31 research outputs found

    Comparison of Various Peak To Average Power Reduction Techniques

    Get PDF
    In this paper we study various peak to average power reduction techniques and find the advantages and disadvantages of these techniques.The main disadvantage is high PAPR in transmission for high-speed transmission due to its spectrum efficiency and channel robustness. OFDM signals are mostly responsible for the problem of PAPR Keywords: High power amplifier (HPA), peak-to-average power ratio (PAPR

    SECURING USER INTERACTION CHANNELS ON MOBILE PLATFORM USING ARM TRUSTZONE

    Get PDF
    Smartphones have become an essential part of our lives, and are used daily forimportant tasks like banking, shopping, and making phone calls. Smartphones provide several interaction channels which can be affected by a compromised mobile OS. This dissertation focuses on the user interaction channels of UI input and audio I/O. The security of the software running on smartphones has become more critical because of widespread smartphone usage. A technology called TEE (Trusted Execution Environment) has been introduced to help protect users in the event of OS compromise, with the most commonly deployed TEE on mobile devices being ARM TrustZone. This dissertation utilizes ARM TrustZone to provide secure design for user interactionchannels of UI input (called Truz-UI) and Audio I/O for VoIP calls (called Truz-Call). The primary goal is to ensure that the design is transparent to mobile applications. During research based on TEE, one of the important challenges that is encountered is the ability to prototype a secure design. In TEE research one often needs to interface hardware peripherals with the TEE OS, which can be challenging for non-hardware experts, depending on the available support from the TEE OS vendor. This dissertation discusses a simulation based approach (called Truz-Sim) that reduces setup time and hardware experience required to build a hardware environment for TEE prototyping

    Analysis of mobile phone dependance and physical activity level among school students

    Get PDF
    With the proliferation of mobile phones among the youth, concerns have emerged regarding potential impacts on both mental and physical well-being. Therefore, this research paper investigates the association between mobile phone dependence and physical activity (PA) levels among school students. The study employed a cross-sectional research design, collecting data through surveys from 330 samples studying in 11th and 12th standards in public school. The level of physical activity was assessed by the short version of the International Physical Activity Questionnaire (IPAQ) and level of mobile phone dependence was analyzed by Test for Mobile Phone Dependence (TMD) questionnaire. The results categorized the participants based on their observed PA levels, with percentages for low (28.19%), moderate (42.73%), and high (29.10%) PA. The results also indicated an association between PA levels and mobile phone dependence, with high PA students demonstrating low dependency, moderate PA students displaying medium dependency, and low PA students exhibiting high dependency. In conclusion, mobile dependency alters the engagement in PA, as individuals increasingly prioritize screen time over active pursuits

    Remote Access Tool Using Metasploit

    Get PDF
    A Remote Access Trojan (otherwise known as a RAT) is a piece of software designed to provide full access to a remote client. Capabilities of such a software often include: keystroke logging, file system access and remote control of the client with all the peripheral devices it is connected to, such as microphones and webcams. RATs are designed as legitimate administrative tools, yet due to their extensive capabilities are often seen used with malicious intent. The most common means of infection is through email attachments. The server is cleverly disguised as a significant software and positioned in peer-to-peer file sharing networks, or unauthorized download websites. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users. In this paper, our objective is to demonstrate how we can create our own RAT software/Trojan followed by a detailed explanation of the construction, deployment and working of the RAT software. The biggest advantage about creating your own RAT is that it is fully undetectable and you can add whichever features you desire

    TETRACYCLINE: A USEFUL CLASS OF ANTIBIOTICS FOR SUCCESSFUL ENDODONTICS

    Get PDF
    Antibiotics have been used frequently in treatment of odontogenic infections. However in endodontic diseases, the source of infection is rarely eliminated by the use of antimicrobial drugs alone. The mainstay of treating pulpal and periapical infections remains the cleaning and debridement of root canal system. Topical antibacterial agents can be used as an adjunct in the form of an irrigant or intracanal medicament during endodontic therapy. Most often employed antibiotic in endodontics is tetracycline class of drugs. Research has shown that tetracycline agents have various beneficial properties apart from bacteriostatic action, including antiresorptive activity, ability to remove smear layer from canal surface after cleaning and shaping. They also show the property of substantivity which prolongs their effect by allowing slow gradual release over time. Therefore, the present paper aims to outline the possible applications of tetracycline drugs in endodontics

    HIV seropositivity in high risk individuals and in pulmonary tuberculosis

    Get PDF
    Background: The association between tuberculosis and HIV has been well known. South Asia especially India is witnessing largest number of new AIDS cases and the epidemic is well established. TB shortens the life expectancy of HIV positive people. Keeping the association between TB and HIV in mind, this study was planned to screen HIV seropositivity in all patients of pulmonary and extra pulmonary tuberculosis. The aim was to study HIV seroprevalence in patients of pulmonary tuberculosis and extrapulmonary tuberculosis of population of Bundelkhand region, India.Methods: 282 patients of pulmonary or extrapulmonary tuberculosis attending OPD or admitted in wards were included in the study as per inclusion criteria over two years.  ELISA was done to detect HIV seropositivity in these patients.Results: A total of 184 patients were male and 98 were female with 16 and 2 patients who were seropositive respectively. Out of 282 patients of pulmonary and extra pulmonary tuberculosis 35 (12.4%) had heterosexual promiscuity. Out of these 15 (42.35%) were HIV seropositive. A total of 115 patients were sputum smear positive for TB and 167 were confirmed as cases of sputum smear negative TB.Conclusions: The prevalence of HIV seropositivity among pulmonary and extra pulmonary TB in the present study was 6.38%. Tuberculosis was associated with an increased incidence of HIV. HIV was associated most with heterosexual promiscuity as a risk factor and presented more with extra pulmonary tuberculosis.

    In vitro evaluation of efficacy of different rotary instrument systems for gutta percha removal during root canal retreatment

    Get PDF
    Background: Complete removal of old filling material during root canal retreatment is fundamental for predictable cleaning and shaping of canal anatomy. Most of the retreatment methods tested in earlier studies have shown inability to achieve complete removal of root canal filling. Therefore the aim of this investigation was to assess the efficacy of three different rotary nickel titanium retreatment systems and Hedstrom files in removing filling material from root canals. Material and Methods: Sixty extracted mandibular premolars were decoronated to leave 15 mm root. Specimen were hand instrumented and obturated using gutta percha and AH plus root canal sealer. After storage period of two weeks, roots were retreated with three (Protaper retreatment files, Mtwo retreatment files, NRT GPR) rotary retreatment instrument systems and Hedstroem files. Subsequently, samples were sectioned longitudinally and examined under stereomicroscope. Digital images were recorded and evaluated using Digital Image Analysing Software. The retreatment time was recorded for each tooth using a stopwatch. The area of canal and the residual filling material was recorded in mm 2 and the percentage of remaining filling material on canal walls was calculated. Data was analysed using ANOVA test. Results: Significantly less amount of residual filling material was present in protaper and Mtwo instrumented teeth ( p < 0.05) compared to NRT GPR and Hedstrom files group. Protaper instruments also required lesser time during removal of filling material followed by Mtwo instruments, NRT GPR files and Hedstrom files. Conclusions: None of the instruments were able to remove the filling material completely from root canal. Protaper universal retreatment system and Mtwo retreatment files were more efficient and faster compared to NRT GPR fles and Hedstrom files

    A Systematic Security Evaluation of Android's Multi-User Framework

    Get PDF
    Like many desktop operating systems in the 1990s, Android is now in the process of including support for multi-user scenarios. Because these scenarios introduce new threats to the system, we should have an understanding of how well the system design addresses them. Since the security implications of multi-user support are truly pervasive, we developed a systematic approach to studying the system and identifying problems. Unlike other approaches that focus on specific attacks or threat models, ours systematically identifies critical places where access controls are not present or do not properly identify the subject and object of a decision. Finding these places gives us insight into hypothetical attacks that could result, and allows us to design specific experiments to test our hypothesis. Following an overview of the new features and their implementation, we describe our methodology, present a partial list of our most interesting hypotheses, and describe the experiments we used to test them. Our findings indicate that the current system only partially addresses the new threats, leaving the door open to a number of significant vulnerabilities and privacy issues. Our findings span a spectrum of root causes, from simple oversights, all the way to major system design problems. We conclude that there is still a long way to go before the system can be used in anything more than the most casual of sharing environments.Comment: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (http://arxiv.org/abs/1410.6674
    corecore