This document discusses a two-way chained packet marking technique for secure communication in wireless sensor networks. It aims to provide a scheme for detecting attacks by creating a bidirectional link between packets. Any packets found without this link information will be eliminated at network boundaries, improving security. Neighboring packets will be marked to form a chain of legitimate messages, preserving originality and mitigating attacks like jamming.
Application of hardware accelerated extensible network nodes for internet wor...UltraUploader
This document proposes a hardware-accelerated system that uses field-programmable gate arrays (FPGAs) to actively detect and block internet worms and viruses at multi-gigabit speeds. It scans packet payloads in real-time to search for signatures of malicious software and can dynamically reconfigure to detect new threats. The system is designed to be incrementally deployed throughout the internet to quarantine infections locally and limit global spread. It aims to provide faster and more effective protection than software-based solutions by processing packet content directly in network hardware.
Cyber Warfare is the current single greatest emerging threat to National Security. Network security has become an essential component of any computer network. As computer networks and systems become ever more fundamental to modern society, concerns about security has become increasingly important. There are a multitude of different applications open source and proprietary available for the protection +-system administrator, to decide on the most suitable format for their purpose requires knowledge of the available safety measures, their features and how they affect the quality of service, as well as the kind of data they will be allowing through un flagged. A majority of methods currently used to ensure the quality of a networks service are signature based. From this information, and details on the specifics of popular applications and their implementation methods, we have carried through the ideas, incorporating our own opinions, to formulate suggestions on how this could be done on a general level. The main objective was to design and develop an Intrusion Detection System. While the minor objectives were to; Design a port scanner to determine potential threats and mitigation techniques to withstand these attacks. Implement the system on a host and Run and test the designed IDS. In this project we set out to develop a Honey Pot IDS System. It would make it easy to listen on a range of ports and emulate a network protocol to track and identify any individuals trying to connect to your system. This IDS will use the following design approaches: Event correlation, Log analysis, Alerting, and policy enforcement. Intrusion Detection Systems (IDSs) attempt to identify unauthorized use, misuse, and abuse of computer systems. In response to the growth in the use and development of IDSs, we have developed a methodology for testing IDSs. The methodology consists of techniques from the field of software testing which we have adapted for the specific purpose of testing IDSs. In this paper, we identify a set of general IDS performance objectives which is the basis for the methodology. We present the details of the methodology, including strategies for test-case selection and specific testing procedures. We include quantitative results from testing experiments on the Network Security Monitor (NSM), an IDS developed at UC Davis. We present an overview of the software platform that we have used to create user-simulation scripts for testing experiments. The platform consists of the UNIX tool expect and enhancements that we have developed, including mechanisms for concurrent scripts and a record-and-replay feature. We also provide background information on intrusions and IDSs to motivate our work.
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
Intrusion in a network or a system is a problem today as the trend of successful network attacks continue to
rise. Intruders can explore vulnerabilities of a network system to gain access in order to deploy some virus
or malware such as Denial of Service (DOS) attack. In this work, a frequency-based Intrusion Detection
System (IDS) is proposed to detect DOS attack. The frequency data is extracted from the time-series data
created by the traffic flow using Discrete Fourier Transform (DFT). An algorithm is developed for
anomaly-based intrusion detection with fewer false alarms which further detect known and unknown attack
signature in a network. The frequency of the traffic data of the virus or malware would be inconsistent with
the frequency of the legitimate traffic data. A Centralized Traffic Analyzer Intrusion Detection System
called CTA-IDS is introduced to further detect inside attackers in a network. The strategy is effective in
detecting abnormal content in the traffic data during information passing from one node to another and
also detects known attack signature and unknown attack. This approach is tested by running the artificial
network intrusion data in simulated networks using the Network Simulator2 (NS2) software.
The document discusses ethical hacking, which involves authorized security testing of systems to identify vulnerabilities. Ethical hackers use the same techniques as criminal hackers but work with an organization's consent to improve security. Originally, some early computer users engaged in benign intrusions out of curiosity, but some later turned to purposefully destructive attacks. The document outlines the history of ethical hacking and how organizations came to realize independent security testing was valuable to evaluate threats.
Cyber crimes are on the rise as companies and individuals connect to the internet. While connectivity provides benefits, it also increases vulnerabilities to threats like hacking, viruses, and data theft. The document outlines the history of computer crimes and defines different types like fraud, forgery, and unauthorized access. It discusses hacking techniques such as using trapdoors, decoys, and call forwarding to intercept systems. The conclusion emphasizes the importance of security measures like passwords, antivirus software, and incident response teams to help prevent and address cyber crimes.
Data Mining For Intrusion Detection in Mobile SystemsIOSR Journals
This document discusses using data mining techniques for intrusion detection in mobile systems. It proposes a network-based approach that removes processing overhead from mobile phones. An application on the phone collects user data and sends it to a remote server, where a previously trained neural network classifier analyzes the logs and detects abnormalities. The method was shown to detect intrusions at a 95% rate while outperforming existing mobile intrusion detection methods. It reduces processing on phones while effectively detecting intrusions in mobile networks and systems.
This document discusses security threats to wireless networks. It begins by introducing wireless network vulnerabilities and various threats including accidental association, malicious associations, passive eavesdropping, ad-hoc networks, MAC spoofing, man-in-the-middle attacks, and denial of service attacks. It then discusses the consequences of poor wireless network security and strategies to improve security such as using encryption, passwords, firewalls, and educating users. The document provides details on specific threats and countermeasures organizations can take to secure their wireless networks.
Application of hardware accelerated extensible network nodes for internet wor...UltraUploader
This document proposes a hardware-accelerated system that uses field-programmable gate arrays (FPGAs) to actively detect and block internet worms and viruses at multi-gigabit speeds. It scans packet payloads in real-time to search for signatures of malicious software and can dynamically reconfigure to detect new threats. The system is designed to be incrementally deployed throughout the internet to quarantine infections locally and limit global spread. It aims to provide faster and more effective protection than software-based solutions by processing packet content directly in network hardware.
Cyber Warfare is the current single greatest emerging threat to National Security. Network security has become an essential component of any computer network. As computer networks and systems become ever more fundamental to modern society, concerns about security has become increasingly important. There are a multitude of different applications open source and proprietary available for the protection +-system administrator, to decide on the most suitable format for their purpose requires knowledge of the available safety measures, their features and how they affect the quality of service, as well as the kind of data they will be allowing through un flagged. A majority of methods currently used to ensure the quality of a networks service are signature based. From this information, and details on the specifics of popular applications and their implementation methods, we have carried through the ideas, incorporating our own opinions, to formulate suggestions on how this could be done on a general level. The main objective was to design and develop an Intrusion Detection System. While the minor objectives were to; Design a port scanner to determine potential threats and mitigation techniques to withstand these attacks. Implement the system on a host and Run and test the designed IDS. In this project we set out to develop a Honey Pot IDS System. It would make it easy to listen on a range of ports and emulate a network protocol to track and identify any individuals trying to connect to your system. This IDS will use the following design approaches: Event correlation, Log analysis, Alerting, and policy enforcement. Intrusion Detection Systems (IDSs) attempt to identify unauthorized use, misuse, and abuse of computer systems. In response to the growth in the use and development of IDSs, we have developed a methodology for testing IDSs. The methodology consists of techniques from the field of software testing which we have adapted for the specific purpose of testing IDSs. In this paper, we identify a set of general IDS performance objectives which is the basis for the methodology. We present the details of the methodology, including strategies for test-case selection and specific testing procedures. We include quantitative results from testing experiments on the Network Security Monitor (NSM), an IDS developed at UC Davis. We present an overview of the software platform that we have used to create user-simulation scripts for testing experiments. The platform consists of the UNIX tool expect and enhancements that we have developed, including mechanisms for concurrent scripts and a record-and-replay feature. We also provide background information on intrusions and IDSs to motivate our work.
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
Intrusion in a network or a system is a problem today as the trend of successful network attacks continue to
rise. Intruders can explore vulnerabilities of a network system to gain access in order to deploy some virus
or malware such as Denial of Service (DOS) attack. In this work, a frequency-based Intrusion Detection
System (IDS) is proposed to detect DOS attack. The frequency data is extracted from the time-series data
created by the traffic flow using Discrete Fourier Transform (DFT). An algorithm is developed for
anomaly-based intrusion detection with fewer false alarms which further detect known and unknown attack
signature in a network. The frequency of the traffic data of the virus or malware would be inconsistent with
the frequency of the legitimate traffic data. A Centralized Traffic Analyzer Intrusion Detection System
called CTA-IDS is introduced to further detect inside attackers in a network. The strategy is effective in
detecting abnormal content in the traffic data during information passing from one node to another and
also detects known attack signature and unknown attack. This approach is tested by running the artificial
network intrusion data in simulated networks using the Network Simulator2 (NS2) software.
The document discusses ethical hacking, which involves authorized security testing of systems to identify vulnerabilities. Ethical hackers use the same techniques as criminal hackers but work with an organization's consent to improve security. Originally, some early computer users engaged in benign intrusions out of curiosity, but some later turned to purposefully destructive attacks. The document outlines the history of ethical hacking and how organizations came to realize independent security testing was valuable to evaluate threats.
Cyber crimes are on the rise as companies and individuals connect to the internet. While connectivity provides benefits, it also increases vulnerabilities to threats like hacking, viruses, and data theft. The document outlines the history of computer crimes and defines different types like fraud, forgery, and unauthorized access. It discusses hacking techniques such as using trapdoors, decoys, and call forwarding to intercept systems. The conclusion emphasizes the importance of security measures like passwords, antivirus software, and incident response teams to help prevent and address cyber crimes.
Data Mining For Intrusion Detection in Mobile SystemsIOSR Journals
This document discusses using data mining techniques for intrusion detection in mobile systems. It proposes a network-based approach that removes processing overhead from mobile phones. An application on the phone collects user data and sends it to a remote server, where a previously trained neural network classifier analyzes the logs and detects abnormalities. The method was shown to detect intrusions at a 95% rate while outperforming existing mobile intrusion detection methods. It reduces processing on phones while effectively detecting intrusions in mobile networks and systems.
This document discusses security threats to wireless networks. It begins by introducing wireless network vulnerabilities and various threats including accidental association, malicious associations, passive eavesdropping, ad-hoc networks, MAC spoofing, man-in-the-middle attacks, and denial of service attacks. It then discusses the consequences of poor wireless network security and strategies to improve security such as using encryption, passwords, firewalls, and educating users. The document provides details on specific threats and countermeasures organizations can take to secure their wireless networks.
Prevention based mechanism for attacks in Network SecurityEditor IJMTER
Network Security has become vital in today’s information technology era, as a result
of that numerous techniques are a unit adopted to bypass it. Network administrator has to be
compelled to manage with the recent advancements in each the hardware and software system fields
for their betterment of the user’s knowledge. This paper outlines the varied attack strategies in the
field of Networking and numerous prevention mechanisms against them.
Lesson 1 provides definitions for information and communication technology and introduces various technologies used for communicating and spreading information such as satellites, the World Wide Web, telephone, television, and radio. Communication technology is important for aiding communication and disseminating information.
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET- Security from Threats of Computer SystemIRJET Journal
Governments are finding cyber security to be a major challenge as they store far more data than the private sector, often in older and more vulnerable systems, and are regularly targeted by hackers and sophisticated malware. The document discusses various threats to computer systems like malware, viruses, phishing, and zero-day attacks. It proposes solutions like usernames and passwords, firewalls, email encryption, updated anti-virus software, and regular backups to provide security from these threats. Analysis of existing security solutions can help determine weaknesses in data security.
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
This document discusses techniques for protecting Facebook accounts from malicious attacking applications. It proposes a novel rank-based image watermarking strategy that embeds a secret message into images using digital watermarking and encryption. The strategy splits images into pieces, embeds watermarks into DCT coefficients of blocks, and encrypts the secret message before combining it with the watermarks. This provides high security for secret messages shared through image watermarking while maintaining imperceptibility and robustness against attacks. The system can detect hackers who try to decrypt images with the wrong secret key by notifying an administrator.
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...vivatechijri
The government of India recently banned Chinese application because of security implication of Indian users data and also with another collaborative aim to lead India to digitalization and self-reliance 'Atmanirbhar Bharat' made the decision to ban the Chinese application from Indian Google Play store. In this list of apps ShareIT and Xender which had become a part of regular activities of many people, used for File transferring purpose. This application was meant for sharing different formats of files among devices. Despite other alternative Indian file sharing applications users faced inconveniences as these application were less satisfactory in comparison with banned apps like the ban of ShareIT and Xender. This paper shows studies of various Indian and non-Indian file/data Transferring applications and a comparative study of the various features provided by them. This paper also focuses on the study of WIFI Direct technology which is used for file sharing, connecting among devices.
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...CSCJournals
The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analyzed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.
A Data Hiding Techniques Based on Length of English Text using DES and Attack...IJORCS
The comparing recent proposal for multimedia applications network security remains an important topic for researchers. The security deals with both wired and wireless communication. Network is defined as it is a large system consisting of many similar parts that are connected together to allow the movement or communication between or along the parts or between the parts and a control center. There are the main components of the network information system such as end systems (terminals, servers) and intermediate systems (hubs, switches, gateways). Every node has its own set of vulnerabilities that can be related to hardware, software, protocol stack etc. Nodes are interconnected by physical supports in a network for example connected with cables in wired Local Area Network (LAN) or radio waves (Wi-Fi) in Wireless Local Area Network (WLAN). Some nodes are able to provide services (FTP, HTTP browsing, database access). If two nodes want to communicate together, they must be interconnected physically and logically. Network security deals with also information hiding technique. Now day’s security deals with heterogeneous networks. The use of different wireless and wired network which are working on different platform is heterogeneous. So design of network security for such type of heterogeneous network is difficult task.
This approach mainly based on examines how many differences do exist between BlackBerry OS and new BlackBerry OS based on QNX OS. It highlights whether one techniques provide more easy implementation, investigation and handling or not, what common differences examiners may encounter and what they should as concept be involved to forensic handling with these platforms because a Playbook OS is completely a new approach.
http://hakin9.org/dont-be-mocked-secure-your-system-0512-2/
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
This document discusses the growth of the internet and increased connectivity of devices beyond just computers. It notes that as internet usage has increased, issues of privacy, data security, and protecting sensitive information have become more important for both personal and business use. The document provides an overview of common security concepts and terms to help understand how to prevent cyberattacks and secure sensitive data. It also includes a table summarizing several high-profile data breaches between 2013-2015 at companies like Target, Anthem, and Sony Pictures that compromised personal and financial information for millions of customers.
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
- The document summarizes a study that evaluated the security of wireless networks in Jordan through a process called "wardriving" where the researchers drove around with wireless network detection tools.
- The results found that the majority (79.52%) of wireless networks tested were unsecured and vulnerable. Most networks used either low levels of encryption (68.67%) or no encryption at all (11.45%).
- Nearly all networks broadcast the default SSID (92.17%), leaving them exposed to potential hackers since changing the SSID is a basic security precaution.
The document discusses various topics relating to computer security, including:
1) Computer security risks such as hackers, crackers, and cybercrimes are described as well as ways to safeguard against internet and network attacks like viruses, worms, and Trojan horses.
2) Internet and network attacks are discussed along with symptoms of an infected computer. Precautions are presented to protect devices from malicious infections.
3) Techniques for preventing unauthorized computer access and use are covered, including firewalls, intrusion detection software, and honeypots. Encryption is explained as an important safeguard.
1) The document discusses security issues in computer networks and proposes contemporary solutions. It covers topics like cryptography, secure data access, intrusion detection, and secure routing.
2) The literature review discusses previous research on wireless sensor network security including common attacks, requirements, and defenses. It also examines security issues that arise from the unique characteristics of wireless networks.
3) The document proposes that more research is still needed on topics like quantifying security costs and benefits, data integrity, survivability, and security for data-centric wireless sensor networks. A holistic security model is needed that integrates solutions at each network layer.
1. Cyber Ethics and Cyber Crime
2. Security in Social Media & Risk of Child Internet
3. Social media in Schools and photo privacy
4. Risk of OSNs and Security, Privacy of Facebook
5. Risk and Security of Social Networking site Facebook and Twitter
6. Risk analysis of Government and Online Transaction
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNishanth Gandhidoss
This document describes a project report submitted for the degree of Bachelor of Technology in Information Technology. The report focuses on network intrusion detection and node recovery using dynamic path routing. It was submitted by three students - Nishanth G., Sudharshan N., and Surya Krishnan R. - to Sri Venkateswara College of Engineering in partial fulfillment of their degree requirements. The document includes sections on acknowledgements, abstract, contents, introduction, literature survey, system design, network topology, network intrusion detection and prevention, node recovery, source anonymity, dynamic path routing, results and discussions, and conclusions. It aims to address privacy and security issues in networks through techniques like encryption, evidence collection, risk assessment
The Next Generation Cognitive Security Operations Center: Network Flow Forens...Konstantinos Demertzis
A Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The fundamental aspects of an effective SOC is related to the ability to examine and analyze the vast number of data flows and to correlate several other types of events from a cybersecurity perception. The supervision and categorization of network flow is an essential process not only for the scheduling, management, and regulation of the network’s services, but also for attacks identification and for the consequent forensics’ investigations. A serious potential disadvantage of the traditional software solutions used today for computer network monitoring, and specifically for the instances of effective categorization of the encrypted or obfuscated network flow, which enforces the rebuilding of messages packets in sophisticated underlying protocols, is the requirements of computational resources. In addition, an additional significant inability of these software packages is they create high false positive rates because they are deprived of accurate predicting mechanisms.
For all the reasons above, in most cases, the traditional software fails completely to recognize unidentified vulnerabilities and zero-day exploitations. This paper proposes a novel intelligence driven Network Flow Forensics Framework (NF3) which uses low utilization of computing power and resources, for the Next Generation Cognitive Computing SOC (NGC2SOC) that rely solely on advanced fully automated intelligence methods. It is an effective and accurate Ensemble Machine Learning forensics tool to Network Traffic Analysis, Demystification of Malware Traffic and Encrypted Traffic Identification.
This document summarizes a research paper on developing a honey pot intrusion detection system. The paper introduces cyber warfare as a growing threat and the need for effective network security. It then describes designing and implementing a honey pot IDS to detect potential threats on a host system by emulating network services and monitoring connections. The IDS would use event correlation, log analysis, alerting and policy enforcement. The document provides background on intrusions, IDS testing methodology, and reasons why only creating secure systems is not enough to prevent all intrusions.
This document provides an overview of computer and network security. It discusses how computer networks are used for communication and the security issues that can arise, such as hacking, phishing, and malware attacks. It then describes various security threats like active and passive attacks, unauthorized access, and intrusions. The document also covers security measures like passwords, firewalls, cryptography, and steganography that can be used to secure networks and protect sensitive data during communication between computers.
Prevention based mechanism for attacks in Network SecurityEditor IJMTER
Network Security has become vital in today’s information technology era, as a result
of that numerous techniques are a unit adopted to bypass it. Network administrator has to be
compelled to manage with the recent advancements in each the hardware and software system fields
for their betterment of the user’s knowledge. This paper outlines the varied attack strategies in the
field of Networking and numerous prevention mechanisms against them.
Lesson 1 provides definitions for information and communication technology and introduces various technologies used for communicating and spreading information such as satellites, the World Wide Web, telephone, television, and radio. Communication technology is important for aiding communication and disseminating information.
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET- Security from Threats of Computer SystemIRJET Journal
Governments are finding cyber security to be a major challenge as they store far more data than the private sector, often in older and more vulnerable systems, and are regularly targeted by hackers and sophisticated malware. The document discusses various threats to computer systems like malware, viruses, phishing, and zero-day attacks. It proposes solutions like usernames and passwords, firewalls, email encryption, updated anti-virus software, and regular backups to provide security from these threats. Analysis of existing security solutions can help determine weaknesses in data security.
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
This document discusses techniques for protecting Facebook accounts from malicious attacking applications. It proposes a novel rank-based image watermarking strategy that embeds a secret message into images using digital watermarking and encryption. The strategy splits images into pieces, embeds watermarks into DCT coefficients of blocks, and encrypts the secret message before combining it with the watermarks. This provides high security for secret messages shared through image watermarking while maintaining imperceptibility and robustness against attacks. The system can detect hackers who try to decrypt images with the wrong secret key by notifying an administrator.
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...vivatechijri
The government of India recently banned Chinese application because of security implication of Indian users data and also with another collaborative aim to lead India to digitalization and self-reliance 'Atmanirbhar Bharat' made the decision to ban the Chinese application from Indian Google Play store. In this list of apps ShareIT and Xender which had become a part of regular activities of many people, used for File transferring purpose. This application was meant for sharing different formats of files among devices. Despite other alternative Indian file sharing applications users faced inconveniences as these application were less satisfactory in comparison with banned apps like the ban of ShareIT and Xender. This paper shows studies of various Indian and non-Indian file/data Transferring applications and a comparative study of the various features provided by them. This paper also focuses on the study of WIFI Direct technology which is used for file sharing, connecting among devices.
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...CSCJournals
The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analyzed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.
A Data Hiding Techniques Based on Length of English Text using DES and Attack...IJORCS
The comparing recent proposal for multimedia applications network security remains an important topic for researchers. The security deals with both wired and wireless communication. Network is defined as it is a large system consisting of many similar parts that are connected together to allow the movement or communication between or along the parts or between the parts and a control center. There are the main components of the network information system such as end systems (terminals, servers) and intermediate systems (hubs, switches, gateways). Every node has its own set of vulnerabilities that can be related to hardware, software, protocol stack etc. Nodes are interconnected by physical supports in a network for example connected with cables in wired Local Area Network (LAN) or radio waves (Wi-Fi) in Wireless Local Area Network (WLAN). Some nodes are able to provide services (FTP, HTTP browsing, database access). If two nodes want to communicate together, they must be interconnected physically and logically. Network security deals with also information hiding technique. Now day’s security deals with heterogeneous networks. The use of different wireless and wired network which are working on different platform is heterogeneous. So design of network security for such type of heterogeneous network is difficult task.
This approach mainly based on examines how many differences do exist between BlackBerry OS and new BlackBerry OS based on QNX OS. It highlights whether one techniques provide more easy implementation, investigation and handling or not, what common differences examiners may encounter and what they should as concept be involved to forensic handling with these platforms because a Playbook OS is completely a new approach.
http://hakin9.org/dont-be-mocked-secure-your-system-0512-2/
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
This document discusses the growth of the internet and increased connectivity of devices beyond just computers. It notes that as internet usage has increased, issues of privacy, data security, and protecting sensitive information have become more important for both personal and business use. The document provides an overview of common security concepts and terms to help understand how to prevent cyberattacks and secure sensitive data. It also includes a table summarizing several high-profile data breaches between 2013-2015 at companies like Target, Anthem, and Sony Pictures that compromised personal and financial information for millions of customers.
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
- The document summarizes a study that evaluated the security of wireless networks in Jordan through a process called "wardriving" where the researchers drove around with wireless network detection tools.
- The results found that the majority (79.52%) of wireless networks tested were unsecured and vulnerable. Most networks used either low levels of encryption (68.67%) or no encryption at all (11.45%).
- Nearly all networks broadcast the default SSID (92.17%), leaving them exposed to potential hackers since changing the SSID is a basic security precaution.
The document discusses various topics relating to computer security, including:
1) Computer security risks such as hackers, crackers, and cybercrimes are described as well as ways to safeguard against internet and network attacks like viruses, worms, and Trojan horses.
2) Internet and network attacks are discussed along with symptoms of an infected computer. Precautions are presented to protect devices from malicious infections.
3) Techniques for preventing unauthorized computer access and use are covered, including firewalls, intrusion detection software, and honeypots. Encryption is explained as an important safeguard.
1) The document discusses security issues in computer networks and proposes contemporary solutions. It covers topics like cryptography, secure data access, intrusion detection, and secure routing.
2) The literature review discusses previous research on wireless sensor network security including common attacks, requirements, and defenses. It also examines security issues that arise from the unique characteristics of wireless networks.
3) The document proposes that more research is still needed on topics like quantifying security costs and benefits, data integrity, survivability, and security for data-centric wireless sensor networks. A holistic security model is needed that integrates solutions at each network layer.
1. Cyber Ethics and Cyber Crime
2. Security in Social Media & Risk of Child Internet
3. Social media in Schools and photo privacy
4. Risk of OSNs and Security, Privacy of Facebook
5. Risk and Security of Social Networking site Facebook and Twitter
6. Risk analysis of Government and Online Transaction
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNishanth Gandhidoss
This document describes a project report submitted for the degree of Bachelor of Technology in Information Technology. The report focuses on network intrusion detection and node recovery using dynamic path routing. It was submitted by three students - Nishanth G., Sudharshan N., and Surya Krishnan R. - to Sri Venkateswara College of Engineering in partial fulfillment of their degree requirements. The document includes sections on acknowledgements, abstract, contents, introduction, literature survey, system design, network topology, network intrusion detection and prevention, node recovery, source anonymity, dynamic path routing, results and discussions, and conclusions. It aims to address privacy and security issues in networks through techniques like encryption, evidence collection, risk assessment
The Next Generation Cognitive Security Operations Center: Network Flow Forens...Konstantinos Demertzis
A Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The fundamental aspects of an effective SOC is related to the ability to examine and analyze the vast number of data flows and to correlate several other types of events from a cybersecurity perception. The supervision and categorization of network flow is an essential process not only for the scheduling, management, and regulation of the network’s services, but also for attacks identification and for the consequent forensics’ investigations. A serious potential disadvantage of the traditional software solutions used today for computer network monitoring, and specifically for the instances of effective categorization of the encrypted or obfuscated network flow, which enforces the rebuilding of messages packets in sophisticated underlying protocols, is the requirements of computational resources. In addition, an additional significant inability of these software packages is they create high false positive rates because they are deprived of accurate predicting mechanisms.
For all the reasons above, in most cases, the traditional software fails completely to recognize unidentified vulnerabilities and zero-day exploitations. This paper proposes a novel intelligence driven Network Flow Forensics Framework (NF3) which uses low utilization of computing power and resources, for the Next Generation Cognitive Computing SOC (NGC2SOC) that rely solely on advanced fully automated intelligence methods. It is an effective and accurate Ensemble Machine Learning forensics tool to Network Traffic Analysis, Demystification of Malware Traffic and Encrypted Traffic Identification.
This document summarizes a research paper on developing a honey pot intrusion detection system. The paper introduces cyber warfare as a growing threat and the need for effective network security. It then describes designing and implementing a honey pot IDS to detect potential threats on a host system by emulating network services and monitoring connections. The IDS would use event correlation, log analysis, alerting and policy enforcement. The document provides background on intrusions, IDS testing methodology, and reasons why only creating secure systems is not enough to prevent all intrusions.
This document provides an overview of computer and network security. It discusses how computer networks are used for communication and the security issues that can arise, such as hacking, phishing, and malware attacks. It then describes various security threats like active and passive attacks, unauthorized access, and intrusions. The document also covers security measures like passwords, firewalls, cryptography, and steganography that can be used to secure networks and protect sensitive data during communication between computers.
This document discusses computer network security. It begins with an introduction discussing how computer networks bring security risks due to openness and connectivity. It then discusses influential elements of network security such as hackers, software vulnerabilities, and information leaks. The document also covers research findings on basic network security technologies like firewalls, encryption, and intrusion detection. It analyzes internet attack methods including eavesdropping, phishing, denial of service attacks and malware. Finally, it discusses measures that can be taken to improve network security.
Network security is a dynamic art, with dangers appearing as fast as black hats can exploit vulnerabilities. While there are basic “golden rules” which can make life difficult for the bad guys, it remains a challenge to keep networks secure. John Chambers, Executive Chairman of Cisco, famously said “there are two types of companies: those that have been hacked, and those who don’t know they have been hacked”. The question for most organizations isn’t if they’re going to be breached, but how quickly they can isolate and mitigate the threat. In this paper, we’ll examine best practices for effective cybersecurity – from both a proactive (access hardening) and reactive (threat isolation and mitigation) perspective. We’ll address how network automation can help minimize cyberattacks by closing vulnerability gaps and how it can improve incident response times in the event of a cyberthreat. Finally, we’ll lay a vision for continuous network security, to explore how machine-to-machine automation may deliver an auto-securing and self-healing network.
Go to www.esgjrconsultinginc.com
Toward Continuous Cybersecurity With Network AutomationKen Flott
Network security is a dynamic art, with dangers appearing as
fast as black hats can exploit vulnerabilities. While there are
basic “golden rules” which can make life difficult for the bad
guys, it remains a challenge to keep networks secure. John
Chambers, Executive Chairman of Cisco, famously said “there
are two types of companies: those that have been hacked, and
those who don’t know they have been hacked”. The question
for most organizations isn’t if they’re going to be breached, but
how quickly they can isolate and mitigate the threat.
In this paper, we’ll examine best practices for effective
cybersecurity – from both a proactive (access hardening)
and reactive (threat isolation and mitigation) perspective.
We’ll address how network automation can help minimize
cyberattacks by closing vulnerability gaps and how it can
improve incident response times in the event of a cyberthreat.
Finally, we’ll lay a vision for continuous network security, to
explore how machine-to-machine automation may deliver an
auto-securing and self-healing network.
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
This paper is on the exploration of Internet Network security. With the advent of the internet, security became a major concern for computer users, organizations and the Military. The internet structure itself allow for many security threats to occur. Knowing the attack methods, the architecture of the internet when modified can reduce the possible attacks that can be sent across the network. The internet can be secured by the means of VPN, IPSec, Anti‐Malware Software and scanners, Secure Socket Layer, intrusion‐detection, security management, firewalls and cryptography mechanisms. The essence of this research is to forecast the future of internet network security.
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...ijccsa
Corporations face a dangerous threat that existing security technologies do not adequately address, which includes malware, track ware and adware, describes any program that may track online and/or offline PC activity and locally saves or transmits those findings to third parties without user’s knowledge or consent. The same activities that make our employees efficient and productive doing research over the internet, sharing files, sending instant messages to customers and coworkers, and emailing status information while travelling are making our IT infrastructures vulnerable to mobile malicious code, Spyware, viruses, Trojan horses, phishing, and pharming. Gateway firewalls and antivirus software is no match for these new, virulent threats. To ensure the needed protection, organizations need to incorporate content level protection into their overall security strategies. As web-borne threats become more complex and virulent, companies must face the need to supplement their existing, traditional security measures. So, in this paper, we will highlight about our work which attempts to keep a real time track of each events of the client’s behavior inside a network.
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
As web-borne threats become more complex and virulent, companies must face the need to supplement their existing, traditional security measures. So, in this paper, we will highlight about our work which attempts to keep a real time track of each events of the client’s behavior inside a network.
Inria - Cybersecurity: current challenges and Inria’s research directionsInria
Inria white books look at major current challenges in informatics and mathematics and show actions conducted by our project-teams to these challenges. Their goal is to describe the state-of-the-art of a given topic, showing its complexity, and to present existing, as well as emerging, research directions and their expected societal impact. This white book has been edited by Steve Kremer, Ludovic Mé, Didier Rémy and Vincent Roca. They coordinated the contributions from researchers of Inria teams (the complete list of contributors is given at the end of the book). Many thanks to Janet Bertot for proof-reading this document, as well as to François Pottier, Gabriel Scherrer, and Benjamin Smith who read parts of it.
Publication date: January 2019
Cyber Security Matters a book by Hama David Bundohdbundo
This document provides an introduction to cyber security. It defines cyber security and lists some common cyber security threats such as social engineering, malware, phishing, SQL injection, man-in-the-middle attacks, and denial-of-service attacks. It then discusses key cyber security terminology and concepts including access authorization, anti-virus software, authentication techniques, backups, encryption, firewalls, hackers, honeypots, intrusion detection systems, and port scanning. The document aims to educate readers on cyber security risks and mitigation strategies.
This document provides an overview of network security. It discusses the history and need for network security. It describes common network attacks and authentication methods. The document outlines basic network security techniques like Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP). It also discusses network security architecture and concludes that network security is an important field that requires ongoing improvement to address evolving threats.
This document discusses web security and attacks. It begins with an abstract noting that the web presents problems for both web clients and servers, requiring steps to protect both. Chapter 1 defines web security and discusses general security concepts like privacy, integrity, and availability. It also outlines technical methods to secure systems, like encryption, passwords, firewalls, and monitoring. Chapter 2 defines types of computer attacks like denial of service, man-in-the-middle, and brute force attacks. It also discusses social engineering techniques used to manipulate users into revealing confidential information.
Intrusion Detection Techniques In Mobile NetworksIOSR Journals
This document discusses intrusion detection techniques for mobile networks. It begins by outlining the vulnerabilities of wireless networks, including the open medium, dynamic topology, lack of centralized monitoring, and cooperative algorithms. It then explains the need for intrusion detection systems, as completely preventing intrusions is unrealistic. The document classifies intrusion detection systems and outlines their requirements, including continuous monitoring, fault tolerance, and adaptability. It concludes by describing the two main techniques of intrusion detection: anomaly detection, which flags deviations from a normal activity profile; and misuse detection, which searches for patterns matching known attacks.
A Review On Network Security And PrivacyTodd Turner
This document summarizes a research paper that reviews network security and privacy. It begins by introducing the importance of data security and privacy as data and technology usage increases. It then discusses various network security layers and measures to protect data, such as network access control, antivirus software, firewalls, and virtual private networks. The document also covers different types of network attacks and security threats. It concludes by emphasizing the importance of network security for both individuals and companies in today's digital world.
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...pharmaindexing
This document discusses a strategy for defending against denial of service (DoS) attacks from internal jammers in wireless sensor networks. The proposed method involves detecting internal compromised nodes based on packet attributes and markings. Packets are transmitted to the destination using dedicated channels and timing without disclosing decryption keys to all nodes. The method detects attacks by checking if packets have marks linking them to preceding and succeeding packets needed to reassemble the message. Packets without these attributes would be considered attack packets. Upon detection, a dynamic routing algorithm selects the least used bandwidth for previous communication and allocates a dedicated channel between the source and destination.
This is an era of technology and Internet is one o f the them which has changed the world the most in last decades. It is open and so anyone can use it to get information about anything, people have been using it for educational, business, social connections and every day work purposes. But the matter of fact is door open in both directions, bad people with bad intensions stared using this technology for evil intensions. They are stealing personal data, financial information, government secrets and many others are target of those people. In this paper we will discuss about vulnerabilities present currently in the network, some case studies and later recommendations to avoid vulnerabilities and prevent them from exploitations are also discussed.
Similar to AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USING FEEDBACK SESSIONS (20)
Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...pharmaindexing
Background
The objective of this study was to investigate the degree of compliance among cardiac patients who attend the health facilities in Kuala Lumpur and Perak, Malaysia. The reasons for non-compliance and recommendations from healthcare professionals were also evaluated.
Method
A cross-sectional study of 400 patients and 100 healthcare professionals was carried out. This study utilizes variables on external factors and internal factors as the measurement tools. The questionnaire which consists of Morisky self-reported medication adherence questions was administered to patients and causes for non-compliance sought. Questionnaire for healthcare professionals was used to determine strategies that can improve compliance rate.
Results
The study revealed a 15.8% of high adherence rate, 54.3% of moderate adherence rate and 30% of poor adherence to cardiovascular disease medications. The chi-square tests showed the strong association between dependent and independent variables. The model chosen for testing the patient compliance through external and internal factors gives an R2 value of 85.0% with an adjusted R2 of 84.7%. The F value (317.187) was also significant (p=0.000) which means that the variables have better fit in the multivariate model. The major reasons determined for non-adherence were attitudes and beliefs, lifestyle, side effects and cost of medications. The study recommends that pharmacists and dispensing technicians should be adequately qualified to provide proper counselling to cardiac patients on their medicines and disease conditions.
Conclusion
The result of this study is of value to health care providers. Compliance to cardiovascular medications will avoid treatment failures encountered in therapy.
Overview on Recurrence Pregnancy Loss etiology and risk factorspharmaindexing
Recurrent pregnancy loss (RPL) can be defined as more than two to three consecutive miscarriages before 20 weeks’ gestation; it affects approximately 1% to 2% of women. RPL is a multifactorial disease. It is very important to study the etiology and risk factors of RPL to find the best diagnostic tests and suitable therapeutic intervention. This article will discuss the current understanding etiologies and risk factors of RPL.
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.pharmaindexing
Asthma management is a challenge due to the prevalence of disease in the world. Based on the immunological and inflammatory mechanisms of asthma, corticosteroids and anti-inflammatory participate greatly in the treatment plan. Due to different reasons, there is still an unmet need to develop new agents in this field. A lot of compounds with anti-inflammatory effect are investigated in both pre-clinical and clinical studies.
A review on liver disorders and screening models of hepatoprotective agentspharmaindexing
The liver is a vital organ present in vertebrates and some other animals. It has a wide range of functions, including detoxification, protein synthesis, and production of bio chemicals necessary for digestion. The liver is necessary for survival; there is currently no way to compensate for the absence of liver function long term, although liver dialysis can be used short term.
Carbamazepine induced Steven Johnson syndrome: A case reportpharmaindexing
Drugs are the most common cause that induces Steven Johnson syndrome (SJS) and includes antiepileptic drugs, antiretroviral drugs, anti-tuberculosis drugs, Sulphonamides, fluoroquinolones, penicillins, non-Steroidal anti-inflammatory drugs, Multivitamins. The genetic markers are also the cause for carbamazepine induced Steven Johnson Syndrome. In our study, the antiepileptic drug (Carbamazepine) is the cause for Steven Johnson Syndrome. A female patient aged 25 years came to the hospital with the complaints of bubbling over the skin and all over the body with papillary vesicles associated with pain and irritation, fever, myalgia, and nausea. The patient is known case of Phenytoin induced Steven Johnson Syndrome. In this case the patient developed the Steven Johnson Syndrome approximately after one month after starting the carbamazepine.By the withdrawal of the drug, the condition of the patient was improved.
Monoherbal formulation development for laxative activitypharmaindexing
The Ayurvedic Pharmacopoeia specifically approves flaxseed as a poultice for boils externally and demulcent or laxative internally. In this study monoherbal formulation development for laxative activity of flaxseed was undertaken. The plantLinumusitatissimumhasshowed higher percentage of total ash as well as alcohol soluble extractive values. The aqueous extract of Linumusitatissimumwas prepared by using pilot scale extraction plant and spray drying unit. The qualitative phytochemical studies reveal the presence of amino acids, carbohydrates, vitamins and proteins. From the available literatures it was found that Linumusitatissimum contains more number of amino acids. The formulated tablets showed acceptable pharmacopoeial limits and complies with specifications for thickness, hardness, friability and weight variation. The formulation has showed better laxative activity indicating additive property of the combined phytoconstituents of the plant.
Monoherbal formulation development for laxative activitypharmaindexing
The Ayurvedic Pharmacopoeia specifically approves flaxseed as a poultice for boils externally and demulcent or laxative internally. In this study monoherbal formulation development for laxative activity of flaxseed was undertaken. The plantLinumusitatissimumhasshowed higher percentage of total ash as well as alcohol soluble extractive values. The aqueous extract of Linumusitatissimumwas prepared by using pilot scale extraction plant and spray drying unit. The qualitative phytochemical studies reveal the presence of amino acids, carbohydrates, vitamins and proteins. From the available literatures it was found that Linumusitatissimum contains more number of amino acids. The formulated tablets showed acceptable pharmacopoeial limits and complies with specifications for thickness, hardness, friability and weight variation. The formulation has showed better laxative activity indicating additive property of the combined phytoconstituents of the plant.
Pneumonia and respiratory failure from swine origin influenza H1n1pharmaindexing
Swine influenza (swine flu) became alarming health concern when World Health Organization declared as “public health emergency of international concern” on April 25, 2009. After documentation of human-to-human transmission of the virus in at least three countries of two WHO regions, the WHO raised the pandemic level to 6.1 During the 1918, flu pandemic infected one-third of the world's population (an estimated 500 million people) and caused approximately 50 million deaths.2 In 1976, an outbreak of swine influenza occurred in New Jersey, USA, which involved more than 200 cases, some of them severe, resulting in one death.3 In 1988, another fatality was reported as a complication of swine influenza.
A descriptive study on newborn care among postnatal mothers in selected mater...pharmaindexing
The newborn health challenge faced by India is more formidable than that experienced by any other country in the world. The newborn health is inevitably affected by the traditional care practices of the mothers causing high infant morbidity and mortality.The aim of the study were determine the knowledge, attitude and practice of postnatal mothers regarding new born care and find out the association between knowledge, attitude and practice of postnatal mothers regarding new born care and to determine the association between these as well as with the selected demographic variables. A descriptive study was conducted to assess the knowledge, attitude and practice of postnatal mothers regarding new born care in selected maternity centres in Madurai. Survey approach was employed to select sample and it consisted of 100 postnatal mothers. Data was collected using structured interview schedule. Findings of the study showed that 65% of postnatal mothers had moderate knowledge; 61% had favourable attitude and 57% of them had high practice of new born care. There was a significant association between knowledge and attitude (r=+0.567), knowledge and practice (r=+0.388), attitude and practice (r=+0.321) .There was a significant association between knowledge and education, monthly family income and obstetrical score at p<0.05. Findings of the study indicated the need to conduct frequent assessment of knowledge, attitude and practice of postnatal mothers regarding new born care. Awareness and attitude of the mothers towards new born care still has lots of lacunae especially in those who belong to the lower socio economic statusand poorly educated postnatal mothers. So it is imperative to provide comprehensive training in the field of new born care for mothers during pregnancy
Late 19th century was evident of intelligent biomaterial; which has changed researcher’s perspective towards science and technology. This intelligent biomaterial are envisioned to have huge impact on Healthcare from sequential signalling of biomedical molecule, mimicking natural gene, an effective drug carrier, to high resolution diagnostic tool.From drug discovery aspect many of NCE fail to reach therapeutic potential due to PK/ PD profile. Nanotechnology has changed the face of drug discovery form chemical evaluation to structure of proteins in signalling pathways and development of chemical antibody. Nanotechnology from lab to market approval is long process due to regulatory evaluation. Though it seems to be bright future market it has to go through a long process from being innovation to complete market product. This makes whole process expensive making investor reluctant to invest in big projects.Western world is aware of dramatic potential of nano-projects; which has its limitation in financial investments; with major challenge of transforming nano science to commercial pharmaceutical product.
The Flaws in health practice in post-operative management of a patient in ter...pharmaindexing
This case study summarizes the treatment of a 4-year old child with congenital urinary tract obstruction who presented with constipation, fever, and cough. Laboratory tests found low electrolyte levels, high blood acids, and kidney damage. The child's treatment included surgery, dialysis to correct electrolyte imbalances, and antibiotics for chest infection. However, the case study notes discrepancies in the post-operative treatment, including questionable antibiotic selection and prescribing of calcium channel blockers not recommended for children. The study concludes there is a need for clinical pharmacists on the healthcare team to improve rational medication use.
Corticosteroid induced disorders – An overviewpharmaindexing
Glucocorticoids are important in the treatment of many inflammatory, allergic, immunologic, and malignant disorders, and the toxicity of glucocorticoids is one of the commonest causes of iatrogenic illness associated with chronic inflammatory disease.Glucocorticoid-induced muscle atrophy is characterized by fast-twitch or type II muscle fiber atrophy. Corticosteroid (CS) therapy is widely used in the treatment of rheumatic diseases.Osteoporosis remains one of its major complications.Steroid induced glaucoma is a form of open angle glaucoma occurring as an adverse effect of corticosteroid therapy. Glucocorticoids induce hepatic and extrahepatic insulin resistance.Glucocorticoid treatment impairs both glucose transport in fat and muscle cells. Corticosteroid-induced psychosis represents a spectrum of psychological changes that can occur at any time during treatment. Cushing’s syndrome describes the signs and symptoms associated with prolonged exposure to inappropriately high levels of the hormone cortisol. Physicians must be aware of these adverse effects and be equipped to manage them.
Anti-inflammatory activity of pupalia lappacea L. Jusspharmaindexing
Pupalia lappacea (L) Juss is an erect shrub used in folklore medicine to treat bone fractures and in inflammatory conditions. Methanolic extract of aerial parts shown is claimed in traditional medicine that the leaves of the plant are used in the treatment of inflammation. In the present study, the methanolic extract of Pupalia lappacea was screened for its anti-inflammatory activity using carageenan induced rat paw edema egg white induced paw oedema models. The methanolic extract at the dose of 200 mg/kg p.o exhibited significant anti-inflammatory activity in carrageenan induced paw edema model (p<0.01). In egg white induced model, methanolic extract at the dose of 200 mg/kg inhibited paw oedema significantly (p<0.01) indicating that both test samples inhibit the increase in number of fibroblasts and synthesis of collagen and mucopolysaccharides during prostaglandin formation during the inflammation. These experimental results have established a pharmacological evidence for the folklore claim of the drug to be used as an anti inflammatory agent. HPTLC analysis of the extract shows the presence of gallic acid 1.24mg/ml, ferulic acid 2.00mg/ml, chlorogenic acid 46.25mg/ml and rutin 7.02mg/ml of the extract which were responsible for the claimed anti-inflammatory action in the animal models studied.
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...pharmaindexing
This document summarizes research on Lucinactant, a novel synthetic surfactant approved by the FDA in 2012 for treatment of neonatal respiratory distress syndrome (RDS). It contains a peptide called sinapultide that mimics the function of human surfactant protein B. Studies found Lucinactant was as effective as or more effective than previous animal-derived surfactants in reducing mortality from RDS, but its pharmacokinetics are not fully understood. The document reviews clinical trials and mechanisms of Lucinactant and discusses its efficacy, safety profile, and potential cost benefits compared to other surfactants.
Bioactivity screening of Soil bacteria against human pathogenspharmaindexing
This study aimed to isolate soil bacteria with potential bioactive properties against human pathogens. 36 bacterial strains were isolated from 3 soil samples and screened against common pathogens. 14 isolates showed antibacterial activity, including against Staphylococcus aureus, Streptococcus faecalis, E. coli, Klebsiella aerogenes, Proteus vulgaris, Pseudomonas aureginosa and Salmonella typhi. The 3 most active bacterial isolates were selected for further production and isolation of their bioactive metabolites. Testing found the metabolites had prominent antibacterial effects against the clinical pathogens studied, indicating their potential as a source of new antimicrobials given the rise in drug resistance.
A study on sigmoid Volvulus presentation and managementpharmaindexing
A study on sigmoid volvulus presentation and management was a 2yr retrospective study done at RMMCH.The diagnosis of sigmoid volvulus was made from a history of large bowel obstruction (constipation, abdominal distension, and abdominal pain), which were often recurrent and plain abdominal radiographs.The morbidity associated isSuperficial wound infection occurred in four patients. All the infected wounds eventually healed with conservative measures. Clinical anastomotic dehiscence was noted in 1 patient for which during relaparotomy proximal colostomy and mucous fistula was done. The mortality associated is shown is there were 9 deaths of which 7 were due to sepsis and 2 were due to comorbid illness. Two out of eight patients for whom a colopexy was done had a recurrent attack of sigmoid volvulus. The duration of hospital stay ranged between 10 and 21 days. Use of sigmoidoscopic detorsion for viable colon should be encouraged. Sigmoidopexy, which is associated with a recurrence rate of 20% in our series of patients, should be used selectively.Hartmann’s procedure is a safe option in sigmoid volvulus with gangrenous bowel. Primary anastomosis in emergency situation can be carried out with morbidity and mortality in patients with viable colon
Evaluation of Preliminary phytochemical on various some medicinal plantspharmaindexing
The present study was carried out to evaluate the physical status and percentage yield of methanolic extract and its fractions of whole plant of Leucas cephalotes, leaves of Hiptage benghalensis and leaves of Kydia calycina were recorded for future references and Preliminary phytochemical screening of MLC, MHB and MKC revealed the presence of carbohydrates, glycosides, saponins, flavonoids, steroidal and phenolic compounds. MLC revealed the presence of all the above mentioned phytoconstituents except saponins and also MKC steroidal compounds. The fractions of MLC, MHB and MKC revealed the presence of glycosides, phenolic compounds, steroids and flavonoids.
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...pharmaindexing
This study compared the in vitro antibacterial activity of cefoperazone and levofloxacin against various clinical isolates. 120 bacterial isolates from patient samples were tested for susceptibility to cefoperazone and levofloxacin using disc diffusion. Results showed levofloxacin had lower resistance than cefoperazone for E. coli and P. aeruginosa, while cefoperazone was more effective against S. aureus. However, resistance to both antibiotics was gradually increasing, highlighting the need for regular surveillance of antibiotic susceptibility.
Concept of srotas from ayurvedic perspective with special reference to neurologypharmaindexing
Ayurveda is a life science. The researchers of ayurveda could rule out the presence of srotas (channels) spreading throughout the human body. These srotas (channels) are governed by vayu which is using all the srotas (channels) of the body to carry out the functional and physiological activities of the human body without which the human society will not exist. Several synonymous words have been described by the ayurvedicacharyas for srotas. Some are micro and some are macro in structures and they adopt the same colour of the particular dhatus of the body to which it belongs. The aim of the study is to justify that srotas are nothing but innurmerable channels or pathways of the nervous system governed by electric current without which no functional and physiological activities of the human body will develope.
Health promotion survey in overweight and obese students of universities in n...pharmaindexing
Introduction
Overweight and obesity is one of the major health problems in the UK and worldwide. Approximately two-thirds of the population in the UK is either overweight or obese. Overweight and obesity is an important issue that causes distress to most women. Health promotion is the best method to educate overweight and obese women. It is defined as the process enabling people to increase control over and to improve their health by Ottawa Charter for Health Promotion. It is aimed to enhance the well-being of the individuals and their positive attitudes towards prevention of various diseases. In order to make any improvement to the health promotion for overweight and obesity, the risk factors and the opinions from the public should first be identified and addressed.
Methods
Cross-sectional survey design was selected with a questionnaire that consisted of 20 open and close ended questions. A sample size of 196 was determined. The data thus gathered was analyzed using SPSS V20 (Statistical Package for Social Science version 20). Descriptive statistics (fx) and (SD) were used and Chi-square X2 test for association was employed.
Results
Out of the total 196 responses, only (40%) of the students had normal weight (SD 1.1), (25%) students had a good understanding of health promotion (SD 1.6), half (50%) appeared concerned about their weight (SD 0.5), (60%) had an obese family member (0.5). The BMI of students was associated with the presence of an obese member in their family and their weight as a concern for them. (P-value <0.05).
Conclusion
The health promotion service is beneficial as it was found to have raised concerns in the mind of the students regarding over weight and obesity. However it was observed that the understanding of health promotion service was different among students and this is the root of the problem.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USING FEEDBACK SESSIONS
1. www.ijiarec.com
Author for Correspondence:
*1
Dr.C.Chandrasekar, Asst. Professor, Department of Computer Applications, Sree Narayana Guru College, Coimbatore,
Tamilnadu, India.
*2
Mr.V.Prabhakaran,M.Phil., Research Scholar, Department of Computer Science, Sree Narayana Guru College, Coimbatore,
Tamilnadu, India. Email- prabhakaranmvp@gmail.com.
MAR-2014
International Journal of Intellectual Advancements
and Research in Engineering Computations
TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE
COMMUNICATION IN WIRELESS SENSOR NETWORKS
*1
Dr.C.Chandrasekar, *2
V.Prabhakaran,M.Phil.,
ABSTRACT
Wireless Sensor Networks, at the outset, used in military applications for sensitive data recordings and
transfer which obviously limits the participation of mankind. Today wireless Sensor Networks has entered and
proved its efficiency in almost every application. Yet there are some metrics to holdback the security of the same,
due to the very own attractive features of flexibility and open nature. Jamming of the medium to deny the service of
a legitimate user is one among the many vulnerabilities of a wireless Sensor Network. This paper intends to provide
a scheme for detecting the attack by a bidirectional link between the packets and recognizing any off the chain
packets at the boundary routers. Prevention of any mishap packets from entering into the network improves the
security of the network. A novel approach of marking the neighborhood packets forms a chain of legitimate message
will preserve the originality at the other end and any packets to be found without the link information will be
eliminated at the perimeter. This approach intends to provide a secure environment which withstands detection and
mitigation as the principle.
Index terms: Jamming, Bi-directional, Packets, Legitimate, Information.
I INTRODUCTION
The modern era has now extremely
advanced and well-developed and the basic reason for
this development is actually the launch of the internet
and its applications which have provided the
individuals with the easiest routine in their daily lives.
The internet has changed the face of the lives of
people, turning them completely into the modern and
latest lifestyle with its developments. Today, instead
of the newspapers, the people use the internet to access
the E-news which provides with not only the
newspapers completely but also from the various news
channels from all over the world. Even the live video
news from the news channels can be accessed through
the net, overpowering the other media, even including
the television. The internet is indeed the major
advancement in the modern era, enabling the common
people to sit at home and know the world. Any piece
of information regarding anything in our daily lives,
may it be a cosmetic technique for the ladies or the
men health problems, the cooking recipes for trying
the new dishes or the home decoration tips, the
information on the latest appliance or product you are
going to buy or the search for the new house, there it is
already on the internet. The interconnected computer
networks use the standardized Internet Protocol Suite-
Transmission Control Protocol or Internet Protocol to
serve billions of users worldwide. The Internet has
become a large market for companies; some of the
biggest companies, today, have grown by taking
advantage of the efficient nature of low-cost
ISSN:2348-2079