Search results for: Kosuri Harshitha Durga
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 37

Search results for: Kosuri Harshitha Durga

7 Formulation and Anticancer Evaluation of Beta-Sitosterol in Henna Methanolic Extract Embedded in Controlled Release Nanocomposite

Authors: Sanjukta Badhai, Durga Barik, Bairagi C. Mallick

Abstract:

In the present study, Beta-Sitosterol in Lawsonia methanolic leaf extract embedded in controlled release nanocomposite was prepared and evaluated for in vivo anticancer efficacy in dimethyl hydrazine (DMH) induced colon cancer. In the present study, colon cancer was induced by s.c injection of DMH (20 mg/kg b.wt) for 15 weeks. The animals were divided into five groups as follows control, DMH alone, DMH and Beta Sitosterol nanocomposite (50mg/kg), DMH and Beta Sitosterol nanocomposite (100 mg/kg) and DMH and Standard Silymarin (100mg/kg) and the treatment was carried out for 15 weeks. At the end of the study period, the blood was withdrawn, and serum was separated for haematological, biochemical analysis and tumor markers. Further, the colonic tissue was removed for the estimation of antioxidants and histopathological analysis. The results of the study displays that DMH intoxication elicits altered haematological parameters (RBC,WBC, and Hb), elevated lipid peroxidation and decreased antioxidants level (SOD, CAT, GPX, GST and GSH), elevated lipid profiles (cholesterol and triglycerides), tumor markers (CEA and AFP) and altered colonic tissue histology. Meanwhile, treatment with Beta Sitosterol nanocomposites significantly restored the altered biochemicals parameters in DMH induced colon cancer mediated by its anticancer efficacy. Further, Beta Sitosterol nanocomposite (100 mg/kg) showed marked efficacy.

Keywords: nanocomposites, herbal formulation, henna, beta sitosterol, colon cancer, dimethyl hydrazine, antioxidant, lipid peroxidation

Procedia PDF Downloads 164
6 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 110
5 The Nature and Impacts of 2015 Indian Unofficial Blockade in Nepal

Authors: Jhabakhar Aryal, Kesh Bahadur Rana, Durga Prasad Neupane

Abstract:

This research analyzes the nature and impacts of the 2015 unofficial blockade in Nepal, a significant event that triggered an economic and humanitarian crisis. While official channels denied claims of involvement, Nepal perceived the blockade as orchestrated by India due to concerns about the newly adopted constitution and Madheshi infringements. The study adopts a qualitative approach, utilizing semi-structured interviews, document analysis, and content analysis to gather data from various perspectives. Employing a "colonial hangover lens," it investigates if colonial legacies continue to influence postcolonial nation dynamics, focusing on India's potential attempt to exert influence over Nepal. The findings suggest that the 2015 blockade had profound consequences for Nepal, potentially reflecting lingering colonial power dynamics in the region. Despite India's denials, a significant portion of Nepalis perceived the blockade as an act of external pressure. Examining these perceptions offers valuable insights into postcolonial relations and their impact on regional stability. The 2015 unofficial blockade serves as a critical case study in understanding the complex interplay of internal dynamics, external influences, and historical legacies in shaping the geopolitics of the region. This research contributes to a deeper understanding of these factors and their ongoing implications for Nepal and its relationship with India.

Keywords: blockade, unofficial, constitution, Madhesis, India, Nepal, postcolonial, regional stability, geopolitics

Procedia PDF Downloads 64
4 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector

Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar

Abstract:

Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.

Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability

Procedia PDF Downloads 185
3 Cost Benefit Analysis of Adoption of Climate Change Adaptation Options among Rural Rice Farmers in Nepal

Authors: Niranjan Devkota , Ram Kumar Phuya, Durga Lal Shreshta

Abstract:

This paper estimates cost and benefit of adoption of climate change adaptation options available to the rural rice farmers of Nepal. Adoption of adaptation strategies, intensity of use of adaptation options, identification of labor and non-labor cost and finally per unit cost and benefit analysis of climate change adaptation were made. Multi-stage sampling technique was used to source respondents for the study and used structured questionnaire techniques to collect data from 773 households from seven districts; 3 from Terai and 4 from Hilly region of Nepal. The result revealed that there are 13 major adaptation options rice farmers practice in order to protect themselves from climatic risk. Among the given adaptation options, the first three popular adaptation options practiced by rice farmers are (i) increasing use of chemical fertilizer (60.93%) (ii) use of climate smart verities (49.29%) and (iii) change in nursery date (32.08%). Adaptation cost is obvious, based on that, the first three costly adaptation options are the alternative irrigation practice which incurred average cost of US $69.95 (US$ 1 = 102.84 Nepalese Rupees) followed by a denser plantation of local seeds ($ 20.69) and using climate smart varieties ($ 18.06). 88% farmers practiced more than one adaptation strategies on the same farm with the aim of reducing the effect of extreme climatic conditions. Total cost and revenue revealed that per unit total cost ranges from $28.34 to $32.79 whereas per unit total revenue ranges $33.4 to $49.02. Surprisingly, it is observed that farmers who do not adopt any adaptation options are able to receive highest income from per unit production. As Net Present Value (NPV) is positive and Benefit Cost Ration (BCR) is greater than one for every adaptation options that indicates the available adaptation options are profitable to the rice farmers.

Keywords: climate change, adaptation options, cost benefit analysis, rural rice farmers, Nepal

Procedia PDF Downloads 264
2 Improving Search Engine Performance by Removing Indexes to Malicious URLs

Authors: Durga Toshniwal, Lokesh Agrawal

Abstract:

As the web continues to play an increasing role in information exchange, and conducting daily activities, computer users have become the target of miscreants which infects hosts with malware or adware for financial gains. Unfortunately, even a single visit to compromised web site enables the attacker to detect vulnerabilities in the user’s applications and force the downloading of multitude of malware binaries. We provide an approach to effectively scan the so-called drive-by downloads on the Internet. Drive-by downloads are result of URLs that attempt to exploit their visitors and cause malware to be installed and run automatically. To scan the web for malicious pages, the first step is to use a crawler to collect URLs that live on the Internet, and then to apply fast prefiltering techniques to reduce the amount of pages that are needed to be examined by precise, but slower, analysis tools (such as honey clients or antivirus programs). Although the technique is effective, it requires a substantial amount of resources. A main reason is that the crawler encounters many pages on the web that are legitimate and needs to be filtered. In this paper, to characterize the nature of this rising threat, we present implementation of a web crawler on Python, an approach to search the web more efficiently for pages that are likely to be malicious, filtering benign pages and passing remaining pages to antivirus program for detection of malwares. Our approaches starts from an initial seed of known, malicious web pages. Using these seeds, our system generates search engines queries to identify other malicious pages that are similar to the ones in the initial seed. By doing so, it leverages the crawling infrastructure of search engines to retrieve URLs that are much more likely to be malicious than a random page on the web. The results shows that this guided approach is able to identify malicious web pages more efficiently when compared to random crawling-based approaches.

Keywords: web crawler, malwares, seeds, drive-by-downloads, security

Procedia PDF Downloads 230
1 Charcoal Production from Invasive Species: Suggested Shift for Increased Household Income and Forest Plant Diversity in Nepal

Authors: Kishor Prasad Bhatta, Suman Ghimire, Durga Prasad Joshi

Abstract:

Invasive Alien Species (IAS) are considered waste forest resources in Nepal. The rapid expansion of IAS is one of the nine main drivers of forest degradation, though the extent and distribution of this species are not well known. Further, the knowledge of the impact of IAS removal on forest plant diversity is hardly known, and the possibilities of income generation from them at the grass-root communities are rarely documented. Systematic sampling of 1% with nested circular plots of 500 square meters was performed in IAS removed and non-removed area, each of 30 hectares in Udayapur Community Forest User Group (CFUG), Chitwan, central Nepal to observe whether the removal of IAS contributed to an increase in plant diversity. In addition, ten entrepreneurs of Udaypur CFUG, involved in the charcoal production, briquette making and marketing were interviewed and interacted as well as their record keeping booklets were reviewed to understand if the charcoal production contributed to their income and employment. The average annual precipitation and temperature of the study area is 2100 mm and 34 degree Celsius respectively with Shorea robusta as main tree species and Eupatorium odoratum as dominant IAS. All the interviewed households were from the ̔below-poverty-line’ category as per Community Forestry Guidelines. A higher Shannon-Weiner plant diversity index at regeneration level was observed in IAS removed areas (2.43) than in control site (1.95). Furthermore, the number of tree seedlings and saplings in the IAS harvested blocks were significantly higher (p < 0.005) compared to the unharvested one. The sale of charcoal produced through the pyrolysis of IAS in ̔ Bio-energy kilns’ contributed for an average increased income of 30.95 % (Nepalese rupees 31,000) of the involved households. Despite above factors, some operational policy hurdles related to charcoal transport and taxation existed at field level. This study suggests that plant diversity could be increased through the removal of IAS, and considerable economic benefits could be achieved if charcoal is substantially produced and utilized.

Keywords: briquette, economic benefits, pyrolysis, regeneration

Procedia PDF Downloads 279