40 research outputs found

    Using Single-Molecule DNA Flow-Stretching Experiments to See the Effects of Temperature and Viscosity

    Get PDF
    Deoxyribonucleic acid (DNA) is a highly charged long and semi-flexible polymer of which length is much longer than cell dimensions at least by 1,000-folds. A long linear DNA turns into a crumpled structure to fit into a tiny cell volume by the process known as DNA compaction. In nature, DNA fits into the volume of the cell using DNA compaction by packaging genome material. Various types of protein are involved in DNA compaction. To experiment with various proteins as DNA compaction agents, DNA needs to be stretched out. In our thesis, the effect of temperature and buffer viscosity on DNA stretching and fluctuation was observed using steady-state laminar flow. From experimental data, a slight increase in length, with the increase of temperature and viscosity was found out. The total change of the stretched length of DNAs was almost 0.7 μm–0.8 μm for 0 %PEG in EBB buffer to 5% PEG in EBB buffer solution in our experiment. The total increase of length from 4 °C to 30 °C was almost 0.5 μm which is almost linear. It was observed that temperature changes did not lead to a noticeable change in the fluctuation of DNA, but when buffer viscosity was increased, the fluctuation of DNA decreased. The average fluctuation of DNAs for 3% PEG and 5% PEG are 15% and 28% lower than the fluctuations of DNAs for EBB buffer. Thus, it can be concluded that DNA length and fluctuation are a function of viscosity

    Sentiment analysis and opinion mining on E-commerce site

    Full text link
    Sentiment analysis or opinion mining help to illustrate the phrase NLP (Natural Language Processing). Sentiment analysis has been the most significant topic in recent years. The goal of this study is to solve the sentiment polarity classification challenges in sentiment analysis. A broad technique for categorizing sentiment opposition is presented, along with comprehensive process explanations. With the results of the analysis, both sentence-level classification and review-level categorization are conducted. Finally, we discuss our plans for future sentiment analysis research.Comment: 5 pages, 6 figures, 4 table

    Development of Adsorbent from Sugarcane Bagasse for the Removal of Pollutants from Chrome Tanning Effluents

    Get PDF
    The leather sector is the second-largest export earning sector in Bangladesh which contributes to huge employment generation and economic development. However, the current situation of this sector is not good enough for its lack of cleaner technologies and waste management systems. Tanneries are using an ample amount of harmful chemicals that may impose a huge negative impact on human health and the environment. Therefore, it is an emerging requirement for the removal of pollutants from effluents before discharging them to the environment. For this, the development of an adsorbent from agricultural waste is significant for removing pollutants from the tanning effluent and greening the environment. In this study, a low-cost adsorbent is developed and used to remove pollutants from the chrome tanning effluent. The developed adsorbent is prepared from sugarcane bagasse and activated by using NaOH. The study was performed at pH 4, with an adsorption time of 1 hour, and the adsorbent doses of 2.5 g/L. The findings revealed that a considerable amount of pollution was mitigated with the reduction in BOD (42.17%), COD (75.00%), Cr2O3 (41.91%), TSS (81.85%), and TDS (84.24%)

    Comparison among Different Routing Protocols of Vehicular Ad Hoc Networks

    Get PDF
    To improve highway transport security VANET Vehicular Ad Hoc Network is used which is a developing technology incorporating ad hoc network cellular technology and wireless LAN VANETs are different from other type ad hoc networks by their cross network constructions node association features and new application setups The approach of an effective routing protocol for VANETs is vital as VANETs show various distinctive networking research challenges In this paper we discuss the research challenges of routing in VANETs and compare recent routing protocols of VANET

    Capacity strengthening of fish farmers for improving their livelihood in Mymensingh district of Bangladesh

    Get PDF
    This study examines the capacity strengthening status for improving the livelihood of fish farmers of Muktagacha upazila (sub-district) of Bangladesh. A mix method research design was used to collect data from 70 fish farmers of the study area. Nine selected demographic characteristics of the respondents were age, level of education, household size, farm size, fish farming experience, training received on fish farming, access to credit, extension media contact and organizational participation. Findings reveal that half of the respondents (50%) had moderate level of capacity strengthening score while considerable portion of the respondents (36%) had high level of capacity strengthening score. The livelihood status of fish farmers improved to a great extent in five aspects of livelihood (human, social, natural, physical and financial) due to the creation of income generating opportunities after their involvement in fish farming. This study concludes that fish farming has major contributions for the capacity strengthening of fish farmers for improving their livelihood status. 

    Evaluating Suitability of Glutaraldehyde Tanning in Conformity with Physical Properties of Conventional Chrome-Tanned Leather

    Get PDF
    Leather manufacturing involves a number of unit processes, out of which tanning is the most important in so far as it converts the putrescible hides/skins into non-putrescible leather. In this study, glutaraldehyde has been exploited as a means to reduce the use of basic chromium sulfate for the production of quality shoe upper crust leather. The paper consists in studying the physical properties of aldehyde-tanned leather and chrometanned leather. The aim is to find out the possibility of replacing the wet-blue leather, containing Cr(III) salts, with the glutaraldehyde-tanned wet-white leather. The physical properties of the aldehyde-tanned leather were evaluated, analyzed and compared with the conventional chrome-tanned shoe upper crust leather. Statistical analysis illustrated that the tensile strength, the percentage of elongation, stitch tear strength, Baumann tear strength and grain crack strength of the leather was 211±1 kg/cm2, 38±0.5 %, 89±0.11 kg/cm, 63±0.4 kg/cm and 23±0.4 kg respectively. It was observed that the property of the experimental leather was quite comparable with the conventional chrome-tanned leather and able to meet the requirements of the shoe upper crust leather after re-tanning. The shrinkage temperature of the experimental tanned leather was found to be 87 °C, lower than that of corresponding control, which indicates lesser tanning power of aldehyde. However, the morphology of the aldehyde-tanned leather was quite akin with the conventional leather. This study suggests that using glutaraldehyde in the tanning process in order to minimize the chromium load in the tanning and the re-tanning process during the production of shoe upper crust leather reduces the generation of toxic waste and its impact on the environment

    A comparative analysis of QRS and cardioid graph based ECG biometric recognition in different physiological conditions

    Get PDF
    This paper performs a comparative analysis of QRS and Cardioid Graph Based ECG Biometric Recognition incorporating Physiological variability. Data was acquired from 30 subjects, where each subject performed six types of physical activities namely walking, going upstairs, going downstairs, natural gait, lying with position changed and resting while watching TV. Then from the signals of these physiological conditions specific features exclusive to each subject were extracted employing the Cardioid graph based model. In this model, features were extracted solely from the graph derived of the QRS complexes. Subjects were recognized with Multilayer Perceptron classification algorithm. Results were obtained through two approaches. Classification was performed on the whole dataset, Cardioid graph based method resulted in 96.4% of correctly classified instances, whereas QRS complex based ECG produced 94.7% accuracy rates. Later, sensitivity and specificity analysis was done to determine the robustness of the model which produced higher outcomes for Cardioid graph based technique of 96.4% and 99.9% respectively. These results suggest that subject identification in different physiological conditions with Cardioid graph based technique produces better classification rates than that of employing only QRS complexes

    An End-to-End Authentication Mechanism for Wireless Body Area Networks

    Full text link
    Wireless Body Area Network (WBAN) ensures high-quality healthcare services by endowing distant and continual monitoring of patients' health conditions. The security and privacy of the sensitive health-related data transmitted through the WBAN should be preserved to maximize its benefits. In this regard, user authentication is one of the primary mechanisms to protect health data that verifies the identities of entities involved in the communication process. Since WBAN carries crucial health data, every entity engaged in the data transfer process must be authenticated. In literature, an end-to-end user authentication mechanism covering each communicating party is absent. Besides, most of the existing user authentication mechanisms are designed assuming that the patient's mobile phone is trusted. In reality, a patient's mobile phone can be stolen or comprised by malware and thus behaves maliciously. Our work addresses these drawbacks and proposes an end-to-end user authentication and session key agreement scheme between sensor nodes and medical experts in a scenario where the patient's mobile phone is semi-trusted. We present a formal security analysis using BAN logic. Besides, we also provide an informal security analysis of the proposed scheme. Both studies indicate that our method is robust against well-known security attacks. In addition, our scheme achieves comparable computation and communication costs concerning the related existing works. The simulation shows that our method preserves satisfactory network performance
    corecore