190 research outputs found

    Network intrusion detection system using string matching

    Get PDF
    Network intrusion detection system is a retrofit approach for providing a sense of security in existing computers and data networks, while allowing them to operate in their current open mode. The goal of a network intrusion detection system is to identify, preferably in real time, unauthorized use, misuse and abuse of computer systems by insiders as well as from outside perpetrators. At the heart of every network intrusion detection system is packet inspection which employs nothing but string matching. This string matching is the bottleneck of performance for the whole network intrusion detection system. Thus, the need to increase the performance of string matching cannot be more exemplified. In this project, we have studied some of the standard string matching algorithms and implemented them. We have then compared the performance of the various algorithms with varying input sizes. The main focus of the project was the Aho-Corasick algorithm. In addition to using the default implementation of suffix trees, we have used a dense hash set and a sparse hash set implementation- which are libraries from the Google code repository- and we show that the performance for these implementations are better. They give noticeable enhancement in performance when the input size increases

    Network intrusion detection using string matching

    Get PDF
    Network intrusion detection system is a retrofit approach for providing a sense of security in existing computers and data networks, while allowing them to operate in their current open mode. The goal of a network intrusion detection system is to identify, preferably in real time, unauthorized use, misuse and abuse of computer systems by insiders as well as from outside perpetrators. At the heart of every network intrusion detection system is packet inspection which employs nothing but string matching. This string matching is the bottleneck of performance for the whole network intrusion detection system. Thus, the need to increase the performance of string matching cannot be more exemplified. In this project, we have studied some of the standard string matching algorithms and implemented them. We have then compared the performance of the various algorithms with varying input sizes. The main focus of the project was the Aho-Corasick algorithm. In addition to using the default implementation of suffix trees, we have used a dense hash set and a sparse hash set implementation- which are libraries from the Google code repository- and we show that the performance for these implementations are better. They give noticeable enhancement in performance when the input size increases

    The bony endometrium: a rare case of osseus metaplasia of endometrium

    Get PDF
    Osseous metaplasia of endometrium is an uncommon condition which presents as a bone in endometrium. The pathophysiology of this condition is still not understood completely. Many theories have been formulated to explain its occurrence. Most patients with this disorder present with 2o amenorrhoea or 2o infertility. Here, we present a case of 22 years old woman presenting to us with secondary amenorrhoea. Ultrasonography showed echogenic calcified endometrium suggestive of calcification. Hysteroscopy was done which revealed bony fragments in uterine cavity, which were removed, procedure went uneventful and patient was started on oestrogen and progesterone for endometrium regeneration. Histopathology report was suggestive of osseous metaplasia of endometrium

    An analysis of aspartic peptidases expressed by trophoblasts and placenta of even-toed ungulates

    Get PDF
    Title from PDF of title page (University of Missouri--Columbia, viewed on February 23, 2010).The entire thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file; a non-technical public abstract appears in the public.pdf file.Dissertation advisor: Dr. Jonathan A. Green.VitaPh.D. University of Missouri--Columbia 2008.The Pregnancy Associated Glycoproteins (PAGs) represent a multigene family of trophoblast expressed proteins, found exclusively in the placenta of even-toed mammals such as ruminants (cattle, sheep), pig, etc. In ruminants, the PAGs can be classified into ancient and modern PAGs based on their coding sequence. In addition, there are also differences in purported enzymatic activity as well as transcriptional regulation of expression. Many of the modern PAGs have accumulated mutations in and around the catalytic center, and some of those that incurred mutations in the two catalytic aspartates are predicted to be proteolytically inactive. In contrast, most of the ancient PAGs of ruminants and swine, have all the hallmarks of typical aspartic peptidases (APs). From the analysis of cattle genome, we found that there are 18 distinct PAG genes and 14 pseudogenes. Based on our preliminary analysis of the proximal promoter regions [500 base pairs (bp) upstream of the translational start point] of PAG genes, we found that there are pockets of conserved transcription factor binding sites that are different between ancient and modern PAGs. These differences likely influence the observed differences in expression between ancient and modern boPAGs. We gathered evidence by Real-time PCR and global analysis of expressed ESTs that confirm that, boPAG-2 is the most abundant of all boPAGs. We identified boPAG-2 and its closest paralog boPAG-12, as well as poPAG-2 the ancient PAG found in pigs, as the candidates for investigation of proteolytic activity. From our experiments we found that, boPAGs -2 and -12 and poPAG-2 are proteases with optimal activity under acidic pH conditions. We also illustrated differences in proteolytic activity towards substrates, and in their relative affinity towards an AP inhibitor (pepstatin A). We found that, in comparison to the two bovine paralogs, boPAGs -2 and -12, poPAG-2 was found to be a more robust enzyme. Finally, we demonstrated that APs secreted by embryos such as PAGs can be objectively measured in the medium conditioned by the culture of porcine embryos either individually or in pools for variable lengths of time in acidic conditions. We also observed that such activity seemed to correlate with stage and quality of embryos (assessed morphologically) in vitro. We, therefore, believe that this proteolytic activity potentially could serve as a marker for developmental competence of the embryos.Includes bibliographical references

    Characterization of the bovine pregnancy-associated glycoprotein gene family – analysis of gene sequences, regulatory regions within the promoter and expression of selected genes

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The Pregnancy-associated glycoproteins (PAGs) belong to a large family of aspartic peptidases expressed exclusively in the placenta of species in the <it>Artiodactyla </it>order. In cattle, the <it>PAG </it>gene family is comprised of at least 22 transcribed genes, as well as some variants. Phylogenetic analyses have shown that the PAG family segregates into 'ancient' and 'modern' groupings. Along with sequence differences between family members, there are clear distinctions in their spatio-temporal distribution and in their relative level of expression. In this report, 1) we performed an <it>in silico </it>analysis of the bovine genome to further characterize the <it>PAG </it>gene family, 2) we scrutinized proximal promoter sequences of the <it>PAG </it>genes to evaluate the evolution pressures operating on them and to identify putative regulatory regions, 3) we determined relative transcript abundance of selected <it>PAGs </it>during pregnancy and, 4) we performed preliminary characterization of the putative regulatory elements for one of the candidate PAGs, <it>bovine </it>(<it>bo</it>) <it>PAG-2</it>.</p> <p>Results</p> <p>From our analysis of the bovine genome, we identified 18 distinct <it>PAG </it>genes and 14 pseudogenes. We observed that the first 500 base pairs upstream of the translational start site contained multiple regions that are conserved among all <it>boPAGs</it>. However, a preponderance of conserved regions, that harbor recognition sites for putative transcriptional factors (TFs), were found to be unique to the modern <it>boPAG </it>grouping, but not the ancient <it>boPAGs</it>. We gathered evidence by means of Q-PCR and screening of EST databases to show that <it>boPAG-2 </it>is the most abundant of all <it>boPAG </it>transcripts. Finally, we provided preliminary evidence for the role of ETS- and DDVL-related TFs in the regulation of the <it>boPAG-2 </it>gene.</p> <p>Conclusion</p> <p><it>PAGs </it>represent a relatively large gene family in the bovine genome. The proximal promoter regions of these genes display differences in putative TF binding sites, likely contributing to observed differences in spatial and temporal expression. We also discovered that <it>boPAG-2 </it>is the most abundant of all boPAG transcripts and provided evidence for the role of ETS and DDVL TFs in its regulation. These experiments mark the crucial first step in discerning the complex transcriptional regulation operating within the <it>boPAG </it>gene family.</p

    Pseudo Trained YOLO R_CNN Model for Weapon Detection with a Real-Time Kaggle Dataset

    Get PDF
    The Recurrent Convolutional Neural Networks (RCNN) based deep learning models has been classified image patterns and deep features through layer architecture. In this world every country doesn’t encouraging violence, so that indirectly nations prohibiting usages of weapons to common people. This study proposes a novel YoLo Faster R-CNN based weapon detection algorithm for unusual weapon object detection. The proposed YoLo V3 R-CNN computer vision application can rapidly find weapons carried by people and highlighted through bounding-box-intimation. The work plan of this research is divided into two stages, at 1st stage pre-processing has been called to Faster R-CNN segmentation. The 2nd stage has been training the dataset as well as extracting 8-features (image_id, detection score, pixels-intensity, resolution, Aspect-ratio, PSNR, CC, SSIM) into .csv file. The labeling can be performed to RCNN-YoLo method such that getting real-time objects detection (Unusual things). The Confusion matrix has been generating performance measures in terms of accuracy 97.12%, SSIM 0.99, sensitivity 97.23%, and throughput 94.23% had been attained which are outperformance methodology

    Pseudo Trained YOLO R_CNN Model for Weapon Detection with a Real-Time Kaggle Dataset

    Get PDF
    The Recurrent Convolutional Neural Networks (RCNN) based deep learning models has been classified image patterns and deep features through layer architecture. In this world every country doesn’t encouraging violence, so that indirectly nations prohibiting usages of weapons to common people. This study proposes a novel YoLo Faster R-CNN based weapon detection algorithm for unusual weapon object detection. The proposed YoLo V3 R-CNN computer vision application can rapidly find weapons carried by people and highlighted through bounding-box-intimation. The work plan of this research is divided into two stages, at 1st stage pre-processing has been called to Faster R-CNN segmentation. The 2nd stage has been training the dataset as well as extracting 8-features (image_id, detection score, pixels-intensity, resolution, Aspect-ratio, PSNR, CC, SSIM) into .csv file. The labeling can be performed to RCNN-YoLo method such that getting real-time objects detection (Unusual things). The Confusion matrix has been generating performance measures in terms of accuracy 97.12%, SSIM 0.99, sensitivity 97.23%, and throughput 94.23% had been attained which are outperformance methodology

    An efficient and secure mechanisim for multipath routing in MANET

    Get PDF
    In this a vitality productive multipath steering convention called Ad-Hoc On interest Multipath Distance Victor with the Fitness Function (FF-AOMDV). The FF-AOMDV utilizes the wellness work as an enhancement technique, in this improvement, we look for two parameters with the end goal to choose the ideal course are; vitality dimension of the course and the course separate with the end goal to exchange the information to the goal all the more proficiently by expending less vitality and drawing out the system lifetime
    corecore