22 research outputs found

    Integrating the EGC, EF, and ECS Trio Approaches to Ensure Security and Load Balancing in the Cloud

    Get PDF
    According to data protection studies, "Distributed Denial-of-Service (DDoS)" threats have cost governments and businesses throughout the globe a large number of financial resources. Despite this, the existing practices fall short of the standards set by "Cloud Computing (CC)" monitoring technology. They ignore the "Intrusion Detection Systems (IDS)" techniques, which take advantage of the CC's multiple tenants and elasticity qualities, and also the hardware limitations. Attackers are finding increasing ways to effectively exploit them because of their rising complexity. DDoS assaults of this scale have never been observed online before 2018. As online services get more popular, so does the amount of DDoS assaults and malevolent hackers leading to terrible. Numerous IDS for DDoS are already in place to address this problem. One of the most challenging aspects of virtualization is establishing a "Trust Model (TM)" between the many "Virtual Machines (VMs)". The lack of a standard formulation for generating a TM would be the primary reason. As a consequence, the integrity of every VM might not have been recognized by an independent trust, which might lead to a decrease in trust value. In this research for TM creation, "Enhanced Graph Based Clustering (EGC)" is proposed, while "Enhanced Fuzzy (EF)" is used for detecting attacks, and the "Enhanced Cuckoo Search (ECS)" method is used to find the ideal "Load Balancing (LB)" distribution. By creating a new TM, the proposed (EGC-EF-ECS) system strengthens trust value. To expand the CC model's stability, it optimizes attacker recognition percentage and makes better use of resources by restricting each VM's processing, bandwidth, and storage requirements. The proposed EGC-EF-ECS outperformed the previously used BPA-SAB, and DCRI-RI approaches in terms of the "Intrusion-Detection-Rate (IDR)", "Load-Balancing-Efficiency (LBE)", and "Data-Accessing-Time (DAT)" evaluation metrics

    PER PREFIX FLEXIBLE METRIC FOR INTENT BASED ROUTING AND TRAFFIC ENGINEERING USING EIGRP

    Get PDF
    Routing protocols are typically designed to use a single-cost formula for all of a protocol\u27s routes. In some instances, a network administrator can adjust the cost formula of the Enhanced Interior Gateway Routing Protocol (EIGRP), but the protocol applies the formula uniformly to all prefixes, which can cause all applications to suffer from lower performance. In order to address such issues, techniques are presented herein through which a flexible metric can be applied that is isolated to prefixes. for example, the techniques presented herein provide for the reduced use of Virtual Private Network (VPN) routing & forwarding (VRF) instances on routers and ease network configuration as configurations provided in accordance with the techniques presented herein are only needed at prefix originators

    INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & MANAGEMENT CHEMICAL SYNTHESIS OF BONE-LIKE HYDROXYAPATITE FROM CUTTLE FISH BONES AND ITS CHARACTERIZATION

    Get PDF
    ABSTRACT Hydroxyapatite (Hap) was synthesized from cuttle fish bone by using a wet chemical method at room temperature. In this method powdered cuttle fish bones were reacted with phosphoric acid (H3PO4). The synthesized Hap was characterized by Atomic Force Microscopy (AFM), Fourier Transform Infrared Spectroscopy (FTIR) and Scanning Electron Microscopy (SEM). Fine and Crystallized Chap was obtained. The particular cuttlefish bones are biocompatible and used in implants for osseointegration

    FORMULATION AND EVALUATION OF LEVOFLOXACIN-CHITOSAN / β- CYCLODEXTRIN NANOPARTICLES BY IONIC GELATION

    Get PDF
    Background: Levofloxacin is a broad spectrum anti-infective agent, which is rapidly and completely absorbed after oral administration. The half life of Levofloxacin is 6-8 h after conventional dosing. The objective of the present work was to develop Levofloxacin nanoparticles to retain the dosage form in the absorption site more than the half life of the drug, enhance the bioavailability of drugs, reduce dose frequency, toxicity and patient compliance. Methods: The compositions of different formulations of Levofloxacin nanoparticles by the ionic gelation method using biodegradable polymer chitosan and tripolyphosphate as cross linking agent. Result and Discussion: The particle size lies of the prepared nanoparticles between 199 and 369 nm and the drug content found between 51.13± 0.28 and 71.12 ± 0.14 %. The particle size of nanoparticles increased with increasing concentration of polymer matrix density and this may be due to the increased viscosity of the inner phase and decreased with increasing concentration of β-cyclodextrin. Scanning electron microscopy indicated that the prepared nanoparticles were discrete, uniform and spherical with a smooth surface. The in vitro release showed that the drug release from the prepared nanoparticles was characterized by an initial fast release and followed by a delayed release phase. During and at the end of the accelerated stability study, the tested formulation showed almost same drug content, in vitro drug release and no colour changes were observed from that observed at the opening of the study. Conclusion: Among all the formulations (GIA, GIB, GIC, GID, GIE and GIF), the formulations G1C, G1E and G1F followed the drug release in a controlled manner. The in vitro release profile showed that this is a potential drug delivery for Levofloxacin and has to confirm in the in vivo settings as a separate investigation in future. Key words: Controlled drug delivery, In vitro drug release, Nanoparticle, Particle size, Stability studies, Surface morpholog

    Effects of Low Level Laser Therapy Vs Ultrasound Therapy in the Management of Active Trapezius Trigger Points.

    No full text
    Effects of Low Level Laser Therapy Vs Ultrasound Therapy in the Management of Active Trapezius Trigger Points.</p

    Ensuring the security and balancing the load in the cloud computing by DCRI-RI hybrid method

    No full text
    In the cloud environment, the confidentiality of data is improved by protecting the cloud data from unauthorized user access. During data communication, the balancing of load across cloud servers helps to maintain the cloud service's reliability. Through intrusion detection, the performance of secured data communication is enhanced in a significant way. Some techniques were developed in the field of cloud computing to provide secure communication between the cloud server and cloud user. These developed techniques failed to improve the security and load balancing efficiency simultaneously during the data transmission on a cloud.&nbsp; There is no sufficient algorithm in the present situation to detect the intrusions and to provide improved results in the load balancing. In this research work we propose a novel "Dynamic Certificateless Random Identity (DCRI)" algorithm for ensuring cloud security and a "Rank-Indexing (RI)" algorithm based on weightage for load balancing. Our proposed DCRI-RI hybrid method will ensure a better rate of intrusion detection with higher load balancing efficiency. The DCRI algorithm is relied on a cryptographic concept based on advanced encryption and decryption signature authentication process performed on both cloud server and user end to detect and remove the unauthorized users in a significant way.&nbsp

    Mosaic patterns of selection in genomic regions associated with diverse human traits.

    No full text
    Natural selection shapes the genetic architecture of many human traits. However, the prevalence of different modes of selection on genomic regions associated with variation in traits remains poorly understood. To address this, we developed an efficient computational framework to calculate positive and negative enrichment of different evolutionary measures among regions associated with complex traits. We applied the framework to summary statistics from >900 genome-wide association studies (GWASs) and 11 evolutionary measures of sequence constraint, population differentiation, and allele age while accounting for linkage disequilibrium, allele frequency, and other potential confounders. We demonstrate that this framework yields consistent results across GWASs with variable sample sizes, numbers of trait-associated SNPs, and analytical approaches. The resulting evolutionary atlas maps diverse signatures of selection on genomic regions associated with complex human traits on an unprecedented scale. We detected positive enrichment for sequence conservation among trait-associated regions for the majority of traits (>77% of 290 high power GWASs), which included reproductive traits. Many traits also exhibited substantial positive enrichment for population differentiation, especially among hair, skin, and pigmentation traits. In contrast, we detected widespread negative enrichment for signatures of balancing selection (51% of GWASs) and absence of enrichment for evolutionary signals in regions associated with late-onset Alzheimer's disease. These results support a pervasive role for negative selection on regions of the human genome that contribute to variation in complex traits, but also demonstrate that diverse modes of evolution are likely to have shaped trait-associated loci. This atlas of evolutionary signatures across the diversity of available GWASs will enable exploration of the relationship between the genetic architecture and evolutionary processes in the human genome

    Mosaic evolutionary architecture across 47 well-powered GWASs of human complex traits.

    No full text
    From our evolutionary atlas of 972 GWASs, we plot a subset of 47 GWASs (BOLT-LMM set) performed using the same approach and from the same cohort (Methods). (a) For each evolutionary measure (columns) and a given trait (row), we calculated the trait-averaged value (x-axis, stars) and compared it with the matched genomic background distribution (gray dots: mean values, gray bars: 5th, 95th percentiles). Traits are manually grouped based on type and similarity. The number of trait-associated regions is provided in parentheses. Red stars (FDRMethods). Results are shown for six evolutionary measures; see S3 Fig for all 11 evolutionary measures. (b) We calculated enrichment as described in Fig 1D and highlight four traits with distinct evolutionary profiles. Spokes represent different evolutionary measures (colored by type of associated force) and concentric rings represent levels of evolutionary enrichment. Red dashed circles represent the expected values (i.e., no enrichment).</p
    corecore