scispace - formally typeset
Search or ask a question
Author

Madhur Poddar

Bio: Madhur Poddar is an academic researcher from Birla Institute of Technology & Science, Pilani - Goa. The author has contributed to research in topics: The Internet & Surgery. The author has an hindex of 1, co-authored 1 publications receiving 2 citations.

Papers
More filters
Proceedings ArticleDOI
01 Jan 2019
TL;DR: The newly modelled approach of Google is proposed and some modifications to the approach are suggested to answer the privacy issue.
Abstract: As the vehicles become a formidable sensor platform, the concept of VANETs is being transformed into a pervasive and ubiquitous concept of IoV (Internet of Vehicles). We discuss the scope of IoV over the limitations of VANET and further, we see the standards specified for automated vehicles and the aspects related to their deployment. We also discuss the various techniques under development that facilitate the transfer of anonymous user data upload in automated vehicle environment to the open public data repositories for the research community. We give the abstract of a model proposed to answer the privacy issue and see its controlled deployment. We finally propose the newly modelled approach of Google and suggest some modifications to the approach to answer the privacy issue.

2 citations

Journal ArticleDOI
01 May 2022-Cureus
TL;DR: It is concluded that the PFN-A2 has the benefit of closed reduction, short operative time, preservation of biology, less soft tissue damage, and early rehab.
Abstract: Background Intertrochanteric fractures are common injuries among the elderly population and those with osteoporosis. The study was conducted in order to evaluate the outcome of Proximal Femoral Nail Antirotation II (PFN-A2) in the treatment of these fractures in elderly patients. Methods Twenty-five elderly patients (range 60 to 73 years) with trochanteric fractures who were treated with PFN-A2 at Government Medical College Amritsar were included in this prospective observational study. These patients were followed up regularly until six months post-operatively. The functional and radiological evaluations were done at six, 12, 16, and 20 weeks. The functional outcome was evaluated using the Harris Hip Score (HHS). Results The mean age incidence for trochanteric fractures was 64 years. There were no cases of intra-operative and postoperative femoral fractures. The mean operating time was 85.6 minutes. Radiological union was seen in all of the 25 patients. The mean time for fracture union time in our study was 13.8 weeks. The average Harris Hip Score in our study was calculated at three months as 74.3 and at six months as 85.08. The p-value was highly significant (0.001) for this improved outcome. This study found PFN-A2 related secondary varus deformities in 8.0% of the patients (two patients). Only one patient (4%) developed surgical site infection (SSI). Conclusion PFN-A2 provides adequate functional results in terms of fixation and healing. This can be further enhanced by good pre-operative planning, correct technique of entry point, and meticulous placement of implant with a helical blade in both anteroposterior (AP), lateral view, and distal locking and non-acceptance of reduction in varus. A good reduction is required to achieve a good functional outcome. We conclude that the PFN-A2 has the benefit of closed reduction, short operative time, preservation of biology, less soft tissue damage, and early rehab.

Cited by
More filters
Journal Article
TL;DR: Calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs.
Abstract: More particularly, calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs. This paper concentrates on using Wireless for interacting with and localizing the robot. We've carried out thorough studies of Wireless signal propagation qualities both in indoor and outside conditions, which forms the foundation for Wireless AP deployment and communication to be able to augment how human operators communicate with this atmosphere, a mobile automatic platform is developed. Gas and oil refineries could be a harmful atmosphere for various reasons, including heat, toxic gasses, and unpredicted catastrophic failures. When multiple Wireless APs are close together, there's a possible for interference. A graph-coloring heuristic can be used to find out AP funnel allocation. Additionally, Wireless fingerprinting based localization is developed. All of the calculations implemented are examined in real life situations using the robot developed and answers are promising. For example, within the gas and oil industry, during inspection, maintenance, or repair of facilities inside a refinery, people might be uncovered to seriously high temps to have a long time, to toxic gasses including methane and H2S, and also to unpredicted catastrophic failures.

455 citations

Journal ArticleDOI
TL;DR: The issues faced in implementing a secure IoV architecture are discussed and the various challenges in implementing security and privacy in IoV are examined by reviewing past papers along with pointing out research gaps and possible future work and putting forth on inferences relating to each paper.
Abstract: As an up-and-coming branch of the internet of things, internet of vehicles (IoV) is imagined to fill in as a fundamental information detecting and processing platform for astute transportation frameworks. Today, vehicles are progressively being associated with the internet of things which empower them to give pervasive access to data to drivers and travelers while moving. Be that as it may, as the quantity of associated vehicles continues expanding, new prerequisites, (for example, consistent, secure, vigorous, versatile data trade among vehicles, people, and side of the road frameworks) of vehicular systems are developing. Right now, the unique idea of vehicular specially appointed systems is being changed into another idea called the internet of vehicles (IoV). We talk about the issues faced in implementing a secure IoV architecture. We examine the various challenges in implementing security and privacy in IoV by reviewing past papers along with pointing out research gaps and possible future work and putting forth our on inferences relating to each paper.

30 citations