4,540 research outputs found

    Induction of Prostaglandin Release from Macrophages by Bacterial Endotoxin

    Get PDF
    This review summarizes the role of the monocytic responses to lipopolysaccharide as it relates to periodontal disease severity. Data are presented which illustrate that the levels of prostaglandin E2 (PGE2) secreted by systemic peripheral blood monocytes in culture, in the presence of bacterial endotoxins, are highly correlated with the levels observed in the gingival crevicular fluid. Furthermore, the different periodontal diagnostic categories have varying levels of monocytic and crevicular fluid PGE2, in juxtaposition with clinical disease severity. These data are consistent with the concept that there is close synchrony between the systemic responsiveness of peripheral blood monocytes with regard to prostanoid synthesis and the local levels of mediator present within the gingival crevic

    Structured light techniques for 3D surface reconstruction in robotic tasks

    Get PDF
    Robotic tasks such as navigation and path planning can be greatly enhanced by a vision system capable of providing depth perception from fast and accurate 3D surface reconstruction. Focused on robotic welding tasks we present a comparative analysis of a novel mathematical formulation for 3D surface reconstruction and discuss image processing requirements for reliable detection of patterns in the image. Models are presented for a parallel and angled configurations of light source and image sensor. It is shown that the parallel arrangement requires 35\% fewer arithmetic operations to compute a point cloud in 3D being thus more appropriate for real-time applications. Experiments show that the technique is appropriate to scan a variety of surfaces and, in particular, the intended metallic parts for robotic welding tasks

    Charge Transfer in Light Effect Under Visible Radiation in an Ozoniser Discharge

    Get PDF
    Two fresh discharge vessels (1 and 2) of Siemen’s ozoniser type having the same height butdifferent surface-to-volume ratios have been fabricated by enclosing argon at 10 mm mercury.By immersing these in electrolytic solution and by subjecting these to a definite high 50 Hz acvoltage, the discharge count rates in dark (Cf )D and under light (Cf )L have been determinedusing a scaler held at different bias-voltages. The plot of the ratio (C1f / C2f )D and (C1f / C2f )Lof discharge counts versus pulse height (bias-voltage) shows that this ratio for a constantpotential of 3.5 kV (rms) is initially large in value, then rapidly decreases to a minimum. It is alsoobserved that more is the surface-to-volume ratio, more is the magnitude of net effect of irradiation.Further, the pulse height analysis shows that the charge carried by the pulses to the electrodes(charge transfer) decreases under illumination. A possible mechanism to explain the net effectof the discharge current ratio in the light of pulse height measurements is discussed

    Landing of ‘Flying Gurnard’ in Mumbai

    Get PDF
    A rare fish ‘flying gurnard’ was landed by a trawler operating in 70-100 m depth in the sea off Mumbai. The species was identified as Dactyloptena peterseni (Nystrom, 1887) and it is reported for the first time along the Indian coast

    Investigation of Electrical and Dielectric Properties of "Modified" Iron Titanates

    Get PDF

    Challenges in Internet of Things Applications

    Get PDF
    IoT (Internet of Things) is a system where objects are embedded with sensor technology to interact with each other over a wireless communication medium to generate, exchange and transfer data without human interaction. Now Internet of Things(IoT) is getting so much popular than any other trending topic. Up to our best knowledge, it is the first study about vulnerabilities in the application of the Internet of Things. IoT is also getting industrialized using sensors in a simple work also for sake of ease of working and computation but no one thinks about its vulnerabilities and drawback which can affect in future and may result in a leak of private details breaking privacy of the whole world. In this paper, we will talk about all these vulnerabilities and drawbacks of the Internet of Things with a lot of examples
    corecore