5,947 research outputs found

    Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions

    Get PDF
    This study reviews and analyses the research landscape for intrusion detection systems (IDSs) based on deep learning (DL) techniques into a coherent taxonomy and identifies the gap in this pivotal research area. The focus is on articles related to the keywords ‘deep learning’, ‘intrusion’ and ‘attack’ and their variations in four major databases, namely Web of Science, ScienceDirect, Scopus and the Institute of Electrical and Electronics Engineers’ Xplore. These databases are sufficiently broad to cover the technical literature. The dataset comprises 68 articles. The largest proportion (72.06%; 49/68) relates to articles that develop an approach for evaluating or identifying intrusion detection techniques using the DL approach. The second largest proportion (22.06%; 15/68) relates to studying/applying articles to the DL area, IDSs or other related issues. The third largest proportion (5.88%; 4/68) discusses frameworks/models for running or adopting IDSs. The basic characteristics of this emerging field are identified from the aspects of motivations, open challenges that impede the technology’s utility, authors’ recommendations and substantial analysis. Then, a result analysis mapping for new directions is discussed. Three phases are designed to meet the demands of detecting distributed denial-of-service attacks with a high accuracy rate. This study provides an extensive resource background for researchers who are interested in IDSs based on DL

    Independent [1,2]-number versus independent domination number

    Get PDF
    A [1, 2]-set S in a graph G is a vertex subset such that every vertex not in S has at least one and at most two neighbors in it. If the additional requirement that the set be independent is added, the existence of such sets is not guaranteed in every graph. In this paper we provide local conditions, depending on the degree of vertices, for the existence of independent [1, 2]-sets in caterpillars. We also study the relationship between independent [1, 2]-sets and independent dominating sets in this graph class, that allows us to obtain an upper bound for the associated parameter, the independent [1, 2]-number, in terms of the independent domination number.Peer ReviewedPostprint (published version

    Management of early blight of potato using bio control agents and plant extracts

    Get PDF
    The early blight of potato is mainly controlled by using chemical fungicides but chemical fungicides have got some adverse effect on environment as well as human beings. Keeping this in mind an experiment was conducted to test the efficacy of four plant extracts (tea, garlic, onion and neem leaf extract) and four bio-control agents (Trichoderma viride, Pseudomonas fluorescence, Streptomyces graseoviridis and Bacillus substilis) in controlling early blight of potato under field and in in vitro condition. These antifungal compounds were applied 3 times at 7days interval after first appearance of the disease in the field. Among the bio control agents T. viride was found highly effective in per cent disease reduction (52.39%) of disease over control treatment. The tuber yield (25.51 t/ ha.) was also highest in this treatment compared to control treatment (19.53 t/ha). This was followed by treatment T2 i.e. P. fluorescens where per cent incidence and intensity of disease were (65.00%) and (19.10%) respectively with 38.97% reduction of disease over control with tuber yield 23.65 t/ha. It was followed by S. graseoviridis where per cent incidence and intensity of disease were (68.00%) and (22.90%) respectively with 26.30% reduction of disease over control with tuber yield 21.07 t/ha. Among plant extracts, only neem leaf extract exhibited per cent reduction of disease (33.18%) over control treatment in field condition and inhibition of radial growth (59.85%) and spore germination (81.95%) in in vitro condition. Therefore both T. viride and neem can be used for managing the early blight of potato

    Scalability Improvement Of Multicast Source Movement Over Mobile Ipv6 Using Clustering Technique

    Get PDF
    Mobile IPv6 (MIPv6) describes how a mobile node can change its point of attachment to the Internet. While MIPv6 focuses on unicast communications, it also proposes two basic mechanisms, known as bi-directional tunnelling and remote subscription, to handle multicast communications with mobile members. In the mean time, the deployment of Source-Specific Multicast (SSM) is of great interest, using the Protocol Independent Multicast-Sparse Mode (PIM-SM) and Multicast Listener Discovery (MLDv2) protocols. In the particular case of mobile IPv6 SSM sources, the mechanism proposed in MIPv6 to support multicast communications introduced a number of problems that need to be addressed. First, in most scenarios the MIPv6 solution leads to suboptimal routing by setting up a tunnel to forward packets between the home agent in its home network and the current location in the foreign network. The use of a third party when roaming which is the home agent leads to suboptimal routing. Second, it introduces a central point of failure (i.e. the Home Agent (HA)) that is not to be neglected. The proposed MIPv6 solution also induces a great traffic concentration around this central point. Third, the processing task of the central point increases with the number of mobile sources it serves, thus reducing the efficiency of multicast delivery. The objective of this thesis is to remove some of the obstacles encountered in the way of multicast deployment in the Internet, thereby making Mobile IPv6 better equipped to support mobile SSM sources. Recent proposals to provide multicasting over mobile IP focuses mainly on recipient mobility but little attention has been given to the case of source mobility. This thesis attempts to address this problem. The basic essence of the problem is that while the effect of receiver movement on the multicast tree is local, the effect of source movement may be global and it may affect the complete multicast delivery tree. The initial design was motivated by the need to support one-to-many and many-to-many applications in a scalable fashion. Such applications cannot be serviced efficiently with unicast delivery. As the overall problem statement of “Scalability Improvement of Multicast Source Movement over IPv6 Using Clustering Technique” is extremely complex, we divide the problem into the following components: build the multicast delivery tree for source specific multicast which is a routing issue; clustering receivers based on their IPv6 addresses; improve the state scalability of these clusters which is a deployment issue; find an efficient way for service distribution which is a deployment issue as well; and finally, the seamless integration of the work with Mobile IPv6 allowing it to support multicast efficiently for mobile nodes. The combined solution provides a comprehensive procedure for planning and managing a multicast-based IPv6 network. The outcome of this thesis are: a software to represent an architecture of a multicast delivery tree for one-to-many type of group communication, a group management scheme that could handle the end nodes subscription/un-subscription process with the required updates, an average subscription delay of between 0.255 ms-0.530 ms and un-subscription delay of between 0.0456 ms-0.087 ms for up to 50000 nodes, an approach to multicast forwarding state reduction that could support small-size groups as well as large-size groups, and finally the integration of the work with Mobile IPv6 to handle the multicast source movement

    Effect of Blood Glucose Concentrations on the Development of Chronic Complications of Diabetes Mellitus

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/90229/1/j.1875-9114.1998.tb03927.x.pd

    Fork rotation and DNA precatenation are restricted during DNA replication to prevent chromosomal instability

    Get PDF
    Faithful genome duplication and inheritance require the complete resolution of all intertwines within the parental DNA duplex. This is achieved by topoisomerase action ahead of the replication fork or by fork rotation and subsequent resolution of the DNA precatenation formed. Although fork rotation predominates at replication termination, in vitro studies have suggested that it also occurs frequently during elongation. However, the factors that influence fork rotation and how rotation and precatenation may influence other replication-associated processes are unknown. Here we analyze the causes and consequences of fork rotation in budding yeast. We find that fork rotation and precatenation preferentially occur in contexts that inhibit topoisomerase action ahead of the fork, including stable protein–DNA fragile sites and termination. However, generally, fork rotation and precatenation are actively inhibited by Timeless/Tof1 and Tipin/Csm3. In the absence of Tof1/Timeless, excessive fork rotation and precatenation cause extensive DNA damage following DNA replication. With Tof1, damage related to precatenation is focused on the fragile protein–DNA sites where fork rotation is induced. We conclude that although fork rotation and precatenation facilitate unwinding in hard-to-replicate contexts, they intrinsically disrupt normal chromosome duplication and are therefore restricted by Timeless/Tipin

    The 8 o'clock Arc: A Serendipitous Discovery of a Strongly Lensed Lyman Break Galaxy in the SDSS DR4 Imaging Data

    Get PDF
    We report on the serendipitous discovery of the brightest Lyman Break Galaxy (LBG) currently known, a galaxy at z=2.73 that is being strongly lensed by the z=0.38 Luminous Red Galaxy (LRG) SDSS J002240.91+143110.4. The arc of this gravitational lens system, which we have dubbed the "8 o'clock arc" due to its time of discovery, was initially identified in the imaging data of the Sloan Digital Sky Survey Data Release 4 (SDSS DR4); followup observations on the Astrophysical Research Consortium (ARC) 3.5m telescope at Apache Point Observatory confirmed the lensing nature of this system and led to the identification of the arc's spectrum as that of an LBG. The arc has a spectrum and a redshift remarkably similar to those of the previous record-holder for brightest LBG (MS 1512-cB58, a.k.a "cB58"), but, with an estimated total magnitude of (g,r,i) = (20.0,19.2,19.0) and surface brightness of (mu_g,mu_r,mu_i) = (23.3, 22.5, 22.3) mag/arcsec^2, the 8 o'clock arc is thrice as bright. The 8 o'clock arc, which consists of three lensed images of the LBG, is 162deg (9.6arcsec) long and has a length-to-width ratio of 6:1. A fourth image of the LBG -- a counter-image -- can also be identified in the ARC 3.5m g-band images. A simple lens model for the system assuming a singular isothermal ellipsoid potential yields an Einstein radius of 2.91+/-0.14 arcsec, a total mass for the lensing LRG (within the (10.6+/-0.5)/h kpc enclosed by the lensed images) of 1.04x10^12/h Msun, and a magnification factor for the LBG of 12.3(+15/-3.6). The LBG itself is intrinsically quite luminous (approximately 6L*) and shows indications of massive recent star formation, perhaps as high as 160/h Msun/year.Comment: 4 pages 5 figures, submitted to ApJ Letter

    Microblogging in higher education: a comparative study

    Get PDF
    Microblogging has become an increasingly popular phenomenon in educational context. There is currently little research regarding the educational advantages of microblogging dedicated to teaching and learning. Although educational microblogging provides great learning applications that can support formal learning environment, the advantages of these websites are oftentimes ignored. In order to investigate the largely unexplored benefits of educational microblogging, this research offers an opportunity to investigate the effect of microblogging using Community of Inquiry (CoI) model in a blended learning. The researchers used pre-questionnaire and post-questionnaire for evaluating the level of students' teaching, social and cognitive presence before and after using microblogging based on the CoI model. The questionnaires were distributed in two classes of 107 students in Universiti Teknologi Malaysia. Through statistical analysis by using t-test analysis, the usage of microblogging is proven to enhance students' cognitive, social and teaching presence. The results of this research offer an insight to the positive impact of the use of microblogging in higher education and its outcomes would open the door to new ways of learning and the nature of cooperative culture and new application tools
    corecore