A Silent Creeper-Multiple Sclerosis
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1
Abstract
"Multiple Sclerosis (MS) is an immune mediated process in which an abnormal response of the body’s immune system is directed against the central nervous system (CNS). Multiple sclerosis is a very variable condition and the symptoms depend on which areas of the CNS have been affected. There is no set pattern for MS and everyone with MS has a different set of symptoms, which vary from time to time and can change in severity and duration, even in the same person. Hence diagnosing MS at the earliest is very essential. Therefore we report an unusual case of a 42-year-old man who presented with painful limp in the left leg on walking a distance of around 200 metres attributed to fracture of left leg 20 years back with history of repeated falls and trivial trauma. After thorough history taking and detailed clinical examination he was finally diagnosed to have Multiple Sclerosis. This case is being reported in view of varied clinical presentation, subtle symptoms, occurrence in male sex and delayed onset . "
Fault Tolerance in Parallel System Using Multiple Stacks
Abstract: The project describes a technique to tolerate faults in large data structures hosted on distributed servers, based on the concept of fused backups. The prevalent solution to this problem is replication. To tole...
Comparative Study on the Application of Surgipro Partiene Mesh and Light Partiene Mesh, in Patients with Inguinal Hernia Surgery with the Lichtenstein Method
"Introduction: According to historical data treatment of inguinal hernia is one of the first surgical interventions made by human worldwide, annually operating around one million patients, applying different operating te...
DDoS Attack Defense against Source IP Address Spoofing Attacks
Distributed Denial of Service (DDoS) attacks is the most challenging problems for network security. The attacker uses large number of compromised hosts to launch attack on victim. Various DDoS defense mechanisms aim at d...
Equivalence of the 3 Methods of Estimating Bad Debts
When first learned, the three (3) methods of estimating bad debts appear distinct from one another. But upon closer examination, all three methods actually exhibit a common attribute that is at the same time unique for...
Intrusion Detection System in Web Services
Intrusion Detection System in Web Services