429 research outputs found

    PREVENTING INSIDER ATTACKS IN UNTRUSTED INFRASTRUCTURE AS A SERVICE CLOUDS

    Get PDF
    Recent technical advances in utility computing have allowed small and medium sized businesses to move their applications to the cloud, to benefit from features such as auto-scaling and pay-as-you-go facilities. Before clouds ar wide adopted, there is a need to address privacy concerns of customer data outsourced to these platforms. In a practical approach for protecting the confidentiality and integrity of client data and computation from insider attacks such as cloud clients as well as from the Infrastructure-as-a-Service (IaaS) based cloud system administrator himself. We demonstrate a scenario of how the origin integrity and authenticity of health-care multimedia content processed on the cloud can be verified using digital watermarking in an isolated environment without revealing the watermark details to the cloud administrator. Finally to verify that our protocol does not compromise confidentiality and integrity of the client data and computation or degrade performance, we have tested a prototype system using two different approaches. Performance analysis of our implementation demonstrates that it adds negligible overhead

    LOCAL SPECTRAL COMPONENT DECOMPOSITION FOR WAVELET TRANSFORM ANALYSIS IN MULTI-CHANNEL IMAGE DENOISING

    Get PDF
    Our point is to join upheaval on multi-channel pictures by abuse the prompt relationship in the creepy field of a nearby area. To fundamental addition a straight segment more than the powerful bits of a M-channel plot, which we depict the strange line, and a brief timeframe later, utilizing the line, we ruin the picture into three portions: a particular M-channel picture and two dull scale pictures. By amazing part of the disintegrating, the bang is chosen the two pictures, and right now calculation necessities to denoise basically the two grayscale pictures, paying little cerebrum to the measure of the channels. There are different assessments for the confirmation of the boundaries, at any rate standard relationship better execution and improving picture quality. Since the wavelet change has remarkable execution, subsequently, it has been broadly applied as a sort of sign and picture preparing contraptions. Right now change is utilized in the picture de-noising and we suggest a standard relationship calculation which gives refreshed execution and Experimental outcomes show the authority of the new assessment

    ENGAGEMENT AND POPULARITY DYNAMICS OF YOUTUBE VIDEOS AND SENSITIVITY TO META-DATA

    Get PDF
    YouTube, with a large number of substance makers, has become the favored objective for watching recordings online from side to side the partner plan, YouTube permit cheerful makers to adapt their well-known recordings. Vital for content makers is which meta-level highlights (for example title, tag, and thumbnail) are generally responsive for advance video notoriety. The popularity of video likewise relies upon the social elements, for example the contact of the substance makers (or channels) with YouTube client's .we experimentally inspect the affectability of YouTube meta-level highlights and social elements. The key meta-level skin that blow the view tally of a video comprise of: first day see tally , number of endorsers, differentiation of the video thumbnail, Google hits, number of watchwords, video classification, title length, and number of capitalized letters in the title separately and represent that these meta-level highlights can be utilized to gauge the prevalence of a video. In adding, upgrading the meta-level skin after a tape is post expands the notoriety of video. In the foundation of social elements, we discover that there is a major affiliation flanked by perspectives to a channel and the related number of endorsers. Too, knowledge into the effects of arrangement and video play from side to side in a channel are likewise given. Our answer gives a valuable thoughtful of client arrangement in YouTube

    EBCOT ALGORITHM BASED INVERSE HALFTONNING ON CBIR

    Get PDF
    A procedure for Content Based Image Retrieval (CBIR) for the formation of picture content descriptor which abusing the upside of low multifaceted nature Order Dither Block Truncation Coding (ODBTC). The quantizer and bitmap picture are the packed type of picture got from the ODBTC method in encoding step. Translating isn't acted in this strategy. It has two picture highlight, for example, Color Co-event Feature (CCF) and Bit Pattern Feature (BPF) for ordering the picture. These highlights are straightforwardly gotten from ODBTC encoded information stream. By contrasting and the BTC picture recovery framework and other prior technique the test result show the proposed strategy is predominant. ODBTC is appropriate for picture pressure and it is a simple and viable descriptor to file the picture in CBIR. Content-based picture recovery is utilized to separate the pictures based on their substance, for example, surface, shading, shape and spatial format. To limit this hole numerous ideas was presented. Also, Images can be put away and extricated dependent on different highlights and one of the unmistakable component is Texture

    DYNAMIC TEXT BLOCKING IN SOCIAL NETWORKS FOR USER EXPERIENCE

    Get PDF
    Online social systems have become an important part of everyday life. While initial examples were used to share personal content with friends more and more online social systems are also used to do business unfortunately, privacy concerns raised in the recommendation process impede the expansion of OSN users’ friend circle. Some OSN users refuse to disclose their identities and their friends’ information to the public domain. Indeed, today OSNs provide very little support to prevent unwanted messages on user walls. In order to avoid this problem in the proposed system implemented the dynamic blocking algorithm, it’s automatically block the unwanted text post message and in the classification methods using the supervised methods are implement the decision tree, Using the decision tree, its creates the more number of category, under this category its stored more data

    DETECTING AND RESOVING ANOMALIES USER ANALYSIS ON FIREWALL POLICY IN SENSOR NETWORKS

    Get PDF
    The coming of arising figuring innovations, for example, administration situated engineering and distributed computing has empowered us to perform business benefits all the more proficiently and adequately. Nonetheless, we actually experience the ill effects of unintended security spillages by unapproved activities in business administrations. Firewalls are the most generally conveyed security system to guarantee the security of private organizations in many organizations and establishments. The adequacy of security assurance gave by a firewall basically relies upon the nature of strategy designed in the firewall. Lamentably, planning and overseeing firewall approaches are regularly mistake inclined because of the perplexing idea of firewall arrangements just as the absence of deliberate examination instruments and devices. In this paper, we speak to a creative approach inconsistency the executive’s structure for firewalls, embracing a standard based division strategy to recognize strategy oddities and infer powerful oddity goals. Specifically, we articulate a matrix based portrayal method, giving an instinctive psychological sense about arrangement inconsistency. We additionally talk about a proof-of-idea execution of a perception based firewall strategy examination device called Firewall Anomaly Management Environment (FAME). Likewise, we exhibit how proficiently our methodology can find and resolve inconsistencies in firewall approaches through thorough tests

    SEMI SUPERVISED BASED FRAMEWORK FOR GENE DATA ANALYSIS USING SVM CLASSIFICATION AND RANDOM FOREST APPROACH

    Get PDF
    Microarray development is one of the basic biotechnological suggests that permit recording the enunciation levels of thousands of characteristics simultaneously inside different dissimilar models. A microarray quality enunciation educational list can be speak to by an appearance table, where each line looks at to one picky quality, each segment to a model, and each section of the grid is the conscious verbalization level of a particular quality in a model, correspondingly. A huge sales of microarray quality verbalization data in helpful genomics is to arrange tests according to their quality enunciation profiles. Close by the enormous measure of characteristics accessible in quality verbalization data, simply a more modest than typical segment of them is productive for playing out a convinced logical test. Regardless, for most quality verbalization data, the amount of planning tests is still little diverged from the colossal number of characteristics related with the assessments. Right when the amount of characteristics is essentially more imperative than the amount of tests, it is possible to find naturally relevant associations of value lead with the model characterizations or response factors. In this way, one of the mainly huge endeavors with the quality enunciation data is to recognize social occasions of co-coordinated characteristics whose supportive verbalization is unequivocally associated with the depiction classes or response factors. So execute feature subset assurance approach to manage decrease dimensionality, killing unnecessary data and augmentation end precision and presents learning strategy which can accumulate characteristics subject to their relationship to mine significant models from the quality verbalization data using Spatial EM estimation. It will in general be used to figure spatial mean and rank based scatter cross section to eliminate huge models and further execute KNN (K-nearest neighbor request) approach to manage investigation the diseases. A crucial finding is that the all-inclusive semi directed batching estimation is introduced to be valuable for perceiving naturally tremendous quality gatherings with excellent perceptive limit. An ideal sporadic forest area based figuring is proposed for the examinatio

    PROTECTING THE USER DATA IN THE CLOUD USING FAST VERIFIABLE MULTIPLE PATTERN MATCHING ALGORITHM

    Get PDF
    An estimations as-a-Service existing by cloud star resources for see a paid office that associate with relationship to re-sensible their hypnotizing numbers to be direct on killed issue composed able. In this organization, to proposal a cloud-based suspend plot that allows the information owner to profit by the work natural factor existing by the CSP and sketch in slippery essential trust flank by them. To prearranged blueprint has four crucial skin break out of thought: (I) it award the beginning to re-sensible fragile information to a CSP, and execute included quadrangle stage amazing strategy on the rethought information, i.e., block change, mix, fixing, and add, (ii) it ensure that demand customers get the most current grouping of the re-appropriated in progression, (iii) it interfaces with malicious split trust among the dynamic and the CSP, and (iv) it allows the owner to yield or contradict declaration to the re-appropriated limit. To explicit the customer managing the information into the cloud, for security gauges purposes going before entering the information into the cloud that information will teach and that will be controlled in the cloud. So when the customer is entering for unambiguous confirmation these progression decisions accomplish on the prearranged relationship of in gathering. A stream sign buddy contains an assortment of last part laborers. It has titanic reach creation with association extra than the Internet. Clearly when the cutoff is manage in the cloud, by then the procurer confirmation have no circumstance on that information around by at that most elevated point and therefore avow the appropriateness of the component blend aslant in obscurity is an unsafe concern. It fulfillment of the constituent article aslant in cloud is limited alert in gathering owner. It uses to be described commitment for change the agreement and this join experiences introduction is centered around in the cloud

    A Study on Hepatic Trauma: Single Centre Experience in Rajiv Gandhi Government General Hospital, Chennai

    Get PDF
    INTRODUCTION: Liver injuries are common in any high volume trauma center. Our knowledge in its management has improved in the past three decades. Recent advances and minimally invasive techniques play a vital role in the conservative approach. It is very difficult for a trauma surgeon to control massive bleeding occurring in the liver following trauma. The bleeding structure is very tough to find out, and the crucial period of time to save the trauma victim before the onset of hypothermia, acidosis, and coagulopathy—the markers of an irreversible physiologic insult. Usual techniques of elective hepato-biliary surgery like segmental resection do not apply in hostile environment where the timing of intervention is a major factor in saving the life of the patient. It is very clear that the management of hepatic trauma has been a formidable challenge to all surgeons. The evolvement of the management of hepatic trauma over the recent years is a reflection of the rapid understanding of the key parameters deciding the line of management in hepatic trauma. There were poor outcomes in patients where resection was done but future learning of the injured patient’s patho-physiology paved way for the concept of damage control that has been the key in modern trauma management. Meanwhile better learning of the outcome of various liver injuries in clinically stable patients has increased the conservative line of approach by using the modern imaging and minimally invasive procedures. AIMS AND OBJECTIVES: 1. To identify clinical and imaging parameters to decide upon the line of management in hepatic trauma. 2. To study the clinical course of patients managed conservatively. 3. To study the profile of various other associated injuries in liver trauma. MATERIALS AND METHODS: Sample Size: 35 cases. Study Design: Observational study (Prospective & Retrospective). Study Population: 35 cases. Study period: Oct 2015 to Sep 2016. Study Centre: Madras Medical College and Rajiv Gandhi Government General Hospital , Chennai. Subject Selection: Inclusion Criteria: All trauma victims sustaining blunt and penetrating trauma to the liver with or without associated injuries. Exclusion criteria: Abdominal trauma with isolated injury to the extra hepatic biliary tree or other visceral structures without liver trauma . ASSESSMENT OF PARAMETERS: All Patients who fit the inclusion criteria were observed and following data collected 1. Routine blood investigations, Hemoglobin, Hematocrit, Liver Function Test. All these were done serially. 2. USG Abdomen. 3. CECT Abdomen (i.v. contrast)/plain CT for all cases. 4. AAST grading system was the standard methodology to assess severity of liver injury. 5. Patients managed conservatively were followed up prospectively and till discharge. 6. Conclusions were drawn based on the above parameters. CONCLUSION: From this study it is clear that all hemodynamically stable patients can be subjected to conservative line of management irrespective of the grade of the injury. • Those managed conservatively must be subjected to serial monitoring. If there are findings of sepsis like biloma, infected necrosis, liver abscess at any point of time the first option of intervention will be minimally invasive procedures like image guided drainage. • If there are features of peritonitis then laparotomy must be considered without any delay. • Non operative management is employed for hemodynamically unstable patients. • The first step will always be a Pringles maneuver to identify the possible source of bleeding which can be from either the portal vein or hepatic artery and hemostasis can be achieved by topical hemostatic agents like gel foam etc. • If the patients hemodynamic status is in jeopardy then Perihepatic packing serves as the best operative intervention in reversing the patients hemodynamic status to normalcy

    Awareness About Various Disinfecting Agents Against Coronavirus in Chennai Population

    Get PDF
    To evaluate the awareness about various disinfectants used against the corona virus among the Chennai population. The outbreak of coronavirus disease 2019 (COVID-19) has infected and killed lots of people around the world. This led to the broad use of various types of disinfectants in order to control the public spread of the highly contagious virus. coronavirus can be inactivated by washing hands with soap and water and alcohol based hand rub. The transmission could not be prevented by the usual standards of hand hygiene, practised in the household this must be improved by the use of liquid soap dispensers and alcohol based hand-wash. A cross-sectional descriptive survey was prepared, and circulated through an online survey link, among the Chennai population within the age group of 25-30 years.The results were analysed using statistical analysis. Demographic information,Knowledge, attitude, practice were the output variables. The data analysis was done using SPSS software. From the cross-sectional study conducted among the Chennai population it is evident that most of the people are aware about COVID-19, and the various disinfectants used against it. Most of them find alcohol based hand rubs more effective than washing hands with soap and water. The increased awareness about the disinfectants and methods used will help to contain the spread of the virus
    • …
    corecore