2,420 research outputs found

    Extraction of silymarin compounds from milk thistle (Silybum marianum) seed using hot, liquid water as the solvent

    Get PDF
    High-value specialty chemicals are usually obtained from natural products by extracting with generally regarded as safe (GRAS) solvents. Because organic solvents are quite often used, high operating and disposal costs occur. When compared to traditional solvents, water is an interesting alternative because of its low operating and disposal costs. Milk thistle contains compounds (taxifolin, silychristin, silydianin, silybinin A, and silybinin B) that display hepatoxic protection properties. This paper examines the batch extraction of silymarin compounds from milk thistle seed meal in 50°C, 70°C, 85°C and 100°C water as a function of time. For taxifolin, silychristin, silybinin A, and silybinin B, extraction with 100°C water resulted in the highest yields. After 210 min of extraction at 100°C, the yield of taxifolin was 1.2 mg/g of seed while the yields of silychristin, silybinin A, and silybinin B were 5.0, 1.8 and 3.3 mg/g of seed, respectively. The ratios of the extracted compounds, and particularly the ratios at long extraction times, showed that the more polar compounds (taxifolin and silychristin) were preferentially extracted at 85°C, while the less polar silybinin was preferentially extracted at 100°C

    The Effectiveness of Community-Based Nutrition Education on the Nutrition Status of Under-five Children in Developing Countries. A Systematic Review

    Get PDF
    This systematic review aimed at examining the best available evidence onthe effectiveness of community-based nutrition education in improvingthe nutrition status of under five children in developing countries.Methods : A systematic search of the literature was conducted utilising the following data bases: Cumulative Index to Nursing and Allied Health Literature (CINAHL), EMBASE, Medline, and Web of Knowledge. 9 studies were identified for the critical appraisal process. The Joanna Briggs Institute(JBI) critical appraisal check-list for experimental studies was utilisedand two reviewers conducted the appraisal process independently. 7 studies were included for this review and data was extracted using the JBI data extraction form for experimental studies. The extracted data was heterogeneous as such narrative synthesis was conducted.Results: The nutritional status of children in all studies improved and this was evidenced by increases in weight, height, mid upper arm circumference and reduced morbidity. Key messages about education were age at introduction of complementary foods, nutrition value on different typesof feeds found locally and frequency of feeding the children. However,there were varied results regarding the effects of the intervention onthe nutrition status of children. This was attributed by differences in implementers’ characteristics, different intervention strategy and intensity,difference in age of the children at enrolment, pre-existing children’sgrowth and nutritional status and follow-up periods. In addition to homevisiting, conducting group meetings of care givers and community leaders,providing education twice a week and use of cooking demonstrations haveshown that they produce highly significant findings.Conclusion: The evidence from the identified studies suggests that  community- based nutrition education improves the nutrition status of under-five children in developing countries

    Reformulation of the Stochastic Potential Switching Algorithm and a Generalized Fourtuin-Kasteleyn Representation

    Full text link
    A new formulation of the stochastic potential switching algorithm is presented. This reformulation naturally leads us to a generalized Fourtuin-Kasteleyn representation of the partition function Z. A formula for internal energy E and that of heat capacity C are derived from derivatives of the partition function. We also derive a formula for the exchange probability in the replica exchange Monte Carlo method. By combining the formulae with the Stochastic Cutoff method, we can greatly reduce the computational time to perform internal energy and heat capacity measurements and the replica exchange Monte Carlo method in long-range interacting systems. Numerical simulations in three dimensional magnetic dipolar systems show the validity and efficiency of the method.Comment: 11 pages, 6 figures, to appear in PR

    Fractional boundary value problems: Analysis and numerical methods

    Get PDF
    This is the author's PDF of an article published in Fractional calculus and applied analysis 2011. The original publication is available at www.springerlink.comThis journal article discusses nonlinear boundary value problems.Fundacao para a Ciencia e Tecnologi

    Quasiharmonic elastic constants corrected for deviatoric thermal stresses

    Full text link
    The quasiharmonic approximation (QHA), in its simplest form also called the statically constrained (SC) QHA, has been shown to be a straightforward method to compute thermoelastic properties of crystals. Recently we showed that for non-cubic solids SC-QHA calculations develop deviatoric thermal stresses at high temperatures. Relaxation of these stresses leads to a series of corrections to the free energy that may be taken to any desired order, up to self-consistency. Here we show how to correct the elastic constants obtained using the SC-QHA. We exemplify the procedure by correcting to first order the elastic constants of MgSiO3_3-perovskite and MgSiO3_3-post-perovskite, the major phases of the Earth's lower mantle. We show that this first order correction is quite satisfactory for obtaining the aggregated elastic averages of these minerals and their velocities in the lower mantle. This type of correction is also shown to be applicable to experimental measurements of elastic constants in situations where deviatoric stresses can develop, such as in diamond anvil cells.Comment: 4 figures, 1 table, submitted to Phys. Rev. B, July 200

    A Matrix Hyperbolic Cosine Algorithm and Applications

    Full text link
    In this paper, we generalize Spencer's hyperbolic cosine algorithm to the matrix-valued setting. We apply the proposed algorithm to several problems by analyzing its computational efficiency under two special cases of matrices; one in which the matrices have a group structure and an other in which they have rank-one. As an application of the former case, we present a deterministic algorithm that, given the multiplication table of a finite group of size nn, it constructs an expanding Cayley graph of logarithmic degree in near-optimal O(n^2 log^3 n) time. For the latter case, we present a fast deterministic algorithm for spectral sparsification of positive semi-definite matrices, which implies an improved deterministic algorithm for spectral graph sparsification of dense graphs. In addition, we give an elementary connection between spectral sparsification of positive semi-definite matrices and element-wise matrix sparsification. As a consequence, we obtain improved element-wise sparsification algorithms for diagonally dominant-like matrices.Comment: 16 pages, simplified proof and corrected acknowledging of prior work in (current) Section

    Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE

    Full text link
    As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are concerned. Security experts, however, must still be able to acquire and analyze data in a methodical, rigorous and forensically sound manner. This work applies the STRIDE asset-based risk assessment method to cloud computing infrastructure for the purpose of identifying and assessing an organization's ability to respond to and investigate breaches in cloud computing environments. An extension to the STRIDE risk assessment model is proposed to help organizations quickly respond to incidents while ensuring acquisition and integrity of the largest amount of digital evidence possible. Further, the proposed model allows organizations to assess the needs and capacity of their incident responders before an incident occurs.Comment: 13 pages, 3 figures, 3 tables, 5th International Conference on Digital Forensics and Cyber Crime; Digital Forensics and Cyber Crime, pp. 223-236, 201

    The analytic structure of 2D Euler flow at short times

    Full text link
    Using a very high precision spectral calculation applied to the incompressible and inviscid flow with initial condition ψ0(x1,x2)=cosx1+cos2x2\psi_0(x_1, x_2) = \cos x_1+\cos 2x_2, we find that the width δ(t)\delta(t) of its analyticity strip follows a ln(1/t)\ln(1/t) law at short times over eight decades. The asymptotic equation governing the structure of spatial complex-space singularities at short times (Frisch, Matsumoto and Bec 2003, J.Stat.Phys. 113, 761--781) is solved by a high-precision expansion method. Strong numerical evidence is obtained that singularities have infinite vorticity and lie on a complex manifold which is constructed explicitly as an envelope of analyticity disks.Comment: 19 pages, 14 figures, published versio
    corecore