1,273 research outputs found
An efficient novel dual deep network architecture for video forgery detection
The technique of video copy-move forgery (CMF) is commonly employed in various industries; digital videography is regularly used as the foundation for vital graphic evidence that may be modified using the aforementioned method. Recently in the past few decades, forgery in digital images is detected via machine intellect. The second issue includes continuous allocation of parallel frames having relevant backgrounds erroneously results in false implications, detected as CMF regions third include as the CMF is divided into inter-frame or intra-frame forgeries to detect video copy is not possible by most of the existing methods. Thus, this research presents the dual deep network (DDN) for efficient and effective video copy-move forgery detection (VCMFD); DDN comprises two networks; the first detection network (DetNet1) extracts the general deep features and second detection network (DetNet2) extracts the custom deep features; both the network are interconnected as the output of DetNet1 is given to DetNet2. Furthermore, a novel algorithm is introduced for forged frame detection and optimization of the falsely detected frame. DDN is evaluated considering the two benchmark datasets REWIND and video tampering dataset (VTD) considering different metrics; furthermore, evaluation is carried through comparing the recent existing model. DDN outperforms the existing model in terms of various metrics
Secure Data Control: Privacy and Security based on ABE for Access Control over Cloud
In today's world, there is a strong requirement for sharing information over cloud. However, privacy and security remains a setback especially when working with bulk amounts of data in the Cloud. Data is abundantly stored outside the control of the data owner’s machine with lack of his knowledge to the data owner, how the data being used and where the data are being stored. So, there is a necessity for the data owner to have a more control over their data, similar to the level of control they possess when the data are being stored on their own machine. For example, when a data owner shares an important file with his colleague, he cannot trust what his colleague will do with his data. In this paper, we try to address this problem by monitoring and preventing unauthorized operations by the data consumer. We present a solution called Secure-Data, which bundles the data owner’s data and specified policy, based on XACML, in an object called Secure-Data object. Secure-Data enforces the policies set out by the data owner by communicating with the cloud based applications to disable certain operations and/or run a background process for monitoring the data. We define a software based protocol that will enable to secure the data in the cloud and will support the use of the android app for authentication purposes
Second-generation nitazoxanide derivatives: thiazolides are effective inhibitors of the influenza A virus
Aim: The only small molecule drugs currently available for treatment of influenza A virus (IAV) are M2 ion channel blockers and sialidase inhibitors. The prototype thiazolide, nitazoxanide, has successfully completed Phase III clinical trials against acute uncomplicated influenza. Results: We report the activity of seventeen thiazolide analogs against A/PuertoRico/8/1934(H1N1), a laboratory-adapted strain of the H1N1 subtype of IAV, in a cell culture-based assay. A total of eight analogs showed IC50s in the range of 0.14–5.0 μM. Additionally a quantitative structure–property relationship study showed high correlation between experimental and predicted activity based on a molecular descriptor set. Conclusion: A range of thiazolides show useful activity against an H1N1 strain of IAV. Further evaluation of these molecules as potential new small molecule therapies is justified
Bioactivity of Locally Available Plants on Cotton Whitefly, Bemisia tabaci and the fungus isolated from cotton
Aqueous, diethyl ether, chloroform, petroleum ether, N-hexane and benzene extracts of locally available plant species were tested for phytochemical and insecticidal bioactivity against cotton whitefly, Bemisia tabaci, under controlled conditions. This study is within bioprospection context, for utilizing local plant species as alternative in sustainable agriculture development. The leaf and stem extract was used. The whole plant extract of T.procumbens followed by N.oleander and V.rosea showed repellent and toxic effect against adult and second nymphal instars. Leaf extract of all three plants showed high inhibition activity against nymphal instars. In case of flower extract less inhibition activity was shown respectively. Fungi which grow on the cotton plant was screened, characterized and checked for antifungal activity against the extracts of the plant material. Phytochemical analysis was also carried out by standard protocols
Factors Influencing Expatriates Adaptation in Host Site at Intel
International assignments are increasingly important for Multinational companies, Intel sending employees on relocation for product transfer and for training purpose. It is important for the management to understand how the employees being adapting to the host environment. This research aim to explore the relationship between the independent variable that is cross cultural adjustment and dependent variables are job satisfaction, family factor and cultural training. The research involved Penang Design Centre employees, most of the survey questions being sent through internal mail, email and fax. A total of 130 survey questions were distributed to respondents. Only 104 sets of questionnaires had been received. Hypotheses testing method were employed and questionnaire with five point Likert scale was used to collect the data. Data were analyzed through Pearson correlation and multiple regression
analysis. The results shown those three hypotheses that were developed in this research are accepted. The results from multiple regression analysis suggest that the more tailored and relevant cultural training the more expectation were met. Recommendations, limitations and future research were offered in this research. The results from this study encourage management to develop programmes that will ensure expatriate have realistic expectations prior to their global assignment
CUBOSOMES: A BOON FOR COSMECEUTICALS AND TOPICAL DRUG DELIVERY
Cubosomes are the nanoparticles of bicontinuous, lyotropic cubic phases, comprised of curved lipid bilayers organized into a three-dimensional honeycomb (cavernous) like structures separating two internal aqueous channels and large interfacial area. Cubic phases are optically isotropic, very viscous, and solid-like (crystalline) with cubic crystallographic symmetry. They can encapsulate hydrophilic, hydrophobic and amphiphilic drug substances, which are able to target and control the release of the bioactive agent. The cosmetic industry has made progress in the development of products to overcome skin as a barrier and deliver the actives through the skin effectively. Drug incorporated cubosomes shows some unique advantageous like, protection from chemical and physiological degradation, in vivo drug release in a controlled manner and improving the bioavailability of drug while reducing the side effect. Cubosomes are pharmacologically inactive, non-irritant, non-toxic, effective, and cosmetically acceptable. Topical drug delivery can deliver drugs selectively to the specific site; this avoids fluctuations of drug levels and improves patient compliance and suitable local and systemic therapeutic effects. Cubosomal topical drug formulation shows outstanding potential advantages for their controlled and sustained drug delivery. This review article mainly focuses on cosmetic and topical applications of cubosomes
- …
