136 research outputs found

    Seed Coat Structure in Some Species of Atylosia (Phaseoleae - Cajaninae)

    Get PDF
    Scanning electron microscopy and light microscopy were used to examine seed characters of ten species of the legume genus Atylosia. Seeds of all the species are arillate with a central hilar groove, a character useful for specific delineation of the genus. The testa of A. albicans, A.cajanifolia, A. Lanceolata, A.scarabaeoides and A.volubilis is multi-reticulate. It is rugulate in the rest of the species. Differences in the size and arrangement of rugae can be utilized to separate them from one another. The shape of the hilum and micropyle is distinctive for some species. It was observed that the length of palisade cells and hourglass cells are not correlated with seed size. The tracheid bar is present and is of the common fabaceous type; tracheoids show variations in pitting and vesturing. Based on the character of the aril, spermoderm, tracheoids and pits, a key has been designed to identify species of Atylosia. It is hoped that this study will be helpful taxonomically

    Formulation, evaluation and optimization of fast dissolving tablets containing Amlodipine Besylate by sublimation method

    Get PDF
    The objective of this research was to formulate fast dissolving tablet of amlodipine besylate for rapid action. Sublimation method was adapted to prepare the tablets by using a 23 full factorial design. FT-IR and D.T.A studies revealed that there was no physico-chemical interaction between amlodipine besylate and other excipients. All formulations are evaluated for pre-compression and post-compression parameters, wetting time, water absorption ratio. The results obtained showed that the quantity of starch potato, sodium starch glycolate, camphor significantly affect response variables. The results indicate that the optimized tablet formulation provides a short DT of 8 sec with sufficient crushing strength and acceptable friability. Stability studies of optimized formulation revealed that formulation is stable

    Review on Botnet Threat Detection in P2P

    Get PDF
    Botnets are nothing but the malicious codes such as viruses which are used for attacking the computers. These are act as threats and are very harmful. Due to distributed nature of botnets, it is hard to detect them in peer-to-peer networks. So we require the smarter technique to detect such threats. The automatic detection of botnet traffic is of high importance for service providers and large campus network monitoring. This paper gives the review on the various techniques used to detect such botnets. DOI: 10.17762/ijritcc2321-8169.15026

    Mobile Phone Forensics Challenges and Tools Classification A Review

    Get PDF
    now every day billions of individuals use mobile phones in their daily activities, and generally, those activities would be criminal in nature. The exceptional advancements within the technology and increase in computing power of those devices over the previous few years, has junction rectifier to a rise of their practicality whereas keeping the dimensions of su ch devices sufficiently small to suit in a very pocket. The employment of mobile phones in criminal activities has junction rectifier to the necessity of sick the info in them. The acquisition of knowledge derived from cellular devices is often used as rhetorical proof that has become a main element of crime scene investigations. There square measure many common obstacles that lie before any mobile rhetorical skilled

    KNN-Based ML Model for the Symbol Prediction in TCM Trellis Coded Modulation TCM Decoder

    Get PDF
    Machine Learning is a booming technology today. In a machine learning set of training, data is to be provided to the model for training and that model predicts the output. Machine Learning models are trained using a computer program known as ML algorithms.The new machine learning-based Transition Metric Unit (TMU) of 4D- 8PSK Trellis coded Modulation TCM Decoder is presented in this work. The classic Viterbi decoder's branch metric unit, or TMU, takes on a complex structure. Trellis coded Modulation (TCM) is a combination of 8 PSK modulations and Error Correcting Code (ECC). TMU is one of the complex units of the TCM decoder, which is essentially a Viterbi decoder. Similar to how the first Branch metric is determined in the straightforward Viterbi decoder, the TCM decoder performs this BM computation via the TMU unit. The TMU becomes challenging and uses more dynamic power as a result of the enormous constraint length and the vast number of encoder states.In the proposed algorithm innovative KNN (K nearest neighbours) based ML model is developed. It is a supervised learning model in which input and output both are provided to the model, training data also called the labels, when a new set of data will come the model will give output based on its previous set experience and data.Here we are using this ML model for the symbol prediction at the receiver end of the TCM decoder based on the previous learning. Using the proposed innovation, the paper perceives the optimization of the TCM Decoder which will further reduce the H/W requirements and low latency which results in less power consumption

    A Survey on Different Techniques Used in Decentralized Cloud Computing

    Get PDF
    Abstract: This paper proposes various methods for anonymous authentication for data stored in cloud. Cloud verifies the authenticity of the series without knowing the user's identity before storing data. This paper also has the added feature of access control in which only valid users are able to decrypt the stored information. These schemes also prevents replay attacks and supports creation, modification, and reading data stored in the cloud. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches .The aim of this paper is to cover many security issues arises in cloud computing and different schemes to prevent security risks in cloud. Storage-as-a-service (Saas) offered by cloud service providers (CSPs) is a paid facility that enables organizations to outsource their sensitive data to be stored on remote servers. In this paper, we propose a cloudbased storage schemes that allows the data owner to benefit from the facilities offered by the CSP and enables indirect mutual trust between them. This Paper provides different authentication techniques and algorithms for cloud security

    RNA Bind-n-Seq: Quantitative Assessment of the Sequence and Structural Binding Specificity of RNA Binding Proteins

    Get PDF
    Specific protein-RNA interactions guide posttranscriptional gene regulation. Here, we describe RNA Bind-n-Seq (RBNS), a method that comprehensively characterizes sequence and structural specificity of RNA binding proteins (RBPs), and its application to the developmental alternative splicing factors RBFOX2, CELF1/CUGBP1, and MBNL1. For each factor, we recovered both canonical motifs and additional near-optimal binding motifs. RNA secondary structure inhibits binding of RBFOX2 and CELF1, while MBNL1 favors unpaired Us but tolerates C/G pairing in motifs containing UGC and/or GCU. Dissociation constants calculated from RBNS data using a novel algorithm correlated highly with values measured by surface plasmon resonance. Motifs identified by RBNS were conserved, were bound and active in vivo, and distinguished the subset of motifs enriched by CLIP-Seq that had regulatory activity. Together, our data demonstrate that RBNS complements crosslinking-based methods and show that in vivo binding and activity of these splicing factors is driven largely by intrinsic RNA affinity.National Science Foundation (U.S.) (0821391
    corecore