434 research outputs found

    A loss-of-function homozygous mutation in DDX59 implicates a conserved DEAD-box RNA helicase in nervous system development and function.

    Get PDF
    We report on a homozygous frameshift deletion in DDX59 (c.185del: p.Phe62fs*13) in a family presenting with orofaciodigital syndrome phenotype associated with a broad neurological involvement characterized by microcephaly, intellectual disability, epilepsy, and white matter signal abnormalities associated with cortical and subcortical ischemic events. DDX59 encodes a DEAD-box RNA helicase and its role in brain function and neurological diseases is unclear. We showed a reduction of mutant cDNA and perturbation of SHH signaling from patient-derived cell lines; furthermore, analysis of human brain gene expression provides evidence that DDX59 is enriched in oligodendrocytes and might act within pathways of leukoencephalopathies-associated genes. We also characterized the neuronal phenotype of the Drosophila model using mutant mahe, the homolog of human DDX59, and showed that mahe loss-of-function mutant embryos exhibit impaired development of peripheral and central nervous system. Taken together, our results support a conserved role of this DEAD-box RNA helicase in neurological function

    Polymer-mediated delivery of agrochemicals

    Get PDF
    A major challenge in modern agriculture is the inefficient delivery and utilization of agrochemicals, which often leads to their overuse, causing environmental pollution and harming beneficial organisms such as earthworms and bees. This challenge can potentially be addressed by using advanced and efficient methods such as polymer-mediated delivery systems. Polymers offer the potential to enhance the efficiency of agrochemicals used in agriculture. Incorporating polymers into agrochemical delivery systems can overcome the limitations associated with conventional methods. This article aims to analyse the potential role of polymers in agrochemical delivery system. Polymer can enable the precise delivery of active ingredients, nutrients, pesticides and herbicides into plants, making the process more resilient to agrochemical loss associated with conventional delivery methods. Enhancing our understanding of polymers and their properties may improve the efficiency and efficacy of agrochemicals by influencing their interaction with plants, carrier capabilities and release mechanisms

    Effect of Industrial Effluent on the Growth of Marine Diatom, Chaetoceros simplex (Ostenfeld, 1901)

    Get PDF
    The marine centric diatom,Chaetoceros simplex (Ostenfeld, 1901) was exposed to five different concentrations of industrial effluent for 96 hrs to investigate the effect on growth. The physico-chemical parameters viz. colour, odour, temperature, salinity, dissolved oxygen, turbidity, pH, alkalinity, hardness, ammonia, nitrite, nitrate, inorganic phosphate, total phosphorous, reactive  silicate, calcium and magnesium were estimated in the effluent. The Ammonia  (326 μg. L-1), Nitrite (19.53 μg. L-1) and Nitrate (471.4 μg. L-1) were observed at higher levels. About 50% of the cell density of C. simplex reached a lesser dilutions of effluent viz. 1:625 and 1:1250 than the control. The highest cell density (14.3 × 104 cell ml-1) was recorded in 1:10000 diluted effluent followed by control and the lowest cell density was observed in 1:625 diluted effluents. From the results, it is evidenced that the lower volume of effluent discharge into higher volume of water could not affect the growth rate of phytoplankton. It is more important that to reduce the effect of pollution and environmental sustainability. @JASEMJ. Appl. Sci. Environ. Manage. December, 2010, Vol. 14 (4) 35 - 3

    Security Enhancement in Surveillance Cloud Using Machine Learning Techniques

    Get PDF
    Most industries are now switching from traditional modes to cloud environments and cloud-based services. It is essential to create a secure environment for the cloud space in order to provide consumers with a safe and protected environment for cloud-based transactions. Here, we discuss the suggested approaches for creating a reliable and safe environment for a surveillance cloud. When assessing the security of vital locations, surveillance data is crucial. We are implementing machine learning methods to improve cloud security to more precisely classify image pixels, we make use of Support Vector Machines (SVM) and Fuzzy C-means Clustering (FCM). We also extend the conventional two-tiered design by adding a third level, the CloudSec module, to lower the risk of potential disclosure of surveillance data.In our work we  evaluates how well our proposed model (FCM-SVM) performed against contemporary models like ANN, KNN, SVD, and Naive Bayes. Comparing our model to other cutting-edge models, we found that it performed better, with an average accuracy of 94.4%

    Nanofertilizers in vegetable crops: Harnessing nanotechnology for improved crop nutrition and environmental sustainability

    Get PDF
    Nanofertilizers represent a groundbreaking advancement in agricultural technology, offering a sustainable solution to enhance crop nutrition and address the challenges of global food security. Traditional fertilizers, while essential for crop production, often result in significant nutrient losses, environmental pollution and soil degradation due to low nutrient use efficiency (NUE). In contrast, nanofertilizers, engineered at the nanoscale, provide precise and controlled nutrient delivery, minimizing losses and maximizing plant uptake. These innovative fertilizers improve NUE, enhance crop yields and reduce environmental impacts such as nutrient leaching and water pollution. By leveraging nanotechnology, nanofertilizers facilitate better nutrient absorption, improved root development and enhanced stress tolerance in plants, leading to higher-quality produce and extended shelf life, particularly in fresh-cut vegetables. This review explores the transformative potential of nanofertilizers in sustainable agriculture, highlighting their mechanisms of action, benefits and applications across various crops. Despite their promise, challenges such as regulatory concerns, production costs and potential ecological risks must be addressed to ensure their safe and widespread adoption. As the global population continues to grow, nanofertilizers stand at the forefront of agricultural innovation, offering a pathway to sustainable crop production and food security. Future research should focus on optimizing nanofertilizer formulations, assessing long-term environmental impacts and developing cost-effective production strategies to facilitate their large-scale adoption

    Incorporation of brown seaweed (Ecklonia radiata) polyphenol crude extracts in whey protein isolate‑sodium alginate emulsion delivery systems

    Get PDF
    Ternary complexes composed of whey protein isolate, sodium alginate, and seaweed-derived polyphenols were developed as emulsifiers to stabilize oil-in-water emulsions. Different formulations were prepared and characterized for their physicochemical properties, including particle size and surface charge. The ternary complexes produced emulsions with improved storage and thermal stability compared to other formulations, and transmission electron microscopy confirmed well-defined morphology. During simulated gastrointestinal digestion, changes in composition and antioxidant activity were monitored, revealing that the ternary complexes effectively protected lipids and bioactive compounds. This study demonstrates that combining protein, polysaccharide, and polyphenol from natural sources can yield multifunctional emulsifiers with enhanced stability and antioxidant capacity, which offer promising applications for the delivery of lipid-soluble nutrients and functional ingredients in food systems

    S-Box Implementation of AES is NOT side-channel resistant

    Get PDF
    Several successful cache-based attacks have provided strong impetus for developing side channel resistant software implementations of AES. One of the best-known countermeasures - use of a minimalist 256-byte look-up table - has been employed in the latest (assembly language) versions. Software and hardware prefetching and out-of-order execution in modern processors have served to further shrink the attack surface. Despite these odds, we devise and implement two strategies to retrieve the complete AES key. The first uses adaptively chosen plaintext and random plaintext in a 2-round attack. The second strategy employs only about 50 blocks of random plaintext in a novel single round attack. The attack can be extended to spying on table accesses during decryption in a ciphertext-only attack. We also present an analytical model to explain the effect of false positives and false negatives and capture various practical tradeoffs involving number of blocks of plaintext, offline computation time for key retrieval and success probability

    Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks

    Get PDF
    Leakage of information between two processes sharing the same processor cache has been exploited in many novel approaches targeting various cryptographic algorithms. The software implementation of AES is an especially attractive target since it makes extensive use of cache-resident table lookups. We consider two attack scenarios where either the plaintext or ciphertext is known. We employ a multi-threaded spy process and ensure that each time slice provided to the victim (running AES) is small enough so that it makes a very limited number of table accesses. We design and implement a suite of algorithms to deduce the 128-bit AES key using as input the set of (unordered) cache line numbers captured by the spy threads in an access-driven cache-based side channel attack. Our algorithms are expressed using simple relational algebraic operations and run in under a minute. Above all, our attack is highly efficient - we demonstrate recovery of the full AES key given only about 6-7 blocks of plaintext or ciphertext (theoretically even a single block would suffice). This is a substantial improvement over previous cache-based side channel attacks that require between 100 and a million encryptions. Moreover, our attack supports varying cache hit/miss observation granularities, does not need frequent interruptions of the victim and will work even if the victim makes up to 60 cache accesses before being interrupted. Finally, we develop analytic models to estimate the number of encryptions/decryptions required as a function of access granularity and compare model results with those obtained from our experiment
    corecore