201 research outputs found
PREVENTION OF DNA SUGAR, HUMAN PERIPHERAL LYMPHOCYTES AND ERYTHROCYTES DAMAGES FROM FREE RADICAL INDUCED OXIDATION BY NATURAL ANTIOXIDANTS
Objective: The present study focused on the identification of particular extract which shows signification protection of DNA sugar against excessive oxidation.
Methods: The different extracts (water, alcohol, alcohol: water, and hexane) of Agathi seeds (Sesbania grandiflora Linn) were evaluated using various antioxidant and other relevant assays like DNA sugar protection and antioxidant activities.
Results: The alcohol: water (1:1) extract of S. grandiflora Linn seeds showed the highest antioxidant and free radical scavenging activity. It inhibited membrane lipid peroxidation by 55% at 50 μg/ml, scavenged approximately 69% of hydroxyl and 1,1-diphenyl-2-picrylhydrazayl radicals at 2–3 fold lower concentrations compared to the other extracts. In addition, the alcohol: water extract inhibited ferrous sulfate: ascorbate-induced sugar oxidation of DNA and also showed non-toxic nature against lymphocytes.
Conclusion: These results establish the antioxidant potential of the extract, which could be used as natural antioxidant source
Smart Grid Communication Architecture Modeling for Heterogeneous Network Based Advanced Metering Infrastructure
A smart grid is an emerging technology in the power delivery system which provides an intelligent, self-recovery and homeostatic grid in delivering power to the users. Smart grid communication network provides transmission capacity for information transformation within the connected nodes in the network, in favor of functional and operational needs. In the electric grids communication network delay is based on choosing the appropriate technology and the types of devices enforced. In distinction, the combination of IEEE 802.16 based WiMAX and IEEE 802.11 based WiFi technologies provides improved coverage and gives low delay performances to meet the smart grid needs. By incorporating this method in Wide Area Monitoring System (WAMS) and Advanced Metering Infrastructure (AMI) the performance of the smart grid will be considerably improved. This work deals with the implementation of WiMAX-WLAN integrated network architecture for WAMS and AMI in the smart grid
Solar Power Prediction Using Machine Learning
This paper presents a machine learning-based approach for predicting solar
power generation with high accuracy using a 99% AUC (Area Under the Curve)
metric. The approach includes data collection, pre-processing, feature
selection, model selection, training, evaluation, and deployment. High-quality
data from multiple sources, including weather data, solar irradiance data, and
historical solar power generation data, are collected and pre-processed to
remove outliers, handle missing values, and normalize the data. Relevant
features such as temperature, humidity, wind speed, and solar irradiance are
selected for model training. Support Vector Machines (SVM), Random Forest, and
Gradient Boosting are used as machine learning algorithms to produce accurate
predictions. The models are trained on a large dataset of historical solar
power generation data and other relevant features. The performance of the
models is evaluated using AUC and other metrics such as precision, recall, and
F1-score. The trained machine learning models are then deployed in a production
environment, where they can be used to make real-time predictions about solar
power generation. The results show that the proposed approach achieves a 99%
AUC for solar power generation prediction, which can help energy companies
better manage their solar power systems, reduce costs, and improve energy
efficiency.Comment: 7 page
Cost optimization for the capacitated railroad blocking and train design problem
This paper considers the combined problems of railroad blocking, train design and train assignment as observed in the railroad industry. The problem of railroad blocking deals with finding the least cost paths for a given set of shipments over an entire railroad network. Blocking is defined as an activity where a set of shipments arriving at or commencing from a certain node station and departing to another particular node station, or further, are grouped together and sent across as the same train to minimize costs and exploit economies of scale. This problem has marked similarities with the airline scheduling which operates flights across a predetermined hub and spoke network. The problem considered here not only necessitates determining the “right” hubs and “right” trains to be scheduled on the network, but also scheduling the shipments on appropriate trains between the hub station yards and spoke station yards so that the overall costs are minimized. There are a large number of practical and logical constraints associated with the problem. Apart from the capacity related constraints on the arcs, nodes and trains as observed in prior literature, it is required that the trains run only on crew segments, which act as the transit nodes for crew members. The main objective of our efforts would be to find a cost minimizing set of feasible trains that operate entire on crew segments. Our algorithm will also determine the least cost assignment of shipments to these trains. The results of our method are validated and reported for two real-life problem instances and demonstrate the advantage of using a joint mixed integer mathematical formulation over greedy heuristics that have largely been employed for this problem in literature
Latitudinal variation in vertical distribution of meteor decay time and its relation with mesospheric Ozone in the altitude range of 80-90 km
115-124Investigations on meteor trail decay time and its evolution in the mesosphere and lower thermosphere are very important
to estimate the temperature in this region. The present study focuses on the vertical distribution of meteor decay times at
three different latitudes to understand the mechanism responsible for the deviation of meteor decay time from the theoretical
estimations below 90 km of altitude. The present study is based on measurements from three identical meteor radars located
at equatorial (Kototabang: 0.2° S, 100.3° E), low (Thumba: 8.5° N, 76.9° E) and polar latitudes (Eureka: 80.0° N, 85.8° W).
The results reveal a pronounced seasonal variation of vertical distribution of meteor decay time turning altitude (inflection
point) over polar latitudes as compared to that over equatorial and low latitudes. Apart from direct estimations from meteor
radar observations, the meteor decay time is estimated using temperature and pressure measurements from the
SABER/TIMED. Above 90 km of altitude, decay times estimated from both methods are in good agreement. However,
below 90 km of altitude, these estimations start deviating and it has been noted that the deviation increases with decreasing
altitude. Further, observed meteor decay times correlated with ozone concentration at three representative altitude bins. The
correlation analysis reveals a significant negative correlation at 80 - 90 km of altitude over the three latitudes indicating that
an increase in ozone concentration results in decrease in meteor decay time. The significance of the present results lies in
analyzing the vertical distribution of meteor decay time simultaneously from three radar locations representing equatorial,
low and polar latitudes and evaluating the relation between ozone concentration and meteor decay time, quantitatively
Quantum Noise Randomized Ciphers
We review the notion of a classical random cipher and its advantages. We
sharpen the usual description of random ciphers to a particular mathematical
characterization suggested by the salient feature responsible for their
increased security. We describe a concrete system known as AlphaEta and show
that it is equivalent to a random cipher in which the required randomization is
effected by coherent-state quantum noise. We describe the currently known
security features of AlphaEta and similar systems, including lower bounds on
the unicity distances against ciphertext-only and known-plaintext attacks. We
show how AlphaEta used in conjunction with any standard stream cipher such as
AES (Advanced Encryption Standard) provides an additional, qualitatively
different layer of security from physical encryption against known-plaintext
attacks on the key. We refute some claims in the literature that AlphaEta is
equivalent to a non-random stream cipher.Comment: Accepted for publication in Phys. Rev. A; Discussion augmented and
re-organized; Section 5 contains a detailed response to 'T. Nishioka, T.
Hasegawa, H. Ishizuka, K. Imafuku, H. Imai: Phys. Lett. A 327 (2004) 28-32
/quant-ph/0310168' & 'T. Nishioka, T. Hasegawa, H. Ishizuka, K. Imafuku, H.
Imai: Phys. Lett. A 346 (2005) 7
Magnolol: A neolignan from the Magnolia family for the prevention and treatment of cancer
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. The past few decades have witnessed widespread research to challenge carcinogenesis; however, it remains one of the most important health concerns with the worst prognosis and diagnosis. Increasing lines of evidence clearly show that the rate of cancer incidence will increase in future and will create global havoc, designating it as an epidemic. Conventional chemotherapeutics and treatment with synthetic disciplines are often associated with adverse side effects and development of chemoresistance. Thus, discovering novel economic and patient friendly drugs that are safe and efficacious is warranted. Several natural compounds have proved their potential against this dreadful disease so far. Magnolol is a hydroxylated biphenyl isolated from the root and stem bark of Magnolia tree. Magnolol can efficiently prevent or inhibit the growth of various cancers originating from different organs such as brain, breast, cervical, colon, liver, lung, prostate, skin, etc. Considering these perspectives, the current review primarily focuses on the fascinating role of magnolol against various types of cancers, and the source and chemistry of magnolol and the molecular mechanism underlying the targets of magnolol are discussed. This review proposes magnolol as a suitable candidate that can be appropriately designed and established into a potent anti-cancer drug
Topical therapy with clobetasol propionate 0.025% for various dermatological conditions
Topical corticosteroids (TC) are the most commonly prescribed medications for the treatment of several dermatoses. Owing to their potent effect of relieving symptoms, these drugs are indicated for the use of inflammatory and pruritic presentations of dermatologic conditions. Clobetasol propionate (CP) is the most common TC used to treat itching, redness, and swelling caused by some skin conditions. It possesses anti-inflammatory, antipruritic, and vasoconstrictive properties. To exert its effect, CP binds to cytoplasmic glucocorticoid receptors and subsequently activates glucocorticoid receptor-mediated gene expression, thus resulting in the synthesis of certain anti-inflammatory proteins, while inhibiting the synthesis of certain inflammatory mediators. This case series discusses the efficacy, safety, and clinical experience of using CP 0.025% cream for the treatment of different dermatologic conditions
Real time response on dS_3: the Topological AdS Black Hole and the Bubble
We study real time correlators in strongly coupled N=4 supersymmetric
Yang-Mills theory on dS_3 x S^1, with antiperiodic boundary conditions for
fermions on the circle. When the circle radius is larger than a critical value,
the dual geometry is the so-called "topological AdS_5 black hole". Applying the
Son- Starinets recipe in this background we compute retarded glueball
propagators which exhibit an infinite set of poles yielding the quasinormal
frequencies of the topological black hole. The imaginary parts of the
propagators exhibit thermal effects associated with the Gibbons-Hawking
temperature due to the cosmological horizon of the de Sitter boundary. We also
obtain R-current correlators and find that after accounting for a small
subtlety, the Son-Starinets prescription yields the retarded Green's functions.
The correlators do not display diffusive behaviour at late times. Below the
critical value of the circle radius, the topological black hole decays to the
AdS_5 "bubble of nothing". Using a high frequency WKB approximation, we show
that glueball correlators in this phase exhibit poles on the real axis. The
tunnelling from the black hole to the bubble is interpreted as a hadronization
transition.Comment: 52 pages, 11 figures, typos corrected, references adde
- …