5,494 research outputs found

    A New Protection for Android Applications

    Get PDF
    Today, Smartphones are very powerful, and many of its applications use wireless multimedia communications. Prevention from the external dangers (threats) has become a big concern for the experts these days. Android security has become a very important issue because of the free application it provides and the feature which make it very easy for anyone to develop and published it on Play store. Some work has already been done on the android security model, including several analyses of the model and frameworks aimed at enforcing security standards. In this article, we introduce a tool called PermisSecure that is able to perform both static and dynamic analysis on Android programs to automatically detect suspicious applications that request unnecessary or dangerous permissions

    Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Get PDF
    Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks

    The role of wisdom leadership in increasing job performance: Evidence from the Egyptian tourism sector.

    Get PDF
    Elbaz, A. M., & Haddoud, M. Y. (2017). The role of wisdom leadership in increasing job performance: Evidence from the Egyptian tourism sector. Tourism Management, 63, 66-76

    Impact des déchets hospitaliers sur la préservation de l’environnement

    Get PDF
    La protection de l’environnement est doublement vertueuse. D’une part, elle réduit le risque de maladie pour le vivant. D’autre part, elle ne dépend que de la volonté de l’organisation sociale. Pour autant, elle ne constitue pas une priorité dans la conception actuelle des systèmes, encore moins pour les pays économiquement faibles. Face au spectre du réchauffement climatique, il n’y a cependant pas d’alternative à la lutte efficiente et efficace contre la pollution pour sauvegarder un tant soit peu les conditions de vie. Dès lors, le défi à relever réside dans les modalités d’implémentation d’un changement socio-économique et surtout culturel..

    ESTIMATION DU CANAL OFDM RADIO MOBILE A FORTE MOBILITE PAR UNE INTERPOLATION POLYNOMIALE DANS LE DOMAINE TEMPOREL

    Get PDF
    Ce travail s'inscrit dans le cadre des systèmes radio mobiles basés sur la modulation multi-porteuse OFDM.  L'objectif est de proposer une technique permettant l’estimation efficace du canal dynamique pour les  récepteurs OFDM à grande mobilité. Dans cet article, nous avons développé une méthode d’estimation des variations temporelles des gains complexes pour un canal dynamique à effet Doppler. Cette méthode est basée sur les valeurs moyennes des gains complexes qui sont estimées par un estimateur LS sur K blocs OFDM consécutifs, et une interpolation polynomiale dans le domaine temporel des variations du canal. La technique présentée, se base sur le fait que la valeur moyenne d’un processus de Rayleigh est extrêmement proche de la valeur centrale d’un bloc OFDM pour les récepteurs à vitesses élevées réalistes qui peuvent atteindre 300 km/h.

    Vers une valorisation du savoir-faire local des oasis : cas du jus de dattes Tassabount au Maroc

    Full text link
    Introduction. Les oasis marocaines sont réputées pour le savoir-faire ingénieux de leurs habitants en matière de gestion et de préservation des ressources naturelles. La datte, principal produit des oasis, bénéficie amplement de cette ingéniosité qui connaît, de nos jours, une régression et un manque de valorisation. Notre étude a eu pour objectif d'archiver et d'analyser le savoir-faire de la transformation des dattes en jus, localement appelé Tassabount, et d'en proposer un mode de valorisation. Matériel et méthodes. La méthodologie employée pour le travail d'archivage et d'analyse des connaissances locales de transformation des dattes en jus a été basé sur une approche participative impliquant une centaine de femmes oasiennes de la vallée du Drâa (Maroc). Résultats et discussion. Notre étude a mis en évidence une pratique ingénieuse dans la transformation locale des dattes en jus. Ce savoirfaire, développé par les femmes oasiennes, est étroitement lié à la diversité génétique du palmier dattier (variétés et hybrides). En outre, le Tassabount est identifié comme produit prometteur à valoriser, en misant sur ses qualités organoleptiques et ses vertus thérapeutiques. Par ailleurs, la description et l'analyse du procédé familial de préparation du Tassabount ont permis d'identifier des voies possibles d'amélioration pour son élaboration et sa stabilisation en vue de son transfert à des entreprises artisanales et/ou industrielles. (Résumé d'auteur

    Ameliorative Potential of Morin in Streptozotocin-Induced Neuropathic Pain in Rats

    Get PDF
    Purpose: To investigate the protective effect of morin, a naturally occurring bioflavonoid of Moraceae family, in experimentally-induced diabetic neuropathy (DN) in rats.Methods: Diabetes was induced by a single injection (65 mg/kg, ip) of streptozotocin (STZ). Morin (15 and 30 mg/kg/day) oral treatment was started 3 weeks after diabetes induction and continued for 5 consecutive weeks. Pain threshold behavior tests were performed at the end of the treatment. In sciatic nerve, inflammatory cytokines (TNF-á, IL-1â, IL-6), nerve growth factor (NGF) and insulin growth factor (IGF-1) were determined using ELISA kits, while thiobarbituric acid reactive substances (TBARS),glutathione (GSH), superoxide dismutase (SOD) and catalase (CAT) levels were assessed.Results: Diabetic animals showed apparent decreased paw-withdrawal (39 %, p < 0.05) and tail-flick (31 %, p < 0.05) latency as compared with control group. All the measured biomarkers were altered (p < 0.05 to 0.001) in diabetic rats compared with control non-diabetic animals. Morin treatment attenuated hyperalgesia and analgesia (p < 0.05) respectively. Morin treatment of diabetic rats at both doses significantly decreased the levels of cytokines (p < 0.01), glucose (p < 0.01) and TBARS (p < 0.001), but increased NGF (p < 0.01), IGF-1 (p < 0.01) and GSH (p < 0.01) levels in sciatic nerves compared to untreated diabetic animals. Inhibited activities (U/mg protein) of SOD (1.08 ± 0.16) and CAT (2.77 ± 0.36) in sciatic nerve of diabetic rats also found corrections (2.09 ± 0.11, p < 0.01) and (4.53 ± 0.57, p < 0.01) after morin (30 mg/kg/day) treatment, compared with untreated diabetic animals.Conclusion: These findings demonstrate the protective effect of morin mediated through reduction of oxidative stress and inflammatory process, and suggest the therapeutic potential of morin in the attenuation of diabetic neuropathy.Keywords: Morin, Diabetes, Neuropathy pain, Oxidative stress, Anti-inflammator

    Visual and light detection and ranging-based simultaneous localization and mapping for self-driving cars

    Get PDF
    In recent years, there has been a strong demand for self-driving cars. For safe navigation, self-driving cars need both precise localization and robust mapping. While global navigation satellite system (GNSS) can be used to locate vehicles, it has some limitations, such as satellite signal absence (tunnels and caves), which restrict its use in urban scenarios. Simultaneous localization and mapping (SLAM) are an excellent solution for identifying a vehicle’s position while at the same time constructing a representation of the environment. SLAM-based visual and light detection and ranging (LIDAR) refer to using cameras and LIDAR as source of external information. This paper presents an implementation of SLAM algorithm for building a map of environment and obtaining car’s trajectory using LIDAR scans. A detailed overview of current visual and LIDAR SLAM approaches has also been provided and discussed. Simulation results referred to LIDAR scans indicate that SLAM is convenient and helpful in localization and mapping

    6-Hydr­oxy-7-isopropyl-1,1,4a-trimethyl-2,3,4,4a,10,10a-hexa­hydro­phenanthren-9(1H)-one

    Get PDF
    The title compound, C20H28O2, commonly named Sugiol, is a natural oxygenated diterpene that we have isolated for the first time from a hexane extract of the fruits of Juniperus Oxycedrus L. Its X-ray crystal structure determination confirms an abietane skeleton which was predicted by spectroscopic analysis, mainly by 1H and 13C NMR. The cyclo­hexane ring adopts a flattened chair conformation, while the cyclo­hexene ring adopts an envelope conformation. The mol­ecules are linked through O—H⋯O hydrogen bonds to form a zigzag chain extending parallel to the c axis

    Efficient Method Based on Blockchain Ensuring Data Integrity Auditing with Deduplication in Cloud

    Get PDF
    With the rapid development of cloud storage, more and more cloud clients can store and access their data anytime, from anywhere and using any device. Data deduplication may be considered an excellent choice to ensure data storage efficiency. Although cloud technology offers many advantages for storage service, it also introduces security challenges, especially with regards to data integrity, which is one of the most critical elements in any system. A data owner should thus enable data integrity auditing mechanisms. Much research has recently been undertaken to deal with these issues. In this paper, we propose a novel blockchain-based method, which can preserve cloud data integrity checking with data deduplication. In our method, a mediator performs data deduplication on the client side, which permits a reduction in the amount of outsourced data and a decrease in the computation time and the bandwidth used between the enterprise and the cloud service provider. This method supports private and public auditability. Our method also ensures the confidentiality of a client's data against auditors during the auditing process
    • …
    corecore