1,122 research outputs found

    Enhanced AODV Routing Protocol Using Leader Election Algorithm

    Get PDF
    Failure of communication link in mobile ADHOC network is major issue. For the failure of link the performance of network is degraded. Due to mobility of mobile node brake the communication link and path of routing is failed. For the repairing of routing node used various algorithm such as leader election, distributed and selection algorithm. The failure of link decease the performance of routing protocol in mobile ad-hoc network, for the improvement of quality of service in mobile ad-hoc network various authors proposed a different model and method for prediction of link. The prediction of link decreases the failure rate of mobile node during communication. The leader election algorithm plays a major role in link failure prediction algorithm the process of link failure prediction implied in form of distributed node distribution. Proposed a new link stability prediction method based on current link-related or user-related information in shadowed environments. The modified protocol acquired the process of thresholds priority Oder on the basic of neighbor’s node. The selection of neighbor node deepens on the mode operation in three sections. According to order of state create cluster of priority of group. After creation of group calculate average threshold value and compare each group value with minimum threshold value and pass the control message for communication. Through this process mode of activation state of node is minimized the time of route establishment and maintenance. The selection of proper node in minimum time and other node in sleep mode the consumption of power is reduces. We modified SBRP protocol for selection of node during on demand request node according to sleep and activation mode of communication. Each node locally assigned priority value of node. For the evaluation of performance used network simulator NS-2.35. And simulate two protocol one is AODV-LE protocol, these protocol patch are available for the simulation purpose. And another protocol is AODV-LE-ME. AODV-LE-ME protocol is modified protocol of leader election protocol for the selection of mobile node during the communication. DOI: 10.17762/ijritcc2321-8169.15016

    In vivo characterization of key iridoid biosynthesis pathway genes in catnip (Nepeta cataria)

    Get PDF
    MAIN CONCLUSION: Using virus-induced gene silencing, we demonstrated that the enzymes GES, ISY, and MLPL are responsible for nepetalactone biosynthesis in Nepeta cataria. ABSTRACT: Nepetalactone is the main iridoid that is found in the Nepeta genus and is well-known for its psychoactive effect on house cats. Moreover, there is a burgeoning interest into the effect of nepetalactone on insects. Although the enzymes for nepetalactone biosynthesis have been biochemically assayed in vitro, validation of the role that these enzymes have in planta has not been demonstrated. Virus-induced gene silencing (VIGS) is a silencing method that relies on transient transformation and is an approach that has been particularly successful when applied to a variety of non-model plants. Here, we use a recently designed visual-marker dependent VIGS system to demonstrate that the nepetalactone biosynthetic enzymes GES, ISY, and MLPL impact nepetalactone biosynthesis in Nepeta cataria. SUPPLEMENTARY INFORMATION: The online version contains supplementary material available at 10.1007/s00425-022-04012-z

    USING AHP APPROACH, EVALUATION OF QUALITY-A CASE STUDY WITH RESPECT TO A WASHING MACHINE COMPANY

    Get PDF
    ABSTRACT Supplier Evaluation is performed by companies to continuously improve quality, to mitigate risks, to reduce costs or to improve performance. Thus, it forms an important and integral function that a company carries out to remain competitive in a given market. This paper attempts to propose a model that can assist a Washing Machine Company to evaluate the quality aspect of its suppliers. This model is based on the Analytical Hierarchy Process (AHP) approach which follows the principle of Linear Weighing Model. This paper is an attempt to give a variation to the traditional and a very common method that is widely used in many companies to evaluate the quality aspect -the quality history which is either about the percentage or parts per million of non-conformance components supplied. So this paper suggests that along with the past quality history other parameters can also largely help in supplier evaluation and so this work has tried to identify the important criteria that may enable the company to not just evaluate the suppliers' performance but also to concentrate in those areas where improvements may be required. It also tries to exhibit how a multi criteria decision making method can ease the work of a Vendor Management or a Quality Department in evaluating the quality aspect of their suppliers

    Attribute Based Secure Data Retrieval System for Decentralized Disruption Tolerant Military Networks

    Get PDF
    There are partitions in military environments such as a battlefield or a hostile region.They are likely to suffer from intermittent network connectivity.They having frequent partitions. Disruption-tolerant network DTN technologies are is a true and easy solutions.DTN is a Disruption-tolerant network.It allow devices which are wireless and carried by peoples in a military to interact with each other.These devices access the confidential information or command reliably by exploiting external storage nodes. In these networking environments DTN is very successful technology. When there is no wired connection between a source and a destination device, the information from the source node may need to wait in the intermediate nodes for a large amount of time until the connection would be correctly established.one of the challenching approach is a ABE.that is attribute-based encryption which fulfills the requirements for secure data retrieval in DTNs. The another concept is Cipher text Policy ABE (CP-ABE).it gives a appropriate way of encryption of data. the encryption includes the attribute set that the decryption needs to possess in order to decrypt the cipher text.hence, Many users can be allowed to decrypt different parts of data according to the security policy

    Biosynthesis of strychnine

    Get PDF

    Discovery and characterization of small molecule Rac1 inhibitors

    Get PDF
    Aberrant activation of Rho GTPase Rac1 has been observed in various tumor types, including pancreatic cancer. Rac1 activates multiple signaling pathways that lead to uncontrolled proliferation, invasion and metastasis. Thus, inhibition of Rac1 activity is a viable therapeutic strategy for proliferative disorders such as cancer. Here we identified small molecule inhibitors that target the nucleotide-binding site of Rac1 through in silico screening. Follow up in vitro studies demonstrated that two compounds blocked active Rac1 from binding to its effector PAK1. Fluorescence polarization studies indicate that these compounds target the nucleotide-binding site of Rac1. In cells, both compounds blocked Rac1 binding to its effector PAK1 following EGF-induced Rac1 activation in a dose-dependent manner, while showing no inhibition of the closely related Cdc42 and RhoA activity. Furthermore, functional studies indicate that both compounds reduced cell proliferation and migration in a dose-dependent manner in multiple pancreatic cancer cell lines. Additionally, the two compounds suppressed the clonogenic survival of pancreatic cancer cells, while they had no effect on the survival of normal pancreatic ductal cells. These compounds do not share the core structure of the known Rac1 inhibitors and could serve as additional lead compounds to target pancreatic cancers with high Rac1 activity

    Effect of Tephrosia purpurea roots extracts on acetic acid induced colitis in mice

    Get PDF
    Tephrosia purpurea L. (Leguminosae), commonly known as Unhali in Marathi is a copiously branched perennial herb. Traditionally the roots of this plant are used in the treatment of ulcer and colic pain. So the present work was undertaken to validate its use in the treatment of ulcerative colitis by using suitable scientific methods. Shade dried and coarsely powdered roots were subjected to successive extraction with ethanol and water. The dried extracts (100 and 200 mg/kg) were screened for ulcerative colitis using the method acetic acid induced ulcerative colitis in mice. Macroscopical study of the colon, level of myeloperoxidase in colon and histopathology of the colon tissue were studied for the assessment of the activity. Results showed that aqueous extract was significantly effective in the treatment of ulcerative colitis at dose of 200 mg/kg. It can be concluded that the polar constituents of T. purpurea L. may be useful in the treatment of ulcerative colitis.Colegio de Farmacéuticos de la Provincia de Buenos Aire

    An dataset on infectious potential of transmitted/founder (TF) and non-TF (NT) HIV-1 viruses generated from Interferon alpha-treated primary CD4 T cells.

    Get PDF
    This data article describes the infectivity of transmitted/founder (TF) and non-TF (NT) HIV-1 viruses derived from primary CD4 T cells treated with or without IFN-α, over a period of 12 days. TF and NT viruses described in this article were derived from the same individual (one of each from 8 infants who acquired HIV infection through mother-to-child transmission (MTCT). IFN-α resistance to both TF and NT viruses was studied by infecting TZM-bl cells and measuring luciferase expression (expressed as relative light units, RLU). Measurement of luciferase expression is extremely sensitive and allows quantification of even small changes in gene expression at the transcriptional level
    • …
    corecore