22 research outputs found
Integrating the EGC, EF, and ECS Trio Approaches to Ensure Security and Load Balancing in the Cloud
According to data protection studies, "Distributed Denial-of-Service (DDoS)" threats have cost governments and businesses throughout the globe a large number of financial resources. Despite this, the existing practices fall short of the standards set by "Cloud Computing (CC)" monitoring technology. They ignore the "Intrusion Detection Systems (IDS)" techniques, which take advantage of the CC's multiple tenants and elasticity qualities, and also the hardware limitations. Attackers are finding increasing ways to effectively exploit them because of their rising complexity. DDoS assaults of this scale have never been observed online before 2018. As online services get more popular, so does the amount of DDoS assaults and malevolent hackers leading to terrible. Numerous IDS for DDoS are already in place to address this problem. One of the most challenging aspects of virtualization is establishing a "Trust Model (TM)" between the many "Virtual Machines (VMs)". The lack of a standard formulation for generating a TM would be the primary reason. As a consequence, the integrity of every VM might not have been recognized by an independent trust, which might lead to a decrease in trust value. In this research for TM creation, "Enhanced Graph Based Clustering (EGC)" is proposed, while "Enhanced Fuzzy (EF)" is used for detecting attacks, and the "Enhanced Cuckoo Search (ECS)" method is used to find the ideal "Load Balancing (LB)" distribution. By creating a new TM, the proposed (EGC-EF-ECS) system strengthens trust value. To expand the CC model's stability, it optimizes attacker recognition percentage and makes better use of resources by restricting each VM's processing, bandwidth, and storage requirements. The proposed EGC-EF-ECS outperformed the previously used BPA-SAB, and DCRI-RI approaches in terms of the "Intrusion-Detection-Rate (IDR)", "Load-Balancing-Efficiency (LBE)", and "Data-Accessing-Time (DAT)" evaluation metrics
PER PREFIX FLEXIBLE METRIC FOR INTENT BASED ROUTING AND TRAFFIC ENGINEERING USING EIGRP
Routing protocols are typically designed to use a single-cost formula for all of a protocol\u27s routes. In some instances, a network administrator can adjust the cost formula of the Enhanced Interior Gateway Routing Protocol (EIGRP), but the protocol applies the formula uniformly to all prefixes, which can cause all applications to suffer from lower performance. In order to address such issues, techniques are presented herein through which a flexible metric can be applied that is isolated to prefixes. for example, the techniques presented herein provide for the reduced use of Virtual Private Network (VPN) routing & forwarding (VRF) instances on routers and ease network configuration as configurations provided in accordance with the techniques presented herein are only needed at prefix originators
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & MANAGEMENT CHEMICAL SYNTHESIS OF BONE-LIKE HYDROXYAPATITE FROM CUTTLE FISH BONES AND ITS CHARACTERIZATION
ABSTRACT Hydroxyapatite (Hap) was synthesized from cuttle fish bone by using a wet chemical method at room temperature. In this method powdered cuttle fish bones were reacted with phosphoric acid (H3PO4). The synthesized Hap was characterized by Atomic Force Microscopy (AFM), Fourier Transform Infrared Spectroscopy (FTIR) and Scanning Electron Microscopy (SEM). Fine and Crystallized Chap was obtained. The particular cuttlefish bones are biocompatible and used in implants for osseointegration
FORMULATION AND EVALUATION OF LEVOFLOXACIN-CHITOSAN / β- CYCLODEXTRIN NANOPARTICLES BY IONIC GELATION
Background: Levofloxacin is a broad spectrum anti-infective agent, which is rapidly and completely absorbed after oral administration. The half life of Levofloxacin is 6-8 h after conventional dosing. The objective of the present work was to develop Levofloxacin nanoparticles to retain the dosage form in the absorption site more than the half life of the drug, enhance the bioavailability of drugs, reduce dose frequency, toxicity and patient compliance. Methods: The compositions of different formulations of Levofloxacin nanoparticles by the ionic gelation method using biodegradable polymer chitosan and tripolyphosphate as cross linking agent. Result and Discussion: The particle size lies of the prepared nanoparticles between 199 and 369 nm and the drug content found between 51.13± 0.28 and 71.12 ± 0.14 %. The particle size of nanoparticles increased with increasing concentration of polymer matrix density and this may be due to the increased viscosity of the inner phase and decreased with increasing concentration of β-cyclodextrin. Scanning electron microscopy indicated that the prepared nanoparticles were discrete, uniform and spherical with a smooth surface. The in vitro release showed that the drug release from the prepared nanoparticles was characterized by an initial fast release and followed by a delayed release phase. During and at the end of the accelerated stability study, the tested formulation showed almost same drug content, in vitro drug release and no colour changes were observed from that observed at the opening of the study. Conclusion: Among all the formulations (GIA, GIB, GIC, GID, GIE and GIF), the formulations G1C, G1E and G1F followed the drug release in a controlled manner. The in vitro release profile showed that this is a potential drug delivery for Levofloxacin and has to confirm in the in vivo settings as a separate investigation in future. Key words: Controlled drug delivery, In vitro drug release, Nanoparticle, Particle size, Stability studies, Surface morpholog
Dense phenotyping from electronic health records enables machine learning-based prediction of preterm birth
Effects of Low Level Laser Therapy Vs Ultrasound Therapy in the Management of Active Trapezius Trigger Points.
Effects of Low Level Laser Therapy Vs Ultrasound Therapy in the Management of Active Trapezius Trigger Points.</p
Ensuring the security and balancing the load in the cloud computing by DCRI-RI hybrid method
In the cloud environment, the confidentiality of data is improved by protecting the cloud data from unauthorized user access. During data communication, the balancing of load across cloud servers helps to maintain the cloud service's reliability. Through intrusion detection, the performance of secured data communication is enhanced in a significant way. Some techniques were developed in the field of cloud computing to provide secure communication between the cloud server and cloud user. These developed techniques failed to improve the security and load balancing efficiency simultaneously during the data transmission on a cloud. There is no sufficient algorithm in the present situation to detect the intrusions and to provide improved results in the load balancing. In this research work we propose a novel "Dynamic Certificateless Random Identity (DCRI)" algorithm for ensuring cloud security and a "Rank-Indexing (RI)" algorithm based on weightage for load balancing. Our proposed DCRI-RI hybrid method will ensure a better rate of intrusion detection with higher load balancing efficiency. The DCRI algorithm is relied on a cryptographic concept based on advanced encryption and decryption signature authentication process performed on both cloud server and user end to detect and remove the unauthorized users in a significant way. 
Mosaic patterns of selection in genomic regions associated with diverse human traits.
Natural selection shapes the genetic architecture of many human traits. However, the prevalence of different modes of selection on genomic regions associated with variation in traits remains poorly understood. To address this, we developed an efficient computational framework to calculate positive and negative enrichment of different evolutionary measures among regions associated with complex traits. We applied the framework to summary statistics from >900 genome-wide association studies (GWASs) and 11 evolutionary measures of sequence constraint, population differentiation, and allele age while accounting for linkage disequilibrium, allele frequency, and other potential confounders. We demonstrate that this framework yields consistent results across GWASs with variable sample sizes, numbers of trait-associated SNPs, and analytical approaches. The resulting evolutionary atlas maps diverse signatures of selection on genomic regions associated with complex human traits on an unprecedented scale. We detected positive enrichment for sequence conservation among trait-associated regions for the majority of traits (>77% of 290 high power GWASs), which included reproductive traits. Many traits also exhibited substantial positive enrichment for population differentiation, especially among hair, skin, and pigmentation traits. In contrast, we detected widespread negative enrichment for signatures of balancing selection (51% of GWASs) and absence of enrichment for evolutionary signals in regions associated with late-onset Alzheimer's disease. These results support a pervasive role for negative selection on regions of the human genome that contribute to variation in complex traits, but also demonstrate that diverse modes of evolution are likely to have shaped trait-associated loci. This atlas of evolutionary signatures across the diversity of available GWASs will enable exploration of the relationship between the genetic architecture and evolutionary processes in the human genome
Mosaic evolutionary architecture across 47 well-powered GWASs of human complex traits.
From our evolutionary atlas of 972 GWASs, we plot a subset of 47 GWASs (BOLT-LMM set) performed using the same approach and from the same cohort (Methods). (a) For each evolutionary measure (columns) and a given trait (row), we calculated the trait-averaged value (x-axis, stars) and compared it with the matched genomic background distribution (gray dots: mean values, gray bars: 5th, 95th percentiles). Traits are manually grouped based on type and similarity. The number of trait-associated regions is provided in parentheses. Red stars (FDRMethods). Results are shown for six evolutionary measures; see S3 Fig for all 11 evolutionary measures. (b) We calculated enrichment as described in Fig 1D and highlight four traits with distinct evolutionary profiles. Spokes represent different evolutionary measures (colored by type of associated force) and concentric rings represent levels of evolutionary enrichment. Red dashed circles represent the expected values (i.e., no enrichment).</p