1,320 research outputs found

    Enzymes of Ammonia Assimilation in Fungi: An Overview

    Get PDF
    Nitrogen is a major element found in many of the simple compounds and nearly all of the complex macromolecules of living cells. Nitrogen can be obtained either from organic source or inorganic source but ultimately it is converted into ammonia and glutamate. Ammonia is the preferred   source of nitrogen. The assimilation of ammonia into glutamate and glutamine plays a central role in the nitrogen metabolism of all organisms. Glutamate dehydrogenase (GDH), Glutamate synthase (GOGAT), and glutamine synthetase (GS) are the key enzymes involved in ammonia assimilation. The specific steps in these pathways vary with the organism, but in virtually all cells glutamate (85%) and glutamine (15%) serve as the nitrogen donors for biosynthetic reactions. In fungi lot of work has been carried out on these enzymes from lower fungi to the higher ones and there are differences in the role played by theses enzymes. Thus knowledge of the formation of glutamate and glutamine from various nitrogen sources is crucial to our understanding of cell growth.  In this review an overall view of the elements present in ammonia assimilation especially in fungi will be carried out along with recent developments and concepts

    Study of the microcirculation level in bone with osteoporosis and osteoporotic fractures during therapy with recombinant erythropoietin, rosuvastatin and their combinations

    Get PDF
    The experiment was carried out in female white Wistar rats. The effects of recombinant erythropoietin, rosuvastatin and their combination were investigated based on the blood supply to the bone after a modelled experimental osteoporosis. It was found that the studied drugs prevent decrease of bone microcirculation in cases of osteoporosis and in callus tissue in experimental osteoporotic fractures, positively influencing the course of reparative regeneration of bone tissu

    Pharmacological correction of experimental osteoporosis and fractures related to it by means of rosuvastatin, L-norvaline and their combination

    Get PDF
    Osteoporosis (OP) is a multifactorial disease which is based on a dynamic decrease in bone mass and, as a result, disruption of bone structure, leading to higher chances of skeletal fractures. Endothelial dysfunction is a key cause of impaired blood supply to the bone, resulting in a decreased perfusion, disrupted osteogenesis and, as a consequence, osteoporotic changes. According to modern literature and available research, L-norvaline and rosuvastatin have a powerful endotheliotropic effect. However, there is no information that the osteoprotective properties of these drugs used as a monotherapy and as their combination have ever been studie

    A Fast Distributed Mining of Association Rules In Horizontally Distributed Database

    Get PDF
    Abstract: Data mining can extract important knowledge from large data collections, but sometimes these collections are split among various parties. This paper addresses a fast distributed mining of association rules over horizontally distributed data. While preparing a data set for analysis is generally the most time consuming task in a data mining,requiring numerous complex SQL queries, joining tables and aggregating columns. Existing SQL aggregations have limitations to prepare data sets because they return one column per aggregated group. In general, a significant manual effort is required to build data sets, where a horizontal layout is required. The proposed is simple, yet powerful, methods to generate SQL code to return aggregated columns in a horizontal tabular layout, returning a set of numbers instead of one number per row. This new class of functions is called horizontal aggregations. Horizontal aggregations build data sets with a horizontal de normalized layout (e.g. point-dimension, observation-variable, instance-feature), which is the standard layout required by most data mining algorithms. The proposed method used three categories to evaluate horizontal aggregations: CASE: Exploiting the programming CASE construct; SPJ: Based on standard relational algebra operators (SPJ queries); PIVOT: Using the PIVOT operator, which is offered by some DBMSs. Experiments with large tables compare the proposed query evaluation methods. A CASE method has similar speed to the PIVOT operator and it is much faster than the SPJ method. In general, the CASE and PIVOT methods exhibit linear scalability, whereas the SPJ method does not

    Organization and Running of the First Comprehensive Hereditary Cancer Clinic in India

    Get PDF
    Hereditary cancers are thought to account for around 5% of cancers, particularly breast/ovarian and colorectal cancers. In India there is a paucity of data on hereditary cancers and the mutations in some of the common genes linked to hereditary cancers, such as BRCA1, BRCA2, hMSH2 and hMLH1. The country's first comprehensive hereditary cancer clinic was established in February 2002. The article describes the organization and running of the Clinic. It also discusses some of the social issues relevant to the given population in running the Hereditary Cancer Clinic

    Secure Digital Information Forward Using Highly Developed AES Techniques in Cloud Computing

    Get PDF
    Nowadays, in communications, the main criteria are ensuring the digital information and communication in the network. The normal two users' communication exchanges confidential data and files via the web. Secure data communication is the most crucial problem for message transmission networks. To resolve this problem, cryptography uses mathematical encryption and decryption data on adaptation by converting data from a key into an unreadable format. Cryptography provides a method for performing the transmission of confidential or secure communication. The proposed AES (Advanced Encryption Standard)-based Padding Key Encryption (PKE) algorithm encrypts the Data; it generates the secret key in an unreadable format. The receiver decrypts the data using the private key in a readable format. In the proposed PKE algorithm, the sender sends data into plain Text to cypher-text using a secret key to the authorized person; the unauthorized person cannot access the data through the Internet; only an authorized person can view the data through the private key. A method for identifying user groups was developed. Support vector machines (SVM) were used in user behaviour analysis to estimate probability densities so that each user could be predicted to launch applications and sessions independently. The results of the proposed simulation offer a high level of security for transmitting sensitive data or files to recipients compared to other previous methods and user behaviour analysis

    Evaluation of conservative management in uncomplicated acute appendicitis

    Get PDF
    Background: Appendectomy has been the treatment for acute appendicitis for years based on the understanding that acute appendicitis always leads to perforation and peritonitis. However, there is growing evidence that a significant proportion of patients can be successfully managed with conservative treatment without developing gangrene or perforation. Conservative treatment avoids discomfort, surgery-related morbidities and minimizes treatment cost.Methods: 60 patients taken up for conservative management were evaluated and followed up for 6 months. Study patients received intravenous antibiotics for 2 days. Repeated clinical and TLC monitoring were done. In patients whose clinical condition did not improve, appendectomy was performed. Follow-up at 10 days, 30 days, 3 months and 6 months were carried out to assess recurrence in conservatively managed patients.Results: In this study, the mean age was 25.65 years with a standard deviation of ±8.96 years. The incidence of uncomplicated appendicitis was 63.3% in males and 36.7% in females. Mean Alvarado score was 7.75 with a standard deviation of ±1.20. Failure of conservative management (conversion to appendectomy) was observed in 11.7% of patients and 4 patients (6.6%) had recurrence within 6 months. The overall treatment efficacy was 81.7%.Conclusions: In many cases, first attack of uncomplicated acute appendicitis can be treated successfully by conservative management. Treatment failure on primary admission as well as short-term recurrence up to six months after conservative treatment is low and acceptable. Incidence of complications like perforation and abscess formation are also statistically low
    corecore