5,343 research outputs found

    ALTERNATIVE HERBAL DRUGS USED FOR TREATING HAIR DISEASE

    Get PDF
    Objective: The main objective of present study is to treat Alopecia. Alopecia areata is an unpredictable hair-loss condition. Alopecia is a dermatological disorder with psychosocial implications on patients with hair loss. Herbal systems of medicine have become increasingly popular in recent years. Medicinal plants have been used for the treatment of hair diseases since antiquity. Herbs such as turmeric, fenugreek, ginger, Cyperus rotundus (Nagarmotha), and holy basil are integral parts of ayurvedic formulations. Cyperus rotundus is a well-known ayurvedic herb with purported claims of hair growth promotion. Methods: Extracts are prepared by separating the soluble matter from vegetable tissues by the application of a suitable solvent such as alcohol, water, or ether. The resultant liquid is concentrated by evaporation to obtain a liquid extract or concentrated almost to dryness to obtain the solid extract and its volatile oil. Hair formulation of Cyperus rotundus belonging to family Cyperaceae in the form of herbal formulation (5% herbal cream and oil) was studied and it showed excellent hair growth activity with standard (2% minoxidil ethanolic solution) in Wister albino rats. Results: Hair growth initiation time was significantly reduced to half on treatment with the oil, as compared to control animals. The hair growth promoting effect was evaluated against the control, standard, and test animals at 0, 10, 15, and 20 days with the formulated hair oil and hair cream prepared from the volatile oil extracted from the Cyperus rotundus and the significant hair growth was observed, and the growth was compared with the standard drug used 2% solution of minoxidil. Conclusion: The results of treatment with oil were better than the positive control minoxidil 2% treatment. It holds the promise of potent herbal alternative for minoxidil. Keywords: Alopecia areata, Cyperus rotundus, Hair growth, Extracts, Herbal creams, Hair oil, Hair formulation, Ayurvedic, Cyperaceae.  ORCID iD: - http://orcid.org/0000-0002-0439-606

    Detection and confirmation of toxigenic Vibrio cholerae O1 in environmental and clinical samples by a direct cell multiplex PCR

    Get PDF
    Epidemic cholera caused by toxigenic Vibrio cholerae O1 is a major health problem in several developing countries. Traditional methods for identifying V. cholerae involve cultural, biochemical and immunological assays which are cumbersome and often take several days to complete. In the present study, a direct cell multiplex PCR was developed targeting the ompW, ctxB and rfbO1 genes for confirmation of V. cholerae, its toxigenicity and serogroup O1, respectively from clinical and environmental samples. The detection sensitivity of the multiplex PCR was 1.9 x 103 V. cholerae per PCR reaction. A total of 31 environmental samples and 45 clinical V. cholerae isolates from different outbreaks were examined by the PCR. The assay was simple and specific, as there was no requirement for DNA extraction and no amplification was  observed with other homologous bacteria used. The assay can be very useful for rapid surveillance of toxigenic V. cholerae O1 in environmental water samples, as well as for confirmation of clinical isolates.Keywords: cholera, Vibrio cholerae, PCR, environmental sample

    Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric

    Full text link
    Biometric techniques are often used as an extra security factor in authenticating human users. Numerous biometrics have been proposed and evaluated, each with its own set of benefits and pitfalls. Static biometrics (such as fingerprints) are geared for discrete operation, to identify users, which typically involves some user burden. Meanwhile, behavioral biometrics (such as keystroke dynamics) are well suited for continuous, and sometimes more unobtrusive, operation. One important application domain for biometrics is deauthentication, a means of quickly detecting absence of a previously authenticated user and immediately terminating that user's active secure sessions. Deauthentication is crucial for mitigating so called Lunchtime Attacks, whereby an insider adversary takes over (before any inactivity timeout kicks in) authenticated state of a careless user who walks away from her computer. Motivated primarily by the need for an unobtrusive and continuous biometric to support effective deauthentication, we introduce PoPa, a new hybrid biometric based on a human user's seated posture pattern. PoPa captures a unique combination of physiological and behavioral traits. We describe a low cost fully functioning prototype that involves an office chair instrumented with 16 tiny pressure sensors. We also explore (via user experiments) how PoPa can be used in a typical workplace to provide continuous authentication (and deauthentication) of users. We experimentally assess viability of PoPa in terms of uniqueness by collecting and evaluating posture patterns of a cohort of users. Results show that PoPa exhibits very low false positive, and even lower false negative, rates. In particular, users can be identified with, on average, 91.0% accuracy. Finally, we compare pros and cons of PoPa with those of several prominent biometric based deauthentication techniques

    Solving kk-means on High-dimensional Big Data

    Full text link
    In recent years, there have been major efforts to develop data stream algorithms that process inputs in one pass over the data with little memory requirement. For the kk-means problem, this has led to the development of several (1+Δ)(1+\varepsilon)-approximations (under the assumption that kk is a constant), but also to the design of algorithms that are extremely fast in practice and compute solutions of high accuracy. However, when not only the length of the stream is high but also the dimensionality of the input points, then current methods reach their limits. We propose two algorithms, piecy and piecy-mr that are based on the recently developed data stream algorithm BICO that can process high dimensional data in one pass and output a solution of high quality. While piecy is suited for high dimensional data with a medium number of points, piecy-mr is meant for high dimensional data that comes in a very long stream. We provide an extensive experimental study to evaluate piecy and piecy-mr that shows the strength of the new algorithms.Comment: 23 pages, 9 figures, published at the 14th International Symposium on Experimental Algorithms - SEA 201

    A Simple Auditable Fingerprint Authentication Scheme Using Smart-Contracts

    Get PDF
    Biometric authentication, and notably using fingerprints, are now common. Despite its usability, biometrics have however a caveat which is the impossibility of revocation: once the raw fingerprint is breached, and depending on the technology of the reader, it is impossible to stop an illegitimate authentication. This places a focus on auditing both to detect fraud and to have clear indications that the fingerprint has been breached. In this paper we show how to take advantage of the immutability property of Blockchains to design an auditable protocol based on Diffie-Hellman key exchange with applications to fingerprint authentication

    ULearn: personalized medical learning on the web for patient empowerment

    Get PDF
    Health literacy constitutes an important step towards patient empowerment and the Web is presently the biggest repository of medical information and, thus, the biggest medical resource to be used in the learning process. However, at present, web medical information is mainly accessed through generic search engines that do not take into account the user specific needs and starting knowledge and so they are not able to support learning activities tailored to the specific user requirements. This work presents “ULearn” a meta engine that supports access, understanding and learning on the Web in the medical domain based on specific user requirements and knowledge levels towards what we call “balanced learning”. Balanced learning allows users to perform learning activities based on specific user requirements (understanding, deepening, widening and exploring) towards his/her empowerment. We have designed and developed ULearn to suggest search keywords correlated to the different user requirements and we have carried out some preliminary experiments to evaluate the effectiveness of the provided information
    • 

    corecore