RRJoCB

A General Review of Tinospora Cordifolia from Ayurvedic Perspective

[{“box”:0,”content”:”

n

n

 > 

n

n

 > 

n

n

n

n

n

n

n

By [foreach 286]u00a0

u00a0Gyanendra Kumar Gupta, Gagan Devi,

[/foreach]
nJanuary 7, 2023 at 12:18 pm

n

nAbstract

n

Tinospora Cordifolia plant is a deciduous shrub, sometimes grown as an ornamental, and stem cuttings are a simple way to propagate it. It thrives in practically every type of soil and under a variety of environmental conditions. It has been particularly trained to grow on the Neem tree, and as a result, it is said to have greater therapeutic value. It can also be cultivated by spreading seeds in the monsoon, but seedlings develop much slower than plants cultivated by cutting.

n

n

n

n

Volume :u00a0u00a09 | Issue :u00a0u00a01 | Received :u00a0u00a0January 25, 2021 | Accepted :u00a0u00a0February 28, 2022 | Published :u00a0u00a0March 13, 2022n[if 424 equals=”Regular Issue”][This article belongs to Research & Reviews : Journal of Computational Biology(rrjocb)] [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue A General Review of Tinospora Cordifolia from Ayurvedic Perspective under section in Research & Reviews : Journal of Computational Biology(rrjocb)] [/if 424]
Keywords Tinospora Cordifolia, Ornamental, Stem cutting, Neem tree and Deciduous Shrub.

n

n

n

n

n


n[if 992 equals=”Transformative”]

n

n

Full Text

n

n

n

[/if 992][if 992 not_equal=”Transformative”]

n

n

Full Text

n

n

n

[/if 992] n


nn

[if 379 not_equal=””]n

[foreach 379]n

n[/foreach]

n[/if 379]

n

References

n[if 1104 equals=””]n

1. http://localhost:4001/e-nighantu/bhavaprakashanighantu/?mod=read; Guduchyadi varga; 1-4
2. Agnivesha, Charaka samhita, elaborated by Charak and Dradhbala with Ayurveddeepika commentary by Shri Chakrapanidutta, Edited by: Vaidya Yadavji trikamji acharya, Prolouged by: Prof. R.H.Shingh Published by: Chaukhambha Subharati Prakashan Reprinted 2011
3. Sushruta, V., Sushruta, A., Nagarjuna, C. and Samhita, S., 2008. With commentary Nibandhsangraha of Dalhanacharya, edited by Acharya yadavaji trikamji, Sutrasthana 38/6, 22, 31, 33, 54. Reprint, Chaukhambha surbharti Prakashan, Varanasi, pp. 164–68.
4. Vagabhat, A.H., 2010. With Sarvangsudara vyakhya of Arunadatta and Ayurveda Rasayana of Hemadri, edited by Hari Sadashiva shashtri Paradakara. Reprint, Chaukhambha Prakshana, Varanasi.
5. Bhela Samhita; Girijadaya Shukla, chowkambha Press, Varanasi.
6. Harit. Harit Samhita. Pt. Hariprasad Tripathi editor. Reprinted ed. Harit Chikitsa Sthana chapter no.2, verse no-71 to Harit Samita chapter no.58, verse no.11.Varanasi: Chaukhamba Krishanadas academy; 2009
7. Sharangdhara, Sharangdhar Samhita;With commentaries Aadhamalla and Kasiramas Gudarth Dipika,edited by Pt. Parashuram Shastri Vidyasagar, Reprint Edition 2006, Chaukhamnha Surbharati Prakashana,Varanasi, 2006
8. Acharya Vahata, Astanga Nighantu, Varunadi gana, e-nighantu.
9. Anonymous, Dhanvantari Nighantu, edited by Prof. Priyavrat sharma, reprint Edition; 2012, Chaukhambha Orientalia, Varanasi; 16–17.
10. Madanapala, A. and Nighantu, M., 2009. Pandit Hariharprasad Trivedi. Varanasi: Chaukhambha Krishnadas Academy.
11. Acharya Kaideva, Kaiyadeva Nighantu, Aushadhi varga/20, edited by Prof. Priyavrat Sharma Chaukhambha Orientalia,reprinted edition,2013, Varanasi; 5
12. Narhari pandita, Raja Nighantu, edited by Dr. Indradeva Tripathi, 5th Edition,2010; Chowkhambha Krishnadas Academy, Varanasi, 2066; 31

nn[/if 1104] [if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””], [/if 1106]
  2. n[/foreach]

n[/if 1104]

n[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=”Regular Issue”] Regular Issue[/if 424] Open Access Article

n

Research & Reviews : Journal of Computational Biology

ISSN: 2319-3433

Editors Overview

rrjocb maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

n

“},{“box”:4,”content”:”

n“},{“box”:1,”content”:”

    By  [foreach 286]n

  1. n

    Gyanendra Kumar Gupta, Gagan Devi

    n

  2. [/foreach]

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Professor & HOD,Department of Kriya Sharir, RK Institute of Ayurvedic Medical Sciences,Uttar Pradesh,India
  2. n[/if 1175][/foreach]

n

n

n

n

n

Abstract

nTinospora Cordifolia plant is a deciduous shrub, sometimes grown as an ornamental, and stem cuttings are a simple way to propagate it. It thrives in practically every type of soil and under a variety of environmental conditions. It has been particularly trained to grow on the Neem tree, and as a result, it is said to have greater therapeutic value. It can also be cultivated by spreading seeds in the monsoon, but seedlings develop much slower than plants cultivated by cutting.n

n

n

Keywords: Tinospora Cordifolia, Ornamental, Stem cutting, Neem tree and Deciduous Shrub.

n[if 424 equals=”Regular Issue”][This article belongs to Research & Reviews : Journal of Computational Biology(rrjocb)]

n[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Research & Reviews : Journal of Computational Biology(rrjocb)] [/if 424]

n

n

n


n[if 992 equals=”Transformative”]n

n

n

Full Text

n

n

nn[/if 992]n[if 992 not_equal=”Transformative”]n

n

Full Text

n

n

n

n


[/if 992]n[if 379 not_equal=””]

Browse Figures

n

n

[foreach 379]n

n[/foreach]

n

[/if 379]n

n

References

n[if 1104 equals=””]

1. http://localhost:4001/e-nighantu/bhavaprakashanighantu/?mod=read; Guduchyadi varga; 1-4
2. Agnivesha, Charaka samhita, elaborated by Charak and Dradhbala with Ayurveddeepika commentary by Shri Chakrapanidutta, Edited by: Vaidya Yadavji trikamji acharya, Prolouged by: Prof. R.H.Shingh Published by: Chaukhambha Subharati Prakashan Reprinted 2011
3. Sushruta, V., Sushruta, A., Nagarjuna, C. and Samhita, S., 2008. With commentary Nibandhsangraha of Dalhanacharya, edited by Acharya yadavaji trikamji, Sutrasthana 38/6, 22, 31, 33, 54. Reprint, Chaukhambha surbharti Prakashan, Varanasi, pp. 164–68.
4. Vagabhat, A.H., 2010. With Sarvangsudara vyakhya of Arunadatta and Ayurveda Rasayana of Hemadri, edited by Hari Sadashiva shashtri Paradakara. Reprint, Chaukhambha Prakshana, Varanasi.
5. Bhela Samhita; Girijadaya Shukla, chowkambha Press, Varanasi.
6. Harit. Harit Samhita. Pt. Hariprasad Tripathi editor. Reprinted ed. Harit Chikitsa Sthana chapter no.2, verse no-71 to Harit Samita chapter no.58, verse no.11.Varanasi: Chaukhamba Krishanadas academy; 2009
7. Sharangdhara, Sharangdhar Samhita;With commentaries Aadhamalla and Kasiramas Gudarth Dipika,edited by Pt. Parashuram Shastri Vidyasagar, Reprint Edition 2006, Chaukhamnha Surbharati Prakashana,Varanasi, 2006
8. Acharya Vahata, Astanga Nighantu, Varunadi gana, e-nighantu.
9. Anonymous, Dhanvantari Nighantu, edited by Prof. Priyavrat sharma, reprint Edition; 2012, Chaukhambha Orientalia, Varanasi; 16–17.
10. Madanapala, A. and Nighantu, M., 2009. Pandit Hariharprasad Trivedi. Varanasi: Chaukhambha Krishnadas Academy.
11. Acharya Kaideva, Kaiyadeva Nighantu, Aushadhi varga/20, edited by Prof. Priyavrat Sharma Chaukhambha Orientalia,reprinted edition,2013, Varanasi; 5
12. Narhari pandita, Raja Nighantu, edited by Dr. Indradeva Tripathi, 5th Edition,2010; Chowkhambha Krishnadas Academy, Varanasi, 2066; 31

n[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


n[if 1114 equals=”Yes”]n

n[/if 1114]”},{“box”:2,”content”:”

Regular Issue Open Access Article

n

n

n

n

n

Research & Reviews : Journal of Computational Biology

n

[if 344 not_equal=””]ISSN: 2319-3433[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 9
Issue 1
Received January 25, 2021
Accepted February 28, 2022
Published March 13, 2022

n

n

n

n

Editor

n

n


n

Reviewer

n

n


n n

n”},{“box”:6,”content”:”“}]

Read More
RRJoCB

Computer Vision Algorithm for Surface Defects Identification in TIG Welded Joints

[{“box”:0,”content”:”

n

n

 > 

n

n

 > 

n

n

n

n

n

n

n

By [foreach 286]u00a0

u00a0Sunil Kumar, Adarsh Kumar,

[/foreach]
nJanuary 7, 2023 at 12:12 pm

n

nAbstract

n

Quality monitoring of welded joints is still quite a tedious job for many industries. The surface defects on welded joints arises from the improper selection of various input parameters which further result bad quality weld. This paper highlight the application of a computer vision algorithm called discrete Fourier transformation approach for identification of surface defects present on TIG welded joints.

n

n

n

n

Volume :u00a0u00a010 | Issue :u00a0u00a01 | Received :u00a0u00a0March 9, 2021 | Accepted :u00a0u00a0April 20, 2021 | Published :u00a0u00a0April 29, 2021n[if 424 equals=”Regular Issue”][This article belongs to Research & Reviews : Journal of Computational Biology(rrjocb)] [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue Computer Vision Algorithm for Surface Defects Identification in TIG Welded Joints under section in Research & Reviews : Journal of Computational Biology(rrjocb)] [/if 424]
Keywords Machine vision, surface defects, TIG welding, Fourier transformation

n

n

n

n

n


n[if 992 equals=”Transformative”]

n

n

Full Text

n

n

n

[/if 992][if 992 not_equal=”Transformative”]

n

n

Full Text

n

n

n

[/if 992] n


nn

[if 379 not_equal=””]n

[foreach 379]n

n[/foreach]

n[/if 379]

n

References

n[if 1104 equals=””]n

1. Jain R, Kasturi R, Schunck BG. Machine vision. Vol. 5. New York: McGraw-Hill; 1995.
2. Davies ER. Machine vision: theory, algorithms, practicalities. Elsevier; 2004.
3. Chen YR, Chao K, Kim MS. Machine vision technology for agricultural applications. Comput Electron Agric. 2002;36(2–3):173–91. doi: 10.1016/S0168–1699(02)00100-X.
4. Oren M, Nayar SK. Generalization of the Lambertian model and implications for machine vision. Int J Comput Vision. 1995;14(3):227–51. doi: 10.1007/BF01679684.
5. Pérez L, Rodríguez Í, Rodríguez N, Usamentiaga R, García DF. Robot guidance using machine vision techniques in industrial environments: A comparative review. Sensors (Basel). 2016;16(3):335. doi: 10.3390/s16030335, PMID 26959030.
6. Vernon D. Machine vision-

nn[/if 1104] [if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””], [/if 1106]
  2. n[/foreach]

n[/if 1104]

n[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=”Regular Issue”] Regular Issue[/if 424] Open Access Article

n

Research & Reviews : Journal of Computational Biology

ISSN: 2319-3433

Editors Overview

rrjocb maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

n

“},{“box”:4,”content”:”

n“},{“box”:1,”content”:”

    By  [foreach 286]n

  1. n

    Sunil Kumar, Adarsh Kumar

    n

  2. [/foreach]

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Research Scholar, Assistant Professor,Department of Mechanical Engineering, Bansal Institute of Engineering and Technology, Department of Mechanical Engineering, Bansal Institute Of Engineering and Technology,,India, India
  2. n[/if 1175][/foreach]

n

n

n

n

n

Abstract

nQuality monitoring of welded joints is still quite a tedious job for many industries. The surface defects on welded joints arises from the improper selection of various input parameters which further result bad quality weld. This paper highlight the application of a computer vision algorithm called discrete Fourier transformation approach for identification of surface defects present on TIG welded joints.n

n

n

Keywords: Machine vision, surface defects, TIG welding, Fourier transformation

n[if 424 equals=”Regular Issue”][This article belongs to Research & Reviews : Journal of Computational Biology(rrjocb)]

n[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Research & Reviews : Journal of Computational Biology(rrjocb)] [/if 424]

n

n

n


n[if 992 equals=”Transformative”]n

n

n

Full Text

n

n

nn[/if 992]n[if 992 not_equal=”Transformative”]n

n

Full Text

n

n

n

n


[/if 992]n[if 379 not_equal=””]

Browse Figures

n

n

[foreach 379]n

n[/foreach]

n

[/if 379]n

n

References

n[if 1104 equals=””]

1. Jain R, Kasturi R, Schunck BG. Machine vision. Vol. 5. New York: McGraw-Hill; 1995.
2. Davies ER. Machine vision: theory, algorithms, practicalities. Elsevier; 2004.
3. Chen YR, Chao K, Kim MS. Machine vision technology for agricultural applications. Comput Electron Agric. 2002;36(2–3):173–91. doi: 10.1016/S0168–1699(02)00100-X.
4. Oren M, Nayar SK. Generalization of the Lambertian model and implications for machine vision. Int J Comput Vision. 1995;14(3):227–51. doi: 10.1007/BF01679684.
5. Pérez L, Rodríguez Í, Rodríguez N, Usamentiaga R, García DF. Robot guidance using machine vision techniques in industrial environments: A comparative review. Sensors (Basel). 2016;16(3):335. doi: 10.3390/s16030335, PMID 26959030.
6. Vernon D. Machine vision-

n[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


n[if 1114 equals=”Yes”]n

n[/if 1114]”},{“box”:2,”content”:”

Regular Issue Open Access Article

n

n

n

n

n

Research & Reviews : Journal of Computational Biology

n

[if 344 not_equal=””]ISSN: 2319-3433[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 10
Issue 1
Received March 9, 2021
Accepted April 20, 2021
Published April 29, 2021

n

n

n

n

Editor

n

n


n

Reviewer

n

n


n n

n”},{“box”:6,”content”:”“}]

Read More
RRJoCB

In Silico Screening and Evaluation of Some Metabolites from Momordica charantia in the Treatment of Peptic Ulcers

[{“box”:0,”content”:”

n

n

 > 

n

n

 > 

n

n

n

n

n

n

n

By [foreach 286]u00a0

u00a0D.S.V.G.K. Kaladhar, Akhilesh Tiwari, Shristi Sharma,

[/foreach]
nJanuary 7, 2023 at 12:07 pm

n

nAbstract

n

Peptic ulcers are also called as or duodenal ulcers or gastric ulcers that are open sores generally develop in the lining of the stomach due to food and climatic factors. H. pylori infections are potentially the most dangerous and are linked to several diseases like diabetes, cancer, cardiovascular diseases, etc. In the present study, in silico screening and evaluation of some metabolites from Momordica charantia like Momorcharin, Momordicin, Metformin, Pioglitazone, Glipizide, Gliclazide and Glibenclamide in the treatment of peptic ulcers has been conducted. Vacuolating cytotoxin autotransporter (VacA) causes ulceration and gastric lesions is interacting with Urease subunit alpha (ure a), Outer membrane protein-adhesin (babA), Acid-activated urea channel (ureI; rapidly enhances the production of ammonia) and Cytotoxicity-associated immunodominant antigen (CagA). CagA is directly interacting with Serine/threonine-protein kinase CtkA and Cag island protein (virD4). Glibenclamide, Glipizide and Momorcharin has shown good results with Vac A and CagA involved in peptic ulcer. The present study has shown that Glibenclamide is found as effective molecule in the control of peptic ulcer.

n

n

n

n

Volume :u00a0u00a010 | Issue :u00a0u00a01 | Received :u00a0u00a0March 25, 2021 | Accepted :u00a0u00a0March 27, 2021 | Published :u00a0u00a0April 30, 2021n[if 424 equals=”Regular Issue”][This article belongs to Research & Reviews : Journal of Computational Biology(rrjocb)] [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue In Silico Screening and Evaluation of Some Metabolites from Momordica charantia in the Treatment of Peptic Ulcers under section in Research & Reviews : Journal of Computational Biology(rrjocb)] [/if 424]
Keywords Peptic ulcers, Cag A, Vac A, in silico screening, Momordica charantia

n

n

n

n

n


n[if 992 equals=”Transformative”]

n

n

Full Text

n

n

n

[/if 992][if 992 not_equal=”Transformative”]

n

n

Full Text

n

n

n

[/if 992] n


nn

[if 379 not_equal=””]n

[foreach 379]n

n[/foreach]

n[/if 379]

n

References

n[if 1104 equals=””]n

1. Fan M, Kim EK, Choi YJ, Tang Y, Moon SH. The role of Momordica charantia in resisting obesity. Int J Environ Res Public Health. 2019;16(18):3251. doi: 10.3390/ijerph16183251, PMID 31487939.
2. Yan JK, Wu LX, Qiao ZR, Cai WD, Ma H. Effect of different drying methods on the product quality and bioactive polysaccharides of bitter gourd (Momordica charantia L.) slices. Food Chem. 2019;271:588–96. doi: 10.1016/j.foodchem.2018.08.012, PMID 30236720.
3. Behera TK, Singh AK, Staub JE. Comparative analysis of genetic diversity in Indian bitter gourd (Momordica charantia L.) using RAPD and ISSR markers for developing crop improvement strategies. Sci Hortic. 2008;115(3):209–17. doi: 10.1016/j.scienta.2007.08.013.
4. Thiagarajan SK, Rama Krishnan K, Ei T, Husna Shafie N, Arapoc DJ, Bahari H. Evaluation of the effect of aqueous Momordica charantia Linn. extract on zebrafish embryo model through acute toxicity assay assessment. Evid Based Complement Alternat Med. 2019;2019:9152757. doi: 10.1155/2019/9152757, PMID 31186668.
5. Jan B, Shams R, Dar AH, Singh A, Khan SA. Bitter gourd. In: Antioxidants in vegetables and nuts-properties and health benefits. Singapore: Springer; 2020. p. 175–89.
6. Singh V, Mahaur S, Kushwaha SK. Nutraceuticals: A new golden era in health and disease. Asian J Res Chem. 2018;11(3):652–8. doi: 10.5958/0974–4150.2018.00117.7.
7. Kumar KS, Bhowmik D. Traditional medicinal uses and therapeutic benefits of Momordica charantia Linn. Int J Pharm Sci Rev Res. 2010;4(3):23–8.
8. Poovitha S, Parani M. In vitro and in vivo α-amylase and α-glucosidase inhibiting activities of the protein extracts from two varieties of bitter gourd (Momordica charantia L.). BMC Complement Altern Med. 2016;16(1);Suppl 1:185. doi: 10.1186/s12906–016–1085–1, PMID 27454418.
9. Grover JK, Yadav SP. Pharmacological actions and potential uses of Momordica charantia: a review. J Ethnopharmacol. 2004;93(1):123–32. doi: 10.1016/j.jep.2004.03.035, PMID 15182917.
10. Singh J, Cumming E, Manoharan G, Kalasz H, Adeghate E. Medicinal chemistry of the anti-diabetic effects of Momordica charantia: active constituents and modes of actions. Open Med Chem J. 2011 [Suppl];5(Suppl 2):70–7. doi: 10.2174/1874104501105010070, PMID 21966327.
11. De Luis DA, De La Calle H, Roy G, De Argila CM, Valdezate S, Canton R, Boixeda D. Helicobacter pylori infection and insulin-dependent diabetes mellitus. Diabetes Res Clin Pract. 1998;39(2):143–6. doi: 10.1016/s0168–8227(97)00127–7, PMID 9597384.

12. Paul A, Raychaudhuri SS. Medicinal uses and molecular identification of two Momordica charantia varieties-a review. Electron J Biol. 2010;6(2):43–51.
13. Nejati S, Karkhah A, Darvish H, Validi M, Ebrahimpour S, Nouri HR. Influence of Helicobacter pylori virulence factors CagA and VacA on pathogenesis of gastrointestinal disorders. Microb Pathog. 2018;117:43–8. doi: 10.1016/j.micpath.2018.02.016, PMID 29432909.
14. Xiang Z, Censini S, Bayeli PF, Telford JL, Figura N, Rappuoli R, Covacci A. Analysis of expression of CagA and VacA virulence factors in 43 strains of Helicobacter pylori reveals that clinical isolates can be divided into two major types and that CagA is not necessary for expression of the vacuolating cytotoxin. Infect Immun. 1995;63(1):94–8. doi: 10.1128/iai.63.1.94–98.1995, PMID 7806390.
15. Ozbakiş Dengiz G, Gürsan N. Effects of Momordica charantia L. (Cucurbitaceae) on indomethacin-induced ulcer model in rats. Turk J Gastroenterol. 2005;16(2):85–8. PMID 16252198.
16. Gürbüz I, Akyüz C, Yeşilada E, Şener B. Anti-ulcerogenic effect of Momordica charantia L. fruits on various ulcer models in rats. J Ethnopharmacol. 2000;71(1–2):77–82. doi: 10.1016/s0378–8741(99)00178–6, PMID 10904148.
17. Kim JM, Kim JS, Jung HC, Song IS, Kim CY. Virulence factors of Helicobacter pylori in Korean isolates do not influence proinflammatory cytokine gene expression and apoptosis in human gastric epithelial cells, nor do these factors influence the clinical outcome. J Gastroenterol. 2000;35(12):898–906. doi: 10.1007/s005350070003, PMID 11573725.
18. Mattar R, Marques SB, Monteiro MDS, Dos Santos AF, Iriya K, Carrilho FJ. Helicobacter pylori cag pathogenicity island genes: clinical relevance for peptic ulcer disease development in Brazil. J Med Microbiol. 2007;56(1):9–14. doi: 10.1099/jmm.0.46824–0, PMID 17172510.
19. Abdel-Rahman RF, Soliman GA, Saeedan AS, Ogaly HA, Abd-Elsalam RM, Alqasoumi SI, Abdel-Kader MS. Molecular and biochemical monitoring of the possible herb-drug interaction between Momordica charantia extract and glibenclamide in diabetic rats. Saudi Pharm J. 2019;27(6):803–16. doi: 10.1016/j.jsps.2019.05.002, PMID 31516323.
20. Rezaeizadeh, ALIREZ A. 2013. Some mechanisms for wound healing enhancing effects of bitter gourd (Momordica charantia L.) extract in diabetic rats (Doctoral dissertation, Ph. D. Thesis, Universiti Putra Malaysia, Serdang, Malaysia).

nn[/if 1104] [if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””], [/if 1106]
  2. n[/foreach]

n[/if 1104]

n[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=”Regular Issue”] Regular Issue[/if 424] Open Access Article

n

Research & Reviews : Journal of Computational Biology

ISSN: 2319-3433

Editors Overview

rrjocb maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

n

“},{“box”:4,”content”:”

n“},{“box”:1,”content”:”

    By  [foreach 286]n

  1. n

    D.S.V.G.K. Kaladhar, Akhilesh Tiwari, Shristi Sharma

    n

  2. [/foreach]

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Associate Professor and Head,Department of Microbiology and Bioinformatics, UTD, Atal Bihari Vajpayee University,Chhattisgarh,India
  2. n[/if 1175][/foreach]

n

n

n

n

n

Abstract

nPeptic ulcers are also called as or duodenal ulcers or gastric ulcers that are open sores generally develop in the lining of the stomach due to food and climatic factors. H. pylori infections are potentially the most dangerous and are linked to several diseases like diabetes, cancer, cardiovascular diseases, etc. In the present study, in silico screening and evaluation of some metabolites from Momordica charantia like Momorcharin, Momordicin, Metformin, Pioglitazone, Glipizide, Gliclazide and Glibenclamide in the treatment of peptic ulcers has been conducted. Vacuolating cytotoxin autotransporter (VacA) causes ulceration and gastric lesions is interacting with Urease subunit alpha (ure a), Outer membrane protein-adhesin (babA), Acid-activated urea channel (ureI; rapidly enhances the production of ammonia) and Cytotoxicity-associated immunodominant antigen (CagA). CagA is directly interacting with Serine/threonine-protein kinase CtkA and Cag island protein (virD4). Glibenclamide, Glipizide and Momorcharin has shown good results with Vac A and CagA involved in peptic ulcer. The present study has shown that Glibenclamide is found as effective molecule in the control of peptic ulcer.n

n

n

Keywords: Peptic ulcers, Cag A, Vac A, in silico screening, Momordica charantia

n[if 424 equals=”Regular Issue”][This article belongs to Research & Reviews : Journal of Computational Biology(rrjocb)]

n[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Research & Reviews : Journal of Computational Biology(rrjocb)] [/if 424]

n

n

n


n[if 992 equals=”Subscription”]n

n

n

Full Text

n

n

nn[/if 992]n[if 992 not_equal=”Subscription”]n

n

Full Text

n

n

n

n


[/if 992]n[if 379 not_equal=””]

Browse Figures

n

n

[foreach 379]n

n[/foreach]

n

[/if 379]n

n

References

n[if 1104 equals=””]

1. Fan M, Kim EK, Choi YJ, Tang Y, Moon SH. The role of Momordica charantia in resisting obesity. Int J Environ Res Public Health. 2019;16(18):3251. doi: 10.3390/ijerph16183251, PMID 31487939.
2. Yan JK, Wu LX, Qiao ZR, Cai WD, Ma H. Effect of different drying methods on the product quality and bioactive polysaccharides of bitter gourd (Momordica charantia L.) slices. Food Chem. 2019;271:588–96. doi: 10.1016/j.foodchem.2018.08.012, PMID 30236720.
3. Behera TK, Singh AK, Staub JE. Comparative analysis of genetic diversity in Indian bitter gourd (Momordica charantia L.) using RAPD and ISSR markers for developing crop improvement strategies. Sci Hortic. 2008;115(3):209–17. doi: 10.1016/j.scienta.2007.08.013.
4. Thiagarajan SK, Rama Krishnan K, Ei T, Husna Shafie N, Arapoc DJ, Bahari H. Evaluation of the effect of aqueous Momordica charantia Linn. extract on zebrafish embryo model through acute toxicity assay assessment. Evid Based Complement Alternat Med. 2019;2019:9152757. doi: 10.1155/2019/9152757, PMID 31186668.
5. Jan B, Shams R, Dar AH, Singh A, Khan SA. Bitter gourd. In: Antioxidants in vegetables and nuts-properties and health benefits. Singapore: Springer; 2020. p. 175–89.
6. Singh V, Mahaur S, Kushwaha SK. Nutraceuticals: A new golden era in health and disease. Asian J Res Chem. 2018;11(3):652–8. doi: 10.5958/0974–4150.2018.00117.7.
7. Kumar KS, Bhowmik D. Traditional medicinal uses and therapeutic benefits of Momordica charantia Linn. Int J Pharm Sci Rev Res. 2010;4(3):23–8.
8. Poovitha S, Parani M. In vitro and in vivo α-amylase and α-glucosidase inhibiting activities of the protein extracts from two varieties of bitter gourd (Momordica charantia L.). BMC Complement Altern Med. 2016;16(1);Suppl 1:185. doi: 10.1186/s12906–016–1085–1, PMID 27454418.
9. Grover JK, Yadav SP. Pharmacological actions and potential uses of Momordica charantia: a review. J Ethnopharmacol. 2004;93(1):123–32. doi: 10.1016/j.jep.2004.03.035, PMID 15182917.
10. Singh J, Cumming E, Manoharan G, Kalasz H, Adeghate E. Medicinal chemistry of the anti-diabetic effects of Momordica charantia: active constituents and modes of actions. Open Med Chem J. 2011 [Suppl];5(Suppl 2):70–7. doi: 10.2174/1874104501105010070, PMID 21966327.
11. De Luis DA, De La Calle H, Roy G, De Argila CM, Valdezate S, Canton R, Boixeda D. Helicobacter pylori infection and insulin-dependent diabetes mellitus. Diabetes Res Clin Pract. 1998;39(2):143–6. doi: 10.1016/s0168–8227(97)00127–7, PMID 9597384.

12. Paul A, Raychaudhuri SS. Medicinal uses and molecular identification of two Momordica charantia varieties-a review. Electron J Biol. 2010;6(2):43–51.
13. Nejati S, Karkhah A, Darvish H, Validi M, Ebrahimpour S, Nouri HR. Influence of Helicobacter pylori virulence factors CagA and VacA on pathogenesis of gastrointestinal disorders. Microb Pathog. 2018;117:43–8. doi: 10.1016/j.micpath.2018.02.016, PMID 29432909.
14. Xiang Z, Censini S, Bayeli PF, Telford JL, Figura N, Rappuoli R, Covacci A. Analysis of expression of CagA and VacA virulence factors in 43 strains of Helicobacter pylori reveals that clinical isolates can be divided into two major types and that CagA is not necessary for expression of the vacuolating cytotoxin. Infect Immun. 1995;63(1):94–8. doi: 10.1128/iai.63.1.94–98.1995, PMID 7806390.
15. Ozbakiş Dengiz G, Gürsan N. Effects of Momordica charantia L. (Cucurbitaceae) on indomethacin-induced ulcer model in rats. Turk J Gastroenterol. 2005;16(2):85–8. PMID 16252198.
16. Gürbüz I, Akyüz C, Yeşilada E, Şener B. Anti-ulcerogenic effect of Momordica charantia L. fruits on various ulcer models in rats. J Ethnopharmacol. 2000;71(1–2):77–82. doi: 10.1016/s0378–8741(99)00178–6, PMID 10904148.
17. Kim JM, Kim JS, Jung HC, Song IS, Kim CY. Virulence factors of Helicobacter pylori in Korean isolates do not influence proinflammatory cytokine gene expression and apoptosis in human gastric epithelial cells, nor do these factors influence the clinical outcome. J Gastroenterol. 2000;35(12):898–906. doi: 10.1007/s005350070003, PMID 11573725.
18. Mattar R, Marques SB, Monteiro MDS, Dos Santos AF, Iriya K, Carrilho FJ. Helicobacter pylori cag pathogenicity island genes: clinical relevance for peptic ulcer disease development in Brazil. J Med Microbiol. 2007;56(1):9–14. doi: 10.1099/jmm.0.46824–0, PMID 17172510.
19. Abdel-Rahman RF, Soliman GA, Saeedan AS, Ogaly HA, Abd-Elsalam RM, Alqasoumi SI, Abdel-Kader MS. Molecular and biochemical monitoring of the possible herb-drug interaction between Momordica charantia extract and glibenclamide in diabetic rats. Saudi Pharm J. 2019;27(6):803–16. doi: 10.1016/j.jsps.2019.05.002, PMID 31516323.
20. Rezaeizadeh, ALIREZ A. 2013. Some mechanisms for wound healing enhancing effects of bitter gourd (Momordica charantia L.) extract in diabetic rats (Doctoral dissertation, Ph. D. Thesis, Universiti Putra Malaysia, Serdang, Malaysia).

n[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


n[if 1114 equals=”Yes”]n

n[/if 1114]”},{“box”:2,”content”:”

Regular Issue Open Access Article

n

n

n

n

n

Research & Reviews : Journal of Computational Biology

n

[if 344 not_equal=””]ISSN: 2319-3433[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 10
Issue 1
Received March 25, 2021
Accepted March 27, 2021
Published April 30, 2021

n

n

n

n

Editor

n

n


n

Reviewer

n

n


n n

n”},{“box”:6,”content”:”“}]

Read More
RRJoCB

Cloud Cryptography Algorithms

[{“box”:0,”content”:”

n

n

 > 

n

n

 > 

n

n

n

n

n

n

n

By [foreach 286]u00a0

u00a0Megha Gupta, Ayush Jain,

[/foreach]
nJanuary 7, 2023 at 11:59 am

n

nAbstract

n

Nowadays the information is being produced increasingly more by means of the enterprises and is being elevated swiftly that want will be saved and used e.g., e-mails, facts, photograph album, tax document, financial transaction, and so on. Now statistics owners are required to store their nearby facts organization on the cloud for its elasticity with financial savings. This not simplest gives flexibility to users but additionally makes our content material on hand to us whenever and anywhere we want them. In cloud computing, the information of customers could be saved in storage furnished with the aid of cloud carrier companies (CSP’s). Cloud carrier companies must be having an ideal process to defend user’s information, specifically the data from revelation to customers who are not authorized. If we backup our documents to the cloud, then we may be sure that our information will in no way be misplaced. This paper proposes an algorithm which might encrypt the flies uploaded on cloud garage services and would decrypt the documents when they have been downloaded the use of the keys that were generated on the time of encryption. This might help in preventing undesirable intrusion into private information documents and might at ease user’s information.

n

n

n

n

Volume :u00a0u00a011 | Issue :u00a0u00a01 | Received :u00a0u00a0April 1, 2022 | Accepted :u00a0u00a0April 22, 2022 | Published :u00a0u00a0May 21, 2022n[if 424 equals=”Regular Issue”][This article belongs to Research & Reviews : Journal of Computational Biology(rrjocb)] [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue Cloud Cryptography Algorithms under section in Research & Reviews : Journal of Computational Biology(rrjocb)] [/if 424]
Keywords Cloud, Symmetric & Asymmetric Key, Cryptography, Encryption, Decryption.

n

n

n

n

n


n[if 992 equals=”Transformative”]

n

n

Full Text

n

n

n

[/if 992][if 992 not_equal=”Transformative”]

n

n

Full Text

n

n

n

[/if 992] n


nn

[if 379 not_equal=””]n

[foreach 379]n

n[/foreach]

n[/if 379]

n

References

n[if 1104 equals=””]n

1. National Institute of Standards and Technology, Computer Security Resource Center 2016, available http://csrc.nist.gov/groups/SNS/cloud-computing
2. Srinivas, J., K. Venkata Subba Reddy, and A. Moiz Qyser. “”Cloud computing basics.”” International journal of advanced research in computer and communication engineering 1.5 (2012): 343–347.
3. A Vouk, Mladen. “”Cloud computing–issues, research and implementations.”” Journal of computing and information technology 16.4 (2008): 235–246.
4. Alharthi, Abdulrahman, et al. “”An overview of cloud services adoption challenges in higher education institutions.”” Proceedings of the 2nd International Workshop on Emerging Software as a Service and Analytics. Vol. 1. SCITEPRESS-Science and Technology Publications, 2015.
5. Rivest, R.L., Adleman, L. and Dertouzos, M.L., 1978. On data banks and privacy homomorphisms. Foundations of secure computation, 4 (11), pp. 169–180.
6. Rivest, Ronald L., Len Adleman, and Michael L. Dertouzos. “”On data banks and privacy homomorphisms.”” Foundations of secure computation 4.11 (1978): 169–180.
7. Kelly, James Mark. “”Cloud Computing and Cryptography.””
8. Kamara, Seny, and Kristin Lauter. “”Cryptographic cloud storage.”” International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2010.
9. Aw Ideler, Hugo. “”Cryptography as a service in a cloud computing environment.”” EINDHOVEN UNIVERSITY OF TECHNOLOGY, Department of Mathematics and Computing Science (2012).
10. Zhang, Shuai, et al. “”Cloud computing research and development trend.”” 2010 Second international conference on future networks. IEEE, 2010.

nn[/if 1104] [if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””], [/if 1106]
  2. n[/foreach]

n[/if 1104]

n[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=”Regular Issue”] Regular Issue[/if 424] Open Access Article

n

Research & Reviews : Journal of Computational Biology

ISSN: 2319-3433

Editors Overview

rrjocb maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

n

“},{“box”:4,”content”:”

n“},{“box”:1,”content”:”

    By  [foreach 286]n

  1. n

    Megha Gupta, Ayush Jain

    n

  2. [/foreach]

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Associate Professor, Student,Department of Computer Science, Poornima Institute of Engineering and Technology, Department of Computer Science, Poornima Institute of Engineering and Technology,Rajasthan, Rajasthan,India, India
  2. n[/if 1175][/foreach]

n

n

n

n

n

Abstract

nNowadays the information is being produced increasingly more by means of the enterprises and is being elevated swiftly that want will be saved and used e.g., e-mails, facts, photograph album, tax document, financial transaction, and so on. Now statistics owners are required to store their nearby facts organization on the cloud for its elasticity with financial savings. This not simplest gives flexibility to users but additionally makes our content material on hand to us whenever and anywhere we want them. In cloud computing, the information of customers could be saved in storage furnished with the aid of cloud carrier companies (CSP’s). Cloud carrier companies must be having an ideal process to defend user’s information, specifically the data from revelation to customers who are not authorized. If we backup our documents to the cloud, then we may be sure that our information will in no way be misplaced. This paper proposes an algorithm which might encrypt the flies uploaded on cloud garage services and would decrypt the documents when they have been downloaded the use of the keys that were generated on the time of encryption. This might help in preventing undesirable intrusion into private information documents and might at ease user’s information.n

n

n

Keywords: Cloud, Symmetric & Asymmetric Key, Cryptography, Encryption, Decryption.

n[if 424 equals=”Regular Issue”][This article belongs to Research & Reviews : Journal of Computational Biology(rrjocb)]

n[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Research & Reviews : Journal of Computational Biology(rrjocb)] [/if 424]

n

n

n


n[if 992 equals=”Transformative”]n

n

n

Full Text

n

n

nn[/if 992]n[if 992 not_equal=”Transformative”]n

n

Full Text

n

n

n

n


[/if 992]n[if 379 not_equal=””]

Browse Figures

n

n

[foreach 379]n

n[/foreach]

n

[/if 379]n

n

References

n[if 1104 equals=””]

1. National Institute of Standards and Technology, Computer Security Resource Center 2016, available http://csrc.nist.gov/groups/SNS/cloud-computing
2. Srinivas, J., K. Venkata Subba Reddy, and A. Moiz Qyser. “”Cloud computing basics.”” International journal of advanced research in computer and communication engineering 1.5 (2012): 343–347.
3. A Vouk, Mladen. “”Cloud computing–issues, research and implementations.”” Journal of computing and information technology 16.4 (2008): 235–246.
4. Alharthi, Abdulrahman, et al. “”An overview of cloud services adoption challenges in higher education institutions.”” Proceedings of the 2nd International Workshop on Emerging Software as a Service and Analytics. Vol. 1. SCITEPRESS-Science and Technology Publications, 2015.
5. Rivest, R.L., Adleman, L. and Dertouzos, M.L., 1978. On data banks and privacy homomorphisms. Foundations of secure computation, 4 (11), pp. 169–180.
6. Rivest, Ronald L., Len Adleman, and Michael L. Dertouzos. “”On data banks and privacy homomorphisms.”” Foundations of secure computation 4.11 (1978): 169–180.
7. Kelly, James Mark. “”Cloud Computing and Cryptography.””
8. Kamara, Seny, and Kristin Lauter. “”Cryptographic cloud storage.”” International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2010.
9. Aw Ideler, Hugo. “”Cryptography as a service in a cloud computing environment.”” EINDHOVEN UNIVERSITY OF TECHNOLOGY, Department of Mathematics and Computing Science (2012).
10. Zhang, Shuai, et al. “”Cloud computing research and development trend.”” 2010 Second international conference on future networks. IEEE, 2010.

n[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


n[if 1114 equals=”Yes”]n

n[/if 1114]”},{“box”:2,”content”:”

Regular Issue Open Access Article

n

n

n

n

n

Research & Reviews : Journal of Computational Biology

n

[if 344 not_equal=””]ISSN: 2319-3433[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 11
Issue 1
Received April 1, 2022
Accepted April 22, 2022
Published May 21, 2022

n

n

n

n

Editor

n

n


n

Reviewer

n

n


n n

n”},{“box”:6,”content”:”“}]

Read More
RRJoCB

Face Recognition or Detection using Image Processing and How Image will be Process Age Wise

[{“box”:0,”content”:”

n

n

 > 

n

n

 > 

n

n

n

n

n

n

n

By [foreach 286]u00a0

u00a0Peeyush Mamodia, Pawan Kumar Patidar,

[/foreach]
nJanuary 7, 2023 at 11:31 am

n

nAbstract

n

Biological feature popularity is a type of identification era that uses the person’s special mindset or behavior feature. It furnished of excessive accuracy, accurate balance technique to status prizing. Face reputation is very famous wing of the organic aspect popularity. And also, is very energetic situation in the range of laptop view and pattern popularity. Face detection is technique to hit upon face from a picture which have numerous aspects in photo. By offering a single photo, undertaking is to find the face from that photograph. Face disclosure is a tough undertaking because faces aren’t inflexible and it is also change in range, body, coloration and so on. Face detection turn out to be extra difficult venture whilst given photograph isn’t always clarifying and choke by some other element and no longer proper light up, now not going through camcorder and so on. ’In the initial prior’, tables of face pictures are gathered through the maturity levels of training, at that point the reenactment methodology incorporates the procedure of image preparing, the enlistment strategy, and the check technique.

n

n

n

n

Volume :u00a0u00a010 | Issue :u00a0u00a02 | Received :u00a0u00a0January 4, 2022 | Accepted :u00a0u00a0February 3, 2022 | Published :u00a0u00a0February 14, 2022n[if 424 equals=”Regular Issue”][This article belongs to Research & Reviews : Journal of Computational Biology(rrjocb)] [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue Face Recognition or Detection using Image Processing and How Image will be Process Age Wise under section in Research & Reviews : Journal of Computational Biology(rrjocb)] [/if 424]
Keywords Face detection, face recognition, image processing, reenactment methodology, face reputation

n

n

n

n

n


n[if 992 equals=”Transformative”]

n

n

Full Text

n

n

n

[/if 992][if 992 not_equal=”Transformative”]

n

n

Full Text

n

n

n

[/if 992] n


nn

[if 379 not_equal=””]n

[foreach 379]n

n[/foreach]

n[/if 379]

n

References

n[if 1104 equals=””]n

1. Syambas, N.R. and Purwanto, U.H., 2012, October. Image processing and face detection analysis on face verification based on the age stages. In 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA) (pp. 289-293). IEEE.
2. Chen, H. and Lu, J., 2010, December. The image process technologies in face recognition. In The 2nd International Conference on Information Science and Engineering (pp. 4151-4154). IEEE.
3. Meena, D. and Sharan, R., 2016, December. An approach to face detection and recognition. In 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE) (pp. 1-6). IEEE.
4. ‘Robin (2007): Pengolahan Citra dan Deteksi Wajah pada Sistem Pengenalan Wajah, Laporan Tugas Akhir, Institut TeknologiBandung’.
5. J. Kumari, R. Rajesh, and K. M. Pooja, ‘‘Facial expression recognition: A survey,’’ Procedia Comput. Sci., vol. 58, pp. 486–491, Jan. 2015.
6. Fu, Y., Guo, G. and Huang, T.S., 2010. Age synthesis and estimation via faces: A survey. IEEE transactions on pattern analysis and machine intelligence, 32(11), pp.1955-1976.
7. ‘Munir, Rinaldi. (2004): Pengolahan Citra Digital dengan Pendekatan Algoritmik. Informatika.Bandung’
8. ‘SunYilei, ChenHongwe. Pre-processing Algorithm of Fingerprint Image [J]. Computer measure and control, 2006.14 (5),’.
9. ‘Santhi, V., & Acharjya, D. P. (2015). Intelligence-Based Adaptive Digital Watermarking for Images in Wavelet Transform Domain. Handbook of Research on Emerging Perspectives in Intelligent Pattern Recognition, Analysis, and Image Processing,’.
10. ‘Maia, D. and Trindade, R., 2016. Face detection and recognition in color images under matlab. International Journal of Signal Processing, Image Processing and Pattern Recognition, 9(2), pp.13-24.
11. Zhong, F. and Zhang, J., 2013. Face recognition with enhanced local directional patterns. Neurocomputing, 119, pp.375-384.
12. Choi, S.E., Lee, Y.J., Lee, S.J., Park, K.R. and Kim, J., 2011. Age estimation using a hierarchical classifier based on global and local facial features. Pattern recognition, 44(6), pp.1262-1281.

nn[/if 1104] [if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””], [/if 1106]
  2. n[/foreach]

n[/if 1104]

n[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=”Regular Issue”] Regular Issue[/if 424] Open Access Article

n

Research & Reviews : Journal of Computational Biology

ISSN: 2319-3433

Editors Overview

rrjocb maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

n

“},{“box”:4,”content”:”

n“},{“box”:1,”content”:”

    By  [foreach 286]n

  1. n

    Peeyush Mamodia, Pawan Kumar Patidar

    n

  2. [/foreach]

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. ,,,
  2. n[/if 1175][/foreach]

n

n

n

n

n

Abstract

nBiological feature popularity is a type of identification era that uses the person’s special mindset or behavior feature. It furnished of excessive accuracy, accurate balance technique to status prizing. Face reputation is very famous wing of the organic aspect popularity. And also, is very energetic situation in the range of laptop view and pattern popularity. Face detection is technique to hit upon face from a picture which have numerous aspects in photo. By offering a single photo, undertaking is to find the face from that photograph. Face disclosure is a tough undertaking because faces aren’t inflexible and it is also change in range, body, coloration and so on. Face detection turn out to be extra difficult venture whilst given photograph isn’t always clarifying and choke by some other element and no longer proper light up, now not going through camcorder and so on. ’In the initial prior’, tables of face pictures are gathered through the maturity levels of training, at that point the reenactment methodology incorporates the procedure of image preparing, the enlistment strategy, and the check technique.n

n

n

Keywords: Face detection, face recognition, image processing, reenactment methodology, face reputation

n[if 424 equals=”Regular Issue”][This article belongs to Research & Reviews : Journal of Computational Biology(rrjocb)]

n[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Research & Reviews : Journal of Computational Biology(rrjocb)] [/if 424]

n

n

n


n[if 992 equals=”Transformative”]n

n

n

Full Text

n

n

nn[/if 992]n[if 992 not_equal=”Transformative”]n

n

Full Text

n

n

n

n


[/if 992]n[if 379 not_equal=””]

Browse Figures

n

n

[foreach 379]n

n[/foreach]

n

[/if 379]n

n

References

n[if 1104 equals=””]

1. Syambas, N.R. and Purwanto, U.H., 2012, October. Image processing and face detection analysis on face verification based on the age stages. In 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA) (pp. 289-293). IEEE.
2. Chen, H. and Lu, J., 2010, December. The image process technologies in face recognition. In The 2nd International Conference on Information Science and Engineering (pp. 4151-4154). IEEE.
3. Meena, D. and Sharan, R., 2016, December. An approach to face detection and recognition. In 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE) (pp. 1-6). IEEE.
4. ‘Robin (2007): Pengolahan Citra dan Deteksi Wajah pada Sistem Pengenalan Wajah, Laporan Tugas Akhir, Institut TeknologiBandung’.
5. J. Kumari, R. Rajesh, and K. M. Pooja, ‘‘Facial expression recognition: A survey,’’ Procedia Comput. Sci., vol. 58, pp. 486–491, Jan. 2015.
6. Fu, Y., Guo, G. and Huang, T.S., 2010. Age synthesis and estimation via faces: A survey. IEEE transactions on pattern analysis and machine intelligence, 32(11), pp.1955-1976.
7. ‘Munir, Rinaldi. (2004): Pengolahan Citra Digital dengan Pendekatan Algoritmik. Informatika.Bandung’
8. ‘SunYilei, ChenHongwe. Pre-processing Algorithm of Fingerprint Image [J]. Computer measure and control, 2006.14 (5),’.
9. ‘Santhi, V., & Acharjya, D. P. (2015). Intelligence-Based Adaptive Digital Watermarking for Images in Wavelet Transform Domain. Handbook of Research on Emerging Perspectives in Intelligent Pattern Recognition, Analysis, and Image Processing,’.
10. ‘Maia, D. and Trindade, R., 2016. Face detection and recognition in color images under matlab. International Journal of Signal Processing, Image Processing and Pattern Recognition, 9(2), pp.13-24.
11. Zhong, F. and Zhang, J., 2013. Face recognition with enhanced local directional patterns. Neurocomputing, 119, pp.375-384.
12. Choi, S.E., Lee, Y.J., Lee, S.J., Park, K.R. and Kim, J., 2011. Age estimation using a hierarchical classifier based on global and local facial features. Pattern recognition, 44(6), pp.1262-1281.

n[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


n[if 1114 equals=”Yes”]n

n[/if 1114]”},{“box”:2,”content”:”

Regular Issue Open Access Article

n

n

n

n

n

Research & Reviews : Journal of Computational Biology

n

[if 344 not_equal=””]ISSN: 2319-3433[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 10
Issue 2
Received January 4, 2022
Accepted February 3, 2022
Published February 14, 2022

n

n

n

n

Editor

n

n


n

Reviewer

n

n


n n

n”},{“box”:6,”content”:”“}]

Read More