http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Drug adsorption and anti-microbial activity of functionalized multiwalled carbon nanotubes
Saxena, Megha,Mittal, Disha,Boudh, Richa,Kumar, Kapinder,Verma, Anita K.,Saxena, Reena Techno-Press 2021 Advances in nano research Vol.11 No.6
Multiwalled carbon nanotubes (MWCNTs) were first oxidized (O-CNTs) to introduce carboxylic group and then further functionalized (F-CNTs) with m-phenylenediamine, which was confirmed by FTIR and SEM. It was used as an effective adsorbent for the adsorptive removal of diclofenac drug from water. Under optimum conditions of pH 6, stirring speed 600 rpm, the maximum adsorption capacity obtained was 532 mg g<sup>-1</sup> which is superior to the values reported in literature. The adsorption was quite rapid as 25 mg L<sup>-1</sup> drug solution was adsorbed in only 3 minutes of contact time with 10 mg of adsorbent dose. The adsorption kinetics and isotherms were studied using various models to evaluate the adsorption process. The results showed that the data best fit in kinetics pseudo-second order and Langmuir isotherm model. Furthermore, the oxidized and functionalized MWCNTs were applied on gram-negative Escherichia coli and gram-positive Staphylococcus aureus using agar disc diffusion assay to validate their anti-microbial activity. Results were unique as both oxidized and functionalized MWCNTs were equally active against both E. coli and S. aureus. The newly synthesized F-CNTs have great potential in water treatment, with their dual action of removing drug and pathogens from water, makes it potential applicant to save environment.
Systematic review of the effectiveness of homoeopathy in the treatment of autism spectrum disorder
Vibha Saxena,Gish Chacko,Udit Saxena 한국언어재활사협회 2021 Clinical Archives of Communication Disorders Vol.6 No.1
Purpose: Over the years there is a significant increase in Autism Spectrum Disorder (ASD), yet there is no standard medical treatment available for this population. Homoeopathy as reported in literature can prove to be a boon for ASD treatment as in homoeopathy patients are prescribed medicine based on specific symptoms in light of associated physical and mental aspect. A systematic review of literature was required to put together the reported information on the relation between homoeopathy and ASD. This work reviews all the related literature in-depth. Methods: Literature on the concerned issue was searched from databases like Scopus, PubMed, ScienceDirect, JASTOR, Google Scholar, PsycINFO (psychology and psychiatry literature), and ERIC (Education Resources Information Center). Results: In total, 19 published articles were found on the investigation of using homoeopathy in the treatment of ASD. Seventeen studies showed that homoeopathy can be effective in the treatment of ASD. Result of 1 study was inconclusive and 1 more study found homoeopathy to be not suitable in treating ASD. Conclusions: Most reports support the use of homoeopathy in the treatment of ASD. They describe that homoeopathy efficiently control ASD symptoms and also supplements other therapies used in the treatment of ASD. Few authors suggested otherwise too.
Biocompatibility of root-end filling materials: recent update
Saxena, Payal,Gupta, Saurabh Kumar,Newaskar, Vilas The Korean Academy of Conservative Dentistry 2013 Restorative Dentistry & Endodontics Vol.38 No.3
The purpose of a root-end filling is to establish a seal between the root canal space and the periradicular tissues. As root-end filling materials come into contact with periradicular tissues, knowledge of the tissue response is crucial. Almost every available dental restorative material has been suggested as the root-end material of choice at a certain point in the past. This literature review on root-end filling materials will evaluate and comparatively analyse the biocompatibility and tissue response to these products, with primary focus on newly introduced materials.
Bayesian Estimation of Shape Parameter of Pareto Income Distribution Using LINEX Loss Function
Saxena, Sharad,Singh, Housila P. The Korean Statistical Society 2007 Communications for statistical applications and me Vol.14 No.1
The economic world is full of patterns, many of which exert a profound influence over society and business. One of the most contentious is the distribution of wealth. Way back in 1897, an Italian engineer-turned-economist named Vilfredo Pareto discovered a pattern in the distribution of wealth that appears to be every bit as universal as the laws of thermodynamics or chemistry. The present paper proposes some Bayes estimators of shape parameter of Pareto income distribution in censored sampling. Asymmetric LINEX loss function has been considered to study the effects of overestimation and underestimation. For the prior distribution of the parameter involved a number of priors including one and two-parameter exponential, truncated Erlang and doubly truncated gamma have been contemplated to express the belief of the experimenter s/he has regarding the parameter. The estimators thus obtained have been compared theoretically and empirically with the corresponding estimators under squared error loss function, some of which were reported by Bhattacharya et al. (1999).
Saxena, Upma,Sauvaget, Catherine,Sankaranarayanan, Rengaswamy Asian Pacific Journal of Cancer Prevention 2012 Asian Pacific journal of cancer prevention Vol.13 No.4
Cervical cancer remains the most frequent cancer in women from the developing world. More than 88% of deaths occur in low-income countries, and it is predicted to climb to 91.5% by 2030. Although Pap-based screening programmes have shown to be effective in reducing the disease burden in high-resource countries, implementation and sustention of cytology-based programmes is quite challenging in low-resource settings. The present paper reviews evidence-based alternatives of screening methods, triaging algorithm, treatment of cervical precancerous lesions, and age-group at screening appropriate for low-income countries. Evidence shows that visual inspection methods using diluted acid acetic or Lugol's iodine, and HPV-DNA testing are more sensitive tests than the Pap-smear screening test. Visual inspection allows an immediate result and, when appropriate, may be immediately followed by cryotherapy, the so called "screen-and-treat" approach, achieved in a single visit, by trained nurses and midwives. Examples of cervical cancer prevention programmes in India and selected low-income countries are given.
Efficient IoT Gateway over 5G Wireless: A New Design with Prototype and Implementation Results
Saxena, Navrati,Roy, Abhishek,Sahu, Bharat J. R.,Kim, HanSeok IEEE 2017 IEEE communications magazine Vol.55 No.2
<P>The growth of loT is expected to herald a better quality of life and open up new industrial opportunities. However, it is also raising new challenges in resource constrained wireless networks. Originally designed for human-to-human wireless communications, present wireless networks fail to satisfy the huge connectivity and varying traffic requirements of loT. Next generation 5G wireless networks are expected to exploit emerging features, like mmWave, massive MIMO, and C-RAN, for providing the enormous connectivity, resource pooling, and energy efficiency required to support commercial rollout of loT. Exploring these emerging features, we develop 5G-enabled loT gateways to communicate with the RRI Is of 5G C: RAN. The gateways are endowed with efficient compression schemes to significantly improve uplink resource utilization. Our 5G C-RAN prototyping and laboratory experimental results point out a huge opportunity for supporting a massive number of loT-enabled devices by sophisticated 5G C-RAN deployment and efficient loT gateway development.</P>
Novel framework for proactive handover with seamless multimedia over WLANs
Saxena, N.,Roy, A. IET 2011 IET communications Vol.5 No.9
<P>Supporting multimedia applications over 802.11 wireless LANs requires low latency and seamless handover between multiple access points. However, the existing handover process in 802.11 products suffers from very high delay and frequent service disruption, which are not acceptable for streaming multimedia applications. In order to reduce this high delay and service disruption, the authors have designed and implemented a new proactive handover strategy over 802.11. The strategy intelligently issues proactive scan and handover triggers to reduce the effective channel scanning delay. Subsequently, it reserves resources in advance, to reduce the handoff reconnection delay and provide necessary QoS guarantee. Using actual implementation and simulation study, the authors demonstrate that their proposed strategy is capable of achieving magnitudes of latency, jitter and throughput improvements during the 802.11 handover operations, thereby providing seamless multimedia transmission.</P>
Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid
Saxena, Neetesh,Bong Jun Choi,Rongxing Lu IEEE 2016 IEEE transactions on information forensics and sec Vol.11 No.5
<P>The smart grid, as the next generation of the power grid, is characterized by employing many different types of intelligent devices, such as intelligent electronic devices located at substations, smart meters positioned in the home area network, and outdoor field equipment deployed in the fields. In addition, there are various users in the smart grid network, including customers, operators, maintenance personnel, and so on, who use these devices for various purposes. Therefore, a secure and efficient mutual authentication and authorization scheme is needed in the smart grid to prevent various insider and outsider attacks on many different devices. In this paper, we propose an authentication and authorization scheme for mitigating outsider and insider threats in the smart grid by verifying the user authorization and performing the user authentication together whenever a user accesses the devices. The proposed scheme computes each user role dynamically using an attribute-based access control and verifies the identity of the user together with the device. Security and performance analysis show that the proposed scheme resists various insider as well as outsider attacks, and is more efficient in terms of communication and computation costs in comparison with the existing schemes. The correctness of the proposed scheme is also proved using BAN-Logic and Proverif.</P>