61 research outputs found

    A Literature Based Study on Cyber Security Vulnerabilities

    Get PDF
    Cloud computing has emerged from the legacy datacentres. Consequently, threats applicable in legacy system are equally applicable to cloud computing along with emerging new threats that plague only the cloud systems. Traditionally the datacentres were hosted on-premises. Hence, control over the data was comparatively easier than handling a cloud system which is borderless and ubiquitous. Threats due to multi-tenancy, access from anywhere, control of cloud, etc. are some examples of why cloud security becomes important. Considering the significance of cloud security, this work is an attempt to understand the existing cloud service and deployment models, and the major threat factors to cloud security that may be critical in cloud environment. It also highlights various methods employed by the attackers to cause the damage. Cyber-attacks are highlighted as well. This work will be profoundly helpful to the industry and researchers in understanding the various cloud specific cyber-attack and enable them to evolve the strategy to counter them more effectively

    A Literature based study on Cyber Security and Climate Changes

    Get PDF
    Cybersecurity issues constitute a key concern of today’s technology-based economies. Cybersecurity has become a core need for providing a sustainable and safe society. Considering the rapid increase of technological implementations, it has turned into a global necessity in the attempt to adapt security countermeasures whether direct or indirect and prevent systems from cyberthreats. With it, discourse on cyber security is increasingly prevalent on the national and international levels.The threat of hacking, or cyber influence, and control and ownership over information and intelligence is often the first imagined threat in relation to cyber security. This places the state, its infrastructure and its institutions at the centre of such threats but fails to consider the impact of cyber security on people at the individual level and their communities. Climate changes due to global warming and other factors, lead to reoccurring droughts,Β volatile conditions, harsh environments, exposure to unpredictable natural disasters, long winters or summer, low annual rainfall, migration and vast distances between human settlementsand other unexpected climate trends.In addition to the existing constraints and possibilities that cybersecurity and digitalisation pose for human security.This work is carried out to revisit the human-centric approaches to security in cyberspace, understanding of cybersecurity and use of cyber technologies in everyday lives of individuals and communities. It also seeks to contextualise such security influences in relation to the role of climate change and its influence on the society

    The Natural Killer Cell Cytotoxic Function Is Modulated by HIV-1 Accessory Proteins

    Get PDF
    Natural killer (NK) cells’ major role in the control of viruses is to eliminate established infected cells. The capacity of NK cells to kill virus-infected cells is dependent on the interactions between ligands on the infected cell and receptors on the NK cell surface. Because of the importance of ligand-receptor interactions in modulating the NK cell cytotoxic response, HIV has developed strategies to regulate various NK cell ligands making the infected cell surprisingly refractory to NK cell lysis. This is perplexing because the HIV-1 accessory protein Vpr induces expression of ligands for the NK cell activating receptor, NKG2D. In addition, the accessory protein Nef removes the inhibitory ligands HLA-A and -B. The reason for the ineffective killing by NK cells despite the strong potential to eliminate infected cells is due to HIV-1 Vpu’s ability to down modulate the co-activation ligand, NTB-A, from the cell surface. Down modulation of NTB-A prevents efficient NK cell degranulation. This review will focus on the mechanisms through which the HIV-1 accessory proteins modulate their respective ligands, and its implication for NK cell killing of HIV-infected cells

    Digital Transformation Of Education And Sustainability-Review Based Study

    Get PDF
    Digital transformation, however, is broader than just the digitization of existing processes. Digital transformation entails considering how products, processes and organizations can be changed through the use of new, digital technologies. A 2019 review proposes a definition of digital transformation as "a process that aims to improve an entity by triggering significant changes to its properties through combinations of information, computing, communication, and connectivity technologies.

    IMPLEMENTATION OF SPEED LIMIT ON A VEHICLE

    Get PDF
    The main objective of the paper is to provide a risk free journey for the vehicle drivers and also to the pedestrians by controlling the speed of the vehicles using radio frequency signal. To be more lucid, this paper is mainly built in order to prevent the people from breaking government laws and rules by forcing the vehicle to drive in the specified speed. This paper combines the concept of Wireless networking and Instrumentation Control engineering. Radio frequencies are used in order ensure that all vehicles are controlled using this method. Microcontrollers are used for comparing the set point and the actual speed of the motor. The sign boards acts as a radio frequency transmitter and the Vehicle acts as the receiver. The set point (accumulator) is assigned to the microcontroller which is placed inside the vehicle and the current speed of the vehicle is assigned as actual value (base register)to the microcontroller. The logic of this program is that if the current value exceeds the set point, then the speed of the vehicle is automatically controlled with the help of motor driver. A liquid crystal display is used in order to display the number of rotation of the motor before and after receiving the Radio frequency. Instead of coding every sign board to emit a particular radio frequency signal, a server is placed which sends the radio frequency to the sign boards. Thus the sign board acts both as transmitter and receiver. The server is coded in such a way that it is capable of broadcasting radio frequency at a particular frequency.Γ‚

    Effect of resonant acoustic mixing on pharmaceutical powder blends and tablets

    Get PDF
    The blending performance in a resonant acoustic mixer (RAM) was characterized. The system showed to be highly effective in blending low concentrations of cohesive active pharmaceutical ingredients (APIs) and lubricants. A summary of these results will be described and changes in material properties were observed. Those changes, and their effects on tablet characteristics, were also studied. Changes in particle size, powder flow properties, and hydrophobicity of the blend were investigated. Tablets were then compressed, using a tablet press simulator, and characterized. The tableting compression force, tablet hardness, tablet weight, and tablet dissolution were considered. Results indicated that the powder blend material properties and tablet characteristics were significantly affected by acceleration (mixing intensity), blending time, and thus, total energy input. The RAM was shown to be an excellent choice for blending low concentrations of cohesive APIs, but care must be taken when blending hydrophobic lubricants because the high-energy input can adversely affect the final tablet properties such as hardness and dissolution. In addition, the material properties of the blends and tablets were correlated to the total energy input. These correlations demonstrated that total energy, in the RAM, determines, and can be used to predict, the performance of final blends and finished product

    A Study on Components Used in Constructing the RADAR

    Get PDF
    Development of Industrial Sector in India is vital. Though a few industries in India like electrical and steel production has its place all around the world, India still has many industries that have to grow. One of the reasons, these industries do not grow is due to lack of safety measures of people working in there. In-order to take safety measures, we have introduced a Radar - a line follower, with alarm system, which is able to sense the gas leakage and the temperature of the vicinity. This can reduce the danger of hazardous gas inhale and burns due to high temperature exposure to human beings working near the plants

    On exact null controllability of Black-Scholes equation

    Get PDF
    summary:In this paper we discuss the exact null controllability of linear as well as nonlinear Black–Scholes equation when both the stock volatility and risk-free interest rate influence the stock price but they are not known with certainty while the control is distributed over a subdomain. The proof of the linear problem relies on a Carleman estimate and observability inequality for its own dual problem and that of the nonlinear one relies on the infinite dimensional Kakutani fixed point theorem with L2L^2 topology
    • …
    corecore