27 research outputs found

    A Protective Mechanism to Avoid Eavesdropping Attack in MANET

    Get PDF
    Wireless ad hoc network is self-directed and infrastructure less network. Wireless ad hoc network is particularly inclined due to its basic characteristics, such as open medium, dynamic topology, distributed cooperation, and capability constraint. Routing plays an imperative part in the security of the whole system. Secure transmission of data in wireless ad hoc environment is an imperative concern. Any aggressor get remote flag by using transceiver and without being caught. The objective of this paper is to propose new secure unobservable routing protocol where attacker gets blocked while making spoofing or DOS attacks. Only oblivious message could be gathered by attacker. Proposed protocol will also protect privacy information among network and will detect and block attacking nodes through trust mechanism. DOI: 10.17762/ijritcc2321-8169.160412

    A Review on: Efficient Method for Mining Frequent Itemsets on Temporal Data

    Get PDF
    Temporal data can hold time-stamped information that affects the results of data mining. Customary strategies for finding frequent itemsets accept that datasets are static; also the instigated rules are relevant over the whole dataset. In any case, this is not the situation when data is temporal. The work is done to enhance the proficiency of mining frequent itemsets on temporal data. The patterns can hold in either all or, then again a portion of the intervals. It proposes another method with respect to time interval is called as frequent itemsets mining with time cubes. The concentration is building up an efficient algorithm for this mining issue by broadening the notable a priori algorithm. The thought of time cubes is proposed to handle different time hierarchies. This is the route by which the patterns that happen intermittently, amid a time interval or both, are perceived. Another thickness limit is likewise proposed to take care of the overestimating issue of time periods and furthermore ensure that found patterns are valid

    A Review on: Efficient Method for Mining Frequent Itemsets on Temporal Data

    Get PDF
    Temporal data can hold time-stamped information that affects the results of data mining. Customary strategies for finding frequent itemsets accept that datasets are static; also the instigated rules are relevant over the whole dataset. In any case, this is not the situation when data is temporal. The work is done to enhance the proficiency of mining frequent itemsets on temporal data. The patterns can hold in either all or, then again a portion of the intervals. It proposes another method with respect to time interval is called as frequent itemsets mining with time cubes. The concentration is building up an efficient algorithm for this mining issue by broadening the notable a priori algorithm. The thought of time cubes is proposed to handle different time hierarchies. This is the route by which the patterns that happen intermittently, amid a time interval or both, are perceived. Another thickness limit is likewise proposed to take care of the overestimating issue of time periods and furthermore ensure that found patterns are valid

    Assessment of in vitro biological activities of Terminalia arjuna Roxb. bark extract and Arjunarishta in inflammatory bowel disease and colorectal cancer

    Get PDF
    306-313Alternative or complementary therapies for several inflammatory disorders have gained considerable acceptability and popularity in recent years. The Arjuna tree, Terminalia arjuna Roxb. (Combretaceae) holds antidiarrheal and antioxidant potential useful in management of inflammatory gastro intestinal ailments. Here, we evaluated the possible effect of T. arjuna hydroalcoholic extract (TAHA) and traditional Ayurvedic formulation Arjunarishta (AA) for the treatment of inflammatory bowel disease (IBD) and colorectal cancer. The phytochemical profile of test materials was confirmed via investigation of total phenolic and flavanoid content and standardized by HPLC-PDA method. In vitro antioxidant activity was carried out using 2,2-diphenyl-1-picrylhydrazyl (DPPH) and ferric reducing ability of plasma (FRAP) assay. Antimicrobial potential was tested against clinical isolates of IBD patients (HM95, HM233, HM251, HM615). Cytotoxicity was determined against human colorectal adenocarcinoma cells (Caco2, COLO.205), whereas, cytocompatibility against normal rat intestinal epithelial (IEC-6) and mouse fibroblast cells (L929). Additionally, in vitro oxidative cell damage stress was estimated by lipid peroxidation biomarker. TAHA displayed higher antioxidant capacity as compared to AA formulation. Different sensitivities were observed against different study cell lines in dose dependant manner. Similarly, significant (P <0.05) enhanced malondialdehyde (MDA) concentrations in test materials and 5-FU treated colorectal adenocarcinoma cells was detected as compared to control cells. TAHA and AA exhibited antimicrobial activity against IBD associated clinical isolates. These findings provide biological evidence for therapeutic application of TAHA and AA in IBD and colorectal cancer treatment

    An Attempt to Improve Data Security in Text Based Cryptosystem Using Elliptic Curve Cryptography

    Get PDF
    Data can be debilitated by hackers and spies. Cryptography helps us find better approaches to secure information in digital form. Elliptic Curve Cryptography (ECC) is favorable over numerous cryptographic systems because of smaller keys and quick key generation. This paper proposes a system which intends to provide multifold security in text based communication. The system has two main modules: encryption, and decryption. Encoding scheme which works on variable length text block mapping technique has been exhibited, thereby enhancing data security provided by ECC in text based cryptosystems. To leverage the advantages of ECC, it is being used in many applications. This papers attempts to utilize ECC in text based cryptosystems efficiently

    Hotspot SF3B1 mutations induce metabolic reprogramming and vulnerability to serine deprivation.

    Get PDF
    Cancer-associated mutations in the spliceosome gene SF3B1 create a neomorphic protein that produces aberrant mRNA splicing in hundreds of genes, but the ensuing biologic and therapeutic consequences of this missplicing are not well understood. Here we have provided evidence that aberrant splicing by mutant SF3B1 altered the transcriptome, proteome, and metabolome of human cells, leading to missplicing-associated downregulation of metabolic genes, decreased mitochondrial respiration, and suppression of the serine synthesis pathway. We also found that mutant SF3B1 induces vulnerability to deprivation of the nonessential amino acid serine, which was mediated by missplicing-associated downregulation of the serine synthesis pathway enzyme PHGDH. This vulnerability was manifest both in vitro and in vivo, as dietary restriction of serine and glycine in mice was able to inhibit the growth of SF3B1MUT xenografts. These findings describe a role for SF3B1 mutations in altered energy metabolism, and they offer a new therapeutic strategy against SF3B1MUT cancers

    Integrating transcriptomic and proteomic data for accurate assembly and annotation of genomes

    Get PDF
    © 2017 Wong et al.; Published by Cold Spring Harbor Laboratory Press. Complementing genome sequence with deep transcriptome and proteome data could enable more accurate assembly and annotation of newly sequenced genomes. Here, we provide a proof-of-concept of an integrated approach for analysis of the genome and proteome of Anopheles stephensi, which is one of the most important vectors of the malaria parasite. To achieve broad coverage of genes, we carried out transcriptome sequencing and deep proteome profiling of multiple anatomically distinct sites. Based on transcriptomic data alone, we identified and corrected 535 events of incomplete genome assembly involving 1196 scaffolds and 868 protein-coding gene models. This proteogenomic approach enabled us to add 365 genes that were missed during genome annotation and identify 917 gene correction events through discovery of 151 novel exons, 297 protein extensions, 231 exon extensions, 192 novel protein start sites, 19 novel translational frames, 28 events of joining of exons, and 76 events of joining of adjacent genes as a single gene. Incorporation of proteomic evidence allowed us to change the designation of more than 87 predicted noncoding RNAs to conventional mRNAs coded by protein-coding genes. Importantly, extension of the newly corrected genome assemblies and gene models to 15 other newly assembled Anopheline genomes led to the discovery of a large number of apparent discrepancies in assembly and annotation of these genomes. Our data provide a framework for how future genome sequencing efforts should incorporate transcriptomic and proteomic analysis in combination with simultaneous manual curation to achieve near complete assembly and accurate annotation of genomes

    International Journal of Advance Research in Computer Science and Management Studies Analysis of Construction Project Cost Overrun by Statistical Method

    No full text
    The cost overrun methodology presented in this study gives statistical method which is used in construction sector for computing impact of project cost overruns. The finding of the paper will help the project manager to act on critical causes and further try to reduce cost overrun of project

    Opioid-Based vs opioid-free anesthesia in breast cancer surgery

    No full text
    Introduction: Breast cancer is the most widely recognized malignant growth in ladies in India and accounts for 14% of all tumors in women. Modified radical mastectomy (MRM) is a surgery done for breast cancer. It leads to about 30% chances of postoperative nausea and vomiting (PONV) and 40% pain in the immediate postoperative period. Objectives: Changes in blood pressure after intubation, waiting time for postoperative pain medication, and possibility of adverse effects. Methodology: After the approval of ethical committee, the study was conducted in the procedure and possible complications associated with the procedure were explained to patients. Written informed consent was obtained from each patient. Result and Conclusion: We conclude that opioid-free anesthesia is “more effective in reducing the incidence of postoperative nausea and vomiting, produces stable hemodynamics, and reduces incidence of side effects when compared with opioid-based general anesthesia in patients undergoing breast cancer surgeries.
    corecore