1,203 research outputs found

    "Pharmacology of salicin derivatives in sheep" : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Animal Science, Institute of Veterinary, Animal and Biomedical Sciences, Massey University, Palmerston North, New Zealand

    Get PDF
    Content removed from thesis due to copyright reasons: Figure 1.20(e). S. viminalis. Retrieved from Valerie J.:http://gardeners-word.blogspot.co.uk/Sheep suffer from pain during various husbandry practices as well as during injury or diseases such as footrot. This pain could be potentially minimised with the use of analgesics such as non-steroidal anti-inflammatory drugs (NSAID). Unfortunately, there are very few registered NSAIDs for sheep. Thus, registered analgesics for cattle, for instance ketoprofen and meloxicam are used in sheep. Again, the high cost of analgesics and associated potential side effects such as reduced fertility, gastric irritation, gastric ulcers etc. evident in other species usually limits their use in sheep. Fear of residues in meat may stop some farmers from using analgesics. Considering these problems, this study was designed as a groundwork to explore a possible and potential use of natural, inexpensive analgesic for sheep. Salicylic acid, a derivative of salicin, is a NSAID used effectively in humans as an analgesic since ancient times in the form of willow bark and leaves. During this research study, the pharmacokinetics of salicylic acid in sheep was analysed after administration of the sodium salt of salicylic acid (sodium salicylate/NaS) intravenously and orally at different dose rates. The analgesic efficacy of salicylic acid in sheep was also studied after administration of sodium salicylate at different dose rates by measuring mechanical and thermal nociceptive thresholds. The minimum therapeutic plasma concentration of salicylic acid for analgesia in sheep ranged from 25 to 30 μg/mL, which was achieved for about 30 minutes by a 200 mg/kg intravenous dose of NaS. During this study it was discovered that thermal nociceptive threshold testing is unable to detect any analgesia from salicylic acid and ketoprofen in sheep. However, mechanical nociceptive threshold testing efficiently detected the analgesic effects of salicylic acid and the positive control, ketoprofen. The seasonal variation of willow salicin content (principal precursor of salicylic acid in willow) was studied over a year. The salicin in willows in New Zealand is higher during the summer months as compared to the winter months of the year, and appears greater in areas subject to drought. The analgesic efficacy of willow leaves can be assessed by feeding the willow leaves to lame sheep as they readily eat willow leaves. However, to assess the analgesia produced by willow in sheep, further research is warranted. Keywords: Salicin, sheep, salicylic acid, analgesia, HPLC, nociceptive testing, willow

    Analytical current Model for Dual Material Double Gate Junctionless Transistor

    Get PDF
    A Transistor model with bulk current is proposed in this article for long channel dual material double gate junction less transistor. The influence of different device parameters such as body thickness, channel length, oxide thickness, and the doping density on bulk current is investigated. The proposed model is validated and compared with simulated data using Cogenda TCAD. The model is designed by Poison’s equation and depletion approximation. Current driving capability of MOSFET is improved by dual material gate compare to single material gate

    Conversational Analysis using Utterance-level Attention-based Bidirectional Recurrent Neural Networks

    Full text link
    Recent approaches for dialogue act recognition have shown that context from preceding utterances is important to classify the subsequent one. It was shown that the performance improves rapidly when the context is taken into account. We propose an utterance-level attention-based bidirectional recurrent neural network (Utt-Att-BiRNN) model to analyze the importance of preceding utterances to classify the current one. In our setup, the BiRNN is given the input set of current and preceding utterances. Our model outperforms previous models that use only preceding utterances as context on the used corpus. Another contribution of the article is to discover the amount of information in each utterance to classify the subsequent one and to show that context-based learning not only improves the performance but also achieves higher confidence in the classification. We use character- and word-level features to represent the utterances. The results are presented for character and word feature representations and as an ensemble model of both representations. We found that when classifying short utterances, the closest preceding utterances contributes to a higher degree.Comment: Proceedings of INTERSPEECH 201

    Achieving MANETs Security by Exchanging Path Oriented Keys and Priority Based Secured Route Discovery

    Get PDF
    In this work, two scenarios are considered, scenario-1 is key based communication and scenario-2 is priority based routing and communication. In scenario-1, MANET works on generated keys called KEY1 and KEY2 to establish communication between nodes. Here source node will have to generate and store a key called KEY2 and destination node will have to generate and store a key called KEY1. When source node initiates communication with destination-node, source node will send a request-packet to destination via shortest/less- cost path (PATH1) without any key mentioning in the packet. Now destination node will send the requested packet and KEY1 to source node via different path other than PATH1 (path of received packet). Source will send KEY2 to destination again through the same path (PATH2). In scenario-2, communication of each node is based on the neighbour node's priority, here, priority-1 being the highest, hence it is highly recommended for communication and priority three is being the lowest and it is rarely recommended for the communication. Nodes in the network classified into 3 types, unknown node, neighbor's known node, non-neighbors known node. Priority of nodes can be evaluated based on the security measures, energy level and other parameters of the node. It can also consider Trust Value (TV) of each node based on the duration spent in active efficient communication. With help of this strategy, we can achieve highly secured route discovery, which will help network to have smooth communication among its node

    IDENTIFYING VERIFIED BUSINESS CALLS USING TEMPORARY CONTACTS

    Get PDF
    A computing system (e.g., a cloud server) may cause a computing device to create a temporary contact profile that includes verified business contact information such that, when the verified business calls the computing device, the computing device can display the verified business contact information even if contact information for the business was not previously stored at the computing device. Responsive to receiving an incoming communication (e.g., a phone call, a text message, an instant message, etc.), the computing device may determine whether an address book or other contact repository of the computing device includes an entry for the originator (e.g., a business, a friend, a relative, etc.) of the incoming communication. Rather than requiring the user to have previously provided information for the originator of the incoming communication, techniques described herein may automatically create a temporary contact in the address book if the incoming communication originator is a verified business. Thus, even if the user has not previously created a contact profile for the verified business, the computing device may execute one or more applications to present a graphical user interface (GUI) that identifies the verified business using the information included in the contact profile, indicating to a user of the computing device the genuineness of the phone call

    Experiments in aerobic and anaerobic biodegradation of methylene chloride using activated sludge

    Get PDF
    Biological removal of methylene chloride was studied under aerobic and anaerobic conditions using activated sludge cultures. Shaker flask experiments were conducted to test the ability of the microorganisms to degrade methylene chloride under aerobic conditions. Hydrogen peroxide was used a as source of dissolved oxygen to minimize physical removal of methylene chloride due to aeration. The effect of secondary substrates like glucose, cellulose acetate, ammonium acetate and nutrient broth on biodegradation of methylene chloride was studied. Biodegradation in the presence of surfactant and alkaline stress was also investigated. No significant degradation was observed in all aerobic experiments. Anaerobic sludge was obtained from a secondary wastewater treatment plant, and after digestion at 35 °C it was used for anaerobic experiments. Preliminary experiments were conducted in serum bottles to test the ability of the mixed cultures to biodegrade methylene chloride under anaerobic conditions. The effect on biodegradation due to the presence of glucose and sodium acetate was also studied. Very low methylene chloride removal rates were obtained in the serum bottles ( 0.0021 mg methylene chloride /day.mg biomass). An effort was made to increase the degradation rates by immobilization. Two immobilized cell bioreactors namely, the Membrane Bioreactor and the Celite Carrier Packed Bed Reactor were developed and studied. Glucose was used to test the viability of the immobilized microorganisms in these reactors. The entrapped microorganisms in the membrane reactor did not display activity; however, the attached microorganisms on the Celite carrier remained viable. Two hundred and fifty ppm methylene chloride was treated completely in the Packed Bed reactor in 8 days. A tenfold increase in the removal rate was observed (0.021 mg methylene chloride/day.mg biomass) in the Celite Carrier Packed Bed Reactor compared to that obtained in the serum bottles (0.0021 mg methylene chloride /day.mg biomass)
    • …
    corecore