103 research outputs found

    An Approach to Provide Security in Mobile Ad-Hoc Networks Using Counter Mode of Encryption on Mac Layer

    Full text link
    Security in any of the networks became an important issue in this paper we have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node to destination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted 'malicious'. The second part of our protocol deals with the security in the link layer. For this security reason we have used CTR (Counter) approach for authentication and encryption. We have simulated all our strategies and schemes in NS-2, the result of which gives a conclusion that our proposed protocol i.e. Assured Neighbor based Security Protocol can perform high packet delivery against various intruders and also packet delivery ratio against mobility with low delays and low overheads.Comment: 11 pages, 6 figures, accepted and cited in "First International Conference on Computer Science, Engineering and Applications (CCSEA-2011)

    Scrub typhus in children: Clinical profile and complications at a Tertiary Care Teaching Hospital in Uttarakhand

    Get PDF
    Background: Scrub typhus is an acute febrile illness caused by rickettsia Orientia tsutsugamushi. Rickettsial infections are grossly underdiagnosed in India because of their non-specific clinical presentation, low index of suspicion among clinicians, and lack of diagnostic facilities. Objective: Objective of the study is to study the clinical profile, complications, and outcome of pediatric scrub typhus. Materials and Methods: This prospective observational study was conducted in the Department of Pediatrics, SGRR Institute of Medical and Health Sciences, Dehradun, Uttarakhand, India, over a period of 2 years from November 2013 to October 2015. Children up to 18 years of age with signs and symptoms compatible with scrub typhus along with serological confirmation were included in the study. Serological study was conducted using rapid immunochromatographic assay and/or immunoglobulin M enzyme-linked immunosorbent assay technique. Clinical presentation, laboratory findings, complications, and outcome of these children were recorded on a performa. The data were analyzed using SPSS version 20 for windows. Results: About 115 children were diagnosed as scrub typhus during the study period. All children presented with fever. Other common symptoms were myalgia (56%), vomiting (50.5%), abdominal pain (26%), headache (28%), facial puffiness (15%), and seizures (8.7%). Pallor was present in 48% of children. Other common signs were hepatomegaly (29%), splenomegaly (28%), hypotension (24%), edema (21%), oliguria (17%), maculopapular rash (10%), meningeal signs (10.4%), and conjunctivitis (3%). Thrombocytopenia (67%), anemia (51%), pleural effusion (23%), shock (16%), hepatitis (23%), acute kidney injury (17%), meningoencephalitis (10%), myocarditis (7%), and acute respiratory distress syndrome (7%) were the complications observed. Azithromycin, doxycycline or chloramphenicol were used for the treatment. Overall mortality rate was 12.2%. Conclusion: A high degree of suspicion and knowledge of geographicaldistribution of rickettsial diseases is crucial for its early diagnosis and favorable outcome. The presence of an eschar is a valuable clinical clue in the diagnosis of scrub typhus; however, its absence does not rule out the disease

    Identification and genetic characterization of phenol-degrading bacterium isolated from oil contaminated

    Get PDF
    A phenol-degrading novel monosodium glutamate was isolated from oil contaminated soil in India. This strain was found capable to utilize and tolerate up to 9.5 mM of phenol. Based on the results of phylogenetic similarity of 16S recombinant ribonucleic acid (rRNA) gene sequences and fatty acid analysis, strain MSG8 was identified as a novel Acinetobacter sp. The sequence of the partial largest subunit of multicomponent phenol hydroxylase (LmPH) gene of this isolated strain was identified and compared with LmPH gene of Pseudomonas sp.CF600. Reversed phase high performance liquid chromatography showed that the isolate can degrade phenol through catechol ortho fission pathway. In this paper, we reported about the new strain of Acinetobacter sp. capable of degrading phenol (9.5 mM of phenol concentration) under normal conditions. Therefore, strain MSG8 can potentially be used in bioremediation of phenol. The given data demonstrates that the isolated strain exhibits the characteristics of an efficient phenol-degrading microorganism.Keywords: Phenol, degradation, monosodium glutamate, bioremediation, Acinetobacter sp.African Journal of Biotechnology Vol. 12(8), pp. 791-79

    ASH LAYERS FROM SOUTH ANDAMAN SEA: PROBABLY SOURCED FROM TOBA CALDERA

    Get PDF
    Deep Sea sediment core PC-1 from the South Andaman Sea (7 ̊19.85' N; 94 ̊ 39.26' E; in East Andaman Basin) below the water depth of 3144 m contain discrete ash layers at various depths. According to morphological study, these ash layers contain glass shards of different varieties i.e. Type-I, Type-II, Type-III, Type-IV and Type-V and it is comparable to glass shards of Toba volcanic reported from other parts of the world. This observation is also supported on the basis of relative biostratigraphic datum observed in the core PC-1. The Layer-A (56 cm thick) at 210 cm bsf is just above the biostratigraphic datum of ca. 0.12 Ma, correspond to Youngest Toba Tuff (YTT), followed by Layer-C belongs to Middle Toba Tuff (MTT) and Layer-D inferred as Oldest Toba Tuff (OTT). This interpretation is further supported by the geochemical data obtained from the EDX analysis, which suggest high silica and alkali contents of rhyolitic composition. Hence, geochemical composition, morphology and biostratigraphic data of these discrete tephra layers show identical characteristics to the products of Toba eruptions, including YTT, MTT and OTT

    Advance Intelligent Video Surveillance System (AIVSS): A Future Aspect

    Get PDF
    Over the last few decades, remarkable infrastructure growths have been noticed in security-related issues throughout the world. So, with increased demand for Security, Video-based Surveillance has become an important area for the research. An Intelligent Video Surveillance system basically censored the performance, happenings, or changing information usually in terms of human beings, vehicles or any other objects from a distance by means of some electronic equipment (usually digital camera). The scopes like prevention, detection, and intervention which have led to the development of real and consistent video surveillance systems are capable of intelligent video processing competencies. In broad terms, advanced video-based surveillance could be described as an intelligent video processing technique designed to assist security personnel’s by providing reliable real-time alerts and to support efficient video analysis for forensic investigations. This chapter deals with the various requirements for designing a robust and reliable video surveillance system. Also, it is discussed the different types of cameras required in different environmental conditions such as indoor and outdoor surveillance. Different modeling schemes are required for designing of efficient surveillance system under various illumination conditions

    Lipid profile and its correlation with C-reactive protein in patients of acute myocardial infarction

    Get PDF
    Background: Acute myocardial infarction (AMI) is a significant cause of morbidity and mortality worldwide, which results from occlusion of coronary artery. Dyslipidemia is a major risk factor of AMI. C-reactive protein (CRP) is an acute phase protein, synthesized by hepatocytes in response to cytokines released into circulation by activated leukocytes and has been found to increase after AMI. The objective of the present study is to investigate lipid profile in AMI patients and correlate it with inflammatory marker i.e. CRP.Methods: The present study includes 150 AMI patients and 100 normal healthy individuals as controls. In all the cases and controls, serum lipid profile and inflammatory marker were measured by diagnostic kits supplied by ERBA.Results: The levels of lipid profile and inflammatory marker were significantly altered in the AMI cases compared to controls. We found significantly higher levels of total cholesterol, TG, LDL, VLDL, CRP and lower level of HDL in AMI compared to that of control subjects. We also found strong positive correlation of CRP with total cholesterol, triglyceride, LDL-C and VLDL-C and significant negative correlation with HDL-C in AMI patients.Conclusions: We found alterations in the lipid profile and inflammatory marker in AMI cases; hence, all the people should undergo regular check up including lipid profile evaluation and inflammatory marker such as CRP to decrease the incidence, morbidity and mortality from the disease

    Bulk Disposal of Unserviceable Toxic Cresylic Acid Waste Using Polymerisation Technique

    Get PDF
    A bulk amount of unserviceable toxic cresylic acid waste has been disposed off in a safe and environmentally benign manner. A process to immobilize this waste into non-toxic solid cresol formaldehyde polymer has been developed. Initial study was performed for 1.0 Kg batch size for optimizing the process parameters and conditions, and on the basis of this data, process was scaled-up for bulk disposal (100 Kg / batch). The effect of ratio of reactants, type of catalyst [H2SO4, NaOH and Ca(OH)2], catalyst concentration, reaction temperature and reaction time have been studied in a batch process. Maximum immobilization in the 1.0 Kg batch studies was obtained when cresylic acid and formaldehyde were taken in a molar ratio 1 : 1.5 using NaOH as a catalyst. For bulk polymerization, a ratio of 1.0 : 1.2 (cresylic acid : formaldehyde) with NaOH {0.7 % (wt. / wt. of total charge)} was found optimum. The final polymerized product has been buried as per standard procedure in two brick lined pits and finally, the site has been declared as free from the toxic waste.Defence Science Journal, 2011, 61(5), pp.505-511, DOI:http://dx.doi.org/10.14429/dsj.61.51

    Some Proposed Problems on Permutation Polynomials over Finite Fields

    Get PDF
    From the 19th century, the theory of permutation polynomial over finite fields, that are arose in the work of Hermite and Dickson, has drawn general attention. Permutation polynomials over finite fields are an active area of research due to their rising applications in mathematics and engineering. The last three decades has seen rapid progress on the research on permutation polynomials due to their diverse applications in cryptography, coding theory, finite geometry, combinatorics and many more areas of mathematics and engineering. For this reason, the study of permutation polynomials is important nowadays. In this chapter, we propose some new problems in connection to permutation polynomials over finite fields by the help of prime numbers

    A new image encryption and decryption approach based on chaotic analog signal generator

    Get PDF
    In the last one and half decade, chaos has occurred as a new favorable candidate for network security because many chaos important features such as  very much sensitivity to initial conditions and ergodicity, are directly related with two basic properties of cipher texts: confusion and diffusion. In this paper a new image encryption and decryption method is proposed which is based on the chaotic signal generator and 2D baker maps. A 144 bit external secrete key acts as the input of the chaotic signal generator. Baker maps used for the confusion of the main input image after that XOR operation used in diffusion process. The proposed method is simulated using Matlab and the results are secure with all type of cryptanalytic tests and statistical analysis tests
    corecore