97 research outputs found

    Comparative Analysis of Techniques Used to Detect Copy-Move Tampering for Real-World Electronic Images

    Get PDF
    Evolution of high computational powerful computers, easy availability of several innovative editing software package and high-definition quality-based image capturing tools follows to effortless result in producing image forgery. Though, threats for security and misinterpretation of digital images and scenes have been observed to be happened since a long period and also a lot of research has been established in developing diverse techniques to authenticate the digital images. On the contrary, the research in this region is not limited to checking the validity of digital photos but also to exploring the specific signs of distortion or forgery. This analysis would not require additional prior information of intrinsic content of corresponding digital image or prior embedding of watermarks. In this paper, recent growth in the area of digital image tampering identification have been discussed along with benchmarking study has been shown with qualitative and quantitative results. With variety of methodologies and concepts, different applications of forgery detection have been discussed with corresponding outcomes especially using machine and deep learning methods in order to develop efficient automated forgery detection system. The future applications and development of advanced soft-computing based techniques in digital image forgery tampering has been discussed

    Comparative Analysis of Techniques Used to Detect Copy-Move Tampering for Real-World Electronic Images

    Get PDF
    Evolution of high computational powerful computers, easy availability of several innovative editing software package and high-definition quality-based image capturing tools follows to effortless result in producing image forgery. Though, threats for security and misinterpretation of digital images and scenes have been observed to be happened since a long period and also a lot of research has been established in developing diverse techniques to authenticate the digital images. On the contrary, the research in this region is not limited to checking the validity of digital photos but also to exploring the specific signs of distortion or forgery. This analysis would not require additional prior information of intrinsic content of corresponding digital image or prior embedding of watermarks. In this paper, recent growth in the area of digital image tampering identification have been discussed along with benchmarking study has been shown with qualitative and quantitative results. With variety of methodologies and concepts, different applications of forgery detection have been discussed with corresponding outcomes especially using machine and deep learning methods in order to develop efficient automated forgery detection system. The future applications and development of advanced soft-computing based techniques in digital image forgery tampering has been discussed

    A Questionnaire-based Survey on Treatments and Practices of Antibiotics in URTI and Fever of Unknown Origin in India

    Get PDF
    India is the largest consumer of antibiotics in the world. High antibiotic consumption is linked to the emergence and community spread of multidrug-resistant bacteria. It is well-established that antibiotic overuse is one of the leading causes of antibiotic resistance, which is a major global public health challenge. Optimizing antibiotic usage is, thus, an essential issue. Before promoting and defining judicious antibiotic prescribing, it is crucial to analyze practitioners\u27 diagnostic and prescribing practices. Hence, a nationwide retrospective questionnaire-based survey was conducted among 950 Indian doctors. This survey aimed to describe the approaches and practices of Indian doctors towards antibiotic use in upper respiratory tract infections (URTIs) and pyrexia of unknown origin (PUO) and compare practices with national guidelines. These are the most common reasons for primary health care consultations and significantly contribute to the overuse of antibiotics. According to the survey, amoxicillin-clavulanic acid remains the first-line antibiotic for URTI treatment. Third-generation cephalosporins were found to be the most prescribed antibiotics for PUO, uncomplicated typhoid and infections during pregnancy. Our survey results show that most of the clinicians in our study were well aware of the guidelines for antimicrobial use issued by Indian Council of Medical Research (ICMR) and the nationwide problem of antimicrobial resistance. This study provides an important insight into the prescribing practices of antibiotics among Indian doctors

    Internet Governance: A Developing Nation’s Call for Administrative Legal Reform

    Get PDF
    The internet has emerged as a reservoir of information and has pushed the world to evolve into a global village. Increased communication across political, social and economic barriers has created a virtual society of its own. This networked society poses considerable challenges for Internet Governance. The Internet Corporation for Assigned Names and Numbers (ICANN) is the institution responsible for the internet management. ICANN has been at the center of the debates over global governance of the internet. Key concerns raised in these debates involve the legitimacy of institutions as well as the participation of developed and developing nations in Internet governance

    Pueraria tuberosa as Dipeptidyl-Peptidase-IV Inhibitor Prevents Streptozotocin-Induced Intestinal Stress

    Get PDF
    BACKGROUND: Enhanced expression of PTY-2 dipeptidyl-peptidase-IV (DPP-IV) has been found to improve has been found in various intestinal diseases. Pueraria tuberosa tuber water extract-2 (PTY-2) is already known to have DPP-IV inhibitory potential. At the mRNA level, this inhibition has not yet been investigated. Increased incretin secretion due to inhibition of DPP-IV could lead to the suppression of stress and apoptosis of intestinal cells. AIM: In this research, we tried to study the antioxidant, anti-apoptotic, and DPP-IV inhibitory effect of PTY 2 against intestinal damage induced by STZ. METHODS: We found morphological damage to the intestine following streptozotocin (STZ) injection (65 mg/kg bw) in male Charles foster rats through histological examination. Superoxide dismutase (SOD) and DPP-IV mRNA expressions were analyzed by polymerase chain reaction and cell apoptosis was examined by tunnel assay and Bcl 2 immunoexpression. RESULTS: In STZ-induced diabetic control, the number and length of villi were decreased, but these damages were reversed by 10 days of PTY-2 treatment. SOD expression was found to be decreased whereas DPP-IV expression was enhanced with significant intestinal cell apoptosis in the diabetic control group. Treatment with PTY-2 decreases stress by upregulating SOD expression and by downregulating the expression of DPP-IV. These PTY-2 recoveries contribute to the suppression of apoptosis in the intestinal cells. CONCLUSION: The protective action of PTY-2 against STZ mediated intestinal damage is demonstrated by these short studies. Therefore, PTY-2 may be taken as a herbal remedy for diabetes-induced intestinal damages

    Multilevel Hashing based Access Control for Authentication and Security in Relational Database Management System

    Get PDF
    The relational database is very widely used in these days and so as the relational database security is very vital to protect from different kinds of threats and attacks. The security of relational database is very important because now these days all data and information are stored in database by some form of database objects including user’s personal information like credit/debit card details, username, passwords etc. as well as confidential data of business organization and companies. Many researches are done in order to protect the relational database from these vulnerabilities but the methodologies of relational database security are not able to protect the relational database from all security issues. Authentication of users is an important issue in the database that is needed to be addressed most because it can give full access to the database objects. In this paper we present various security issues that can cause degradation in relational database security and we also identify various problems in the current database security policies. In this paper we propose the use of Multilevel Hashing based Access control mechanism for authentication and security in Relational database

    Protecting Scattered Database by Enforcing Data Preservation Using Data Protection Facilitator

    Get PDF
    In this paper we are incorporating data preservation in scattered database structure i.e. method of preserving data in scattered database structure and having secure access over it. In this paper data preservation is examined and solution is provided on the aforesaid condition. This paper is a summarized concept of documentation, authorization, access control and encryption that are main points to be taken in consideration in data preservation in scattered database structure. We propose a new method for secure access based on service provider comprising security application. This model set out for safe search on server and user relation. In this paper we used heuristic approach for preservation for scattered database system regarding security, as the importance of secure access is increasing in scattered domains on different issues, in this way we enhanced the database security in Scattered database environment

    Enhanced Sorbitol Production under Submerged Fermentation using Lactobacillus plantarum

    Get PDF
    Background and Objective: Sorbitol is a non-toxic and slightly hygroscopic compound with different applications. Zymomonas mobiles produces sorbitol from sucrose or mixtures of glucose and fructose (formation is coupled with the dehydrogenation of glucose to glucono-δ- lactone). Recombinant Zymomonas mobilis may produce sorbitol and gluconic acid from glucose and fructose using different divalent metal ions with reduced the ethanol yield andsignificantly increased yield of sorbitol. Current study envisaged to alter the media components, physical process parameters and supplementation of amino acids for enhanced sorbitol production.Material and Methods: Several process variables were evaluated on sorbitol production including carbon sources (glucose, fructose, maltose, sucrose), carbon concentrations (5, 10, 20 and 25 g l-1), nitrogen sources (peptone, tryptone, yeast extract, beef extract and organic nitrogen mix), temperatures (25, 29, 33, 37, 41°C), pH (6, 6.5, 7 , 7.5 ,8), agitation rate (50, 100, 150, 200 rpm) and amino acids (cysteine, cystine, tryptophan)in batch cultivation ofLactobacillus plantarum NCIM 2912. Shake flask cultivation performed under optimum conditions like temperature 37°C, pH 7.0 and agitation rate of 150 rpm, resulted in enhanced sorbitol production. Comparative study of sorbitol production in solid state fermentation and submerged fermentation was also evaluated.Results and Conclusion: Batch cultivation under submerged conditions further performed in 7.5-l lab scale bioreactor (working volume 3.0-l) under optimized conditions resulted in maximum cell biomass of 8.95±0.03 g g-1 and a sorbitol content of 9.78±0.04 g l-1 after 42.0 h of fermentation. Scale up study on bioreactor resulted in maximum sorbitol yield (Yp/x) and productivity of 1.11 g g-1 and 0.50 g l-1 h under submerged fermentation, respectively.Conflict of interest: The authors declare no conflict of interest
    • …
    corecore