246 research outputs found

    Host specificity, mycorrhizal compatibility and genetic variability of Pisolithus tinctorius

    Full text link
    The reaction between the various hosts with Pisolithus tinctorius shows the broad host range of this fungal species showing different degrees of host compatibility. There is wide variation in both rate and extent of ECM formation by different isolates of Pisolithus tinctorius of different geographical regions within a species. Thus Pisolithus tinctorius displays much intraspecific heterogeneity of host specificity and interspecific compatibility. There are variable degrees of plant-fungal isolate compatibility, implying specificity, and this is an important factor influencing successful ectomycorrhiza formation and development. The molecular data also suggested that the Pisolithus tinctorius isolates analyzed from different geographical regions belong to distinct groups. Further studies are therefore warranted to elucidate the molecular, biochemical and physiological differences between the Pisolithus tinctorius isolates at the fungus-root interface of different plant species

    Heuristic Optimization Algorithm with Ensemble Learning Model for Intelligent Intrusion Detection and Classification

    Get PDF
    Intrusion Detection (ID) for network security prevents and detects malicious behaviours or unauthorized activities that occurs in the network. An ID System (IDS) refers to a safety tool that monitors events or network traffic for responding to and identifying illegal access attempts or malevolent activities. IDS had a vital role in network security by finding and alerting security teams or administrators about security breaches or potential intrusions. Machine Learning (ML) methods are utilized for ID by training methods for recognizing behaviours and patterns linked with intrusions. Deep Learning (DL) methods are implemented to learn complicated representations and patterns in network data. DL methods have witnessed promising outcomes in identifying network intrusions by automatically learning discriminatory features from raw network traffic. This article presents a new Teaching and Learning based Optimization with Ensemble Learning Model for Intelligent Intrusion Detection and Classification (TLBOEL-IDC) technique. The presented TLBOEL-IDC method mainly detects and classifies the intrusions in the network. To attain this, the TLBOEL-IDC method primarily preprocesses the input networking data. Besides, the TLBOEL-IDC technique involves the design of an ensemble classifier by the integration of three DL models called Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), and Bidirectional LSTM (BLSTM). Moreover, the hyperparameter tuning of the DL models takes place using the TLBO approach that improves the overall ID outputs. The simulation assessment of the TLBOEL-IDC approach takes place on a benchmark dataset and the outputs are measured under various factors. The comparative evaluation emphasized the best accomplishment of the TLBOEL-IDC technique over other present models by means of diverse metrics

    Efficacy and safety of mifepristone-misoprostol combination with extraamniotic ethacridine lactate-misoprostol for termination of second trimester pregnancy

    Get PDF
    Background: Mid trimester termination of pregnancy is one of the most controversial areas of gynecological practice. It has moral, emotional, social and technical issues. This study was designed for comparison of efficacy and safety of Mifepristone-Misoprostol combination with exrtaamniotic Ethacridine Lactate-misoprostol for termination of second trimester pregnancy.Methods: The present was undertaken among the patients admitted to hospitals attached to J.J.M. Medical College; Bapuji hospital, Women and Children hospital and Chigateri general hospital Davangere during the study period   from November 2016 - October 2017.  Patients coming for second trimester abortion to above mentioned hospitals were assigned serial number from 1 to 80 and all patients with even number will be allocated to group 1 and all patients with odd number will be allocated in group 2, each group comprising 40 women each.Results: Majority of the cases in both the groups were between 21-25 yrs. Majority of the cases in both the groups were multigravidas. 11 cases from group 1 and 12 cases from group 2 were of gestational age between 14-16 wks. 29 cases from group 1 and 28 cases from group 2 were of gestational age between 18-20 wks. In the present study the mean induction abortion interval for group 1 was 19.56±1.82 hours and group 2 was 14.13±2.72 hours. This was statistically significant. Of the 40 cases in each group, 37 had complete abortion i.e. 92.5% 3 cases (7.5%) from both the groups had incomplete abortion. The side effects were relatively more in more in group 1 when compared to group 2.Conclusions: It was concluded that with this combination success rate was high (92.5 %), with Short induction abortion interval, less rate of incomplete abortion without any major complications

    Novel Bacteria Foraging Optimization for Energy-efficient Communication in Wireless Sensor Network

    Get PDF
    Optimization techniques based on Swarm-intelligence has been reported to have significant benefits towards addressing communication issues in Wireless Sensor Network (WSN). We reviewed the most dominant swarm intelligence technique called as Bacteria Foraging Optimization (BFO) to find that there are very less significant model towards addressing the problems in WSN. Therefore, the proposed paper introduced a novel BFO algorithm which maintains a very good balance between the computational and communication demands of a sensor node unlike the conventional BFO algorithms. The significant contribution of the proposed study is to minimize the iterative steps and inclusion of minimization of both receiving / transmittance power in entire data aggregation process. The study outcome when compared with standard energy-efficient algorithm was found to offer superior network lifetime in terms of higher residual energy as well as data transmission performance

    Novel Scheme for Minimal Iterative PSO Algorithm for Extending Network Lifetime of Wireless Sensor Network

    Get PDF
    Clustering is one of the operations in the wireless sensor network that offers both streamlined data routing services as well as energy efficiency. In this viewpoint, Particle Swarm Optimization (PSO) has already proved its effectiveness in enhancing clustering operation, energy efficiency, etc. However, PSO also suffers from a higher degree of iteration and computational complexity when it comes to solving complex problems, e.g., allocating transmittance energy to the cluster head in a dynamic network. Therefore, we present a novel, simple, and yet a cost-effective method that performs enhancement of the conventional PSO approach for minimizing the iterative steps and maximizing the probability of selecting a better clustered. A significant research contribution of the proposed system is its assurance towards minimizing the transmittance energy as well as receiving energy of a cluster head. The study outcome proved proposed a system to be better than conventional system in the form of energy efficiency

    A Survey on Secret Key Extraction Using Received Signal Strength in Wireless Networks

    Get PDF
    Secure wireless communications typically rely on secret keys, which are difficult to establish in an ad hoc network without a key management infrastructure. The channel reciprocity and spatial decorrelation properties can be used to extract secret key, especially in a Rayleigh fading channel. But the intervention of intermediate objects between the communication nodes reduces the strength of the secret key generated through such methods. Furthermore, the impact of small fluctuations also reduces the bit matching rate of such key agreement methods. This paper is based on the survey conducted on secret key generation from Received Signal Strength (RSS). By consider ing uniqueness property of RSS as base, various authors have proposed different methods for secret key extraction. Due to use of RSS for key extraction the existing systems suffer from predictable filter response at random period. The existing system also faces signal fading and drop in RSS because of intermediate object. By this survey we specify that even after generating high entropy bits for key extraction, there are considerable drawbacks in extracted key du e to intervention of intermediate objects and remarkable fading and drop in RSS

    Role of stromal CD10 expression in classifying phyllodes tumors

    Get PDF
    Background: Phyllodes tumor is a rare fibroepithelial tumor of the breast comprising less than 1% of all primary breast tumor. Phyllodes tumors are classified into benign, borderline and malignant based on histological criteria. Grading of phyllodes tumor is important as it determines the biological behaviour of the tumor. The aim of the present study was to identify the incidence, pathological features of benign, borderline and malignant phyllodes tumors and to compare the CD10 expression in benign, borderline and malignant phyllodes, in order to highlight its diagnostic significance.Methods: This is a retrospective study conducted in Department of Pathology, Madras Medical College, Chennai for a period of 3 years. The clinical and pathological findings of phyllodes tumors were retrieved from the surgical pathology records. Totally 50 case were selected randomly (38 benign, 6 borderline and 6 malignant) and their representative formalin fixed paraffin embedded tissue samples were subjected to immunohistochemistry for CD10 expression.Results: In the 38 cases of benign phyllodes tumors, only three cases (7.9%) were CD10 positive. Three out of six cases (50%) of borderline phyllodes tumors showed CD10 positivity, whereas five out of six cases (83.3%) of malignant phyllodes tumor showed CD10 positivity.Conclusions: CD10 expression correlated well with grade of phyllodes tumors, which is of statistical significance and therefore it can be used in the determination of tumor grade and this may pave way for development of targeted therapies

    Comparison of Stromal CD10 Expression in Benign, Borderline and Malignant Phyllodes Tumors

    Get PDF
    BACKGROUND: Phyllodes tumor is a rare fibroepithelial tumor of the breast comprising less than 1% of all primary breast tumor. Phyllodes tumors are graded into benign, borderline and malignant based on histological criteria. Grading of phyllodes tumor is important as it determines the biological behaviour of the tumor. AIM OF THE STUDY: The aim of the present study was to identify the incidence and clinicopathological features of benign, borderline and malignant phyllodes tumors and to compare the CD10 expression in benign, borderline and malignant phyllodes, in order to highlight its diagnostic significance. MATERIALS AND METHOD: The clinical and pathological findings of phyllodes tumors were retrieved from the surgical pathology records from January 2012 to June 2014.Totally 50 case were selected randomly (38 benign, 6 borderline and 6 malignant) and their representative formalin fixed paraffin embedded tissue samples were subjected to immunohistochemistry for CD10 expression. RESULTS: In the 38 cases of benign phyllodes tumors, only three cases (7.9%) were CD10 positive. Three out of six cases (50%) of borderline phyllodes tumors showed CD10 positivity, whereas five out of six cases (83.3%) of malignant phyllodes tumor showed CD10 positivity. CONCLUSION: CD10 expression correlated well with grade of phyllodes tumors, which is of statistical significance and therefore it can be used in the determination of tumor grade and this may pave way for development of targeted therapies

    A study on the effect of intraoperative continuous positive airway pressure (CPAP) on the postoperative pulmonary function in overweight patients undergoing lower limb, lower abdominal or vaginal surgeries under spinal anesthesia

    Get PDF
    Introduction: Spinal anaesthesia, supine position and higher BMI are risk factors for pulmonary atelectasis. NIV, PEEP and CPAP are employed in ICU’s to treat atelectasis postoperatively. However, we wanted to investigate whether CPAP was protective against atelectasis when used intraoperatively, in high risk patients. Material and methods: This study was a randomized controlled trial. Overweight patients, who were to undergo surgeries under spinal anesthesia were included in the study. After informed consent, 126 patients underwent preoperative pulmonary function tests (PFT: FEV1, FVC, PEFR). Following the onset of spinal anaesthesia patients were randomised into group E (n = 63, received CPAP) and control group, group C ( n =63, received nil intervention). Postoperative PFT was done at 20 minutes, 1 hour, 2 hours and 3 hours after surgery. Patients were followed up till discharge for pulmonary complications. Results: We observed significant reduction in pulmonary function (FEV1, FVC and PEFR) postoperatively compared to base-line. CPAP group had better pulmonary function when compared to control group, the difference being significant 20 minu-tes after the surgery(p < 0.05). No postoperative pulmonary complication was reported among the 126 patients studied. Conclusion: Intraoperative use of CPAP in overweight patients undergoing surgeries under spinal anaesthesia could be beneficial in improving pulmonary function in the immediate post-operative period
    • …
    corecore