55 research outputs found

    Büyük Menderes Havzasında Organik Pamuk Üretim Olanaklarının Araştırılması

    Get PDF
    Bu araştırma Büyük Menderes Havzasında Organik Pamuk Üretim Olanaklarının araştırılması amacıyla 2003-2007 yıllarında, Nazilli Pamuk Araştırma Enstitüsünde, tesadüf blokları deneme deseninde, 4 tekrarlamalı yürütülmüştür. Deneme Konuları organik yeşil gübre bitkisi A-arpa, B-arpa+fiğ, C-fiğ(konvansiyonel ekim), D-fiğ(son sulamada ekim) ve E-Kontrol (konvansiyonel pamuk üretim), olarak ele alınmıştır. Araştırmada 2003-2004 yıllarında deneme alanını sömürtmede mısır, 2005-2007 yıllarında organik pamuk üretiminde Nazilli 84-S çeşidi yetiştirilmiştir. Parseller 67,2m² alınmıştır. Deneme parsellerine organik yeşil gübreleme amacıyla Sonbaharda arpa ve fiğ ekilmiş, İlkbaharda pamuk ekim öncesi parçalanıp toprağa karıştırılmıştır. Pamuğa konusuna göre mineral veya organik gübre ve 3-4 sulama uygulanmıştır. Hasat bir defada elle yapılmıştır. Ekim ve hasat dönemlerinde toprağın su ile doymuşluk, toplam tuz%, pH, kireç%, yarayışlı fosfor, yarayışlı potasyum, organik madde %, toplam azot ve Fe,Cu,Zn, Mn,Pb,Cr,Cd,Ni analizleri yapılmıştır. Pamuk parsellerinde fide, koza olgunlaşma, hasat dönemlerinde zararlı ve yabancı ot; %5-10, %50-%60 koza açma döneminde yapraktan; hasattan sonra gövde kesitinde solgunluk hastalık sayımları yapılmıştır. Pamukta verim, çırçır randımanı, uzunluk, incelik, mukavemet analizleri yapılmıştır. Pamuk verim varyans analizinde, konular 2005-2006 yıllarında %99 güvenle farklı, 2007 yılında farksız bulunmuştur. Verimde C-D-E konuları ön sıralarda yer almış, 3 yıllık ortalama verimler sırasıyla 285,4-309,5-293,1 Kg/da olmuştur. Organik pamuk yetiştiriciliğinde organik pamuk verimi ile konvansiyonel pamuk verimi ayni grupta yer almıştır. Sonuçlar Büyük Menderes havzasında organik pamuk yetiştiriciliğinin yapılabilir olduğunu göstermektedir. Bu durum organik tarım ve çevre sağlı açısından büyük önem arz etmektedir

    The effects of vardenafil and pentoxifylline administration in an animal model of ischemic colitis

    Get PDF
    OBJECTIVES: Vardenafil enhances dilatation of vascular smooth muscle and inhibits platelet aggregation. The purpose of this study was to evaluate the clinical effects of vardenafil and pentoxifylline administration in an experimental model of ischemic colitis. METHODS: Forty female Wistar albino rats weighing 250-300 g were randomized into five experimental groups (each with n = 8) as follows:1) a sham group subjected to a sham surgical procedure and administered only tap water; 2) a control group subjected to a standardized surgical procedure to induce ischemic colitis and administered only tap water; 3) and 4) treatment groups subjected to surgical induction of ischemic colitis followed by the postoperative administration of 5 mg/kg or 10 mg/kg vardenafil, respectively; and 5) a treatment group subjected to surgical induction of ischemic colitis followed by postoperative administration of pentoxifylline at 50 mg/kg/day per day as a single dose for a 3-day period. All animals were sacrificed at 72 h post-surgery and subjected to relaparotomy. We scored the macroscopically visible damage, measured the ischemic area and scored histopathology to determine the severity of ischemia. Tissue malondialdehyde levels were also quantified. RESULTS: The mean Gomella ischemic areas were 63.3 mm2 in the control group; 3.4 and 9.6 mm2 in the vardenafil 5 and vardenafil 10 groups, respectively; and 3.4 mm2 in the pentoxifylline group (p = 0.0001). The mean malondialdehyde values were 63.7 nmol/g in the control group; 25.3 and 25.6 nmol/g in the vardenafil 5 and vardenafil 10 groups, respectively; and 22.8 nmol/g in the pentoxifylline group (p = 0.0001). CONCLUSION: Our findings indicate that vardenafil and pentoxifylline are effective treatment options in an animal model of ischemic colitis. The positive clinical effects produced by these drugs are likely due to their influence on the hemodynamics associated with vascular smooth muscle and platelet functions

    Outcomes of high-risk breast lesions diagnosed using image-guided core needle biopsy: results from a multicenter retrospective study

    Get PDF
    PURPOSEThe clinical management of high-risk lesions using image-guided biopsy is challenging. This study aimed to evaluate the rates at which such lesions were upgraded to malignancy and identify possible predictive factors for upgrading high-risk lesions.METHODSThis retrospective multicenter analysis included 1.343 patients diagnosed with high-risk lesions using an image-guided core needle or vacuum-assisted biopsy (VAB). Only patients managed using an excisional biopsy or with at least one year of documented radiological follow-up were included. For each, the Breast Imaging Reporting and Data System (BI-RADS) category, number of samples, needle thickness, and lesion size were correlated with malignancy upgrade rates in different histologic subtypes. Pearson’s chi-squared test, the Fisher–Freeman–Halton test, and Fisher’s exact test were used for the statistical analyses.RESULTSThe overall upgrade rate was 20.6%, with the highest rates in the subtypes of intraductal papilloma (IP) with atypia (44.7%; 55/123), followed by atypical ductal hyperplasia (ADH) (38.4%; 144/375), lobular neoplasia (LN) (12.7%; 7/55), papilloma without atypia (9.4%; 58/611), flat epithelial atypia (FEA) (8.7%; 10/114), and radial scars (RSs) (4.6%; 3/65). There was a significant relationship between the upgrade rate and BI-RADS category, number of samples, and lesion size Lesion size was the most predictive factor for an upgrade in all subtypes.CONCLUSIONADH and atypical IP showed considerable upgrade rates to malignancy, requiring surgical excision. The LN, IP without atypia, pure FEA, and RS subtypes showed lower malignancy rates when the BI-RADS category was lower and in smaller lesions that had been adequately sampled using VAB. After being discussed in a multidisciplinary meeting, these cases could be managed with follow-up instead of excision

    Circular Chain VM Protection in AdjointVM

    No full text
    Cloud computing is a demanding subject and its fans are increasing day by day in the private or corporate areas. Confidentiality is the most important point of information security with respect to integrity and availability in cloud computing especially in financial, governmental and military usage. An Intrusion Detection System (IDS) service increases the cloud's security level. In this paper, a hybrid approach is introduced that can be used in cloud computing to protect cloud users from the untrusted cloud providers or untrusted employees in a circular chain protection model. This model is proposed over an existing model, AdjointVM, which uses three types of technologies (trusted computing, host-based IDS, virtual machine monitor based IDS) to tackle external and internal threats in cloud systems. The proposed model claims to overcome one of the weakest points of AdjointVM model, and aims to build a more secure cloud environment for the users by adding additional security mechanism between VMs. In the proposed model, responsibility of confidentiality is not giving up only to the providers or cloud administrators, a VM can protect another VM in a circular manner and this results a chain structure and constructs a circular structure to enhance global security of the system. At the same time, users can also manage and monitor their own confidentiality by themselves

    A Circular Chain Intrusion Detection for Cloud Computing based on improved AdjointVM Approach

    No full text
    Cloud computing has recently emerged and gained momentum to implement existing networks and data centers in a new architecture to enable services in a timely manner. Although it offers tremendous opportunities, there are some major challenges, such as security, that must be solved for efficient usage. Confidentiality is one of the most important points of information security especially in financial, governmental and military usage. In this paper, we propose a hybrid approach for cloud computing to protect cloud users from the untrusted cloud providers and untrusted employees. The proposed approach is built as an improvement on an existing model, which is called AdjointVM. In this model, it is aimed to overcome one of the weakest points of AdjointVM model, the defenselessness of the protection architecture, and to build a more secure cloud environment for users. In AdjointVM, to protect the VM, there have to be two configured VMs: the protected VM and the protector VM. These VMs are connected in a circular chain to monitor intrusions. Unlike AdjointVM, in which the number of running VMs is proportional to the number of VMs that have to be protected, in the proposed model, this number remains the same, and this results in a decrease in the capital expenditure (capex)
    corecore