457 research outputs found

    Optimization of WSN using Biological Inspired Self-Organized Secure Autonomous Routing Protocol

    Get PDF
    Since last three decade, Wireless Sensor Network is one of the biggest innovative technologies; it provides facility of heavy data traffic and management telecommunication by sensing, computation and communication into a small device. Main threat for this type of data transfer is data security in terms of maintains data integrity, high consumption of energy, end-to-end delay and high cost of nodes i.e. sensor. Handling all h issue at same time is the difficult task. SRTLD and BIOSARP are two routing protocol which helps in improving performance of the WSN. This paper is a detail description of secure architecture which is based on SRTLD and BIOSARP protocol. The main objective of this architecture is to provide high security by taking into account low energy consumption, low end-to-end delay and low node level cost. This mechanism uses concept of ACO (Ant Colony Optimization) which helps in achieving objective of the architectur

    ATLBS Extended Source Sample: The evolution in radio source morphology with flux density

    Get PDF
    Based on the ATLBS survey we present a sample of extended radio sources and derive morphological properties of faint radio sources. 119 radio galaxies form the ATLBS-Extended Source Sample (ATLBS-ESS) consisting of all sources exceeding 30" in extent and integrated flux densities exceeding 1 mJy. We give structural details along with information on galaxy identifications and source classifications. The ATLBS-ESS, unlike samples with higher flux-density limits, has almost equal fractions of FR-I and FR-II radio galaxies with a large fraction of the FR-I population exhibiting 3C31-type structures. Significant asymmetry in lobe extents appears to be a common occurrence in the ATLBS-ESS FR-I sources compared to FR-II sources. We present a sample of 22 FR-Is at z>0.5 with good structural information. The detection of several giant radio sources, with size exceeding 0.7 Mpc, at z>1 suggests that giant radio sources are not less common at high redshifts. The ESS also includes a sample of 28 restarted radio galaxies. The relative abundance of dying and restarting sources is indicative of a model where radio sources undergo episodic activity in which an active phase is followed by a brief dying phase that terminates with restarting of the central activity; in any massive elliptical a few such activity cycles wherein adjacent events blend may constitute the lifetime of a radio source and such bursts of blended activity cycles may be repeated over the age of the host. The ATLBS-ESS includes a 2-Mpc giant radio galaxy with the lowest surface brightness lobes known to date.Comment: 69 pages, 119 figures, 4 tables, to appear in ApJ

    Toxicity of \u3cem\u3eGynandropsis pentaphylla\u3c/em\u3e DC Extracts Against Microbials and Its Phytochemical Profile

    Get PDF
    Fresh leaves, roots, stems, seeds and seed pods of Gynandropsis pentaphylla DC were used in extractions with benzene and ether. Fresh extracts were tested against 6 bacteria and 4 fungi using the well diffusion method. Extracts of roots, stems, leaves, seeds and seed pods were screened phytochemically for the presence of secondary metabolites such as tannin, alkaloid, flavones, sugar, phenolic group, essential oil, amino acids and saponin. All the phytochemicals were observed in all the plant part extracts using both ether and benzene. Among the bacterial cultures, Agrobacterium tumefaciens (NCIM 2145) was highly susceptible (28.0±0.3 mm) to both ether and benzene extracts of the leaves of G. pentaphylla. Also A. tumefaciens showed the highest average zone of inhibition for all extracts. Among the fungi, Penicillium notatum (NCIM 747) was highly susceptible (25.0±0.0 mm) to the benzene extracts of G. pentaphylla leaves. The extracts of leaves showed highest activity among all the plant parts. Highest activity index was observed for all extracts against the fungus P. notatum

    FORMULATION AND EVALUATION OF ION-SENSITIVE IN-SITU NASAL GEL OF ZOLMITRIPTAN

    Get PDF
    In situ gel system is novel drug delivery system in which there is transition of sol to gel on external stimuli like change in pH, temperature or change in ion concentration (sol-gel transition). In the present study various formulations were prepared by using gellan gum as gelling agent and HPMC K100 as controlled or sustained release polymer. All the formulations were evaluated for various parameters like pH, viscosity, drug content, gel strength, mucoadhesive strength and drug release. At minimum concentration of polymer lose their integrity and at maximum concentration stiff gel were formed. At optimized concentration of gelling agent and HPMC K100 showed in situ gelling with all parameter in range. In Vitro release data revealed that the optimized formulation showed controlled and sustained drug release pattern. The optimized formulation also obeyed korsmer Peppas model equation and which showed the release exponent n value 0.765. Thus the ex vivo higher bioavailability can be expected from the optimized formulation.Â

    Detecting Phishing Web Pages using NB classifier and EMD Approach

    Get PDF
    Phishing is online security attack where attacker create replica of exiting web page for accessing users password, personal, financial data. Phishing is a form of online fraudulent activity in which an attacker aims to steal a victim’s personal information, such as a bank account, online banking password or a credit card number. Targets are tricked into providing such information by a combination of spoofing techniques and social engineering. We have proposed a new approach named as "Anti phishing framework using Bayesian approach for content based phishing web page detection. Our model used to detect the similarity between suspicious web page and secure web page through image and text contained by the web page. Text classifier, an image classifier and fusion algorithm the result from classifier are introduced. In the text classifier naive Bayes algorithm is used to calculate the Probability, an image classifier the earth mover’s distance algorithm is used to measure the visual Similarity and our Bayesian model is designed to determine the threshold. In data fusion detection for image classifier and text classifier means how many web site image and text are matched exactly. If any web page contains above 50% spam text and image so we are declare these web sites are phishing other-wise not phishing. DOI: 10.17762/ijritcc2321-8169.15013
    corecore