Search results for " extract"

showing 10 items of 2021 documents

Behaviour of sediment-associated silver nanoparticles and their toxicity to Lumbriculus variegatus

2017

The increasing use of silver nanoparticles (AgNPs) in industry and consumer products results in the increasing environmental concentrations of AgNPs. In the aquatic environment, sediment is the major sink for the AgNPs. The behaviour and toxicity of AgNPs in sediments is largely unknown, and therefore the potential risk to the benthic ecosystems is difficult to predict. The aim of this thesis was to study the toxicity and uptake of uncoated AgNPs (uc-AgNPs) and polyvinylpyrrolidone-coated AgNPs (PVP-AgNPs) to Lumbriculus variegatus in sediment exposures. Also, the association of AgNP-originated dissolved Ag with sediment components was studied using a sequential extraction method. Studies w…

silver nanoparticlesionithopeatoxicitykasautuminensedimentitnitraatitmyrkyllisyysbioaccessilbilitypohjaeläimistösedimentsilver nitrateLumbriculus variegatussequential extractionnanohiukkasetbiosaatavuusharvasukasmadot
researchProduct

Improving the Use of Simulation in Nursing Education: Protocol for a Realist Review

2020

BackgroundNursing education has evolved in line with societal needs, and simulation-based learning (SBL) is increasingly being used to bridge the gap between practice and education. Previous literature reviews have demonstrated the effectiveness of using SBL in nursing education. However, there is a need to explore how and why it works to expand the theoretical foundation of SBL.ObjectiveThis review aims to understand how, why, and in what circumstances the use of simulation affects learning as part of the bachelor’s program in nursing.MethodsA realist review will be conducted in accordance with the realist template for a systematic review. In particular, we will identify and explore the un…

simulation training020205 medical informaticsmedia_common.quotation_subjectComputer applications to medicine. Medical informaticsR858-859.7Delphi method02 engineering and technologyBachelorOutcome (game theory)03 medical and health sciencesnursingProtocol0202 electrical engineering electronic engineering information engineeringSociologyNurse educationrealist reviewmedia_commonProtocol (science)educationlearning030504 nursingRFoundation (evidence)General MedicineVDP::Medisinske Fag: 700::Helsefag: 800Work (electrical)Data extractionVDP::Medisinske Fag: 700::Helsefag: 800::Sykepleievitenskap: 808MedicineEngineering ethics0305 other medical scienceJMIR Research Protocols
researchProduct

Assays for detection of fungal hallucinogens such as psilocybin and psilocin

2016

Methods applicable to the detection of hallucinogenic indole compounds, namely psilocybin, psilocin, and related molecules, that have been developed so far for purposes of mycological research, toxicological studies, or forensic investigations are described in this chapter. The most current literature as well as some interesting older publications are cited, providing a historical overview of the subject. Methods of qualitative and quantitative analysis are presented. Additionally, preliminary purification steps and sample treatment before the exact quantitative determination are proposed. The methods described utilized various analytical techniques for the measurement of psilocybin/psiloci…

solid phase extractionindolealkylamineshigh-performance liquid chromatographypsilocinpsilocybinmass spectrometry
researchProduct

Impact of the Extraction Method on the Chemical Composition and Antioxidant Potency of Rosmarinus officinalis L. Extracts

2023

Rosmarinus officinalis L. is a dietary source that produces polyphenols as secondary metabolites. These natural compounds with potent antioxidant abilities are increasingly recommended as a supplement to inhibit oxidative stress. In the current work, we evaluated the impact of the extraction method on the chemical composition of R. officinalis extract, especially on the content of carnosic (CA) and rosmarinic (RA) acids using UPLC-MS-DAD as well as on their antioxidant potency. Four extracts of Tunisian rosemary were obtained from non-conventional extraction techniques:ultrasound-assisted extraction (UAE),supercritical extraction (SFE) and UAE and SFE combined ((UAE-SFE(I), UAE-SFE(II)). Th…

sonication<i>Rosmarinus officinalis</i> L.antioxidantUPLC-MS-DAD analysisEndocrinology Diabetes and MetabolismRosmarinus officinalis L UPLC-MS-DAD analysis antioxidant sonication supercritical extractionsupercritical extractionMolecular BiologyBiochemistry
researchProduct

Evaluation of the Behavior of Phenolic Compounds and Steviol Glycosides of Sonicated Strawberry Juice Sweetened with Stevia (Stevia rebaudiana Berton…

2019

In this study, the influence of stevia addition and sonication processing parameters on the phenolic content and profile as well as the steviol glycosides of strawberry juice-based samples was investigated. For this purpose, three matrices&mdash

sonicationSonicationgreen stevia powder ; strawberry juice ; antioxidant compounds ; steviol glycosides ; sonicationPharmaceutical ScienceSteviol01 natural sciencesFragariaArticleAntioxidantsAnalytical Chemistrylcsh:QD241-441chemistry.chemical_compound0404 agricultural biotechnologylcsh:Organic chemistryantioxidant compoundsGlucosidesPhenolsDrug DiscoveryFood scienceSteviosidePhysical and Theoretical Chemistrysteviol glycosidesstrawberry juiceChromatography High Pressure Liquidchemistry.chemical_classificationFlavonoidsbiologyPlant Extracts010401 analytical chemistryOrganic ChemistryGlycoside04 agricultural and veterinary sciencesSweetnessgreen stevia powderbiology.organism_classification040401 food scienceStevia0104 chemical sciencesStevia rebaudianachemistryChemistry (miscellaneous)Molecular MedicineKaempferolDiterpenes KauraneMolecules
researchProduct

Supercritical Antisolvent Extraction of Bioactive Compounds from Mango by-Products

2013

supercritical fluids extraction bio-compoundSettore ING-IND/25 - Impianti Chimici
researchProduct

Determination of glyphosate and its metabolite aminomethylphosphonic acid in fruit juices using supported-liquid membrane preconcentration method wit…

2005

Abstract The application of supported-liquid membrane (SLM) technique for effective extraction of N -(phosphonomethyl)glycine (glyphosate) and its primary metabolite aminomethylphosphonic acid (AMPA) from juices (orange, grapefruit, apple and blackcurrant) in combination with HPLC-UV detection after derivatization with p -toluenesulphonyl chloride (TsCl) is presented. The influence of various parameters such as the composition of acceptor phase, flow-rate, concentration of analytes, on the performance of extraction procedure, was studied. It was shown that by appropriate manipulation of SLM parameters the level of detection could be significantly improved. The influence of SLM conditions on…

supported-liquid membrane extractionMetaboliteGlycineOrganophosphonatesTetrazolesaminomethylphosphonic acidfruit juiceBiochemistryHigh-performance liquid chromatographyChlorideAnalytical ChemistryBeveragesTosyl Compoundschemistry.chemical_compoundglyphosatemedicineSample preparationAminomethylphosphonic acidDerivatizationChromatography High Pressure LiquidChromatographyOrganic ChemistryPrimary metaboliteMembranes ArtificialIsoxazolespesticidesGeneral MedicinechemistryFruitGlyphosateCalibrationSpectrophotometry UltravioletHPLCmedicine.drugJournal of Chromatography A
researchProduct

A comparison between two feature selection algorithms

2017

This article provides a comparison of two feature selection algorithms, Information Gain Thresholding and Koller and Sahami's algorithm in the context of text document classification on the Reuters Corpus Volume 1 dataset. The algorithms were evaluated by testing the performance of classifiers trained on the features they select from a given dataset. Results show that Koller and Sahami's algorithm consistently outperforms Information Gain Thresholding by capturing interactions between features and avoiding redundancy among features, although it achieves its gains through increased complexity and longer running time.

symbols.namesakeTruncation selectionRedundancy (information theory)Computer scienceFeature extractionsymbolsMarkov processFeature selectionAlgorithm designThresholdingAlgorithmRunning time2017 21st International Conference on System Theory, Control and Computing (ICSTCC)
researchProduct

A Network-Based Framework for Mobile Threat Detection

2018

Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…

ta113Computer scienceintrusion detectionmobile threatsFeature extractionEvasion (network security)concept-driftAdversaryComputer securitycomputer.software_genreFlow networkMobile malwareanomaly detectionVariety (cybernetics)haittaohjelmatmachine learningkoneoppiminenmobiililaitteetMalwaretietoturvacomputerHumanoid robot
researchProduct

Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware

2013

Abstract. —In the modern world, a rapid growth of mali- cious software production has become one of the most signifi- cant threats to the network security. Unfortunately, wides pread signature-based anti-malware strategies can not help to de tect malware unseen previously nor deal with code obfuscation te ch- niques employed by malware designers. In our study, the prob lem of malware detection and classification is solved by applyin g a data-mining-based approach that relies on supervised mach ine- learning. Executable files are presented in the form of byte a nd opcode sequences and n-gram models are employed to extract essential features from these sequences. Feature vectors o btained are…

ta113Network securitybusiness.industryComputer scienceFeature vectorFeature extractionuhatBytecomputer.file_formatMachine learningcomputer.software_genrehaittaohjelmatSupport vector machineObfuscation (software)ComputingMethodologies_PATTERNRECOGNITIONnetworknetwork securityMalwareData miningArtificial intelligenceExecutabletietoturvabusinesscomputer2013 IEEE Globecom Workshops (GC Wkshps)
researchProduct