1,600 research outputs found

    Drag and Drop Image CAPTCHA

    Get PDF
    The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether a user is human or robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) offers a way to make such a distinction. CAPTCHA is essentially a modern implementation of Turing test, which carries out its job through a particular text based, image based or audio based challenge response system. In this paper we present a new image based CAPTCHA technique. Properties of the proposed technique offer all of the benefits of image based CAPTCHAs; grant an improved security control over the usual text based techniques and at the same time improve the user-friendliness of the Web page. Further, the paper briefly reviews various other existing CAPTCHA techniques

    System Analysis of SPAM

    Get PDF
    Increasing reliance on the electronic mail (e-mail) has attracted spammers to send more and more spam e-mails in order to maximizing their financial gains. These unwanted e-mails are not only clogging the Internet traffic but are also causing storage problems at the receiving servers. Besides these, spam e-mails also serve as a vehicle to a variety of online crimes and abuses. Although several anti-spam procedures are currently employed to distinguish spam e-mails from the legitimate e-mails yet spammers and phishes obfuscate their e-mail content to circumvent anti-spam procedures. Efficiency of anti-spam procedures to combat spam entry into the system greatly depend on their level of operation and a clear insight of various possible modes of spamming. In this paper we investigate directed graph model of Internet e-mail infrastructure and spamming modes used by spammers to inject spam into the system. The paper outlines the routes, system components, devices and protocols exploited by each spamming mode

    A Concise Study of Web Filtering

    Get PDF
    Cybercriminals are constantly developing techniques to infect computers by embedding malicious code on innocent websites and luring victims to them. To prevent data loss in a mobile connected world, corporations are employing a variety of techniques. These include filters, anti-virus software, encryption and firewalls, access control, written policies and improved employee training. This paper conducts a concise study of web filtering vis-Ã -vis their installed positions, deployment layers, employed filter technologies and comparison between Web Filters that are in place in Canada, United Kingdom, and China

    Digital Library - An Inevitable Resource for Modern Day Research in Developing Countries

    Get PDF
    Research in any area requires an extensive collection and study of relevant literature. The research literature may be found in different libraries dispersed at different geographical locations. The conventional library systems pose some potential difficulties in acquiring timely information and therefore impede the research activity. This paper presents use of digital libraries in carrying out cost-effective and quality research. With technology innovations, a commensurate progress is required in the development and maintenance of the knowledge base. Statistics have shown that the research activity has increased with the digitization of the information and its easy availability to the researchers especially in developing countries. The digital library has thus become an inevitable source of information for researchers around the globe especially in developing countries to maintain the pace of research in a highly competitive world

    Study of Botnets and Their Threats to Internet Security

    Get PDF
    Among all media of communications, Internet is most vulnerable to attacks owing to its public nature and virtually without centralized control. With the growing financial dealings and dependence of businesses on Internet, these attacks have even more increased. Whereas previously hackers would satisfy themselves by breaking into someone’s system, in today\u27s world hackers\u27 work under an organized crime plan to obtain illicit financial gains. Various attacks than include spamming, phishing, click fraud, distributed denial of services, hosting illegal material, key logging, etc. are being carried out by hackers using botnets. In this paper a detailed study of botnets vis-a-vis their creation, propagation, command and control techniques, communication protocols and relay mechanism is presented. The aim of this paper is to gain an insight of security threats that users of Internet are facing from hackers by the use of malicious botnets

    A Practical Study of E-mail Communication through SMTP

    Get PDF
    Simple Mail Transfer Protocol (SMTP) is an application layer protocol for e-mail communication. It has been adopted as a standard by Internet Engineering Task Force (IETF). SMTP has set conversational and grammatical rules for exchanging messages between connected computers. It has evolved through several revisions and extensions since its formation by Jon Postel in 1981. In SMTP, the sender establishes a full-duplex transmission channel with a receiver. The receiver may be either the ultimate destination or an intermediate forwarding agent. SMTP commands are issued by the sender and are sent to the receiver, which responds to these commands through codes. Each SMTP session between the sender and the receiver consists of three phases namely: connection establishment, mail transactions and connection termination. This paper describes and illustrates the process of e-mail communication through SMTP by issuing the individual SMTP commands directly to transmit e-mail messages. It also describes individual SMTP commands and extensions with practical implementation using a Telnet client

    Medical thoracoscopy- an experience

    Get PDF
    Background: Medical thoracoscopy is a minimally invasive procedure for diagnosing and treating pleural diseases especially undiagnosed exudative pleural effusion. It is cost effective and safe. The diagnostic yield in undiagnosed pleural effusion is excellent.Methods: This prospective observational study was done in Government Chest Disease hospital of Government Medical College, Srinagar during the period between December 2015 to Dec 2016.Thirty undiagnosed pleural effusion patients after thoracocentesis and who fulfilled inclusion and exclusion criteria’s were included in the study. Medical thoracoscopy using rigid thoracoscope was started for the first time in our hospital and was done in these enrolled patients. Clinical, Thoracoscopic findings and histopathological data of the patients were collected prospectively and analysed.Results: Maximum patients were in the age group of 41-50 years. Most common Thoracoscopic finding was multiple nodules (40%) followed by sago grain infiltration (33.4%). Malignancy was the most common HPE finding of pleural biopsy (46.6%) followed by TB (33.3%). All nodules (13) turned out to be malignant while all sago grain appearance pleura (10) turned out of to be TB. The overall diagnostic yield is 80% as a whole and 96% among patients who had thoracoscopic pleural findings.Conclusions: Medical Thoracoscopy is a safe and easy outpatient procedure and an excellent diagnostic tool for undiagnosed exudative pleural effusion. The diagnostic yield is quite high and complications of procedure are negligible

    Tuberculosis: an experience at government chest disease hospital

    Get PDF
    Background: This retrospective study was carried out to find the incidence, clinical profiles and treatment outcome of pulmonary and extrapulmonary tuberculosis patients attending the only Chest Disease Hospital in Srinagar.Methods: A retrospective analysis of 613 patients having EPTB and PTB was undertaken from the chest disease hospital of Government Medical College Srinagar. Demographic characteristics, clinical features and treatment outcome were obtained from medical case records of all patients visiting the hospital for a period of two years from May 2016-May 2018.Results: The study comprised of 613 patients, out of which 365% were having pulmonary TB while 35% were having extrapulmonary TB. Majority of patients (44.5%) in TB group were in age group 10-30 while majority of patients (42%) in EPTB group were in age group 51-70. Males were seen more commonly affected. Majority (90%) of patients in EPTB group had pleural effusion. Majority of patients (71%) were smear positive by ZN staining in PTB group. Majority (90%) of PTB patients in smear negative group were BAL negative. In PTB group 8% were treatment failure while in EPTB group 2% were treatment failure. MDR was seen in 4.2% of total tuberculosis patient while XDR was seen in 0.32% of total patients. Out of treatment failure in PTB group MDR was seen in 64% followed by monoresistance to INH in 30% and XDR in 6%. In EPTB group MDR was seen in 100% of treatment failure. All patients with XDR died. Among the MDR patients majority are on treatment while 12% died, another 12% defaulter while 12% completed treatment.Conclusions: Among evaluated tuberculosis patients, maximum had PTB. Pleural tuberculosis was the most common presentation of EPTB. The study shows male preponderance in both groups. Treatment response was excellent with failure rate of 8% in PTB and 2% in EPTB. Most common cause of failure was MDR. XDR was seen in two patients and both of them died

    Functionalized Multi-Walled Carbon Nanotube-Reinforced Epoxy-Composites: Electrical And Mechanical Characterization

    Full text link
    Carbon nanotubes (CNTs) got great attention because of their interesting physical and mechanical properties. Due to these interesting properties observed at the nanoscale have motivated scientific community to utilize CNTs as reinforcement in composite materials. In the present study, different CNTs and epoxy nano-composites with different wt% (1, 2, 3, and 4%) of f-MWCNTs were prepared and their surface morphology and orientation has been investigated in detail. Further, the surface investigation, electrical and mechanical tests were carried out on CNTs-filled and unfilled epoxy at maximum sonication time 30 minute to identify the loading effect on the properties of the materials. Experimental results depicts well dispersion of f-MWCNTs, significant improvement that the resistivity of pure epoxy decreased from 108 .m to average value 103 .m with 1, 2, 3, and 4wt% f-MWCNTs. The 4.5wt% CNTs/epoxy was attributed to poor dispersion of f-MWCNTs in the nanocomposte. The hardness of nanocomposite loading 1, 2, 3, 4wt% of CNTs, increased 20.7%, 23.02%, 25.62%, 29.09% respectively as compared to pure epoxy. We believe that our strategy for obtaining CNT–reinforced epoxy nanocomposites is a very promising technology and will open a new doors in fields of aviation, aerospace, marine and sporting goods
    • …
    corecore