2,774 research outputs found

    Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions

    Get PDF
    This study reviews and analyses the research landscape for intrusion detection systems (IDSs) based on deep learning (DL) techniques into a coherent taxonomy and identifies the gap in this pivotal research area. The focus is on articles related to the keywords ‘deep learning’, ‘intrusion’ and ‘attack’ and their variations in four major databases, namely Web of Science, ScienceDirect, Scopus and the Institute of Electrical and Electronics Engineers’ Xplore. These databases are sufficiently broad to cover the technical literature. The dataset comprises 68 articles. The largest proportion (72.06%; 49/68) relates to articles that develop an approach for evaluating or identifying intrusion detection techniques using the DL approach. The second largest proportion (22.06%; 15/68) relates to studying/applying articles to the DL area, IDSs or other related issues. The third largest proportion (5.88%; 4/68) discusses frameworks/models for running or adopting IDSs. The basic characteristics of this emerging field are identified from the aspects of motivations, open challenges that impede the technology’s utility, authors’ recommendations and substantial analysis. Then, a result analysis mapping for new directions is discussed. Three phases are designed to meet the demands of detecting distributed denial-of-service attacks with a high accuracy rate. This study provides an extensive resource background for researchers who are interested in IDSs based on DL

    Independent [1,2]-number versus independent domination number

    Get PDF
    A [1, 2]-set S in a graph G is a vertex subset such that every vertex not in S has at least one and at most two neighbors in it. If the additional requirement that the set be independent is added, the existence of such sets is not guaranteed in every graph. In this paper we provide local conditions, depending on the degree of vertices, for the existence of independent [1, 2]-sets in caterpillars. We also study the relationship between independent [1, 2]-sets and independent dominating sets in this graph class, that allows us to obtain an upper bound for the associated parameter, the independent [1, 2]-number, in terms of the independent domination number.Peer ReviewedPostprint (published version

    Fork rotation and DNA precatenation are restricted during DNA replication to prevent chromosomal instability

    Get PDF
    Faithful genome duplication and inheritance require the complete resolution of all intertwines within the parental DNA duplex. This is achieved by topoisomerase action ahead of the replication fork or by fork rotation and subsequent resolution of the DNA precatenation formed. Although fork rotation predominates at replication termination, in vitro studies have suggested that it also occurs frequently during elongation. However, the factors that influence fork rotation and how rotation and precatenation may influence other replication-associated processes are unknown. Here we analyze the causes and consequences of fork rotation in budding yeast. We find that fork rotation and precatenation preferentially occur in contexts that inhibit topoisomerase action ahead of the fork, including stable protein–DNA fragile sites and termination. However, generally, fork rotation and precatenation are actively inhibited by Timeless/Tof1 and Tipin/Csm3. In the absence of Tof1/Timeless, excessive fork rotation and precatenation cause extensive DNA damage following DNA replication. With Tof1, damage related to precatenation is focused on the fragile protein–DNA sites where fork rotation is induced. We conclude that although fork rotation and precatenation facilitate unwinding in hard-to-replicate contexts, they intrinsically disrupt normal chromosome duplication and are therefore restricted by Timeless/Tipin

    Internalized Stigma of Mental Illness among Schizophrenic Patients and Their Families (Comparative Study)

    Get PDF
    This study was a comparative study aiming to assess the extent of internalized stigma of mental illness among patients with schizophrenia& Identify stigma as perceived by family members caring schizophrenic patients. The study was conducted in two settings 1st clinic was outpatient clinic for psychiatric patient affiliated to Abbasia hospitals which provided care for all sectors in Egyptians community.2nd clinic was out patients clinic  for psychiatric patient affiliated to Abha psychiatric hospitals which providing care for all psychiatric patients at Asser region. 4 instruments were used for collecting the data, interviewing questionnaire, Insight scale, Internalized Stigma of Mental Illness Scale and Stigma Impact Scale: Caregiver (SIS) .The main result revealed that, there were    highly statistically significant differences between patients regarding level of internalizing stigma and the most of family caregivers in both group have moderate impact of internalizing stigma. The     study   recommended that further research to assess impact of mental illness stigma upon schizophrenic quality of life. Keywords: stigma – mental illness - perceived discrimination –devaluation - Internalized stigm

    Teaching Tip: Hook, Line, and Sinker – The Development of a Phishing Exercise to Enhance Cybersecurity Awareness

    Get PDF
    In this paper, we describe the development of an in-class exercise designed to teach students how to craft social engineering attacks. Specifically, we focus on the development of phishing emails. Providing an opportunity to craft offensive attacks not only helps prepare students for a career in penetration testing but can also enhance their ability to detect and defend against similar methods. First, we discuss the relevant background. Second, we outline the requirements necessary to implement the exercise. Third, we describe how we implemented the exercise. Finally, we discuss our results and share student feedback

    Management of early blight of potato using bio control agents and plant extracts

    Get PDF
    The early blight of potato is mainly controlled by using chemical fungicides but chemical fungicides have got some adverse effect on environment as well as human beings. Keeping this in mind an experiment was conducted to test the efficacy of four plant extracts (tea, garlic, onion and neem leaf extract) and four bio-control agents (Trichoderma viride, Pseudomonas fluorescence, Streptomyces graseoviridis and Bacillus substilis) in controlling early blight of potato under field and in in vitro condition. These antifungal compounds were applied 3 times at 7days interval after first appearance of the disease in the field. Among the bio control agents T. viride was found highly effective in per cent disease reduction (52.39%) of disease over control treatment. The tuber yield (25.51 t/ ha.) was also highest in this treatment compared to control treatment (19.53 t/ha). This was followed by treatment T2 i.e. P. fluorescens where per cent incidence and intensity of disease were (65.00%) and (19.10%) respectively with 38.97% reduction of disease over control with tuber yield 23.65 t/ha. It was followed by S. graseoviridis where per cent incidence and intensity of disease were (68.00%) and (22.90%) respectively with 26.30% reduction of disease over control with tuber yield 21.07 t/ha. Among plant extracts, only neem leaf extract exhibited per cent reduction of disease (33.18%) over control treatment in field condition and inhibition of radial growth (59.85%) and spore germination (81.95%) in in vitro condition. Therefore both T. viride and neem can be used for managing the early blight of potato

    Scalability Improvement Of Multicast Source Movement Over Mobile Ipv6 Using Clustering Technique

    Get PDF
    Mobile IPv6 (MIPv6) describes how a mobile node can change its point of attachment to the Internet. While MIPv6 focuses on unicast communications, it also proposes two basic mechanisms, known as bi-directional tunnelling and remote subscription, to handle multicast communications with mobile members. In the mean time, the deployment of Source-Specific Multicast (SSM) is of great interest, using the Protocol Independent Multicast-Sparse Mode (PIM-SM) and Multicast Listener Discovery (MLDv2) protocols. In the particular case of mobile IPv6 SSM sources, the mechanism proposed in MIPv6 to support multicast communications introduced a number of problems that need to be addressed. First, in most scenarios the MIPv6 solution leads to suboptimal routing by setting up a tunnel to forward packets between the home agent in its home network and the current location in the foreign network. The use of a third party when roaming which is the home agent leads to suboptimal routing. Second, it introduces a central point of failure (i.e. the Home Agent (HA)) that is not to be neglected. The proposed MIPv6 solution also induces a great traffic concentration around this central point. Third, the processing task of the central point increases with the number of mobile sources it serves, thus reducing the efficiency of multicast delivery. The objective of this thesis is to remove some of the obstacles encountered in the way of multicast deployment in the Internet, thereby making Mobile IPv6 better equipped to support mobile SSM sources. Recent proposals to provide multicasting over mobile IP focuses mainly on recipient mobility but little attention has been given to the case of source mobility. This thesis attempts to address this problem. The basic essence of the problem is that while the effect of receiver movement on the multicast tree is local, the effect of source movement may be global and it may affect the complete multicast delivery tree. The initial design was motivated by the need to support one-to-many and many-to-many applications in a scalable fashion. Such applications cannot be serviced efficiently with unicast delivery. As the overall problem statement of “Scalability Improvement of Multicast Source Movement over IPv6 Using Clustering Technique” is extremely complex, we divide the problem into the following components: build the multicast delivery tree for source specific multicast which is a routing issue; clustering receivers based on their IPv6 addresses; improve the state scalability of these clusters which is a deployment issue; find an efficient way for service distribution which is a deployment issue as well; and finally, the seamless integration of the work with Mobile IPv6 allowing it to support multicast efficiently for mobile nodes. The combined solution provides a comprehensive procedure for planning and managing a multicast-based IPv6 network. The outcome of this thesis are: a software to represent an architecture of a multicast delivery tree for one-to-many type of group communication, a group management scheme that could handle the end nodes subscription/un-subscription process with the required updates, an average subscription delay of between 0.255 ms-0.530 ms and un-subscription delay of between 0.0456 ms-0.087 ms for up to 50000 nodes, an approach to multicast forwarding state reduction that could support small-size groups as well as large-size groups, and finally the integration of the work with Mobile IPv6 to handle the multicast source movement

    Effect of Blood Glucose Concentrations on the Development of Chronic Complications of Diabetes Mellitus

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/90229/1/j.1875-9114.1998.tb03927.x.pd
    corecore