8,930 research outputs found

    Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Get PDF
    Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks

    Efficient Method Based on Blockchain Ensuring Data Integrity Auditing with Deduplication in Cloud

    Get PDF
    With the rapid development of cloud storage, more and more cloud clients can store and access their data anytime, from anywhere and using any device. Data deduplication may be considered an excellent choice to ensure data storage efficiency. Although cloud technology offers many advantages for storage service, it also introduces security challenges, especially with regards to data integrity, which is one of the most critical elements in any system. A data owner should thus enable data integrity auditing mechanisms. Much research has recently been undertaken to deal with these issues. In this paper, we propose a novel blockchain-based method, which can preserve cloud data integrity checking with data deduplication. In our method, a mediator performs data deduplication on the client side, which permits a reduction in the amount of outsourced data and a decrease in the computation time and the bandwidth used between the enterprise and the cloud service provider. This method supports private and public auditability. Our method also ensures the confidentiality of a client's data against auditors during the auditing process

    A New Protection for Android Applications

    Get PDF
    Today, Smartphones are very powerful, and many of its applications use wireless multimedia communications. Prevention from the external dangers (threats) has become a big concern for the experts these days. Android security has become a very important issue because of the free application it provides and the feature which make it very easy for anyone to develop and published it on Play store. Some work has already been done on the android security model, including several analyses of the model and frameworks aimed at enforcing security standards. In this article, we introduce a tool called PermisSecure that is able to perform both static and dynamic analysis on Android programs to automatically detect suspicious applications that request unnecessary or dangerous permissions

    Computer Vision-Based Approach for Automated Monitoring and Assessment of Gait Rehabilitation at Home

    Get PDF
    This study presents a markerless video-based human gait analysis system for automatic assessment of at-home rehabilitation. A marker-based MoCap system (Vicon) is used to evaluate the accuracy of the proposed approach. Additionally, a novel gait rehabilitation score based on the Dynamic Time Warping (DTW) algorithm is introduced, enabling quantification of rehabilitation progress. The accuracy of the proposed approach is assessed by comparing it to a marker-based MoCap system (Vicon), which is used to evaluate the proposed approach. This evaluation results in mean absolute errors (MAE) of 4.8° and 5.2° for the left knee, and 5.9° and 5.7° for the right knee, demonstrating an acceptable accuracy in knee angle measurements. The obtained scores effectively distinguish between normal and abnormal gait patterns. Subjects with normal gait exhibit scores around 97.5%, 98.8%, while those with abnormal gait display scores around 30%, 29%, respectively. Furthermore, a subject at an advanced stage of rehabilitation achieved a score of 65%. These scores provide valuable insights for patients, allowing them to assess their rehabilitation progress and distinguish between different levels of gait recovery. The proposed markerless approach demonstrates acceptable accuracy in measuring knee joint angles during a sagittal walk and provides a reliable rehabilitation score, making it a convenient and cost-effective alternative for automatic at-home rehabilitation monitoring

    Phototherapy and DNA changes in full term neonates with hyperbilirubinemia

    Get PDF
    Background: Phototherapy has remained the standard therapeutic approach for neonatal hyperbilirubinemia. Oxidative effects of phototherapy on cell membranes and cell components may have a wide range of potential adverse effects, including enhanced lipid peroxidation and DNA damage. Apoptosis is an indispensable mechanism for maintaining many cellular functions, including cell replication, and removal of damaged cells with high burden of genetic mutations. Many genes function as apoptosis regulatory genes. Examples of these genes include the BCL2 gene which is an anti-apoptotic oncogene, and the BAX gene which acts as a promoter of apoptosis.Objectives: Assess the effect(s) of phototherapy on DNA and on the rate of apoptosis in full term neonates with hyperbilirubinemia. It comprised 35 neonates with indirect hyperbilirubinemia who received phototherapy for 48h, and 20 apparently healthy full term neonates with normal serum bilirubin level, as a control group. DNA damage was assessed by DNA fragmentation and micronucleus assay. Determination of the anti-apoptotic effect(s) of BCL2 gene was achieved by quantitative assay of its product, (BCL2) protein, by ELISA and BAX gene expression status was assessed by PCR.Results: The frequency of micronuclei in circulating lymphocytes of neonates who received phototherapy has significantly increased before and after phototherapy compared to controls, (p< 0.001; p< 0 0.00001), respectively. DNA fragmentation in circulating lymphocytes, was significantly higher among cases before and after phototherapy compared to controls (p< 0.0001; p< 0 0.00001). The plasma BCL2 protein was significantly lower in the cases before and after phototherapy compared to controls (p< 0.01; p <0.01), respectively, and BAX gene expression was significantly high among cases before and after phototherapy compared to controls.Conclusions: Geno toxic effects of bilirubin and phototherapy, induce more DNA damage and enhances apoptosis of exposed cells, probably through down regulation of BCL2 expression and upregulation of BAX gene expression in neonates with hyperbilirubinemia. Keywords: Hyperbilirubinemia; Phototherapy; DNA damage; Apoptosis; BCL2 gene; BAX gen

    Visual and light detection and ranging-based simultaneous localization and mapping for self-driving cars

    Get PDF
    In recent years, there has been a strong demand for self-driving cars. For safe navigation, self-driving cars need both precise localization and robust mapping. While global navigation satellite system (GNSS) can be used to locate vehicles, it has some limitations, such as satellite signal absence (tunnels and caves), which restrict its use in urban scenarios. Simultaneous localization and mapping (SLAM) are an excellent solution for identifying a vehicle’s position while at the same time constructing a representation of the environment. SLAM-based visual and light detection and ranging (LIDAR) refer to using cameras and LIDAR as source of external information. This paper presents an implementation of SLAM algorithm for building a map of environment and obtaining car’s trajectory using LIDAR scans. A detailed overview of current visual and LIDAR SLAM approaches has also been provided and discussed. Simulation results referred to LIDAR scans indicate that SLAM is convenient and helpful in localization and mapping
    • …
    corecore