188 research outputs found

    Magnetic Use in Gastrointestinal Surgery

    Get PDF

    Discovery of Malicious Attacks to Improve Mobile Collaborative Learning (MCL)

    Get PDF
    Mobile collaborative learning (MCL) is highly acknowledged and focusing paradigm in eductional institutions and several organizations across the world. It exhibits intellectual synergy of various combined minds to handle the problem and stimulate the social activity of mutual understanding. To improve and foster the baseline of MCL, several supporting architectures, frameworks including number of the mobile applications have been introduced. Limited research was reported that particularly focuses to enhance the security of those pardigms and provide secure MCL to users. The paper handles the issue of rogue DHCP server that affects and disrupts the network resources during the MCL. The rogue DHCP is unauthorized server that releases the incorrect IP address to users and sniffs the traffic illegally. The contribution specially provides the privacy to users and enhances the security aspects of mobile supported collaborative framework (MSCF). The paper introduces multi-frame signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with novel algorithms through addition of new rules in IDS and mathematcal model. The major target of contribution is to detect the malicious attacks and blocks the illegal activities of rogue DHCP server. This innovative security mechanism reinforces the confidence of users, protects network from illicit intervention and restore the privacy of users. Finally, the paper validates the idea through simulation and compares the findings with other existing techniques.Comment: 20 pages and 11 figures; International Journal of Computer Networks and Communications (IJCNC) July 2012, Volume 4. Number

    Automatic Energy Saving (AES) Model to Boost Ubiquitous Wireless Sensor Networks (WSNs)

    Get PDF
    We deploy BT node (sensor) that offers passive and active sensing capability to save energy. BT node works in passive mode for outdoor communication and active for indoor communication. The BT node is supported with novel automatic energy saving (AES) mathematical model to decide either modes. It provides robust and faster communication with less energy consumption. To validate this approach, network simulator-2 (ns2) simulation is used to simulate the behavior of network with the supporting mathematical model. The main objective of this research is to remotely access different types of servers, laptops, desktops and other static and moving objects. This prototype is initially deployed to control MSCS [13] & [14] from remote place through mobile devices. The prototype can further be enhanced to handle several objects simultaneously consuming less energy and resources.http://arxiv.org/abs/1309.450

    Restoring the privacy and confidentality of users over Mobile Collaborative Learning (MCL) environment

    Get PDF
    Rogue DHCP server spreads the wrong network parameters that create the bridge for attackers to expose confidentiality and privacy. Trojans like DNS-changing installs the rogue DHCP server and pollutes the network. It provides the chances for attackers to use compromised resources on network. Rogue DHCP server creates several problems to expose the privacy of legitimate users. Two important attacks are shown in figure 1. The poster focuses on two of most important issues

    Innovative prototypes for mobile collaborative learning (MCL) to substantiate pedagogical activities

    Get PDF
    This poster introduces the new ranking and marking testing method which provides educational support and gives complete picture for developing new pedagogical protocols and applications for MCL. On the basis of ranking and marking method, the poster introduces new server and client side interactive prototypes with support of various working components, which help the users in obtaining the contents from server to meet the pedagogical requirements. The poster also proposes and integrates the features of content-server with cacheserver to provide the faster delivery of contents for MCL. Furthermore, the poster proposes and implements some features of a novel "group application" to support asynchronous and synchronous and multimodal features to facilitate the students for MCL. Finally, the poster validates the features of interactive architectural based protocols, group application and light weight software threads. This contribution will encourage and motivate the students to pursue their education again because the students will be able to get the course contents at anytime and anywhere

    Use of mobile phone among fisherman for marketing and weather information

    Get PDF
    This article assesses that how the mobile phone has improved the life of fishermen and increased their income. Basis on the literature review it was indicated that how mobile phone has provided an access to fishermen for sell their produce in market. Mobile phone has given a ground to fishermen for communicate with dealer at port and deal for get good price of their catches. Similarly fishermen get latest information about weather before going to sea. By use of mobile phone fishermen have save their time and also their income. Mobile phone has also reduce the gap between rural and urban communities nowadays fishermen directly sell their produce in market without dealing with local brokers. Mobile phones provide fishermen option to take processes to reduce the risks. Especially in case of emergencies when fishermen were in sea
    corecore