Tridax Procumbens Medicine for Life: An Overview.
ABSTRACT: Nature has been a source of medicinal agents for thousands of years and an impressive numbers of modern drugs have been isolated from natural resources. Tridax procumbens Linn (Family –Asteraceae common name- Dhaman grass) is common herb found in India. Tridax procumbens is well known Ayurvedic, thino-botanical and unani medicinal plant. Pharmacological studies have shown that Tridax procumbens possess properties like anti-inflammatory, hepatoprotective, wound heal, antimicrobial, antiseptic, hypotensive and bradycardiac effects. The whole plant was reported to treat various elements, such as dysentery, diarrhea and preventing hair loss. These properties are mainly due to many active
…show more content…
The disease producing microbes are playing a very important role in human life. Therefore, the chemotherapy of infectious diseases has proved to be a continuous struggle. Scientists are always in search of new antimicrobial agent to control the ever increasing menace of microbes. Therefore medicinal plants are gifts of nature to use as a source of medicine from ancient times. [1]. The abundance of plants on the earth’s surfaces has led to an increasing interest in the investigation of different extracts obtained from traditional medicinal plants as potential source of new antimicrobial agents. …show more content…
Maximum zone of inhibition was obtained for E. coli, Staphylococcus aureus and Pseudomonas aeruginosa than Streptococcus pheumonia. Satyanarayana et al [11] were studied antibacterial activity of different phytochemical extracts from the leaves of T. procumbens Linn against Staphyclococcus aureus, Escherichia coli, Proteus mirabills and Vibrio cholerae. Antibacterial activity of hexane, petroleum ether, chloroform and methanol extract obtained from the aeirial parts of T. procumbens was tested against both gram positive (Staphylococeus aureus and Bacillus subtilis) and gram negative (Enterobacter aerogenes)using agar well diffusion method, indicated the presence of more active compound in methanol than in hexane extract [12] Bobbarala et al [13] studied antifungal activity of whole plant extract against phytopathogenic fungi, Aspergillus niger. The leaf extract of T. procumbens was tested against Fusarium oxysporium f sp.udum. Bultar Var Crotolariae (Kulkarni) pidwick causing seeding blight of Pigeon pea [14]. Aniel et al [2] studied antibacterial potential against E.Coli, Klebsiella pheumoniae, Proteus vulgaris, Bacillus subtilis and Staphylococcus aureus and found minimum inhibitory concentration ranged between 1.9 -19.5. Yoga et al [15] were studied antimicrobial activity of T. procumbens L. as food preservatives. Free and bound flavonoids
Our protocol takes two integers decomposed into encrypted bit vectors [a][b] and outputs the greater integer. In this configuration cloud 1 (C1) has the encrypted bit vectors of the integers being compared and cloud 2 (C2) knows the private key. The protocol is as follows in a very concise form. we can say with firm conviction that vector [Y] consist of encrypted zeros at every location except one location which holds the value of encrypted one. This distinct location identifies the first position where vector [a] and [b] differ.
1.2 RESEARCH OBJECTIVES: 1.2.1 Creating Data Set The images used in this work have been obtained from the Street View service developed by Google. It provides high- resolution views from various positions along many streets and roads in the world. These images are taken at discrete geographical locations defined by a pair (LAT, LON) (latitude and longitude in decimal degrees, respectively) [19].
xor ax, ax ; Make the ax register 0. Remember the exclusive or when both operands are the same is always 0. mov ds, ax ; ds = ax mov ss, ax mov sp, 0x9c00 mov es, ax mov ax, 0xb800 ; 0xb800 is the address where the bootloader or kernel writes in the video memory mov es, ax ; ax contains the video memory address and es = ax. mov si, msg ; adds the string 'msg ' into the source index register. (msg is defined below) call sprint ; invokes the sprint function (sprint is defined below)
5. METHODOLOGY 5.1 Secure Multipath Routing Protocols in Wireless Sensor Networks Till date many routing protocols have been proposed for wireless sensor networks, but only few of them consider the problem of security [4] and most of them are developed without any security concern. So in this section we focus at selected multipath routing protocols in order to cope with the various attacks. For avoiding intruders attacks in HWSN various methods and algorithms are implemented out of that Professor Hamid Al-Hamadi and Professor Ing-Ray Chen:
2.1.1. Implementation Randomly select an odd integer n to be tested as a prime Randomly select an integer a that is 1 ≤ a ≤ n Calculate the Jacobi Symbol (a/n) using the aforementioned properties Check if the relation a^((n-1)/2)≡(a/n) holds. If it does, go to step 2. Repeat the process k times
I am going to explain the current methods and protocols we use in a LAN environment to provide a high level of redundancy, such as EtherChannel, FHRP (First Hop Redundancy Protocols) and STP (Spanning Tree protocols). I will briefly explain how the protocols work & then discusses the latest implementations of the protocol and the environment you would expect to see them working in. The STP is a protocol that prevents loops from occurring in a switched LAN environments when a device has multiple interconnected paths. The protocols works by sending BDPU messages across in the interconnected devices, detects the loop then removes it from the topology by shutting down the port.
Files According to the research conducted by Hadeel Tariq Al-Rayes of the University of Diyala there are twelve categories of files that were changed on the Linux kernel to develop Android. This document discusses only five categories. The first one is the Goldfish where it is claimed 44 files were changed.
3.1 Hardware and Software Requirements Windows MATLAB V.13 Windows7 (R2013a) Processor Dual core, core2duo, Intel I3 RAM 2GB RAM DISK Space Disk space varies depending on size of partition and installation of online help files. The MathWorks Installer will inform you of the hard disk space requirement for your particular partition Graphics adapter 8-bit graphics adapter and display (for 256 simultaneous colors CD-ROM drive for installation from CD. Table 3.1: Minimum Requirements Windows Processor RAM DISK Space Graphics adapter MATLAB Intel I3 2GB 1 GB for A 32-bit or 64-bit V.13 MATLAB only, OpenGL capable (R2013a) 5 GB for a
Having root access on the Huawei Ascend M860 comes with great responsibility. It means that you will have full control over the Ascend smartphone root file system. That same root file system stores your critical system files and if you were to delete any, it could brick your device. As serious as that sounds, you can always backup your device using the internal SD card. Those of you looking to save some more space on the internal memory can connect an external SD card and backup using Titanium backup to that external drive.
Network monitoring now is limited because of the number of servers it takes to deal with the large influx of router data. Router manufacturers have been attempting to combat this by adding counters to the routers that report on the number of data packets a router has processed during some time interval, but adding counters for every special task would be impractical and put more stress on servers since they would need thousands more to process the flood of data coming in. To combat this a system called Marple was created by researchers at MIT, Cisco Systems, and Barefoot Networks(Hardesty). Marple involves a programming language the allows network operators to specify a wide range of network-monitoring tasks and a small set of simple circuit elements that can execute any function specified in the language.
In general, all the predators and prey (regardless of habitat) began with the same amount of population. For instance, there are a total of six predators (2 had forks, 2 had spoons, and 2 had knives)—regardless of habitat, Meaning each predator contributed to 33% of the population (Tables 1A, 2A). For prey, each bean contributed 25% of the population (Tables 1B, 2B). However, as generation progressed, differences began to appear.
function printFunction(stations_json) { console.log(stations_json); } / * * Displays the stations in the select tags */ function displayStations(stations_json) { if (stations_json == null) { alert("Error retrieving the stations!") ; } else { $.each(stations_json, function(key, value) { $('#departure_stations') .append($ ("") .attr("value",key)
msxml6.dll download free and error fixing Like any other DLL file, the msxml6.dll file gives rise to a lot of problems as well quite frequently, irrespective of the version of windows the users are dealing with. In most of the times, these problems lead to serious glitches, which cannot be solved with the help of the online error fixer tools and troubleshooting steps, which on majority of the cases are open source. In these circumstances, these individuals have to turn to certain tools that are specifically developed to deal with these issues. There are instances, when those with Windows 10 find after they have installed windows or have upgraded from a lower version of windows to version 10, they keep on getting intermittent pops ups asking them to install as driver for a printer, though they do not have any printer installed, or have the need to do so. At times, they get a msxml6.dll' should be excluded because its source file is either missing or not found error.
ssue networks will not replace the more familiar politics of iron triangles (in Washington), but will overlay the once stable political reference points with the new forces that complicate calculations and decrease predictability. He believes that issue networks wield their power due to the fact that they comprise of a large number of participants with quite various degrees of mutual commitment or of dependence on others in their environment, the participants move in and out of these networks almost constantly. 5. Issue networks at work behind the “Border Security, Economic Opportunity, and Immigration Modernization Act”.
80073b92 is the error code that usually pops up with errors in Windows operating systems if there is Windows registry corruption. The 80073b92 error can show up while installing Windows updates, installing a new operating system and other functions. It will become essential to find an 80073b92 fix to resolve the issues by fixing the Windows registry. Many customers have seen that they are not able to upgrade their Windows 7 running computers to Windows 10 operating systems. On trying to upgrade they get the 80073b92 Windows 10 error code with the message that, Windows Update had encountered some unknown error.