2,017 research outputs found

    Constraints in Adoption of Recommended Cultivation Practices of Medicinal Plant Growers

    Get PDF
    The objective of this study is to identify the constraints faced by medicinal plant growers in adoption of recommended cultivation practices. The present investigation was conducted in Tiruvannamalai district of Tamil Nadu state. A total of 120 respondents were selected randomly by proportionate random sampling method and  ere interviewed personally with the help of a structured interview schedule. The collected data were processed and statistically analyzed. Major constraints experienced by the medicinal plant growers were improper availability of seed/planting material, high cost of labour, lack of fixed price policy for medicinal plants by the government and lack of processing industries

    On proper Hamiltonian-connection number of graphs

    Get PDF
    A graph G is Hamiltonian-connected if every two vertices of G are connected by a Hamilton path. A bipartite graph H is Hamiltonian-laceable if any two vertices from different partite sets of H are connected by a Hamilton path. An edge-coloring (adjacent edges may receive the same color) of a Hamiltonian-connected (respectively, Hamiltonian-laceable) graph G (resp. H) is a proper Hamilton path coloring if every two vertices u and v of G (resp. H) are connected by a Hamilton path Puv such that no two adjacent edges of Pᵤᵥ are colored the same. The minimum number of colors in a proper Hamilton path coloring of G (resp. H) is the proper Hamiltonian-connection number of G (resp. H). In this paper, proper Hamiltonian-connection numbers are determined for some classes of Hamiltonian-connected graphs and that of Hamiltonian-laceable graphs.Publisher's Versio

    Development of an LH receptor assay capable of measuring serum LH/CG in a wide variety of species

    Get PDF
    The development of a radioreceptor assay (RRA) that can measure serum LH in a variety of species and CG in sera and urine of pregnant women and monkeys is reported. Using sheep luteal membrane as the receptor source and 125I-labelled hLH/hCG as the tracer, dose-response (displacement) curves were obtained using hLH or hCG as standard. The addition of LH-free serum (200 μl per tube) had no affect on the standard displacement curve. The assay is simple, requires less than 90 min to complete and provides reproducible results. The sensitivity of the assay was 0.6 ng hLH per tube and the intra- and interassay variations were 9.6 and 9.8, respectively. Sera obtained from male and female bonnet monkeys (Macaca radiata) and monkey pituitary extract showed parallelism to the standard curve. The concentrations of LH measured correlated with the physiological status of the animals. Sera of rats, rabbits, hamsters, guinea-pigs, sheep and humans showed parallelism to the hLH standard curve indicating the viability of the RRA to measure serum LH of different species. Since the receptors recognize LH and CG, detection of pregnancy in monkeys and women was possible using this assay. The sensitivity of the assay for hCG was 8.7 miu per tube. This RRA could be a convenient alternative to the Leydig cell bioassay for obtaining the LH bioactivity profile of sera and biological fluids

    Differential sandwich theorems for certain subclasses of analytic functions

    Get PDF
    In this paper, we generalize the well known differential operator by using a generalized hypergeometric function. By applying this operator, we introduce a new class of non-Bazilević functions and derive subordination and superordination results for the class in the unit disk. Relevant connections of the results presented in this paper are also pointed out with various other known results

    AWARENESS AND USE OF ELECTRONIC INFORMATION RESOURCES BY FACULTY MEMBERS IN HIGHER EDUCATIONAL INSTITUTIONS OF HYDERABAD KARNATAKA REGION: A PILOT STUDY

    Get PDF
    The questionnaire was self designed and distributed through electronic form samples with randomly. The random samples contains of faculty members and staff. The complete questionnaires have been gathered from the respondents for the data analysis and interpretations. On the source of complete questionnaire the data has been analyzed and tabulated using SPSS software. For data scrutiny percentage technique, has been adopted. Due to small number of space significant results findings have been specified in brief. The current work was carried out during January to march 2017. Hence the present survey is enclosed to randomly selected population of geographically; this study is limited to the higher educational institutions, which covered universities, professional colleges and degree colleges, in HK area. But the scope of the study was restricted to selected of higher educational institutions in HK region, which including the backward districts of Bidar, Gulbarga, Yadagiri, Raichur, Koppal and Bellary. The questionnaire was distributed to 115 faculties random samples, out of which 79 (68.69%) respondents have responded. The similarity study will be promoted for further study covering other higher educational institutions of HK region to get more generalized and genuine findings. The discovered of the present study might be taken as the foreword findings from a pilot study. The paper highlights the essential survey findings in respect of internet awareness, use of library users towards the e-resources, which have been made available to their library. After to this, some authentic attributes by the respondents have also been coated and few propositions and recommendations have also been specified in to the point

    MITIGATING NODE ISOLATION ATTACK IN OLSR PROTOCOL USING DCFM TECHNIQUE

    Get PDF
    A Mobile Ad Hoc Network (MANET) is a collection of mobile devices which are connected by wireless links without the use of any fixed infrastructures or centralized access points. The Optimized Link State Routing (OLSR) protocol is an important proactive routing protocol designed for mobile ad hoc networks. It employs periodic exchange of messages to maintain topology information of the network at each node. Based on topology information, each node is able to calculate the optimal route to a destination. One major DoS attack against the Optimized Link State Routing protocol (OLSR) known as the node isolation attack occurs when topological knowledge of the network is exploited by an attacker who is able to isolate the victim from the rest of the network and subsequently deny communication services to the victim. The proposed method named Denial Contradictions with Fictitious Node Mechanism (DCFM) relies on the internal knowledge acquired by each node during routine routing, and augmentation of virtual (fictitious) nodes. Moreover, DCFM utilizes the same techniques used by the attack in order to prevent it. DCFM successfully prevents the attack, specifically in the realistic scenario in which all nodes in the network are mobile

    Not in the genotype: can unexplained hemophilia A result from “micro(RNA) management”?

    Full text link
    Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/154344/1/trf15668_am.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/154344/2/trf15668.pd

    Therapeutic evaluation of homeopathic treatment for canine oral papillomatosis

    Get PDF
    Aim: A study was conducted to evaluate the ameliorative potential of homeopathic drugs in combination (Sulfur 30C, Thuja 30C, Graphites 30C, and Psorinum 30C) in 16 dogs affected with oral papillomatosis which was not undergone any previous treatment. Materials and Methods: Dogs affected with oral papillomatosis, which have not undergone any initial treatment and fed with a regular diet. Dogs (total=16) were randomly divided into two groups, namely, homeopathic treatment group (n=8) and placebo control group (n=8). Random number table was used for allocation. Homeopathic combination of drugs and placebo drug (distilled water) was administered orally twice daily for 15 days. Clinical evaluation in both groups of dogs was performed by the same investigator throughout the period of study (12 months). Dogs were clinically scored for oral lesions on days 0, 5, 7, 10, 15, 20, 25, 30, 45, 60, 90, 120, and 150 after initiation of treatment. Results: The homeopathic treatment group showed early recovery with a significant reduction in oral lesions reflected by clinical score (p<0.001) in comparison to placebo-treated group. Oral papillomatous lesions regressed in the homeopathic group between 7 and 15 days, whereas regression of papilloma in the placebo group occurred between 90 and 150 days. The homeopathic treated group was observed for 12 months post-treatment period and no recurrence of oral papilloma was observed. Conclusion: The current study proves that the combination of homeopathy drugs aids in fastening the regression of canine oral papilloma and proved to be safe and cost-effective

    Block Codes on Pomset Metric

    Full text link
    Given a regular multiset MM on [n]={1,2,,n}[n]=\{1,2,\ldots,n\}, a partial order RR on MM, and a label map π:[n]N\pi : [n] \rightarrow \mathbb{N} defined by π(i)=ki\pi(i) = k_i with i=1nπ(i)=N\sum_{i=1}^{n}\pi (i) = N, we define a pomset block metric d(Pm,π)d_{(Pm,\pi)} on the direct sum Zmk1Zmk2Zmkn \mathbb{Z}_{m}^{k_1} \oplus \mathbb{Z}_{m}^{k_2} \oplus \ldots \oplus \mathbb{Z}_{m}^{k_n} of ZmN\mathbb{Z}_{m}^{N} based on the pomset P=(M,R)\mathbb{P}=(M,R). This pomset block metric d(Pm,π)d_{(Pm,\pi)} extends the classical pomset metric which accommodate Lee metric introduced by I. G. Sudha and R. S. Selvaraj, in particular, and generalizes the poset block metric introduced by M. M. S. Alves et al, in general, over Zm\mathbb{Z}_m. We find II-perfect pomset block codes for both ideals with partial and full counts. Further, we determine the complete weight distribution for (P,π)(P,\pi)-space, thereby obtaining it for (P,w)(P,w)-space, and pomset space, over Zm\mathbb{Z}_m. For chain pomset, packing radius and Singleton type bound are established for block codes, and the relation of MDS codes with II-perfect codes is investigated. Moreover, we also determine the duality theorem of an MDS (P,π)(P,\pi)-code when all the blocks have the same length.Comment: 17 Page
    corecore