26 research outputs found
Anonymous Key Generation Technique with Contributory Broadcast Encryption
Encryption is used in a communication system to secure information in the transmitted messages from anyone other than the well-intended receiver. To perform the encryption and decryption the transmitter and receiver should have matching encryption and decryption keys. For sending safeguard information to group needed broadcast encryption (BE). BE allows a sender to securely broadcast to any subset of members and require a trusted party to distribute decryption keys. Group key agreement (GKA) protocol allows a number of users to establish a common secret channel via open networks. Observing that a major goal of GKA for most applications is to create a confidential channel among group members, but a sender cannot omit any particular member from decrypting the cipher texts. By bridging BE and GKA notion with a hybrid primitive referred to as contributory broadcast encryption (CBE). With these primitives, a group of members move through a common public encryption key while each member having there decryption key. A sender seeing the public group encryption key can limit the decryption to subset of members of sender’s choice. A simple way to generate these keys is to use the public key distribution system invented by Diffie and Hellman. That system, however, pass only one pair of communication stations to share a particular pair of encryption and decryption keys. Key distribution sets are used to generate keys and Elliptic Curve Cryptography (ECC) is used for the encryption and decryption of documents; and this going to provide the security for the documents over group communication
Smile designing using recurring esthetic dental proportion and aesthetic pre-evaluative temporary technique with porcelain laminate veneers: a case report
Beautiful confident smile has a positive impact on the psychosocial well-being of patients. Spacing present in the anterior region makes a patient feel dissatisfied with their smile. Over the years, a number of innovative techniques have been described in the treatment of patient having spaces between teeth in the anterior region. However, a less invasive and short-time treatment procedure with satisfactory result is preferred by the patient. Laminates have a unique position in today’s dental practice. These conservative restorations are especially important for young permanent dentitions. Porcelain veneers can be considered to be very much in cosmetic dentistry because they deal innumerable advantages over any previous form of veneering systems. This case report described the technique of closure of spaces between teeth in the anterior region by applying recurring esthetic dental (RED) proportion and aesthetic pre-evaluative temporary (APT) technique for smile designing using laminates. The RED proportion has been stated to be an essential tool for achieving esthetics and harmony in smile. The APT technique facilitated diagnosis, communication, and preparation, providing predictability for the restorative treatment. Limiting the preparation depth to the enamel surface significantly increases the performance of porcelain laminate veneers
PREPARATION AND CHARACTERIZATION OF CO-CRYSTALS OF DIACEREIN
Diacerein, anti-inflammatory drug used in the treatment of osteoarthritis. Being a BCS class II drug, it has poor solubility, dissolution rate and other physicochemical properties. Thus the aim of present study was to prepare co-crystals of diacerein to improve solubility, dissolution rate. The diacerein co-crystals were prepared using urea and tartaric acid as conformer by Solvent drop grinding method. The diacerein co-crystals were characterized by scanning electron microscopy (SEM), FT-IR spectroscopy (FT-IR), Differential scanning calorimetry (DSC) and X-ray diffractometry (XRD). The co-crystals were evaluated for solubility, dissolution rate and other physicochemical properties and compared with commercial diacern sample. The co-crystals exhibit the difference in the size and shape of crystals. The FT-IR spectra of diacerein co-crystals showed slightly different in the characteristic peaks compared to commercial diacerein sample. DSC data indicate the decrease in the melting endotherm of co-crystals compare to diacerein. The co-crystals with urea showed increase and intense peak and co-crystals with tartaric acid showed decreased number of peaks compared to commercial diacerein. The co-crystals of diacerein formulated in to the Tablet and evaluated for tablet properties. The tablet formulation showed improved tablet characteristics as well as dissolution rate compared to commercial diacerein
Formulation and Evaluation of Buccoadhesive Drug Delivery System for Lovastatin
Lovastatin, a hyperlipedemic agent used in the treatment of hypercholesterolemia, has poor bioavailability ( less than 5%) due to the first pass metabolism and thus the dosing frequency is more, as a result of which several side effects occurred with the current dosage form. The present study aimed to formulate and evaluate buccoadhesive tablets of Lovastatin using mucoadhesive polymer such as Carbopol 934P, Hydroxypropylmethyl cellulose (K4M, K100M) and sodium CMC. The different formulations of buccoadhesive tablet of Lovastatin were prepared by direct compression method and characterized for physicochemical parameters such as thickness, content uniformity, weight variation, hardness, and friability test. The swelling index, % matrix erosion, surface pH, bioadhesive strength, bioadhesive time and in-vitro drug release are also carried out which has been important aspect for success of buccoadhesive tablets. The FTIR study was carried out for drug and polymer compatibility. All the formulation showed satisfactory tablet properties. Formulation (F5) containing Carbopol 934P and HPMC K4M in the ratio of (1:1) showed good bioadhesive strength and maximum drug release of 95.80% in 8 hours. The surface pH of all tablets was found to be satisfactory, close to buccal pH, hence no irritation would observe with these tablets. FTIR studies showed no evidence of interaction between drug and polymers.
Keywords: Buccoadhesive tablets, Lovastatin, FTIR, Carbopol 934P, in-vitro drug releas
In-silico studies to recognize repurposing therapeutics toward arginase-I inhibitors as a potential onco-immunomodulators
Rudolf Virchow was the first person to point out the important link between immune function and cancer. He did this by noticing that leukocytes were often found in tumors. Overexpression of arginase 1 (ARG1) and inducible nitric oxide synthase (iNOS) in myeloid-derived suppressor cells (MDSCs) and tumour-associated macrophages (TAMs) depletes both intracellular and extracellular arginine. TCR signalling is slowed as a result, and the same types of cells produce reactive oxygen and nitrogen species (ROS and RNS), which aggravates the situation. Human arginase I is a double-stranded manganese metalloenzyme that helps L-arginine break down into L-ornithine and urea. Thus, a quantitative structure-activity relationship (QSAR) analysis was performed to unearth the unrecognised structural aspects crucial for arginase-I inhibition. In this work, a balanced QSAR model with good prediction performance and clear mechanistic interpretation was developed using a dataset of 149 molecules encompassing a broad range of structural scaffolds and compositions. The model was made to meet OECD standards, and all of its validation parameters have values that are higher than the minimum requirements (R2tr = 0.89, Q2LMO = 0.86, and R2ex = 0.85). The present QSAR study linked structural factors to arginase-I inhibitory action, including the proximity of lipophilic atoms to the molecule’s centre of mass (within 3A), the position of the donor to the ring nitrogen (exactly 3 bonds away), and the surface area ratio. As OAT-1746 and two others are the only arginase-I inhibitors in development at the time, we have performed a QSAR-based virtual screening with 1650 FDA compounds taken from the zinc database. In this screening, 112 potential hit compounds were found to have a PIC50 value of less than 10 nm against the arginase-I receptor. The created QSAR model’s application domain was evaluated in relation to the most active hit molecules identified using QSAR-based virtual screening, utilising a training set of 149 compounds and a prediction set of 112 hit molecules. As shown in the Williams plot, the top hit molecule, ZINC000252286875, has a low leverage value of HAT i/i h* = 0.140, placing it towards the boundary of the usable range. Furthermore, one of 112 hit molecules with a docking score of −10.891 kcal/mol (PIC50 = 10.023 M) was isolated from a study of arginase-I using molecular docking. Protonated ZINC000252286875-linked arginase-1 showed 2.9 RMSD, whereas non-protonated had 1.8. RMSD plots illustrate protein stability in protonated and non-protonated ZINC000252286875-bound states. Protonated-ZINC000252286875-bound proteins contain 25 Rg. The non-protonated protein-ligand combination exhibits a 25.2-Rg, indicating compactness. Protonated and non-protonated ZINC000252286875 stabilised protein targets in binding cavities posthumously. Significant root mean square fluctuations (RMSF) were seen in the arginase-1 protein at a small number of residues for a time function of 500 ns in both the protonated and unprotonated states. Protonated and non-protonated ligands interacted with proteins throughout the simulation. ZINC000252286875 bound Lys64, Asp124, Ala171, Arg222, Asp232, and Gly250. Aspartic acid residue 232 exhibited 200% ionic contact. 500-ns simulations-maintained ions. Salt bridges for ZINC000252286875 aided docking. ZINC000252286875 created six ionic bonds with Lys68, Asp117, His126, Ala171, Lys224, and Asp232 residues. Asp117, His126, and Lys224 showed 200% ionic interactions. In protonated and deprotonated states, GbindvdW, GbindLipo, and GbindCoulomb energies played crucial role. Moreover, ZINC000252286875 meets all of the ADMET standards to serve as a drug. As a result, the current analyses were successful in locating a novel and potent hit molecule that inhibits arginase-I effectively at nanomolar concentrations. The results of this investigation can be used to develop brand-new arginase I inhibitors as an alternative immune-modulating cancer therapy
Conversion of biomass platform molecules into fuel additives and liquid hydrocarbon fuels
[EN] In this work some relevant processes for the preparation of liquid hydrocarbon fuels and fuel additives
from cellulose, hemicellulose and triglycerides derived platform molecules are discussed. Thus, it is
shown that a series of platform molecules such as levulinic acid, furans, fatty acids and polyols can be
converted into a variety of fuel additives through catalytic transformations that include reduction, esterification,
etherification, and acetalization reactions. Moreover, we will show that liquid hydrocarbon fuels
can be obtained by combining oxygen removal processes (e.g. dehydration, hydrogenolysis, hydrogenation,
decarbonylation/descarboxylation etc.) with the adjustment of the molecular weight via C C coupling
reactions (e.g. aldol condensation, hydroxyalkylation, oligomerization, ketonization) of the reactive
platform molecules.This work has been supported by the Spanish Government-MINECO through Consolider Ingenio 2010-Multicat and CTQ.-2011-27550, ITQ thanks the "Program Severo Ochoa" for financial support.Climent Olmedo, MJ.; Corma Canós, A.; Iborra Chornet, S. (2014). Conversion of biomass platform molecules into fuel additives and liquid hydrocarbon fuels. Green Chemistry. 16(2):516-547. https://doi.org/10.1039/c3gc41492bS51654716
Aesthetic finger prosthesis
Finger and partial finger amputations are commonly due to traumatic injuries. Rehabilitation of such patients with disabilities is a challenging task. The success of the prosthesis depends on the precision of planning the prosthesis, making the impression, carving the model and choosing the material that best suits the concerned circumstances. This clinical report portrays a method to fabricate silicone rubber prosthesis for a patient who has a partial finger loss caused due to trauma.</jats:p
Butea Monosperma Shows Anti-cancer and Anti-Oxidant Activity: In-vitro and In vivo Study
Breast cancer is one of the predominant cancers in Indian subcontinent and the global scenario is not very different. Treatment of this type of cancer is possible by chemotherapy, surgery, and radiotherapy, which relieve the patient; however, off target activity and severe toxicity of non-cancerous cells remained the major drawbacks of these chemotherapeutics. In order to overcome these issues, modern cancer therapeutics emphasizes the implication of natural bioactive compounds. In this current piece of work, we have studied the anti-cancer potentiality of Butea monosperma flower in in vitro breast cancer cells. Various extracts of this flower were found to be non-toxic to breast epithelial cells but toxic to breast cancer cells. However, the methanol extract of this flower was most effective amongst all other extracts. Data suggest that Butea monosperma flower induce DNA damage mediated apoptosis and inhibit cell proliferation, angiogenesis and metastasis. It also inhibits the angiogenesis and metastasis in xenograft mice model system. Moreover, the anti-cancer phenomenon was found to be induction of inflammatory cytokines mediated oxidative stress in breast cancer. Collectively, Butea monosperma flower shows excellent cancer therapeutics in order to induce DNA damage, inhibit angiogenesis and metastasis simultaneously.</jats:p
Future of Quantum Computing in Cyber Security
Quantum computing leverages the probabilistic nature of the universe to harness computing capabilities, superseding classical and even supercomputers to solve complex problems in areas including drug development, financial modelling, etc. It is all about metadata and algorithms. This chapter per the authors aims to examine the field quantum computing in the context of cybersecurity. Through a thorough study of the timeline of developments in cybersecurity, modern cybersecurity schemes have been examined and conclusions pertaining to their vulnerabilities due to the emergence of quantum computers have been drawn. Breaking modern cryptographic schemes is equivalent to solving the underlying mathematical problems that these schemes are based on, which can be significantly sped up with a quantum computer. Hence, this chapter conveys the need for enterprises to adopt post quantum cryptographic schemes, which are not easily vulnerable to attacks by a quantum computer.</jats:p
