123 research outputs found

    Phytochemical Investigations of some Laticiferous Plants belonging to Khandesh Region of Maharashtra

    Get PDF
    Analyses were carried out on latex obtained from twenty one plant species belonging to Khandesh region of Maharashtra, India, for the presence of possible secondary metabolites, namely alkaloids, flavonoids, terpenoids, cynogenic glycosides, phenolics, tannins and saponins. Phenolic compounds were found in all latex samples except in Ipomoea carnea Jacq. Seventy six percent species of laticiferous plants contain alkaloid. Terpenoids were found in the latex of Carica papaya L. and Manilkara zapota (L.) P. van Royen only however, remaining plants were devoid. Cynogenic glycosides and tannins were detected in 52 % and 48 % of latex samples respectively. Flavonoids and saponins were detected in equal number of latex samples i.e. 38 %. Out of this, four species of Apocynaceae and single species of Euphorbiaceae, Moraceae, Carricaceae, Convolvulaceae etc. showed flavonoid. While three species of Euphorbiaceae, two species of Apocynaceae and Moraceae and single species of Asclepiadaceae showed saponin. The moisture and total solid content varies from species to species in latex samples analyzed. Euphorbia prunifolia Jacq. had highest level of moisture i.e. 93.33% and less solid content i.e. 6.67% whereas Euphorbia hirta L. had lowest level of moisture i.e.63.63% and highest content of total solid i.e. 36.37%. The results suggest that, the laticiferous plants would be exploited in the management of various diseases as they have diverse group of secondary metabolites

    Traditional Practice for Oral Health Care in Nandurbar District of Maharashtra, India

    Get PDF
    An ethnobotanical study was conducted from January 2006 to October 2008 to investigate the uses of medicinal plants for oral health care by different aborigines, such as Bhills, Gavits, Kokanis, Mavachis, Valvis, Pawras, Koknas and Vasaves, in the Nandurbar district of Maharashtra, India. Data were collected by interviewing native people, mainly elderly – engaged in farming and stock rising activities, housewives and local traditional medicinemen of different villages. The investigation revealed that a total 20 claims were obtained as distributed in 18 genera belonging to 14 families to treat various diseases and disorders of oral cavity, particularly in tooth decay. Information about local names, plant parts and different form of preparation used were recorded and are focused in given issue. In this study most commonly used family was Euphorbiaceae followed by Moraceae, Anacardiaceae, Fabaceae, Asteraceae, Acanthaceae, Meliaceae, Asclepiadaceae, Poaceae, Lythraceae, Sapotaceae, Cucurbitaceae, Rutaceae and Solanaceae. Present study indicated many tribal communities of visited villages of Nandurbar district still continue to depend on plant resources to meet their day-to-day needs and use plant based formulations from generation to generation for treatment of health related problems. Now, the tribal societies are progressing towards modernization; their knowledge of traditional use of plants might be lost. Therefore conservation of such heritage is warranted

    Avoid duplicate key overheads for same data in storage

    Get PDF
    De-duplication is a technique used to weaken the amount of storage needed by service providers. Now a day the most originating challenge is to perform secure de-duplication in cloud storage. Although convergent encryption has been extensively adopted for secure de-duplication, a demanding issue of making convergent encryption practical is to efficiently and reliably managea massive number of convergent keys. We first introduce a baseline approach in which each user holds an autonomous master key forencrypting the convergent keys and outsourcing them to the server. As a proof of concept, encompass the implementation framework of proposed authorized duplicate check scheme and conduct experiments using these prototype. In proposed system involve authorized duplicate checkscheme sustain minimal overhead compared to normal operations.De-duplication is one of important data compression techniques for eliminating duplicate copies of repeating data. For that purpose Authorized duplication check system is used. This paper addresses problem of privacy preserving de-duplication in cloud computing and introduce a new de-duplication system supporting for Differential Authorization, Authorized Duplicate Check, Unfeasiblity of file token/duplicate-check token, In distinguishability of file token/duplicate-check token, Data affinity.In this project we are presenting the certified data de-duplication toprotect the data security by counting differential privileges of users in the duplicate check.Different new de-duplication constructions presented for supporting authorized duplicate check

    Bioprospecting of Euphorbia nivulia Buch.-Ham

    Get PDF
    ABSTRACT Nature always stands as a golden mark to exemplify the outstanding phenomenon of symbiosis. The history of herbal medicines is as old as human civilization. Many herbal remedies have been employed in various medicinal systems for the treatment and management of different ailments. Euphorbia nivulia Buch. -Ham. a member of Euphorbiaceae family is a wild, thorny, xerophytic, succulent plant, commonly used in fencing of the agricultural field and also in dry barren areas. It has different biological activities for the treatment of several ailments of human being. It possesses antimicrobial, wound healing, haemostatic, larvicidal, insecticidal, nematicidal and cytotoxic activity. Chemically, it contains terpenes, glycoproteins, phytoelements and phytochemicals. This article provides informative data on ethnobotanical importance and bioprospecting of Euphorbia nivulia Buch. -Ham

    Effect of Phosphorus Nutrition on Growth and Physiology of Cotton Under Ambient and Elevated Carbon Dioxide

    Get PDF
    Phosphorous deficiency in soil limits crop growth and productivity in the majority of arable lands worldwide and may moderate the growth enhancement effect of rising atmospheric carbon dioxide (CO2) concentration. To evaluate the interactive effect of these two factors on cotton (Gossypium hirsutum) growth and physiology, plants were grown in controlled environment growth chambers with three levels of phosphate (Pi) supply (0.20, 0.05 and 0.01 mM) under ambient and elevated (400 and 800 μmol mol‒1, respectively) CO2. Phosphate stress caused stunted growth and resulted in early leaf senescence with severely decreased leaf area and photosynthesis. Phosphate stress led to over 77 % reduction in total biomass across CO2 levels. There was a below-ground (roots) shift in biomass partitioning under Pi deficiency. While tissue phosphorus (P) decreased, tissue nitrogen (N) content tended to increase under Pi deficiency. The CO2 × Pi interactions were significant on leaf area, photosynthesis and biomass accumulation. The stimulatory effect of elevated CO2 on growth and photosynthesis was reduced or highly depressed suggesting an increased sensitivity of cotton to Pi deficiency under elevated CO2. Although, tissue P and stomatal conductance were lower at elevated CO2, these did not appear to be the main causes of cotton unresponsiveness to elevated CO2 under severe Pi-stress. The alteration in the uptake and utilization of N was suggested due to a consistent reduction (18–21 %) in the cotton plant tissue N content under elevated CO2

    Information Searching Using Web Data Extraction for Acquiring Enrich MM Results

    Get PDF
    There are many question answer sites are available now a day. In that Community Question Answering Sites are achieved lots of popularity over last years. But the drawback of available question answering system is that it can only provide multiple solutions of the textual answer and user need to select one of them. In this paper, we propose a scheme that enriches the textual answer with multimedia data. Our scheme consists of four models: QA pair extraction, answer medium selection, query generation and selection and presentation. The type media information added with the textual data is determined. The question answer pair is generated from the available Community Question Answering Sites database. Query is generated for the multimedia data. The final resulting data must be selected after re-ranking and removal operation and then present to the user. DOI: 10.17762/ijritcc2321-8169.15014

    An Intrusion Detection System Algorithm for Defending MANET against the DDoS Attacks.

    Get PDF
    Mobile ad hoc network (MANET) is rapidly deployable, self configuring network able to communicate with each other without the aid of any centralized system. There is no need for existing infrastructure base network. In MANET Wireless medium is radio frequencies and nodes are mobile, topology can be very dynamically. Nodes must be able to relay traffic since communicating nodes might be out of range. A MANET can be a standalone network or it can be connected to external networks like internet. Multihop operation of MANET requires a routing mechanism designed for mobile nodes are internet access mechanisms, self configuring networks requires an address allocation mechanism, mechanism to detect and act on, merging of existing networks and security mechanisms. As we know that there is no any centralized system so routing is done by node itself. Due to its mobility and self routing capability nature, there are many weaknesses in its security
    corecore