71 research outputs found

    Heuristic Optimization Algorithm with Ensemble Learning Model for Intelligent Intrusion Detection and Classification

    Get PDF
    Intrusion Detection (ID) for network security prevents and detects malicious behaviours or unauthorized activities that occurs in the network. An ID System (IDS) refers to a safety tool that monitors events or network traffic for responding to and identifying illegal access attempts or malevolent activities. IDS had a vital role in network security by finding and alerting security teams or administrators about security breaches or potential intrusions. Machine Learning (ML) methods are utilized for ID by training methods for recognizing behaviours and patterns linked with intrusions. Deep Learning (DL) methods are implemented to learn complicated representations and patterns in network data. DL methods have witnessed promising outcomes in identifying network intrusions by automatically learning discriminatory features from raw network traffic. This article presents a new Teaching and Learning based Optimization with Ensemble Learning Model for Intelligent Intrusion Detection and Classification (TLBOEL-IDC) technique. The presented TLBOEL-IDC method mainly detects and classifies the intrusions in the network. To attain this, the TLBOEL-IDC method primarily preprocesses the input networking data. Besides, the TLBOEL-IDC technique involves the design of an ensemble classifier by the integration of three DL models called Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), and Bidirectional LSTM (BLSTM). Moreover, the hyperparameter tuning of the DL models takes place using the TLBO approach that improves the overall ID outputs. The simulation assessment of the TLBOEL-IDC approach takes place on a benchmark dataset and the outputs are measured under various factors. The comparative evaluation emphasized the best accomplishment of the TLBOEL-IDC technique over other present models by means of diverse metrics

    A Survey on Secret Key Extraction Using Received Signal Strength in Wireless Networks

    Get PDF
    Secure wireless communications typically rely on secret keys, which are difficult to establish in an ad hoc network without a key management infrastructure. The channel reciprocity and spatial decorrelation properties can be used to extract secret key, especially in a Rayleigh fading channel. But the intervention of intermediate objects between the communication nodes reduces the strength of the secret key generated through such methods. Furthermore, the impact of small fluctuations also reduces the bit matching rate of such key agreement methods. This paper is based on the survey conducted on secret key generation from Received Signal Strength (RSS). By consider ing uniqueness property of RSS as base, various authors have proposed different methods for secret key extraction. Due to use of RSS for key extraction the existing systems suffer from predictable filter response at random period. The existing system also faces signal fading and drop in RSS because of intermediate object. By this survey we specify that even after generating high entropy bits for key extraction, there are considerable drawbacks in extracted key du e to intervention of intermediate objects and remarkable fading and drop in RSS

    Mechanical and fractured surface characterization of epoxy/red mud/fly ash/aluminium powder filled hybrid composites for automotive applications

    Get PDF
    In recent decades, one can observe a great increase in the replacement of traditional materials with polymer composites in high-strength and lightweight applications. High fuel consumption by automobile and aerospace vehicles built from legacy alloys has been a great challenge to material engineers. This has called for researches into lighter material development of the same or even superior mechanical properties to the existing materials in this area of applications. In the present study, epoxy based simple and hybrid composites were prepared with the incorporation of industrial waste as fillers at different weight percentages. Effect of filler type, combination and its concentration on mechanical properties such as tensile, impact and flexural strength were investigated. SEM analysis was carried out for fractured surfaces of composites, wherein minor voids, crack initiations and filler pullouts were seen indicating the necessity of coupling agent addition for still better performance. Among hybrid composites, epoxy/fly ash/red mud/aluminium powder (91/6/1.5/1.5 wt%) has showed the highest ultimate tensile modulus, flexural strength and hardness value compared to other composites under study

    Oligonucleotide Based Magnetic Bead Capture of Onchocerca volvulus DNA for PCR Pool Screening of Vector Black Flies

    Get PDF
    The absence of infective larvae of Onchocerca volvulus in the black fly vector of this parasite is a major criterion used to certify that transmission has been eliminated in a focus. This process requires screening large numbers of flies. Currently, this is accomplished by screening pools of flies using a PCR-based assay. The number of flies that may be included in each pool is currently limited by the DNA purification process to 50 flies for Latin American vectors and 100 flies for African vectors. Here, we describe a new method for DNA purification that relies upon a specific oligonucleotide to capture and immobilize the parasite DNA on a magnetic bead. This method permits the reliable detection of a single infective larva of O. volvulus in pools containing up to 200 individual flies. The method described here will dramatically improve the efficiency of pool screening of vector black flies, making the process of elimination certification easier and less expensive to implement

    Biotechnological Perspective of Reactive Oxygen Species (ROS)-Mediated Stress Tolerance in Plants

    Get PDF
    All environmental cues lead to develop secondary stress conditions like osmotic and oxidative stress conditions that reduces average crop yields by more than 50% every year. The univalent reduction of molecular oxygen (O2) in metabolic reactions consequently produces superoxide anions (O2•−) and other reactive oxygen species (ROS) ubiquitously in all compartments of the cell that disturbs redox potential and causes threat to cellular organelles. The production of ROS further increases under stress conditions and especially in combination with high light intensity. Plants have evolved different strategies to minimize the accumulation of excess ROS like avoidance mechanisms such as physiological adaptation, efficient photosystems such as C4 or CAM metabolism and scavenging mechanisms through production of antioxidants and antioxidative enzymes. Ascorbate-glutathione pathway plays an important role in detoxifying excess ROS in plant cells, which includes superoxide dismutase (SOD) and ascorbate peroxidase (APX) in detoxifying O2•−radical and hydrogen peroxide (H2O2) respectively, monodehydroascorbate reductase (MDHAR), dehydroascorbate reductase (DHAR) and glutathione reductase (GR) involved in recycling of reduced substrates such as ascorbate and glutathione. Efficient ROS management is one of the strategies used by tolerant plants to survive and perform cellular activities under stress conditions. The present chapter describes different sites of ROS generation and and their consequences under abiotic stress conditions and also described the approaches to overcome oxidative stress through genomics and genetic engineering

    User satisfaction on library resources and services in law college libraries in Mysore, Karnataka

    No full text
    The present study aims to assess the user satisfactionon library resources and services in law college libraries in Mysore in Karnataka. The investigator has distributed 200 questionnaires to the users, out of which 160 (80%) questionnaires were received back. The findings of the study shows that, 146 (91.25%) respondents visited law college libraries for borrowing library books and to read materials in their specific subjectsand they opined that ‘arrangement of text books’ as impressive. In terms of news paper clippings service, majority (91 ; 56.88%) of respondents are satisfied. The study suggested that law college libraries should carry out user studies at regular intervals in their colleges in order to identify and search the required information

    An Open Label Pre and Post Test Clinical Evaluation of Efficacy of Tila Taila Abhyanga and Massage of Yoni in Cystocele with Special Reference to Chyuta Avastha of Vasti

    No full text
    Prolapse or downward displacement of pelvic organs especially vagina, uterus and rectum is a common and disabling condition among women of menopausal age group. It affects their quality of life also. Displacement of vaginal anterior compartment results in cystocele. Quoting Acharya Susruta reference, the aim of this study is to find the efficacy of Tila taila yoni Abhyaṅga in Cyuta avastha of Vasti with respect to first degree cystocele. 30 subjects were selected satisfying inclusion and exclusion criterias with the approval of Institutional ethical committee. Clinical evaluation is done with the help of relevant subjective and objective parameters. The subjective parameters were assessed before and after the treatment for a period of one month with UDI questionnaire and objective parameter with Baden-Walker system of grading Pelvic Organ Prolapse. Three months follow-up evaluation was also done with same parameters. The Wilcoxon Signed Rank Test is used to statically decompose the clinical data. Subjective parameters showed improvement of the condition viz frequency and urgency of urination, urine leakage with and without any activity, cough, sneeze, small amount of urine leakage, difficult and incomplete bladder emptying, bulging in vagina However, leakage not related to urgency, lower abdominal pressure, painful urination and lower abdomen or genital area, pelvic area heaviness or dullness, pelvic discomfort and burning micturition showed only a little reduction with the treatment. Objective parameter is also highly statistically significant at p value < 0.001
    corecore