Refine your search
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Rani, Sangeeta
- Neuropeptide Y (NPY) Distribution in the Forebrain of Adult Spiny Eel, Macrognathus pancalus
Abstract Views :428 |
PDF Views:2
Authors
Affiliations
1 DST-IRHPA Center for Excellence in Biological Rhythm Research, Department of Zoology, University of Lucknow, Lucknow 226007, IN
1 DST-IRHPA Center for Excellence in Biological Rhythm Research, Department of Zoology, University of Lucknow, Lucknow 226007, IN
Source
Journal of Endocrinology and Reproduction, Vol 18, No 2 (2014), Pagination: 75-86Abstract
In the present study, the distribution of neuropeptide Y (NPY)-immunoreactive neurons and fibers in the forebrain of adult spiny eel, Macrognathus pancalus, which is a bottom-dwelling nocturnal fish, was investigated. Serial Nissl-stained brain sections were used to demarcate forebrain regions and neuronal structures. NPY peptidecontaining cell bodies and fibers localized immunocytochemically were found widely distributed throughout the forebrain. The brain areas showing NPY distribution included predominant cell groups in the telencephalon (nucleus entopeduncularis, NE; nucleus of area ventralis telencephali, Vn), diencephalon (nucleus preopticus, pars parvocellularis, NPOp; nucleus preopticus, pars magnocellularis, NPOm; nucleus lateralis tuberis, NLT) and mesencephalon (midbrain tegmentum, MT). The important areas with only NPY-immunoreactive (-ir) fibers included olfactory bulb (OB), area dorsalis telencephali pars anterioris (Da), dorsal part of Dmd (Dmdd), ventral subdivision of Dl (Dlv), anterior subdivision of Dl (Dla), preoptic area (POA), optic tectum (OTec) and nucleus recessi lateralis (NRL). The pattern of NPY distribution in the forebrain of M. pancalus suggests its role in processing of many physiological functions (viz., feeding, daily activities, reproduction and other metabolic processes). The basic information on anatomical localization of NPY in eel will help to understand better the seasonal variations of NPY and its interaction with other reproductive hormones.Keywords
Forebrain, Immunocytochemistry, NPY Distribution, Spiny eel.References
- Allen YS, Adrian TE, Allen JM, Tatemoto K, Crow TJ, Bloom SR, Polak JM. (1983) Neuropeptide Y distribution in the rat brain. Science 221:877-79.
- Batten TFC, Cambre ML, Moons L, Vandesande F. (1990) Comparative distribution of neuropeptide-immunoreactive systems in the brain of the green molly, Poecilila latipinna. J Comp Neurol. 302:893-919.
- Bonn U. (1990) NPY-like immunoreactivity in the brain of the teleost, Tinca tinca. J Hirnforsch. 31:323-30.
- Burmeister SS, Munshi RG, Fernald RD. (2009) Cytoarchitecture of a cichlid fish telencephalon. Brain Behav Evol. 74:110-20.
- Bushnik T, Fernald RD. (1995) The population of GnRH-containing neurons showing socially mediated size changes project to the pituitary in a teleost, Haplochromis burtoni. Brain Behav Evol. 46:371-377.
- Castro A, Becera M, Manso MJ, Anadòn R. (1999) Development of immunoreactivity to neuropeptide Y in the brain of brown trout, Salmo trutta fario. J Comp Neurol. 414:13-32.
- Cerda-Reverter JM, Larhammar D. (2000) Neuropeptide Y family of peptides: structure, anatomical expression, function, and molecular evolution. Biochem Cell Biol. 78:371-92.
- Chiba A. (1999) Immunohistochemical distribution of neuropeptide Y-related substance in the brain and hypophysis of the arctic lamprey, Lethenteron japonica. Brain Behav Evol. 53:102-09.
- Chiba A. (2005) Neuropeptide Y-immunoreactive (NPY-ir) structures in the brain of the gar, Lepisosteus oculatus (Lepisosteiformes, Osteichthyes) with special regard to their anatomical relations to gonadotropin-releasing hormone (GnRH)-ir structures in the hypothalamus and the terminal nerve. Gen Comp Endocrinol. 142:336-46.
- Chiba A, Honma Y. (1994) Neuropeptide Y-immunoreactive structures in the telencephalon and diencephalon of the white sturgeon, Acipenser transmontanus, with special regard to the hypothalamo-hypophysis system. Arch Histol Cytol. 57:77-86.
- Chiba A, Sohn YC, Honma Y. (1996) Distribution of neuropeptide Y and gonadotropin-releasing hormone immunoreactivities in the brain and hypophysis of the ayu, Plecoglossus altivelis (Teleostei). Arch Histol Cytol. 59:137-48.
- Cuadrado MI, Covenas R. (1993) Neuropeptide Y in the carp Torus semicircularis: an immunocytochemical study. Arch Ital Biol. 131:317–26.
- Danger JM, Guy J, Benyamina M, Jegou S, Leboulenger F, Cote J, Tonon MC, Pelletier G, Vaudry H. (1985) Localization and identification of neuropeptide Y (NPY) - like immunoreactivity in the frog brain. Peptides 6:1225-36.
- Gaikwad A, Biju KC, Subhedar N. (2003) GnRH-LH secreting cells axis in the pituitary of the teleost Clarias batrachus responds to neuropeptide Y treatment: an immunocytochemical study. Gen Comp Endocrinol. 33:126–33.
- Gaikwad A, Biju KC, Saha SG, Subhedar N. (2004) Neuropeptide in the olfactory system, forebrain and pituitary of the teleost, Clarias batrachus. J Chem Neuroanat. 27:55-70.
- Gaikwad A, Biju KC, Muthal PL, Saha S, Subhedar N. (2005) Role of neuropeptide Y in the regulation of gonadotropin releasing hormone system in the forebrain of Clarias batrachus (Linn.): immunocytochemistry and high performance liquid chromatography–electrospray ionization-mass spectrometric analysis. Neuroscience 133:267–79.
- Gall C, Seroogy KB, Brecha N. (1986) Distribution of VIP- and NPY-like immunoreactivites in the rat main olfactory bulb. Brain Res. 374:389-94.
- Garcýá-Fernández JM, del Brio MA, Cernuda R, Coto A, Riera P. (1992) Distribution of neuropeptide Y-like immunoreactivity in the brain of Salmo salar and Gambusia affinis. Histol Histopathol. 7:385-92.
- Himick BA, Peter RE. (1995) Neuropeptide regulation of feeding and growth hormone secretion in fish. Netherlands J Zool. 45:3-9.
- Holmqvist BI, Ekstrom P. (1995) Hypophysiotrophic systems in the brain of the Atlantic salmon: Neuronal innervation of the pituitary and the origin of pituitary dopamine and nonapeptides identified by means of combined carbocyanine tract tracing and immunocytochemistry. J Chem Neuroanat. 8:125-45.
- Kah O, Zanuy S, Pradelles P, Cerdá J, Carrillo M. (1994) An enzyme immunoassay for salmon gonadotropin-releasing hormone and its application to the study of the effects of diet on brain pituitary GnRH in the sea bass, Dicentrarchus labrax. Gen Comp Endocrinol. 95:464-74.
- Kennedy M, Browner RH. (1981) The torus semicircularis in a gekonid lizard. J Morphol. 169:259-74.
- Klüver H, Barrera E. (1953) A method for the combined staining of cells and fibers in the nervous system. J Neuropathol Exp Neurol. 12:400-03.
- Kuenzel WJ, McMurtry J. (1988) Neuropeptide Y: brain localisation and central effects on the plasma insulin levels in chick. Physiol Behav. 44:669-78.
- Lazar G, Maderdrut JL, Trasti SL, Liposits Z, Toth P, Kozicz T, Merchenthaler I. (1993) Distribution of neuropeptide Y-derived peptides in the brain of Rana esculenta and Xenopus laevis. J Comp Neurol. 327:551-71.
- Marchetti GL, Cozzi B, Tavanti M, Russo V, Pellegrini S, Fabiani O. (2000) The distribution of neuropeptide Yimmunoreactive neurons and nerve fibers in the forebrain of the carp, Cyprinus carpio (L.). J Chem Neuroanat. 20:129-39.
- Mazumdar M, Sakharkar AJ, Singru PS, Subhedar N. (2007) Reproduction phase- related variations in neuropeptide Y immunoreactivity in the olfactory system, forebrain, and pituitary of the female catfish, Clarias batrachus (Linn.). J Comp Neurol. 504:450–69.
- Meek J, Nieuwenhuys R. (1998) Holosteans and teleosts. In: Nieuwenhuys R, Ten Donkelaar HJ, Nicholson C (Eds.) The Central Nervous System of Vertebrates. pp 758-937. Berlin, Springer.
- Moons LM, Ollevier F, Vandesande F. (1989) Immunocytochemical demonstration of close relationship between neuropeptidergic nerve fibres and hormone-producing cell types in the adenohypophysis of the sea bass, Dicentrarchus labrax. Gen Comp Endocrinol. 73:270-83.
- Mukuda T, Ando M. (2003) Atlas of the Japanese eel: Comparison to other fishes. Mem Fac Integr Arts Sci Hiroshima Univ. 29:1-25.
- Narnaware YK, Peyon PP, Linn X, Peter RE. (2000) Regulation of food intake by neuropeptide Y in goldfish. Am J Physiol Regul Integr Comp Physiol. 279: R1025–R1034.
- Ohm TG, Braak E, Probst A, Weindl A. (1988) Neuropeptide Y-like immunoreactive neurons in the human olfactory bulb. Brain Res. 451:295-300.
- Parhar IS, Sim MK. (1994) Central dopaminergic neurons in tilapia: effects of gonadectomy and hypothalamic lesion. Neurosci Res.18:255-66.
- Parhar IS, Pfaff DW, Schwanzel-Fukuda, M. (1996) Gonadotropin releasing hormone gene expression in teleosts. Mol Brain Res. 41:216-27.
- Peng C, Peter RE. (1997) Neuroendocrine regulation of growth hormone secretion and growth in fish. Zool Studies 36:79-89.
- Peng, C, Gallin W, Peter RE, Blomqvist AG, Larhammar D. (1994) Neuropeptide Y gene expression in the goldfish brain: distribution and regulation by ovarian steroids. Endocrinology 134:1095-103.
- Pickavance CL, Staines WA, Fryer JN. (1992) Distribution and colocalization of neuropeptide Y and somatostatin in the goldfish brain. J Chem Neuroanat. 5:221-33.
- Pirone A, Lenzi C, Marroni P, Betti L, Mascia G, Giannaccini G, Lucacchini A, Fabiani O. (2008) Neuropeptide Y in the brain and retina of the adult teleost Gilthead Seabream (Sparus aurata L.). Anat Histol Embryol. 37:231-40.
- Pontet A, Danger JM, Dubourg P, Pelletier G, Vaudry H, Calas A, Kah O. (1989) Distribution and characterization of neuropeptide Y-like immunoreactivity in the brain and pituitary of the goldfish. Cell Tissue Res.255:529-38.
- Pritz M. (1974) Ascending connections of a midbrain auditory area in a crocodile, Caiman crocodiles. J Comp Neurol. 153:179-98.
- Rama Krishna NS, Subhedar IN. (1989) Hypothalamic innervation of the pituitary in the catfish, Clarias batrachus: a retrograde horseradish peroxidase study. Neurosci Lett. 107:39-44.
- Reiner A, Northcutt RG. (1992) Immunohistochemical study of the telencephalon of the Senegal bichir, Polypterus senegalus. J Comp Neurol. 319:359-86.
- Rodríguez-Gómez FJ, Rendón-Unceta C, Sarasquete C, Mu oz-Cueto JA. (2001) Distribution of neuropeptide Y-like immunoreactivity in the brain of the senegalese sole (Solea senegalensis). Anat Rec. 262: 227-37.
- Sakharkar AJ, Singru PS, Sarkar K, Subhedar N. (2005) Neuropeptide Y in the forebrain of the adult male cichlid fish, Oreochromis mossambicus: distribution, effects of castration and testosterone replacement. J Comp Neurol. 489:148-65.
- Silverstein JT, Breininger J, Baskin DG, Plisetskaya EM. (1998) Neuropeptide Y-like gene expression in the salmon brain increases with fasting. Gen Comp Endocrinol. 110:157-65.
- Subhedar N, Cerda J, Wallace RA. (1996) Neuropeptide Y in the forebrain and retina of the killifish, Fundulus heteroclitus. Cell Tissue Res. 283:313–23.
- Tatemoto K, Carlquist M, Mutt V. (1982) Neuropeptide Y- a novel brain peptide with structural similarities to peptide YY and pancreatic polypeptide. Nature 296:659-60.
- Traverso JM, Ravaglia MA, Vissio PG, Maggese MC, Paz DA. (2003) Localization of neuropeptide Y-like immunoreactive structures in the brain of the Pejerrey, Odontesthes bonariensis (Teleostei, Atheriniformes). Anat Histol Embryol. 32:29-35.
- Vallarino M, Danger JM, Fasolo A, Pelletier G, Saint-Pierre S, Vaudry H. (1988) Distribution and characterization of neuropeptide Y in the brain of an elasmobranch fish. Brain Res. 448:67-76.
- Volkoff H, Peter RE. (2001) Interactions between orexine A, NPY and galanin in the control of food intake of the goldfish, Carassius auratus. Regul Peptides 101: 59–72.
- Vecino E, Perez MTR, Ekstrñm P. (1994) In situ hybridization of neuropeptide Y (NPY) mRNA in the goldfish brain. Neuroreport 6:127-31.
- Zandbergen MA, Voormolen AHT, Peute J, Kah O, Goos HJ Th. (1994) Immunohistochemical localization of neuropeptide Y positive cell bodies and fibres in forebrain and pituitary of the African catfish, Clarias gariepinus. Netherlands J Zool.44:43-54.
- A Perspective for Intrusion Detection & Prevention in Cloud Environment
Abstract Views :307 |
PDF Views:1
Authors
Vaneeta
1,
Sangeeta Rani
2
Affiliations
1 Research Scholar, Department of Computer Science, Punjabi University, Patiala, IN
2 Assistant Professor, Department of Computer Science, Mata Gujri College, Fatehgarh Sahib, IN
1 Research Scholar, Department of Computer Science, Punjabi University, Patiala, IN
2 Assistant Professor, Department of Computer Science, Mata Gujri College, Fatehgarh Sahib, IN
Source
International Journal of Advanced Networking and Applications, Vol 12, No 6 (2021), Pagination: 4770-4775Abstract
The cloud environment is used in all sectors that provide different services to the users. The assistance provided by the cloud environment in different sectors such as business, entertainment, government, education, IT industry, etc. The services rendered by both the public and private organizations considering scalable, on a payas-you-go basis, on-demand services, etc. Due to its dispersed nature and viability in all the sectors, makes the system inefficient which causes numerous attacks in the environment. These attacks affect the confidentiality, integrity, and availability of cloud resources. Some examples of attacks are Ransomware, man-in-the-middle attacks, Denial of service attacks, insider attacks, etc. Thus, Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) play a crucial role in the cloud environment by detecting and preventing the system from suspicious attacks. The objective of this paper is to provide information about attacks that affect the cloud environment. This paper also covers the different techniques of intrusion detection, intrusion prevention, and its hybrid approach.Keywords
Cloud Computing, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Intrusion Detection and Prevention System (IDPS)References
- J. K. Samriya and N. Kumar, “A novel intrusion detection system using hybrid clustering optimization approach in cloud computing,” Mater. Today Proc., no. xxxx, 2020, doi: 10.1016/j.matpr.2020.09.614.
- P. Singh and V. Ranga, “Attack and intrusion detection in cloud computing using an ensemble learning approach,” Int. J. Inf. Technol., 2021, doi: 10.1007/s41870-020-00583-w.
- K. Pradeep Mohan Kumar, M. Saravanan, M. Thenmozhi, and K. Vijayakumar, “Intrusion detection system based on GA-fuzzy classifier for detecting malicious attacks,” Concurr. Comput. , vol. 33, no. 3, pp. 5–10, 2021, doi: 10.1002/cpe.5242.
- S. R. K. Tummalapalli and A. S. N. Chakravarthy, “Intrusion detection system for cloud forensics using bayesian fuzzy clustering and optimization based SVNN,” Evol. Intell., no. 0123456789, 2020, doi: 10.1007/s12065-020-00410-y.
- G. Zhao, C. Rong, M. G. Jaatun, and F. E. Sandnes, “Reference deployment models for eliminating user concerns on cloud security,” J. Supercomput., vol. 61, no. 2, pp. 337–352, 2012, doi: 10.1007/s11227-010-0460-9.
- C. N. Modi, D. R. Patel, A. Patel, and M. Rajarajan, “Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing,” Procedia Technol., vol. 6, pp. 905–912, 2012, doi: 10.1016/j.protcy.2012.10.110.
- C. Point and S. Technologies, “SECURITY,” pp. 1–21, 2020.
- P. Sharma, J. Sengupta, and P. K. Suri, “WLIFCM and Artificial Neural Network Based Cloud Intrusion Detection System,” Int. J. Adv. Netw. Appl., vol. 10, no. 01, pp. 3698–3703, 2018, doi: 10.35444/ijana.2018.10014.
- S. M. Alturfi, D. K. Muhsen, M. A. Mohammed, I. T. Aziz, and M. Aljshamee, “A Combination Techniques of Intrusion Prevention and Detection for Cloud Computing,” J. Phys. Conf. Ser., vol. 1804, no. 1, 2021, doi: 10.1088/1742- 6596/1804/1/012121.
- C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing,” J. Supercomput., vol. 63, no. 2, pp. 561–592, 2013, doi: 10.1007/s11227-012-0831-5.
- A. Patil, A. Laturkar, S. V. Athawale, R. Takale, and P. Tathawade, “A multilevel system to mitigate DDOS, brute force and SQL injection attack for cloud security,” IEEE Int. Conf. Information, Commun. Instrum. Control. ICICIC 2017, vol. 2018-Janua, pp. 1–7, 2018, doi: 10.1109/ICOMICON.2017.8279028.
- A. Gursaran, “U Sing G Enetic a Lgorithm,” vol. 3, no. 3, pp. 447–450, 2010.
- C. Modi, D. Patel, B. Borisaniya, and H. Patel, “Journal of Network and Computer Applications A survey of intrusion detection techniques in Cloud,” J. Netw. Comput. Appl., vol. 36, no. 1, pp. 42–57, 2013, doi: 10.1016/j.jnca.2012.05.003.
- K. W. I and V. Hou, “Detection Method of SQL injection Attack in Cloud,” pp. 487–493.
- C. N. Modi and K. Acha, “Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review,” J. Supercomput., vol. 73, no. 3, pp. 1192–1234, 2017, doi: 10.1007/s11227-016-1805-9.
- S. Alam, M. Shuaib, and A. Samad, A Collaborative Study of Intrusion Detection and Prevention Techniques in Cloud Computing. Springer Singapore.
- N. Das and T. Sarkar, “Survey on Host and Network Based Intrusion Detection System,” Int. J. Adv. Netw. Appl., vol. 6, no. 2, pp. 2266 –2269, 2014.
- P. P. Chapke and R. R. Deshmukh, “Intrusion Detection System using fuzzy logic and data mining technique,” ACM Int. Conf. Proceeding Ser., vol. 06 -07 -Marc, 2015, doi: 10.1145/2743065.2743128.
- K. Bakour, G. S. Daş, and H. M. Ünver, “An intrusion detection system based on a hybrid tabu - genetic algorithm,” 2nd Int. Conf. Comput. Sci. Eng. UBMK 2017, pp. 215 –220, 2017, doi: 10.1109/UBMK.2017.8093378.
- H. Jin et al., “A VMM -based intrusion prevention system in cloud computing environment,” J. Supercomput., vol. 66, no. 3, pp. 1133 –1151, 2013, doi: 10.1007/s11227 -011 -0608 -2.
- S. Das and M. J. Nene, “A survey on types of machine learning techniques in intrusion prevention systems,” Proc. 2017 Int. Conf. Wirel. Commun. Signal Process. Networking, WiSPNET 2017, vol. 2018 -Janua, pp. 2296 –2299, 2018, doi: 10.1109/WiSPNET.2017.8300169.
- A. Patel, M. Taghavi, K. Bakhtiyari, and J. Celestino Júnior, “An intrusion detection and prevention system in cloud computing: A systematic review,” J. Netw. Comput. Appl., vol. 36, no. 1, pp. 25 –41, 2013, doi: 10.1016/j.jnca.2012.08.007.
- WhatsApp Text Messaging Follows a Daily Rhythm in Both Formal and Informal Settings
Abstract Views :143 |
Authors
Affiliations
1 Department of Zoology, University of Lucknow, Lucknow 226 007, IN
1 Department of Zoology, University of Lucknow, Lucknow 226 007, IN
Source
Current Science, Vol 127, No 4 (2024), Pagination: 491-493Abstract
We examined and compared the 24-hour pattern of WhatsApp messaging between a formal cohort of n = 59 members of the Indian scientific society and an informal cohort of n = 41 family members. In particular, we analysed and calculated the intensity and pattern of messaging activity across 24 hours in relation to the sunrise and sunset timings, as well as the overall daily activity period. There was a daily periodicity in the WhatsApp messaging, with their close coupling to the time of day in formal compared to that in the informal cohort. However, the messaging activity pattern appeared to conform to a daily rhythm in both cohorts.Keywords
Behaviour, circadian rhythm, social networking, WhatsApp.Full Text
- Android Malware Detection in Official and Third Party Application Stores
Abstract Views :276 |
PDF Views:1
Authors
Affiliations
1 I.K Gujral Punjab Technical University, Punjab, IN
2 Baba Banda Singh Bahadur Engg College, Fatehgarh Sahib, Punjab, IN
1 I.K Gujral Punjab Technical University, Punjab, IN
2 Baba Banda Singh Bahadur Engg College, Fatehgarh Sahib, Punjab, IN
Source
International Journal of Advanced Networking and Applications, Vol 9, No 4 (2018), Pagination: 3506-3509Abstract
Android is one of the most popular operating system for mobile devices and tablets. The growing number of Android users and open source nature of this platform has also attracted attackers to target Android devices. This paper presents the static and dynamic analysis of the Android applications in order to detect malware. In this work, we have performed permission based and behavioural based filtering of Android applications with the help of malware analysis tools. Our results revel that 80% of the applications request for dangerous permissions. 13% applications consist of malicious activities. Most of the applications are interested in the device data like contact lists, IMEI, IMSI, SMS etc. These results clearly indicate the need for better security measures for Android apps.Keywords
Android Malware, Static Analysis, Dynamic Analysis, Permissions, Applications.References
- A. P. Felt, K. Greenwood, and D. Wagner, The effectiveness of install-time permission systems for thirdparty applications, Technical report, University of California at Berkeley, UCB/EECS-2010-143, Dec 2010.
- D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to android, Proc. 17th ACM conference on Computer and communications security, ACM, New York, 2010, 73–84.
- A.P. Felt , E. Chin., S. Hanna, D. Song , D. Wagner, Android permissions demystified, Proc. 8th ACM conference on Computer and communications security, New York, USA. 2011b. 627-638.
- Y. Zhou and X. Jiang, Dissecting android malware: Characterization and evolution, Proc. IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 2012, 95–109.
- A. P. Felt, M. Finifter, E. Chin, D. Wagner, A Survey of Mobile Malware in the Wild, Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '11), ACM, New York, USA, 2011, 3-14
- Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets. Proceedings of the 19th Network and Distributed System Security Symposium, San Diego, CA, 317-326.
- M. Grace, Y. Zhou, Q. Zhang, S. Zou and X. Jiang , Riskranker: scalable and accurate zero-day android malware detection, Proc. International Conference on Mobile Systems, Applications, and Services, London, UK, 2012, 281–294.
- X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos, Malicious android applications in the enterprise: What do they do and how do we fix it?1, Proc. IEEE 28th International Conference on Data Engineering Workshops (ICDEW), 251–254, 2012.
- S. Holavanalli, D. Manuel, V. Nanjundaswamy, B. Rosenberg, F. Shen, S. Y. Ko, and L. Ziarek, Flow permissions for android, Proc. 28th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2013, 652–657,2013.
- Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu, P. Ning, X. S. Wang, and B. Zang, Vetting undesirable behaviors in android apps with permission use analysis, Proc. 2013 ACM SIGSAC Conference on Computer & Communications Security, 611–622, 2013.
- P. Faruki, V. Ganmoor, V. Laxmi, M. S. Gaur, and A. Bharmal, Androsimilar: Robust statistical feature signature for android malware detection, Proc. International Conference on Security of Information and Networks (SIN’13), Aksaray, Turkey. ACM, 2013, 152– 159
- B. Rashidi, C. Fung, and T. Vu, Recdroid: A resource access permission control portal and recommendation service for smartphone users, Proc. 2014 ACM MobiCom Workshop on Security and Privacy in Mobile Environments (SPME’14), Maui, Hawaii, USA, 2014, 13– 18.
- A. R. Beresford, A. Rice, N. Skehin, and R. Sohan, Mockdroid: Trading privacy for application functionality on smartphones, Proc. 12th Workshop on Mobile Computing Systems and Applications (HotMobile’11), Phoenix, Arizona, USA. ACM, 2011, 49–54.
- I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, Crowdroid: Behavior-based malware detection system for android, Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM’11), Chicago, Illinois, USA, 2011, 15–26.
- Z. Aung, and W. Zaw, Permission-based Android malware detection, International Journal of Scientific & Technology Research, 2(3), 2013
- S. Ryo, D. Chiba, and S. Goto, Detecting Android Malware by Analyzing Manifest Files, Proc. Asia-Pacific Advanced Network , 2013, 23-31
- S. Rani, and K. Dhindsa, Behavioural Characterization of Android Malware to Detect Similar Malware, International Journal of Research in Electronics and Computer Engineering, 5(4), 2017, pp. 509-514
- A. Kapratwar, Static and Dynamic Analysis of Android Malware, Proc. 1st International Workshop on FORmal methods for Security Engineering In conjunction with the 3rd International Conference on Information Systems Security and Privacy, Porto, Portugal, 2017
- F. Yuhui, and X. Ning, The Analysis of Android Malware Behaviors, International Journal of Security and Its Applications, 9(3), 2015, 335-346
- Features Exploration of Distinct Load Balancing Algorithms in Cloud Computing Environment
Abstract Views :229 |
PDF Views:0
Authors
Affiliations
1 UTU, Dehradoon, IN
2 SGT University, Gurugram, IN
3 Quantum University, Roorkee, IN
4 PSIT, Kanpur, IN
1 UTU, Dehradoon, IN
2 SGT University, Gurugram, IN
3 Quantum University, Roorkee, IN
4 PSIT, Kanpur, IN
Source
International Journal of Advanced Networking and Applications, Vol 11, No 1 (2019), Pagination: 4177-4183Abstract
The delivery of Cloud computing is a method for delivering information /services in which resources are retrieved from the Internet through web-based tools and applications, as opposed to a direct connection to a server rather than keeping files on a proprietary hard drive or local storage device. We have studied a lot of algorithm for reducing the response time of load balancing algorithm in cloud computing environment. We also measured the execution time of different algorithms. In this paper we will compare execution time, processing time of data center, response time of various algorithms.References
- Nguyen Xuan Phi, Cao Trung Tin, Luu Nguyen Ky Thu and Tran Cong Hung, ‘”Proposed Load Balancing Algorithm to Reduce Response Time and Processing Time On Cloud Computing”, International Journal of Computer Networks & Communications (IJCNC), 2018
- Gurasis Singh, Kamalpreet Kaur, “An Improved Weighted Least Connection Scheduling Algorithm for Load Balancing in Web Cluster Systems”, International Research Journal of Engineering and Technology (IRJET), p-ISSN: 2395-0072, 2018.
- Violetta N. Volkova, Liudmila V. Chernenkaya, Elena N. Desyatirikova, Moussa Hajali, Almothana Khodar, Alkaadi Osama, “Load Balancing in Cloud Computing” IEEE, 2018.
- Devika Singh1, Ashish Vashisht, “An Improved Regulated Load Balancing Approach for Cloud Computing Environment”, International Journal of Research in Advent Technology, E-ISSN: 2321-9637, 2018,
- Sambit Kumar Mishra, Md Akram Khan, Bibhudatta Sahoo, Deepak Puthal, Mohammad S. Obaidat and KF Hsiao, “Time efficient dynamic threshold-based load balancing technique for Cloud Computing” IEEE International Conference on Computer, Information and Telecommunication Systems (CITS) , Dalian, China, 21-23 July 2017.
- Desyatirikova E. N., “Kuripta O. V. Quality management in IT service management based on statistical aggregation and decomposition approach”,"Quality Management,Transport and Information Security, Information Technologies" (IT&QM&IS) , 2017, pp. 500-505. DOI:10.1109/ITMQIS.2017.8085871.
- Sobhan Omranian-Khorasani and Mahmoud Naghibzadeh, “Deadline Constrained Load Balancing Level Based Workflow Scheduling for Cost Optimization”, IEEE International Conference on Computational Intelligence and Applications, Beijing, China 8-11 Sept 2017.
- Atyaf Dhari, Khaldun I. Arif , “An Efcient Load Balancing Scheme for Cloud Computing”,Indian Journal of Science and Technology,Vol 10(11), DOI:10.17485/ijst/v10i11/110107/2017.
- Simar P.S. Anju S. and Rajesh K.,” Analysis of load balancing algorithms using cloud analyst, International Journal of Grid and Distributed Computing”, vol. 9, No. 9, pp.11-24,2016.
- D. Saranya, L. Sankara Maheswari, “Load Balancing Algorithms in Cloud Computing: A Review”, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Issue 7, 2015.
- Abhijit Aditya, Uddalak Chatterjee and Snehasis Gupta,” A Comparative Study of Different Static and Dynamic Load Balancing Algorithm in Cloud Computing with Special Emphasis on Time Factor”, International Journal of Current Engineering and Technology, P-ISSN 2347 – 5161,2015.
- Monika Kushwaha, Saurabh Gupta, “Various Schemes of Load Balancing in Distributed Systems- A Review”, International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 – 0882, Issue 7, J2015.
- Kumar Nishant, Pratik Sharma, Vishal Krishna, Chhavi Gupta and Kuwar Pratap Singh, Nitin and Ravi Rastogi,“LoadBalancingofNodesinCloudUsingA nt colonyOptimization”,International Conference on Modelling and Simulation, 2012.
- Calheiros R.N. ,”CloudSim: A Novel Framework for Modeling and Simulation of Cloud Computing Infrastructures and Services, Eprint: Australia, pp.9–17,2009.
- Anna Levina, Dean Lorenza, Giovanni Merlinob,Alfonso Panarellob, Antonio Puliafitob, Giuseppe Tricomib,”Hierarchical Load Balancing as a service for federated Cloud networks”, Computer communications (2018), doi:10.1016/j.comcom.2018.07.031.
- Maximal Security Issues and Threats Protection in Grid and Cloud Computing Environment
Abstract Views :250 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, SRM-IST Campus, Ghaziabad, IN
2 Department of Computer Science, SGT University, Gurugram, IN
3 Department of Computer Science, SGT University, Gurugram, IS
1 Department of Computer Science, SRM-IST Campus, Ghaziabad, IN
2 Department of Computer Science, SGT University, Gurugram, IN
3 Department of Computer Science, SGT University, Gurugram, IS
Source
International Journal of Advanced Networking and Applications, Vol 11, No 4 (2020), Pagination: 4367-4373Abstract
Cloud computing empowers the sharing of assets for example, storage, network,applications and programming through web. Cloud clients can rent various assets agreeing to their necessities, and pay just for the administrations they use. Be that as it may, in spite of all cloud benefits there are numerous security concerns identified with equipment, virtualization, network, information and specialist organizations thatgo about as a noteworthy obstruction in the selection of cloud in the IT business. In this paper,we overview the top security concerns identified with cloud computing. For each of these security threats we depict, I) how itvery well may be utilized to abuse cloud parts and its impact on cloud elements, for example, suppliers and clients, and ii) the security arrangements that must be taken to forestall these threats. Thesearrangements incorporate the security procedures from existing writing just as the best security rehearses that must be trailed by cloud heads.Keywords
Cloud Computing, Data Security, Network Security.- Avian Sleep and its Resemblance with Mammals
Abstract Views :219 |
PDF Views:0
Authors
Affiliations
1 Department of Zoology, University of Lucknow, Lucknow, Uttar Pradesh, IN
1 Department of Zoology, University of Lucknow, Lucknow, Uttar Pradesh, IN
Source
Journal of Scientific and Technical Research (Sharda University, Noida), Vol 10, No 1-2 (2020), Pagination: 24-29Abstract
Sleep, a ubiquitous behavior reported in animal kingdom spreads out from cnidarians to mammals. Evolutionarily it is linked with the development of nervous system which was first time reported in phylum Cnidaria. Thus, this information satisfies a basic function of sleep which is memory processing and information storage. Besides this, cellular restoration and synaptic scaling also encompass as the core function of sleep. Sleep is broadly characterized by the oscillation of NREM (Non-rapid eye movement) and REM (Rapid eye movement) sleep cycles in mammals. Interestingly its distant relative birds also show the same stages while sleeping. Therefore, avian sleep can act as window to understand the mechanisms associated with generation and function of mammalian sleep. Avian sleep shares many similarities with that of mammals, for instance, presence of REM/NREM sleep states which in turn are under circadian and homeostatic control. Likewise minor differences also exist between the two groups for example, the thalamocortical spindles and the ripple complex which are missing from bird sleep. Thus, avian model system can help in understanding the complicacies associated with mammalian sleep (with reference to human) during health and illness.Keywords
Cellular Restoration, Circadian, NREM, REM, Sleep.References
- H. Watanabe, T. Fujisawa, and T. W. Holstein, “Cnidarians and the evolutionary origin of the nervous system,” Dev. Growth Differ., vol. 51, no. 3, pp. 167-183, 2009.
- J. E. Seymour, T. J. Carrette, and P. A. Sutherland, “Do box jellyfish sleep at night?,” Med. J. Aust. , vol. 181, no. 11-12, p. 707, 2004.
- R. V. Rial, M. Akaarir, A. Gamundi, C. Nicolau, C. Garau, S. Aparicio, S. Tejada, L. Gene, J. Gonzalez, L. M. De Vera, A. M. L. Coenen, P. Barcelo, and S. Esteban, “Evolution of wakefulness, sleep and hibernation: From reptiles to mammals,” Neurosci. Biobehav. Rev., vol. 34, no. 8, pp. 1144-1160, 2010.
- M., Shein-Idelson, J. M. Ondracek, H.-P. Liaw, S. Reiter, and G. Laurent, “Slow waves, sharp waves, ripples, and REM in sleeping dragons,” Science, vol. 352, no. 6285, pp. 590-595, 2016.
- Y. Hayashi, M. Kashiwagi, K. Yasuda, R. Ando, M. Kanuka, K. Sakai, and S. Itohara, “Cells of a common developmental origin regulate REM/non-REM sleep and wakefulness in mice,” Science, vol. 350, no. 6263, pp. 957-961, 2015.
- I. Capellini, R. A. Barton, P. McNamara, B. T. Preston, and C. L. Nunn, “Phylogenetic analysis of the ecology and evolution of mammalian sleep,” Evolution, vol. 62, no. 7, pp. 1764-1776, 2008.
- H. P. Roffwarg, J. N. Muzio, and W. C. Dement, “Ontogenetic development of the human sleep-dream cycle,” Science, vol. 152, no. 3722, pp. 604-619, 1966.
- J. Dugas-Ford, J. J. Rowell, and C. W. Ragsdale, “Cell-type homologies and the origins of the neocortex,” Proc. Natl. Acad. Sci. USA, vol. 109, no. 42, pp. 16974-16979, 2012.
- H. J. Karten, “Neocortical evolution: Neuronal circuits arise independently of lamination,” Curr. Biol., vol. 23, no. 1, pp. R12-R15, 2013.
- H. J. Karten, “Vertebrate brains and evolutionary connectomics: On the origins of the mammalian ’neocortex,” Philos. Trans. R. Soc. Lond. B Biol. Sci., vol. 370, no. 1684, 2015.
- F. David, J. T. Schmiedt, H. L. Taylor, G. Orban, G. Di Giovanni, V. N. Uebele, J. J. Renger, R. C. Lambert, N. Leresche, and V. Crunelli, “Essential thalamic contribution to slow waves of natural sleep,” J. Neurosci., vol. 33, no. 50, pp. 19599-19610, 2013.
- M. Lemieux, J. Y. Chen, P. Lonjers, M. Bazhenov, and I. Timofeev, “The impact of cortical deafferentation on the neocortical slow oscillation,” J. Neurosci., vol. 34, no. 16, pp. 5689-5703, 2014.
- T. Mueller, “What is the thalamus in zebrafish?,” Front. Neurosci., vol. 6, p. 64, 2012.
- C. M. McDonough, and W. J. Loughry, “Influences on activity patterns in a population of nine-banded armadillos,” J. Mammal., vol. 78, no. 3, pp. 932-941, 1997.
- A. E. Prudom, and W. R. Klemm, “Electrographic correlates of sleep behavior in a primitive mammal, the armadillo Dasypus novemcinctus,” Physiol. Behav., vol. 10, no. 2, pp. 275-282, 1973.
- J. M. Siegel, “Sleep viewed as a state of adaptive inactivity,” Nat. Rev. Neurosci.,” vol. 10, no. 10, pp. 747-753, 2009.
- M. H. Schmidt, “The energy allocation function of sleep: A unifying theory of sleep, torpor, and continuous wakefulness,” Neurosci. Biobehav. Rev., vol. 47, pp. 122-153, 2014.
- M. S. Blumberg, A. J. Gall, and W. D. Todd, “The development of sleep-wake rhythms and the search for elemental circuits in the infant brain,” Behav. Neurosci., vol. 128, no. 3, pp. 250-263, 2014.
- P. L. Brooks, and J. Peever, “A temporally controlled inhibitory drive coordinates twitch movements during REM sleep,” Curr. Biol., vol. 26, no. 9, pp. 1177-1182, 2016.
- S. G. Jones, E. M. Paletz, W. H. Obermeyer, C. T. Hannan, and R. M. Benca, “Seasonal influences on sleep and executive function in the migratory White-crowned Sparrow (Zonotrichia leucophrys gambelii),” BMC Neurosci., vol. 11, 2010, Art. no. 87.
- M. Steriade, “Grouping of brain rhythms in corticothalamic systems,” Neurosci., vol. 137, no. 4, pp. 1087-1106, 2006.
- A. Reiner, E. A. Stern, and C. J. Wilson, “Physiology and morphology of intratelencephalically projecting corticostriatal-type neurons in pigeons as revealed by intracellular recording and cell filling,” Brain Behav Evol., vol. 58, no. 2, pp. 101-114, 2001.
- Y. Nir, R. J. Staba, T. Andrillon, V. V. Vyazovskiy, C. Cirelli, I. Fried, and G. Tononi, “Regional slow waves and spindles in human sleep,” Neuron., vol. 70, no. 1, pp. 153-169, 2011.
- G. J. L. Beckers J. van der Meij, J. A. Lesku, and N. C. Rattenborg, “Plumes of neuronal activity propagate in three dimensions through the nuclear avian brain,” BMC Biol., vol. 12, 2014, Art. no. 16.
- J. T. Szymczak, W. Kaiser, H. W. Helb, and B. Beszczynska, “A study of sleep in the European blackbird,” Physiol Behav., vol. 60, no. 4, pp. 1115-1120, 1996.
- N. C. Rattenborg, B. H. Mandt, W. H. Obermeyer, P. J. Winsauer, R. Huber, M. Wikelski, and R. M. Benca, “Migratory sleeplessness in the white-crowned sparrow (Zonotrichia leucophrys gambelii),” PLoS Biol., vol. 2, no. 7, p. E212, 2004.
- P. S. Low, S. S. Shank, T. J. Sejnowski, and D. Margoliash, “Mammalian-like features of sleep structure in zebra finches,” Proc Natl Acad Sci. USA, vol. 105, no. 26, pp. 9081-9086.
- D. Martinez-Gonzalez, J. A. Lesku, and N. C. Rattenborg, “Increased EEG spectral power density during sleep following short-term sleep deprivation in pigeons (Columba livia): Evidence for avian sleep homeostasis,” J Sleep Res., vol. 17, no. 2, pp. 140-153, 2008.
- S. G. Jones, V. V. Vyazovskiy, C. Cirelli, G. Tononi, and R. M. Benca, “Homeostatic regulation of sleep in the white-crowned sparrow (Zonotrichia leucophrys gambelii),” BMC Neurosci., vol. 9, 2008, Art. no. 47.
- A. Yadav, J. Tiwari, V. Vaish, S. Malik, and S. Rani, “Migration gives sleepless nights to the birds: A study on a Palaearctic-Indian migrant, Emberiza bruniceps,” J Ornithol., 2020.
- M. F. Scriba, A.-L. Ducrest, I. Henry, A. L. Vyssotski, N. C. Rattenborg, and A. Roulin, “Linking melanism to brain development: Expression of a melanism-related gene in barn owl feather follicles covaries with sleep ontogeny,” Front Zool., vol. 10, 2013, Art. no. 42.
- J. A. Lesku, L. C. R. Meyer, A. Fuller, S. K. Maloney, G. Dell’Omo, A. L. Vyssotski, and N. C. Rattenborg, “Ostriches sleep like platypuses,” PLoS One., vol. 6, no. 8, e23203, 2011.
- R. Graf, H. C. Heller, S. Sakaguchi, and S. Krishna, “Influence of spinal and hypothalamic warming on metabolism and sleep in pigeons,” Am J Physiol., vol. 252, no. 4 Pt 2, pp. R661-R667, 1987.
- J. T. Szymczak, “Influence of environmental temperature and photoperiod on temporal structure of sleep in corvids,” Acta Neurobiol Exp (Wars), vol. 49, no. 6, pp. 359-366, 1989.
- S. B. S. Khalsa, D. A. Conroy, J. F. Duffy, C. A. Czeisler, D.-J. Dijk, “Sleep- and circadian dependent modulation of REM density,” J Sleep Res., vol. 11, no. 1, pp. 53-59, 2002.
- S. M. Newman, E. M. Paletz, N. C. Rattenborg, W. H. Obermeyer, and R. M. Benca, “Sleep deprivation in the pigeon using the Disk-Over-Water method,” Physiol Behav., vol. 93, no. 1-2, pp. 50-58, 2008.
- S. M. Newman, E. M. Paletz, W. H. Obermeyer, and R. M. Benca, “Sleep deprivation in pigeons and rats using motion detection,” Sleep, vol. 32, no. 10, pp. 1299-1312, 2009.
- A. Thurber, S. K. Jha, T. Coleman, and M. G. Frank, “A preliminary study of sleep ontogenesis in the ferret (Mustela putorius furo),” Behav Brain Res., vol. 189, no. 1, pp. 41-51, 2008.
- L. Astic, and D. Jouvet-Mounier, “Demonstration of paradoxical sleep in utero in guinea pigs,” C R Acad Sci., vol. 269, no. 25, pp. 2578-2581, 1969.
- N. Ibuka, “Ontogenesis of circadian sleep-wakefulness rhythms and developmental changes of sleep in the altricial rat and in the precocial guinea pig,” Behav Brain Res., vol. 11, no. 3, pp. 185-196, 1984.
- N. C. Rattenborg, D. Martinez-Gonzalez, T. C. Roth 2nd, and V. V. Pravosudov, “Hippocampal memory consolidation during sleep: A comparison of mammals and birds,” Biol Rev Camb Philos Soc., vol. 86, no. 3, pp. 658-691, 2011.
- I. Tobler, and A. A. Borbély, “Sleep and EEG spectra in the pigeon (Columba livia) under baseline conditions and after sleep-deprivation,” J Comp Physiol A., vol. 163, pp. 729-738, 1988.