2,661 research outputs found

    Cephalopod Ink: Production, Chemistry, Functions and Applications

    Get PDF
    One of the most distinctive and defining features of coleoid cephalopods—squid, cuttlefish and octopus—is their inking behavior. Their ink, which is blackened by melanin, but also contains other constituents, has been used by humans in various ways for millennia. This review summarizes our current knowledge of cephalopod ink. Topics include: (1) the production of ink, including the functional organization of the ink sac and funnel organ that produce it; (2) the chemical components of ink, with a focus on the best known of these—melanin and the biochemical pathways involved in its production; (3) the neuroecology of the use of ink in predator-prey interactions by cephalopods in their natural environment; and (4) the use of cephalopod ink by humans, including in the development of drugs for biomedical applications and other chemicals for industrial and other commercial applications. As is hopefully evident from this review, much is known about cephalopod ink and inking, yet more striking is how little we know. Towards closing that gap, future directions in research on cephalopod inking are suggested

    Provisioning VolP wireless networks with security

    Get PDF
    Thesis (M. Tech.) - Central University of Technology, Free State, 200

    The Story of Gout

    Get PDF
    It had long been suspected that gout might be a disease of varying origins, but it has only been during the present century that primary or acquired gout and hereditary gout have been clearly defined and differentiated. A considerable number of secondary types are now recognised. Several are of iatrogenic nature, whereas others result from disorders of the blood, the bone marrow and the metabolism, as well as from associated specific defects such as those in the Lesch-Nyhan Syndrome of children. Increasing knowledge of gout\u27s chemical secrets, however, is resulting in improved treatment, and we can now assert that gout is perhaps the disease of which we have the most detailed specific understanding and the most effective control. With cooperation from the sufferer and a mild dietary regime, we can now prevent any damage which has already occurred from progressing and, thus, avoid recurrent or progressive deterioration. In almost every case we can now terminate the occurrence of the painful acute attacks by use of modern chemotherapy

    Design of an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS) for the EIU Cybersecurity Laboratory

    Get PDF
    Cyber Security will always be a subject of discussion for a long time to come. Research has shown that there is massive growth of cyber-crime and the currently available number of Cyber Security experts to counter this is limited. Although there are multiple resources discussing Cyber Security, but access to training in practical applications is limited. As an institution, Eastern Illinois University (EIU) is set to start Masters of Science in Cyber Security in Fall 2017. Then the challenge is how EIU will expose students to the practical reality of Cyber Security where they can learn different detection, prevention and incidence analysis techniques of cyber-attacks. In addition, students should have the opportunity to learn cyber-attacks legally. This research proposes a solution for these needs by focusing on the design of firewall architecture with an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) for the EIU Cyber Security Laboratory. This thesis explores different up to date techniques and methods for detection and prevention of cyber-attacks. The overall outcome of this research is to design a public testing site that invites hackers to attack for the purpose of detection, prevention and security incidence analysis. This public firewall might empower students and instructors with practical cyber-attacks, detection techniques, prevention techniques, and forensics analysis tools. It may also provide the knowledge required for further research in the field of Cyber Security

    Detection of Denial of Service (DoS) Attacks in Local Area Networks Based on Outgoing Packets

    Get PDF
    Denial of Service (DoS) is a security threat which compromises the confidentiality of information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP addresses. DoS is harmful to LANs as the flooding of packets may delay other users from accessing the server and in severe cases, the server may need to be shut down, wasting valuable resources, especially in critical real-time services such as in e-commerce and the medical field. The objective of this project is to propose a new DoS detection system to protect organizations from unauthenticated access to important information which may jeopardize the confidentiality, privacy and integrity of information in Local Area Networks. The new DoS detection system monitors the traffic flow of packets and filters the packets based on their IP addresses to determine whether they are genuine requests for network services or DoS attacks. Results obtained demonstrate that the detection accuracy of the new DoS detection system was in good agreement with the detection accuracy from the network protocol analyzer, Wireshark. For high-rate DoS attacks, the accuracy was 100% whereas for low-rate DoS attacks, the accuracy was 67%

    Spartan Daily, October 5, 1959

    Get PDF
    Volume 47, Issue 9https://scholarworks.sjsu.edu/spartandaily/3925/thumbnail.jp
    • …
    corecore