250 research outputs found

    The use of medicinal plants in health care practices by Rohingya refugees in a degraded forest and conservation area of Bangladesh

    Get PDF
    People in developing countries traditionally rely on plants for their primary healthcare. This dependence is relatively higher in forests in remote areas due to the lack of access to modern health facilities and easy availability of the plant products.We carried out an ethno-medicinal survey in Teknaf Game Reserve (TGR), a heavily degraded forest and conservation area in southern Bangladesh, to explore the diversity of plants used by Rohingya refugees for treating various ailments. The study also documented the traditional utilization, collection and perceptions of medicinal plants by the Rohingyas residing on the edges of this conservation area. We collected primary information through direct observation and by interviewing older respondents using a semi-structured questionnaire. A total of 34 plant species in 28 families were frequently used by the Rohingyas to treat 45 ailments, ranging from simple headaches to highly complex eye and heart diseases. For medicinal preparations and treating various ailments, aboveground plant parts were used more than belowground parts. The collection of medicinal plants was mostly from the TGR. © 2009 Taylor & Francis

    Multi Criteria Optimization Approach for Dressing of Vitrified Grinding Wheel

    Get PDF
    Rotary diamond dressers are widely used for the dressing to improve the efficiency of vitrified grinding wheel. The paper focuses on the process parameters, i.e., feed speed of dresser, depth of cut, grinding wheel velocity, velocity ratio between grinding wheel and rotary dresser, number of pass and dressing method (up-cut or down-cut) in rotary diamond dressing. The objective is to investigate the effect of these process parameters with their interactions for two response parameters, dressing ratio and overlapped dressed area. As far as the response parameters are concerned, the goal is to maximize dressing ratio and minimize overlapped dressed area simultaneously. Thirty-six experiments were designed and performed. Analysis of variance and multi-criteria optimization approach are opted to find out significant process parameters and optimal parameter setting. Finally, the significant process parameters, dressing method and number of pass are identified as well and the optimal parameter setting is also determined

    A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)

    Get PDF
    The dynamic connectivity and functionality of sensors has revolutionized remote monitoring applications thanks to the combination of IoT and wireless sensor networks (WSNs). Wearable wireless medical sensor nodes allow continuous monitoring by amassing physiological data, which is very useful in healthcare applications. These text data are then sent to doctors via IoT devices so they can make an accurate diagnosis as soon as possible. However, the transmission of medical text data is extremely vulnerable to security and privacy assaults due to the open nature of the underlying communication medium. Therefore, a certificate-less aggregation-based signature system has been proposed as a solution to the issue by using elliptic curve public key cryptography (ECC) which allows for a highly effective technique. The cost of computing has been reduced by 93% due to the incorporation of aggregation technology. The communication cost is 400 bits which is a significant reduction when compared with its counterparts. The results of the security analysis show that the scheme is robust against forging, tampering, and man-in-the-middle attacks. The primary innovation is that the time required for signature verification can be reduced by using point addition and aggregation. In addition, it does away with the reliance on a centralized medical server in order to do verification. By taking a distributed approach, it is able to fully preserve user privacy, proving its superiority

    Dickson polynomial-based secure group authentication scheme for Internet of Things

    Get PDF
    Internet of Things (IoT) paves the way for the modern smart industrial applications and cities. Trusted Authority acts as a sole control in monitoring and maintaining the communications between the IoT devices and the infrastructure. The communication between the IoT devices happens from one trusted entity of an area to the other by way of generating security certificates. Establishing trust by way of generating security certificates for the IoT devices in a smart city application can be of high cost and expensive. In order to facilitate this, a secure group authentication scheme that creates trust amongst a group of IoT devices owned by several entities has been proposed. The majority of proposed authentication techniques are made for individual device authentication and are also utilized for group authentication; nevertheless, a unique solution for group authentication is the Dickson polynomial based secure group authentication scheme. The secret keys used in our proposed authentication technique are generated using the Dickson polynomial, which enables the group to authenticate without generating an excessive amount of network traffic overhead. IoT devices' group authentication has made use of the Dickson polynomial. Blockchain technology is employed to enable secure, efficient, and fast data transfer among the unique IoT devices of each group deployed at different places. Also, the proposed secure group authentication scheme developed based on Dickson polynomials is resistant to replay, man-in-the-middle, tampering, side channel and signature forgeries, impersonation, and ephemeral key secret leakage attacks. In order to accomplish this, we have implemented a hardware-based physically unclonable function. Implementation has been carried using python language and deployed and tested on Blockchain using Ethereum Goerli’s Testnet framework. Performance analysis has been carried out by choosing various benchmarks and found that the proposed framework outperforms its counterparts through various metrics. Different parameters are also utilized to assess the performance of the proposed blockchain framework and shows that it has better performance in terms of computation, communication, storage and latency

    High expression of nicotinamide N-methyltransferase in patients with sporadic Alzheimer’s disease

    Get PDF
    We have previously shown that the expression of nicotinamide N-methyltransferase (NNMT) is significantly increased in the brains of patients who have died of Parkinson’s disease (PD). In this study, we have compared the expression of NNMT in post-mortem medial temporal lobe, hippocampus and cerebellum of 10 Alzheimer’s disease (AD) and 9 non-disease control subjects using a combination of quantitative Western blotting, immunohistochemistry and dual-label confocal microscopy coupled with quantitative analysis of colocalisation. NNMT was detected as a single protein of 29 kDa in both AD and non-disease control brains, which was significantly increased in AD medial temporal lobe compared to non-disease controls (7.5-fold, P < 0.026). There was no significant difference in expression in the cerebellum (P = 0.91). NNMT expression in AD medial temporal lobe and hippocampus was present in cholinergic neurones with no glial localisation. Cell-type expression was identical in both non-disease control and AD tissues. These results are the first to show, in a proof-of-concept study using a small patient cohort, that NNMT protein expression is increased in the AD brain and is present in neurones which degenerate in AD. These results suggest that the elevation of NNMT may be a common feature of many neurodegenerative diseases. Confirmation of this overexpression using a larger AD patient cohort will drive the future development of NNMT-targetting therapeutics which may slow or stop the disease pathogenesis, in contrast to current therapies which solely address AD symptoms

    In vivo anxiolytic and in vitro anti-inflammatory activities of water-soluble extract (WSE) of Nigella sativa (L.) seeds

    Get PDF
    The WSE is a highly polar, gummy and mucilaginous bioactive content of the Nigella sativa (L.) seeds. This study reports the anxiolytic and anti-inflammatory effects of WSE investigated using Elevated Plus Maze (EPM) and Hole-Board Test (HBT) in adult mice and human RBCs haemolysis inhibition and protein denaturation respectively. The oral WSE treatment (100 & 200 mg/kg b.w/day) for 72 hours has exhibited slightly better anxiolytic effect (p < 0.05) through the time span (92.33 & 93.33 s) spent in the opened arms of EPM vs. diazepam (1 mg/kg b.w i.p/day; 69.33 s). In HBT, only WSE (200 mg/kg b.w/day) has shown a promising number of mean head pokes (13.27 times/min) vs. diazepam (12.87 times/min). The WSE (62.5-500 mg/mL) exposure has exhibited 40.14-72.18% protection against lysis of RBCs vs. aspirin (57.04-71.48%) whilst 62.67-67.66% inhibition of protein denaturation vs. diclofenac sodium (43.11-80.64%). The current findings suggested WSE has promising anxiolytic and anti-inflammatory activities

    Co-targeting of cyclooxygenase-2 and foxM1 is a viable strategy in inducing anticancer effects in colorectal cancer cells

    Get PDF
    Background: Cross-talk between deregulated signaling pathways in cancer cells causes uncontrolled growth and proliferation. These cancers cells become more aggressive and quickly develop resistance to therapy. Therefore targeting of these deregulated pathways simultaneously can result in efficient cell death of cancer cells. In this study we investigated co-expression of Cox-2 and FoxM1 in a cohort of colorectal carcinoma (CRC) samples and also examined whether inhibition of Cox-2 and FoxM1 simultaneously can lead to inhibition of cell viability and induction of apoptosis in colorectal cancer cell lines and in vivo xenografMethods: Protein expression of Cox-2 and FoxM1 was determined in a large cohort of 770 clinical CRC samples in a tissue micro-array format by immunohistochemistry. Cell death was measured using live dead assay. Apoptosis was measured by annexin V/PI dual staining. Immunoblotting was performed to examine the expression of proteins. Calcusyn software was utilized to estimate the synergistic doses using chou and Talalay method. Results: Co-expression of Cox-2 and FoxM1 was detected in 33.3 % (232/697) of CRC’s and associated with an aggressive phenotype characterized by younger age (p = 0.0191), high proliferative index marker; Ki-67 (p = 0.004) and MMP-9 (p = 0.0116) as well as activation of AKT (p = 0.0214). In vitro, inhibition of FoxM1 and Cox-2 with pharmacological inhibitors; Thiostrepton and NS398 resulted in efficient down-regulation of FoxM1 and Cox-2 expression along with in-activation of AKT and inhibition of colony formation, invasion and migratory capability of CRC cells. In addition, there was also inhibition of cell viability and induction of apoptosis via the mitochondrial apoptotic pathway in CRC cell lines. Finally, treatment of CRC xenograft tumors in nude mice with combination of Cox-2 and FoxM1 inhibitors inhibited tumor growth significantly via down-regulation of Cox-2 and FoxM1 expression. Conclusions: These findings demonstrate that co-expression of Cox-2 and FoxM1 might play a critical role in the pathogenesis of CRC. Therefore, targeting of these pathways simultaneously with sub toxic doses of pharmacological inhibitors can be a potential therapeutic approach for the treatment of this subset of CRC
    corecore