23 research outputs found

    Realization of Semantic Atom Blog

    Full text link
    Web blog is used as a collaborative platform to publish and share information. The information accumulated in the blog intrinsically contains the knowledge. The knowledge shared by the community of people has intangible value proposition. The blog is viewed as a multimedia information resource available on the Internet. In a blog, information in the form of text, image, audio and video builds up exponentially. The multimedia information contained in an Atom blog does not have the capability, which is required by the software processes so that Atom blog content can be accessed, processed and reused over the Internet. This shortcoming is addressed by exploring OWL knowledge modeling, semantic annotation and semantic categorization techniques in an Atom blog sphere. By adopting these techniques, futuristic Atom blogs can be created and deployed over the Internet

    Experiences of people with dementia and their caregivers during the COVID-19 pandemic in India: a mixed-methods study

    Get PDF
    Background The COVID-19 pandemic has unprecedented consequences for the management of chronic diseases such as dementia. However, limited evidence exists on the condition of persons with dementia and their caregivers during the pandemic in lower-middle-income countries (LMICs). The study aimed to provide insights into the experiences of persons with dementia and their families during the early phases of the pandemic in India. Methods This study adopted a mixed-method approach. One hundred and four persons with dementia and their caregivers were evaluated via telephone using validated instruments and a semi-structured interview guide. We used the quantitative data collected to establish a baseline, whereas qualitative data were analysed thematically. Results The study revealed that persons with dementia and their caregivers experienced difficulties during the pandemic, which included worsening of behaviour, problems in accessing care, disruptions in functional activities and struggles in enforcing infection prevention contributing to caregiver distress. An important finding that emerged was the unchanging reality of caregiving for families. The relative success of the public health response to the COVID-19 pandemic contrasted with the lack of awareness and formal support for dementia. Conclusions The COVID-19 pandemic has exposed the vulnerabilities of persons with dementia and their caregivers. This calls for a collaborative reframing of medical care and public health policies to address dementia care

    Geographically Secured SSL-VPN Using GPS

    No full text
    We are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application, for critical applications, such as the military. A formal model for location-based access control is needed that increases the security of the application and ensures that the location information cannot be exploited to cause harm. In this paper, we show how the SSL VPN model can be extended to incorporate the notion of location. We show how this location information can be used to determine whether a subject has access to a given object. A novel improved VPN (Virtual Private Network) system based on geo-secured SSL (Secure Socket Layer) protocol is proposed to overwhelm the defects of traditional SSL VPN. It enhances current security applications granting access to sensible information and privileges to execute orders only to entities that are in a trusted location. This system not only authenticates authorized user but also the location of the userby Suresh Limkar and Dhiren Pat

    A Survey of Database Intrusion Detection Approaches for Database Security

    No full text
    by Udai Pratap Rao and Dhiren R. Pate

    Maintaining privacy and data quality in privacy preserving association rule mining

    No full text
    Privacy preserving data mining (PPDM) is a novel research direction to preserve privacy for sensitive knowledge from disclosure. Many of the researchers in this area have recently made effort to preserve privacy for sensitive association rules in statistical database. In this paper, we propose a heuristic algorithm named DSRRC (Decrease Support of R.H.S. item of Rule Clusters), which provides privacy for sensitive rules at certain level while ensuring data quality. Proposed algorithm clusters the sensitive association rules based on certain criteria and hides as many as possible rules at a time by modifying fewer transactions. Because of less modification in database it helps maintaining data quality.by Chirag Modi, Udai Pratap Rao and Dhiren R. Pate

    An efficient approach for preventing disclosure of sensitive association rules in databases

    No full text
    by Chirag Modi, Udai Pratap Rao and Dhiren R. Pate

    Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification

    No full text
    With the proliferation of universal clients over Internet, use of security protocols is rapidly on rise to minimize associated risks. Security protocols are required to be verified thoroughly before being used to secure applications. There are several approaches and tools exist to verify security protocols. Out of these one of the more suitable is the Formal approach. In this paper, we give an overview of different formal methods and tools available for security protocol verification.by Dhiren R. Patel et al.
    corecore