2,111 research outputs found

    Constraints in Adoption of Recommended Cultivation Practices of Medicinal Plant Growers

    Get PDF
    The objective of this study is to identify the constraints faced by medicinal plant growers in adoption of recommended cultivation practices. The present investigation was conducted in Tiruvannamalai district of Tamil Nadu state. A total of 120 respondents were selected randomly by proportionate random sampling method and  ere interviewed personally with the help of a structured interview schedule. The collected data were processed and statistically analyzed. Major constraints experienced by the medicinal plant growers were improper availability of seed/planting material, high cost of labour, lack of fixed price policy for medicinal plants by the government and lack of processing industries

    On proper Hamiltonian-connection number of graphs

    Get PDF
    A graph G is Hamiltonian-connected if every two vertices of G are connected by a Hamilton path. A bipartite graph H is Hamiltonian-laceable if any two vertices from different partite sets of H are connected by a Hamilton path. An edge-coloring (adjacent edges may receive the same color) of a Hamiltonian-connected (respectively, Hamiltonian-laceable) graph G (resp. H) is a proper Hamilton path coloring if every two vertices u and v of G (resp. H) are connected by a Hamilton path Puv such that no two adjacent edges of Pᵤᵥ are colored the same. The minimum number of colors in a proper Hamilton path coloring of G (resp. H) is the proper Hamiltonian-connection number of G (resp. H). In this paper, proper Hamiltonian-connection numbers are determined for some classes of Hamiltonian-connected graphs and that of Hamiltonian-laceable graphs.Publisher's Versio

    Development of an LH receptor assay capable of measuring serum LH/CG in a wide variety of species

    Get PDF
    The development of a radioreceptor assay (RRA) that can measure serum LH in a variety of species and CG in sera and urine of pregnant women and monkeys is reported. Using sheep luteal membrane as the receptor source and 125I-labelled hLH/hCG as the tracer, dose-response (displacement) curves were obtained using hLH or hCG as standard. The addition of LH-free serum (200 μl per tube) had no affect on the standard displacement curve. The assay is simple, requires less than 90 min to complete and provides reproducible results. The sensitivity of the assay was 0.6 ng hLH per tube and the intra- and interassay variations were 9.6 and 9.8, respectively. Sera obtained from male and female bonnet monkeys (Macaca radiata) and monkey pituitary extract showed parallelism to the standard curve. The concentrations of LH measured correlated with the physiological status of the animals. Sera of rats, rabbits, hamsters, guinea-pigs, sheep and humans showed parallelism to the hLH standard curve indicating the viability of the RRA to measure serum LH of different species. Since the receptors recognize LH and CG, detection of pregnancy in monkeys and women was possible using this assay. The sensitivity of the assay for hCG was 8.7 miu per tube. This RRA could be a convenient alternative to the Leydig cell bioassay for obtaining the LH bioactivity profile of sera and biological fluids

    AWARENESS AND USE OF ELECTRONIC INFORMATION RESOURCES BY FACULTY MEMBERS IN HIGHER EDUCATIONAL INSTITUTIONS OF HYDERABAD KARNATAKA REGION: A PILOT STUDY

    Get PDF
    The questionnaire was self designed and distributed through electronic form samples with randomly. The random samples contains of faculty members and staff. The complete questionnaires have been gathered from the respondents for the data analysis and interpretations. On the source of complete questionnaire the data has been analyzed and tabulated using SPSS software. For data scrutiny percentage technique, has been adopted. Due to small number of space significant results findings have been specified in brief. The current work was carried out during January to march 2017. Hence the present survey is enclosed to randomly selected population of geographically; this study is limited to the higher educational institutions, which covered universities, professional colleges and degree colleges, in HK area. But the scope of the study was restricted to selected of higher educational institutions in HK region, which including the backward districts of Bidar, Gulbarga, Yadagiri, Raichur, Koppal and Bellary. The questionnaire was distributed to 115 faculties random samples, out of which 79 (68.69%) respondents have responded. The similarity study will be promoted for further study covering other higher educational institutions of HK region to get more generalized and genuine findings. The discovered of the present study might be taken as the foreword findings from a pilot study. The paper highlights the essential survey findings in respect of internet awareness, use of library users towards the e-resources, which have been made available to their library. After to this, some authentic attributes by the respondents have also been coated and few propositions and recommendations have also been specified in to the point

    MITIGATING NODE ISOLATION ATTACK IN OLSR PROTOCOL USING DCFM TECHNIQUE

    Get PDF
    A Mobile Ad Hoc Network (MANET) is a collection of mobile devices which are connected by wireless links without the use of any fixed infrastructures or centralized access points. The Optimized Link State Routing (OLSR) protocol is an important proactive routing protocol designed for mobile ad hoc networks. It employs periodic exchange of messages to maintain topology information of the network at each node. Based on topology information, each node is able to calculate the optimal route to a destination. One major DoS attack against the Optimized Link State Routing protocol (OLSR) known as the node isolation attack occurs when topological knowledge of the network is exploited by an attacker who is able to isolate the victim from the rest of the network and subsequently deny communication services to the victim. The proposed method named Denial Contradictions with Fictitious Node Mechanism (DCFM) relies on the internal knowledge acquired by each node during routine routing, and augmentation of virtual (fictitious) nodes. Moreover, DCFM utilizes the same techniques used by the attack in order to prevent it. DCFM successfully prevents the attack, specifically in the realistic scenario in which all nodes in the network are mobile

    Not in the genotype: can unexplained hemophilia A result from “micro(RNA) management”?

    Full text link
    Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/154344/1/trf15668_am.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/154344/2/trf15668.pd

    Rhythms in the biting behaviour of a mosquito Armigeres subalbatus

    Get PDF
    The biting cycle of Armigeres subalbatus is distinctly crepuscular, exhibiting two peaks of activity, a smaller one at dawn and a larger one at dusk. The biting cycle is entrained to natural light-dark cycles and the time interval from dawn to dawn or dusk to dusk peaks is exactly 24 h and from dawn to dusk or dusk to dawn is about 12 h measured at 50% level. This rhythm manifests itself day after day without any marked qualitative change. The rate of change of light intensity may determine the onset of crepuscular biting. The sudden increase (up to ca. 17 lx) or decrease (down to ca. 4 lx) in the intensity of ambient light at the time of sunrise or sunset coincides with the peak of the biting activity. The density of the population of the host-seeking females fluctuates in relation to the phases of the moon, increasing with the full moon phase and decreasing with the new moon phase. Even though the density of the population is greater outdoors than indoors both at ground levels and in the first floor, the peak of activity occurs at the same time in all the places. A vertical stratification of biting activity was also noticed

    Block Codes on Pomset Metric

    Full text link
    Given a regular multiset MM on [n]={1,2,,n}[n]=\{1,2,\ldots,n\}, a partial order RR on MM, and a label map π:[n]N\pi : [n] \rightarrow \mathbb{N} defined by π(i)=ki\pi(i) = k_i with i=1nπ(i)=N\sum_{i=1}^{n}\pi (i) = N, we define a pomset block metric d(Pm,π)d_{(Pm,\pi)} on the direct sum Zmk1Zmk2Zmkn \mathbb{Z}_{m}^{k_1} \oplus \mathbb{Z}_{m}^{k_2} \oplus \ldots \oplus \mathbb{Z}_{m}^{k_n} of ZmN\mathbb{Z}_{m}^{N} based on the pomset P=(M,R)\mathbb{P}=(M,R). This pomset block metric d(Pm,π)d_{(Pm,\pi)} extends the classical pomset metric which accommodate Lee metric introduced by I. G. Sudha and R. S. Selvaraj, in particular, and generalizes the poset block metric introduced by M. M. S. Alves et al, in general, over Zm\mathbb{Z}_m. We find II-perfect pomset block codes for both ideals with partial and full counts. Further, we determine the complete weight distribution for (P,π)(P,\pi)-space, thereby obtaining it for (P,w)(P,w)-space, and pomset space, over Zm\mathbb{Z}_m. For chain pomset, packing radius and Singleton type bound are established for block codes, and the relation of MDS codes with II-perfect codes is investigated. Moreover, we also determine the duality theorem of an MDS (P,π)(P,\pi)-code when all the blocks have the same length.Comment: 17 Page
    corecore