2,877 research outputs found
Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
This study reviews and analyses the research landscape for intrusion detection systems (IDSs) based on deep learning (DL)
techniques into a coherent taxonomy and identifies the gap in this pivotal research area. The focus is on articles related to
the keywords ‘deep learning’, ‘intrusion’ and ‘attack’ and their variations in four major databases, namely Web of Science,
ScienceDirect, Scopus and the Institute of Electrical and Electronics Engineers’ Xplore. These databases are sufficiently
broad to cover the technical literature. The dataset comprises 68 articles. The largest proportion (72.06%; 49/68) relates to
articles that develop an approach for evaluating or identifying intrusion detection techniques using the DL approach. The
second largest proportion (22.06%; 15/68) relates to studying/applying articles to the DL area, IDSs or other related issues.
The third largest proportion (5.88%; 4/68) discusses frameworks/models for running or adopting IDSs. The basic characteristics
of this emerging field are identified from the aspects of motivations, open challenges that impede the technology’s
utility, authors’ recommendations and substantial analysis. Then, a result analysis mapping for new directions is
discussed. Three phases are designed to meet the demands of detecting distributed denial-of-service attacks with a high
accuracy rate. This study provides an extensive resource background for researchers who are interested in IDSs based on DL
Independent [1,2]-number versus independent domination number
A [1, 2]-set S in a graph G is a vertex subset such that every vertex
not in S has at least one and at most two neighbors in it. If the additional
requirement that the set be independent is added, the existence of such
sets is not guaranteed in every graph. In this paper we provide local
conditions, depending on the degree of vertices, for the existence of
independent [1, 2]-sets in caterpillars. We also study the relationship
between independent [1, 2]-sets and independent dominating sets in this
graph class, that allows us to obtain an upper bound for the associated
parameter, the independent [1, 2]-number, in terms of the independent
domination number.Peer ReviewedPostprint (published version
Fork rotation and DNA precatenation are restricted during DNA replication to prevent chromosomal instability
Faithful genome duplication and inheritance require the complete resolution of all intertwines within the parental DNA duplex. This is achieved by topoisomerase action ahead of the replication fork or by fork rotation and subsequent resolution of the DNA precatenation formed. Although fork rotation predominates at replication termination, in vitro studies have suggested that it also occurs frequently during elongation. However, the factors that influence fork rotation and how rotation and precatenation may influence other replication-associated processes are unknown. Here we analyze the causes and consequences of fork rotation in budding yeast. We find that fork rotation and precatenation preferentially occur in contexts that inhibit topoisomerase action ahead of the fork, including stable protein–DNA fragile sites and termination. However, generally, fork rotation and precatenation are actively inhibited by Timeless/Tof1 and Tipin/Csm3. In the absence of Tof1/Timeless, excessive fork rotation and precatenation cause extensive DNA damage following DNA replication. With Tof1, damage related to precatenation is focused on the fragile protein–DNA sites where fork rotation is induced. We conclude that although fork rotation and precatenation facilitate unwinding in hard-to-replicate contexts, they intrinsically disrupt normal chromosome duplication and are therefore restricted by Timeless/Tipin
Internalized Stigma of Mental Illness among Schizophrenic Patients and Their Families (Comparative Study)
This study was a comparative study aiming to assess the extent of internalized stigma of mental illness among patients with schizophrenia& Identify stigma as perceived by family members caring schizophrenic patients. The study was conducted in two settings 1st clinic was outpatient clinic for psychiatric patient affiliated to Abbasia hospitals which provided care for all sectors in Egyptians community.2nd clinic was out patients clinic for psychiatric patient affiliated to Abha psychiatric hospitals which providing care for all psychiatric patients at Asser region. 4 instruments were used for collecting the data, interviewing questionnaire, Insight scale, Internalized Stigma of Mental Illness Scale and Stigma Impact Scale: Caregiver (SIS) .The main result revealed that, there were highly statistically significant differences between patients regarding level of internalizing stigma and the most of family caregivers in both group have moderate impact of internalizing stigma. The study recommended that further research to assess impact of mental illness stigma upon schizophrenic quality of life. Keywords: stigma – mental illness - perceived discrimination –devaluation - Internalized stigm
Teaching Tip: Hook, Line, and Sinker – The Development of a Phishing Exercise to Enhance Cybersecurity Awareness
In this paper, we describe the development of an in-class exercise designed to teach students how to craft social engineering attacks. Specifically, we focus on the development of phishing emails. Providing an opportunity to craft offensive attacks not only helps prepare students for a career in penetration testing but can also enhance their ability to detect and defend against similar methods. First, we discuss the relevant background. Second, we outline the requirements necessary to implement the exercise. Third, we describe how we implemented the exercise. Finally, we discuss our results and share student feedback
Management of early blight of potato using bio control agents and plant extracts
The early blight of potato is mainly controlled by using chemical fungicides but chemical fungicides have got some adverse effect on environment as well as human beings. Keeping this in mind an experiment was conducted to test the efficacy of four plant extracts (tea, garlic, onion and neem leaf extract) and four bio-control agents (Trichoderma viride, Pseudomonas fluorescence, Streptomyces graseoviridis and Bacillus substilis) in controlling early blight of potato under field and in in vitro condition. These antifungal compounds were applied 3 times at 7days interval after first appearance of the disease in the field. Among the bio control agents T. viride was found highly effective in per cent disease reduction (52.39%) of disease over control treatment. The tuber yield (25.51 t/ ha.) was also highest in this treatment compared to control treatment (19.53 t/ha). This was followed by treatment T2 i.e. P. fluorescens where per cent incidence and intensity of disease were (65.00%) and (19.10%) respectively with 38.97% reduction of disease over control with tuber yield 23.65 t/ha. It was followed by S. graseoviridis where per cent incidence and intensity of disease were (68.00%) and (22.90%) respectively with 26.30% reduction of disease over control with tuber yield 21.07 t/ha. Among plant extracts, only neem leaf extract exhibited per cent reduction of disease (33.18%) over control treatment in field condition and inhibition of radial growth (59.85%) and spore germination (81.95%) in in vitro condition. Therefore both T. viride and neem can be used for managing the early blight of potato
Scalability Improvement Of Multicast Source Movement Over Mobile Ipv6 Using Clustering Technique
Mobile IPv6 (MIPv6) describes how a mobile node can change its point of attachment to the Internet. While MIPv6 focuses on unicast communications, it also proposes two basic mechanisms, known as bi-directional tunnelling and remote subscription, to handle multicast communications with mobile members. In the mean time, the deployment of Source-Specific Multicast (SSM) is of great interest, using the Protocol Independent Multicast-Sparse Mode (PIM-SM) and Multicast Listener Discovery (MLDv2) protocols. In the particular case of mobile IPv6 SSM sources, the mechanism proposed in MIPv6 to support multicast communications introduced a number of problems that need to be addressed. First, in most scenarios the MIPv6 solution leads to suboptimal routing by setting up a tunnel to forward packets between the home agent in its home network and the current location in the foreign network. The use of a third party when roaming which is the home agent leads to suboptimal routing. Second, it introduces a central point of failure (i.e. the Home Agent (HA)) that is not to be neglected. The proposed MIPv6 solution also induces a great traffic concentration around this central point. Third, the processing task of the central point increases with the number of mobile sources it serves, thus reducing the efficiency of multicast delivery. The objective of this thesis is to remove some of the obstacles encountered in the way of multicast deployment in the Internet, thereby making Mobile IPv6 better equipped to support mobile SSM sources.
Recent proposals to provide multicasting over mobile IP focuses mainly on recipient mobility but little attention has been given to the case of source mobility. This thesis attempts to address this problem. The basic essence of the problem is that while the effect of receiver movement on the multicast tree is local, the effect of source movement may be global and it may affect the complete multicast delivery tree. The initial design was motivated by the need to support one-to-many and many-to-many applications in a scalable fashion. Such applications cannot be serviced efficiently with unicast delivery.
As the overall problem statement of “Scalability Improvement of Multicast Source Movement over IPv6 Using Clustering Technique” is extremely complex, we divide the problem into the following components: build the multicast delivery tree for source specific multicast which is a routing issue; clustering receivers based on their IPv6 addresses; improve the state scalability of these clusters which is a deployment issue; find an efficient way for service distribution which is a deployment issue as well; and finally, the seamless integration of the work with Mobile IPv6 allowing it to support multicast efficiently for mobile nodes. The combined solution provides a comprehensive procedure for planning and managing a multicast-based IPv6 network.
The outcome of this thesis are: a software to represent an architecture of a multicast delivery tree for one-to-many type of group communication, a group management scheme that could handle the end nodes subscription/un-subscription process with the required updates, an average subscription delay of between 0.255 ms-0.530 ms and un-subscription delay of between 0.0456 ms-0.087 ms for up to 50000 nodes, an approach to multicast forwarding state reduction that could support small-size groups as well as large-size groups, and finally the integration of the work with Mobile IPv6 to handle the multicast source movement
Effect of Blood Glucose Concentrations on the Development of Chronic Complications of Diabetes Mellitus
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/90229/1/j.1875-9114.1998.tb03927.x.pd
- …