256 research outputs found

    Novel Approach for Control Data Theft Attack in Cloud Computing

    Get PDF
    Information security is a major problem faced by cloud computing around the world. Because of their adverse effects on organizational information systems, viruses, hackers, and attackers insiders can jeopardize organizations capabilities to pursue their undertaken effectively. Although technology based solutions help to mitigate some of the many problems of information security, even the preeminent technology canā€™t work successfully unless effective human computer communication occurs.IT experts, users and administrators all play crucial role to determine the behavior that occurs as people interact with information technology will support the maintenance of effective security or threaten it. In the present paper we try to apply behavioral science concepts and techniques to understanding problems of information security in organizations

    Role of the Nlrp3 Inflammasome in Microbial Infection

    Get PDF
    The intracellular Nod-like receptor Nlrp3 has emerged as the most versatile innate immune receptor because of its broad specificity in mediating immune response to a wide range of microbial or danger signals. Nlrp3 mediates assembly of the inflammasome complex in the presence of microbial components leading to the activation of caspase-1 and the processing and release of the pro-inflammatory cytokines IL-1Ī² and IL-18. In this review, we give an update on the recent literature examining the role of Nlrp3 inflammasome in response to fungal, bacterial, and viral infections

    Reactive oxygen species regulate caspase-11 expression and activation of the non-canonical NLRP3 inflammasome during enteric pathogen infection

    Get PDF
    Enteropathogenic and enterohemorrhagic bacterial infections in humans are a severe cause of morbidity and mortality. Although NOD-like receptors (NLRs) NOD2 and NLRP3 have important roles in the generation of protective immune responses to enteric pathogens, whether there is crosstalk among NLRs to regulate immune signaling is not known. Here, we show that mice and macrophages deficient in NOD2, or the downstream adaptor RIP2, have enhanced NLRP3-and caspases-11-dependent non-canonical inflammasome activation in a mouse model of enteropathogenic Citrobacter rodentium infection. Mechanistically, NOD2 and RIP2 regulate reactive oxygen species (ROS) production. Increased ROS in Rip2-deficient macrophages subsequently enhances c-Jun N-terminal kinase (JNK) signaling resulting in increased caspase-11 expression and activation, and more non-canonical NLRP3-dependant inflammasome activation. Intriguingly, this leads to protection of the colon epithelium for up to 10 days in Rip2-deficient mice infected with C. rodentium. Our findings designate NOD2 and RIP2 as key regulators of cellular ROS homeostasis and demonstrate for the first time that ROS regulates caspase-11 expression and non-canonical NLRP3 inflammasome activation through the JNK pathway

    Mitigation of Insider Attacks through Multi-Cloud

    Get PDF
    The malicious insider can be an employees, user and/or third party business partner. In cloud environment, clients may store sensitive data about their organization in cloud data centers. The cloud service provider should ensure integrity, security, access control and confidentiality about the stored data at cloud data centers. The malicious insiders can perform stealing on sensitive data at cloud storage and at organizations. Most of the organizations ignoring the insider attack because it is harder to detect and mitigate. This is a major emerging problem at the cloud data centers as well as in organizations. In this paper, we proposed a method that ensures security, integrity, access control and confidentiality on sensitive data of cloud clients by employing multi cloud service providers. The organization should encrypt the sensitive data with their security policy and procedures and store the encrypted data in trusted cloud. The keys which are used during encryption process are again encrypted and stored in another cloud area. So that organization contains only keys for keys of encrypted data. The Administrator of organization also does not know what data kept in cloud area and if he accesses the data, easily caught during the auditing. Hence, the only authorized used can access the data and use it and we can mitigate insider attacks by providing restricted privileges

    TO ENLARGE THE CONTRAVENTION POINT OF FLOATING COLUMN WITH SESMIC EXPLORATION

    Get PDF
    The maintenance, repairing, and rehabilitation of structural individuals, is perhaps one of the most critical issues in civil engineering applications. Glass Fiber Reinforced Polymer (GFRP) software is a very effective way to restore and enhance structures. The bolstered concrete beams of externally bonded epoxy resin with GFRP sheets had been examined to failure by means of the use of a symmetrical two-factor concentrated static loading gadget. The beams have been forged for this experimental take a look at program. The objective of these paintings is to assess the structural conduct of reinforced concrete beams with externally bonded FRP reinforcement. Beams bonded with 4 one-of-a-kind sorts of Glass Fibre Reinforced Polymer (GFRP) having 3.50 mm thickness were used. Totally five square beams of 3 m duration had been cast. One beam was used as a reference beam and the closing beams had been supplied with GFRP laminates on their soffit. The variable considered for the have a look at is the sort of GFRP laminate. The take a look at parameters of this research protected first crack load, yield load, last load, first crack deflection, yield deflection, closing deflection, crack width, deflection ductility, energy ductility, deflection ductility ratios, and power ductility ratios of the check beams. The overall performance of FRP plated beams became as compared with that of the unplanted beam. The test effects confirmed that the beams reinforced with GFRP laminates exhibited higher performance

    DFT Analysis, ADME, antibacterial activity and molecular docking studies of 2-(3-aryl-1,2,4-oxadiazol-5-yl)-n-phenylacetamide derivatives

    Get PDF
    Quantum computational study based on density functional theory (DFT/B3LYP) using basis set 6-311G (d,p) a number of global and local reactivity descriptors have been computed to predict the reactivity and the reactive sites on the 2-(3-aryl-1,2,4-oxadiazol-5-yl)-n-phenylacetamideoxadiazole derivatives. The molecular geometry and the electronic properties such as frontier molecular orbital (HOMO and LUMO), ionization potential (I) and electron affinity (A) are investigated to get a better insight of the molecular properties. Molecular electrostatic potential (MEP) for all compounds were determined to check their electrophilic or nucleophilic reactivity. The in silico pharmacokinetics showed that nearly all derivatives obeyed Lipinski rule of 5 with low toxicity and metabolic stability. The antibacterial activity was carried out against B. subtilis, S. aureus, P.aeruginosa and E. coli, displaying considerable inhibition. MurE ligases, (PDB: 7b6k) participating in the intracellular steps of bacterial peptidoglycan biosynthesis, are taken as targets for molecular docking studies using Flare GUI software. The docking outcome revealed that these 1,2,4-oxadiazole analogues have highest LF rank score in the range -12.9 to -6.0 which shows that they act as potent antibacterial agents

    Diagnostic accuracy of motor evoked potentials to detect neurological deficit during idiopathic scoliosis correction:a systematic review

    Get PDF
    OBJECTIVE The goal of this study was to evaluate the efficacy of intraoperative transcranial motor evoked potential (TcMEP) monitoring in predicting an impending neurological deficit during corrective spinal surgery for patients with idiopathic scoliosis (IS). METHODS The authors searched the PubMed and Web of Science database for relevant lists of retrieved reports and/or experiments published from January 1950 through October 2014 for studies on TcMEP monitoring use during IS surgery. The primary analysis of this review fit the operating characteristic into a hierarchical summary receiver operating characteristic curve model to determine the efficacy of intraoperative TcMEP-predicted change. RESULTS Twelve studies, with a total of 2102 patients with IS were included. Analysis found an observed incidence of neurological deficits of 1.38% (29/2102) in the sample population. Of the patients who sustained a neurological deficit, 82.8% (24/29) also had irreversible TcMEP change, whereas 17.2% (5/29) did not. The pooled analysis using the bivariate model showed TcMEP change with sensitivity (mean 91% [95% CI 34%-100%]) and specificity (mean 96% [95% CI 92-98%]). The diagnostic odds ratio indicated that it is 250 times more likely to observe significant TcMEP changes in patients who experience a new-onset motor deficit immediately after IS correction surgery (95% CI 11-5767). TcMEP monitoring showed high discriminant ability with an area under the curve of 0.98. CONCLUSIONS A patient with a new neurological deficit resulting from IS surgery was 250 times more likely to have changes in TcMEPs than a patient without new deficit. The authors' findings from 2102 operations in patients with IS show that TcMEP monitoring is a highly sensitive and specific test for detecting new spinal cord injuries in patients undergoing corrective spinal surgery for IS. They could not assess the value of TcMEP monitoring as a therapeutic adjunct owing to the limited data available and their study design

    Fungal Chitin Dampens Inflammation through IL-10 Induction Mediated by NOD2 and TLR9 Activation

    Get PDF
    Funding: JW and NARG thank the Wellcome Trust (080088, 086827, 075470), The Wellcome Trust Strategic Award in Medical Mycology and Fungal Immunology (097377) and the European Union ALLFUN (FP7/2007 2013, HEALTH-2010-260338) for funding. MGN was supported by a Vici grant of the Netherlands Organisation for Scientific Research. AJPB and DMM were funded by STRIFE, ERC-2009-AdG-249793 and AJPB additionally by FINSysB, PITN-GA-2008-214004 and the BBSRC [BB/F00513X/1]. MDL was supported by the MRC (MR/J008230/1). GDB and SV were funded by the Wellcome Trust (086558) and TB and MK were funded by the Deutsche Forschungsgemeinschaft (Bi 696/3-1; Bi 696/5-2; Bi 696/10-1). MS was supported by the Deutsche Forschungsgemeinschaft (Sch 897/1-3) and the National Institute of Dental and Craniofacial Research (R01 DE017514-01). TDK and RKSM were funded by the National Institute of Health (AR056296, AI101935) and the American Lebanese Syrian Associated Charities (ALSAC). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.Peer reviewedPublisher PD
    • ā€¦
    corecore