scispace - formally typeset
Search or ask a question
Institution

Jodhpur National University

EducationJodhpur, India
About: Jodhpur National University is a education organization based out in Jodhpur, India. It is known for research contribution in the topics: Transdermal & Self-healing hydrogels. The organization has 160 authors who have published 216 publications receiving 2381 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The book introduces the conception, selection, validation and implementation of different toxicogenomic strategies and provides an in-depth reference for those in the field of toxicology and chemical safety assessment.
Abstract: prediction. Other subsections pertain to DNA damage, the signaling responses that result and the use of RNA-interference screening to identify these signaling responses. The third section, on the topic of immunotoxicity, describes in detail the relevant mechanisms and pathways. The shortcomings of existing chemical safety evaluation techniques are contrasted with the strengths of applied toxicogenomic approaches to predicting chemical safety. The section also provides a detailed description of chemical sensitization, with a primary focus on skin sensitization. Although the skin is commonly used as a chemical sensitization model for the toxicogenomic analysis of cutaneous responses, alternative sensitization models that mimic the skin have been developed and validated. The final chapter of this section compares current evaluation methods using human, rodent and alternative models with toxicogenomic and bioinformatic approaches. The fourth and fifth sections address reproduction toxicity and organ toxicity, respectively. The former primarily focuses on transcriptomics, its implementation in various testing models and new approaches such as in vitro developmental toxicity testing. A discussion of thyroid toxicogenomics provides a mechanistic approach for multi-organ toxicity testing. In contrast, Section 5 focuses on toxicogenomic assessment of organ-specific toxicity of the liver or kidney. This section provides novel information about the correlation of organ-specific toxicity with circadian rhythms. Later sections are dedicated to toxicoinformatics and the selection and validation of testing models for toxicogenomic assays. Databases and other sources of information about toxicogenomics and systems toxicology; data collection, interpretation and analysis methodologies with application to bioinformatics; and strategies for implementing toxicogenomic tools are discussed in detail. This book is a great example of how interdisciplinary sciences can be applied for the development of enhanced research approaches. The book introduces the conception, selection, validation and implementation of different toxicogenomic strategies. It provides an in-depth reference for those in the field of toxicology and chemical safety assessment. This book is within the scope of not only academics but also basic scientists and clinical, pharmaceutical, cosmetic and drug development researchers.

1 citations

Journal ArticleDOI
TL;DR: This article focuses on few such restorative materials and also tells us about a few patents granted in such field.
Abstract: Restorations of teeth have been a need of time since very long. As the time have passed, there have been different advances in the field of restorative materials and tooth restorations. Many newer restorative materials are now available to us for the purpose of tooth restorations still some of the older materials are materials of choice for a sector of society. This article focuses on few such restorative materials and also tells us about a few patents granted in such field.

1 citations

Book ChapterDOI
01 Jan 2016
TL;DR: This paper explores the use of cryptography techniques, namely RSA with Chinese remainder theorem (CRT) to encrypt and decrypt the database, when all the parties are trying to find their global result in presence of trusted third party or absence of trustedThird party, without disclosing their private information to each other.
Abstract: Most data mining applications are based on information sharing and additional challenges, when we are dealing with data that are containing sensitive or private information. There is no common data mining technique available that deals with private information without any leakage. Therefore, the knowledge extracted from such data may disclose the pattern with sensitive/private information. This may put privacy on the individual/group of parties. In the past few years, privacy preserving data mining has attracted the research interest and potential for a wide area of applications. There are many techniques for privacy preservation like cryptography, anonymity, and randomization, etc., experimented for privacy preservation in data mining. In this paper, information system-based approach is considered, so some of the attributes required higher privacy compared to the other attributes. This paper explores the use of cryptography techniques, namely RSA with Chinese remainder theorem (CRT) to encrypt and decrypt the database, when all the parties are trying to find their global result in presence of trusted third party or absence of trusted third party, without disclosing their private information to each other.

1 citations

Journal Article
TL;DR: The dominant species identified are fusarium oxysporum (4 isolate with 50%) abundance followed by Rhizophus stolonifer (2 isolate with 25%) and Aspergillus niger (2 isolation with 25%).
Abstract: This was a Survey of fusarium wilt of Solanum melongena at Imawa village of Kura Local Government area located on N11 o 47’56.8” and 008 o 27’33.7”. During the survey, Four (4) plots were visited weekly for 8 weeks. Symptoms of disease were carefully observed from 35 egg plants (Solanum melongena) selected at random. 10-20g of soil from the depth of 2-4cm near the roots of both healthy and infected egg plants was collected using spatula, Composite mixture of the soil sample was made for isolation and identification of the wilt pathogen. Isolation of the pathogen was done using serial dilution technique where 1g of the soil was mixed with 9ml of distilled water to obtain 10 -1 up to 10 -4 and then 1ml was poured directly in to prepared P.D.A and stored at room temperature for 5-7 days after which the dominant pathogen was identified. The dominant species identified are fusarium oxysporum (4 isolate with 50%) abundance followed by Rhizophus stolonifer (2 isolate with 25%) and Aspergillus niger (2 isolate with 25%). The incidence was calculated and plot B was found to have the highest incidence. The data obtained was subjected to chi square statistical analysis and the data showed significant difference in terms of infection between the plots. Key words: Fusarium Wilt, Solanum melongena, Identification, Isolation, Wilt Pathogen.
Book ChapterDOI
01 Jan 2019
TL;DR: This proposed communication system is capable of transferring the data in the form of character rather than the bit-by-bit data transfer, and the main problem of secure key exchange is solved.
Abstract: Secure data transfer is the main important task in the data transfer between the two or multiple nodes in the network. There are very large number of protocols and security mechanisms available. These security mechanisms can be broken by using the very high computing power processors. Quantum cryptography can be the promising secure communication using quantum physical laws. Quantum communication itself makes the communication more promising and reliable in terms of security. Many quantum cryptography protocols are proposed till date for secure communication including a popular “three-stage quantum cryptography protocol” (Kak in Phys Lett 293–296, 2006 [1]). In the current quantum cryptography protocols, the unit of data is a binary bit. Here, the proposed communication system is capable of transferring the data in the form of character rather than the bit-by-bit data transfer. This methodology uses the simple logic, i.e., the high level language is used for the data transfer. The main problem of secure key exchange is solved. The angle of rotation of the photon beam is being shared securely. Here, a secure multistage quantum communication protocol is implemented. This proposed protocol has minimized the network traffic drastically. The number of signals required for the transfer of the character is decreased six times of the previous one.

Authors

Showing all 162 results

Network Information
Related Institutions (5)
Sri Ramachandra University
3.3K papers, 71.5K citations

78% related

Manipal University
11.2K papers, 110.6K citations

77% related

Jamia Hamdard
3.6K papers, 60.6K citations

76% related

King George's Medical University
5.6K papers, 71.6K citations

76% related

Gandhi Institute of Technology and Management
4K papers, 29.1K citations

75% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20231
20225
20215
20201
20192
20188