Nitin Anand

Learn More
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classified based on their location as application vulnerabil-ities, network vulnerabilities, or host vulnerabilities. This paper describes Ferret, a new software tool for checking host(More)
BACKGROUND Treatments for open-angle glaucoma aim to prevent vision loss through lowering of intraocular pressure, but to our knowledge no placebo-controlled trials have assessed visual function preservation, and the observation periods of previous (unmasked) trials have typically been at least 5 years. We assessed vision preservation in patients given(More)
OBJECTIVE To explore the presentation behaviours and pathways to detection of adults who first presented to UK hospital eye services with severe glaucoma. DESIGN Semistructured interviews, based on models of diagnostic delay, to obtain a descriptive self-reported account of when and how participants' glaucoma was detected. RESULTS 11 patients(More)
PURPOSE To report the comparative efficacy and safety of intraoperative 5-fluorouracil (5-FU) or mitomycin C (MMC) in primary trabeculectomy in Nigeria. MATERIALS AND METHODS Retrospective chart review of patients undergoing primary antimetabolite trabeculectomy in Lagos, Nigeria between 1996 and 2003. We included 129 patients (132 eyes) of the 210(More)
An ETL process includes various ETL activities, such as filtering, aggregating, checking for null values, etc., which can be represented by the constraint functions and transforming operations defined in previous section. However, the activities cannot exist in an ETL process independently; they must be organized in certain order that is specified in an ETL(More)
PURPOSE To report long-term follow-up of zonulo-hyaloido-vitrectomy (ZHV) via anterior approach for pseudophakic malignant glaucoma refractory to medical treatment. DESIGN Noncomparative case-series. MATERIALS AND METHODS Medical records of 9 patients who sought treatment for aqueous humor misdirection refractory to medical treatment were reviewed. All(More)
A key challenge for data warehouse security is how to manage the entire system coherently – from sources and their export tables, to warehouse stored tables (conventional and cubes) and views defined over the warehouse. Permissions on the warehouse must satisfy the restrictions of the data owners, and be updated quickly as those local concerns evolve. Yet(More)
Business intelligence (BI) is considered to have a high impact on businesses. Research activity has risen in the last years. An important part of BI systems is a well performing implementation of the Extract, Transform, and Load (ETL) process. In typical BI projects, implementing the ETL process can be the task with the greatest effort. Here, set of generic(More)
This is a case report highlighting testicular semi-noma as a rare cause of Horner's syndrome. Introduction Horner's syndrome, first described in 1869 by a Swiss ophthalmologist, is a characteristic triad of features that results from an interruption of the sympathetic pathway. The ophthalmic manifestations arise due to paralysis of the sympathetically(More)