ABSTRACT\nBackground: Several ocular diseases are related with ultraviolet (UV) induced oxidative stress. We have shown that a sesamin derivative, 3-bis (3-methoxybenzyl)-butane-1,4-diol, (BBD) was a potent antioxidant. Therefore, the protect effect of BBD was tested on the UV-irradiated human adult retinal pigment epithelial cells (ARPE-19). Methods: The cells were pre-incubated with the BBD for 24 h before radiation with UV light (100 MJ) and the cell viability was measured by MTT and lactate dehydrogenase (LDH) assays. Cell apoptosis and reactive oxygen species (ROS) generation were determined. Protein expressions of MAPKs, caspase-3, and Bax were analyzed by Western blotting. Results: The results showed that the UV-decreased cell viability was significantly reduced by BBD pretreatment dose-dependently. The protection from UV-induced apoptosis was related with reduction of MAPK signaling pathways by BBD pretreatment, dose-dependently. \nConclusions: The results suggest a role of BBD for prevention of retinal diseases associated with UV-induced oxidative stress such as age-related macular degeneration (AMD) disease.
study of clinical biomechanic of injured instrument vertebral column is restricted to\nqualitative consideration. Recently with helping Finite Element Method studies are done. Quantitative\ninstrument evaluation injured instrument vertebral column have got new shape. At most of the\nbiomechanical studies are done on the evaluation stability of implants and vertebral column (instrument), so\nfor determining any stress distribution, in this research five pieces of posterior spinal implants system\nevaluated stress distribution,maximum von mises stress and displacement with using Finite Element Method\nand ANSYS software which including: Cotrel Dubousset Horizon, pedicular screw, made of medical\ntitanium, pedicular screw, made of medical stainless steel, Cotrel Dubousset Horizon, laminar hook,\npedicular hook, device for transvers traction, DTT hook and connecting rod , that all of them were made\nfrom medical titanium , in conditions without vertebra and in all loading conditions similar to biomechanic\nloading include: axial compression, flexion, lateral bending and axial rotation. In this research, quasi static\nsafety factor of fixation devices determined between 3 to 6, so results of this study show that maximum\nVon Mises stress, at all loading conditions happen on the neck of the pedicular screws, in the blade of the\nhook and in the middle of the rod.
Ad hoc networks provide flexible and adaptive networks with no fixed infrastructure and dynamic topology. Owe to the vulnerability nature of ad hoc network, there are lots of security threats that diminish the development of ad hoc networks. Therefore, to provide security for information of users and to preserve their privacy, it becomes mandatory to use cryptographic techniques to set up secure mobile ad hoc network. Earlier cryptographic method based on computational complexity ruins with the advent of fast computing computers. In this proposal, we proposed Secure Key Management (SKM) framework. We make use of McEliece algorithm embedded with Dispense Key designed for key generation and for the key distribution, and it is highly scalable with respect to memory. The experimental result shows that our framework provides a high-performance platform to execute key generation, key distribution scenarios. SKM framework reduces execution time of encryption and decryption by minimizing the number of keys.
Echinacea purpurea (L.) Moench, is a perennial plant, native to North America, from which there air used in therapeutic purpose the aerial parts and the roots. The aerial parts contains flavonoides, polyphenolic acid, coffee acid, volatile oil etc. The medicine prepared from this plant determines the rise of self defense system of the human body ( by mobilizing the leukocytes and extending the phagocytosis activity and inhibits virus multiplication). During 2010 – 2012 at SCDA Secuieni researches were conducted to establish the optimum doses of muck and its influence over the herba production and active principles content in Echinacea purpurea L. (Moench). The results indicated that the optimum variant was the one fertilized with 40t/ha fermented muck. In this variant the dry herba production obtained during three vegetation years were 39.14 g/ha in the second year, 72.13 g/ha in the third year and 74.02 q/ha in the fourth year. The highest coffee acid content (79.7 mg/100ml tincture) was determined in leaves from plants fertilized with 30t/ha muck and the highest content in polyphenolic acid (2.657 g clorogenic acid) was determined in flowers from plants fertilized with 40t/ha muck.
Security estimation is an integral part of risk management process which provides a strong mechanism to control and integrate security features for valuable opinion at design phase. Authentication quantification model (ACQM) has been developed in this paper by correlating authentication security attributes with complexity factors. The developed model has been validated with realistic data (small set). Its statistical analysis suggests models acceptability.
Rule acquisitions in ontology based systems are become very popular in different research areas and applications. The use of ontology based acquisition tool is used to bring together knowledge of experts from different disciplines. Evaluating semantic relatedness from the web is a problem with a long history in artificial intelligence. This paper presents a new measure for the evaluation of semantic similarity from the web by exploiting ontology based RuleToOnto (Rule acquisition procedure). We introduce automatic rule acquisition screening method that intends to automatically screen the exact parts of web page that contain rules. The main idea of our proposed scheme is to acquire the rules from several sites of the various domains. The sites have similar web pages explaining similar rules from each other. Our proposed work desires to acquire rules from a site by using similar rules of other sites in the various domains. By implementing this proposed scheme, we can develop an automatic rule acquisition measure through information about rules, which overcome the limitation done by knowledge engineer. Experimental lessons demonstrate that semantic rules in conjunction with ontology can acquire knowledge from various domains more accurately and efficiently.
The validation in design phase of software engineering is important for the continuing advancement of both design theory and the professional practice of engineering. Validation processes are required by the researcher in design phase to guide the development and evaluation of new methods. In this paper the researcher validates developed metrics and models. MATLAB software is used for the calculation of proposed metrics and models. A systematic pre-tryout validation is carried out for the proposed CEM and REM models for reliability estimation of an object oriented design. Furthermore, reliability improvement guidelines (RIG-OOD) are also validated systematically for testing the usefulness of the models for reliability estimation of an object oriented design. For pre tryout validation a case study on an OSCAR object oriented design is carried out in this paper. Various figures and tables were generated for the object oriented design. The result of the metric values prior to the RIG-OOD treatment and after RIG- OOD treatment indicates that the reliability improvement guidelines effectively minimized the complexity of object oriented design and improve the reliability of an object oriented design. A successful pre tryout leads us for the next step i.e. tryout.
Numerous users use World Wide Web (WWW) as their default resource for obtaining knowledge and many organization need to empathize their customer’s preference, behavior and future need to improve their business. Web usage mining is a part of web mining and an active research topic. The main goal is to find, model and analyze the behavioral pattern of the users. The captured patterns are represented as a collection of objects, or as pages, which are frequently used or accessed by a set of users having common interest. Enormous outstanding techniques have been developed to improve the extraction process. This paper presents a survey of recent methodologies in the field of web mining.