643 research outputs found

    A Survey: Data Leakage Detection Techniques

    Get PDF
    Data is an important property of various organizations and it is intellectual property of organization. Every organization includes sensitive data as customer information, financial data, data of patient, personal credit card data and other information based on the kinds of management, institute or industry. For the areas like this, leakage of information is the crucial problem that the organization has to face, that poses high cost if information leakage is done. All the more definitely, information leakage is characterize as the intentional exposure of individual or any sort of information to unapproved outsiders. When the important information is goes to unapproved hands or moves towards unauthorized destination. This will prompts the direct and indirect loss of particular industry in terms of cost and time. The information leakage is outcomes in vulnerability or its modification. So information can be protected by the outsider leakages. To solve this issue there must be an efficient and effective system to avoid and protect authorized information. From not so long many methods have been implemented to solve same type of problems that are analyzed here in this survey.  This paper analyzes little latest techniques and proposed novel Sampling algorithm based data leakage detection techniques

    Ethnomedicinal Observations Among the Bheel and Bhilal Tribe of Jhabua District, Madhya Pradesh, India

    Get PDF
    The paper highlights uses of 15 ethnomedicinal plants traditionally utilized by the Bheel and Bhilala tribes of Jhabua district. The plant species are used as herbal medicines for treatment of various ailments and healthcare

    Permission based Mobile Malware Detection System using Machine Learning Techniques

    Get PDF
    Mobile technology has grown dramatically around the world. Nowadays smart mobile devices are ubiquitous, i.e. they serve multiple purposes such as personal mobile communication, data storage, multimedia and entertainment etc. They have become important part of life. Implementing secure mobile and wireless networks is crucial for enterprises operating in the Internet-based business environment. Mobile market share has grown significantly in past few years so that we need to think about mobile security. Mobile security can be compromised due to design flaws, vulnerabilities, and protocol failures in any mobile applications, viruses, spyware, malware and other threats. In this paper we will more focus on mobile malware. Many tools are available in the market to detect malware but new research trend in the mobile security is users should be aware of app before he/she installs from the app store. Hence we propose a novel approach for permission based mobile malware detection system. It is based on static analysis. It has 3 major parts in it 1) a signature database for storing analysis results of training and testing. 2) An Android client who is used by end users for making analysis requests, and 3) a central server plays important role as it communicates with both signature database and smartphone client. We can say that he is the manager of whole analysis process. It alerts user if the app is malicious or the benign based on it user can proceed whether to continue with it or not

    Novel Circuit for the Rapid Measurement of Dielectric Constant with Ultra Precision over a Wide Range of Frequencies

    Get PDF
    A simplified instrument is designed for dielectric constant measurement of liquids and gases over a wide range of frequencies by using 6j5 as variable oscillator and 6E5 electron-ray tube for mechanical resonance indication with the quartz crystal of various frequencies. Measurements with the proposed new circuit are simple, rapid and accurate

    The Pattern of Benign Breast Diseases in Rural Hospital in India

    Get PDF
    Background: Benign breast diseases are most common cause of breast problems. Up to 30% of women suffer from benign breast diseases and  requiring treatment at some time in their lives. Benign breast diseases are 5 to 10 times more common than breast cancer. Until recently benign disorders of the breast has been given less importance than breast cancer. Consequently, many patients with benign breast diseases receive little attention from clinicians.Methods: The present cross-sectional study was carried out in Acharya Vinoba Bhave Rural Medical College and Hospital during the period April 2007 to September 2009. A total of 481 patients had breast disease, among these 380 patients had benign breast disease and which are included in the study.Results: Among all the benign breast diseases, right sided breast involvement was more common constituting 181 (47.63%) cases while left breast involvement was less common constituting 151 (39.73%) of the patients. Bilateral involvement was seen in only 48 (12.63%) of patients. The pattern of benign breast disease, fibroadenoma was the most common lesion constituting 160 (42.1%) cases
    • …
    corecore