44 research outputs found

    AUTOMATION OF NETWORK MICRO SEGMENTATION

    Get PDF
    Network Micro Segmentation is the ability to transmit data securely between systems over a network. Systems in a network uses advanced encryption technology and provides a mechanism for creating cryptographically enforced virtual networks based on the user’s login credentials. Network Micro Segmentation is used to share the information between the selected users and protecting the sensitive data from hackers by allowing the data to be visible only to the selected users. Network Micro segmentation secures the data in motion and controls the sharing of information within or across the network by employing an innovative cloaking technique. The Automation of Network Micro Segmentation Environment is used to configure the network and systems automatically. The market value of network security reaches $15.5 billion by 2019

    A SURVEY ON PARALLEL COMPUTING OF IMAGE COMPRESSION ALGORITHMS JPEG and Fractal Image Compression

    Get PDF
    This paper presents a short survey on the parallel computing of JPEG and Fractal image compression algorithms. Image compression is a type of data compression. Data Compression generally involves encoding techniques that uses fewer bits than the original representation. Image compression uses various techniques that will remove the redundant and the irrelevant information from the image. Image compression can thus efficiently reduce the storage space required and also speed up the transmission. However, most of the image compression techniques have problems like computational complexity, load etc. Parallel computing can effectively improve the processing speed. JPEG and fractal image compressions are two of the efficient techniques available in image compression. With the availability of the high performance computing in the form of multicore processing systems and GPUs can greatly accelerate the processing of the JPEG image compression technique. Fractal image compression takes advantage of the natural affine redundancy present in the typical images to achieve a high compression ratio. To speed up the compression process the sequential fractal image compression algorithm needs to be converted into parallel fractal image compression algorithm, this translation exploits the inherently parallel nature

    Prebiotic Carbohydrates for Therapeutics

    Full text link
    The food industry is constantly shifting focus based on prebiotics as health-promoting substrates rather than just food supplements. A prebiotic is “a selectively fermented ingredient that allows specific changes, both in the composition and/or activity in the gastrointestinal microflora that confers benefits upon host well-being and health.” Prebiotics exert a plethora of health-promoting effects, which has lead to the establishment of multimillion food and pharma industries. The following are the health benefits attributed to prebiotics: mineral absorption, better immune response, increased resistance to bacterial infection, improved lipid metabolism, possible protection against cancer, relief from poor digestion of lactose, and reduction in the risk of diseases such as intestinal disease, non-insulin-dependent diabetes, obesity and allergy. Numerous studies in both animals and humans have demonstrated the health benefits of prebiotics. </jats:sec

    Draft Genome Sequence of Lactobacillus plantarum Kanjika 2007, Isolated from Kanjika, a South Indian Traditional Food

    No full text
    ABSTRACT The draft genome sequence of Lactobacillus plantarum Kanjika 2007, isolated from the South Indian staple, medicinal, and traditional food kanjika, is reported here. The whole genome consists of 3.16 Mb with a G+C content of 44.7% and 3,009 protein-coding genes, 78 tRNAs, and 4rRNAs (5S-23S-16S). </jats:p

    Kinetic study on lipase-catalyzed esterification in organic solvents

    No full text
    2322-2327A twin inhibition is observed for the esterification reaction between ethanol and isovaleric acid using immobilized lipase from Rhizomucor miehei in hexane and in mixed solvent system. The observed bi-substrate inhibition pattern follows a Ping-Pong Bi-Bi mechanism with dead-end inhibition of enzyme by both the substrates. An increase in Km value for alcohol in mixed solvent (0.645 M) than in hexane (0.256 M), indicates that the enhanced solvation of ethanol in mixed solvent results in lower degree of inhibition

    Development of algorithms for MAV security

    No full text
    This paper describes the various security schemes required for incorporating security to the data being transmitted over the wireless link between a Micro Air Vehicle (MAV) and Ground Control Station (GCS). The suggested security schemes are developed in software and is integrated with the open source communication protocol i.e., MAVLink. The ciphers used in the adapted method are, Advanced Encryption Standard in Counter mode (AES-CTR) algorithm is used for data encryption, SHA-256 for key Hashing and Diffie-Hellman(D-H) for key exchange. This provides both encryption and authentication to the MAV communication, So that it results in improved security and integrity of the system in the real time applications
    corecore