2,661 research outputs found
Cephalopod Ink: Production, Chemistry, Functions and Applications
One of the most distinctive and defining features of coleoid cephalopods—squid, cuttlefish and octopus—is their inking behavior. Their ink, which is blackened by melanin, but also contains other constituents, has been used by humans in various ways for millennia. This review summarizes our current knowledge of cephalopod ink. Topics include: (1) the production of ink, including the functional organization of the ink sac and funnel organ that produce it; (2) the chemical components of ink, with a focus on the best known of these—melanin and the biochemical pathways involved in its production; (3) the neuroecology of the use of ink in predator-prey interactions by cephalopods in their natural environment; and (4) the use of cephalopod ink by humans, including in the development of drugs for biomedical applications and other chemicals for industrial and other commercial applications. As is hopefully evident from this review, much is known about cephalopod ink and inking, yet more striking is how little we know. Towards closing that gap, future directions in research on cephalopod inking are suggested
Provisioning VolP wireless networks with security
Thesis (M. Tech.) - Central University of Technology, Free State, 200
The Story of Gout
It had long been suspected that gout might be a disease of varying origins, but it has only been during the present century that primary or acquired gout and hereditary gout have been clearly defined and differentiated. A considerable number of secondary types are now recognised. Several are of iatrogenic nature, whereas others result from disorders of the blood, the bone marrow and the metabolism, as well as from associated specific defects such as those in the Lesch-Nyhan Syndrome of children. Increasing knowledge of gout\u27s chemical secrets, however, is resulting in improved treatment, and we can now assert that gout is perhaps the disease of which we have the most detailed specific understanding and the most effective control. With cooperation from the sufferer and a mild dietary regime, we can now prevent any damage which has already occurred from progressing and, thus, avoid recurrent or progressive deterioration. In almost every case we can now terminate the occurrence of the painful acute attacks by use of modern chemotherapy
Design of an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS) for the EIU Cybersecurity Laboratory
Cyber Security will always be a subject of discussion for a long time to come. Research has shown that there is massive growth of cyber-crime and the currently available number of Cyber Security experts to counter this is limited. Although there are multiple resources discussing Cyber Security, but access to training in practical applications is limited. As an institution, Eastern Illinois University (EIU) is set to start Masters of Science in Cyber Security in Fall 2017. Then the challenge is how EIU will expose students to the practical reality of Cyber Security where they can learn different detection, prevention and incidence analysis techniques of cyber-attacks. In addition, students should have the opportunity to learn cyber-attacks legally. This research proposes a solution for these needs by focusing on the design of firewall architecture with an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) for the EIU Cyber Security Laboratory. This thesis explores different up to date techniques and methods for detection and prevention of cyber-attacks. The overall outcome of this research is to design a public testing site that invites hackers to attack for the purpose of detection, prevention and security incidence analysis. This public firewall might empower students and instructors with practical cyber-attacks, detection techniques, prevention techniques, and forensics analysis tools. It may also provide the knowledge required for further research in the field of Cyber Security
Detection of Denial of Service (DoS) Attacks in Local Area Networks Based on Outgoing Packets
Denial of Service (DoS) is a security threat which compromises the confidentiality of information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP addresses. DoS is harmful to LANs as the flooding of packets may delay other users from accessing the server and in severe cases, the server may need to be shut down, wasting valuable resources, especially in critical real-time services such as in e-commerce and the medical field. The objective of this project is to propose a new DoS detection system to protect organizations from unauthenticated access to important information which may jeopardize the confidentiality, privacy and integrity of information in Local Area Networks. The new DoS detection system monitors the traffic flow of packets and filters the packets based on their IP addresses to determine whether they are genuine requests for network services or DoS attacks.
Results obtained demonstrate that the detection accuracy of the new DoS detection system was in good agreement with the detection accuracy from the network protocol analyzer, Wireshark. For high-rate DoS attacks, the accuracy was 100% whereas for low-rate DoS attacks, the accuracy was 67%
Recommended from our members
The Impact of TLS on SIP Server Performance
This report studies the performance impact of using TLS as a transport protocol for SIP servers. We evaluate the cost of TLS experimentally using a testbed with OpenSIPS, OpenSSL, and Linux running on an Intel-based server. We analyze TLS costs using application, library, and kernel profiling, and use the profiles to illustrate when and how different costs are incurred, such as bulk data encryption, public key encryption, private key decryption, and MAC-based verification. We show that using TLS can reduce performance by up to a factor of 20 compared to the typical case of SIP over UDP. The primary factor in determining performance is whether and how TLS connection establishment is performed, due to the heavy costs of RSA operations used for session negotiation. This depends both on how the SIP proxy is deployed (e.g., as an inbound or outbound proxy) and what TLS options are used (e.g., mutual authentication, session reuse). The cost of symmetric key operations such as AES or 3DES, in contrast, tends to be small. Network operators deploying SIP over TLS should attempt to maximize the persistence of secure connections, and will need to assess the server resources required. To aid them, we provide a measurement-driven cost model for use in provisioning SIP servers using TLS. Our cost model predicts performance within 15 percent on average
Spartan Daily, October 5, 1959
Volume 47, Issue 9https://scholarworks.sjsu.edu/spartandaily/3925/thumbnail.jp
- …