25 results on '"Nisha T"'
Search Results
2. Surfactant-Assisted Restructuring of Boron to Borophene: Implications for Enhanced Hydrogen Evolution.
- Author
-
Radhakrishnan, Sithara, Padmanabhan, Nisha T., Mathews, Ann Jini, Tang, Youhong, Santhanakrishnan, T., and John, Honey
- Abstract
Borophene 2D nanosheets of boron and the evolving group III trans-graphene are a potential material for a plethora of applications; however, they have not been well explored due to the ambiguity in their electronic configuration and consequent polymorphism. Here, we introduced liquid-phase treatments utilizing surfactants exfoliating boron to 2D borophene. Poly-(ethelyene glycol) (PEG) polymeric chains with neutral characteristics simultaneously with surfactants of cationic and anionic characteristics, respectively, as cetyltrimethylammonium bromide (CTAB) and sodium dodecyl sulfate (SDS) were utilized to constructively engineer a β rhombohedral crystal structure in borophene layers. These engineered borophene layers, on further analyzing their electrochemical performance by hydrogen evolution reactions, showed a heightened efficacy for borophene sheets synthesized in the presence of PEG, characterized by a Tafel slope of 178 mV/dec in a 0.5 M H
2 SO4 solution. This enhanced performance was intricately linked to the elevated quality of the borophene sheets during PEG-assisted liquid-phase treatment and to the increased accessibility of active sites characterized by the β rhombohedral crystal lattices engineered by PEG polymeric chains. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
3. Conceptual framework for adaptive access and identity management.
- Author
-
Extros, Savio and Nisha, T. N.
- Subjects
INFORMATION technology ,ACCESS control ,REGULATORY compliance ,CONSUMERS - Abstract
Access and Identity management have always been the key enablers in connecting the users with the enterprises, system or networks. As a result of enhancing security culture across diverse sectors, it is now time to expand the scope of Access and Identity management, in order to become more agile and efficient. The current scenario requires the need to balance the user's rights and access across thousands of IT services in the best possible way and to minimize the current distance between the organization and customers. In comparison to existing strategies, this paper proposes the adoption of a more complex policy development mechanism among organizations so that management can be more effective in coping with the issues relevant to this situation. Generally, all decisions are guided by a variety of procedures, technology and individuals, so in this context the constraint of the system is based on the human dimension, and it is very important to take into account that the human participation is something that cannot be overlooked. The paper proposes a review checklist to create some sort of implicit compliance framework regulation which can be used by the organization to control the access rights of the users. In order to emphasize its applicability, the aim is to establish parameters along with our vision to identify the potential means of adaptive Access and Identity management and to explain some of its properties. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Cyborgs: Is it sci-fi or nearest future.
- Author
-
Sangam, Shruti and Nisha, T. N.
- Subjects
CYBORGS ,ARTIFICIAL intelligence ,SCIENCE fiction ,GENETIC engineering ,MOLECULAR biology - Abstract
The rising innovative advancements across different logical fields have achieved radical changes in the manners we see and characterize being human in the present profoundly mechanically arranged society. Extending human abilities is something we have always been trying to do. This is where Cyborg (Cybernetic Organism) comes into the picture. Cyborg can be depicted as a machine man, which is a typical subject in sci-fi. Many writers have created different depictions under science fiction showing various aspects of future humans, life, culture, and society. Advancements in robotics, Artificial Intelligence (A.I.) research, molecular biology, genetic engineering, nanotechnology, medicine, etc., are for the most part still in a test stage; however, all things considered, they will end up being a piece of our everyday experience. As the innovations create and change at an ever more prominent pace forcing the future upon us, the Cyborg idea as a future is evolving in like manner. This paper presents an overview of science fiction and a broad discussion on human transformation. We will try to find out different sectors where Cyborg has been used and attempt to see the scope of Cyborg in the future with all the limitations it may have to finally derive to a conclusion whether Cyborg is a typical subject in sci-fi or is it the nearest future. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. Comparative study of the phases of ethical hacking and the phases of cyber kill chain.
- Author
-
Verma, Rashi and Nisha, T. N.
- Subjects
COMPUTER hacking ,ONLINE databases ,INTERNET security ,GEOGRAPHIC boundaries ,COMPARATIVE studies - Abstract
As all the data is accessible online these days, it's accessed by an oversized range of users, a number of them utilize this info to realize information, and a few use it to understand a way to use this info to demolish or purloin knowledge from websites or databases while not the owner information. The planet is facing a brand-new era of cyber-space criminal activity that's being committed worldwide, no matter geographic boundaries. The case has created folks additional ironed to know this trend and consequently varied terminologies for identical. The situation has created individuals additional ironed to know the present trend and, thus, numerous terminologies. This paper has systematically carried out the comparative study of the phases of kill chain analysis and the phases of ethical hacking by systematically analysing each of their phase and aim to know terms like hacking, hackers, moral hacking, moral hacking phases, cyber-attacks, Cyber security, kill chain analysis, and to check the moral hacking phases with the phases of kill chain analysis. Finally, different tools which are used in the phases of the ethical hacking and in the phases of Kill chain analysis. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. Antiviral effects of phytochemicals against severe acute respiratory syndrome coronavirus 2 and their mechanisms of action: A review.
- Author
-
Jantan, Ibrahim, Arshad, Laiba, Septama, Abdi Wira, Haque, Md. Areeful, Mohamed‐Hussein, Zeti‐Azura, and Govender, Nisha T.
- Abstract
The worldwide spreading of severe acute respiratory syndrome coronavirus 2 (SARS‐CoV‐2) has posed a serious threat to health, economic, environmental, and social aspects of human lives. Currently, there are no approved treatments that can effectively block the virus although several existing antimalarial and antiviral agents have been repurposed and allowed use during the pandemic under the emergency use authorization (EUA) status. This review gives an updated overview of the antiviral effects of phytochemicals including alkaloids, flavonoids, and terpenoids against the COVID‐19 virus and their mechanisms of action. Search for natural lead molecules against SARS‐CoV‐2 has been focusing on virtual screening and in vitro studies on phytochemicals that have shown great promise against other coronaviruses such as SARS‐CoV. Until now, there is limited data on in vivo investigations to examine the antiviral activity of plants in SARS‐CoV‐2‐infected animal models and the studies were performed using crude extracts. Further experimental and preclinical investigations on the in vivo effects of phytochemicals have to be performed to provide sufficient efficacy and safety data before clinical studies can be performed to develop them into COVID‐19 drugs. Phytochemicals are potential sources of new chemical leads for the development of safe and potent anti‐SARS‐CoV‐2 agents. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
7. Security operation center and its future advancements.
- Author
-
Srivastava, Shashank and Nisha, T. N.
- Subjects
TACIT knowledge ,INFORMATION technology industry ,TRUST - Abstract
Tacit knowledge can be recognized as a term used earlier to expedite solving a problem in medicine. Certain individuals can use tacit knowledge to provide quick resolution in case of a medical emergency in the present or the future. However, this term lacks when we move towards the industries working in Information Technology (IT). In this paper, we analyzed the concept of tacit knowledge and how the joint relationship and trust factor can improve the effectiveness of Security Operation Centers (SOC).This paper aims to identify the solution tothe questions above, understanding how various SOC analysts perceive a particular threat incident. How one identifies the incident's solution and what can be learned or absorbed from a particular activity. A joint relationship is one such example where the success rate of completing a project is much higher. We also looked at how simulation areas/environment and spatial touch with different vendors and analysts would promote tacit SOC information across different communication media. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. Next generation proactive cyber threat hunting - A complete framework.
- Author
-
Chakraborty, Sankha and Nisha, T. N.
- Subjects
CYBERTERRORISM ,COMPUTER network security ,EMPLOYEE training ,COMPUTER crime prevention ,GOVERNMENT agencies ,FINANCIAL institutions - Abstract
In the past few years, cyber-attacks have been increasing in terms of volume, quality as well as attack methodologies. Organizations ranging from government agencies, financial institutions, corporate sectors have started setting up their own or outsourced security operation centers in order to maintain the CIA (Confidentiality, Integrity, and Availability) triad of the organization. Organizations have realized that having IT security or SOC is not enough to protect their network as new methods of breaching network security and new vulnerabilities come into existence. Here lies the importance of the organizations to focus on effective cybersecurity threat hunting, which will assist the organizations in predicting, detecting, isolating unknown advanced persistent threats that otherwise manage to evade existing security operations and monitoring systems. However, organizations are often oblivious about vulnerabilities present in the processes involved until those are exploited, causing harm to the organization, which depicts the concept of a zero-day vulnerability. The objective of this paper is to provide a cyclical framework to carry out effectively cybersecurity threat hunting and compares the same with the existing security operations prevalent in the organizations. The important parameters for active threat hunting include application of the right tools, training of employees, analytics, visibility, and intelligence, which are required to detect and investigate advanced cyber threats. However, this research paper considers organizations in the IT sector or banking sector mainly which become the victims of cyber-attacks easily. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. Green cloud computing and the significance of IT organizations to consider total cost to environment.
- Author
-
Sukkala, Harshini and Nisha, T. N.
- Subjects
CLOUD computing ,SUSTAINABILITY ,TOTAL cost of ownership ,CARBON emissions - Abstract
Information technology (IT) businesses need to focus on green cloud computing, as we certainly cannot go back to traditional ways of doing things in an organization. This paper depicts the theoretical analysis (ethnography qualitative research by participant observation-as a complete observer) of how each organization can make a difference by adopting green cloud computing services instead of the regular cloud computing services. Considering the number of carbon emissions emitted by Total Cost to the Environment (TCE) and Total Cost of Ownership (TCO) separately, it indicates that the TCE can relatively decrease the release of greenhouse gases and e-waste generated to a greater extent. Some IT organizations concentrate more on TCO than TCE, which can be a potential threat to the environment. To maintain a healthy TCE, IT organizations can take responsibility for their carbon emissions by following certain practices. This article highlights the positive implications of TCE in comparison with TCO in IT organizations. Accordingly, IT Organizations can ensure environmental sustainability over the years without making any major changes when made mandatory. Moreover, it will help organizations to attain an optimized solution promising a better environment for future generations. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
10. Digital transformation strategy of business models: A framework approach in improving the traditional business model of software industry.
- Author
-
Yadav, Priyanka and Nisha, T. N.
- Subjects
DIGITAL transformation ,COMPUTER software industry ,BUSINESS software ,BUSINESS planning ,BUSINESS models ,DIGITAL technology ,SOCIAL media - Abstract
Organizations have leveraged the business model concept from the past two decades and emerging digital technologies that helped them remain competitive in the market. This paper mainly focuses on the various literature reviews that introduced the concept of digital transformation applied to business models, phases, and scope of changes in business models that can be leveraged in value proposition and innovation. The purpose of this paper is to integrate digital technologies like social media, analytics, cloud, and the Internet of Things (IoT)with the business model of startups and other software organizations. A Framework that captures the value proposition, process architecture, and financial stability of the organizations in the digital economy. This paper aims to improve the various existing models that lack digital aspects in the operational, value chain, and customer aspects. Leveraging the Shaping and visionary approach, this paper promotes the digital transformation of incumbents' business model to venture into a sustainable competitive environment. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. HYDROTHERMALLY GROWN ZnO/rGO AND ZnO/PANI NANOHYBRIDS: COMPARATIVE STUDY ON THEIR ELECTRICAL CONDUCTANCE.
- Author
-
Padmanabhan, Nisha T., Santhosh, Rose, Antony, Annett, and Mythili, Ushamani
- Subjects
ZINC oxide ,GRAPHENE - Abstract
The unique properties of Zinc Oxide, Graphene and their nanocomposite have enabled them to fabricate many optoelectronic devices which offer advantages like light weight, good stability and optical transparency. Conducting polymer/graphene hybrids are also a major class of composite materials for the fabrication of donor/acceptor based electronic devices. In this paper we report the synthesis, characterization and conductivity measurements in ZnO/rGO and ZnO/PANI binary nanohybrids. ZnO nanotops are synthesized by low temperature hydrothermal method, graphene oxide (GO) by modified Hummer's Method, reduced graphene oxide (rGO) by hydrothermal in situ reduction technique and PANI from aniline by chemical polyoxidation reaction. ZnO/rGO nanohybrid is prepared by hydrothermal treatment of ZnO and GO, whereas ZnO/PANI by in-situ oxidative polymerization of aniline in presence of ZnO. All the materials were characterized using SEM, TEM, XRD, UV-Vis, IR&TGA. The as-synthesized samples were dispersed in IPA, coated on quartz glass using spin-coating technique, and dark conductivity measurements were done. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
12. Effect of reaction variables on facet-controlled synthesis of anatase TiO2 photocatalysts.
- Author
-
Padmanabhan, Nisha T, Gopalakrishnan, Jayalatha, and John, Honey
- Subjects
TITANIUM dioxide ,PHOTOCATALYSTS ,CRYSTAL growth ,SOL-gel processes ,METHYLENE blue ,CETYLTRIMETHYLAMMONIUM bromide ,PHOTODEGRADATION - Abstract
This study reports the effect of various reaction variables of a tailor-made sol–gel synthesis method on the morphology and photocatalytic behaviour of nanostructured anatase TiO
2 photocatalysts. Reaction variables like solvent effects, hydrothermal and microwave conditions, type of capping agents and calcination affect the TiO2 crystal growth, and thereby, their optimal conditions are anticipated and discussed in detail. It is proposed that TiO2 exposed with characteristic facets can be prepared by a hydrothermal-modified sol–gel method employing a quaternary solution system at pH 3 along with cetyltrimethylammonium bromide (CTAB) as the capping agent. The optimal hydrothermal temperature affected the restructuring and crystallization of TiO2 by enhancing the phase transformation from amorphous to anatase. TiO2 crystal growth under microwave assistance was faster, which primarily resulted in low-energy facets exposure. The primary determination of photocatalytic efficiency of the samples was obtained from the photodegradation profiles of model dye methylene blue. An interesting find was that TiO2 synthesized under hydrothermal treatment in the presence of CTAB had a morphology determining behaviour at pH 3 favouring the selective stabilization of co-exposing high energy {010}/{100}, {001} and low energy {101} facets in TiO2 . The optimum percentage of high- and low-energy facets resulted in superior photocatalytic activity due to the spatial separation of photogenerated charge carriers. Furthermore, the present study has a great perspective on how particularly the reaction variables determine the direction of crystal growth of nano TiO2 and thereby its morphology that directly affect its photocatalytic efficiency. [ABSTRACT FROM AUTHOR]- Published
- 2022
- Full Text
- View/download PDF
13. Impact of structure, doping and defect-engineering in 2D materials on CO2 capture and conversion.
- Author
-
Jelmy, E. J., Thomas, Nishanth, Mathew, Dhanu Treasa, Louis, Jesna, Padmanabhan, Nisha T., Kumaravel, Vignesh, John, Honey, and Pillai, Suresh C.
- Published
- 2021
- Full Text
- View/download PDF
14. The Phenylpropanoid Pathway and Lignin in Defense against Ganoderma boninense Colonized Root Tissues in Oil Palm (Elaeis guineensis Jacq.).
- Author
-
Govender, Nisha T., Mahmood, Maziah, Seman, Idris A., and Mui-Yun Wong
- Subjects
PHENYLPROPANOIDS ,GANODERMA ,OIL palm - Abstract
Basal stem rot, caused by the basidiomycete fungus, Ganoderma boninense, is an economically devastating disease in Malaysia. Our study investigated the changes in lignin content and composition along with activity and expression of the phenylpropanoid pathway enzymes and genes in oil palm root tissues during G. boninense infection. We sampled control (non-inoculated) and infected (inoculated) seedlings at seven time points [1, 2, 3, 4, 8, and 12 weeks post-inoculation (wpi)] in a randomized design. The expression profiles of phenylalanine ammonia lyase (PAL), cinnamyl alcohol dehydrogenase (CAD), and peroxidase (POD) genes were monitored at 1, 2, and 3 wpi using real-time quantitative polymerase chain reaction. Seedlings at 4, 8, and 12 wpi were screened for lignin content, lignin composition, enzyme activities (PAL, CAD, and POD), growth (weight and height), and disease severity (DS). Gene expression analysis demonstrated up-regulation of PAL, CAD, and POD genes in the infected seedlings, relative to the control seedlings at 1, 2, and 3 wpi. At 2 and 3 wpi, CAD showed highest transcript levels compared to PAL and POD. DS increased progressively throughout sampling, with 5, 34, and 69% at 4, 8, and 12 wpi, respectively. Fresh weight and height of the infected seedlings were significantly lower compared to the control seedlings at 8 and 12 wpi. Lignin content of the infected seedlings at 4 wpi was significantly higher than the control seedlings, remained elicited with no change at 8 wpi, and then collapsed with a significant reduction at 12 wpi. The nitrobenzene oxidation products of oil palm root lignin yielded both syringyl and guaiacyl monomers. Accumulation of lignin in the infected seedlings was in parallel to increased syringyl monomers, at 4 and 8 wpi. The activities of PAL and CAD enzymes in the infected seedlings at DS = 5-34% were significantly higher than the control seedlings and thereafter collapsed at DS = 69%. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
15. Experimental Study on Chunking Algorithms of Data Deduplication System on Large Scale Data.
- Author
-
Nisha, T. R., Abirami, S., and Manohar, E.
- Published
- 2016
- Full Text
- View/download PDF
16. Simple diagrammatic method to delineate male urethra in prostate cancer radiotherapy: an MRI based approach.
- Author
-
KATARIA, TEJINDER, GUPTA, DEEPAK, GOYAL, SHIKHA, BISHT, SHYAM S., CHAUDHARY, RAVI, NARANG, KUSHAL, BANERJEE, SUSOVAN, BASU, TRINANJAN, ABHISHEK, ASHU, SAMBASIVAM, SASIKUMAR, and VISHNU, NISHA T.
- Abstract
Stereotactic body radiotherapy (SBRT) is being increasingly utilized in the treatment of prostate cancer. With the advent of high-precision radiosurgery systems, it is possible to obtain dose distributions akin to high-dose rate brachytherapy with SBRT. However, urethral toxicity has a significant impact on the quality of life in patients with prostate cancer. Contouring the male urethra on a CT scan is difficult in the absence of an indwelling catheter. In this pictorial essay, we have used the MRI obtained for radiotherapy planning to aid in the delineation of the male urethra and have attempted to define guidelines for the same. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
17. Identification of novel drug candidate against Mycobacterium Tuberculosis InhA protein through Computer aided drug discovery.
- Author
-
Nair, Nisha T., Nisthar, Shefin, and Sunil Kumar, Bindu A.
- Subjects
TUBERCULOSIS ,MYCOBACTERIA ,BINDING sites ,HYDROGEN bonding ,LIGANDS (Biochemistry) - Abstract
Tuberculosis is a common and often deadly infectious disease caused by Mycobacteria. WHO estimates that around eight million people are suffering from tuberculosis every year. The Administration of antibiotics fails due to the multi-drug resistant capability of Mycobacterium. Traditional methods require time and huge investment. Therefore, it is essential to provide an alternative strategy to treat tuberculosis disease. The present study conducted molecular docking against InhA protein, which is a potential target of tuberculosis disease. After docking with 1200 ligand molecule, 30 hits were selected based on the GOLD score. Finally, five potential hits were identified after redocking. The hydrogen bonding pattern, Lipinski's rule, and drug likeliness were also checked for their potentiality as suitable drug candidates. We believe that our study will facilitate the selection of InhA as a potential target and selected hits as successful drug candidates for tuberculosis diseases. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
18. Is wheat germ grass detrimental during radiotherapy?: a hypothesis.
- Author
-
Kataria, Tejinder, Gupta, Deepak, Sambasivam, Sasikumar, Vishnu, Nisha T., Goyal, Shikha, Bisht, Shyam Singh, Basu, Trinanjan, Abhishek, Ashu, Narang, Kushal, and Banerjee, Susovan
- Subjects
THERAPEUTIC use of antioxidants ,CARCINOGENESIS ,THERAPEUTIC use of plant extracts ,WHEAT ,FUNCTIONAL foods ,HORMONE metabolism ,ENZYME metabolism ,REACTIVE oxygen species ,ANTIOXIDANTS ,DIETARY supplements ,HYDROXYLATION ,RADIOTHERAPY ,SUPEROXIDE dismutase ,OXIDATIVE stress ,PHYTOCHEMICALS ,FREE radical scavengers ,PHYSIOLOGICAL effects of radiation ,PREVENTION ,THERAPEUTICS - Published
- 2016
- Full Text
- View/download PDF
19. Estimation of fault location algorithm in series compensated FACT systems.
- Author
-
Srivani, S G and Nisha, T T
- Published
- 2012
- Full Text
- View/download PDF
20. Human AKR1C Isoforms Oxidize the Potent Proximate Carcinogen 7,12-DMBA-3,4-diol in the Human Lung A549 Carcinoma Cell Line.
- Author
-
Palackal, Nisha T., Seon Hwa Lee, Harvey, Ronald G., Blair, Ian A., and Penning, Trevor M.
- Subjects
CARCINOGENS ,CARCINOGENESIS ,CANCER cells ,CELL lines ,OXIDATION-reduction reaction - Abstract
Aldo-keto reductases (AKRs) oxidize structurally diverse PAH trans -dihydrodiols to yield reactive and redox active o -quinones. This study examined the ability of AKR1C2 and AKR1C4 to oxidize PAH trans -dihydrodiols of the benz[ a ]anthracene series. The enzymes oxidized 100% of the racemic trans -dihydrodiols and the highest utilization ratios were observed for the more potent proximate carcinogens 7,12-dimethylbenz[ a ]anthracene-3,4-diol (DMBA-3,4-diol) and 7-methylbenz[ a ]anthracene-3,4-diol (7-MBA-3,4-diol). Human multiple tissue expression array analysis revealed high expression of AKR1C isoforms in the human lung carcinoma cell line A549. Both Western blot analysis using AKR1C9 antisera and enzymatic assays using 1-acenapthanol as substrate confirmed the presence of active AKR1C enzymes in A549 cells. To determine the importance of AKR1C-mediated trans -dihydrodiol oxidation in A549 cells, DMBA-3,4-diol was incubated with cell lysates in the presence of 2-mercaptoethanol. Liquid chromatography/mass spectrometric analysis identified peaks that corresponded to the synthetically prepared mono- and bis -thioether conjugates of DMBA-3,4-dione confirming the ability of these cells to oxidize DMBA-3,4-diol to the corresponding o -quinone. Together, these studies demonstrate the importance of human AKR1Cs in PAH activation and their possible role in lung cancer. [ABSTRACT FROM AUTHOR]
- Published
- 2002
- Full Text
- View/download PDF
21. The Aldo-Keto Reductases and Polycyclic Aromatic Hydrocarbon Activation.
- Author
-
Penning, Trevor M., Palackal, Nisha T., Blair, Ian A., and Harvey, Ronald G.
- Subjects
KETONES ,POLYCYCLIC aromatic hydrocarbons ,ACTIVATION (Chemistry) ,OXIDOREDUCTASES ,ALCOHOL dehydrogenase ,DNA - Abstract
The aldo-keto reductases (AKRs), are monomeric 37 kDa oxidoreductases that catalyze the NADP + -dependent oxidation of PAH trans -dihydrodiol proximate carcinogens to their reactive and redox-active o -quinones. Five human isoforms have been cloned and expressed as purified recombinant enzymes (AKR1C1-AKR1C4 and AKR1A1). Of these the general metabolic enzyme aldehyde reductase (AKR1A1) displays the highest utilization ratio for the oxidation of (-) R,R -benzo[ a ]pyrene-7,8-diol (BP-7,8-diol) to benzo[ a ]pyrene-7,8-dione (BP-7,8-dione). AKR1A1 is coexpressed with CYP1A1 and epoxide hydrolase suggesting that it is exposed to its trans -dihydrodiol substrates in situ. PAH o -quinones produced by AKRs are highly electrophilic yielding bimolecular rate constants for the addition of GSH of at least 1.3 × 10 3 M -1 min -1 . By reacting with DNA, PAH o -quinones form both stable and depurinating adducts in vitro. By entering into futile redox-cycles the PAH o -quinones can amplify the production of reactive oxygen species and increase 7,8-dihydro-8-oxo-2-deoxyguanosine (8-oxo-dGuo) formation. The spectrum of DNA-adducts and generation of prooxidants (reactive oxygen) may explain how PAHs can act as complete carcinogens. [ABSTRACT FROM AUTHOR]
- Published
- 2002
- Full Text
- View/download PDF
22. Polycyclic Aromatic Hydrocarbon Trans -Dihydrodiol Specificity of four Recombinant Human Dihydrodiol Dehydrogenase Isoforms.
- Author
-
Burczynski, Michael E., Palackal, Nisha T., Harvey, Ronald G., and Penning, Trevor M.
- Published
- 2000
- Full Text
- View/download PDF
23. Phenytoin Induced Cutaneous B Cell Pseudolymphoma.
- Author
-
Riyaz, Najeeba, Sasidharanpillai, Sarita, Aravindan, Karumathil P., Nobin, Babu K., Raghavan, Nisha T., and Nikhila, Pappinissery K.
- Abstract
Cutaneous pseudolymphomas are benign lymphoproliferative processes mimicking lymphomas clinically and histologically. One of the precipitating factors for pseudolymphoma is drugs like anticonvulsants, antidepressants and angiotensin-converting enzyme inhibitors. According to existing literature phenytoin-induced cutaneous pseudolymphomas are usually T-cell predominant. Most often withdrawal of the drug with or without short-course systemic steroids can attain a cure. Rarely malignant transformation has been reported years later despite withdrawal of the offending drug, which necessitates a long-term follow up of the affected. We report an 80-year-old male patient who was receiving phenytoin sodium and who presented with diffuse erythema and infiltrated skin lesions which histologically resembled cutaneous B-cell lymphoma. Substituting phenytoin with levetiracetam achieved resolution of symptoms. Further evaluation was suggestive of a reactive process. A detailed drug history is of paramount importance in differentiating drug-induced pseudolymphoma from lymphoma. Searching literature we could not find any previous reports of phenytoin-induced cutaneous B-cell pseudolymphoma. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
24. RNA-seq data of Ganoderma boninense at axenic culture condition and under in planta pathogen-oil palm (Elaeis guineensis Jacq.) interaction.
- Author
-
Wong, Mui Yun, Govender, Nisha T., and Ong, Chia Sui
- Subjects
OIL palm ,AXENIC cultures ,GANODERMA ,PALMS ,MICROBIAL virulence - Abstract
Objective: Basal stem rot disease causes severe economic losses to oil palm production in South-east Asia and little is known on the pathogenicity of the pathogen, the basidiomyceteous Ganoderma boninense. Our data presented here aims to identify both the house-keeping and pathogenicity genes of G. boninense using Illumina sequencing reads. Description: The hemibiotroph G. boninense establishes via root contact during early stage of colonization and subsequently kills the host tissue as the disease progresses. Information on the pathogenicity factors/genes that causes BSR remain poorly understood. In addition, the molecular expressions corresponding to G. boninense growth and pathogenicity are not reported. Here, six transcriptome datasets of G. boninense from two contrasting conditions (three biological replicates per condition) are presented. The first datasets, collected from a 7-day-old axenic condition provide an insight onto genes responsible for sustenance, growth and development of G. boninense while datasets of the infecting G. boninense collected from oil palm-G. boninense pathosystem (in planta condition) at 1 month post-inoculation offer a comprehensive avenue to understand G. boninense pathogenesis and infection especially in regard to molecular mechanisms and pathways. Raw sequences deposited in Sequence Read Archive (SRA) are available at NCBI SRA portal with PRJNA514399, bioproject ID. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
25. Health care service utility behaviour of mothers.
- Author
-
Nisha, T. S. and Sukumaran, P. S.
- Subjects
MOTHERS ,MEDICAL care - Abstract
An abstract of the article "Health care service utility behaviour of mothers," by T. S. Nisha and colleagues is presented.
- Published
- 2014
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.