1,263 research outputs found

    Efficacy of Withania somnifera on lipid profile of endosulfan induced toxicity in Swiss albino mice

    Get PDF
    India is an agrarian country with crops cultivated at a huge scale. Pesticides in recent times have caused serious health hazards in the population which are widely used by the farmers for the better yield of crops. Endosulfan is an organochlorine pesticide, which is widely used by the farmers. But, in the present times, it has caused serious health hazards in the exposed population causing various diseases, including cancer. Hence, the present study on animal aims to observe the protective effect of Withania somnifera against endosulfan induced toxicity in Swiss albino mice. Endosulfan at the dose of 3mg/Kg body weight per day was administered orally to Swiss albino mice for 4 weeks. Then after, W. somnifera at the dose of 1000 mg/Kg b.w. was orally administered for 4 weeks. Mice were sacrificed after the completion of the entire treatment. After dissection, the blood samples were collected for biochemical assay, especially for lipid profile analysis. The lipid profile study showed inclination in the Total cholesterol level (117±6.686 mg/dl), Cholesterol (LDL) (78.83±4.151mg/dl), level and Triglycerides level (60.83±2.613mg/dl), while declination in Cholesterol (HDL) (13.50±1.33mg/dl), level after Endosulfan exposure. But, upon W. somnifera treatment to the endosulfan treated group showed significant (p<0.001) normalisation in the lipid profile levels. Therefore, it was concluded that W. somnifera played a vital role to control the endosulfan induced toxicity

    ANALYSIS OF UROPATHOGENS AND ANTIBIOTIC SENSITIVITY PATTERNS IN DIABETES MELLITUS PATIENTS AT A TERTIARY CARE HOSPITAL: AN OBSERVATIONAL STUDY.

    Get PDF
    Background: Diabetes Mellitus (DM), affects various systems within the body. Patients with untreated treated diabetes are at risk of developing a range of complications that contribute to increased morbidity and mortality rates. Diabetes Mellitus exerts various persistent impacts on the Urogenital system. UTIs have been widely acknowledged as a substantial concern among individuals diagnosed with DM. Methods: A potential observational research was conducted consisting of individuals with diabetes mellitus exhibiting positive indications of urinary tract infection. Exclusion criteria encompassed gestational diabetes, patients with compromised immune systems, and individuals presenting with congenital kidney malformations. Results: The study encompassed a total of 110 incidents of UTIs. Among them were a total of 35 males, and 75 females. The age group predominantly comprised between the ages of 55 and 70 years. Escherichia coli was identified as the prevailing microorganism isolated in the sample. Gram-positive organisms proved a sensitivity rate of 100% to Linezolid and Vancomycin. Gram-negative microbes demonstrated a sensitivity rate of 100% to Polymyxin B. Conclusion: Urogenital tract infection is a commonly observed difficulty in individuals with diabetes mellitus. The identification of the most prevalent causative organisms and their corresponding antibiotic sensitivity patterns is imperative within a tertiary care hospital setting in order to establish an enhanced antibiotic policy. Recommendation: It is strongly recommended that further studies be conducted with a larger sample size in order to provide additional support for the findings obtained in this study

    Behavioral Model For Live Detection of Apps Based Attack

    Full text link
    Smartphones with the platforms of applications are gaining extensive attention and popularity. The enormous use of different applications has paved the way to numerous security threats. The threats are in the form of attacks such as permission control attacks, phishing attacks, spyware attacks, botnets, malware attacks, privacy leakage attacks. Moreover, other vulnerabilities include invalid authorization of apps, compromise on the confidentiality of data, invalid access control. In this paper, an application-based attack modeling and attack detection is proposed. Due to A novel attack vulnerability is identified based on the app execution on the smartphone. The attack modeling involves an end-user vulnerable application to initiate an attack. The vulnerable application is installed at the background end on the smartphone with hidden visibility from the end-user. Thereby, accessing the confidential information. The detection model involves the proposed technique of an Application-based Behavioral Model Analysis (ABMA) scheme to address the attack model. The model incorporates application-based comparative parameter analysis to perform the process of intrusion detection. The ABMA is estimated by using the parameters of power, battery level, and the data usage. Based on the source internet accessibility, the analysis is performed using three different configurations as, WiFi, mobile data, and the combination of the two. The simulation results verify and demonstrates the effectiveness of the proposed model

    LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G

    Full text link
    The advancement in wireless communication technologies is becoming more demanding and pervasive. One of the fundamental parameters that limit the efficiency of the network are the security challenges. The communication network is vulnerable to security attacks such as spoofing attacks and signal strength attacks. Intrusion detection signifies a central approach to ensuring the security of the communication network. In this paper, an Intrusion Detection System based on the framework of graph theory is proposed. A Layerwise Graph Theory-Based Intrusion Detection System (LGTBIDS) algorithm is designed to detect the attacked node. The algorithm performs the layer-wise analysis to extract the vulnerable nodes and ultimately the attacked node(s). For each layer, every node is scanned for the possibility of susceptible node(s). The strategy of the IDS is based on the analysis of energy efficiency and secrecy rate. The nodes with the energy efficiency and secrecy rate beyond the range of upper and lower thresholds are detected as the nodes under attack. Further, detected node(s) are transmitted with a random sequence of bits followed by the process of re-authentication. The obtained results validate the better performance, low time computations, and low complexity. Finally, the proposed approach is compared with the conventional solution of intrusion detection.Comment: in IEEE Transactions on Network and Service Management, 202

    Demonstrating the asymmetry of the Indian Ocean Dipole response in regional earth system model of CORDEX-SA

    Get PDF
    An accurate representation of the Indian Ocean Dipole (IOD) is crucial for the reliable projection of Indian summer monsoon rainfall, making it necessary to improve the understanding of the response of the IOD in the warming climate. For the first time, a high-resolution regional earth system model (RESM) over the CORDEX-SA domain is used to investigate the IOD characteristics. The model performance is evaluated in simulating the IOD and associated mechanism. RESM shows a good resemblance in simulating IOD phases (positive and negative). However, the systematic discrepancy is observed in magnitude. Additionally, RESM well represented the positive IOD's inter-event variability. For example, the stronger event dominated by significant cold anomalies over Sumatra with enhanced westward-extended while a moderate event shows weak cooling confined to the region of Sumatra. Additionally, RESM shows potential to distinguish the ENSO and non-ENSO years with more remarkable skill in representing the spatial pattern of SST over IOD region during non-ESNO years than ENSO years. The RESM realistically simulated the IOD amplitude with greater skill than CMIP5/6 models reported in the earlier studies, indicating reliability towards the projection of the Indian summer monsoon. The weaker IOD-ENSO relationship is caused by producing the more significant number of IOD during non-ENSO years. Despite this reliable fidelity, IOD's slightly earlier peak is driven by the early establishment of low-level equatorial easterly wind. This study provided valuable insight into the IOD's different phases, responsible forcings, and limitations of the RESM in accounting for the role of internal climate variability that can be useful for further improvement in the model physics

    An Improved Parcel-Based Approach to Bruneian Geocoded Address Database

    Get PDF
    A new framework of Brunei’s national geocoded address database is proposed in this paper. The proposed framework is based on the concept of land parcel-based geocoding and deterministic record linkage, which involves three datasets: the national address database, cadastral polygons and building centroids. The technique used in the development of the framework is an improved version of land parcel-based geocoding with no matching address components since addresses are sourced from the authorised national address database. Addresses are mapped onto the centroids of building polygons resulting in formation of geocoded address points. Cadastral polygons of land parcels act as a mediator to link the address database and the building centroids using its unique key known as ‘lotnum_bc’. The proposed approach has an advantage in terms of fitting into the currently available resources. Furthermore, the proposed approach produces geocoded addresses for buildings when compared with valid addresses from the authorised address database up to the accuracy of parcel-based geocoding level. The deterministic record linkage requires validation of ‘lotnum_bc’ within the address database to ensure such an accuracy. It is expected that the proposed geocoded address database will become an integral part of the spatial data infrastructure of Brunei

    LRRK2 and RIPK2 variants in the NOD 2-mediated signaling pathway are associated with susceptibility to Mycobacterium leprae in Indian populations

    Get PDF
    In recent years, genome wide association studies have discovered a large number of gene loci that play a functional role in innate and adaptive immune pathways associated with leprosy susceptibility. The immunological control of intracellular bacteria M. leprae is modulated by NOD2-mediated signaling of Th1 responses. In this study, we investigated 211 clinically classified leprosy patients and 230 ethnically matched controls in Indian population by genotyping four variants in NOD2 (rs9302752A/G), LRRK2 (rs1873613A/G), RIPK2 (rs40457A/G and rs42490G/A). The LRRK2 locus is associated with leprosy outcome. The LRRK2 rs1873613A minor allele and respective rs1873613AA genotypes were significantly associated with an increased risk whereas the LRRK2 rs1873613G major allele and rs1873613GG genotypes confer protection in paucibacillary and leprosy patients. The reconstructed GA haplotypes from RIPK2 rs40457A/G and rs42490G/A variants was observed to contribute towards increased risk whereas haplotypes AA was observed to confer protective role. Our results indicate that a possible shared mechanisms underlying the development of these two clinical forms of the disease as hypothesized. Our findings confirm and validates the role of gene variants involved in NOD2-mediated signalling pathways that play a role in immunological control of intracellular bacteria M. leprae
    • 

    corecore