664 research outputs found

    Identify Cryptanalytic Brute-Force Attack Using Frequent Pattern Mining

    Get PDF
    A brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attacker can attempt to guess the key which is typically created from the password using a key derivation function. This is known as an exhaustive key search. In this paper we proposed a new approach based on pattern mining of data mining techniques. We have taken 10 values which is most commonly used for passed. In the proposed approach we find most common things that used for password by most of the user

    A More Effective Approach Securing Text Data Based On Private Key Cryptography

    Get PDF
    Internet & smart phone makes easy to access and share data from anywhere in the world. Every day terabytes of data are being generated and used. Several important real life applications like banking transactions, credit information, and confidential data is transferred using internet. All the users need to prevent their data from unauthorized access. Data security during communication using internet and smart phone is a difficult task. Cryptography plays an integral part in data security. Cryptography provides confidentiality and maintains integrity between genuine users. Cryptography used mathematical techniques for security aspects such as confidentiality, data integrity, entity authentication, and data authentication. A cryptographic algorithm works using combination of keys to encrypt the plaintext. The security of encrypted data is entirely dependent on the strength of the cryptographic algorithm and the secrecy of the key. In this paper an efficient approach based on private key to encrypt and decrypt text data is proposed

    Cloning and transformation of rbc L gene in Solanum melongena L.

    Get PDF
    Plants would not able to undergo photosynthesis without rubisco, which is a powerful tool in phylogenic analysis, species diversity estimates, varietal identification and population analysis. Transformation is a parasexual method of introducing new genes into an organism. pGEM- T and pGEM –T easy vector, containing multiple cloning region, flanked by recognition sites for the restriction enzyme EcoR1 and Not I, are employed for cloning PCR product and to transform bacterial strain E. coli JM- 109 which is deficient in B- galactosidase activity due to deletion in both genomic and episomal copies of lacZ  gene. Ampr and lacZ gene are used for recombinant selection. On the other hand cloning of the gene for sequence divergence amongst species and genera is also a powerful tool in comparison to direct sequencing of PCR product. The rbcL isolated from two cultivars indigenous (A) & exogenous   (B), separately. In both the cultivars the sequence of rbcL gene found more or less similar either cultivars taken from greenhouse (A)or from field (B). after sequencing, rbcL probe may be used for screenable related taxa as well as the taxa which have the low photosynthetic rate, the insertion of rbcL gene through recombinant DNA technology or other recent similar technologies, in higher amount may increase photosynthesis rate. Resulting this the crop may be improved either for qualitative or quantitative traits

    Sustainable Health in the Times of SDGs- Voices from the Margins

    Get PDF
    The present chapter reflects on health care availability, utilization and pattern of morbidity in the slum. The first part deals with the general profile of the public health, proximate causes of the ill health, which provides insight about the general profile of the infrastructure and basic amenities position vis a vis slum. The second part is related the health care utilization in slums namely services of the medical institutions, charges of the private medical institutions and clinics, source of treatment, reason for choosing the source of treatment, satisfaction with the treatment, user charge. This section also includes access to the health care services in the slums and the mode of transport used for the utilization of the health care services. The third aspect of the study is related to the pattern of morbidity in slums includes illness in the last month, ailment on the survey date, hospitalisation in one year, average morbidity and hospitalisation rate in one year of three slums, type of ailment, ailment of the head of the household, ailment of the family members, no of days of inactivity and lastly analysis of the common problems and health status of slum dwellers, treatment sought and the proximate reasons for the ailments in slums been done

    Large Aperture, Tip Tilt Mirror for Beam Jitter correction in High Power Lasers

    Get PDF
    This paper describes a large aperture tip-tilt mirror (TTM) assembly for correction of beam jitter in high power lasers. The design intricacies and trade-offs among various parameters of TTM to meet the desired goals are discussed. The TTM assembly uses a 180 mm diameter and 5 mm thick silicon mirror glued onto the movable ring of a solid flexure. Four stacked piezo-ceramic based actuators have been used to incorporate angular tilts of the mirror along two orthogonal directions. Simulation studies have been carried out to study the dynamics of the TTM. The performance of the TTM assembly in both static and dynamic condition is provided. An experimental set-up is described to test the TTM performance in closed loop conditions. A tilt correction of ±200 micro-radians along two orthogonal directions with a closed loop bandwidth of 20 Hz has been achieved.Defence Science Journal, 2013, 63(6), pp.606-610, DOI:http://dx.doi.org/10.14429/dsj.63.576
    • …
    corecore