35 research outputs found

    M.Nalini Sri KL University,Vijayawada

    Full text link
    Network based intrusion detection system use the models of attacks to identify intrusive behavior ability of systems to detect attacks by quality of models which are called signatures. Some attacks exploits in different ways. For this reason we use testing tools that able to detect goodness of signatures. This technique describes test and evaluate misuse detection models in the case of network-based intrusion detection systems. we use Mutant Exploits are working against vulnerability applications. This mutant exploit is based on mechanism to generate large no. of exploit by applying mutant operators. The results of the systems in detecting these variations pro-vide a quantitative basis for the evaluation of the quality of the corresponding detection model. but here we are going to find defects of this testing and is this test will provide 100 % security for this system (or) not. and also which technique gives much security among these techniques fuzzy logic, neural networks, hybrid fuzzy and neural networks, naïve bayes, genetic algorithms and data mining

    A Randomized Controlled Trial on Cross Infection Control in Maxillofacial Trauma Surgery A Comparison of Intermaxillary Fixation Techniques

    Full text link
    Aim: The purpose of the present research was to evaluate the intermaxillary fixation techniques in maxillofacial trauma surgery in terms of cross infection control. Methodology: A randomized controlled trial which included 120 patients with fractures of the mandible requiring open reduction and fixation. The participants were allocated either to the study group and treated with intraoperative Rapid IMF or to the control group and managed with intraoperative eyelet wire ties. Results: Rapid IMF group had significantly fewer glove perforations than the traditional method (0.67 per operation compared with 1.5), (P < 0.0001). The incidence of skin-penetrating injuries was the same in both groups (rate 0.02/ procedure). The application of Rapid IMF was significantly Faster than wiring (P < 0.0001). Minor intraoperative complications were noted in both groups, but more in the Rapid IMF group. Most concerned loosening or fracture of the anchorage ties but the surgical outcome was not affected. Conclusion: Rapid IMF is a safer alternative to wiring methods with significant reduction in glove perforation rates and is quicker to apply than conventional wiring techniques
    corecore