1,043 research outputs found
Recommended from our members
Secure communication using dynamic VPN provisioning in an Inter-Cloud environment
Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualised computing resources as on-demand and dynamic services. Nevertheless, a single cloud does not have limitless resources to offer to its users, hence the notion of an Inter-Cloud enviroment where a cloud can use the infrastructure resources of other clouds. However, there is no common framework in existence that allows the srevice owners to seamlessly provision even some basic services across multiple cloud service providers, albeit not due to any inherent incompatibility or proprietary nature of the foundation technologies on which these cloud platforms are built. In this paper we present a novel solution which aims to cover a gap in a subsection of this problem domain. Our solution offer a security architecture that enables service owners to provision a dynamic and service-oriented secure virtual private network on top of multiple cloud IaaS providers. It does this by leveraging the scalability, robustness and flexibility of peer- to-peer overlay techniques to eliminate the manual configuration, key management and peer churn problems encountered in setting up the secure communication channels dynamically, between different components of a typical service that is deployed on multiple clouds. We present the implementation details of our solution as well as experimental results carried out on two commercial clouds
Recommended from our members
Dynamic virtual private network provisioning from multiple cloud infrastructure service providers
The Cloud infrastructure service providers currently provision basic virtualized computing resources as on demand and dynamic services but there is no common framework in existence that allows the seamless provisioning of even these basic services across multiple cloud service providers, although this is not due to any inherent incompatibility or proprietary nature of the foundation technologies on which these cloud platforms are built. We present a solution idea which aims to provide a dynamic and service oriented provisioning of secure virtual private networks on top of multiple cloud infrastructure service providers. This solution leverages the benefits of peer to peer overlay networks, i.e., the flexibility and scalability to handle the churn of nodes joining and leaving the VPNs and can adapt the topology of the VPN as per the requirements of the applications utilizing its intercloud secure communication framework
Nuclear Effects in Neutrino Induced Coherent Pion Production at K2K and MiniBooNE Neutrino Energies
The coherent pion production induced by neutrinos in nuclei is studied using
a delta hole model in local density approximation taking into account the
renormalization of properties in a nuclear medium. The pion absorption
effects have been included in an eikonal approximation. These effects give a
large reduction in the total cross section. The numerical results for the total
cross section are found to be consistent with recent experimental results from
K2K and MiniBooNE collaborations and other older experiments in the
intermediate energy region.Comment: 4pages, 5figure
The Induction and Evaluation of Productive Semidwarf Mutants of Basmati-370
Dry, uniform seeds of Basmati 370 with about 14% moisture content were exposed to 0, 15,20 and
25kR doses of gamma rays (60Co source). Twenty one semi-dwarf mutants were selected from 36,000 M2
plants originating from about 12,000 Ml plants. The breeding behaviour of these mutants was studied
in M3 and consequently 6 mutants were selected. The comparative yield test of mutants with mother
cultivar Basmati-370, established the high yield potential and semi-dwarf plant posture of mutant strains.
The other plant attributes as well as physico-chemical traits of the mutants and parent cultivar are also
presented
Recommended from our members
A low-overhead secure communication framework for an inter-cloud environment
Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualized computing resources as on-demand and dynamic services. Nevertheless, a single cloud provider may not have limitless resources to offer to its users, hence the notion of an Inter-Cloud environment where a cloud can use the infrastructure resources of other clouds. However, there is no common framework in existence that allows the service owners to seamlessly provision even some basic services across multiple cloud service providers, albeit not due to any inherent incompatibility or proprietary nature of the foundation technologies on which these cloud platforms are built. In this paper we present a novel solution which aims to cover a gap in a subsection of this problem domain. Our solution offers a security architecture that enables service owners to provision a dynamic and service-oriented secure virtual private network on top of multiple cloud IaaS providers. It does this by leveraging the scalability, robustness and flexibility of peer-to-peer overlay techniques to eliminate the manual configuration, key management and peer churn problems encountered in setting up the secure communication channels dynamically, between different components of a typical service that is deployed on multiple clouds. We present the implementation details of our solution as well as experimental results detailing the overheads of our solution carried out on two commercial clouds
Stability and Well-posedness of a Nonlinear Railway Track Model
Railway tracks rest on a foundation known for exhibiting nonlinear
viscoelastic behavior. Railway track deflections are modeled by a semilinear
partial differential equation. This paper studies the stability of solutions to
this equation in presence of an input. With the aid of a suitable Lyapunov
function, existence and exponential stability of classical solutions is
established for certain inputs. The Lyapunov function is further used to find
an a-priori estimate of the solutions, and also to study the input-to-state
stability (ISS) of mild solutions
Post stroke seizures: descriptive study from a tertiary care centre in Pakistan
OBJECTIVE: To determine the frequency, mode of onset and outcome of post stroke seizures in a local setting.
METHODS: The retrospective (Aug 1999 to July 2001) and prospective (August 2001 to July 2002) data of patients aged 14 years and above, with post stroke seizures was collected from a tertiary care centre in a metropolitan city. The demographic, clinical, radiological, laboratory, neurophysiologic and outcome data was recorded and analyzed.
RESULTS: During the three year period 1548 patients with stroke were admitted to the hospital. Four hundred thirty one (28%) had intracerebral haemorrhage (ICH) and 1117 (72%) had ischaemic stroke. One hundred seventeen (8%) of the 1548 had seizures. Their mean age was 63 +/- 12 (range; 15-70) years. Fifty-nine (50%) were men and 58 (50%) were women. Twenty of 431(5%) patients with ICH and 97/1117 (9%) with ischaemic stroke, developed seizures. Nine of 117 (8%) developed a seizure within 14 days of stroke and 108/117 (92%) developed seizures after 14 days of stroke. Twenty-six (22%) had partial and 91 (78%) had generalized seizures. Two patients expired early in the course. Twenty four (21%) of these continued to have seizures at one year follow up. Fifteen of 37 (40%) patients who had systemic infections early in the course continued to have seizures at one year as compared to 9/80 (11%) who did not (p = 0.001).
CONCLUSIONS: Frequency of post stroke seizures is the same as reported in western literature. Post stroke seizures are more common in patients with ischaemic stroke. Generalized seizures are more common than partial seizures. Systemic infections early in the course are associated with recurrence of seizures at one year
Recommended from our members
Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment
Searchable Encryption allows a user or organization to outsource their encrypted documents to a Cloud-based storage service, while maintaining the ability to perform keyword searches over the encrypted text. However, most of the existing search schemes do not take the almost certain presence of typographical errors in the documents under consideration, when trying to obtain meaningful and accurate results. This paper presents a novel ranked searchable encryption scheme that addresses this issue by supporting fuzzy keywords. The proposed construction is based on probabilistic trapdoors that help resist distinguishability attacks. This paper for the first time proposes Searchable Encryption as a Service (SEaaS). The proposed construction is deployed on the British Telecommunication’s public Cloud architecture and evaluated over a real-life speech corpus. Our security analysis yields that the construction satisfies strong security guarantees and is also quiet lightweight, by analyzing its performance over the speech corpus
- …