Search results for: Koch’s Postulates.
23 Establishing Causal Relationship between HIV and AIDS
22 Single Feed Circularly Polarized Poly Fractal Antenna for Wireless Applications
Authors: V. V. Reddy, N. V. S. N. Sarma
Abstract:
A circularly polarized fractal boundary microstrip antenna is presented. The sides of a square patch along x- axis, yaxis are replaced with Minkowski and Koch curves correspondingly. By using the fractal curves as edges, asymmetry in the structure is created to excite two orthogonal modes for circular polarization (CP) operation. The indentation factors of the fractal curves are optimized for pure CP. The simulated results of the novel polyfractal antenna are demonstrated.
Keywords: Circular polarization, Fractal, Koch, Minkowski.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 250621 A Novel Antenna Design for Telemedicine Applications
Authors: Amar Partap Singh Pharwaha, Shweta Rani
Abstract:
To develop a reliable and cost effective communication platform for the telemedicine applications, novel antenna design has been presented using bacterial foraging optimization (BFO) technique. The proposed antenna geometry is achieved by etching a modified Koch curve fractal shape at the edges and a square shape slot at the center of the radiating element of a patch antenna. It has been found that the new antenna has achieved 43.79% size reduction and better resonating characteristic than the original patch. Representative results for both simulations and numerical validations are reported in order to assess the effectiveness of the developed methodology.
Keywords: BFO, electrical permittivity, fractals, Koch curve.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 231720 Efficacy of Three Different Herbicides to the Control of Wild Barley (Hordeum spontaneum C. Koch) in Relation to Plant Growth Stage and Nitrogen Fertilizer Additive
Authors: Sh. Edrisi, M. Moeeni, A. Farahbakhsh
Abstract:
To study the effect of nitrogenous additive spray solution on the efficacy of three herbicides i.e. pinoxaden (Trade name: Axial), sulfosulfuron+metsulfuron-methyl (Trade name: Total) and sulfosulfuron (Trade name: Apirus) in controlling wild barley (Hordeum spontaneum C. Koch), in different growth stages, a greenhouse experiment as a split plot in a completely randomized design in three replications was conducted. One month after treatments, all plants were harvested and growth parameters were determined. The data were analyzed with computer. The results showed that the herbicide applications with and without nitrogen additive caused significant reductions in growth parameters of wild barley at 2-4 leaf stage. However, the plants were not killed by this herbicide. Plants were killed completely due to applications of the two other herbicides i.e. Apirus and Total at 2-4 leaf. There was no significant difference between the effect of these two herbicides. There was no significant difference between the highest rate of each herbicide used alone and that of the lowest rate with nitrogenous additive.
Keywords: Growth stage, herbicide, nitrogenous additive, wild barley.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 129019 Education of Purchasing Professionals in Austria: Competence Based View
Authors: Volker Koch
Abstract:
This paper deals with the education of purchasing professionals in Austria. In this education, equivalent and measurable criteria are collected in order to create a comparison. The comparison shows the problem. To make the aforementioned comparison possible, methodologies such as KODE-Competence Atlas or presentations in a matrix form are used. The result shows the content taught and whether there are any similarities or interesting differences in the current Austrian purchasers’ formations. Purchasing professionals learning competencies are also illustrated in the study result.Keywords: Competencies, education, purchasing professional, technological-oriented.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 106018 IT Management: How IT Managers Gain IT knowledge
Authors: Jes Søndergaard, Torben Tambo, Christian Koch
Abstract:
It is not a secret that, IT management has become more and more and integrated part of almost all organizations. IT managers posses an enormous amount of knowledge within both organizational knowledge and general IT knowledge. This article investigates how IT managers keep themselves updated on IT knowledge in general and looks into how much time IT managers spend on weekly basis searching the net for new or problem solving IT knowledge. The theory used in this paper is used to investigate the current role of IT managers and what issues they are facing. Furthermore a research is conducted where 7 IT managers in medium sized and large Danish companies are interviewed to add further focus on the role of the IT manager and to focus on how they keep themselves updated. Beside finding substantial need for more research, IT managers – generalists or specialists – only have limited knowledge resources at hand in updating their own knowledge – leaving much initiative to vendors.Keywords: CIO, information Technology, Knowledge, Management, Organization
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 149617 Modeling the Time-Dependent Rheological Behavior of Clays Used in Fabrication of Ceramic
Authors: L. Hammadi, N. Boudjenane, R. Houdjedje, R. Reffis, M. Belhadri
Abstract:
In this study, we investigated the thixotropic behavior of two clays used in fabrication of ceramic. The structural kinetic model (SKM) was used to characterize the thixotropic behavior of two different kinds of clays used in fabrication of ceramic. The SKM postulates that the change in the rheological behavior is associated with shear-induced breakdown of the internal structure of the clays. This model for the structure decay with time at constant shear rate assumes nth order kinetics for the decay of the material structure with a rate constant.Keywords: Ceramic, clays, structural kinetic model, thixotropy, viscosity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 125716 Discrete Time Optimal Solution for the Connection Admission Control Problem
Authors: C. Bruni, F. Delli Priscoli, G. Koch, I. Marchetti
Abstract:
The Connection Admission Control (CAC) problem is formulated in this paper as a discrete time optimal control problem. The control variables account for the acceptance/ rejection of new connections and forced dropping of in-progress connections. These variables are constrained to meet suitable conditions which account for the QoS requirements (Link Availability, Blocking Probability, Dropping Probability). The performance index evaluates the total throughput. At each discrete time, the problem is solved as an integer-valued linear programming one. The proposed procedure was successfully tested against suitably simulated data.
Keywords: Connection Admission Control, Optimal Control, Integer valued Linear Programming, Quality of Service Requirements, Robust Control.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 126415 An Innovative Approach to the Formulation of Connection Admission Control Problem
Authors: Carlo Bruni, Francesco Delli Priscoli, Giorgio Koch, Ilaria Marchetti
Abstract:
This paper proposes an innovative approach for the Connection Admission Control (CAC) problem. Starting from an abstract network modelling, the CAC problem is formulated in a technology independent fashion allowing the proposed concepts to be applied to any wireless and wired domain. The proposed CAC is decoupled from the other Resource Management procedures, but cooperates with them in order to guarantee the desired QoS requirements. Moreover, it is based on suitable performance measurements which, by using proper predictors, allow to forecast the domain dynamics in the next future. Finally, the proposed CAC control scheme is based on a feedback loop aiming at maximizing a suitable performance index accounting for the domain throughput, whilst respecting a set of constraints accounting for the QoS requirements.
Keywords: Network Management, Quality of Service (QoS) requirements, Optimal Control.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 228814 3D Dynamic Modeling of Transition Zones
Authors: Edina Koch, Péter Hudacsek
Abstract:
In railways transition zone is present at the boundaries of zones with different stiffness. When a train rides from an embankment onto a stiff structure, such as a bridge, tunnel or culvert, an abrupt change in the support stiffness occurs possibly inducing differential settlements. This in long term can yield to the degradation of the tracks and foundations in the transition zones. A number of techniques have been proposed or implemented to provide gradual stiffness transition at the problem zones, such as methods to ensure gradually changing pad stiffness, application of long sleepers or installation of auxiliary rails in the transition zone. Aim of the research presented in this paper is to analyze the 3D and the dynamic effects induced by the passing train over an area where significant difference in the support stiffness exists. The effects were analyzed for different arrangements associated with certain differential settlement mitigation strategies of the transition zones.Keywords: Culvert, dynamic load, HS small model, railway transition zone.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 104913 Differentiation between Common Tick Species Using Molecular Biology Techniques in Saudi Arabia
Authors: Kholoud A. Al-Shammery , Badr El-Sabah A. Fetoh, Ahmed M. Alshammari
Abstract:
Protein and Esterase electrophoresis were used to genetically identify two Saudi tick species. Engorged females of the camel tick Hyalomma dromedarii (Koch) (Acari: Ixodidae) and the cattle tick Boophilus annulatus (Say) (Acari: Ixodidae) ticks collected from infested camels and cattle in the animals resting house at Hail region in KSA were used. The results showed that there are a variation in both of protein and esterase activity levels and a high polymorphism within and between the genera and species of Hyalomma and Boophilus . In conclusion, the protein and esterase electrophoretic analysis used in the present study could successfully distinguish among tick species, commonly found in Saudi Arabia.Keywords: Molecular biology, The camel tick Hyalomma dromedarii, The cattle tick Boophilus annulatus , Ticks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 294412 Parametric Analysis of Water Lily Shaped Split Ring Resonator Loaded Fractal Monopole Antenna for Multiband Applications
Authors: C. Elavarasi, T. Shanmuganantham
Abstract:
A coplanar waveguide (CPW) feed is presented, and comprising a split ring resonator (SRR) loaded fractal with water lily shape is used for multi band applications. The impedance matching of the antenna is determined by the number of Koch curve fractal unit cells. The antenna is designed on a FR4 substrate with a permittivity of εr = 4.4 and size of 14 x 16 x 1.6 mm3 to generate multi resonant mode at 3.8 GHz covering S band, 8.68 GHz at X band, 13.96 GHz at Ku band, and 19.74 GHz at K band with reflection coefficient better than -10 dB. Simulation results show that the antenna exhibits the desired voltage standing wave ratio (VSWR) level and radiation patterns across the wide frequency range. The fundamental parameters of the antenna such as return loss, VSWR, good radiation pattern with reasonable gain across the operating bands are obtained.Keywords: Monopole antenna, fractal, metamaterial, waterlily shape, split ring resonator, multiband.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 126511 Soil Moisture Regulation in Irrigated Agriculture
Authors: I. Kruashvili, I. Inashvili, K. Bziava, M. Lomishvili
Abstract:
Seepage capillary anomalies in the active layer of soil, related to the soil water movement, often cause variation of soil hydrophysical properties and become one of the main objectives of the hydroecology. It is necessary to mention that all existing equations for computing the seepage flow particularly from soil channels, through dams, bulkheads, and foundations of hydraulic engineering structures are preferable based on the linear seepage law. Regarding the existing beliefs, anomalous seepage is based on postulates according to which the fluid in free volume is characterized by resistance against shear deformation and is presented in the form of initial gradient. According to the above-mentioned information, we have determined: Equation to calculate seepage coefficient when the velocity of transition flow is equal to seepage flow velocity; by means of power function, equations for the calculation of average and maximum velocities of seepage flow have been derived; taking into consideration the fluid continuity condition, average velocity for calculation of average velocity in capillary tube has been received.
Keywords: Seepage, soil, velocity, water.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 100510 Determination of Yield and Yield Components of Fodder Beet (Beta vulgaris L. var. rapacea Koch.) Cultivars under the Konya Region Conditions
Authors: A. Özköse
Abstract:
This study was conducted to determination of yield and yield components of some fodder beet types (Amarilla Barres, Feldherr, Kyros, Magnum ve Rota) under the Konya region conditions. Fodder beet was obtained from the Selcuk University, Faculty of Agriculture, at 2006-2007 season and the experiment was established in a randomized complete block design with three replicates. Differences among the averages of the fodder beet cultivars are statistically important in terms of all the characteristics investigated. Leaf attitude value was 1.2 – 2.2 (1=erect; 5= prostrate), root shape scale value was (1=spheroidal – 9=cylindrical), root diameter 11.0 – 12.2cm, remaining part of root on the ground was 6.3 – 13.7cm, root length was 21.4 – 29.6cm, leaf yield 1592 – 1917 kg/da, root yield was 10083 – 12258 kg/da, root dry matter content was %8.2 – 18.6 and root dry matter yield was 889 – 1887 kg/da. As a result of the study, it was determined that fodder beet cultivars are different conditions in terms of yield and yield components. Therefore, determination of appropriate cultivars for each region affect crop yield importantly.
Keywords: Fodder beet, root yield, yield components.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16289 Advanced Geolocation of IP Addresses
Authors: Robert Koch, Mario Golling, Gabi Dreo Rodosek
Abstract:
Tracing and locating the geographical location of users (Geolocation) is used extensively in todays Internet. Whenever we, e.g., request a page from google we are - unless there was a specific configuration made - automatically forwarded to the page with the relevant language and amongst others, dependent on our location identified, specific commercials are presented. Especially within the area of Network Security, Geolocation has a significant impact. Because of the way the Internet works, attacks can be executed from almost everywhere. Therefore, for an attribution, knowledge of the origination of an attack - and thus Geolocation - is mandatory in order to be able to trace back an attacker. In addition, Geolocation can also be used very successfully to increase the security of a network during operation (i.e. before an intrusion actually has taken place). Similar to greylisting in emails, Geolocation allows to (i) correlate attacks detected with new connections and (ii) as a consequence to classify traffic a priori as more suspicious (thus particularly allowing to inspect this traffic in more detail). Although numerous techniques for Geolocation are existing, each strategy is subject to certain restrictions. Following the ideas of Endo et al., this publication tries to overcome these shortcomings with a combined solution of different methods to allow improved and optimized Geolocation. Thus, we present our architecture for improved Geolocation, by designing a new algorithm, which combines several Geolocation techniques to increase the accuracy.
Keywords: IP geolocation, prosecution of computer fraud, attack attribution, target-analysis
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 47278 Quantum Computing: A New Era of Computing
Authors: Jyoti Chaturvedi Gursaran
Abstract:
Nature conducts its action in a very private manner. To reveal these actions classical science has done a great effort. But classical science can experiment only with the things that can be seen with eyes. Beyond the scope of classical science quantum science works very well. It is based on some postulates like qubit, superposition of two states, entanglement, measurement and evolution of states that are briefly described in the present paper. One of the applications of quantum computing i.e. implementation of a novel quantum evolutionary algorithm(QEA) to automate the time tabling problem of Dayalbagh Educational Institute (Deemed University) is also presented in this paper. Making a good timetable is a scheduling problem. It is NP-hard, multi-constrained, complex and a combinatorial optimization problem. The solution of this problem cannot be obtained in polynomial time. The QEA uses genetic operators on the Q-bit as well as updating operator of quantum gate which is introduced as a variation operator to converge toward better solutions.
Keywords: Quantum computing, qubit, superposition, entanglement, measurement of states, evolution of states, Scheduling problem, hard and soft constraints, evolutionary algorithm, quantum evolutionary algorithm.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26627 Modeling And Analysis of Simple Open Cycle Gas Turbine Using Graph Networks
Authors: Naresh Yadav, I.A. Khan, Sandeep Grover
Abstract:
This paper presents a unified approach based graph theory and system theory postulates for the modeling and analysis of Simple open cycle Gas turbine system. In the present paper, the simple open cycle gas turbine system has been modeled up to its subsystem level and system variables have been identified to develop the process subgraphs. The theorems and algorithms of the graph theory have been used to represent behavioural properties of the system like rate of heat and work transfers rates, pressure drops and temperature drops in the involved processes of the system. The processes have been represented as edges of the process subgraphs and their limits as the vertices of the process subgraphs. The system across variables and through variables has been used to develop terminal equations of the process subgraphs of the system. The set of equations developed for vertices and edges of network graph are used to solve the system for its process variables.Keywords: Simple open cycle gas turbine, Graph theoretic approach, process subgraphs, gas turbines system modeling, systemtheory
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26426 Interdisciplinary Principles of Field-Like Coordination in the Case of Self-Organized Social Systems1
Authors: D. Plikynas, S. Masteika, A. Budrionis
Abstract:
This interdisciplinary research aims to distinguish universal scale-free and field-like fundamental principles of selforganization observable across many disciplines like computer science, neuroscience, microbiology, social science, etc. Based on these universal principles we provide basic premises and postulates for designing holistic social simulation models. We also introduce pervasive information field (PIF) concept, which serves as a simulation media for contextual information storage, dynamic distribution and organization in social complex networks. PIF concept specifically is targeted for field-like uncoupled and indirect interactions among social agents capable of affecting and perceiving broadcasted contextual information. Proposed approach is expressive enough to represent contextual broadcasted information in a form locally accessible and immediately usable by network agents. This paper gives some prospective vision how system-s resources (tangible and intangible) could be simulated as oscillating processes immersed in the all pervasive information field.
Keywords: field-based coordination, multi-agent systems, information-rich social networks, pervasive information field
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15675 Role of Social Capital on Consumer Attitudes, Peer Influence and Behavioral Intentions: A Social Media Perspective
Authors: Qazi Mohammed Ahmed, Osman Sadiq Paracha, Iftikhar Hussain
Abstract:
The study aims to explore the unaddressed relationship between social capital and consumers’ underlying behavioral intentions. The study postulates that this association is mediated by the role of attitudes and peer influence. The research attains evidence from a usable sample of 673 responses. The majority consists of the young and energetic social media users of Pakistan that utilize virtual communities as a way of life. A variance based structural equation modeling has been applied through SmartPLS 3. The results reveal that social capital exerts a statistically supportive association with both attitudes and peer influence. Contrastingly, this predictor variable shows an insignificant linkage with behavioral intentions but this relationship is fully mediated by consumer attitudes and peer influence. The paper enhances marketing literature with respect to an unexplored society of Pakistan. It also provides a lens for the contemporary advertisers, in terms of supporting their social media campaigns with affiliative and cohesive elements. The study also identifies a series of predictor variables that could further be tested with attitudes, subjective norms and behavioral responses.Keywords: Behavioral intentions, consumer attitudes, peer influence, social capital.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5974 Evaluation of State of the Art IDS Message Exchange Protocols
Authors: Robert Koch, Mario Golling, Gabi Dreo
Abstract:
During the last couple of years, the degree of dependence on IT systems has reached a dimension nobody imagined to be possible 10 years ago. The increased usage of mobile devices (e.g., smart phones), wireless sensor networks and embedded devices (Internet of Things) are only some examples of the dependency of modern societies on cyber space. At the same time, the complexity of IT applications, e.g., because of the increasing use of cloud computing, is rising continuously. Along with this, the threats to IT security have increased both quantitatively and qualitatively, as recent examples like STUXNET or the supposed cyber attack on Illinois water system are proofing impressively. Once isolated control systems are nowadays often publicly available - a fact that has never been intended by the developers. Threats to IT systems don’t care about areas of responsibility. Especially with regard to Cyber Warfare, IT threats are no longer limited to company or industry boundaries, administrative jurisdictions or state boundaries. One of the important countermeasures is increased cooperation among the participants especially in the field of Cyber Defence. Besides political and legal challenges, there are technical ones as well. A better, at least partially automated exchange of information is essential to (i) enable sophisticated situational awareness and to (ii) counter the attacker in a coordinated way. Therefore, this publication performs an evaluation of state of the art Intrusion Detection Message Exchange protocols in order to guarantee a secure information exchange between different entities.
Keywords: Cyber Defence, Cyber Warfare, Intrusion Detection Information Exchange, Early Warning Systems, Joint Intrusion Detection, Cyber Conflict
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22933 The Direct and Indirect Effects of the Achievement Motivation on Nurturing Intellectual Giftedness
Authors: Al-Shabatat, M. Ahmad, Abbas, M., Ismail, H. Nizam
Abstract:
Achievement motivation is believed to promote giftedness attracting people to invest in many programs to adopt gifted students providing them with challenging activities. Intellectual giftedness is founded on the fluid intelligence and extends to more specific abilities through the growth and inputs from the achievement motivation. Acknowledging the roles played by the motivation in the development of giftedness leads to an effective nurturing of gifted individuals. However, no study has investigated the direct and indirect effects of the achievement motivation and fluid intelligence on intellectual giftedness. Thus, this study investigated the contribution of motivation factors to giftedness development by conducting tests of fluid intelligence using Cattell Culture Fair Test (CCFT) and analytical abilities using culture reduced test items covering problem solving, pattern recognition, audio-logic, audio-matrices, and artificial language, and self report questionnaire for the motivational factors. A number of 180 highscoring students were selected using CCFT from a leading university in Malaysia. Structural equation modeling was employed using Amos V.16 to determine the direct and indirect effects of achievement motivation factors (self confidence, success, perseverance, competition, autonomy, responsibility, ambition, and locus of control) on the intellectual giftedness. The findings showed that the hypothesized model fitted the data, supporting the model postulates and showed significant and strong direct and indirect effects of the motivation and fluid intelligence on the intellectual giftedness.Keywords: Achievement motivation, Intellectual Giftedness, Fluid Intelligence, Analytical Giftedness, CCFT, Structural EquationModeling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21732 Re-Visiting Rumi and Iqbal on Self-Enhancement for Social Responsibility
Authors: Javed Y. Uppal
Abstract:
The background of this study is the great degree of stress that the world is experiencing today, internationally among the countries, within a community among people, and even individually within one’s own self. The significance of the study is the attempt to find a solution of this stress in the philosophy of the olden times of Jalaluddin Rumi and comparatively recently of that of Allama Iqbal. The methodology adopted in this paper is firstly exploration of the perspectives of these philosophers that are being consolidated by a number of psychic and spiritual experts of today, who are being widely read but less followed. This paper further goes on presenting brief life sketches of Rumi and Iqbal. It expounds the key concepts proposed by them and the social change that was resulted in the times of the two above mentioned metaphysical philosophers. It is further amplified that with the recent advancements, in both metaphysics and the physical sciences, the gap between the two is closing down. Both Rumi and Iqbal emphasized their common essence. The old time's concepts, postulates, and philosophies are hence once again becoming valid. The findings of this paper are that the existence of human empathy, affection and mutual social attraction among humans is still valid. The positive inner belief system that dictates our thoughts and actions is vital. As a conclusion, empathy should enable us solving our problems collectively. We need to strengthen our inner communication system, to listen to the messages that come to our inner-selves. We need to get guidance and strength from them. We need to value common needs and purposes collectively to achieve results. Spiritual energy among us is to be harnessed and utilized. Connectivity is to be recognized to unify and strengthen ties among people. Mutual bonding at small and large group levels is to be employed for the survival of the disadvantaged, and sustainability of the empowering trends. With the above guidelines, hopefully, we can define a framework towards a brave and happy new humane world.
Keywords: Belief system, connectivity, human empathy, inner-self, mutual bonding, spiritual energy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9651 Antioxidative, Anticholinesterase and Anti-Neuroinflammatory Properties of Malaysian Brown and Green Seaweeds
Authors: Siti Aisya Gany, Swee Ching Tan, Sook Yee Gan
Abstract:
Diminished antioxidant defense or increased production of reactive oxygen species in the biological system can result in oxidative stress which may lead to various neurodegenerative diseases including Alzheimer’s disease (AD). Microglial activation also contributes to the progression of AD by producing several proinflammatory cytokines, nitric oxide (NO) and prostaglandin E2 (PGE2). Oxidative stress and inflammation have been reported to be possible pathophysiological mechanisms underlying AD. In addition, the cholinergic hypothesis postulates that memory impairment in patient with AD is also associated with the deficit of cholinergic function in the brain. Although a number of drugs have been approved for the treatment of AD, most of these synthetic drugs have diverse side effects and yield relatively modest benefits. Marine algae have great potential in pharmaceutical and biomedical applications as they are valuable sources of bioactive properties such as anticoagulation, antimicrobial, antioxidative, anticancer and anti-inflammatory. Hence, this study aimed to provide an overview of the properties of Malaysian seaweeds (Padina australis, Sargassum polycystum and Caulerpa racemosa) in inhibiting oxidative stress, neuroinflammation and cholinesterase enzymes. These seaweeds significantly exhibited potent DPPH and moderate superoxide anion radical scavenging ability (P<0.05). Hexane and methanol extracts of S. polycystum exhibited the most potent radical scavenging ability with IC50 values of 0.157±0.004mg/ml and 0.849±0.02mg/ml for DPPH and ABTS assays, respectively. Hexane extract of C. racemosa gave the strongest superoxide radical inhibitory effect (IC50 of 0.386±0.01mg/ml). Most seaweed extracts significantly inhibited the production of cytokine (IL-6, IL-1 β, TNFα) and NO in a concentration-dependent manner without causing significant cytotoxicity to the lipopolysaccharide (LPS)-stimulated microglia cells (P<0.05). All extracts suppressed cytokine and NO level by more than 50% at the concentration of 0.4mg/ml. In addition, C. racemosa and S. polycystum also showed anti-acetylcholinesterase activities with the IC50 values ranging from 0.086-0.115 mg/ml. Moreover, C. racemosa and P. australis were also found to be active against butyrylcholinesterase with IC50 values ranging from 0.118- 0.287 mg/ml.
Keywords: Anticholinesterase, antioxidative, neuroinflammation, seaweeds.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2884