14 research outputs found

    Survey on IoT based Cyber Security Issues and Autonomous Solutions for Implantable Medical Devices

    Get PDF
    In today’s world the technology has got boomed up to the peak. So as a measure of this technology peak we could see that the enhancement of this has raised very large. This technology booming has also impacted health care sector. In our paper we are going to discuss much on implantable medical devices and its uses which plays a major role in patient’s life. This IMD’s are going to be the life changing aspect of each and every patient. These devices are highly controlled IoT devices (i.e.) those devices are connected through internet which will help doctors to track the details of the patients remotely. On the other hand since all these devices are connected to internet, these are easily hacked by the hackers. The factors of how those devices are much vulnerable and what are all the threats that will make these devices to malfunction and lead a problem to the patients is discussed. And also this will lead the health sector to fall in their reputation. IMD’s are of many types which are in existing in the Medical industry. But we are going to consider some IMD’s as example and we have planned to make a detailed study on the problems on those devices. All these devices are vulnerable since it is connected to internet. So our aim is to completely or partially reduce the risks on those devices via communication network. We have also showcased the possible threats and vulnerabilities chances on those devices. The main scenarios of device control issues and possible solutions have been discussed in this article

    Assessment of Security Trepidation in Cloud Applications with Enhanced Encryption Algorithms

    Get PDF
    To alleviate crank in routine process in IT related work environment we are maintaining information’s in cloud storage even though we affected by pandemic and other natural disaster still can able to access data by avoiding degrade in target process. Members who posses account in cloud no need to have separate high end configuration devices because even less configured devices could connect to cloud and make use of all services using virtual machine. Applications belong to cloud storage intimidated in the aspect of safety. This paper reviews the various security related issues and its causes along with latest cloud security attacks. We discussed about different technology to protect information resides in cloud and analyzed different enhanced algorithm for encryption for securing the data in cloud due to surge use of devices interacting cloud services

    Analysis of Cloud Storage Issues in Distributed Cloud Data Centres by Parameter Improved Particle Swarm Optimization (PIPSO) Algorithm

    Get PDF
    Cloud Computing environment provides several on demand services for users. The recent problem and important issues in cloud computing is to optimize cloud storage over distributed data centers. The cloud storage optimization problem is considered as one of most challenging task. To overcome storage issues, the Parameter Improved Particle Swarm Optimization (PIPSO) technique is proposed. This paper presents the objective and the requirements of the distributed cloud storage issue based on the current topology. PIPSO technique manages each other between two server centers. The simulation has been done in MATLAB programming software. The results show that proposed technique achieves better results when compared with the other existing methods

    Optimal Drug Regimen and Combined Drug Therapy and its Efficacy in the Treatment of COVID-19 : An Within-Host Modeling Study

    Full text link
    The COVID-19 pandemic has resulted in more than 30.35 million infections and 9, 50, 625 deaths in 212 countries over the last few months. Different drug intervention acting at multiple stages of pathogenesis of COVID-19 can substantially reduce the infection induced mortality. The current within-host mathematical modeling studies deals with the optimal drug regimen and the efficacy of combined therapy in treatment of COVID-19. The drugs/interventions considered include Arbidol, Remdesivir, Inteferon (INF) and Lopinavir/Ritonavir. It is concluded that these drug interventions when administered individually or in combination reduce the infected cells and viral load. Four scenarios involving administration of single drug intervention, two drug interventions, three drug interventions and all the four have been discussed. In all these scenarios the optimal drug regimen is proposed based on two methods. In the first method these medical interventions are modeled as control interventions and a corresponding objective function and optimal control problem is formulated. In this setting the optimal drug regimen is proposed. Later using the the comparative effectiveness method the optimal drug regimen is proposed based on basic reproduction number and viral load. The average infected cell count and viral load decreased the most when all the four interventions were applied together. On the other hand the average susceptible cell count decreased the best when Arbidol alone was administered. The basic reproduction number and viral count decreased the best when all the four interventions were applied together reinstating the fact obtained earlier in the optimal control setting. These findings may help physicians with decision making in treatment of life-threatening COVID-19 pneumonia.Comment: 16 pages, 13 figure

    SNP Discovery for mapping alien introgressions in wheat

    Get PDF
    Citation: Tiwari, V., . . . & Gill, B. (2014). SNP Discovery for mapping alien introgressions in wheat. BMC Genomics, 15(1), 273-284. https://doi.org/10.1186/1471-2164-15-273Background: Monitoring alien introgressions in crop plants is difficult due to the lack of genetic and molecular mapping information on the wild crop relatives. The tertiary gene pool of wheat is a very important source of genetic variability for wheat improvement against biotic and abiotic stresses. By exploring the 5M[superscript g] short arm (5M[superscript g]S) of Aegilops geniculata, we can apply chromosome genomics for the discovery of SNP markers and their use for monitoring alien introgressions in wheat (Triticum aestivum L). Results: The short arm of chromosome 5M[superscript g] of Ae. geniculata Roth (syn. Ae. ovata L.; 2n = 4x = 28, U[superscript g]U[superscript g]M[superscript g]M[superscript g]) was flow-sorted from a wheat line in which it is maintained as a telocentric chromosome. DNA of the sorted arm was amplified and sequenced using an Illumina Hiseq 2000 with ~45x coverage. The sequence data was used for SNP discovery against wheat homoeologous group-5 assemblies. A total of 2,178 unique, 5M[superscript g]S-specific SNPs were discovered. Randomly selected samples of 59 5M[superscript g]S-specific SNPs were tested (44 by KASPar assay and 15 by Sanger sequencing) and 84% were validated. Of the selected SNPs, 97% mapped to a chromosome 5M[superscript g] addition to wheat (the source of t5M[superscript g]S), and 94% to 5M[superscript g] introgressed from a different accession of Ae. geniculata substituting for chromosome 5D of wheat. The validated SNPs also identified chromosome segments of 5M[superscript g]S origin in a set of T5D-5M[superscript g] translocation lines; eight SNPs (25%) mapped to TA5601 [T5DL · 5DS-5M[superscript g]S(0.75)] and three (8%) to TA5602 [T5DL · 5DS-5M[superscript g]S (0.95)]. SNPs (gsnp_5ms83 and gsnp_5ms94), tagging chromosome T5DL · 5DS-5M[superscript g]S(0.95) with the smallest introgression carrying resistance to leaf rust (Lr57) and stripe rust (Yr40), were validated in two released germplasm lines with Lr57 and Yr40 genes. Conclusion: This approach should be widely applicable for the identification of species/genome-specific SNPs. The development of a large number of SNP markers will facilitate the precise introgression and monitoring of alien segments in crop breeding programs and further enable mapping and cloning novel genes from the wild relatives of crop plants

    Search for intermediate mass black hole binaries in the first observing run of Advanced LIGO

    No full text
    International audienceDuring their first observational run, the two Advanced LIGO detectors attained an unprecedented sensitivity, resulting in the first direct detections of gravitational-wave signals produced by stellar-mass binary black hole systems. This paper reports on an all-sky search for gravitational waves (GWs) from merging intermediate mass black hole binaries (IMBHBs). The combined results from two independent search techniques were used in this study: the first employs a matched-filter algorithm that uses a bank of filters covering the GW signal parameter space, while the second is a generic search for GW transients (bursts). No GWs from IMBHBs were detected; therefore, we constrain the rate of several classes of IMBHB mergers. The most stringent limit is obtained for black holes of individual mass 100  M⊙, with spins aligned with the binary orbital angular momentum. For such systems, the merger rate is constrained to be less than 0.93  Gpc−3 yr−1 in comoving units at the 90% confidence level, an improvement of nearly 2 orders of magnitude over previous upper limits
    corecore