603 research outputs found

    AN INVESTIGATION OF SECURITY CHALLENGES IN COGNITIVE RADIO NETWORKS

    Get PDF
    The recent advances in wireless communication have led to the problem of growing spectrum scarcity. The available wireless spectrum has become scarcer due to increasing spectrum demand for new wireless applications. The large portion of the allocated spectrum is sporadically used leading to underutilization of significant amount of spectrum. To improve the spectrum efficiency, the idea of cognitive radio technology was introduced. This concept of cognitive radio provides a promising solution for the spectrum scarcity issues in wireless networks. Meanwhile, the security issues of cognitive radio have received more attentions recently since the inherent properties of CR networks would pose new challenges to wireless communications. In this MS thesis, general concepts of security threats to the cognitive radio networks are briefly reviewed. Performances for primary user emulation attacks are studied from Neyman-Pearson criterion point of view. A novel system model with different configurations of the primary users has been proposed and studied. Our experimental results demonstrate the statistical characteristics of the probability of false alarm and miss detection in the proposed system. I will make performance comparison with others’ research in the future. Adviser: Yaoqing Yan

    AN INVESTIGATION OF SECURITY CHALLENGES IN COGNITIVE RADIO NETWORKS

    Get PDF
    The recent advances in wireless communication have led to the problem of growing spectrum scarcity. The available wireless spectrum has become scarcer due to increasing spectrum demand for new wireless applications. The large portion of the allocated spectrum is sporadically used leading to underutilization of significant amount of spectrum. To improve the spectrum efficiency, the idea of cognitive radio technology was introduced. This concept of cognitive radio provides a promising solution for the spectrum scarcity issues in wireless networks. Meanwhile, the security issues of cognitive radio have received more attentions recently since the inherent properties of CR networks would pose new challenges to wireless communications. In this MS thesis, general concepts of security threats to the cognitive radio networks are briefly reviewed. Performances for primary user emulation attacks are studied from Neyman-Pearson criterion point of view. A novel system model with different configurations of the primary users has been proposed and studied. Our experimental results demonstrate the statistical characteristics of the probability of false alarm and miss detection in the proposed system. I will make performance comparison with others’ research in the future. Adviser: Yaoqing Yan

    MONTBLEX data archival centre

    Get PDF
    A co-ordinated project Monsoon Trough Boundary Layer Experiment (MONTBLEX) to study the atmospheric boundary layer in the monsoon trough region was taken up during 1990. 30-m high instrumented towers were erected at Kharagpur, Banaras, Delhi and Jodhpur. Sophisticated equipment like Doppler sodar and Kytoon were used at Kharagpur. Sodars were exposed at Calcutta, Delhi and Jodhpur. ORV Sagarkanya cruises were arranged in the Bay of Bengal. The India Meteorological Department set up new surface and radiation observatories and released special radio-sonde, pilot balloons. Using the above mentioned platforms, data were collected during April - September 1990 and after proper editing the entire data were archived at the Indian Institute of Tropical Meteorology, Pune. The DST-MONTBLEX data bank was started at IITM on 25th November 1991. The paper contains the details of this data

    Feto-maternal outcome in grand multipara

    Get PDF
    Background: Grand multiparity has been considered as obstetric hazards both to the mother and foetus and thus, viewed with great caution. In present set up grand multiparity is associated with increased likelihood of feto-maternal complications.Methods: The study was conducted to determine the feto-maternal outcome in grand multipara pregnancy.Results: In present study, the prevalence of grand multipara was 0.72% out of 15196 deliveries in the period from September 2010 to august 2012. 79.1% of the grand multipara women belonged to the age group of 31-40 years. A majority of the women were in Para 5. Most of the women had no antenatal care attendance. The highest prevalence of grand multipara women was seen among Muslim community (1.65%). A majority (59.1%) of the women were anemic. Caesarean section rate was 30.0% in our study. Post-partum hemorrhage was the most common complication encountered. 7.0% were macrosomic babies, whereas 8.7% were LBW babies. There were 10 perinatal deaths, birth asphyxia being the most important cause for the perinatal mortality. There were no maternal deaths.Conclusions: Our study demonstrates that, there is increase in antenatal and intra-partum maternal complications like anaemia, hypertensive disorder, preterm labour, increase in the rate of caesarean section, PPH etc., leading to severe maternal morbidity. So, the study concludes that in grand multipara pregnancy, both the woman and the fetus are at a greater risk during pregnancy and labour. This risk can be effectively reduced with good antenatal care and delivery by trained personnel

    Fast Automatic Verification of Large-Scale Systems with Lookup Tables

    Get PDF
    Modern safety-critical systems are difficult to formally verify, largely due to their large scale. In particular, the widespread use of lookup tables in embedded systems across diverse industries, such as aeronautics and automotive systems, create a critical obstacle to the scalability of formal verification. This paper presents a novel approach for the formal verification of large-scale systems with lookup tables. We use a learning-based technique to automatically learn abstractions of the lookup tables and use the abstractions to then prove the desired property. If the verification fails, we propose a falsification heuristic to search for a violation of the specification. In contrast with previous work on lookup table verification, our technique is completely automatic, making it ideal for deployment in a production environment. To our knowledge, our approach is the only technique that can automatically verify large-scale systems lookup with tables. We illustrate the effectiveness of our technique on a benchmark which cannot be handled by the commercial tool SLDV, and we demonstrate the performance improvement provided by our technique

    Malignant nodular hidradenoma-inguinal region clinically masquerading as squamous cell carcinoma: a case report

    Get PDF
    Malignant Nodular hidradenoma is an extremely rare aggressive tumour originating from eccrine sweat glands with an incidence of <.001%. So far less than 80 cases have been reported in the literature. It’s known for its local recurrence (50%) and metastasis (60%) and hence early diagnosis and radical treatment is mandatory. But differentiating it from its benign counterparts and other skin tumour mimics is challenging, due to its histopathological similarity & lack of diagnostic immunomarkers. Authors report a case of 65-year-old female who presented with a short 4-month history of rapidly growing ulceroproliferative growth in the right inguinal region with bilateral inguinal node enlargement, associated with pain and discharge. Wedge biopsy of left inguinal lymph node showed malignant cutaneous adnexal tumour deposits, which after excision was typed as malignant nodular hidradenoma. It was confirmed with immunohistochemistry. Patient presented with recurrence 8 months after excision

    Study of risk factors in progression of chronic kidney disease (CKD)

    Get PDF
    Chronic kidney disease is a growing epidemic, with at least 10 million people with kidney damage. Diabetic kidney disease is the most common cause of&nbsp; ESRD worldwide. The rate of decline of GFR is variable, especially in diabetics, ranging from 2 to 20 ml/min/1.73 m2/yr. The reasons for these differences in the rate of disease progression are multifactorial, including both non-modifiable and modifiable factors. Aim is to retard progression of disease as cost of therapy is high.&nbsp; The study was planned to identify progression factors

    A study of turbulent characteristics of atmospheric boundary layer over monsoon trough region using Kytoon and Doppler sodar

    Get PDF
    As a part of the MONTBLEX-90 observational programme, Kytoon and Doppler sodar observations were taken at Kharagpur. These data are analysed to study the turbulent characteristics of the atmospheric boundary layer in terms of stability, temperature structure function (CT2 ) and velocity structure function (Cv2 ). CT2 follows a Z-4/3 law on most of the days, whereas the variation of CV2 is not systematic. CV2 and CT2 values are found to vary between 10-5-10-1 m4/3s-2 and 10-5-10-2°C2 m-2/3 respectively
    • …
    corecore