280 research outputs found

    Preemptive modelling towards classifying vulnerability of DDoS attack in SDN environment

    Get PDF
    Software-Defined Networking (SDN) has become an essential networking concept towards escalating the networking capabilities that are highly demanded future internet system, which is immensely distributed in nature. Owing to the novel concept in the field of network, it is still shrouded with security problems. It is also found that the Distributed Denial-of-Service (DDoS) attack is one of the prominent problems in the SDN environment. After reviewing existing research solutions towards resisting DDoS attack in SDN, it is found that still there are many open-end issues. Therefore, these issues are identified and are addressed in this paper in the form of a preemptive model of security. Different from existing approaches, this model is capable of identifying any malicious activity that leads to a DDoS attack by performing a correct classification of attack strategy using a machine learning approach. The paper also discusses the applicability of best classifiers using machine learning that is effective against DDoS attack

    Exploration, collection and conservation of multicrop germplasm from Kishtwar district of Jammu and Kashmir, India

    Get PDF
    Systematic exploration and germplasm collection trips were conducted across Kishtwar district of Jammu and Kashmir state covering Chatroo valley, Padder valley and Kishtwar main including areas of Dachan, Surror, Sarthal, Bhonjwa and Drabshala during 2013, 2015 and 2018. A total of 113 germplasm accessions belonging to 29 species of crops and wild relatives from as many as 40 collection sites were collected at altitudes ranging from 1340-2670 m. Several areas in Sarthal, Bhonjwa, Dachan and Gulabgarh Padder were first time explored. Crop group wise accessions collected are pulses (39) mostly common beans, cereals (30) mostly maize, vegetables and spices (25), pseudocereals and millets (16), besides one accession each of Glycine max, Solanum pseudocapsicum and Nicotiana tabacum. The germplasm has been conserved in National Gene Bank (NGB), New Delhi. This study highlights information on the germplasm collected/observed and threats leading to biodiversity loss/genetic erosion in the highly fragile region of Kishtwar

    Intrusion Detection System For Adhoc Networks

    Get PDF
    The rapid proliferation of wireless networks and mobile computing applications has changed thelandscape of network security. The recent denial of service attacks on major Internet sites have shown us, no open computer network is immunefrom intrusions. The wireless ad-hoc network is particularly vulnerable due to its featuresof open medium, dynamic changing topology, cooperative algorithms, lack of centralizedmonitoring and management point, and lack of a clear line of defense. The traditionalway of protecting networks with firewalls and encryption software is no longer sufficientand effective. Many intrusion detection techniques have been developed on fixed wirednetworks but have been turned to be inapplicable in this new environment. We need tosearch for new architecture and mechanisms to protect wireless networks and mobilecomputing application. In this paper, we examine the vulnerabilities of wireless networksand say that we must include intrusion detection in the security architecture for mobilecomputing environment. We have showed such architecture and evaluated keymechanisms in this architecture such as applying mobile agents to intrusion detection,anomaly detection and misuse detection for mobile ad-hoc networks

    Enhancing Feature Extraction through G-PLSGLR by Decreasing Dimensionality of Textual Data

    Get PDF
    The technology of big data has become highly popular in numerous industries owing to its various characteristics such as high value, large volume, rapid velocity, wide variety, and significant variability. Nevertheless, big data presents several difficulties that must be addressed, including lengthy processing times, high computational complexity, imprecise features, significant sparsity, irrelevant terms, redundancy, and noise, all of which can have an adverse effect on the performance of feature extraction. The objective of this research is to tackle these issues by utilizing the Partial Least Square Generalized Linear Regression (G-PLSGLR) approach to decrease the high dimensionality of text data. The suggested algorithm is made up of four stages: Firstly, gathering featured data in vector space model (VSM) and training it with bootstrap technique. Second, grouping trained feature samples using a Pearson correlation coefficient and graph-based technique. Third, getting rid of unimportant features by ranking significant group features using PLSGR. Lastly, choosing or extracting significant features using Bayesian information criterion (BIC). The G-PLSGLR algorithm surpasses current methods by achieving a high reduction rate and classification performance, while minimizing feature redundancy, time consumption, and complexity. Furthermore, it enhances the accuracy of features by 35%

    ANALYTICAL METHOD DEVELOPMENT AND VALIDATION OF AMLODIPINE IN HUMAN PLASMA USING LIQUID CHROMATOGRAPHY-MASS SPECTROMETRY/MASS SPECTROMETRY

    Get PDF
    Objective: The objective of the present investigation was to develop a novel, simple, and economic method for the estimation of amlodipine in positive ion mode in human plasma using amlodipine maleate d4 as an internal standard.Methods: The chromatographic separation was performed on Zorbax SB, C18, 50 mm*4.6 mm, and 3.5 mm. The mobile phase was prepared with a mixture of 5 mm ammonium acetate in 0.1% formic acid: High performance liquid chromatographic (HPLC) grade methanol:HPLC grade acetonitrile (40:30:30) that run isocratically at the flow rate of 0.700 ml/min and run time at 2.50 min.Results: The analytical method is valid for the estimation of amlodipine, in human plasma over a range of 0.100 ng/ml–9.990 ng/ml with the detection of amlodipine m/z - 409.10 (parent) and 238.00 (product), and internal standard Amlodipine Maleate d4 m/z - 413.20 (parent), and 238.00 (product) in positive ion mode. The results of carryover test, matrix effect, linearity, precision and accuracy, stabilities, dilution integrity, and run size evaluation test presented in this report are within the acceptance range.Conclusion: A sensitive method for the separation and determination of amlodipine in plasma has been developed based on solid-phase extraction with disposable extraction cartridges in combination with LC and mass spectrophotometers (MS/MS)

    Formulation and Evaluation of Tacrolimus Transdermal Gel

    Get PDF
    The present investigation is concerned with formulation and evaluation of Transdermal gels of Tacrolimus, anti-psoriasis drug, to circumvent the first pass effect and to improve its bioavailability with reduction in dosing frequency and dose related side effects. Twelve formulations were developed with varying concentrations of polymers like Carbopol 934P, HPMCK4M and Sodium CMC. The gels were tested for clarity, Homogeneity, Spreadability, Extrudability, Viscosity, surface pH, drug Content uniformity, in-vitro drug diffusion study and ex-vivo permeation study using rat abdominal skin. FTIR studies showed no evidence on interactions between drug, polymers and excipients. The best in-vitro drug release profile was achieved with the formulation F4 containing 0.5 mg of exhibited 6 hr drug release i.e. 98.68 % with desired therapeutic concentration which contains the drug and Carbopol 934p in the ratio of 1:2. The surface pH, drug content and viscosity of the formulation F4 was found to be 6.27, 101.3% and 3, 10,000cps respectively. The drug permeation from formulation F4 was slow and steady and 0.89gm of tacrolimus could permeate through the rat abdominal skin membrane with a flux of 0.071 gm hr-1 cm-2. The in-vitro release kinetics studies reveal that all formulations fit well with zero order kinetics followed by non-Fickian diffusion mechanism. Keywords: Transdermal gel, Viscosity, In-vitro drug release, In-vitro drug release kinetics study, Ex-vivo permeation stud

    Hydrotalcite-like compounds for liquid-phase oxidation of benzylic hydrocarbons

    Get PDF
    278-28

    Cognitive Radio Networks for Wireless Communication

    Get PDF
    The world of wireless communications is nowadays facing a serious problem of spectrum shortage. Such problem is not only due to”real” limitations on the available bandwidth, but also (and mainly) to inefficient policies in spectrum management. Indeed, today’s wireless networks are characterized by a fixed spectrum assignment policy, which often leads to waste large spectrum portions due to sporadic utilization by the licensed users. The recentadvances in the field of software defined radios are pushing forward a novel networking paradigm where all the users or part of them access the spectrum in an opportunistic way. Acommon cognitive radio network model features the presence of primary (or licensed) users who have priority access to the bandwidth, whereas secondary users can accessthe bandwidth only when vacated by the primary ones. Moreover, the strict constraint for the secondary users is not to harm primary users’ transmissions
    • …
    corecore