485 research outputs found
A Survey: Data Leakage Detection Techniques
Data is an important property of various organizations and it is intellectual property of organization. Every organization includes sensitive data as customer information, financial data, data of patient, personal credit card data and other information based on the kinds of management, institute or industry. For the areas like this, leakage of information is the crucial problem that the organization has to face, that poses high cost if information leakage is done. All the more definitely, information leakage is characterize as the intentional exposure of individual or any sort of information to unapproved outsiders. When the important information is goes to unapproved hands or moves towards unauthorized destination. This will prompts the direct and indirect loss of particular industry in terms of cost and time. The information leakage is outcomes in vulnerability or its modification. So information can be protected by the outsider leakages. To solve this issue there must be an efficient and effective system to avoid and protect authorized information. From not so long many methods have been implemented to solve same type of problems that are analyzed here in this survey. This paper analyzes little latest techniques and proposed novel Sampling algorithm based data leakage detection techniques
Permission based Mobile Malware Detection System using Machine Learning Techniques
Mobile technology has grown dramatically around the world. Nowadays smart mobile devices are ubiquitous, i.e. they serve multiple purposes such as personal mobile communication, data storage, multimedia and entertainment etc. They have become important part of life. Implementing secure mobile and wireless networks is crucial for enterprises operating in the Internet-based business environment. Mobile market share has grown significantly in past few years so that we need to think about mobile security. Mobile security can be compromised due to design flaws, vulnerabilities, and protocol failures in any mobile applications, viruses, spyware, malware and other threats. In this paper we will more focus on mobile malware. Many tools are available in the market to detect malware but new research trend in the mobile security is users should be aware of app before he/she installs from the app store. Hence we propose a novel approach for permission based mobile malware detection system. It is based on static analysis. It has 3 major parts in it 1) a signature database for storing analysis results of training and testing. 2) An Android client who is used by end users for making analysis requests, and 3) a central server plays important role as it communicates with both signature database and smartphone client. We can say that he is the manager of whole analysis process. It alerts user if the app is malicious or the benign based on it user can proceed whether to continue with it or not
The Pattern of Benign Breast Diseases in Rural Hospital in India
Background: Benign breast diseases are most common cause of breast problems. Up to 30% of women suffer from benign breast diseases and requiring treatment at some time in their lives. Benign breast diseases are 5 to 10 times more common than breast cancer. Until recently benign disorders of the breast has been given less importance than breast cancer. Consequently, many patients with benign breast diseases receive little attention from clinicians.Methods: The present cross-sectional study was carried out in Acharya Vinoba Bhave Rural Medical College and Hospital during the period April 2007 to September 2009. A total of 481 patients had breast disease, among these 380 patients had benign breast disease and which are included in the study.Results: Among all the benign breast diseases, right sided breast involvement was more common constituting 181 (47.63%) cases while left breast involvement was less common constituting 151 (39.73%) of the patients. Bilateral involvement was seen in only 48 (12.63%) of patients. The pattern of benign breast disease, fibroadenoma was the most common lesion constituting 160 (42.1%) cases
Lipoic acid and diabetes-Part III: Metabolic role of acetyl dihydrolipoic acid
Rat liver lipoyl transacetylase catalyzes the formation of acetyl dihydrolipoic acid from acetyl coenzyme A and dihydrolipoic acid. In an earlier paper the formation of acetyl dihydrolipoic from pyruvate and dihydrolipoic acid catalyzed by pyruvate dehydrogenase has been reported. Acetyl dihydrolipoic acid is a substrate for citrate synthase, acetyl coenzyme A carboxylase and fatty acid synthetase. The Vmax for citrate synthase with acetyl dihydrolipoic acid was identical to acetyl coenzyme A (approximately 1 μmol citrate formed/min/mg protein) while the apparent Km was approximately 4 times higher with acetyl dihydrolipoic acid as the substrate. This may be due to the fact that synthetic acetyl dihydrolipoic acid is a mixture of 4 possible isomers and only one of them may be the substrate for the enzymatic reaction. While dihydrolipoic acid can replace coenzyme A in the activation of succinate catalyzed by succinyl coenzyme A synthetase, the transfer of coenzyme A between succinate and acetoacetyl dihydrolipoic acid catalyzed by succinyl coenzyme A: 3 oxo-acid coenzyme A transferase does not occur
Lipoic acid and diabetes II: Mode of action of lipoic acid
Intraperitoneal administration of lipoic acid (10 mg/100 g) does not effect changes in serum insulin levels in normal and alloxan diabetic rats, while normalising increased serum pyruvate, and impaired liver pyruvic dehydrogenase characteristic of the diabetic state. Dihydrolipoic acid has been shown to participate in activation of fatty acids with equal facility as coenzyme A. Fatty acyl dihydrolipoic acid however is sparsely thiolyzed to yield acetyl dihydrolipoic acid. Also acetyl dihydrolipoic acid does not activate pyruvate carboxylase unlike acetyl coenzyme A. The reduced thiolysis of β-keto fatty acyl dihydrolipoic acid esters and the lack of activation of pyruvic carboxylase by acetyl dihydrolipoic acid could account for the antiketotic and antigluconeogenic effects of lipoic acid
- …