK.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]