247 research outputs found

    Discriminating weight of Cloud Environment in ERP selection assessment

    Get PDF
    Selection of an ERP, based on its incorporated component parameters, is a significant problem for an industry. A more comprehensive structure of an ERP is a three tier ERP. A cloud database is a cloud computing service. Database has scalability, and makes underlying virtual machine instances to run a database on such virtual machines. Cloud databases which are relational as opposed to non relational or No SQL databases, imply that SQL databases can run in the cloud with a virtual machine or as a service. Cloud computing architecture is a set of components and subcomponents required for cloud computing. A front end platform set like fat client, thin client, mobile device, Back end platforms like servers, storage, a cloud based delivery, A network such as internet, intranet, Inter cloud connectivity setup are a combined blend that together make a Cloud framework. The paper aims to discriminate availing an ERP in Cloud or Non Cloud framework mode and analyzing pros and cons in both modes

    Wound Healing Evaluation of Some Herbal Formulations Containing Curcuma Longa and Cynodon Dactalon Extract

    Get PDF
    The wound healing effect of herbal cream formulated with Curcuma longa, and Cynodon dactylon embedded in different ointment bases (anionic, cationic and non-ionic) has been evaluated in vivo using the incision, excision and dead space tissue wound models, on Swiss wister rat. Curcuma longa, and Cynodon dactylon was extracted using Pet ether (60-800C ), chloroform, ethanol, methanol and water. The  methanolic  extract formulated as herbal preparations. The herbal preparations were used to treat wounds inflicted on experimental  Swiss wister rat. The wound healing effects of the formulations were compared to that of a standard antibiotic. In all cases, there was a progressive decrease in wound area with time, indicating an efficacy of the formulations in healing the induced wounds. By the 14th day, the formulation  containing 100 mg/g of Curcuma longa, and Cynodon dactylon in cationic base showed 100 % healing. The wound areas in the animals treated with the standard antibiotic, showed a 100% healing by the 17 th day, indicating that the plant extract, at that given concentration, had a better wound healing property

    An Event Based Digital Forensic Scheme for Vehicular Networks

    Get PDF
    The software in today's cars has become increasingly important in recent years. The development of high-tech driver assistance devices has helped fuel this movement. This tendency is anticipated to accelerate with the advent of completely autonomous vehicles. As more modern vehicles incorporate software and security-based solutions, "Event-Based digital forensics," the analysis of digital evidence of accidents and warranty claims, has become increasingly significant. The objective of this study is to ascertain, in a realistic setting, whether or not digital forensics can be successfully applied to a state-of-the-art automobile. We did this by dissecting the procedure of automotive forensics, which is used on in-car systems to track the mysterious activity by means of digital evidence. We did this by applying established methods of digital forensics to a state-of-the-art car.Our research employs specialized cameras installed in the study areas and a log of system activity that may be utilized as future digital proof to examine the effectiveness of security checkpoints and other similar technologies. The goal is to keep an eye on the vehicles entering the checkpoint, look into them if there is any reason to suspect anything, and then take the appropriate measures. The problem with analyzing this data is that it is becoming increasingly complex and time-consuming as the amount of data that has been collected keeps growing. In this paper, we outline a high-level methodology for automotive forensics to fill in the blanks, and we put it through its paces on a network simulator in a state-of-the-art vehicle to simulate a scenario in which devices are tampered with while the car is in motion. Here, we test how well the strategy functions. Diagnostics over IP (Diagnostics over IP), on-board diagnostics interface, and unified diagnostic services are all used during implementation. To work, our solution requires vehicles to be able to exchange diagnostic information wirelessly.These results show that it is possible to undertake automotive forensic analysis on state-of-the-art vehicles without using intrusion detection systems or event data recorders, and they lead the way towards a more fruitful future for automotive forensics. The results also show that modern autos are amenable to forensic automotive analysis

    DC Conductivity Study of Cadmium Sulfide Nanoparticles

    Get PDF
    The dc conductivity of consolidated nanoparticle of CdS has been studied over the temperature range from 303 K to 523 K and the conductivity has been found to be much larger than that of single crystals

    An Empirical Estimation of CSS Cognitive Radio Network Performance under Spectrum Sensing Data Falsification Attack

    Full text link
    Cooperative spectrum sensing (CSS) significantly improves the performance of spectrum sensing process in cognitive radio networks (CRNs). Individual spectrum sensing by a cognitive radio (CR) is often inaccurate as the channel often experiences fading and shadowing effects. CSS has been shown to have many advantages in terms of spectrum use and robustness. Despite these facts, a CSS scheme also vulnerable to many security attacks from Malicious users (MUs). In order to get unfair USAge of spectrum band, MUs can generate false spectrum sensing reports to disturb the good secondary users (SUs) decision about presence of primary user (PU). In this paper, we consider the spectrum sensing data falsification attack (SSDF) in CSS and propose the protocol to identify and eliminate the attacker or Malicious user (MU) to improve the network performance. In SSDF attack, MUs send the false spectrum sensing results to fusion center (FC) with the intension that it should make wrong decision about spectrum sensing. In this scenario, FC acts as a data collector to fuse the reports sent by SUs
    corecore