298 research outputs found
KARYOMORPHOLOGY OF THE PHILIPPINE ROCK GOBY, Glossogobius giuris (GOBIIDAE) FROM LAKE TAAL AND SOME RIVERS OF CAVITE, LUZON ISLAND
The karyomorphology of Glossogobius giuris (Gobiidae) obtained from Lake Taal and some rivers of Cavite in Luzon Island, Philippines was described. Metaphase chromosome analysis (colchicine-sodium citrate-Carnoy's fixation-Giemsa staining procedures) of the hematopoitetic cells in the anterior kidneys revealed that the diploid chromosome number was 2n=46 (46A). Fundamental Number (FN) is also 46, since all chromosomal morphology were acrocentrics without any distinguishable heteromorphic pair of chromosomes in the metaphase spreads from both dry and wet preparations. This study confirms previous reports on the chromosomal sets of G. giuris from India. Keywords : Philippines / Lake Taal / Genetics / Karyomorphology / Glossogobius giuri
Propuesta de un sistema de costos estándar para mejorar la rentabilidad de la empresa Estructuras Industriales EGA S. A. - Lima 2016
Estructura Industriales EGA S.A, es una empresa del sector metalmecánico, muy
competitivo en el mercado. La información de costos que se maneja está lejos de la realidad del
negocio, tanto que carece de un adecuado control de los recursos utilizados en el proceso
productivo. Por ello, se propone implementar un sistema de costos estándar cuyo fin es mejorar la
determinación del costo de producción, lo cual el objetivo principal de esta tesis es demostrar que
mediante la propuesta de un sistema de costeo estándar mejorará la rentabilidad de la empresa.Industrial Structure EGA S. A, is a company in the metalworking sector, very competitive in
the market. The information of costs that is handled is far from the reality of the business, so much
that it lacks an adequate control of the resources used in the productive process. Therefore, it is
proposed to implement a standard cost system whose purpose is to improve the determination of
the cost of production, which the main objective of this thesis is to demonstrate that by proposing a
standard costing system will improve the profitability of the compan
Karyomorphology of the Philippine Rock Goby, Glossogobius Giuris (Gobiidae) From Lake Taal and Some Rivers of Cavite, Luzon Island
The karyomorphology of Glossogobius giuris (Gobiidae) obtained from Lake Taal and some rivers of Cavite in Luzon Island, Philippines was described. Metaphase chromosome analysis (colchicine-sodium citrate-Carnoy's fixation-Giemsa staining procedures) of the hematopoitetic cells in the anterior kidneys revealed that the diploid chromosome number was 2n=46 (46A). Fundamental Number (FN) is also 46, since all chromosomal morphology were acrocentrics without any distinguishable heteromorphic pair of chromosomes in the metaphase spreads from both dry and wet preparations. This study confirms previous reports on the chromosomal sets of G. giuris from India
Adherence to Medications among Type 2 Diabetes Mellitus Patients in Three Districts of Al Dakhliyah Governorate, Oman : A cross-sectional pilot study
Objectives: This pilot study aimed to assess the medication adherence of type 2 diabetes mellitus (T2DM) patients in three wilayats(districts) of the Al Dakhliyah governorate, Oman, and to identify the probable reasons for medication non-adherence. Methods: A cross-sectional questionnaire-based pilot survey was conducted among T2DM Omani patients between February and June 2012 to assess their medication adherence and the relationship between their socio-demographic characteristics and adherence levels. Results: A total of 158 patients participated in the survey. The majority of the participants were unemployed or were housewives (66.5%). Forgetfulness was the most frequent reason for medication non-adherence (36.4%). Participants demonstrated an excellent level of adherence to their medicines (median total score = 3). No significant difference in median total adherence scores was observed based on the evaluated parameters. Conclusion: The medication adherence of T2DM patients in the area under study was good. A larger study in a wider population is warranted to obtain a more representative picture of this important factor which contributes to public health
Four Neighbourhood Cellular Automata as Better Cryptographic Primitives
Three-neighbourhood Cellular Automata (CA) are widely studied and accepted as suitable cryptographic primitive. Rule 30, a 3-neighbourhood CA rule, was proposed as an ideal candidate for cryptographic primitive by Wolfram. However, rule 30 was shown to be weak against Meier-Staffelbach attack. The cryptographic properties like diffusion and randomness increase with increase in neighbourhood radius and thus opens the avenue of exploring the cryptographic properties of 4-neighbourhood CA. This work explores whether four-neighbourhood CA can be a better cryptographic primitive. We construct a class of cryptographically suitable 4-neighbourhood nonlinear CA rules that resembles rule 30. One 4-neighbourhood nonlinear CA from this selected class is shown to be resistant against Meier-Staffelbach attack on rule 30, justifying the applicability of 4-neighbourhood CA as better cryptographic primitives
Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems
IoT systems are vulnerable to various cyber attacks as they form a subset of the In-
ternet. Insider attacks find more significance since many devices are configured to access the
Internet without intrusion detection systems or firewalls in place. The current work focuses on
three insider attacks, namely, blackhole attack, sinkhole attack and wormhole attack. A distrib -
uted trust based intrusion detection system is proposed to detect these attacks. The trust scores
are compared with those existing in immutable distributed ledger and used to arrive at a deci-
sion to include or exclude a node
TN-IDS for Network Layer Attacks in RPL based IoT Systems
Routing protocol for Low power and lossy network (RPL) is a standardized optimal protocol
for routing in Internet of Things (IoT). The constrained wireless sensor network in IoT is
characterized by lack of processing speed, low power and low memory. Sometimes various
network attacks enabling the RPL network affect the network performance dismally. This leads
to drastic variation in energy consumption at nodes and disturb the RPL network protocol
structure. This leads to reduced processing speed and memory allocation in the network. We
first illustrate the attacks and their impact in RPL network by simulation. To detect such
attacks, we propose an Intrusion Detection System (IDS) scheme for RPL network based on
trust computation. Trust based Neighbor notification IDS (TN-IDS) is a secure hierarchical
distribution system which monitors the network intrusion and checks the performance of the
network. The new TN-IDS system will track all nodes in the network and identify the malicious
nodes. The activity list prepared by IDS indicates them to a sink node. This is achieved by
introducing a distributed leader election algorithm to collect metrics related to the RPL network.
Hence, the performance metrics of the RPL network together with TN-IDS module can identify
the malicious node and isolate them
Phase-shift Fault Analysis of Grain-128
Phase-shift fault attack is a type of fault attack used for cryptanalysis of stream ciphers. It involves clocking a cipher’s feedback shift registers out of phase, in order to generate faulted keystream. Grain-128 cipher is a 128-bit modification of the Grain cipher which is one of the finalists in the eSTREAM project. In this work, we propose a phase-shift fault attack against Grain-128 loaded with key-IV pairs that result in an all-zero LFSR after initialisation. We frame equations in terms of the input and output bits of the cipher and solve them using a SAT solver. By correctly guessing 40 innerstate bits, we are able to recover the entire 128-bit key with just 2 phase-shift faults for keystreams of length 200 bits
- …