46 research outputs found

    Larvicidal action of Nux-vomica (Strychnus nux-vomica L.) against Diamond back moth (Plutella xylostella L.)

    Get PDF
    The present investigation reports on larvicidal efficacy of plant extracts of Nux-vomica, Strychnus nux-vomica against Diamond back moth (DBM). In this investigation shade dried and powdered nux-vomica plant sam-ples (leaves, root bark, stem bark, seed and fruit rind) were extracted with organic solvents ethanol, methanol, ace-tone, hexane and chloroform and also formulated as Emulsifiable Concentrates (EC) using surfactant and solvents. This formulated plant extracts were tested against third instar larvae of DBM for larvicidal efficacy using leaf disc bioassay method under laboratory condition. Among the five solvent extracts tested, hexane extracts of root bark 11.11 EC @ 2 % showed highest larval mortality of 76.66 % followed by seed 14.25 EC, leaf 16.66 EC, stem bark 12.50 EC and fruit rind 12.50 EC extracts exhibited maximum mortality @ 2 % concentration recording 66.66, 63.33, 56.66 and 40.00 per cent mortality respectively. Positive and negative control such as respective solvent and water showed 10.00 and 3.33 % larval mortality respectively. The results of these experiment clearly indicate that nux-vomica plant possess promising larvicidal action against diamond back moth

    Crptography based Lifi for Patient Privacy and Emergency Health Service Using IOT

    Get PDF
    Medical care is one such region, where WIFI is as yet not utilized as the electromagnetic waves influences patients with sicknesses like neurological problems, diseases and so forth. Accordingly, LIFI can be respected the following large thing, as it represents no gamble to patients and offers more advantages than WIFI, such as faster speeds and a larger spectrum. The only issue that hospitals have while exchanging data through it is ensuring confidentiality. The methodology proposed here leverages Secure Hash Algorithms to give maximum security as a solution to this challenge. The Secure Hash Algorithm is a bonus feature that is mostly utilised for authentication. IoT connects physical devices such as sensors and actuators to networks. The programming routines can be visualised from any location thanks to cloud storage. These algorithms can be employed in a variety of applications, including smart homes, digital technologies, and banking systems. This research presents a model that takes into account a human's heart rate, glucose level, and temperature. In the even to fan emergency, adjacent hospitals are alerted to the patient's condition, allowing them to provide timely and correct care. This will save you from having to go to the hospital. Temperature, blood pressure, heart rate, gas sensor, and fall detection are among the vital signs monitored by the system. An Arduino controller and a GSM900Amodule make up the system design. The monitored values can be supplied via mobile phones, and if an abnormal state is detected, the buzzer is activated, and the information is communicated to the concerned members via the mobile app

    Pharmacognostical Sources of Popular Medicine To Treat Alzheimer’s Disease

    Get PDF

    Environmental effects of ozone depletion, UV radiation and interactions with climate change : UNEP Environmental Effects Assessment Panel, update 2017

    Get PDF
    Peer reviewe

    Morphological and morphometric analysis of accessory mental foramen in dry human mandibles of south indian population

    No full text
    Background: Mental foramen (MF) is an important landmark for administration of local anesthesia in surgical procedures involving the mandible. Additional mental foramina, called accessory mental foramina (AMF) transmitting branches of mental nerve, have been reported. Detection of AMFs in presurgical imaging may reduce postoperative pain in dental surgical procedures. Aim: The aim of the study was to study the incidence and morphometric analysis of accessory MF in the dry human mandibles of South Indian population. Materials and Methods: Two hundred and sixty dry human mandibles were studied for the presence, location, shape of AMF, and its relation to MF. The horizontal diameter of AMF, and its distance from symphysis menti, the posterior border of mandible and from the base of mandible were measured and statistically analyzed. Results and Conclusions: In our study, AMF were present in 8.85% mandibles (unilateral - 7.6% [4.6% - left, 2.69% - right] and bilateral 1.6%). The most common position was below the second premolar (48.1%). AMF were round in shape (74%) and was often located either superomedial or inferolateral to MF. Their transverse diameter ranged from 0.5 to 1 mm. The AMF were situated at a mean distance of 2.96 mm from MF, 23.47 mm from symphysis menti, 11.24 mm from the lower border of the body of the mandible, and 57.35 mm from the posterior border of ramus of mandible. The knowledge of the presence of AMF and its dimensions would enable the clinicians to do mandibular procedures carefully and avoid injury to the branches of mental nerve that may be passing through it

    SEMANTIC WEB SERVICES AND ITS CHALLENGES IJCET © I A E M E

    No full text
    ABSTRACT Semantic web technology has drawn a considerable attention of the researchers in the field of distributed information systems, artificial intelligence and so on. Researchers are taking interest to make use of semantic web technology as a central component of their software constructions. This paper gives an overview of Semantic web and web services, semantic web technologies, semantic web architecture, semantic web approaches and key challenges

    Evaluation of deoxyribonucleic acid damage using neutral comet assay for high radiation doses: A feasibility study

    No full text
    Purpose: This study aims to investigate the use of the neutral comet assay to assess deoxyribonucleic acid (DNA) damage in lymphocytes exposed to high doses of radiation. Materials and Methods: The research was conducted by obtaining informed consent, after which blood samples were taken from seven healthy individuals and this study was approved by the institutional ethics committee. At first, for the determination of dose-effect curves, samples obtained from the first five individuals were irradiated for doses ranging from 0 to 35 Gy after which they were processed under neutral comet assay. In order to verify the determined dose-effect curves, a test dose of 15 Gy was delivered to the samples obtained from the sixth and seventh individuals. The amount of DNA damage from the obtained comet assay images was analyzed using four comet assay parameters namely % tail DNA, tail length, tail moment (TM), and Olive TM (OTM). The most suitable comet assay parameter was evaluated based on the obtained dose-effect curves. Furthermore, the distribution of individual cells for each dose point was evaluated for all the four comet assay parameters to find the optimal parameter. Results: From our results, it was found that from 0 to 25 Gy all the four comet assay parameters fit well into a linear quadratic curve and above 25 Gy saturation was observed. Based on the individual cell distribution data, it was found that % tail DNA could be an optimal choice to evaluate DNA damage while using neutral comet assay for high-dose ionizing radiation. Conclusion: The neutral comet assay could be a potential tool to assess DNA damage from high doses of ionizing radiation greater than 5 Gy
    corecore