518 research outputs found

    Proteins

    Get PDF
    The nitrogen of the protein precipitate is converted to acid ammonium sulphate by digestion with sulphuric acid and various catalysts. On making the reaction mixture alkaline, ammonia is liberated, which is removed by steam distillation. The ammonia liberated by steam distillation is gathered in acid solution containing an indicator. Change in pH of the acid solution due to addition of ammonia is indicated by the indicator dye. This solution is back-titrated with 0.01 N HCI, and the original acidic condition indicated by the indicator dye, is taken as the end point. The amount of HCl consumed in back titration is proportional to the amount of ammonia liberated. Percentage of nitrogen is calculated from the titre value, which is converted into gm% of protein present in sample by multiplying the percentage nitrogen with a factor 6.2S. The factor 6.25 is used for conversion because in average, protein contains 16% of nitrogen

    Free Amino Acids

    Get PDF
    Ninhydrin deaminates amino acids liberating ammonia and gets reduced to hydrindantin. The liberated ammonia condenses with hydrindantin to form a violet coloured compound diketohydrindylidenediketohydrindamine (DYDA) at pH 5.0. Potassium cyanide prevents the oxidation of the reduced hydrindantin. The intensity of violet colour is directly proportional to the amount of amino acid (Yemm & Cocking, 1955)

    Electrophoretic separation of proteins

    Get PDF
    There are several structural and storage proteins in the tissues of Crustacea. Some of them are metallo-proteins, some are enzymic in nature. Several electrophoretic procedures were used for the separation of these proteins. The methods used by crustacean workers include paper (Zuckerkandl, 1956; Hughes & Winkler, 1966 ; Stewart, et al., 1969), agar gel (Decleir, 1961; Vranckx &Durlait, 1976), starch gel (Whittaker, 1959 ; Cowden & Coleman, 1962; Dall, 1964) and polyacrylamide gel electrophoresis (Dall, 1974; Durliat et al., 1975; Alikhan & Akthar, 1980). With polyacrylamide gel electrophoresis a good resolution is achieved with minimum quantity of blood sample (0.1 ml). Here polyacrylamide gel electrophoretic method of Davis (1964) is described

    Changing Role of Teachers in the Present Society

    Get PDF
    The young today are facing the world in which communication and information revolution has led to changes in all spheres: scientific, technological, political, economic, social, and cultural. To be able to prepare our young people to face the future with confidence purpose and responsibility, the crucial role of teachers cannot be overemphasized. Given these multidimensional demands, Role of teachers also has to change. In the past, teachers used to be a major source of knowledge, the leader, and educator of their students school life. The changes that took place in education have initiated to change the role of teachers. In this article, we will examine how the role of teachers in the present society has to change

    Worship of Shiva in Tamil Tradition

    Get PDF
    The worship of Lord Shiva is very ancient in Tamil Nadu. The old temples were renovated. The methods of worship were modified to make the minds of the people happy. The devotees began to serve in the temples. People engaged themselves in the service of sweeping and cleaning the temple, garlanding it, setting up a garden, etc. In the temples, they sang the Thevara Pathigam (The first seven of the twelve hymns chanted on the Saiva Deity Lord Shiva). The practice of singing and worshipping the Lord began. Lord Shiva has been worshipped by the people in a very special way from the time of the kings till date. This article is intended to explore the Worship, Ceremonies, Fasting, and Greatness of Sacred Ash (Thiruneeru), the dances of Lord Shiva, and the specialties of the temple

    Hybrid Encryption based Access Control Approach for Securing Cloud Computing

    Get PDF
                    Cloud computing has become an integral part of modern technological infrastructure, facilitating the storage and processing of vast amounts of data. However, ensuring the security of sensitive information in the cloud remains a persistent challenge. This paper proposes a novel approach to enhance the security of cloud computing through hybrid encryption, leveraging the Whale Optimization Algorithm (WOA) and Cuckoo Search Optimization (CSO) algorithms. Hybrid encryption, combining symmetric and asymmetric cryptographic techniques, is employed to address the limitations of traditional encryption methods in cloud environments. The Whale Optimization Algorithm and Cuckoo Search Optimization are utilized to optimize key generation and management processes, enhancing the overall efficiency and security of the encryption scheme. The Whale Optimization Algorithm, inspired by the social behavior of humpback whales, is employed to optimize the parameters of the encryption algorithm. WOA's exploration and exploitation capabilities are leveraged to find an optimal balance in the encryption process, improving the overall robustness against potential attacks. Complementing WOA, the Cuckoo Search Optimization algorithm is applied to optimize the key distribution and update mechanisms. Modeled after the brood parasitism behavior of cuckoo birds, CSO excels in searching large solution spaces, making it suitable for refining the distribution of encryption keys and ensuring their constant adaptability to dynamic cloud environments

    An Efficient Authentication Approach with Optimization Algorithms and Elliptical Curve Cryptography for Cloud Environment

    Get PDF
    The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. Security is very important for any kind of networks. As a main communication mode, the security mechanism for multicast is not only the measure to ensure secured communications, but also the precondition for other security services. Attacks are one of the biggest concerns for security professionals. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies. This paper presents a dual optimizer based key generation method for the improving the authentication with Elliptical Curve Cryptography (ECC) encryption algorithm. The optimal private and secret key for the encryption and decryption are obtained with the optimization techniques like Animal Migration Optimization (AMO), and Brain Storm Optimization (BSO) for strengthening the security in the Cloud Computing environment

    Effects of CD2-associated protein deficiency on amyloid-β in neuroblastoma cells and in an APP transgenic mouse model

    Get PDF
    BACKGROUND: CD2-associated protein (CD2AP) is an SH3-containing scaffold adaptor protein which regulates the actin cytoskeleton. Recently, CD2AP was identified as a genetic risk factor for Alzheimer’s disease (AD) by several genome-wide association studies. One of the hallmarks of AD is the accumulation of aggregated forms of Amyloid-β (Aβ) in the brain. In humans, CD2AP AD susceptibility locus (rs9349407) is associated with an increased plaque burden. Aβ production is highly regulated by endocytosis and is influenced by lysosomal function. Lysosomal trafficking is influenced by CD2AP. In this study, we decreased CD2AP levels in N2a neuroblastoma cultures and PS1APP mice and analyzed Aβ levels and plaque burden. RESULTS: Our data show that suppressing CD2AP expression using shRNA in N2a-APP695 cells results in decreased cell membrane amyloid precursor protein, decreased Aβ release and a lower Aβ(42)/Aβ(40) ratio. CD2AP protein is expressed in the brain as detected by western blot, and the expression level is dependent on gene dosage. In 1-month old PS1APP mice, complete loss of CD2AP in brain resulted in a decreased Aβ(42)/Aβ(40) ratio in brain tissue lysates while there was no effect on Aβ deposition or accumulation in PS1APP mice expressing one copy of CD2AP. CONCLUSION: CD2-Associated Protein affects Aβ levels and Aβ(42)/Aβ(40) ratio in vitro. The effect of CD2-Associated Protein on Aβ metabolism is subtle in vivo

    Transvaginal sonographic cervical length assessment in predicting the outcome of induction of labor

    Get PDF
    Background: The aim of the study was to assess Bishop Score in women undergoing induction of labor followed by cervical length measurement by transvaginal sonography and to study the role of transvaginal sonographic cervical assessment in predicting outcome of induction of labor.Methods: This was a prospective observational study carried out in 300 pregnancy women undergoing induction of labor. In all the women, Bishop score was calculated by per vaginal examination and cervical length assessed by transvaginal ultrasound, both prior to induction of laborResults: This study has demonstrated that in singleton pregnancies undergoing induction of labor at 37-41 weeks of gestation, successful vaginal delivery within 24hrs of induction occurred in 66.8%. The study has also demonstrated that induction to delivery interval is significantly associated with both the preinduction Bishop score and sonographically measured cervical length, higher the Bishop score and lesser the cervical length, better the likelihood of vaginal delivery within 24 hrs of induction. The best cutoff point for successful induction was ≥3 for Bishop score and ≤2.5 cm for cervical length, which was obtained from the ROC curve.Conclusions: Cervical length assessment by transvaginal ultrasound was a better predictor of successful induction of labor.

    Design of Hybrid System Using Reflector for Isolated Areas

    Get PDF
    The project based on the concept of conservation of light energy from the lamps such as CFL ,Incandescent etc and using the reflector to reflect the light energy to PV panel .The lamps are the essential things that we have been using day to day life .The Solar cells act as the light absorber which will convert the light energy into the electrical energy along with this the wind turbine which convert the kinetic energy in the wind into mechanical power is used to produce hybrid power So from that we can generate more energy and store this in a battery. The hardware implementation, Design and analysis of the Power generation from the light energy emitted from the lamps has been made in this project .The Solar panel with the reflector where the performance development has been scrutinized. This Hybrid power generation method is a pioneering approach which will provide the backup power generation system at the time of power failure. Emergency Lamp, Fan and Battery charging has been used as a load in this project. The load will vary when amount of power generated is varied
    corecore