Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 14 de 14
Filter
1.
Metabolites ; 13(11)2023 Nov 12.
Article in English | MEDLINE | ID: mdl-37999244

ABSTRACT

Salicylic acid (SA), benzothiadiazole (BTH), and methyl jasmonate (MeJA) are potential elicitors found in plants, playing a crucial role against various biotic and abiotic stresses. The systemic acquired resistance (SAR) mechanism was evaluated in cotton plants for the suppression of Cotton leaf curl Multan Virus (CLCuMuV) by the exogenous application of different elicitors. Seven different treatments of SA, MeJA, and BTH were applied exogenously at different concentrations and combinations. In response to elicitors treatment, enzymatic activities such as SOD, POD, CAT, PPO, PAL, ß-1,3 glucanse, and chitinase as biochemical markers for resistance were determined from virus-inoculated and uninoculated cotton plants of susceptible and tolerant varieties, respectively. CLCuMuV was inoculated on cotton plants by whitefly (Bemesia tabaci biotype Asia II-1) and detected by PCR using specific primers for the coat protein region and the Cotton leaf curl betasatellite (CLCuMuBV)-associated component of CLCuMuV. The development of disease symptoms was observed and recorded on treated and control plants. The results revealed that BTH applied at a concentration of 1.1 mM appeared to be the most effective treatment for suppressing CLCuMuV disease in both varieties. The enzymatic activities in both varieties were not significantly different, and the disease was almost equally suppressed in BTH-treated cotton plants following virus inoculation. The beta satellite and coat protein regions of CLCuMuV were not detected by PCR in the cotton plants treated with BTH at either concentration. Among all elicitors, 1.1 mM BTH was proven to be the best option for inducing resistance after the onset of CLCuMuV infection and hence it could be part of the integrated disease management program against Cotton leaf curl virus.

2.
Cureus ; 14(8): e27842, 2022 Aug.
Article in English | MEDLINE | ID: mdl-36110464

ABSTRACT

Background The etiologies of pancytopenia in the pediatric age group remain exceedingly ubiquitous and warrant extensive hematological and interventional investigations like bone marrow biopsy. It varies widely from benign nutritional disorders to fatal malignancies. The present study aims to delineate the prevalence of various causes of pancytopenia in the pediatric population. Methods The present cross-sectional study included 96 patients between the age of one month till 15 years with pancytopenia. Study participants were evaluated for various parameters including their demographical details, clinical features, immunization history, and nature of the disorder. The prevalence of various etiologies (nutritional, neoplastic, infectious, autoimmune, and others) of pancytopenia was ascertained. Results Of the 96 patients, 42 (43.75%) were males with a mean age of 69.47 ± 7.12 months. Fever was present in 71.87%, arthralgias in 56.25%, weight loss in 35.41%, and failure to thrive in 18.75% of patients. The bone marrow examination revealed aplastic changes in 36 (37.50%), hyperplastic changes in 21 (21.87%), and normal cellularity in 40.62% of patients. Megaloblastic anemia was the most common nutritional cause of pancytopenia present in 21.85% of cases. Acute lymphoblastic leukemia (ALL) was the most prevalent neoplastic etiology present in 19.79% of patients. Aplastic anemia, miliary tuberculosis, parvovirus B19, and hemolytic anemia were other notable etiologies. Conclusion Megaloblastic anemia and infections like tuberculosis were common treatable etiologies of pancytopenia among the pediatric age group. ALL was the most common neoplastic etiology. Bone marrow biopsy remains crucial in elucidating the various neoplastic and nutritional etiologies of pancytopenia in children.

3.
Comput Intell Neurosci ; 2022: 2532497, 2022.
Article in English | MEDLINE | ID: mdl-35774444

ABSTRACT

Schizophrenia is a multifaceted chronic psychiatric disorder that affects the way a human thinks, feels, and behaves. Inevitably, natural randomness exists in the psychological perception of schizophrenic patients, which is our primary source of inspiration for this research because true randomness is the indubitably ultimate valuable resource for symmetric cryptography. Famous information theorist Claude Shannon gave two desirable properties that a strong encryption algorithm should have, which are confusion and diffusion in his fundamental article on the theoretical foundations of cryptography. Block encryption strength against various cryptanalysis attacks is purely dependent on its confusion property, which is gained through the confusion component. In the literature, chaos and algebraic techniques are extensively used to design the confusion component. Chaos- and algebraic-based techniques provide favorable features for the design of the confusion component; however, researchers have also identified potential attacks on these techniques. Instead of existing schemes, we introduce a novel methodology to construct cryptographic confusion component from the natural randomness, which are existing in the psychological perception of the schizophrenic patients, and as a result, cryptanalysis of chaos and algebraic techniques are not applicable on our proposed technique. The psychological perception of the brain regions was captured through the electroencephalogram (EEG) readings during the sensory task. The proposed design passed all the standard evaluation criteria and validation tests of the confusion component and the random number generators. One million true random bits are assessed through the NIST statistical test suite, and the results proved that the psychological perception of schizophrenic patients is a good source of true randomness. Furthermore, the proposed confusion component attains better or equal cryptographic strength as compared to state-of-the-art techniques (2020 to 2021). To the best of our knowledge, this nature of research is performed for the first time, in which psychiatric disorder is utilized for the design of information security primitive. This research opens up new avenues in cryptographic primitive design through the fusion of computing, neuroscience, and mathematics.


Subject(s)
Algorithms , Mental Disorders , Electroencephalography , Humans
4.
Comput Intell Neurosci ; 2022: 8338508, 2022.
Article in English | MEDLINE | ID: mdl-35634082

ABSTRACT

The protection of confidential information is a global issue, and block encryption algorithms are the most reliable option for securing data. The famous information theorist, Claude Shannon, has given two desirable characteristics that should exist in a strong cipher which are substitution and permutation in their fundamental research on "Communication Theory of Secrecy Systems." block ciphers strictly follow the substitution and permutation principle in an iterative manner to generate a ciphertext. The actual strength of the block ciphers against several attacks is entirely based on its substitution characteristic, which is gained by using the substitution box (S-box). In the current literature, algebraic structure-based and chaos-based techniques are highly used for the construction of S-boxes because both these techniques have favourable features for S-box construction but also various attacks of these techniques have been identified including SAT solver, linear and differential attacks, Gröbner-based attacks, XSL attacks, interpolation attacks, XL-based attacks, finite precision effect, chaotic systems degradation, predictability, weak randomness, chaotic discontinuity, and limited control parameters. The main objective of this research is to design a novel technique for the dynamic generation of S-boxes that are safe against the cryptanalysis techniques of algebraic structure-based and chaos-based approaches. True randomness has been universally recognized as the ideal method for cipher primitives design because true random numbers are unpredictable, irreversible, and unreproducible. The biggest challenge we faced during this research was how can we generate the true random numbers and how can true random numbers utilized for strengthening the S-box construction technique. The basic concept of the proposed technique is the extraction of true random bits from underwater acoustic waves and to design a novel technique for the dynamic generation of S-boxes using the chain of knight's tour. Rather than algebraic structure- and chaos-based techniques, our proposed technique depends on inevitable high-quality randomness which exists in underwater acoustics waves. The proposed method satisfies all standard evaluation tests of S-boxes construction and true random numbers generation. Two million bits have been analyzed using the NIST randomness test suite, and the results show that underwater sound waves are an impeccable entropy source for true randomness. Additionally, our dynamically generated S-boxes have better or equal strength, over the latest published S-boxes (2020 to 2021). According to our knowledge first time, this type of research has been conducted, in which natural randomness of underwater acoustic waves has been used for the construction of block cipher's substitution box.


Subject(s)
Acoustics , Algorithms , Information Theory
5.
Front Genet ; 13: 1104635, 2022.
Article in English | MEDLINE | ID: mdl-36712883

ABSTRACT

Citrus viroid infection is emerging as a serious threat because of its efficient systemic movement within the host plant and its quick spread due to contaminated pruning tools. A survey was conducted to investigate the primary distribution and molecular characterization of Citrus bent leaf viroid (CBLVd) and its variants in different citrus cultivars. A total of 154 symptomatic citrus samples were collected and detected by RT‒PCR with newly designed specific primers with the incidence of 36.33%. During biological indexing study on Etrog citron, expressions of reduced leaf size, yellowing with a light green pattern, and bending were observed. Amplified products were sequenced and analyzed using a nucleotide BLAST search, which showed 98% homology with other CBLVd isolates. The results of the phylogenetic tree analysis showed the presence of two main groups (A and B), with the predominant variants of CBLVd, i.e., CVd-I-LSS (Citrus viroid Low Sequence Similarity) sequences, clustering in subgroup A1 along with newly detected CVd-I-LSS from Palestinian sweet lime (Citrus limettioides), which has been identified as a new host of CVd-I-LSS in Pakistan. Further analysis of the sequences in subgroup A1 showed that the variant of CVd-I-LSS infecting citrus cultivars had a close relationship with isolates reported from China, Japan, and Iran, which may have resulted from the exchange of planting material. This study also unveiled the variability in nucleotide sequences of CBLVd, which made it unable to be detected by old primers. The results of this study indicate that the widespread presence of divergent variants of CBLVd is a major concern for the citrus industry in Pakistan and other countries where virulent isolates of CBLVd are prevalent. These findings suggest the need for future research on effective management and quarantine measures to stop the spread of CBLVd.

6.
Sensors (Basel) ; 21(13)2021 Jun 30.
Article in English | MEDLINE | ID: mdl-34209456

ABSTRACT

Monitoring of an underwater environment and communication is essential for many applications, such as sea habitat monitoring, offshore investigation and mineral exploration, but due to underwater current, low bandwidth, high water pressure, propagation delay and error probability, underwater communication is challenging. In this paper, we proposed a sensor node clustering technique for UWSNs named as adaptive node clustering technique (ANC-UWSNs). It uses a dragonfly optimization (DFO) algorithm for selecting ideal measure of clusters needed for routing. The DFO algorithm is inspired by the swarming behavior of dragons. The proposed methodology correlates with other algorithms, for example the ant colony optimizer (ACO), comprehensive learning particle swarm optimizer (CLPSO), gray wolf optimizer (GWO) and moth flame optimizer (MFO). Grid size, transmission range and nodes density are used in a performance matrix, which varies during simulation. Results show that DFO outperform the other algorithms. It produces a higher optimized number of clusters as compared to other algorithms and hence optimizes overall routing and increases the life span of a network.


Subject(s)
Algorithms , Wireless Technology , Cluster Analysis , Computer Simulation , Computer Systems
7.
Sci Rep ; 11(1): 14282, 2021 07 12.
Article in English | MEDLINE | ID: mdl-34253755

ABSTRACT

Block cipher has been a standout amongst the most reliable option by which data security is accomplished. Block cipher strength against various attacks relies on substitution boxes. In literature, extensively algebraic structures, and chaotic systems-based techniques are available to design the cryptographic substitution boxes. Although, algebraic and chaotic systems-based approaches have favorable characteristics for the design of substitution boxes, but on the other side researchers have also pointed weaknesses in these approaches. First-time multilevel information fusion is introduced to construct the substitution boxes, having four layers; Multi Sources, Multi Features, Nonlinear Multi Features Whitening and Substitution Boxes Construction. Our proposed design does not hold the weakness of algebraic structures and chaotic systems because our novel s-box construction relies on the strength of true random numbers. In our proposed method true random numbers are generated from the inevitable random noise of medical imaging. The proposed design passes all the substitution box security evaluation criteria including Nonlinearity, Bit Independence Criterion (BIC), Strict Avalanche Criterion (SAC), Differential Approximation Probability (DP), Linear Approximation Probability (LP), and statistical tests, including resistance to Differential Attack, Correlation Analysis, 2D, 3D histogram analysis. The outcomes of the evaluation criteria validate that the proposed substitution boxes are effective for block ciphers; furthermore, the proposed substitution boxes attain better cryptographic strength as compared to very recent state-of-the-art techniques.

8.
Biotechniques ; 70(4): 202-208, 2021 04.
Article in English | MEDLINE | ID: mdl-33512241

ABSTRACT

Resistance is induced in cotton plants as the result of either viral infection or exogenous application of elicitors. Induced resistance can be evaluated by determining the production of ß-1,3-glucanase and chitinase in plants as a biochemical parameter. The assays being used for the determination of chitinase and ß-1,3-glucanase activity are laborious and not cost-effective, as the reducing sugars produced by the substrates colloidal chitin and laminarin are very expensive. The concentration of both substrates was standardized and reduced to 0.25% from 4% in a modified microplate assay, which appeared to be more effective. The amount of ß-1,3-glucanase and chitinase produced was significant and determined by the new modified assay. The sensitivity of the microplate assay was significantly raised approximately one- to twofold.


Subject(s)
Chitinases , Glucan 1,3-beta-Glucosidase , Chitin , Gossypium
9.
Sensors (Basel) ; 20(1)2019 Dec 19.
Article in English | MEDLINE | ID: mdl-31861637

ABSTRACT

Flying ad hoc network (FANET) is a self-organizing wireless network that enables inexpensive, flexible, and easy-to-deploy flying nodes, such as unmanned aerial vehicles (UAVs), to communicate among themselves in the absence of fixed network infrastructure. FANET is one of the emerging networks that has an extensive range of next-generation applications. Hence, FANET plays a significant role in achieving application-based goals. Routing enables the flying nodes to collaborate and coordinate among themselves and to establish routes to radio access infrastructure, particularly FANET base station (BS). With a longer route lifetime, the effects of link disconnections and network partitions reduce. Routing must cater to two main characteristics of FANETs that reduce the route lifetime. Firstly, the collaboration nature requires the flying nodes to exchange messages and to coordinate among themselves, causing high energy consumption. Secondly, the mobility pattern of the flying nodes is highly dynamic in a three-dimensional space and they may be spaced far apart, causing link disconnection. In this paper, we present a comprehensive survey of the limited research work of routing schemes in FANETs. Different aspects, including objectives, challenges, routing metrics, characteristics, and performance measures, are covered. Furthermore, we present open issues.

10.
Sensors (Basel) ; 18(5)2018 May 03.
Article in English | MEDLINE | ID: mdl-29751536

ABSTRACT

Flying ad-hoc networks (FANETs) are a very vibrant research area nowadays. They have many military and civil applications. Limited battery energy and the high mobility of micro unmanned aerial vehicles (UAVs) represent their two main problems, i.e., short flight time and inefficient routing. In this paper, we try to address both of these problems by means of efficient clustering. First, we adjust the transmission power of the UAVs by anticipating their operational requirements. Optimal transmission range will have minimum packet loss ratio (PLR) and better link quality, which ultimately save the energy consumed during communication. Second, we use a variant of the K-Means Density clustering algorithm for selection of cluster heads. Optimal cluster heads enhance the cluster lifetime and reduce the routing overhead. The proposed model outperforms the state of the art artificial intelligence techniques such as Ant Colony Optimization-based clustering algorithm and Grey Wolf Optimization-based clustering algorithm. The performance of the proposed algorithm is evaluated in term of number of clusters, cluster building time, cluster lifetime and energy consumption.

11.
Ann Noninvasive Electrocardiol ; 18(1): 58-68, 2013 Jan.
Article in English | MEDLINE | ID: mdl-23347027

ABSTRACT

BACKGROUND: Atrial fibrillation/flutter (AF) is a common complication of open heart surgery and ACC/AHA guidelines strongly recommend the use of prophylactic beta-blockers (BB) for its prevention. Several recent studies, however, have failed to show the desired protective effects of BB against post-coronary artery bypass grafting (CABG) AF. As the protocols of CABG, medical management of CAD (coronary artery disease) and demographic features of the patients undergoing open heart surgery have evolved significantly over the last two decades, we decided to perform a review of evidence from latest randomized controlled trials (RCTs) to confirm the efficacy of prophylactic BB. METHODS: We searched for RCTs comparing the efficacy of prophylactic BB versus placebo/control against post-CABG AF. We limited our search to 1995 till present to reflect ongoing advancements in the protocols of CABG and the medical management of CAD. Initially, 34 trials were selected; however after certain exclusions only 10 RCTs were included in the final analysis. RESULTS: Prophylactic BB decreased the incidence of post-CABG AF from 32.8% in the control group to 20% in the prophylactic group with risk ratio (RR) of 0.50 with 95% CI of 0.36-0.69, P value < 0.001. In a subgroup analysis, carvedilol appears to be superior to metoprolol for the prevention of postoperative AF. CONCLUSIONS: Despite several limitations, this analysis confirms the efficacy of prophylactic BB against post-CABG AF in this era. We recommend continuing perioperative BB in the open heart surgery patients in the absence of contraindications.


Subject(s)
Adrenergic beta-Antagonists/therapeutic use , Atrial Fibrillation/etiology , Atrial Fibrillation/prevention & control , Coronary Artery Bypass/adverse effects , Humans , Practice Guidelines as Topic , Randomized Controlled Trials as Topic
12.
Heart Fail Rev ; 18(2): 207-17, 2013 Mar.
Article in English | MEDLINE | ID: mdl-22610359

ABSTRACT

Obesity is a growing worldwide problem and the prevalence of heart failure is also on the rise. Obesity itself is an independent risk factor for the development of heart failure and the case of obesity-related heart failure is thought to be multifactorial. Obesity leads to increased central and total blood volumes along with decreased systemic arterial resistance resulting in high cardiac output state related adaptations in the cardiac structure. Persistence of these hemodynamic changes ultimately results in diastolic dysfunction, however, whether these changes progress to significant systolic dysfunction or not is doubtful. Some MUGA (Multi Gated Acquisition) scan-based studies had shown mild degree of left ventricular systolic dysfunction in the obese, however, these findings could not be confirmed with recent echocardiogram-based studies. Using extensive literature review, we found no evidence of obesity-related cardiomyopathy leading to significant systolic dysfunction fulfilling criterion for the diagnosis of dilated cardiomyopathy (LVEF <35 %). Therefore, any obese patient presenting with severe LV dysfunction should prompt further investigations to evaluate for the underlying etiology.


Subject(s)
Cardiomyopathy, Dilated/etiology , Heart Failure/etiology , Heart/physiopathology , Obesity/complications , Systole/physiology , Ventricular Dysfunction, Left/etiology , Cardiomyopathy, Dilated/diagnostic imaging , Echocardiography , Heart Failure/diagnostic imaging , Heart Failure/physiopathology , Humans , Obesity/diagnostic imaging , Obesity/physiopathology , Risk Factors , Ventricular Dysfunction, Left/diagnostic imaging
13.
Int J Cardiol ; 166(2): 315-20, 2013 Jun 20.
Article in English | MEDLINE | ID: mdl-22652039

ABSTRACT

BACKGROUND: We describe our experience of the case of a young female who presented with chest pain and was found to have an intra-pericardial mass that was later confirmed to be a paraganglioma. Although preoperative magnetic resonance imaging (MRI) did not show any left atrial invasion, the patient died in the peri-operative period due to irreparable damage of the cardiac structures from extensive neoplastic invasion. We then performed a retrospective analysis of the available literature to find the factors associated with adverse surgical and long-term outcomes in patients with cardiac paraganglioma. METHODS: We found 93 case reports of cardiac and/or pericardial paragangliomas in the literature. After exclusions, 82 cases were included in the final analysis. The patients were divided into two groups based on the outcome of surgical management. Univariate analysis was performed using SPSS software (Chicago, IL version 18), and the statistical significance was defined as a p-value<0.05. RESULTS AND CONCLUSIONS: The comparison of available demographic, clinical, pathological and laboratory parameters between the deceased and the surviving patients revealed that only the intra-cardiac location (p-value=0.021) and the development of metastases (p-value<0.001) were independently associated with increased surgical and long-term mortality, respectively. The size of a paraganglioma, its functional status or invasion into the surrounding structures does not appear to affect short-or long-term survival in these patients. The Kaplan-Meier survival curve showed excellent long-term prognosis for patients with a complete surgical removal of the neoplasm. Based on our experience, we also suggest preoperative imaging with a three dimensional cardiac CT and evaluation for cardiac transplantation before embarking on the surgical resection of these tumors.


Subject(s)
Ganglioglioma/diagnosis , Ganglioglioma/surgery , Heart Neoplasms/diagnosis , Heart Neoplasms/surgery , Adult , Female , Humans , Prognosis , Time Factors , Treatment Outcome
SELECTION OF CITATIONS
SEARCH DETAIL
...