Individuals must be free

National freedom means nothing if the individuals are not free. An authoriatraian government is hardly any better than foreign rule.

Types of Error in Medical Statistics

Medical research often involves testing of null hypothesis in order to determine the significance of the findings. Two types of errors may occur in this method, type 1 error and type 2 error.

P-value and Confidence Interval

Many studies report significance of study findings in terms of p-value and confidence interval. This article describes in short what these terms mean.

A Practical Guide to Systematic Reviews

This article describes how to do a systematic review. This is more of a practical step by step guide than a theoretical piece. Hopefully it'll give you an idea about systematic reviews and help you to write your own.

Platelet Transfusion in Dengue

Management of dengue patients sometimes requires platelet transfusion, but an over-enthusiasm may be inappropriate. This article examines the available evidences regarding rational use of platelet transfusion in dengue.

Evidence Based Medicine

Evidence Based Medicine is the concept of treating patients based on solid evidence gathered from medical research. This is a brief article about its implications in our clinical practice.

Droplet Infection

Droplet infection is a major way of disease transmission. A number of infections can spread this way. Some basic things about droplet infections are described in this article.

Haiku for COVID-19

This is a collection of haiku telling the story of COVID-19. As the pandemic goes on more and more haiku will be added to the collection.

The Shield of the Nation

This is a poem dedicated to all the Indian frontline healthcare workers at this hour of crisis. I hope history remembers us.

Cryptococcal Meningitis

Cryptococcal meningitis is frequently seen in immunocompromised patients. This article describes the diagnosis and management of this condition in resource poor settings.

Immune Reconstitution Inflammatory Syndrome

Immune Reconstitution Inflammatory Syndrome is the worsening of some pre-existing illness due to improvement of immunity in an immunocompromised patient. This brief article primarily focuses on TB IRIS.

Acid Base Disorders

This article describes the acid base disorders in humans. It discusses the physiology behind the acid base balance, different disorders of acid base balance, their pathophysiology, diagnosis and treatments.

Fifteen basic knots

This article describes fifteen basic knots and how to tie them. The knots are selected according to their importance and the ease of learning them.

Gunshot injuries in Forensic Medicine

Discusson of gunshot injuries in Forensic Medicine is mainly concerened about the wounds produced by firearms on human bodies and the informations that can be derived by examining them.

A very short guide to ECG interpretation

This is a very short guide to ECG interpretation. This article focuses on quickly enabling you to read ECG strips in a step by step method.

File Sharing over Network

File sharing is one of the most necessary job in everyday life. But it becomes extremely easy and efficient if you have your computers connected with a Local Area Network. LAN sharing is faster than Internet sharing and more convenient than moving files physically.

Linux Filesystem

This blog article describes the most basic structure of Unix file system. In Linux everything is a file. All the folders and files are inherited from a single root. The storage devices are mounted to existing directories and accessed from there.

Creating a Website

This article describes the fundamental things you need to know about websites with schematic diagram of server-client model. It will serve as a practical guide to create a website on your own.

What does Hacking mean

The word hacking does not mean illegal access to other people’s information. But the real meaning of the word is knowing a system inside out, finding problems and solving them.

GPG Keys

GPG is an asymmetric encryption system that enables people to securely exchange data. GPG depends on a key pair. A message can be encrypted by public key and then it can only be decrypted by the corresponding private key.

GNU/Linux Adoption

Linux is a secure, customizable and easy to use OS that follows the Unix standards. This article describes why you should consider moving to Linux.

Chakravyuha and potential counter-measures

Chakravyuha is a troop formation mentioned in the Indian epic of Mahabharata. This article describes the formation and speculates about some potential counter-measures against it.

Copyright © 2012-2020 Dr. Agnibho Mondal
E-mail: mondal@agnibho.com