488 research outputs found

    On Large Deviation Property of Recurrence Times

    Full text link
    We extend the study by Ornstein and Weiss on the asymptotic behavior of the normalized version of recurrence times and establish the large deviation property for a certain class of mixing processes. Further, an estimator for entropy based on recurrence times is proposed for which large deviation behavior is proved for stationary and ergodic sources satisfying similar mixing conditions.Comment: 5 pages, International Symposium on Information Theory 201

    Arthrobacter nitrophenolicus sp. nov. a new 2-chloro-4-nitrophenol degrading bacterium isolated from contaminated soil

    Get PDF
    Strain SJCon(T), a 2-chloro-4-nitrophenol (2C4NP) degrading bacterium, was isolated from soil collected from a pesticide-contaminated site in Punjab, India. The strain, which stained Gram positive, displayed a rod-coccus life cycle, and possessed a type A3(α) peptidoglycan (l-Lys–l-Ala(3)), MK-9(H2) as the major menaquinone, anteiso-C15 and iso-C15:0 as the major cellular fatty acids, and diphosphatidylglycerol, phosphatidylglycerol, phosphatidylinositol and a glycolipid as the major polar lipids, showed morphological and chemotaxonomic properties consistent with those reported for members of the genus Arthrobacter. Phylogenetic analysis of the 16S rRNA gene sequence of strain SJCon(T) confirmed that it was a member of this genus with Arthrobacter globiformis DSM 20124(T) being the closest relative (sequence similarity of 97 %). The DNA G + C content of strain SJCon(T) was 69 ± 1 mol% and DNA homology with A. globiformis DSM 20124(T) was 45 %, suggesting that strain SJCon(T) represented a novel species of the genus Arthrobacter, which we have named Arthrobacter nitrophenolicus sp. nov The type strain is SJCon(T) (=MTCC 10104(T) =DSM 23165(T))

    Repair of Sunken Floor by Integrated Approach: A Case Study

    Get PDF
    The floors and non load bearing walls of a house, having expansive black cotton soil underneath, have been repaired by two methods. A part of the damaged house floors and walls were repaired by the conventional method i.e. removing the expansive soil completely and replacing with non expansive granular material. The remaining part was repaired by integrated approach as described later by Jain and Mewade (2010). The Jain and Mewade (2010) approach consists of removing the expansive soil underneath the damaged floor by about 0.5m, making 50mm diameter, 1m deep holes at 0.75m centre to centre and filling lime slurry in the holes. The broken floor debris and non expansive soil was then filled up to the floor base level and the cement concrete floor was reconstructed. The floor constructed by removal of expansive soil by 1.5m depth in the first method and partial removal and making lime piles in the second method are performing well with no sign of settlement or unevenness any where. The paper presents the success story of one such house repaired by these methods in the year 2008. The second method requires only partial removal and replacement of problematic soil beneath the floor and therefore is fast and economical in comparison to conventional method

    Morbidity and mortality profile of neonates admitted in special newborn care unit of a teaching hospital in Uttarakhand, India

    Get PDF
    Background: India accounts for 24% of global neonatal mortality. It is important to study the mortality and morbidity pattern as it helps to implement new treatment protocols, interventions, planning and policy making which helps in better survival and improvement in the quality of life among survivors. The aim of the project study was to determine the causes of morbidity and mortality in neonates admitted in our hospital.Methods: This study was conducted at Special Newborn Care Unit (SNCU) of Veer Chandra Singh Garhwali Government Institute of Medical Science and Research providing level II neonatal care. This is a retrospective hospital based observational study. Data from admission and discharge registers were extracted, compiled and analyzed from March 2016 to February 2018. Neonates taken against medical advice and those referred to tertiary care centers were excluded in calculation of survival outcome. Statistical analysis was done in form of percentage, proportions and chi square test was used to find statistical significance.Results: 1582 neonates were admitted during the study period. 60.80% were inborn and 39.20% were outborn. 59.54% were male and 40.46% were female. Major causes of admission were jaundice (24.72%), sepsis (20.48%), birth asphyxia (18.52%), meconium aspiration syndrome (10.11%). Birth asphyxia was the major cause of mortality, followed by sepsis and prematurity. Mortality was more in outborn babies 14.67% compared to inborn babies 9.80%.Conclusions: Neonatal jaundice, birth asphyxia and sepsis were the commonest causes of morbidity. Common causes of mortality were birth asphyxia and sepsis and prematurity. More deliveries at institutions with SNCU facility, early identification of danger signs and timely referral to tertiary care centers can prevent neonatal deaths

    LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G

    Full text link
    The advancement in wireless communication technologies is becoming more demanding and pervasive. One of the fundamental parameters that limit the efficiency of the network are the security challenges. The communication network is vulnerable to security attacks such as spoofing attacks and signal strength attacks. Intrusion detection signifies a central approach to ensuring the security of the communication network. In this paper, an Intrusion Detection System based on the framework of graph theory is proposed. A Layerwise Graph Theory-Based Intrusion Detection System (LGTBIDS) algorithm is designed to detect the attacked node. The algorithm performs the layer-wise analysis to extract the vulnerable nodes and ultimately the attacked node(s). For each layer, every node is scanned for the possibility of susceptible node(s). The strategy of the IDS is based on the analysis of energy efficiency and secrecy rate. The nodes with the energy efficiency and secrecy rate beyond the range of upper and lower thresholds are detected as the nodes under attack. Further, detected node(s) are transmitted with a random sequence of bits followed by the process of re-authentication. The obtained results validate the better performance, low time computations, and low complexity. Finally, the proposed approach is compared with the conventional solution of intrusion detection.Comment: in IEEE Transactions on Network and Service Management, 202

    EXPERIMENTAL STUDY AND ANALYSIS OF WEAR IN SHEET METAL DURING VARIOUS FORCES

    Get PDF
    Sheet metals are metal formed by an industrial process into thin, flat pieces. It is one of the fundamental forms used in metal working and it can be cut and bent into a variety of shapes. Countless everyday objects are constructed with sheet metal. Thicknesses can vary significantly; extremely thin thicknesses are considered foil or leaf, and pieces thicker than 4 mm are considered plate

    Behavioral Model For Live Detection of Apps Based Attack

    Full text link
    Smartphones with the platforms of applications are gaining extensive attention and popularity. The enormous use of different applications has paved the way to numerous security threats. The threats are in the form of attacks such as permission control attacks, phishing attacks, spyware attacks, botnets, malware attacks, privacy leakage attacks. Moreover, other vulnerabilities include invalid authorization of apps, compromise on the confidentiality of data, invalid access control. In this paper, an application-based attack modeling and attack detection is proposed. Due to A novel attack vulnerability is identified based on the app execution on the smartphone. The attack modeling involves an end-user vulnerable application to initiate an attack. The vulnerable application is installed at the background end on the smartphone with hidden visibility from the end-user. Thereby, accessing the confidential information. The detection model involves the proposed technique of an Application-based Behavioral Model Analysis (ABMA) scheme to address the attack model. The model incorporates application-based comparative parameter analysis to perform the process of intrusion detection. The ABMA is estimated by using the parameters of power, battery level, and the data usage. Based on the source internet accessibility, the analysis is performed using three different configurations as, WiFi, mobile data, and the combination of the two. The simulation results verify and demonstrates the effectiveness of the proposed model

    Comparative evaluation of immunochromatographic card tests with enzyme-linked immune sorbent assay for the detection of hepatitis C virus antibody

    Get PDF
    Background: Hepatitis C virus (HCV) is a global prevalent pathogen causes both acute and chronic hepatitis and leading to serious liver damage. Correct and rapid diagnosis is pivotal for the management of HCV disease. Rapid card tests are superior alternatives for the large-scale screening of HCV infection. Methods: The present observational study evaluates analytical performance of four different anti-HCV rapid tests. A total of 200 ELISA confirmed, HCV positive (n=100) and HCV negative (n=100) clinical specimens were selected and re-tested for anti-HCV antibodies by using commercially available four different immunochromatography cards (Meriscreen, Accurate, Oscar and Biolab). Results: Among all, Biolab rapid card test shown highest (98%) sensitivity. On the other hand, all rapid card test kits showed identical 100% specificity. Conclusions: Overall BioLab anti-HCV rapid card tests found to be superior in the present study and strongly suggest in house validation of rapid card tests before their diagnostics use on clinical specimens
    corecore