A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Priyadharshini, A.
- A Survey on Security Issues and Challenges in Wireless Sensor Networks
Authors
1 Department of Computer Science, Sri Krishna Adithya College of Arts & Science, Coimbatore – 42, IN
2 Department of Computer Applications, Shri Nehru Maha Vidyalaya College of Arts & Science, Coimbatore – 50, IN
3 Department of Computer Applications, Shri Nehru Maha Vidyalaya College of Arts & Science, Coimbatore – 50., IN
Source
Wireless Communication, Vol 11, No 4 (2019), Pagination: 57-61Abstract
The Wireless Sensor Network is defined as a network of devices that can be accessed from the tracked field through wireless connections. Data is transmitted through multiple terminals, and data is connected to other networks such as wireless Ethernet, with a gateway. Today's wireless communications technology is an important tool in any use that requires communication between one or several senders and recipients. Security is important when delivering information on the network, security is considered to be the most challenging task in WSN as its tough to keep a watch on the sensor nodes/network every time. But it must be secured to prevent an intruder from attacking the transmission of data.
Keywords
Wireless, Sensor, Devices, Communication, Links, Nodes, Gateway, Ethernet, Sender, Receiver.References
- Vikash Kumar, Anshu Jain and P N Barwal, “wireless sensor networks: security issues, challenges and solutions”, IJICT, Vol. 4, 2014.
- Yogesh Kumar, Rajiv Munjal, Krishan Kumar, “Wireless Sensor Networks and Security Challenges”, IJCA, 2011.
- Jaspreet Kaur, Tavleen Kaur, “A Comparative Study of Techniques Used in Detection and Prevention of Black Hole Attack in Wireless Sensor Networks”, IJRASET, vol.2, March- 2014.
- SahabulAlam and Debashis De, “analysis of security threats in wireless sensor networks”, IJWMN, vol.6, April-2014.
- Aashima single and ratikasachdeva, “Review on security issue and attacks in wireless sensor network, IJARCSSE, vol. 3, April-2013.
- F. Stajano, R. Anderson, “The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks”, 3rd AT&T Software Symposium, Middletown, NJ, October 1999.
- C.Intanagonwiwat, R.Govindan and D.Estrin. Directed diffusion: A scalable and robust communication paradigm for sensor networks In Proc. of MobiCOM’00, Boston, Massachussetts, August 2000.
- J. Hill, R. Szewczyk, A, Woo, S. Hollar, D. Culler, and K. Pister, System Architecture Directions for Networked Sensors, ASPLOS, November 2000.
- Culler, D. E and Hong, W., “Wireless Sensor Networks”, Communication of the ACM, Vol. 47, No. 6, June 2004, pp. 30-33
- M. Dener, “Security analysis in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 10, no. 10, 2014.
- C. V. Samundre and P. A. D. Bijwe, “LEDS - an innovative corridor of data security in WSN,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 3, no. 2, pp. 707–711, 2015.
- V. C. Giruka, M. Singhal, J. Royalty, and S. Varanasi, “Security in wireless sensor networks: Research article,” Wireless Communications and Mobile Computing, vol. 8, no. 1, pp. 1–24, 2008.
- X. Du, and H-H. Chen, "Security in Wireless Sensor Networks", IEEE Wireless Communications, vol. 15, no. 4, Aug. 2008, pp.60-66.
- H. Luo, Y. Lin and S. K. Das, "Routing Correlated Data in Wireless Sensor Networks: A Survey", IEEE Network, vol. 21, no.6, Nov/Dec. 2007, pp. 40-47.
- R. Ramen, J. Lopez, S. Gritzalis, "Situation awareness mechanisms for wireless sensor networks ", IEEE Communication Magazine, vol. 46, no. 4, pp. 102-107, Apr. 2008.
- S. Rajasegarar, C. Leckie, and M. Palansiwami, "Anomaly detection in wireless sensor networks", IEEE Wireless Communications, vol. 15, no.4, Aug. 2008, pp. 34-40.
- Yun Zhou, Yuguang Fang, Yanchao Zhang, Securing Wireless Sensor Networks: A Survey, IEEE Communications Surveys & Tutorials, year 2008
- Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks, ” IEEE Commun. Surveys Tutorials, vol. 8, pp. 2– 23, year 2006.
- A Study on Computer Threats and Virus Prevention
Authors
1 Department of Computer Science, Sri Krishna Adithya College of Arts & Science, Coimbatore – 42, IN
2 Department of Computer Applications, Shri Nehru Maha Vidyalaya College of Arts & Science, Coimbatore – 50., IN
Source
Software Engineering, Vol 11, No 4 (2019), Pagination: 57-60Abstract
Security is a basic component of every computer. Security of computer technology, known as Information Security, compatible with computer and networks is security. This is a threat to any user who uses the computer network. Computer viruses will not be affected if the computer is not connected to the outside world. In this case, it is the Internet. This virus can be used as a medium to spread the virus completely. Many types of viruses spread on the Internet. Some of them are aimed at making money, and there is only one functionality and system performance. Some techniques are used to prevent viral transmission. The user's data will be publicly transmitted and protected from viral attacks. Techniques involving the prevention and prevention of viruses against computer networks will detect viral properties and functionsKeywords
Security, Technology, Information, Computer, Networks, Virus, System.References
- S. Natarajan and S. Rajarajesware, "Computer Virus: A Major Network Security Threat," International Journal of Innovative Research & Development, vol.3, no. 7, pp. 229-302, 2014.
- S. Chakraborty, "A Comparison study of ComputerVirus and Detection Techniques," International Journal of Scientific Research in Computer Science,Engineering and Information Technology, vol. 2, no.1, pp. 236-240, 2017.
- M. Khari and C. Bajaj, "Detecting Computer Viruses," International Journal of Advanced Research in Computer Engineering & Technology, vol. 3, no. 7, pp. 2357-2364, 2014
- S. Ramadhani, Y. M. Saragih, R. Rahim and A. P. U. Siahaan, "Post-Genesis Digital Forensics Investigation," International Journal of Scientific Research in Science and Technology, vol. 3, no. 6, pp. 164-166, 2017.
- Auerbach Publishers (a division of Warren Gorham & Lamont). Data Security Management.Boston, MA. 1995.
- British Standards Institute. A Code of Practice for Information Security Management, 1993.
- Caelli, William, Dennis Longley, and Michael Shain Information Security Handbook. New York, NY: Stockton Press, 1991.
- Hariyanto and A. P. U. Siahaan, "Intrusion Detection System in Network Forensic Analysis and Investigation," IOSR Journal of Computer Engineering, vol. 18, no. 6, pp. 115-121, 2016.
- M. Rahgozar. “Computer networks”. Book of the Month Science and Technology, pp. 98-99, 2010.
- F. Hohaji, "providing a framework of security for services in next generation networks," the Third National Conference on Information and Communication Technology, Tehran, 2008.
- A. Vizandan, A. Mir Ghadri, J. Sheykh Zadegan, "passive defense in infrastructure communications networks with an emphasis on the security assessment of flow encryption algorithms," Journal of passive defense, pp. 47-52, summer and fall of 2011.
- M. Azar Poor, A. Dahar, M. Jahani Mir, “the assessment of computer network security by Honey Pot technique in IDS & IPS systems”," journal of information technology era, pp. 78-84, 2012.
- L. Peterson and B. Davie, Computer Networks: A Systems Approach, USA: Elsevier, Inc., 2012.
- A. Tanenbaum and. D. Wetherall, Computer Networks, New Jersey: Pearson Prentice Hall, 2011.
- Tutorials Point (I) Pvt. Ltd., Data Communication and Computer Network, INDIA: www.tutorialspoint.com, 2014.
- K. Mansfield and J. Antonakos, Computer Networking for LANS to WANS: Hardware, Software and Security, USA: Course Technology, Cengage Learning, 2010.
- Computer Virus: Their Problems & Major attacks in Real Life, International Journal of P2P Network Trends and Technology (IJPTT), Vol. 3, Issue 4, May 2013
- Overview of Metformin as a Host Targeted Therapy in Tuberculosis
Authors
1 Department of Pharmacy Practice, SRM College of Pharmacy, SRMIST, Kattankulathur, IN
Source
Research Journal of Pharmacy and Technology, Vol 12, No 7 (2019), Pagination: 3211-3213Abstract
Tuberculosis is a communicable disease caused by the organism Mycobacterium tuberculosis, the mortality and morbidity due to TB remains immense. Diabetes is a metabolic disorder where TB is an airborne infectious disease, but both are found to be interrelated. TB can trigger the diabetes and also worsen the glycaemic level in patients with pre-existing Diabetes. TB patients are at risk of developing diabetes owing to glucose intolerance. Most of the people with TB are usually diagnosed with DM at a later stage. Conversely, uncontrolled diabetes may leads to increased susceptibility to infections such as TB at immunological and cellular level. The current treatment for the tuberculosis is very effective, but the emergence of multi-drug resistance are inevitable, which drives us to develop new therapy for TB. Metformin as a Host directed therapy helps to reduce the intracellular growth of Mycobacterium tuberculosis in both diabetic and non-diabetic patients. Metformin works by activating AMPK (Adenosine monophosphate kinase), thus inhibits the intracellular growth and restricts the immunopathology of Mycobacterium tuberculosis. Therefore, incorporating metformin into the present standard TB regimen would be a better therapeutic option for TB.Keywords
Tuberculosis, Metformin, Diabetes Mellitus, Host-Directed Therapy, Immune Response.References
- Naik B, Kumar AM, Satyanarayana S, Suryakant MD, Swamy NM, Nair S, Isaakidis P, Harries AD. Is screening for diabetes among tuberculosis patients feasible at the field level? Public Health Action. 2013 Nov 4; 3(1):34-7
- Sagavkar Sandhyarani R, Devkar Swati R. Tuberculosis: A Review. Asian J. Pharm. Res. 2018; 8(3): 191-194.
- Restrepo BI, Camerlin AJ, Rahbar MH, Wang W, Restrepo MA, Zarate I, Mora-Guzmán F, Crespo-Solis JG, Briggs J, McCormick JB, FisherHoch SP. Cross-sectional assessment reveals high diabetes prevalence among newly-diagnosed tuberculosis cases. Bulletin of the World Health Organization. 2011; 89: 352-9.
- Hazaratali Panari, Vegunarani. M. Study on Complications of Diabetes Mellitus among the Diabetic Patients. Asian J. Nur. Edu. and Research. 2016; 6(2): 171-182.
- Balakrishnan S, Vijayan S, Nair S, Subramoniapillai J, Mrithyunjayan S, Wilson N, Satyanarayana S, Dewan PK, Kumar AM, Karthickeyan D, Willis M. High diabetes prevalence among tuberculosis cases in Kerala, India. PloS one. 2012 Oct 15; 7(10): e46502.
- Sandip Zine, Shweta A. Patankar, Sushmita S. Raopati. Rise of Antibiotic Resistance in Tuberculosis. Research J. Pharm. and Tech 2018; 11(7): 3201-3204
- Karumbi J, Garner P. Directly observed therapy for treating tuberculosis. The Cochrane database of systematic reviews. 2015 May 29(5):1.
- Joshi JM. Tuberculosis chemotherapy in the 21st century: Back to the basics. Lung India: Official Organ of Indian Chest Society. 2011 Jul; 28(3):193.
- Beysel S, Unsal IO, Kizilgul M, Caliskan M, Ucan B, Cakal E. The effects of metformin in type 1 diabetes mellitus. BMC endocrine disorders. 2018 Dec; 18(1):1.
- Rojas LB, Gomes MB. Metformin: an old but still the best treatment for type 2 diabetes. Diabetology& metabolic syndrome. 2013 Dec; 5(1):6.
- Annette Babu, Ravichandran Veerasamy, Shalini Sivadasan. Metformin- A Drug of Plant Origin. Research J. Pharm. and Tech 2018; 11(6): 2701-2708.
- Wang YW, He SJ, Feng X, Cheng J, Luo YT, Tian L, Huang Q. Metformin: a review of its potential indications. Drug design, development and therapy. 2017; 11: 2421.
- Lee YJ, Han SK, Park JH, Lee JK, Kim DK, Chung HS, Heo EY. The effect of metformin on culture conversion in tuberculosis patients with diabetes mellitus. The Korean journal of internal medicine. 2018 Mar 16.
- Kaufmann SH, Dorhoi A, Hotchkiss RS, Bartenschlager R. Hostdirected therapies for bacterial and viral infections. Nature Reviews Drug Discovery. 2018 Jan; 17(1):35.
- Marupuru S, Senapati P, Pathadka S, Miraj SS, Unnikrishnan MK, Manu MK. Protective effect of metformin against tuberculosis infections in diabetic patients: an observational study of south Indian tertiary healthcare facility. Brazilian Journal of Infectious Diseases. 2017 Jun;21(3): 312-6.
- Mihaylova MM, Shaw RJ. The AMPK signalling pathway coordinates cell growth, autophagy and metabolism. Nature cell biology. 2011 Sep;13(9): 1016.
- Singhal A, Jie L, Kumar P, Hong GS, Leow MK, Paleja B, Tsenova L, Kurepina N, Chen J, Zolezzi F, Kreiswirth B. Metformin as adjunct antituberculosis therapy. Sci Transl Med 6: 263ra159.
- Winslow GM, Cooper A, Reiley W, Chatterjee M, Woodland DL. Early T‐cell responses in tuberculosis immunity. Immunological reviews. 2008 Oct; 225(1): 284-99.
- Suleiman S, Azhar S, Aweis I, Daud M, Mohamed AJ, Razak Muttalif A, Moussa MA. Role of diabetes in the prognosis and therapeutic outcome of tuberculosis. International journal of endocrinology. 2012; 2012.
- Tseng CH. Metformin Decreases Risk of Tuberculosis Infection in Type 2 Diabetes Patients. Journal of clinical medicine. 2018 Sep 9; 7(9):264.
- Aishwarya J. Ramalingam. History of Antibiotics and Evolution of Resistance. Research J. Pharm. and Tech. 8(12): Dec., 2015; Page 1719-1724
- J. Divya Maria, Vijey Aanandhi. M. An Overview on Antibiotic use and resistance. Research J. Pharm. and Tech. 2017; 10(8): 2793-2796.
- Sreeja. M.K, Gowrishankar N.L, Adisha. S, Divya. K.C. Antibiotic Resistance-Reasons and the Most Common Resistant Pathogens – A Review. Research J. Pharm. and Tech. 2017; 10(6): 1886-1890.
- Abdullah Noor-Hashimah, Nyi Nyi Naing, Che Wan Aminuddin, Wan Mohammad Wan Mohd Zahiruddin, Hamzah Wan Mansor, Hussin Hani, Salleh Rosemi, Nadiah Wan-Arfah. Health Service Delays in Diagnosis and Treatment among Tuberculosis Patients in Kelantan, Malaysia. Research J. Pharm. and Tech 2018; 11(8): 3711-3717
- Abdullah Noor-Hashimah, Nyi Nyi Naing, Che Wan Aminuddin, Wan Mohammad Wan Mohd Zahiruddin, Hamzah Wan Mansor, Hussin Hani, Salleh Rosemi, Nadiah Wan-Arfah. Health Service Delays in Diagnosis and Treatment among Tuberculosis Patients in Kelantan, Malaysia. Research J. Pharm. and Tech 2018; 11(8): 3711-3717.
- P. Mangala Gowri, G. Bhuvaneswari, C. Manoj, R. Varatharajan, Subhashini, Jomcy, Epsimal. Assess the knowledge and associated factors of DOTS defaulter among Tuberculosis clients. Research J. Pharm. and Tech 2018; 11(6):2313-2316.
- A Study on Hadoop Mapreduce Framework in Bigdata .
Authors
1 no, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 14, No 1 (2022), Pagination: 9 - 12Abstract
-Hadoop Map Reduce is processed for analysis large volume of data through multiple nodes. Today we’re surrounded by data like oxygen. The exponential growth of data first presented challenges to cutting-edge businesses such as Google, Yahoo, Amazon, Microsoft, Facebook, Twitter etc.., data volumes to be processed by cloud application are growth much faster than computing power. This growth is demands new strategy for processing and analysing information Hadoop MapReduce has become a powerful computation model address to these problemsKeywords
Big Data, Hadoop, Map reduce, Analytics, Architecture .References
- Benjamins, V.R. “Big data: From hype to reality? “ In: Proceedings of the 4th International Conference on Web Intelligence, Mining and Semantics (WIMS14).ACM, New York, NY, USA, 2014, pp. 2:1-2:2.
- Assunção, M. D., Calheiros, R. N., Bianchi, S., Netto, M.A.S. ,Buyya, R., “Big Data computing and clouds: Trends and future directions”, Journal of Parallel and Distributed Computing, Volumes 79–80, May,2015,pp. 3-15.
- Boyd, D., Crawford, K, “Critical questions for big data. Information”, Communication & Society 15:5, 2012, pp. 662- 679.
- Adams, M.N, “Perspectives on Data Mining. International Journal of
- Market Research 52(1),2012, pp.11–19
- Asur, S., Huberman, B.A, “Predicting the Future with Social Media”, In:
- ACM International Conference on Web Intelligence and Intelligent Agent Technology, vol. 1,2010, pp.492–499
- Bakshi, K.,”Considerations for Big Data: Architecture and Approaches”, In: Proceedings of the IEEE Aerospace Conference, 2012, pp. 1–7 .