551 research outputs found
IP Security
IP is stands for Internet Protocol. IP security is a set service which secures the documents by the unauthorized entity. IP Sec covers the three areas of functionality that is authentication, confidentiality, and key management. IP Sec encrypts and authenticates all the data traffic at the IP level security. The IP level security or firewall administrator, we got basically the same concerns (as plumber) the size of the pipe the contents of the pipe, making sure the correct traffic is in the correct pipes and keeping the pipes from splitting and leaking all over the places of course like plumbers. When the pipes do leak: we are the ones responsible for cleaning up the mess and we are the ones who come up smelling awful. Firewall is a device that is used to provide protection to a system from network-based security threats. Firewall uses service, behavior, user and direction control techniques
Security: Hash Function-authentications
As security or firewall administrator, we got basically the same concerns (as a plumber) the size of the pipe the contents of the pipe, making sure the correct traffic is in the correct pipes and keeping the pipes from splitting and leaking all over the places of course like plumbers. When the pipes do leak: we are the ones responsible for cleaning up the mess and we are the ones who come up smelling awful. Firewall is a device that is used to provide protection to a system from network-based security threats. The firewall uses service, behavior, user and direction control techniques
Multi-factor Authentication and Their Approaches
A multi-factor authentication is an approach to authentication which requires the presentation of two or more of the three authentication factors: a knowledge factor ("something the user knows"), a possession factor ("something the user has"), and an inherence factor ("something the user is"). Two-factor authentication seeks to decrease the probability that the requestor is presenting false evidence of its identity. In reality, there are more variables to consider when establishing the relative assurance of truthfulness in an identity assertion than simply how many "factors" are used. The U.S. Federal Financial Institutions Examination Council issued supplemental guidance on this subject in August 2006, in which they clarified, "By definition true multifactor authentication requires the use of solutions from two or more of the three categories of factors
Effect of microencapsulated plant extracts on mosquito repellency
Mosquitoes are the most important single group of insects in terms of public health importance. Mosqui-toes not only cause nuisance by their bites but also transmit deadly diseases. The activity of mosquitoes is affected by climate, light and temperature. In tropical areas like India, the population of mosquitoes is found huge day by day. Repeated use of synthetic insecticides for mosquito control has disrupted environment as well as human health. To overcome this problem, plant derived compounds may be the better alternate over synthetic insecticides. To enhance the health and hygiene qualities by means of use of medicinal plants through effective application technique on textiles, marigold (petals) and nirgundi (leaves) methanol extract was used as mosquito repellent finish on 100 % woven cotton. For applying mosquito repellent finish on fabric, complex coacervation technique of microencapsulation was used through pad-dry-cure method. Finished cotton samples were tested against Anopheles stephensi by using laboratory cage method for their efficacy and durability to washing and sun-drying as per standard test methods. Marigold (petals)and nirgundi (leaves) extract finished fabric samples showed 96 and 94 % repellency respectively after 60 minutes of observation. It remained 56 % and 54 % (after 15 washes) and 54 and 52 % (after expo-sure in sun for 3 hours) by the application of marigold and nirgundi extracts respectively. Hence, microencapsulation technique on selected cotton textile proved effective to repel mosquitoes up to acceptable level according to WHO (1996)
Impacto do Taraxerol em combinação com o extrato da planta de Euphorbia tirucalli nos parâmetros biológicos da Lymnaea acuminata
The present work was carried out to evaluate the molluscicidal activity of active ingredient Taraxerol with the acetone extract of Euphorbia tirucalli against Lymnaea acuminata snail. The (fecundity, hatchability and survivability) of snail L. acuminata exposed to this extract was studied. The effects of the tested extracts on life-history traits of harmful snail L. acuminata have also been evaluated, and this study also expounds the inhibitory effects of these extracts singly as well as in binary combination (1:1 ratio). It concluded that these herbal products act as a potential source of molluscicides, and that they would also have the advantage of easy availability, low cost, biodegradability and greater acceptance amongst users than synthetic pesticide.O presente trabalho foi levado a efeito para avaliar a atividade moluscicida do ingrediente ativo Taraxerol junto com o extrato de acetona da Euphorbia tirucalli contra o caramujo Lymnaea acuminata. Foram estudados a fecundidade, o desenvolvimento e sobrevivência do caramujo Lymnaea acuminata exposto a estes extratos. Os efeitos danosos destes extratos testados na vida do caramujo L. acuminata foram também avaliados e este estudo demonstra os efeitos inibidores destes extratos isolados ou em combinação binária (relação l:1). Concluiu-se que estes produtos vegetais agem como fontes potenciais de moluscicidas e que eles também têm a vantagem de obtenção fácil, baixo custo, biodegradabilidade e maior aceitação entre os usuários do que os pesticidas sintéticos
Design and Analysis of Reversible Data Hiding Using Hybrid Cryptographic and Steganographic approaches for Multiple Images
Data concealing is the process of including some helpful information on images. The majority of sensitive applications, such sending authentication data, benefit from data hiding. Reversible data hiding (RDH), also known as invertible or lossless data hiding in the field of signal processing, has been the subject of a lot of study. A piece of data that may be recovered from an image to disclose the original image is inserted into the image during the RDH process to generate a watermarked image. Lossless data hiding is being investigated as a strong and popular way to protect copyright in many sensitive applications, such as law enforcement, medical diagnostics, and remote sensing. Visible and invisible watermarking are the two types of watermarking algorithms. The watermark must be bold and clearly apparent in order to be visible. To be utilized for invisible watermarking, the watermark must be robust and visibly transparent. Reversible data hiding (RDH) creates a marked signal by encoding a piece of data into the host signal. Once the embedded data has been recovered, the original signal may be accurately retrieved. For photos shot in poor illumination, visual quality is more important than a high PSNR number. The DH method increases the contrast of the host picture while maintaining a high PSNR value. Histogram equalization may also be done concurrently by repeating the embedding process in order to relocate the top two bins in the input image's histogram for data embedding. It's critical to assess the images after data concealment to see how much the contrast has increased. Common picture quality assessments include peak signal to noise ratio (PSNR), relative structural similarity (RSS), relative mean brightness error (RMBE), relative entropy error (REE), relative contrast error (RCE), and global contrast factor (GCF). The main objective of this paper is to investigate the various quantitative metrics for evaluating contrast enhancement. The results show that the visual quality may be preserved by including a sufficient number of message bits in the input photographs
Foley catheter with vaginal prostaglandin E2 gel versus vaginal prostaglandin E2 gel alone for induction of labour: a randomized controlled trial
Background: Induction of labour is significant when continuing pregnancy possess adverse effect on health of mother and her unborn baby. Different methods have been used for induction of labour. At present there is very less literature regarding simultaneous use of Foleys catheter and PGs. The present study was done to compare the efficacy of using intracervical Foleys catheter and PGE2 gel simultaneously versus PGE2 gel alone for induction of labour.Methods: Prospective study, conducted in department of obstetrics and gynaecology for duration of 6 months. 100 women requiring induction of labour were included in the study and were randomly divided into two groups. 50 women were included in group A (simultaneous use of intracervical Foley catheter with PGE2 gel) and 50 women were included in Group B (intravaginal insertion of PGE2 gel only).Results: Maternal age, gestation age, parity, indication of induction and primary Bishops score were comparable in both the groups. Mean induction to active phase interval in both groups which was 5.8±0.80 hours in Group A and 6.23±0.40 hours in Group B. Also mean time taken from induction to delivery in Group A was 10.08±5.6 hours and in Group B was 14.6±6.9 hours which was significantly less in Group A. The rate of vaginal delivery in group A and Group B was 66% and 58% respectively which was slightly more in Group A but was not significant.Conclusions: In the present study we conclude that simultaneous use of mechanical method with Foleys catheter and PGE2 gel is better and more effective method for induction of labour than PGE2 alone. However, large sample size is required to reach more confirmatory results
A CRITICAL APPRAISAL ON AGEING PROCESS IN AYURVEDA
Ayurveda being essentially the science of life and longevity narrates all aspects of life and puts special emphasis on Jara (ageing). The world population of the elderly is increasing and by the year 2030, older persons are projected to account for one in six people globally. Ageing is a process of unfavorable progressive changes associated with decline in vigor and ending in death. It is an irreversible and inevitable process and has multidimensional aspects. Everyone must undergo this phase of life at his/her own life. In Ayurveda, Jara (ageing) is clearly defined as that which has lost age means become old by the act of degeneration of bodily tissues and organs. It is described of two types- Kalaja jara and Akalaja jara. The Kalaja jara (timely ageing) can be regarded as chronological ageing where Dhatukshaya occurs whereas the Akalajajara (premature ageing) which occurs untimely i.e., before its prescribed time it can be regarded as biological ageing and is more intense than that of the chronological ageing. Several concepts are reported in Ayurveda regarding ageing process e.g, decade wise ageing process is described by Acharya Vagbhat and Sharangdhara. According to them one particular bodily feature is being degraded by each decade of lifespan, in the same way multiple theories are also analyzed in contemporary science. The whole biology of ageing has been dealt in present article within the Ayurvedic frame
- …