19 research outputs found

    Cryptography Algorithm

    Get PDF
    With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second.  Data Security is the most basic and extreme measures to ensure secure passage of information through internet. As the number of user’s increases rapidly throughout the globe tremendously which directly entice cracker for doing cyber-attack. Moreover data security is becoming necessity as we are heading towards digital globalization. In this paper we will discuss various algorithm used so far starting from classical ciphers to the modern day’s hash function for ensuring safer transmission of information

    Cryptography Algorithm

    Get PDF
    With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second.  Data Security is the most basic and extreme measures to ensure secure passage of information through internet. As the number of user’s increases rapidly throughout the globe tremendously which directly entice cracker for doing cyber-attack. Moreover data security is becoming necessity as we are heading towards digital globalization. In this paper we will discuss various algorithm used so far starting from classical ciphers to the modern day’s hash function for ensuring safer transmission of information

    A Review Paper on Management of Big Data

    Get PDF
    Big Data is everywhere around us.In previous era,there is an increase in demand of big data,business analytics and work environment.The big data is dominantly practice-driven,the corporations are exploring how big volume of data can be used to produce and store values for the company and governments.Though the machine learning and web analytics is to guess the action of the individuals,choice of the consumer or search action.Big Data is rapid tool that not only study patterns, but also give the diving possibility of an event.Corporations have stepped on the trend of using the big capacity of data that is forever increasing,often in terra or petabytes,to better guess results with large accuracy.The United Nation has passed another initiative named Global Pulse that manipulates new digital data sources such as mobile calls or mobile payments.Now big data has become a mainstream as a corporate terms,there is a small published management scholarship that handles the provocation of using such tools.In this research paper, we explore about the concepts of Big Data and how to manage it

    A Review Paper on Management of Big Data

    Get PDF
    Big Data is everywhere around us.In previous era,there is an increase in demand of big data,business analytics and work environment.The big data is dominantly practice-driven,the corporations are exploring how big volume of data can be used to produce and store values for the company and governments.Though the machine learning and web analytics is to guess the action of the individuals,choice of the consumer or search action.Big Data is rapid tool that not only study patterns, but also give the diving possibility of an event.Corporations have stepped on the trend of using the big capacity of data that is forever increasing,often in terra or petabytes,to better guess results with large accuracy.The United Nation has passed another initiative named Global Pulse that manipulates new digital data sources such as mobile calls or mobile payments.Now big data has become a mainstream as a corporate terms,there is a small published management scholarship that handles the provocation of using such tools.In this research paper, we explore about the concepts of Big Data and how to manage it

    Novel insights into the insect trancriptome response to a natural DNA virus

    Get PDF
    ArticleCopyright © 2015 McTaggart et al.; licensee BioMed Central.Background Little is known about invertebrate responses to DNA viruses. Here, we infect a commercially important pest moth species Plodia interpunctella with its naturally infecting DNA virus. We sequenced, assembled and annotated the complete transcriptome of the moth, and a partial transcriptome of the virus. We then tested for differential gene expression between moths that were exposed to the virus and controls. Results We found 51 genes that were differentially expressed in moths exposed to a DNA baculovirus compared to controls. Gene set enrichment analysis revealed that cuticle proteins were significantly overrepresented in this group of genes. Interestingly, 6 of the 7 differentially expressed cuticle proteins were downregulated, suggesting that baculoviruses are able to manipulate its host’s response. In fact, an additional 29 of the 51 genes were also downregulated in exposed compared with control animals, including a gram-negative binding protein. In contrast, genes involved in transposable element movement were upregulated after infection. Conclusions We present the first experiment to measure genome-wide gene expression in an insect after infection with a natural DNA virus. Our results indicate that cuticle proteins might be key genes underpinning the response to DNA viruses. Furthermore, the large proportion of genes that were downregulated after viral exposure suggests that this virus is actively manipulating the insect immune response. Finally, it appears that transposable element activity might increase during viral invasion. Combined, these results provide much needed host candidate genes that respond to DNA viral invaders.NERC Biomolecular Analysis Facility (NBAF

    An investigation of different DDOS attack detection methods in software-defined networks

    No full text
    Software-Defined Network is more vulnerable to more frequent and severe security attacks. Distributed Denial of service (DDoS) spasms corrupt network along with hinder efficiency and performance significantly. DDoS spasms lead to exhaustion of network means, thereby stopping the controller and impeding normal activities. Detection of DDoS attacks requires different classification techniques that provide accurate and efficient decision-making. Various techniques to detect the attacks are proposed in the existing literature. However, analysis of various works reveals various shortcomings of different techniques. In this paper, the existing techniques are analyzed in terms of their accuracy and MSE, and seven methods are compared with regards to suitability to counter DDoS attacks efficiently. Analysis of the results shows limitations and sets the tone for future studies on the topic. Overall, it is suggested to continue looking for better techniques to improve upon the existing learning and experiences gained and provide more accurate results

    Adenomatoid hyperplasia of lower lip

    No full text
    Adenomatoid hyperplasia (AH) is an uncommon, non-neoplastic swelling on the palate caused due to hyperplasia of the mucinous acini. The lesion clinically presents as a sessile tumor-like nodule resembling pleomorphic adenoma. Histopathologic findings include lobules of enlarged mucinous acini which are filled with secretory granules. The nuclei are squeezed to the basal portions, associated with focal inflammation and ductal dilatation, and a history of trauma is often elicited. Here, we report a rare case of AH of the lower lip in a 20-year-old male patient, which mimics a mucous retention cyst or mucocele

    Metagenomic analysis exploring taxonomic and functional diversity of bacterial communities of a Himalayan urban fresh water lake.

    No full text
    Freshwater lakes present an ecological border between humans and a variety of host organisms. The present study was designed to evaluate the microbiota composition and distribution in Dal Lake at Srinagar, India. The non-chimeric sequence reads were classified taxonomically into 49 phyla, 114 classes, 185 orders, 244 families and 384 genera. Proteobacteria was found to be the most abundant bacterial phylum in all the four samples. The highest number of observed species was found to be 3097 in sample taken from least populated area during summer (LPS) whereas the summer sample from highly populated area (HPS) was found most diverse among all as indicated by taxonomic diversity analysis. The QIIME output files were used for PICRUSt analysis to assign functional attributes. The samples exhibited a significant difference in their microbial community composition and structure. Comparative analysis of functional pathways indicated that the anthropogenic activities in populated areas and higher summer temperature, both decrease functional potential of the Lake microbiota. This is probably the first study to demonstrate the comparative taxonomic diversity and functional composition of an urban freshwater lake amid its highly populated and least populated areas during two extreme seasons (winter and summer)
    corecore