27 research outputs found

    The use of medicinal plants in health care practices by Rohingya refugees in a degraded forest and conservation area of Bangladesh

    Get PDF
    People in developing countries traditionally rely on plants for their primary healthcare. This dependence is relatively higher in forests in remote areas due to the lack of access to modern health facilities and easy availability of the plant products.We carried out an ethno-medicinal survey in Teknaf Game Reserve (TGR), a heavily degraded forest and conservation area in southern Bangladesh, to explore the diversity of plants used by Rohingya refugees for treating various ailments. The study also documented the traditional utilization, collection and perceptions of medicinal plants by the Rohingyas residing on the edges of this conservation area. We collected primary information through direct observation and by interviewing older respondents using a semi-structured questionnaire. A total of 34 plant species in 28 families were frequently used by the Rohingyas to treat 45 ailments, ranging from simple headaches to highly complex eye and heart diseases. For medicinal preparations and treating various ailments, aboveground plant parts were used more than belowground parts. The collection of medicinal plants was mostly from the TGR. © 2009 Taylor & Francis

    Synchronizing Allelic Effects of Opposing Quantitative Trait Loci Confirmed a Major Epistatic Interaction Affecting Acute Lung Injury Survival in Mice

    Get PDF
    Increased oxygen (O2) levels help manage severely injured patients, but too much for too long can cause acute lung injury (ALI), acute respiratory distress syndrome (ARDS) and even death. In fact, continuous hyperoxia has become a prototype in rodents to mimic salient clinical and pathological characteristics of ALI/ARDS. To identify genes affecting hyperoxia-induced ALI (HALI), we previously established a mouse model of differential susceptibility. Genetic analysis of backcross and F2 populations derived from sensitive (C57BL/6J; B) and resistant (129X1/SvJ; X1) inbred strains identified five quantitative trait loci (QTLs; Shali1-5) linked to HALI survival time. Interestingly, analysis of these recombinant populations supported opposite within-strain effects on survival for the two major-effect QTLs. Whereas Shali1 alleles imparted the expected survival time effects (i.e., X1 alleles increased HALI resistance and B alleles increased sensitivity), the allelic effects of Shali2 were reversed (i.e., X1 alleles increased HALI sensitivity and B alleles increased resistance). For in vivo validation of these inverse allelic effects, we constructed reciprocal congenic lines to synchronize the sensitivity or resistance alleles of Shali1 and Shali2 within the same strain. Specifically, B-derived Shali1 or Shali2 QTL regions were transferred to X1 mice and X1-derived QTL segments were transferred to B mice. Our previous QTL results predicted that substituting Shali1 B alleles onto the resistant X1 background would add sensitivity. Surprisingly, not only were these mice more sensitive than the resistant X1 strain, they were more sensitive than the sensitive B strain. In stark contrast, substituting the Shali2 interval from the sensitive B strain onto the X1 background markedly increased the survival time. Reciprocal congenic lines confirmed the opposing allelic effects of Shali1 and Shali2 on HALI survival time and provide unique models to identify their respective quantitative trait genes and to critically assess the apparent bidirectional epistatic interactions between these major-effect loci

    Trustworthy Cloud Computing

    Get PDF
    Trustworthy cloud computing has been a central tenet of the European Union cloud strategy for nearly a decade. This chapter discusses the origins of trustworthy computing and specifically how the goals of trustworthy computing—security and privacy, reliability, and business integrity—are represented in computer science research. We call for further inter- and multi-disciplinary research on trustworthy cloud computing that reflect a more holistic view of trust

    The governance, risk-taking, and performance of Islamic banks

    Get PDF
    We examine whether the difference in governance structures influences the risk taking and performance of Islamic banks compared to conventional banks. Using a sample of 52 Islamic banks and 104 conventional banks in 14 countries for the period from 2005 to 2013, we conclude that the governance structure in Islamic banks plays a crucial role in risk taking as well as financial performance that is distinct from conventional banks. Particularly, we show that the governance structure in Islamic banks allows them to take higher risks and achieve better performance because of product complexities and transaction mechanisms. However, Islamic banks maintain a higher capitalization compared to conventional banks. These results support the research on Islamic investment and risk taking. Our results add a new dimension to the governance research that could be a valuable source of knowledge for policy makers and regulators in the financial services sector

    Secure data sharing and searching at the edge of cloud-assisted internet of things

    Full text link
    This article proposes an efficient data-sharing scheme that allows smart devices to share securely data with others at the edge of cloud-Assisted Internet of Things (IoT). We also propose a secure searching scheme to search desired data within own/shared data on storage

    Security and privacy challenges in mobile cloud computing: Survey and way ahead

    Full text link
    The rapid growth of mobile computing is seriously challenged by the resource constrained mobile devices. However, the growth of mobile computing can be enhanced by integrating mobile computing into cloud computing, and hence a new paradigm of computing called mobile cloud computing emerges. In here, the data is stored in cloud infrastructure and the actual execution is shifted to cloud environment so that a mobile user is set free from resource constrained issue of existing mobile devices. Moreover, to avail the cloud services, the communications between mobile devices and clouds are held through wireless medium. Thus, some new classes of security and privacy challenges are introduced. The purpose of this survey is to present the main security and privacy challenges in this field which have grown much interest among the academia and research community. Although, there are many challenges, corresponding security solutions have been proposed and identified in literature by many researchers to counter the challenges. We also present these recent works in short. Furthermore, we compare these works based on different security and privacy requirements, and finally present open issues

    Video Dissemination in Untethered Edge-Clouds: A Case Study

    No full text
    International audienceWe describe a case study application for untethered video dissemination using a hybrid edge-cloud architecture featuring Android devices, possibly organised in WiFi-Direct groups, and Raspberry Pi-based cloudlets, structured in a mesh and also working as access points. The application was tested in the real-world scenario of a Portuguese volleyball league game. During the game, users of the application recorded videos and injected them in the edge-cloud. The cloudlet servers continuously synchronised their cached video contents over the mesh network, allowing users on different locations to share their videos, without resorting to any other network infrastructure. An analysis of the logs gathered during the experiment shows that such portable setups can easily disseminate videos to tens of users through the edge-cloud with low latencies. We observe that the edge-cloud may be naturally resilient to faulty cloudlets or devices, taking advantage of video caching within devices and WiFi-Direct groups, and of device churn to opportunistically disseminate videos
    corecore