149 research outputs found

    The Study of Dormancy Breaking in Grapevine Buds by Using Chemical in Ahvaz Area

    Get PDF
    The effects of dormancy breaking chemical have long been specified and the utilization of these materials are common in many subtropical areas where do not provide adequate chilling requirement for buds to bloom. Although, grape as a fruit that is grown in subtropical areas does not have a high chilling requirement, its fulfillment is crucial to release bud dormancy and for its optimal growth. So, it is necessary to consider the effect of dormancy-breaking chemical on this product. In present research, the effects of dormex in three concentrations of 3%, 5% and 7% and volk oil in three concentrations of 3%, 5% and 7% as two bud dormancy breaking chemical have been evaluated in a split-plot experiment on some qualitative and quantitative properties of Sultani grape cultivar such as yield, bunch weight, number of berry per bunch, bunch length and width, length and volume of berry, 100 berries' weight, number of seeds per berry and pH, TSS, TA, TSS / TA, and vitamin C. Results which were analyzed by SAS software indicated that in bushes treated with 7% dormex and 7% volk oil, the yield and bunch weight, bunch length and width, berry weight and volume dramatically increased, and this increase is proportional to the concentration of applied substance. Generally, it is concluded that the application of dormancy-breaking chemicals has great impact on yield improvement and other quantitative and qualitative characteristics of grapevine bushes and can meet the side effects resulting from the lack of adequate chilling requirement of grapevine. The application of 7% dormex significantly increased the quantitative and qualitative characteristics of grapevine in Ahvaz

    The Study of Dormancy Breaking in Grapevine Buds by Using Chemical in Ahvaz Area

    Get PDF
    The effects of dormancy breaking chemical have long been specified and the utilization of these materials are common in many subtropical areas where do not provide adequate chilling requirement for buds to bloom. Although, grape as a fruit that is grown in subtropical areas does not have a high chilling requirement, its fulfillment is crucial to release bud dormancy and for its optimal growth. So, it is necessary to consider the effect of dormancy-breaking chemical on this product. In present research, the effects of dormex in three concentrations of 3%, 5% and 7% and volk oil in three concentrations of 3%, 5% and 7% as two bud dormancy breaking chemical have been evaluated in a split-plot experiment on some qualitative and quantitative properties of Sultani grape cultivar such as yield, bunch weight, number of berry per bunch, bunch length and width, length and volume of berry, 100 berries' weight, number of seeds per berry and pH, TSS, TA, TSS / TA, and vitamin C. Results which were analyzed by SAS software indicated that in bushes treated with 7% dormex and 7% volk oil, the yield and bunch weight, bunch length and width, berry weight and volume dramatically increased, and this increase is proportional to the concentration of applied substance. Generally, it is concluded that the application of dormancy-breaking chemicals has great impact on yield improvement and other quantitative and qualitative characteristics of grapevine bushes and can meet the side effects resulting from the lack of adequate chilling requirement of grapevine. The application of 7% dormex significantly increased the quantitative and qualitative characteristics of grapevine in Ahvaz

    ‎INSERTION OF A CONTRA-CONTINUOUS FUNCTION BETWEEN TWO ‎‎COMPARABLE CONTRA-α\alpha-CONTINUOUS (CONTRA-CC-CONTINUOUS) FUNCTIONS

    Get PDF
    ‎A necessary and sufficient condition in terms of lower cut sets ‎are given for the insertion of a contra-continuous function ‎between two comparable real-valued functions on such topological ‎spaces that kernel of sets are open‎.

    The Role of Immune System in Thalassemia Major: A Narrative Review

    Get PDF
    Abstract Context: Thalassemia is a genetic disorder of hemoglobin production. Patients with thalassemia major (TM) require regular blood transfusions to keep a compatible hemoglobin level for oxygenating organs. These patients suffer from different complications such as infections, autoimmunity and alloimmunization due to transfusion. Such complications link the immune system to TM pathogenesis. In the present study, we have reviewed the latest data available on interactions of TM pathophysiologic determinants and immune system components. Evidence Acquisition: A comprehensive search was performed on PubMed, Scopous, and Web of Knowledge databases using keywords thalassemia, immune system, autoimmune, alloimmune, adaptive immunity, innate immunity, complications, and immunesenescnce. Results: It seems that persistent antigenic stimulation and oxidative stress from excessive iron are the 2 main pathophysiologic factors of TM impacting the immune system. Regarding innate immunity, functional activity of neutrophils, and natural killer cells (NKCs) is decreased in TM. On the other hand, higher levels of TNF-α and IL-1β, IL-6, IL-8, and C-reactive protein proinflammatory cytokines have been observed in the serum of patients. TM patients have demonstrated higher ratios of regulatory B lymphocytes (CD19+, CD38+, CD24+), helper T cells, suppressor T cells, and T regulatory (CD4+/CD25+/Foxp3+) lymphocytes. TM patients have shown significant higher levels of IgA immunoglobin respective to normal counterparts that may predispose them to diabetes and coeliac disease. Immune cells, however, rendered lower than optimal activity in TM patients, which may be due to nutritional insuf- ficiencies. Potential relationships have been suggested between immune system and various thalassemia compilations including heart infraction, hypertension, atherosclerosis, diabetes, thyroid dysfunction, and osteoporosis. Conclusions: Immune genetic determinants may be involved in modulating the clinical picture of TM. TM patients generally represents with higher immune cell counts, likely as a result of persistent antigenic challenge from blood transfusions. However, these patients face compromised immune cell functions. The role of immunologic interactions in pathogenesis of TM needs to be further divulged in future studies

    Bleeding Episodes Among Patients with Congenital Fibrinogen Disorders, a Study On 12 New Iranian Patients

    Get PDF
    Background: Congenital fibrinogen disorders (CFDs) comprise about 10% of rare bleeding disorders (RBDs). CFDs are divided into two groups of quantitative (afibrinogenemia and hypofibrinogenemia) with autosomal recessive inheritance pattern, and qualitative (dysfibrinogenemia, hypodysfibrogenemia) disorders, mainly with autosomal dominant inheritance pattern. Sistan and Baluchestan Province in Iran, with its high rate of consanguineous marriages, has a high incidence of RBDs including CFD. In the current study, we report clinical manifestations of patients with CFDs.Methods: Twelve new Iranian patients from Sistan and Baluchestan Province with different types of CFDs were selected for this study. Diagnosis of CFDs was based on clinical features and familial history followed by laboratory assessment by routine and specific coagulation tests including prothrombin time (PT) and activated partial time tests (APTT), as well as FI activity assay by Clauss method.Results: Out of 12 patients, 3(25%) had afibrinogenemia, 7(58.3%) had hypofibrinogenemia while 2(16/7%) were suspected of having dysfibrinogenemia. Although umbilical cord bleeding (UCB) 9(75%) was the most common clinical presentation among the study population, this feature was not observed among patients with dysfibrinogenemia. Hematoma (100%) was the most common presentation of patients with dysfibrinogenemia.  Conclusion: Results of this study revealed that some clinical presentations are the diagnostic features of CFDs and can be used for precise and in-time diagnosis CFDs in conjunction with family history and laboratory findings.Keywords: Fibrinogen Deficiency; Congenital Afibrinogenemia; Blood Coagulation Disorder; Afibrinogenemi

    Coagulation Factor XIII-A A614T gene Variation is Suggestive of Founder Effect in Iranian Patients with Severe Congenital Factor XIII Deficiency

    Get PDF
    Background: Factor XIII (FXIII) is a heterotetramer consisting of two subunits, FXIII-A and FXIII-B. Several common gene variations were observed in the FXIII-A gene with an obvious ethnic difference. This study assessed the prevalence of A614T as a common FXIII-A gene variation among Iranian patients with FXIII deficiency (FXIIID). Materials and Methods: This study was conducted on eighty Iranian unrelated individuals with FXIIID. Genotype analysis for FXIII-A A614T gene variation was performed for all individuals. Results: Molecular analysis of these Iranian populations revealed that all studied patients were homozygous for the T allele at codon 204 of the FXIII-A1 subunit. Conclusion: Present of T allele at codon 204 of FXIII-A1 subunit among all study population can be suggestive of founder effect. &nbsp

    Thrombin Activatable Fibrinolysis inhibitor Thr 325 Ile polymorphism in fetuses with factor XIII deficient family history and Intracranial hemorrhage

    Get PDF
    Background: Factor XIII Deficiency (FXIIID) is an inherited rare bleeding disorder with some life threatening clinical manifestation including Intracranial Haemorrhage (ICH). Among all polymorphisms found in FXIIID, Thrombin Activatable Fibrinolysis Inhibitor (TAFI) Thr325Ile gene polymorphism increases probability of ICH about 20 fold in patients with FXIII .So, in this study we aimed to evaluate TAFI Thr 325 Ile polymorphism in Chorionic villus samples (CVS) of fetuses with positive family history of FXIIID and ICH.Materials and Methods: This study was performed on chorionic villus of pregnant mothers ´ with positive history of FXIIID accompanied with ICH in first-degree relatives of their fetus. All parents of the fetuses were completed consent form for doing Prenatal diagnosis (PND). Chorionic villus DNA was extracted from each sample using the DNA extraction kit and PCR-RFLP was performed for TAFI Thr 325Ile polymorphism in Exon 4 of FXIII A gene.Results: All of 8 fetuses had positive family history of FXIIID. Seven out of eight fetuses (87.5%) had a family member with CNS bleeding due to FXIIID. Four fetuses had history of death due to FXIIID. There were 5 case (62.5%) that were homozygote for TAFI Thr 325 Ile, one (12.5%) was heterozygote and two (25%) were non mutant. Conclusion: Detection of TAFI Thr 325 Ile polymorphism by PND program in fetuses with positive family history of ICH is seems necessary and it will help to fill many gaps in preventing life threatening features of FXIIID in newborn at the time of delivery by prophilaxy receiving and precautionary measures

    Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol

    Get PDF
    In this paper, we analyze the security of AZUMI protocol which is compliant with the EPC-Class-1 Generation-2 standard and recently has been proposed by Peris \textit{et al.} This protocol is an improvement to a protocol proposed by Chen and Deng which has been cryptanalysed by Peris \textit{et al.} and Kapoor and Piramuthu. However, our security analysis clearly shows that the designers were not successful in their attempt to improve the Chen and Deng protocol. More precisely, we present an efficient attack to disclose the tag and the reader secret parameters. In addition, we present a simple tag impersonation attack against this protocol. The success probability of all attacks are almost ``1\u27\u27 and the cost of given attacks are at most eavesdropping two sessions of protocol. However, the given secrets disclosure attack also requires O(216)O(2^{16}) off-line evaluation of a PRNGPRNG function

    On the Security of RFID Anti Cloning Security Protocol(ACSP)

    Get PDF
    Recently Qian et al. have proposed a new attack for RFID systems, called counting attack, where the attacker just aims to estimate the number of tagged objects instead of steal the tags\u27 private information. They have stated that most of the existing RFID mutual authentication protocols are vulnerable to this attack. To defend against counting attack, they propose a novel Anti-Counting Security Protocol called ACSP. The designers of ACSP have claimed that their protocol is resistant against counting attack and also the other known RFID security threats. However in this paper we present the following efficient attacks against this protocol: 1) Tag impersonation attack: the success probability of attack is 1 while the complexity is two runs of protocol. 2) Two single tag de-synchronization attacks, the success probability of both attacks are 1 while the complexity is at most two runs of protocol. 3)Group of tags de-synchronization attack: this attack, which can de-synchronize all tags in the range at once, has success probability of 1 while its complexity is one run of protocol. 4) Traceability attack: the adversary\u27s advantage in this attack is almost 0.5 , which is almost the maximum of possible advantages for an adversary in the same model. The complexity of attack is three runs of protoco

    On the Traceability of Tags in SUAP RFID Authentication Protocols

    Get PDF
    Widespread adoption of RFID technology in all aspects of our life mainly depends on the fixing the privacy concerns of this technology\u27s customers. Using a tagged object should not lead to existence of the tracing possibility. This concern is a challenging issue that has motivated the researchers to propose several authentication protocols to fix the traceability problem in RFID systems and also provide other security requirements. In this paper, we analyze the security of three authentication protocols which have recently been proposed by Morshed et al. Our security analysis clearly highlights important security pitfalls in these protocols which leads to their vulnerability against traceability. The complexity of the proposed attacks are only several runs of the protocols while the adversary\u27s advantages to trace the tagged object are maximal
    corecore