113 research outputs found

    The Trika School - A Religio-Philosophical Emergence

    Get PDF
    The worship of Åšiva as a deity was the dominant form of theistic and religious devotion which flowed through Kashmir to other parts of India from the first century BC. The Trika school is an idealistic, monistic, and theistic school of philosophy in Åšaivism, that originated in the ninth century C.E. in Kashmir. The study attempts to elucidate the historical development of Trika school along with the idiosyncratic and unique philosophy of the school. The paper further endeavours to explain the enthralling development of this particular school which can best be understood from a religio-philosophical context. The study employs textual analysis and conceptual enquiry as the research method to analyse and present the development and distinct nature of the Trika school

    The Trika School - A Religio-Philosophical Emergence

    Get PDF
    The worship of Åšiva as a deity was the dominant form of theistic and religious devotion which flowed through Kashmir to other parts of India from the first century BC. The Trika school is an idealistic, monistic, and theistic school of philosophy in Åšaivism, that originated in the ninth century C.E. in Kashmir. The study attempts to elucidate the historical development of Trika school along with the idiosyncratic and unique philosophy of the school. The paper further endeavours to explain the enthralling development of this particular school which can best be understood from a religio-philosophical context. The study employs textual analysis and conceptual enquiry as the research method to analyse and present the development and distinct nature of the Trika school

    Nurse’s knowledge and attitude regarding cervical cancer screening at a tertiary care hospital

    Get PDF
    Background: Cervical cancer is one of the commonest cancers among women which cause morbidity and mortality worldwide. Though, it is a preventable disease, most of the women with cervical cancer present in advanced stage due to lack of knowledge about the disease and screening among general population. The objective was to assess the level of knowledge and explore attitude towards cervical cancer screening among female nursing staff.Methods: A cross sectional, questionnaire based study was conducted on 34 female nursing staff in a tertiary care hospital of Uttarakhand, India in the month of January 2015. With the help of predesigned questionnaire, information was collected regarding demographic profile, knowledge about cervical cancer and attitude towards screening techniques.Results: In this study, 79% of the respondents had knowledge about screening methods for cervical cancer and 91% had knowledge about HPV vaccine. Though 82% of them were aware of pap smear and 89% had good attitude towards it, 85.29% respondent knew about colposcopy as one of the screening technique for cervical cancer. None of the respondent had undergone a pap smear themselves.Conclusions: The study showed that, female nursing staff had average knowledge and positive attitude towards cervical cancer screening. They were not aware of the routine screening guidelines and had limited understanding of different types of cervical cancer screening techniques. Hence, it is recommended that routine training should be given on regular basis to all the health care providers

    A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues

    Get PDF
    © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).Security is a mandatory issue in any network, where sensitive data are transferred safely in the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile areas for different applications. Whatever the application, the WSNs must gather a large amount of sensitive data and send them to an authorized body, generally a sink. WSN has integrated with Internet-of-Things (IoT) via internet access in sensor nodes along with internet-connected devices. The data gathered with IoT are enormous, which are eventually collected by WSN over the Internet. Due to several resource constraints, it is challenging to design a secure sensor network, and for a secure IoT it is essential to have a secure WSN. Most of the traditional security techniques do not work well for WSN. The merger of IoT and WSN has opened new challenges in designing a secure network. In this paper, we have discussed the challenges of creating a secure WSN. This research reviews the layer-wise security protocols for WSN and IoT in the literature. There are several issues and challenges for a secure WSN and IoT, which we have addressed in this research. This research pinpoints the new research opportunities in the security issues of both WSN and IoT. This survey climaxes in abstruse psychoanalysis of the network layer attacks. Finally, various attacks on the network using Cooja, a simulator of ContikiOS, are simulated.Peer reviewe

    Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment

    Get PDF
    © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/)Threat assessment is the continuous process of monitoring the threats identified in the network of the real-time informational environment of an organisation and the business of the companies. The sagacity and security assurance for the system of an organisation and company’s business seem to need that information security exercise to unambiguously and effectively handle the threat agent’s attacks. How is this unambiguous and effective way in the present-day state of information security practice working? Given the prevalence of threats in the modern information environment, it is essential to guarantee the security of national information infrastructure. However, the existing models and methodology are not addressing the attributes of threats like motivation, opportunity, and capability (C, M, O), and the critical threat intelligence (CTI) feed to the threat agents during the penetration process is ineffective, due to which security assurance arises for an organisation and the business of companies. This paper proposes a semi-automatic information security model, which can deal with situational awareness data, strategies prevailing information security activities, and protocols monitoring specific types of the network next to the real-time information environment. This paper looks over analyses and implements the threat assessment of network traffic in one particular real-time informational environment. To achieve this, we determined various unique attributes of threat agents from the Packet Capture Application Programming Interface (PCAP files/DataStream) collected from the network between the years 2012 and 2019.Peer reviewe

    Does The Spouse Matter? A Scoping Review on Spousal Support for Working Population

    Get PDF
    Purpose: The review aims to discover and report the literature on spousal support provided to working population (men/women) and the predictors, outcomes, mediators and moderators found in relation to spousal support.   Theoretical Framework: Support at home (or spousal support) is vital for a married men or women so that they can invest more energy at work. The concept is proposed and supported by a number of theories, such as spousal support theory, human capital theory, and was utilized to choose only working population for this review.   Design/Methodology/Approach: A scoping review research model was used to systematically search for and report the empirical literature on spousal support in context of working population. Scopus database was used to search for literature on the topic, with no limit on time and discipline of publication. Preferred Reporting Items for Systematic Review (PRISMA) flow diagram for scoping review was used to show the search and filtering process used.   Findings: A total of 706 empirical articles were obtained from Scopus database, out of which 699 articles were removed while matching the title and abstract of literature with selection criteria. Further, 149 articles were excluded because of incompatibility of full text article with eligibility criteria, this left us with 61 articles to be reviewed on the topic of interest.   Research, Practical & Social implications: This study aimed to examine spousal support among working population (men and women) and its associated predictors, outcomes, mediators and moderators.   Originality/Value: In the past, review has been conducted on spousal support but no effort was made to look for study characteristics, sample characteristics, or detailed methodological features, especially in context of working population. Hence, the present review will be first to give an initial idea on the way spousal support has been described, measured, the country where and when the topic has been studied most and other sample and methodology related choices

    In vivo Neutralization of Pro-inflammatory Cytokines During Secondary Streptococcus pneumoniae Infection Post Influenza A Virus Infection

    Get PDF
    An overt pro-inflammatory immune response is a key factor contributing to lethal pneumococcal infection in an influenza pre-infected host and represents a potential target for therapeutic intervention. However, there is a paucity of knowledge about the level of contribution of individual cytokines. Based on the predictions of our previous mathematical modeling approach, the potential benefit of IFN-γ- and/or IL-6-specific antibody-mediated cytokine neutralization was explored in C57BL/6 mice infected with the influenza A/PR/8/34 strain, which were subsequently infected with the Streptococcus pneumoniae strain TIGR4 on day 7 post influenza. While single IL-6 neutralization had no effect on respiratory bacterial clearance, single IFN-γ neutralization enhanced local bacterial clearance in the lungs. Concomitant neutralization of IFN-γ and IL-6 significantly reduced the degree of pneumonia as well as bacteremia compared to the control group, indicating a positive effect for the host during secondary bacterial infection. The results of our model-driven experimental study reveal that the predicted therapeutic value of IFN-γ and IL-6 neutralization in secondary pneumococcal infection following influenza infection is tightly dependent on the experimental protocol while at the same time paving the way toward the development of effective immune therapies

    De novo sequencing and characterization of Picrorhiza kurrooa transcriptome at two temperatures showed major transcriptome adjustments

    Get PDF
    <p>Abstract</p> <p>Background</p> <p><it>Picrorhiza kurrooa </it>Royle ex Benth. is an endangered plant species of medicinal importance. The medicinal property is attributed to monoterpenoids picroside I and II, which are modulated by temperature. The transcriptome information of this species is limited with the availability of few hundreds of expressed sequence tags (ESTs) in the public databases. In order to gain insight into temperature mediated molecular changes, high throughput <it>de novo </it>transcriptome sequencing and analyses were carried out at 15°C and 25°C, the temperatures known to modulate picrosides content.</p> <p>Results</p> <p>Using paired-end (PE) Illumina sequencing technology, a total of 20,593,412 and 44,229,272 PE reads were obtained after quality filtering for 15°C and 25°C, respectively. Available (e.g., De-Bruijn/Eulerian graph) and in-house developed bioinformatics tools were used for assembly and annotation of transcriptome. A total of 74,336 assembled transcript sequences were obtained, with an average coverage of 76.6 and average length of 439.5. Guanine-cytosine (GC) content was observed to be 44.6%, while the transcriptome exhibited abundance of trinucleotide simple sequence repeat (SSR; 45.63%) markers.</p> <p>Large scale expression profiling through "read per exon kilobase per million (RPKM)", showed changes in several biological processes and metabolic pathways including <it>cytochrome P450s </it>(<it>CYPs</it>), <it>UDP-glycosyltransferases </it>(<it>UGTs</it>) and those associated with picrosides biosynthesis. RPKM data were validated by reverse transcriptase-polymerase chain reaction using a set of 19 genes, wherein 11 genes behaved in accordance with the two expression methods.</p> <p>Conclusions</p> <p>Study generated transcriptome of <it>P. kurrooa </it>at two different temperatures. Large scale expression profiling through RPKM showed major transcriptome changes in response to temperature reflecting alterations in major biological processes and metabolic pathways, and provided insight of GC content and SSR markers. Analysis also identified putative <it>CYPs </it>and <it>UGTs </it>that could help in discovering the hitherto unknown genes associated with picrosides biosynthesis.</p

    Novel quantitative trait loci from an interspecific Brassica rapa derivative improve pod shatter resistance in Brassica napus

    Get PDF
    Pod shatter is a trait of agricultural relevance that ensures plants dehisce seeds in their native environment and has been subjected to domestication and selection for non-shattering types in several broadacre crops. However, pod shattering causes a significant yield reduction in canola (Brassica napus L.) crops. An interspecific breeding line BC95042 derived from a B. rapa/B. napus cross showed improved pod shatter resistance (up to 12-fold than a shatter-prone B. napus variety). To uncover the genetic basis and improve pod shatter resistance in new varieties, we analysed F2 and F2:3 derived populations from the cross between BC95042 and an advanced breeding line, BC95041, and genotyped with 15,498 DArTseq markers. Through genome scan, interval and inclusive composite interval mapping analyses, we identified seven quantitative trait loci (QTLs) associated with pod rupture energy, a measure for pod shatter resistance or pod strength, and they locate on A02, A03, A05, A09 and C01 chromosomes. Both parental lines contributed alleles for pod shatter resistance. We identified five pairs of significant epistatic QTLs for additive x additive, additive dominance and dominance x dominance interactions between A01/C01, A03/A07, A07/C03, A03/C03, and C01/C02 chromosomes for rupture energy. QTL effects on A03/A07 and A01/C01 were in the repulsion phase. Comparative mapping identified several candidate genes (AG, ABI3, ARF3, BP1, CEL6, FIL, FUL, GA2OX2, IND, LATE, LEUNIG, MAGL15, RPL, QRT2, RGA, SPT and TCP10) underlying main QTL and epistatic QTL interactions for pod shatter resistance. Three QTLs detected on A02, A03, and A09 were near the FUL (FRUITFULL) homologues BnaA03g39820D and BnaA09g05500D. Focusing on the FUL, we investigated putative motifs, sequence variants and the evolutionary rate of its homologues in 373 resequenced B. napus accessions of interest. BnaA09g05500D is subjected to purifying selection as it had a low Ka/Ks ratio compared to other FUL homologues in B. napus. This study provides a valuable resource for genetic improvement for yield through an understanding of the genetic mechanism controlling pod shatter resistance in Brassica species
    • …
    corecore