445 research outputs found

    Improved detection of Probe Request Attacks : Using Neural Networks and Genetic Algorithm

    Get PDF
    The Media Access Control (MAC) layer of the wireless protocol, Institute of Electrical and Electronics Engineers (IEEE) 802.11, is based on the exchange of request and response messages. Probe Request Flooding Attacks (PRFA) are devised based on this design flaw to reduce network performance or prevent legitimate users from accessing network resources. The vulnerability is amplified due to clear beacon, probe request and probe response frames. The research is to detect PRFA of Wireless Local Area Networks (WLAN) using a Supervised Feedforward Neural Network (NN). The NN converged outstandingly with train, valid, test sample percentages 70, 15, 15 and hidden neurons 20. The effectiveness of an Intruder Detection System depends on its prediction accuracy. This paper presents optimisation of the NN using Genetic Algorithms (GA). GAs sought to maximise the performance of the model based on Linear Regression (R) and generated R > 0.95. Novelty of this research lies in the fact that the NN accepts user and attacker training data captured separately. Hence, security administrators do not have to perform the painstaking task of manually identifying individual frames for labelling prior training. The GA provides a reliable NN model and recognises the behaviour of the NN for diverse configurations

    Recognition of Interaction Interface Residues in Low-Resolution Structures of Protein Assemblies Solely from the Positions of Cα Atoms

    Get PDF
    Background: The number of available structures of large multi-protein assemblies is quite small. Such structures provide phenomenal insights on the organization, mechanism of formation and functional properties of the assembly. Hence detailed analysis of such structures is highly rewarding. However, the common problem in such analyses is the low resolution of these structures. In the recent times a number of attempts that combine low resolution cryo-EM data with higher resolution structures determined using X-ray analysis or NMR or generated using comparative modeling have been reported. Even in such attempts the best result one arrives at is the very course idea about the assembly structure in terms of trace of the C alpha atoms which are modeled with modest accuracy. Methodology/Principal Findings: In this paper first we present an objective approach to identify potentially solvent exposed and buried residues solely from the position of C alpha atoms and amino acid sequence using residue type-dependent thresholds for accessible surface areas of C alpha. We extend the method further to recognize potential protein-protein interface residues. Conclusion/Significance: Our approach to identify buried and exposed residues solely from the positions of C alpha atoms resulted in an accuracy of 84%, sensitivity of 83-89% and specificity of 67-94% while recognition of interfacial residues corresponded to an accuracy of 94%, sensitivity of 70-96% and specificity of 58-94%. Interestingly, detailed analysis of cases of mismatch between recognition of interface residues from C alpha positions and all-atom models suggested that, recognition of interfacial residues using C alpha atoms only correspond better with intuitive notion of what is an interfacial residue. Our method should be useful in the objective analysis of structures of protein assemblies when positions of only C alpha positions are available as, for example, in the cases of integration of cryo-EM data and high resolution structures of the components of the assembly

    DEVELOPMENT OF A PROLONGD RELEASE GASTRORETENTIVE TABLET FORMULATION OF LEVOFLOXACIN

    Get PDF
    Objective: The present investigation concerns the design and evaluation of floating tablets of Levofloxacin, which after oral administration prolong the gastric residence time and increased drug bioavailability. Methods: Levofloxacin is a synthetic chemotherapeutic agent used to treat severe or life-threatening bacterial infections. The present work was designed to formulate floating tablet of Levofloxacin with various swelling agents. Formulations were prepared using various concentrations of Guar gum, Carbopol, hydroxy propyl methyl cellulose and Ethyl Cellulose by direct compression technique. The selected batches were evaluated for various parameters like weight variation, thickness, diameter, friability, floating lag time, duration of floating, swelling index, content uniformity and in-vitro drug release. The data obtained from the in-vitro dissolution studies of optimized batch F7 were fitted in different models. Results: The optimized formulation F7 showed 99.25% drug content, floating lag time of 10 min and swelling index of 40%. Drug release mechanism was found to be zero order along with higuchi release kinetics exhibiting diffusion along with dissolution of the drug from the tablet by non fickian mechanism. Conclusion: Levofloxacin floating tablets exhibited increased gastric residence time, there by improved bioavailability and therapeutic effect of the drug. Keywords: Levofloxacin, Gastro retentive, Guar gum, Hydroxy propyl methyl cellulose, Ethyl Cellulose, Carbopol

    Survey paper comparing ECC with RSA, AES and Blowfish Algorithms

    Get PDF
    Data Security is primary concern for every communication system. There exist many frauds in real time through online in each and every aspect, in order to overcome those frauds which means to keep one?s images and personal information secure, there should be some security algorithms which helps in reducing the frauds. In general, there are many encryption algorithms that can be used to reduce the real time frauds. These encryption algorithms can be classified into two types. One is symmetric encryption and the other one is asymmetric encryption. Symmetric encryption algorithms are used earlier for the purpose of providing security such as AES and Blowfish algorithms. In AES algorithm, the processing time is more and requires more rounds of communication when compared to the remaining algorithms and it is not highly secured. In case of blow fish algorithm, uses a lot of memory and has a relatively long key setup time and it was only designed for software. In order to provide more security the asymmetric algorithms are used such as RSA algorithm and Elliptic Curve Cryptography (ECC) algorithm. When compared to ECC, RSA algorithms is little slow and uses larger key or message in size. So, now the most efficient ECC algorithm came into the picture in order to provide high security over the existing credit frauds. This proves the efficiency and the less memory usage after the implementation of elliptic curve cryptography

    Educational Introspections of Medical Students Post Disability Competencies Training: A Qualitative Study

    Get PDF
    Background: Despite the substantial presence of persons with disabilities (PWD) in the population, they face many barriers in healthcare. Competency-Based Medical Education (CBME) is increasingly used to address these gaps. Aims and Objective: This study assesses the impact of disability competencies training on medical students' attitudes towards PWD. It aims to explore new perspectives, identify attitudinal shifts, evaluate training effectiveness, and promote solution-oriented learning. Materials and Methods: Five Focus Group Discussions (FGD) with 8 participants each, a series of themes related to the understanding of disability and empathy were explored. The participants, who had undergone training in disability competencies. The FGDs were facilitated by trained moderators and analysed employing thematic analysis and generating tree maps. Results: Key themes evolved from the students' new perspectives towards PWD, which included Inclusion and Responsibility, Empathy and Understanding, Managing patients with disabilities, Equity and rights, and Acceptance. Themes also emerged regarding the impact of training, revealing an Attitudinal Shift, Engagement and Interaction, Personal Impact, and Solution-Oriented Learning. Conclusion: Disability competency training significantly transforms medical students' attitudes, fostering a more inclusive, empathetic approach in healthcare. This shift is crucial for integrating disability competencies into medical education, especially in developing countrie

    Donor demographic and laboratory predictors of single donor platelet yield

    Get PDF
    Background: Platelet transfusions are essential to prevent morbidity and mortality in patients who are severely thrombocytopenic and are at risk of spontaneous bleeding. Platelets are currently obtained either by fractionation of whole blood or by platelet apheresis. The quality of single donor platelets (SDP) in terms of yield influences platelet recovery in the recipient and allows prolonging intervals between transfusions. Material and Methods: Donor demographic and laboratory data were analyzed prior to performing plateletpheresis to identify donor factors that influence platelet yield. The study was conducted on 130 healthy, first-time plateletpheresis donors over a period of 4 years. The plateletpheresis procedures were performed using Fresenius Kabi COM.TEC and Hemonetics MCS plus separator. A relationship between pre-donation donor variables and yield of platelets was studied using the Pearson correlation. Results: The mean platelet yield was 3.160.62x1011 per unit. A positive correlation was observed between platelet yield and pre-donation platelet count, body mass index (BMI; Kg/m2) of the donor, while a negative correlation was observed between age and the platelet yield. Conclusion: Donor pre-donation platelet count, BMI and donor age influence platelet yield. Young healthy donors with a high platelet count and better BMI can give a better platelet yield in the SDP

    Age-Based Differences in Care Setting Transitions over the Last Year of Life

    Get PDF
    Context. Little is known about the number and types of moves made in the last year of life to obtain healthcare and end-of-life support, with older adults more vulnerable to care setting transition issues. Research Objective. Compare care setting transitions across older (65+ years) and younger individuals. Design. Secondary analyses of provincial hospital and ambulatory database data. Every individual who lived in the province for one year prior to death from April 1, 2005 through March 31, 2007 was retained (N = 19, 397). Results. Transitions averaged 3.5, with 3.9 and 3.4 for younger and older persons, respectively. Older persons also had fewer ER and ambulatory visits, fewer procedures performed in the last year of life, but longer inpatient stays (42.7 days versus 36.2 for younger persons). Conclusion. Younger and older persons differ somewhat in the number and type of end-of-life care setting transitions, a matter for continuing research and healthcare policy

    Using post-measurement information in state discrimination

    Get PDF
    We consider a special form of state discrimination in which after the measurement we are given additional information that may help us identify the state. This task plays a central role in the analysis of quantum cryptographic protocols in the noisy-storage model, where the identity of the state corresponds to a certain bit string, and the additional information is typically a choice of encoding that is initially unknown to the cheating party. We first provide simple optimality conditions for measurements for any such problem, and show upper and lower bounds on the success probability. For a certain class of problems, we furthermore provide tight bounds on how useful post-measurement information can be. In particular, we show that for this class finding the optimal measurement for the task of state discrimination with post-measurement information does in fact reduce to solving a different problem of state discrimination without such information. However, we show that for the corresponding classical state discrimination problems with post-measurement information such a reduction is impossible, by relating the success probability to the violation of Bell inequalities. This suggests the usefulness of post-measurement information as another feature that distinguishes the classical from a quantum world.Comment: 10 pages, 4 figures, revtex, v2: published version, minor change
    corecore