155 research outputs found

    GC-MS analysis of bioactive compounds present in leaves, stem, and roots extract of Tylophora indica (Burm.fil.) Merr.

    Get PDF
    Plants serve as a boundless source of raw materials for pharmaceuticals and have been used as an important source of medicine for several years. Identifying natural compounds from medicinal plants is useful for the discovery of novel therapeutic agents. Tylophora indica is perennial climber which possess many medicinal properties. Although it also contains many bioactive compounds which have role in various biological activity such as anti-inflammatory activity, anti-oxidant activity, and anti-cancer activity. The present study aimed to identify the bioactive compounds from methanolic and hexane extract of the leaves, stems, and roots of T. indica using GC-MS analysis. GC-MS analysis was performed by using standard protocols. Willey and NIST libraries were used in the identification of components, and their retention indices were compared. The GC-MS analysis revealed the presence of various prevailing compounds like Levomenthol, 2-Butanone, 3,3-dimethyl-1-(methylsulfonyl)-,O[(methylamino)carbonyl] oxime, Squalene, 5–methyl–2–(1–methylethyl)–(1α,2β,5β)– cyclohexanol, Oleic acid and 2-propyloxirane etc. These identified compounds play a vital role in various biological activities which were confirmed by Dr. Duke’s phytochemical and ethnobotanical databases (https://phytochem.nal.usda.gov/). The findings of this study demonstrate that T. indica is a rich source of numerous bioactive compounds that can be useful in halting the progression of several disorders

    Modelling and verification of security requirements and stealthiness in security protocols

    Get PDF
    Traditionally, formal methods are used to verify security guarantees of a system by proving that the system meets its desired specifications. These guarantees are achieved by verifying the system's security properties, in a formal setting, against its formal specifications. This includes, for example, proving the security properties of confidentiality and authentication, in an adversarial setting, by constructing a complete formal model of the protocol. Any counterexample to this proof implies an attack on the security property. All such proofs are usually based on an ordered set of actions, generated by the protocol execution, called a trace. Both the proofs and their counterexamples can be investigated further by analysing the behaviour of these protocol traces. The attack trace might either follow the standard behaviour as per protocol semantics or show deviation from it. In the latter case, however, it should be easy for an analyst to spot any attack based on its comparison from standard traces. This thesis makes two key contributions: a novel methodology for verifying the security requirements of security protocols by only modelling the attacks against a protocol specification, and, secondly, a formal definition of ‘stealthiness’ in a protocol trace which is used to classify attacks on security protocols as either ‘stealthy’ or ‘non-stealthy’. Our first novel proposal tests security properties and then verifies the security requirements of a protocol by modelling only a subset of interactions that constitute the attacks. Using this both time and effort saving methodology, without modelling the complete protocol specifications, we demonstrate the efficacy of our technique using real attacks on one of the world's most used protocols-WPA2. We show that the process of modelling the complete protocol specifications, for verifying security properties, can be simplified by modelling only a subset of protocol specifications needed to model a given attack. We establish the merit of our novel simplified approach by identifying the inadequacy of security properties apart from augmenting and verifying the new security properties, by modelling only the attacks versus the current practice of modelling the complete protocol which is a time and effort intensive process. We find that the current security requirements for WPA2, as stated in its specification, are insufficient to ensure security. We then propose a set of security properties to be augmented to the specification to stop these attacks. Further, our method also allows us to verify if the proposed additional security requirements, if enforced correctly, would be enough to stop attacks. Second, we seek to verify the ‘stealthiness’ of protocol attacks by introducing a novel formal definition of a ‘stealthy’ trace. ‘Stealthy’ actions by a participating entity or an adversary in a protocol interaction are about camouflaging fraudulent actions as genuine ones by fine-tuning their actions to make it look like honest ones. In our model, protocols are annotated to indicate what each party will log about each communication. Given a particular logging strategy, our framework determines whether it is possible to find an attack that produces log entries indistinguishable from normal runs of the protocol, or if any attack can be detected from the log entries alone. We present an intuitive definition of when an attack is ‘stealthy’, which cannot be automatically checked directly, with regard to some logging strategy. Next, we introduce session IDs to identify unique sessions. We show that our initial intuitive definition is equivalent to a second definition using these session IDs, which can also be tested automatically in TAMARIN. We analyse various attacks on known vulnerable protocols to see, for a range of logging strategies, which can be made into stealth attacks, and which cannot. This approach compares the stealthiness of various known attacks against a range of logging strategies

    A Comparative analysis of steep retrograde and uniform doping for high-k dielectrics based multi-gate devices

    Get PDF
    A brief comparison has been done for the uniform doped and steep retrograde doped Multi-Gate Devices with High-k Dielectric Oxide Layer in comparison with the traditional Silicon Dioxide Oxide Layer. Analytical modeling has been done for the steep retrograde doping and it has been found that the effects of Threshold Voltage (Vth) Roll-Off have been suppressed up-to certain extent using Steep Retrograde Doping. The study also predicts that Hafnium Dioxide can be very good alternatives to the traditional gate oxide as it greatly suppresses high leakages and other problems. The device was carried out using Sentaurus 3D-TCAD Tools

    Neuroadaptive incentivization in healthcare using Blockchain and IoT

    Get PDF
    Financially incentivizing health-related behaviors can improve health record outcomes and reduce healthcare costs. Blockchain and IoT technologies can be used to develop safe and transparent incentive schemes in healthcare. IoT devices, such as body sensor networks and wearable sensors, etc. connect the physical and digital world making it easier to collect useful health-related data for further analysis. There are, however, many security and privacy issues with the use of IoT. Some of these IoT security issues can be alleviated using Blockchain technology. Incorporating neuroadaptive technology can result in more personalized and effective therapies using machine learning algorithms and real-time feedback. The research investigates the possibilities of neuroadaptive incentivization in healthcare using Blockchain and IoT on patient health records. The core idea is to incentivize patients to keep their health parameters within standard range thereby reducing the load on healthcare system. In summary, we have presented a proof of concept for neuroadaptive incentivization in healthcare using Blockchain and IoT and discuss various applications and implementation challenges

    Asymmetric split-ring plasmonic nanostructures for optical sensing of Escherichia coli

    Full text link
    Strategies for in-liquid micro-organism detection are crucial for the clinical and pharmaceutical industries. While Raman spectroscopy is a promising label-free technique for micro-organism detection, it remains challenging due to the weak bacterial Raman signals. In this work, we exploit the unique electromagnetic properties of metamaterials to identify bacterial components in liquid using an array of Fano-resonant metamolecules. This Fano-enhanced Raman scattering (FERS) platform is designed to exhibit a Fano resonance close to the protein amide group fingerprint around 6030 nm. Raman signatures of Escherichia coli were recorded at several locations on the metamaterial under off-resonance laser excitation at 530 nm, where the photodamage effect is minimized. As the sizes of the Escherichia coli are comparable to the micro-gaps, i.e 0.41 {\mu}m, of the metamaterials, its local immobilisation leads to an increase in the Raman sensitivity. We also observed that the time-dependent FERS signal related to bacterial amide peaks increased during the bacteria's mid-exponential phase while it decreased during the stationary phase. This work provides a new set of opportunities for developing ultrasensitive FERS platforms suitable for large-scale applications and could be particularly useful for diagnostics and environmental studies at off-resonance excitation.Comment: 15 pages, 5 figure

    Microfluidic system for screening disease based on physical properties of blood

    Get PDF
    Introduction: A key feature of the 'One Health' concept pertains to the design of novel point of care systems for largescale screening of health of the population residing in resource-limited areas of low- and middle-income countries with a view to obtaining data at a community level as a rationale to achieve better public health outcomes. The physical properties of blood are different for different samples. Our study involved the development of an innovative system architecture based upon the physical properties of blood using automated classifiers to enable large-scale screening of the health of the population living in resource-limited settings. Methods: The proposed system consisted of a simple, robust and low-cost sensor with capabilities to sense and measure even the minute changes in the physical properties of blood samples. In this system, the viscosity of blood was derived from a power-law model coupled with the Rabinowitsch-Mooney correction for non-Newtonian shear rates developed in a steady laminar Poiseuille flow. Surface tension was measured by solving the Young-Laplace equation for pendant drop shape hanging on a vertical needle. An anticipated outcome of this study would be the development of a novel automated classifier based upon the rheological attributes of blood. This automated classifier would have potential application in evaluating the health status of a population at regional and global levels. Results: The proposed system was used to measure the physical properties of various samples like normal, tuberculous and anemic blood samples. The results showed that the physical properties of these samples were different as compared to normal blood samples. The major advantage of this system was low-cost, as well as its simplicity and portability. Conclusion: In this work, we proposed making a case for the validation of a low-cost version of a microfluidic system capable of scanning large populations for a variety of diseases as per the WHO mandate of "One Health"

    Gamma Radiation Induced Intestinal Proteomic Modulation in Mice: A Two Dimensional Electrophoretic Analysis

    Get PDF
    Exposure to high doses of radiation causes serious injuries in gastrointestinal tract, by affecting biomolecules of the tissue. To demonstrate the modulation of intestinal proteome by ionising radiations, we analysed changes in protein expression in 9 Gy irradiated C57BL/6 mice at 24 h and 72 h by using two dimensional electrophoresis technique. A total of 19 protein spots with statistical significance (fold change>1.5 and P<0.05) were found to be differentially expressed. Of these 07 spots were identified by MALDI-TOF MS and peptide mass fingerprinting techniques which matched with the known proteins documented in the online database. These proteins belong to biological-functional categories like cytoskeleton system, molecular chaperones, DNA damage response, and stress response. These identified radiation induced proteins can help in understanding the mechanisms behind the intestinal injuries and thus can become potential targets for therapeutics and also aid in drug development

    Compliance checking of cloud providers: design and implementation

    Get PDF
    The recognition of capabilities supplied by cloud systems is presently growing up. Collecting or sharing healthcare data and sensitive information especially during Covid-19 pandemic has motivated organizations and enterprises to leverage the upsides coming from cloud-based applications. However, the privacy of electronic data in such applications remains a significant challenge for cloud vendors to adapt their solutions with existing privacy legislation standards such as general data protection regulation (GDPR). This paper, first, proposes a formal model and verification for data usage requests of providers in a cloud composite service using a model checking tool. A cloud pharmacy scenario is presented to illustrate the connectivity of providers in the composite service and the stream of their requests for both collection and movement of patient data. A set of verification is, then, undertaken over the pharmacy service in accordance with three significant GDPR obligations, namely user consent, data access and data transfer. Following that, the paper designs and implements a cloud container virtualization based on the verified formal model realising GDPR requirements. The container makes use of some enforcement smart contracts to only proceed the providers’ requests, which are compliant with GDPR. Finally, several experiments are provided to investigate the performance of our approach in terms of time, memory and cost

    Socio-demographic and Clinico-pathological Profile of Cervical Cancer Patients at a Tertiary Care Centre in New Delhi: A Five-Year Retrospective analysis

    Get PDF
    Background: Cervical cancer remains a major public health challenge in low and middle-income countries including India. However, if detected early, it is preventable and curable. Objective: The present study aimed to ascertain the sociodemographic and clinical profile of cervical cancer patients visiting a tertiary cancer center. Methodology: A retrospective study was carried out at the Delhi State Cancer Institute, New Delhi. The study population included 136 women who were diagnosed with cervical cancer. A pretested data extraction sheet was used as the study tool for collecting information from the inpatient records. Descriptive analysis and chi-square test were performed and the level of significance was set at p<0.05. Results: A total of 136 cervical cancer patients with mean age of 46 ± 9.85 and mean BMI of 23.78 ± 5.03, were studied retrospectively. About 36.8% of patients were aged between 40-49 years and 57.4% were illiterate. While 40.4% of the patients belonged to FIGO stage II, 27.2% had FIGO stage III cancer. Majority (63.2%) of patients were diagnosed with squamous cell carcinoma (SCC), while the rest were adenocarcinoma (25%) and adenosquamous (11.8%). Clinical stage of cancer was found to be significantly associated with educational status (p=0.03) and dietary practices (p=.007). Conclusion: Our study found higher percentage of women with stage II and III cervical lesions and reaffirms the importance of education and healthy diet in early detection and prevention of cervical cancer. Therefore, it is suggested that accelerated population awareness and screening, incorporating digital innovations including vaccination programs are mandatory

    User Satisfaction and Technology Adoption in Smart Homes: A User Experience Test

    Get PDF
    Using a mixed-methods approach, we examine the complex link between user happiness and technology adoption in the context of smart homes. Our tests show that user happiness and adoption are highly influenced by the versions of smart home technologies, with Version A producing better user satisfaction (7.2) and adoption rates (68%) than Version B (6.8, 62%). Furthermore, consumers engaging with Features A and C reported the greatest adoption rates (80%) and satisfaction (8.1), indicating that certain features, particularly when paired, have a significant influence on user pleasure. Extended training times resulted in higher user satisfaction and adoption rates of the technology; the 6-hour training group had the greatest adoption rate (84%), and the highest satisfaction (8.3%). Furthermore, user age demographics have a substantial impact on adoption and happiness; young adults have the greatest adoption rate (70%) and contentment (7.6). These results highlight the necessity of developing smart home technologies that are appropriate for various age groups, as well as the significance of feature customization, thorough training, and user-centric design in improving user satisfaction and encouraging technology adoption. Introductio
    • …
    corecore