7 research outputs found

    Tom and Jerry Based Multipath Routing with Optimal K-medoids for choosing Best Clusterhead in MANET

    Get PDF
    Given the unpredictable nature of a MANET, routing has emerged as a major challenge in recent years. For effective routing in a MANET, it is necessary to establish both the route discovery and the best route selection from among many routes. The primary focus of this investigation is on finding the best path for data transmission in MANETs. In this research, we provide an efficient routing technique for minimising the time spent passing data between routers. Here, we employ a routing strategy based on Tom and Jerry Optimization (TJO) to find the best path via the MANET's routers, called Ad Hoc On-Demand Distance Vector (AODV). The AODV-TJO acronym stands for the suggested approach. This routing technique takes into account not just one but three goal functions: total number of hops. When a node or connection fails in a network, rerouting must be done. In order to prevent packet loss, the MANET employs this rerouting technique. Analyses of AODV-efficacy TJO's are conducted, and results are presented in terms of energy use, end-to-end latency, and bandwidth, as well as the proportion of living and dead nodes. Vortex Search Algorithm (VSO) and cuckoo search are compared to the AODV-TJO approach in terms of performance. Based on the findings, the AODV-TJO approach uses 580 J less energy than the Cuckoo search algorithm when used with 500 nodes

    Novel Proposed Work for Empirical Word Searching in Cloud Environment

    Get PDF
    People's lives have become much more convenient as a result of the development of cloud storage. The third-party server has received a lot of data from many people and businesses for storage. Therefore, it is necessary to ensure that the user's data is protected from prying eyes. In the cloud environment, searchable encryption technology is used to protect user information when retrieving data. The versatility of the scheme is, however, constrained by the fact that the majority of them only offer single-keyword searches and do not permit file changes.A novel empirical multi-keyword search in the cloud environment technique is offered as a solution to these issues. Additionally, it prevents the involvement of a third party in the transaction between data holder and user and guarantees integrity. Our system achieves authenticity at the data storage stage by numbering the files, verifying that the user receives a complete ciphertext. Our technique outperforms previous analogous schemes in terms of security and performance and is resistant to inside keyword guessing attacks.The server cannot detect if the same set of keywords is being looked for by several queries because our system generates randomized search queries. Both the number of keywords in a search query and the number of keywords in an encrypted document can be hidden. Our searchable encryption method is effective and protected from the adaptive chosen keywords threat at the same time

    SARS-CoV-2 B.1.617.2 Delta variant replication and immune evasion

    Get PDF
    Abstract: The B.1.617.2 (Delta) variant of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) was first identified in the state of Maharashtra in late 2020 and spread throughout India, outcompeting pre-existing lineages including B.1.617.1 (Kappa) and B.1.1.7 (Alpha)1. In vitro, B.1.617.2 is sixfold less sensitive to serum neutralizing antibodies from recovered individuals, and eightfold less sensitive to vaccine-elicited antibodies, compared with wild-type Wuhan-1 bearing D614G. Serum neutralizing titres against B.1.617.2 were lower in ChAdOx1 vaccinees than in BNT162b2 vaccinees. B.1.617.2 spike pseudotyped viruses exhibited compromised sensitivity to monoclonal antibodies to the receptor-binding domain and the amino-terminal domain. B.1.617.2 demonstrated higher replication efficiency than B.1.1.7 in both airway organoid and human airway epithelial systems, associated with B.1.617.2 spike being in a predominantly cleaved state compared with B.1.1.7 spike. The B.1.617.2 spike protein was able to mediate highly efficient syncytium formation that was less sensitive to inhibition by neutralizing antibody, compared with that of wild-type spike. We also observed that B.1.617.2 had higher replication and spike-mediated entry than B.1.617.1, potentially explaining the B.1.617.2 dominance. In an analysis of more than 130 SARS-CoV-2-infected health care workers across three centres in India during a period of mixed lineage circulation, we observed reduced ChAdOx1 vaccine effectiveness against B.1.617.2 relative to non-B.1.617.2, with the caveat of possible residual confounding. Compromised vaccine efficacy against the highly fit and immune-evasive B.1.617.2 Delta variant warrants continued infection control measures in the post-vaccination era

    Transmission of B.1.617.2 Delta variant between vaccinated healthcare workers

    Get PDF
    AbstractBreakthrough infections with SARS-CoV-2 Delta variant have been reported in doubly-vaccinated recipients and as re-infections. Studies of viral spread within hospital settings have highlighted the potential for transmission between doubly-vaccinated patients and health care workers and have highlighted the benefits of high-grade respiratory protection for health care workers. However the extent to which vaccination is preventative of viral spread in health care settings is less well studied. Here, we analysed data from 118 vaccinated health care workers (HCW) across two hospitals in India, constructing two probable transmission networks involving six HCWs in Hospital A and eight HCWs in Hospital B from epidemiological and virus genome sequence data, using a suite of computational approaches. A maximum likelihood reconstruction of transmission involving known cases of infection suggests a high probability that doubly vaccinated HCWs transmitted SARS-CoV-2 between each other and highlights potential cases of virus transmission between individuals who had received two doses of vaccine. Our findings show firstly that vaccination may reduce rates of transmission, supporting the need for ongoing infection control measures even in highly vaccinated populations, and secondly we have described a novel approach to identifying transmissions that is scalable and rapid, without the need for an infection control infrastructure.</jats:p
    corecore