80 research outputs found

    A Comparative Analysis of Unicast Routing Protocols for MPLS-VPN

    Get PDF
    MPLS-VPN technology is introduced to provide secure transmission with minimum propagation delay. This paper presents a comparative analysis of unicast routing protocols for MPLSVPN enabled networks. The motive behind this analysis is to observe the consequence of unicast routing protocols on the performance of MPLS-VPN enabled networks and to choose most suitable routing protocol for such type of networks. To conduct the analysis, a test bed is established in GNS3 simulator. Three main unicast routing protocols i.e. Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (OSPF) and Routing Information Protocol (RIP) has been considered in this work. Round-Trip-Time, Jitter and Administrative-distance are used as performance measure metrics. The experimental analysis indicates that EIGRP is the most suitable protocol among the aforementioned protocols for MPLS-VPN

    Effectiveness of Health Education to Improve Oral Care of Primary School Children in A Rural Community of Pakistan

    Get PDF
    Oral health is an integral part of human general health. “Oral health is the beauty of the oral cavity, which includes teeth, tissue and its supporting structure, the overall health promotion is necessary but focuses on oral health is most important, it is primarily aiming to prevent from oral disease by health education. Methods: A quasi- experimental, quantitative, before and after study design was conducted  among the students total (n= 56) in the primary school of Ali Raza Abad Raiwind Road Lahore, Pakistan from September 2018 to December 2018. The educational intervention involve four meeting about oral hygiene in which the researcher educate the students about poor and good oral hygiene, prevention of disease which are caused by poor oral hygiene and appropriate way of tooth brushing lead to good oral health. Results: A total of 56 children participated in the study, the majority of the participants were boys 41(73.2%). The mean before the educational intervention is 5.83 (Standard deviation 3.80) and after the educational intervention is 7.86(Standard deviation 3.36). The mean difference between the two mean is 2.01. There is a statistically significant difference before and after the educational intervention. The educational intervention is highly effective because the significant value is 0.00 Conclusions: The result of the study shows that oral hygiene can be improved by educational intervention and by proper techniques of tooth brushing. Keywords- Improve oral care. Oral health education. DOI: 10.7176/JEP/11-7-03 Publication date:March 31st 202

    Phytochemical Analysis and Antibacterial Activity of Berberis vulgaris Extract

    Get PDF
    Background: Plants are main source of various bioactive compounds that possess great medicinal importance and have gained much popularity for therapeutics due to their less side effects. A diverse category of plants is present to be explored and evaluated for the treatment of different bacterial infection. In the current work, Berberis vulgaris extract in various solvents was evaluated for its phytochemical properties and antimicrobial potential against six different pathogenic bacterial strains.Methods: Different phytochemical tests were carried out to analyze the plant for active biocomponents. The disc diffusion method was used to screen the plant for different pathogenic bacterial strains. Phytochemical analysis revealed the presence of various plant bioactive compounds (alkaloids, saponins, tannins, flavonoids, terpenoids, carbohydrates, and proteins) in variable amount.Results: Among all solvents extracts, butanoic and aqueous fraction showed abundant presence of bioactive compounds, while n-hexane showed least intensity of various phytochemicals. For antimicrobial potential, methanolic and butanoic fractions showed maximum growth inhibition against all strains tested at 1.5mg disc-1. Ethyl acetate and n-hexane also showed better activity against all tested bacteria at all concentrations. The most susceptible microbe was Bacillus subtilis. These results further revealed that least activity was recorded by water extracted solvent and showed no activity against Staphylococcus aureus at all concentrations.Conclusion: The current work highlights the apparent antimicrobial potential of extract derived from of Berberis vulgaris. This plant may be explored for further activities and can be used for the production of antibiotics

    APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System

    Get PDF
    The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. Machine learning (ML) techniques have shown potential in identifying APT attacks in autonomous and malware detection systems. However, detecting hidden APT attacks in the I-IoT-enabled CPS domain and achieving real-time accuracy in detection present significant challenges for these techniques. To overcome these issues, a new approach is suggested that is based on the Graph Attention Network (GAN), a multi-dimensional algorithm that captures behavioral features along with the relevant information that other methods do not deliver. This approach utilizes masked self-attentional layers to address the limitations of prior Deep Learning (DL) methods that rely on convolutions. Two datasets, the DAPT2020 malware, and Edge I-IoT datasets are used to evaluate the approach, and it attains the highest detection accuracy of 96.97% and 95.97%, with prediction time of 20.56 seconds and 21.65 seconds, respectively. The GAN approach is compared to conventional ML algorithms, and simulation results demonstrate a significant performance improvement over these algorithms in the I-IoT-enabled CPS realm

    Using Genetic Algorithm to Minimize False Alarms in Insider Threats Detection of Information Misuse in Windows Environment

    Get PDF
    Insider threats detection problem has always been one of the most difficult challenges for organizations and research community. Effective behavioral categorization of users plays a vital role for the success of any detection mechanisms. It also helps to reduce false alarms in case of insider threats. In order to achieve this, a fuzzy classifier has been implemented along with genetic algorithm (GA) to enhance the efficiency of a fuzzy classifier. It also enhances the functionality of all other modules to achieve better results in terms of false alarms. A scenario driven approach along with mathematical evaluation verifies the effectiveness of the modified framework. It has been tested for the enterprises having critical nature of business. Other organizations can adopt it in accordance with their specific nature of business, need, and operational processes. The results prove that accurate classification and detection of users were achieved by adopting the modified framework which in turn minimizes false alarms

    COMPARATIVE STUDY OF A BIOPESTICIDE WITH SOME SYNTHETIC PESTICIDES USED AGAINST MUSTARD APHIDS (Lipephis erysimi Kalt)

    Get PDF
    ABSTRACT The experiment was conducted to compare effectiveness of (BtA) Bacillus thuringiensis and Abamectin @ 1gm/l with chlorpyrifos @ 5ml/l, megamos @ 1.25 ml/l and trend @ 4ml/l in controlling aphids (Lipaphis erysimi) on mustard (Eruca sativa) at Agricultural Research Farm, NWFP Agricultural University, Peshawar during 2004-05. These compounds were first sprayed to the point of runoff when the density of the aphids reached to 10 per leaf and repeated at 15 days after the first spray. There were 5 treatments along with one control and replicated 4 times. On mustard after two sprays all the pesticides (being non significant from one another) resulted in significant control of aphids over the check. Mean yield of mustard seed was significantly higher in chlorpyrifos treatment with 581 kg/ha, against 477 kg/ha in BtA treatment

    Effect of regimenal intervention by nutool (irrigation) in a case of chronic prostatitis/chronic pelvic pain syndrome

    Get PDF
    Background ‘Nutool’ is one of the regimenal therapy used in Unani medicine since centuries in various inflammatory and painful conditions. Chronic prostatitis (Warm-e- Gudda Mazi Muzmin) is associated with ‘chronic pelvic pain syndrome’ (CP/CPPS), is a chronic pain condition of non-bacterial origin in men with mixture of other symptoms such as lower urinary tract voiding, ejaculatory ailments and negative impact on quality of life (QOL), which almost lacks uniform effective therapy in conventional medicine. Objectives The purpose of our case study was to assess the impact of nutool in CP/ CPPS refractory to standard therapies and collect data to warrant further research in this area.        Case study  A 30 yrs. old Asian male admitted with symptoms of pelvic pain and pain during ejaculation from 6 month in absence of lower urinary tract symptoms with negative thoughts, diagnosed as CP/ CPPS on the protocols of NIH. Nutool of anti-inflammatory Unani drugs was given as the main therapy, daily for two weeks. Thus we report our case experience with the integrated short, review of literature and validated assessment, based on 1) VAS, 2) NIH-CPSI which includes pain index, urinary, and QOL score. Results Results were validated over the pain on the basis of VAS (visual analogue scale) and NIH-CPSI (standard questionnaire of the national institute of health—chronic prostatitis symptom index) which showed significant improvement after 2 weeks of therapy. Conclusion The preliminary findings, although limited, suggest the potential therapeutic role of Nutool in the treatment of CP/CPPS

    CFD Study of Liquid Sodium inside a Wavy Tube for Laminar Convectors: Effect of Reynolds Number, Wave Pitch, and Wave Amplitude

    Get PDF
    Metallic tubes have been widely used as primary heat transfer elements in laminar convectors for domestic and aerospace heating purpose. This paper uses CFD tool to investigate the heat output and pressure drop of liquid sodium flowing inside a circular tube having a wavy profile throughout its length. The wavy tube can be utilized in laminar liquid metal convectors as basic heat transfer element. The effect of Reynolds number (500≤Re≤2000) wave pitch (25 mm≤λ≤100 mm) and wave amplitude (2 mm≤a≤6 mm) on the heat output and pressure drop has been numerically studied. Based on the CFD results important controlling parameters have been identified and it is concluded that the heat output from the wavy tube is affected by the wave pitch and the wave amplitude while the pressure drop is mostly affected by the Reynolds number and wave amplitude

    Effect of substituents and promoters on the Diels–Alder cycloaddition reaction in the biorenewable synthesis of trimellitic acid

    Get PDF
    An efficient route to produce oxanorbornene, a precursor for the production of bio-based trimellitic acid (TMLA) via the Diels-Alder (DA) reaction of biomass-derived dienes and dienophiles has been proposed by utilizing density functional theory (DFT) simulations. It has been suggested that DA reaction of dienes such as 5-hydroxymethyl furfural (HMF), 2,5-dimethylfuran (DMF), furan dicarboxylic acid (FDCA) and biomass-derived dienophiles (ethylene derivatives e.g., acrolein, acrylic acid, etc.) leads to the formation of an intermediate product oxanorbornene, a precursor for the production of TMLA. The activation barriers for the DA reaction were correlated to the type of substituent present on the dienes and dienophiles. Among the dienophiles, acrolein was found to be the best candidate showing a low activation energy (<40 kJ mol-1) for the cycloaddition reaction with dienes DMF, HMF and hydroxy methyl furoic acid (HMFA). The FMO gap and (IPdiene + EAdienophile)/2 were both suggested to be suitable descriptors for the DA reaction of electron-rich diene and electron-deficient dienophile. Further solvents did not have a significant effect on the activation barrier for DA reaction. In contrast, the presence of a Lewis acid was seen to lower the activation barrier due to the reduction in the FMO gap. © The Royal Society of Chemistry

    Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities

    Get PDF
    Security has always been the main concern for the internet of things (IoT)-based systems. Blockchain, with its decentralized and distributed design, prevents the risks of the existing centralized methodologies. Conventional security and privacy architectures are inapplicable in the spectrum of IoT due to its resource constraints. To overcome this problem, this paper presents a Blockchain-based security mechanism that enables secure authorized access to smart city resources. The presented mechanism comprises the ACE (Authentication and Authorization for Constrained Environments) framework-based authorization Blockchain and the OSCAR (Object Security Architecture for the Internet of Things) object security model. The Blockchain lays out a flexible and trustless authorization mechanism, while OSCAR makes use of a public ledger to structure multicast groups for authorized clients. Moreover, a meteor-based application is developed to provide a user-friendly interface for heterogeneous technologies belonging to the smart city. The users would be able to interact with and control their smart city resources such as traffic lights, smart electric meters, surveillance cameras, etc., through this application. To evaluate the performance and feasibility of the proposed mechanism, the authorization Blockchain is implemented on top of the Ethereum network. The authentication mechanism is developed in the node.js server and a smart city is simulated with the help of Raspberry Pi B+. Furthermore, mocha and chai frameworks are used to assess the performance of the system. Experimental results reveal that the authentication response time is less than 100 ms even if the average hand-shaking time increases with the number of clients
    corecore