488 research outputs found
On Large Deviation Property of Recurrence Times
We extend the study by Ornstein and Weiss on the asymptotic behavior of the
normalized version of recurrence times and establish the large deviation
property for a certain class of mixing processes. Further, an estimator for
entropy based on recurrence times is proposed for which large deviation
behavior is proved for stationary and ergodic sources satisfying similar mixing
conditions.Comment: 5 pages, International Symposium on Information Theory 201
Arthrobacter nitrophenolicus sp. nov. a new 2-chloro-4-nitrophenol degrading bacterium isolated from contaminated soil
Strain SJCon(T), a 2-chloro-4-nitrophenol (2C4NP) degrading bacterium, was isolated from soil collected from a pesticide-contaminated site in Punjab, India. The strain, which stained Gram positive, displayed a rod-coccus life cycle, and possessed a type A3(α) peptidoglycan (l-Lys–l-Ala(3)), MK-9(H2) as the major menaquinone, anteiso-C15 and iso-C15:0 as the major cellular fatty acids, and diphosphatidylglycerol, phosphatidylglycerol, phosphatidylinositol and a glycolipid as the major polar lipids, showed morphological and chemotaxonomic properties consistent with those reported for members of the genus Arthrobacter. Phylogenetic analysis of the 16S rRNA gene sequence of strain SJCon(T) confirmed that it was a member of this genus with Arthrobacter globiformis DSM 20124(T) being the closest relative (sequence similarity of 97 %). The DNA G + C content of strain SJCon(T) was 69 ± 1 mol% and DNA homology with A. globiformis DSM 20124(T) was 45 %, suggesting that strain SJCon(T) represented a novel species of the genus Arthrobacter, which we have named Arthrobacter nitrophenolicus sp. nov The type strain is SJCon(T) (=MTCC 10104(T) =DSM 23165(T))
Repair of Sunken Floor by Integrated Approach: A Case Study
The floors and non load bearing walls of a house, having expansive black cotton soil underneath, have been repaired by two methods. A part of the damaged house floors and walls were repaired by the conventional method i.e. removing the expansive soil completely and replacing with non expansive granular material. The remaining part was repaired by integrated approach as described later by Jain and Mewade (2010). The Jain and Mewade (2010) approach consists of removing the expansive soil underneath the damaged floor by about 0.5m, making 50mm diameter, 1m deep holes at 0.75m centre to centre and filling lime slurry in the holes. The broken floor debris and non expansive soil was then filled up to the floor base level and the cement concrete floor was reconstructed. The floor constructed by removal of expansive soil by 1.5m depth in the first method and partial removal and making lime piles in the second method are performing well with no sign of settlement or unevenness any where. The paper presents the success story of one such house repaired by these methods in the year 2008. The second method requires only partial removal and replacement of problematic soil beneath the floor and therefore is fast and economical in comparison to conventional method
Morbidity and mortality profile of neonates admitted in special newborn care unit of a teaching hospital in Uttarakhand, India
Background: India accounts for 24% of global neonatal mortality. It is important to study the mortality and morbidity pattern as it helps to implement new treatment protocols, interventions, planning and policy making which helps in better survival and improvement in the quality of life among survivors. The aim of the project study was to determine the causes of morbidity and mortality in neonates admitted in our hospital.Methods: This study was conducted at Special Newborn Care Unit (SNCU) of Veer Chandra Singh Garhwali Government Institute of Medical Science and Research providing level II neonatal care. This is a retrospective hospital based observational study. Data from admission and discharge registers were extracted, compiled and analyzed from March 2016 to February 2018. Neonates taken against medical advice and those referred to tertiary care centers were excluded in calculation of survival outcome. Statistical analysis was done in form of percentage, proportions and chi square test was used to find statistical significance.Results: 1582 neonates were admitted during the study period. 60.80% were inborn and 39.20% were outborn. 59.54% were male and 40.46% were female. Major causes of admission were jaundice (24.72%), sepsis (20.48%), birth asphyxia (18.52%), meconium aspiration syndrome (10.11%). Birth asphyxia was the major cause of mortality, followed by sepsis and prematurity. Mortality was more in outborn babies 14.67% compared to inborn babies 9.80%.Conclusions: Neonatal jaundice, birth asphyxia and sepsis were the commonest causes of morbidity. Common causes of mortality were birth asphyxia and sepsis and prematurity. More deliveries at institutions with SNCU facility, early identification of danger signs and timely referral to tertiary care centers can prevent neonatal deaths
LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G
The advancement in wireless communication technologies is becoming more
demanding and pervasive. One of the fundamental parameters that limit the
efficiency of the network are the security challenges. The communication
network is vulnerable to security attacks such as spoofing attacks and signal
strength attacks. Intrusion detection signifies a central approach to ensuring
the security of the communication network. In this paper, an Intrusion
Detection System based on the framework of graph theory is proposed. A
Layerwise Graph Theory-Based Intrusion Detection System (LGTBIDS) algorithm is
designed to detect the attacked node. The algorithm performs the layer-wise
analysis to extract the vulnerable nodes and ultimately the attacked node(s).
For each layer, every node is scanned for the possibility of susceptible
node(s). The strategy of the IDS is based on the analysis of energy efficiency
and secrecy rate. The nodes with the energy efficiency and secrecy rate beyond
the range of upper and lower thresholds are detected as the nodes under attack.
Further, detected node(s) are transmitted with a random sequence of bits
followed by the process of re-authentication. The obtained results validate the
better performance, low time computations, and low complexity. Finally, the
proposed approach is compared with the conventional solution of intrusion
detection.Comment: in IEEE Transactions on Network and Service Management, 202
EXPERIMENTAL STUDY AND ANALYSIS OF WEAR IN SHEET METAL DURING VARIOUS FORCES
Sheet metals are metal formed by an industrial process into thin, flat pieces. It is one of the fundamental forms used in metal working and it can be cut and bent into a variety of shapes. Countless everyday objects are constructed with sheet metal. Thicknesses can vary significantly; extremely thin thicknesses are considered foil or leaf, and pieces thicker than 4 mm are considered plate
Behavioral Model For Live Detection of Apps Based Attack
Smartphones with the platforms of applications are gaining extensive
attention and popularity. The enormous use of different applications has paved
the way to numerous security threats. The threats are in the form of attacks
such as permission control attacks, phishing attacks, spyware attacks, botnets,
malware attacks, privacy leakage attacks. Moreover, other vulnerabilities
include invalid authorization of apps, compromise on the confidentiality of
data, invalid access control. In this paper, an application-based attack
modeling and attack detection is proposed. Due to A novel attack vulnerability
is identified based on the app execution on the smartphone. The attack modeling
involves an end-user vulnerable application to initiate an attack. The
vulnerable application is installed at the background end on the smartphone
with hidden visibility from the end-user. Thereby, accessing the confidential
information. The detection model involves the proposed technique of an
Application-based Behavioral Model Analysis (ABMA) scheme to address the attack
model. The model incorporates application-based comparative parameter analysis
to perform the process of intrusion detection. The ABMA is estimated by using
the parameters of power, battery level, and the data usage. Based on the source
internet accessibility, the analysis is performed using three different
configurations as, WiFi, mobile data, and the combination of the two. The
simulation results verify and demonstrates the effectiveness of the proposed
model
Comparative evaluation of immunochromatographic card tests with enzyme-linked immune sorbent assay for the detection of hepatitis C virus antibody
Background: Hepatitis C virus (HCV) is a global prevalent pathogen causes both acute and chronic hepatitis and leading to serious liver damage. Correct and rapid diagnosis is pivotal for the management of HCV disease. Rapid card tests are superior alternatives for the large-scale screening of HCV infection.
Methods: The present observational study evaluates analytical performance of four different anti-HCV rapid tests. A total of 200 ELISA confirmed, HCV positive (n=100) and HCV negative (n=100) clinical specimens were selected and re-tested for anti-HCV antibodies by using commercially available four different immunochromatography cards (Meriscreen, Accurate, Oscar and Biolab).
Results: Among all, Biolab rapid card test shown highest (98%) sensitivity. On the other hand, all rapid card test kits showed identical 100% specificity.
Conclusions: Overall BioLab anti-HCV rapid card tests found to be superior in the present study and strongly suggest in house validation of rapid card tests before their diagnostics use on clinical specimens
- …