1,406 research outputs found
Authorship trends in Indian wildlife and fisheries literature - a bibliometric study
The authorship and collaborative research patterns in Indian wildlife and fisheries based on the data collected from "Wildlife Review and Fish Review" published bettween 1980 to 1989 are studied. The proportion of single authored papers has decreased from 63.68% in 1980 to 52.74% in 1989. During the same period there was an increase in the average number of authors per paper from 1.57 in 1980 to 1.70 in 1989. The degree of collaborative research also increased from 0.36 to 0.47
Fermentation Of Multigrain Dough – An Approach To Reduce Glycemic Index For Healthy Bread
The use of sourdough as the starter culture for bread making is one of the oldest processes in food fermentation and is very much prevalent in being used for the manufacture of various multigrain breads. The fermentation process of breads from mixed flours is one way, reported to reduce the glycemic index as compared to white bread. In this paper, we have discussed the use of (autochthonous) native culture vs pure culture use, in fermentation to prepare a starter culture sourdough by propagative fermentation. Since such a dough is incorporated in the sourdough bread making process (1:3), by the initial process of intermittent back-slopping (at intervals of 3.5 and 7 days) to propagate sourdough with a starter culture, as a part of the process, we observed the reduction in glycaemic index of the sourdough itself to as low as GI=40, at 3rd day of fermentation when the pure consortium and at 5th day of fermentation GI=43, when the native consortium was used. The sourdough process is thus an essential tool, aimed to make healthy breads, as it is incorporated as an ingredient in the process, to make sourdough bread
Bio-intensive integrated management strategy for mustard aphid Lipaphis erysimi Kalt. (Homoptera: Aphididae)
Among the various treatments evaluated for their bio-efficacy against mustard aphid on Indian mustard during 2011-12 and 2012-13 at CCS Haryana Agricultural University, Hisar, the spray of Dimethoate 30 EC @ 1 ml/l followed by Verticillium lecanii @ 108 CS/ml was proved to be the best treatment with pooled mean aphid population of 4.5, 3.25 and 1.65 aphids/plant as against 22.0, 24.0 and 26.0 aphids/plant in the control after 3, 7 and 10 days of treatment, respectively. The pooled mean seed yield was also maximum (1485.0 kg/ha) in this treatment as compared to control (1305.0 kg/ha).The treatment was found on par with spray of dimethoate @ 1 ml/l followed by Coccinella septempunctata @ 5,000 beetles/ha with pooled mean aphid population of 5.0, 4.0 and 2.0 aphids/plant after 3, 7 and 10 days of treatment, respectively and pooled mean seed yield of (1470.0 kg/ha). But the cost benefit ratio was maximum (7.25) in treatment dimethoate followed by C. septempunctata and NSKE @ 5% followed by C. septempunctata @ 5,000 beetles/ha (6.68). Thus, entomopathogenic fungi like V. lecanii or NSKE along with release of C. septempunctata can be used as alternative measure to manage mustard aphid instead of solely relying on insecticides
A Reliable Network Routing Protocol Design with an Intelligent Mobile Sink and Energy Efficiency over Wireless Sensor Network
This is crucial for the successful operation of a Wireless Sensor Network, frequently called as WSN as each of the sensor nodes in the network's structure are in charge of transmitting the information from its original source to its final destination. Several researchers have developed a Mobile sink in an effort to enhance transmission quality. Although it has been shown to be beneficial, the network's overall reliability is compromised by the much more energy-intensive operation of the nodes. In this research, we offer a routing strategy that makes use of cluster and source portability to drastically reduce power usage. We have given this protocol its name: the Intelligent Mobile Sink Assisted Routing Protocol (IMSARP). To get started, we divide an entire sensor environment into regions, and within each of them, members cast proportional votes to choose who will serve as the Cluster-Head (CH). To determine how to choose the most efficient choice, nodes in the network evaluate the power consumption of all feasible routes. The proposed IMSARP method uses a cluster-based paradigm to construct a mobile-sink routing protocol. The standard quantity of energy within all the clusters serves as what drives the sink's motion. The outcomes section of this research proves the legitimacy and maintains the credibility of the proposed system by presenting the results, which include throughput, delay reduction, energy efficiency, and data transfer rate
Malignant nodular hidradenoma-inguinal region clinically masquerading as squamous cell carcinoma: a case report
Malignant Nodular hidradenoma is an extremely rare aggressive tumour originating from eccrine sweat glands with an incidence of <.001%. So far less than 80 cases have been reported in the literature. It’s known for its local recurrence (50%) and metastasis (60%) and hence early diagnosis and radical treatment is mandatory. But differentiating it from its benign counterparts and other skin tumour mimics is challenging, due to its histopathological similarity & lack of diagnostic immunomarkers. Authors report a case of 65-year-old female who presented with a short 4-month history of rapidly growing ulceroproliferative growth in the right inguinal region with bilateral inguinal node enlargement, associated with pain and discharge. Wedge biopsy of left inguinal lymph node showed malignant cutaneous adnexal tumour deposits, which after excision was typed as malignant nodular hidradenoma. It was confirmed with immunohistochemistry. Patient presented with recurrence 8 months after excision
Mutagenic Efficiency and Effectiveness in Cluster Bean (Cyamopsis tetragonoloba (L.)Taub.)
SUMMARYMutagenic effectiveness and efficiency of EMS, SA and Gamma rays were studied in the two varieties of cluster bean (GE-36 and HR). The mutagenic treatments seeds were tested for lethal dose 50% for all mutagens, separately and the dose at which 50% of seed germination was considered as LD50 values. EMS, SA and Gamma rays produced high frequency as well as a wide spectrum in mutation. The frequency of mutation was high at lower concentration %/dose of mutagen. The mutagenic effectiveness and efficiency was calculated based on biological damage. In M1 generation based on seed lethality and pollen sterility and M2 generation was carefully screened for various chlorophyll and viable mutation. Mutagenic effectiveness and efficiency reduced with the increase in dose or concentration. In present investigation SA proved to be effective in two varieties and EMS proved to be more efficient.Key words: Cluster bean, EMS, SA, Gamma rays, chlorophyll mutation Abbreviations: SSP- Seed storage proteins, TDF-total dietary fibre, EMS- Ethyl methanesulphonate, SA- Sodium azide, GE-36-Golden Early-36 and HR-Harit RaniSunita S. Bhosle and Vijay S. Kothekar. Mutagenic Efficiency and Effectiveness in Cluster Bean (Cyamopsis tetragonoloba (L.)Taub.). J Phytol 2/6 (2010) 21-2
Enforcing Multi-user Security Policies in Cloud Computing
The user can access data from any server with unlimited data with the security. Multi-user tendency will cost lesser than the expected cost in the single user environment. While dealing with cloud computing, confidential data can be secured from the unauthorized access and internal threats. Cloud servers use smart techniques for achieving this requirement like encryption and decryption of data. The database is stored in the encrypted format on the server & a complex query can be fired on it. Cloud server will maintain the access control policies to reveal the data from the database that are in the encrypted format. In the access control policies, we use KMA (Key Management Authority) which provides the keyset for encryption & decryption of the database. The attributes entered by the user will create one public key which is cipher text based. So this technique is called as cipher text based technique. This key is used for encryption. While registering, user will choose the policy and select the attributes on which security policy is based. Because of this it is called as cipher text policy attribute based encryption (CP-ABE). To achieve this complex encryption, we can use many algorithms like AES or DES encryption algorithms with CPABE algorithm. This scheme allows making SQL-like queries on encrypted database in multiuser environment while at the same time, the database owner assign different access rights to users that defines a specific policy for the database. The major use of this encryption is privacy, access control and data confidentiality and multi-user access control.DOI:http://dx.doi.org/10.11591/ijece.v3i4.306
- …