Journal articles on the topic 'Wormhole Attack Confirmation system'

To see the other types of publications on this topic, follow the link: Wormhole Attack Confirmation system.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Wormhole Attack Confirmation system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Tiruvakadu, Divya Sai Keerthi, and Venkataram Pallapa. "Confirmation of wormhole attack in MANETs using honeypot." Computers & Security 76 (July 2018): 32–49. http://dx.doi.org/10.1016/j.cose.2018.02.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Rupinder, Jatinder Singh, and Ravinder Singh. "Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3548607.

Full text
Abstract:
In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS) that automatically detects the WSNs attacks is proposed. AHIDS makes use of cluster-based architecture with enhanced LEACH protocol that intends to reduce the level of energy consumption by the sensor nodes. AHIDS uses anomaly detection and misuse detection based on fuzzy rule sets along with the Multilayer Perceptron Neural Network. The Feed Forward Neural Network along with the Backpropagation Neural Network are utilized to integrate the detection results and indicate the different types of attackers (i.e., Sybil attack, wormhole attack, and hello flood attack). For detection of Sybil attack, Advanced Sybil Attack Detection Algorithm is developed while the detection of wormhole attack is done by Wormhole Resistant Hybrid Technique. The detection of hello flood attack is done by using signal strength and distance. An experimental analysis is carried out in a set of nodes; 13.33% of the nodes are determined as misbehaving nodes, which classified attackers along with a detection rate of the true positive rate and false positive rate. Sybil attack is detected at a rate of 99,40%; hello flood attack has a detection rate of 98, 20%; and wormhole attack has a detection rate of 99, 20%.
APA, Harvard, Vancouver, ISO, and other styles
3

Singh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.

Full text
Abstract:
Wormhole attack is a challenging security threat to wireless sensor networks which results in disrupting most of the routing protocols as this attack can be triggered in different modes. In this paper, WRHT, a wormhole resistant hybrid technique, is proposed, which can detect the presence of wormhole attack in a more optimistic manner than earlier techniques. WRHT is based on the concept of watchdog and Delphi schemes and ensures that the wormhole will not be left untreated in the sensor network. WRHT makes use of the dual wormhole detection mechanism of calculating probability factor time delay probability and packet loss probability of the established path in order to find the value of wormhole presence probability. The nodes in the path are given different ranking and subsequently colors according to their behavior. The most striking feature of WRHT consists of its capacity to defend against almost all categories of wormhole attacks without depending on any required additional hardware such as global positioning system, timing information or synchronized clocks, and traditional cryptographic schemes demanding high computational needs. The experimental results clearly indicate that the proposed technique has significant improvement over the existing wormhole attack detection techniques.
APA, Harvard, Vancouver, ISO, and other styles
4

Nikam, Shahuraje, and Anshul Sarawagi. "Security over Wormhole Attack in VANET Network System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 196. http://dx.doi.org/10.23956/ijarcsse.v7i8.50.

Full text
Abstract:
VANET plays important role while dealing with different vehicle communication. Security threats are always rising while working with heavy and public network. In past technique different dissemination techniques were introduced which deals with the security and proper communication in between the nodes and traffic. In this paper, previous approach over the data transmission is performed which deals with the lacking of security terms. Here a presentation of secure ECC with dynamic heuristic approach is presented which exhibit proper performance parameter while communicating in VANET network
APA, Harvard, Vancouver, ISO, and other styles
5

Ghugar, Umashankar, and Jayaram Pradhan. "Survey of wormhole attack in wireless sensor networks." Computer Science and Information Technologies 2, no. 1 (March 1, 2021): 33–42. http://dx.doi.org/10.11591/csit.v2i1.p33-42.

Full text
Abstract:
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN.In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
APA, Harvard, Vancouver, ISO, and other styles
6

Dhanalakshmi.G, Irin Sherly S,. "Providing Immunity against Wormhole Attack in Wireless Network Coding System." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 02 (February 28, 2015): 989–94. http://dx.doi.org/10.15680/ijircce.2015.0302040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jamali, Shahram, and Reza Fotohi. "Defending against Wormhole Attack in MANET Using an Artificial Immune System." New Review of Information Networking 21, no. 2 (July 2, 2016): 79–100. http://dx.doi.org/10.1080/13614576.2016.1247741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sundararajan, T. V. P., S. M. Ramesh, R. Maheswar, and K. R. Deepak. "Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET." Wireless Networks 20, no. 4 (August 4, 2013): 563–78. http://dx.doi.org/10.1007/s11276-013-0623-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bhosale, Snehal, and Harshal Patil. "Zigbee-Based Intrusion Detection System for Wormhole Attack in Internet of Things." Mathematical Modelling of Engineering Problems 10, no. 2 (April 28, 2023): 663–70. http://dx.doi.org/10.18280/mmep.100237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, Brij B., and Shaifali Narayan. "A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server." Journal of Organizational and End User Computing 33, no. 2 (July 2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.

Full text
Abstract:
This paper presents a framework for mutual authentication between a user device and a point of sale (POS) machine using magnetic secure transmission (MST) to prevent the wormhole attack in Samsung pay. The primary attribute of this method is authenticating the POS terminals by an authentication server to bind the generated token to a single POS machine. To secure the system from eavesdropping attack, the data transmitted between the user device and the machine is encrypted by using the Elgamal encryption method. The keys used in the method are dynamic in nature. Furthermore, comparison and security analysis are presented with previously proposed systems.
APA, Harvard, Vancouver, ISO, and other styles
11

Kumar Joshi, Brijendra, and Megha Soni. "A Security Assessment Framework for Routing and Authentication Protocols of Mobile Ad-hoc Networks." International Journal of Advanced Networking and Applications 14, no. 01 (2022): 5287–93. http://dx.doi.org/10.35444/ijana.2022.14108.

Full text
Abstract:
Security assessment of routing and authentication protocols is based on the comparison of basic and secured versions of protocols such as AODV, SAODV, DSDV, SEAD, ZRP, SRP, LHAP, HEAP etc. In this paper, a framework for security assessment is presented. It is a complete system that attempts to provide the promised services to each user or application. To assess the security of different protocols, a security index is assigned. The value of security index shows how much a protocol is secured. To assign the security index, security parameters have been found out and the performance of different protocols have been analyzed under normal condition, Black Hole attack, Wormhole attack, and DoS attack.
APA, Harvard, Vancouver, ISO, and other styles
12

Kamaleshwar, T., R. Lakshminarayanan, Yuvaraja Teekaraman, Ramya Kuppusamy, and Arun Radhakrishnan. "Self-Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN." Wireless Communications and Mobile Computing 2021 (December 26, 2021): 1–8. http://dx.doi.org/10.1155/2021/5143124.

Full text
Abstract:
Internet network communication protocol version 6 low-power wireless personal area networks (6LoWPAN) is supposed to assist the gadgets with low-power wireless sensor network (WSN) and it furnishes the top model layer of the data transmission system. The 6LoWPAN is prone to the diversified attacks such as wormhole and black hole attacks, which might be very difficult to become aware of and defend. In a wormhole attack, the attacker listens to the facts over the networks, and in a black hole attack, the intruder reprograms the nodes to dam the data transmission. As an end result, any data datagram that enters the attacked region will end result in transmission failure with low flow network rate and excessive one-way delay. To come across and heal the attack, a self-adaptive framework is brought into the networks and the procedure of data transmission is enriched. In this work, the affected region is measured and rectified with the aid of using the proposed self-adaptive framework for Ad Hoc On-Demand Distance Vector (AODV) routing protocol network communication protocol. The overall performance of the network healing technique is investigated with the aid of using simulation and its miles diagnosed that the proposed framework suggests promising overall performance with the aid of using accomplishing excessive flow network rate and minimum delay.
APA, Harvard, Vancouver, ISO, and other styles
13

Jamali, Shahram, and Reza Fotohi. "DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system." Journal of Supercomputing 73, no. 12 (May 24, 2017): 5173–96. http://dx.doi.org/10.1007/s11227-017-2075-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

P.H., Latha, and Vasantha R. "MDS-WLAN: Maximal Data Security in WLAN for Resisting Potential Threats." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 4 (August 1, 2015): 859. http://dx.doi.org/10.11591/ijece.v5i4.pp859-868.

Full text
Abstract:
The utmost security standards over Wireless Local Area Network (WLAN) are still an unsolved answer in research community as well as among the commercial users. There are various prior attempts in proposing security of WLAN that lacks focus on access point and is found to be quite complex implementation of cryptography. The proposed paper presents a novel, simple, and yet robust technique called as MDS-WLAN i.e. maximal data security in WLAN. The system is evaluated over laboratory prototype and mitigation measures are drawn for resisting wormhole attack, Sybil attack, and rogue access point issue in WLAN. The outcome of the MDS is compared with conventional AES and SHA that shows optimal communication performance and highest data security.
APA, Harvard, Vancouver, ISO, and other styles
15

Chen, Chin-Ling, Tzay-Farn Shih, Yu-Ting Tsai, and De-Kui Li. "A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/534657.

Full text
Abstract:
In recent years, wireless sensor networks have been used in a variety of environments; a wireless network infrastructure, established to communicate and exchange information in a monitoring area, has also been applied in different environments. However, for sensitive applications, security is the paramount issue. In this paper, we propose using bilinear pairing to design dynamic key management and authentication scheme of the hierarchical sensor network. We use the dynamic key management and the pairing-based cryptography (PBC) to establish the session key and the hash message authentication code (HMAC) to support the mutual authentication between the sensors and the base station. In addition, we also embed the capability of the Global Positioning System (GPS) to cluster nodes to find the best path of the sensor network. The proposed scheme can also provide the requisite security of the dynamic key management, mutual authentication, and session key protection. Our scheme can defend against impersonation attack, replay attack, wormhole attack, and message manipulation attack.
APA, Harvard, Vancouver, ISO, and other styles
16

Deshmukh-Bhosale, Snehal, and Santosh S. Sonavane. "A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things." Procedia Manufacturing 32 (2019): 840–47. http://dx.doi.org/10.1016/j.promfg.2019.02.292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ahmad, Masood, Ateeq Ur Rehman, Nighat Ayub, MD Alshehri, Muazzam A. Khan, Abdul Hameed, and Halil Yetgin. "Security, usability, and biometric authentication scheme for electronic voting using multiple keys." International Journal of Distributed Sensor Networks 16, no. 7 (July 2020): 155014772094402. http://dx.doi.org/10.1177/1550147720944025.

Full text
Abstract:
We propose electronic voting authentication scheme, which is a key management mechanism for electronic voting system intended to limit the number of attacks on a polling station and strengthen the security control. The motivation is to diversify security requirements of messages exchanged between polling stations. There are different types of messages exchanged between polling stations and each type of message has different security needs. A security mechanism developed on the basis of a single key is not enough to ensure the diverse security needs of voting network. In electronic voting authentication scheme, every polling station is responsible to support three different types of keys. These are global key, pairwise key, and individual key. The global keys are public keys shared with all polling stations in the voting network. The pairwise key can be used for communication with polling stations. Individual keys will be used for communication with the server. To ensure authentication of local broadcast, electronic voting authentication scheme uses one-way key chains in a well-organized way. The support of source authentication is a visible advantage of this scheme. We examine the authentication of electronic voting authentication scheme on numerous attack models. The measurement demonstrates that electronic voting authentication scheme is very operative in protecting against numerous elegant attacks such as wormhole attack, Sybil attack, and HELLO Flood attack. The proposed system is evaluated and the results demonstrate that the proposed system is practical and secure as compared to the direct recording electronic and manual systems.
APA, Harvard, Vancouver, ISO, and other styles
18

Tulaib, Lamia F., Akbal O. Salman, and Mazin A. Mohammed. "Innovative Techniques for Attack Detection in Wireless Ad-Hoc Networks." International Journal of Wireless and Ad Hoc Communication 3, no. 1 (2021): 49–58. http://dx.doi.org/10.54216/ijwac.030105.

Full text
Abstract:
As a result of the inherent weaknesses of the wireless medium, ad hoc networks are susceptible to a broad variety of threats and assaults. As a direct consequence of this, intrusion detection, as well as security, privacy, and authentication in ad-hoc networks, have developed into a primary focus of the current study. This body of research aims to identify the dangers posed by a variety of assaults that are often seen in wireless ad-hoc networks and provide strategies to counteract those dangers. The Black hole assault, Wormhole attack, Selective Forwarding attack, Sybil attack, and Denial-of-Service attack are the specific topics covered in this proposed work. In this paper, we describe a trust-based safe routing protocol with the goal of mitigating the interference of black hole nodes while routing in mobile ad-hoc networks. The overall performance of the network is negatively impacted when there are black hole nodes in the route that routing takes. As a result, we have developed a routing protocol that reduces the likelihood that packets would be lost because of black hole nodes. This routing system has been subjected to experimental testing to guarantee that the most secure path will be selected for the delivery of packets between a source and a destination. The invasion of wormholes into wireless networks results in the segmentation of the network as well as a disorder in the routing. As a result, we provide an effective approach for locating wormholes by using ordinal multi-dimensional scaling and round-trip duration in wireless ad hoc networks with either sparse or dense topologies. Wormholes that are linked by both short-route and long-path wormhole linkages may be found using the approach that was given. To guarantee that this ad hoc network does not include any wormholes that go unnoticed, this method is subjected to experimental testing. To fight against selective forwarding attacks in wireless ad-hoc networks, we have developed three different techniques. The first method is an incentive-based algorithm that makes use of a reward-punishment system to drive cooperation among three nodes for forwarding messages in crowded ad-hoc networks. A unique adversarial model has been developed by our team, and inside it, three distinct types of nodes and the activities they participate in are specified. We have demonstrated that the proposed method that is based on incentives prevents nodes from adopting individualistic behaviour, which ensures cooperation in the process of packet forwarding. In the second algorithm, a game theoretic model is proposed that uses non-cooperative game theory to ensure that intermediate nodes in resource-constrained ad-hoc networks faithfully forward packets.
APA, Harvard, Vancouver, ISO, and other styles
19

Gorbenko, I. D., O. G. Kachko, Yu I. Gorbenko, I. V. Stelnik, S. O. Kandy, and M. V. Yesina. "Methods for constructing system-wide parameters and keys for NTRU PRIME UKRAINE 5 – 7 stabvility levels. Product form." Radiotekhnika, no. 195 (December 28, 2018): 5–16. http://dx.doi.org/10.30837/rt.2018.4.195.01.

Full text
Abstract:
The research was carried out and the development of an effective practical algorithm for the construction of system-wide parameters and keys of cryptographic transformations such as asymmetric ciphers for a special form of setting the Product Form polynomial was performed. The experimental confirmation of the built-in system-wide parameters for 5 – 7 stability levels NTRU PRIME UKRAINE, taking into account a combined attack. is given.
APA, Harvard, Vancouver, ISO, and other styles
20

Challenor, R., N. Theobald, S. Pinsent, and H. Mullan. "Genitourinary medicine clinic KC60 coding for first episode genital herpes: a lesson from north of the border?" International Journal of STD & AIDS 18, no. 8 (August 1, 2007): 570–72. http://dx.doi.org/10.1258/095646207781439793.

Full text
Abstract:
A survey of the accuracy of applying the KC60 diagnostic code for genital herpes: first attack (C10A) was undertaken by non-consultant career-grade doctors working in genitourinary (GU) medicine in England, Wales and Northern Ireland. In total, 148 forms were returned (58% response). Overall, 88/148, 59.5% (95% confidence interval 51.5–67.4%) applied the correct codes for all the clinical scenarios presented. Of doctors who personally assigned codes to clinical episodes, 57/104 (54.8%), were correct compared with 31/44 (70.5%) who did not personally apply codes. There was no difference between these two groups ( P=0.08). The main error was assigning code C10A on clinical grounds only when there was no laboratory confirmation of herpes simplex virus. The authors suggest that the KC60 C10A code for first attack genital herpes should be simplified to accept a clinical diagnosis rather than insisting on viral confirmation. Alternatively, consideration could also be given to adopting a more comprehensive system (such as the Scottish example) for first attack genital herpes. We believe that either option would help improve the accuracy of GU clinic data relating to genital herpes.
APA, Harvard, Vancouver, ISO, and other styles
21

Woźniak, Mikołaj. "The Issue of Self-defence Based on Crisis Management and Combat System Krav Maga." Przegląd Strategiczny, no. 12 (December 31, 2019): 233–45. http://dx.doi.org/10.14746/ps.2019.1.15.

Full text
Abstract:
The goal of this publication is to confirm that the pattern of operation, developed based on the Krav Maga combat system and crisis management, provides an individual with safety against the threat of a street attack. At the beginning of the article, the issues of self-defence were discussed, the Krav Maga combat system was presented and the most important elements of the crisis management theory were introduced. Later in the paper, an analysis of each of the crisis management phases was carried out in relation to the risk of a street attack. The author answers the research questions in detail: What is the best source through which you can learn effective self-defence? How should an individual behave in particular phases of crisis management against the threat of a street attack to ensure its own safety? The analysis made in the paperwork based on available sources, observations and the author’s experience gained gives an unambiguous confirmation that combat systems are the best source through which one can learn effective self-defence, because they take into account all the elements that accompany a street attack. Following the scheme included in the publication, every person, regardless of age, sex or physical posture can effectively increase their own personal safety.
APA, Harvard, Vancouver, ISO, and other styles
22

Hepsiba, C. Linda, and R. Jemima Priyadarsini. "Sinkhole Detection in IOT using Elliptic Curve Digital Signature." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 5 (May 17, 2023): 322–29. http://dx.doi.org/10.17762/ijritcc.v11i5.6620.

Full text
Abstract:
A variety of smart applications, including homes, transportation, health, and robots in industries, are starting to gain interest due to the fast expansion of Internet of Things (IoT). Smart devices are made up of sensors and actuators that actively involved in monitoring, prediction, security, and information sharing in the IoT ecosystem. These state-of-the-art (SOTA) technologies enable people to monitor and manage their unified milieu in real-time. IoT devices are nevertheless regularly used in hostile situations, where attackers try to grab and penetrate them to take over the entire network. Due to the possibility of selective forwarding, sinkhole, blackhole, and wormhole attacks on IoT networks is a serious security risk. This research offers an effective method using a digital signature to detect and mitigate sinkhole attacks on IoT networks to resolve this problem. By doing a thorough security study of this suggested system, it shows how safe it is and how resistant it is to secure sinkhole attack detection. In this study, elliptic curve digital signature algorithm is used along with the node ranker to detect the sinkhole attack in IoT environment. According to the performance analysis and experimental findings compared to other research, the suggested system offers good detection accuracy and greatly lowers the overhead associated with computing, communication, and storage.
APA, Harvard, Vancouver, ISO, and other styles
23

Donchev, Anton. "Applying Confirmation Theory to the Case against Neurolaw." Balkan Journal of Philosophy 10, no. 1 (2018): 45–54. http://dx.doi.org/10.5840/bjp20181016.

Full text
Abstract:
Neurolaw is the emerging research field and practice of applying neuroscientific knowledge to legal standards and proceedings. This intersection of neuroscience and law has put up some serious claims, the most significant of which is the overall transformation of the legal system as we know it. The claim has met with strong opposition from scholars of law, such as Michael Pardo and Dennis Patterson (2011), who argue that neurolaw (and neuroscience more generally) is conceptually wrong and thus perceive most of it as “nonsense” (Patterson, 2003). I expose a flaw in Pardo and Patterson’s arguments by means of confirmation theory. My main point is that Pardo and Patterson use implicit hypothetico-deductivism in their attack on neurolaw, and that we have good reasons to doubt the employment of such a model, because it faces serious theoretical problems. I then demonstrate how the alleged problems associated with neurolaw disappear if we use a quantitative probabilistic account of confirmation. I also explain why it provides a better account for the way the legal system actually works.
APA, Harvard, Vancouver, ISO, and other styles
24

Liu, Yang, Yang Zhang, Yongsheng Yang, and Yan Ma. "DOCS: A Data Ownership Confirmation Scheme for Distributed Data Trading." Systems 10, no. 6 (November 19, 2022): 226. http://dx.doi.org/10.3390/systems10060226.

Full text
Abstract:
Data assets trading can encourage owners to distribute data and achieve large-scale data aggregation to promote the development of the supply chain system. Blockchain is a promising platform for constructing a decentralized data marketplace. The data may face risks in the marketplace, such as illegal theft, malicious tampering, or illegal distribution in the transactions process. The data ownership confirmation in a blockchain-empowered marketplace has attracted much attention in recent years. However, challenges still remain, including maintaining data integrity, traceability of illegal data, and accountability. In this paper, we propose a new data ownership confirmation scheme (DOCS) in the transaction scenario of blockchain-empowered distributed data assets trading. It integrates smart contracts, data-embedding technology, and data fingerprint to realize ownership confirmation and protection of data assets in transactions. DOCS ensures reliable mapping between on-chain data ownership information and off-chain data entities, which assists with the accurate prosecution of the illegal distribution of data assets. We demonstrate that DOCS can have desirable security properties in multiple attack models.
APA, Harvard, Vancouver, ISO, and other styles
25

Huang, Jie, Changsheng Liu, and Joseph Harding. "Research on Blockchain Architecture and Operating Principles Based on H-DAG." Symmetry 15, no. 7 (July 4, 2023): 1361. http://dx.doi.org/10.3390/sym15071361.

Full text
Abstract:
A hybrid blockchain structure (hybrid directed acyclic graph, or H-DAG) is proposed in this article to solve the existing problem of blockchain architectures using symmetric key encryption technology by combining the characteristics of single-chain blockchains and DAG distributed ledgers. By improving the block and transaction structures and optimizing the consensus mechanism, the H-DAG confirmed transaction orders while maintaining the high-throughput characteristics of a DAG, thus solving the transaction order dependence problem. We introduced a lightweight PoW mechanism to the H-DAG to improve the anti-fork ability of the blockchain. An incentive mechanism was adopted in our model to compel honest nodes to be more enthusiastic about participating in, maintaining, and enhancing the security of a given network. The blockchain states achieved strong levels of consistency, and their transaction confirmation times were predictable. We evaluated the performance of the H-DAG by comparing and analyzing multiple experiments, and we modeled a forking attack strategy, verifying the resistance of the H-DAG to this attack strategy. The experimental results demonstrated that the order of transactions in the H-DAG was globally consistent, and the confirmation time of transactions was predictable. The H-DAG improved the anti-fork ability and enhanced the security of the blockchain to ensure a degree of decentralization of the blockchain system. Therefore, the system throughput was enhanced by improving the block structure using symmetric key technology.
APA, Harvard, Vancouver, ISO, and other styles
26

Al Sawafi, Yahya, Abderezak Touzene, and Rachid Hedjam. "Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks." Journal of Sensor and Actuator Networks 12, no. 2 (March 8, 2023): 21. http://dx.doi.org/10.3390/jsan12020021.

Full text
Abstract:
Internet of things (IoT) has become an emerging technology transforming everyday physical objects to be smarter by using underlying technologies such as sensor networks. The routing protocol for low-power and lossy networks (RPL) is considered one of the promising protocols designed for the IoT networks. However, due to the constrained nature of the IoT devices in terms of memory, processing power, and network capabilities, they are exposed to many security attacks. Unfortunately, the existing Intrusion Detection System (IDS) approaches using machine learning that have been proposed to detect and mitigate security attacks in internet networks are not suitable for analyzing IoT traffics. This paper proposed an IDS system using the hybridization of supervised and semi-supervised deep learning for network traffic classification for known and unknown abnormal behaviors in the IoT environment. In addition, we have developed a new IoT specialized dataset named IoTR-DS, using the RPL protocol. IoTR-DS is used as a use case to classify three known security attacks (DIS, Rank, and Wormhole). The proposed Hybrid DL-Based IDS is evaluated and compared to some existing ones, and the results are promising. The evaluation results show an accuracy detection rate of 98% and 92% in f1-score for multi-class attacks when using pre-trained attacks (known traffic) and an average accuracy of 95% and 87% in f1-score when predicting untrained attacks for two attack behaviors (unknown traffic).
APA, Harvard, Vancouver, ISO, and other styles
27

Younas, Shamim, Faisal Rehman, Tahir Maqsood, Saad Mustafa, Adnan Akhunzada, and Abdullah Gani. "Collaborative Detection of Black Hole and Gray Hole Attacks for Secure Data Communication in VANETs." Applied Sciences 12, no. 23 (December 5, 2022): 12448. http://dx.doi.org/10.3390/app122312448.

Full text
Abstract:
Vehicle ad hoc networks (VANETs) are vital towards the success and comfort of self-driving as well as semi-automobile vehicles. Such vehicles rely heavily on data management and the exchange of Cooperative Awareness Messages (CAMs) for external communication with the environment. VANETs are vulnerable to a variety of attacks, including Black Hole, Gray Hole, wormhole, and rush attacks. These attacks are aimed at disrupting traffic between cars and on the roadside. The discovery of Black Hole attack has become an increasingly critical problem due to widespread adoption of autonomous and connected vehicles (ACVs). Due to the critical nature of ACVs, delay or failure of even a single packet can have disastrous effects, leading to accidents. In this work, we present a neural network-based technique for detection and prevention of rushed Black and Gray Hole attacks in vehicular networks. The work also studies novel systematic reactions protecting the vehicle against dangerous behavior. Experimental results show a superior detection rate of the proposed system in comparison with state-of-the-art techniques.
APA, Harvard, Vancouver, ISO, and other styles
28

Talukdar, Md Ibrahim, Rosilah Hassan, Md Sharif Hossen, Khaleel Ahmad, Faizan Qamar, and Amjed Sid Ahmed. "Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature." Wireless Communications and Mobile Computing 2021 (March 2, 2021): 1–13. http://dx.doi.org/10.1155/2021/6693316.

Full text
Abstract:
In mobile ad hoc networks (MANETs), mobile devices connect with other devices wirelessly, where there is no central administration. They are prone to different types of attacks such as the black hole, insider, gray hole, wormhole, faulty node, and packet drop, which considerably interrupt to perform secure communication. This paper has implemented the denial-of-service attacks like black hole attacks on general-purpose ad hoc on-demand distance vector (AODV) protocol. It uses three approaches: normal AODV, black hole AODV (BH_AODV), and detected black hole AODV (D_BH_AODV), wherein we observe that black holes acutely degrade the performance of networks. We have detected the black hole attacks within the networks using two techniques: (1) intrusion detection system (IDS) and (2) encryption technique (digital signature) with the concept of prevention. Moreover, normal AODV, BH_AODV, and D_BH_AODV protocols are investigated for various quality of service (QoS) parameters, i.e., packet delivery ratio (PDR), delay, and overhead with varying the number of nodes, packet sizes, and simulation times. The NS2 software has been used as a simulation tool to simulate existing network topologies, but it does not contain any mechanism to simulate malicious protocols by itself; therefore, we have developed and implemented a D_BH_AODV routing protocol. The outcomes show that the proposed D_BH_AODV approach for the PDR value delivers around 40 to 50% for varying nodes and packets. In contrast, the delay decreases from 300 to 100 ms and 150 to 50 ms with an increase in the number of nodes and packets, respectively. Furthermore, the overhead changes from 1 to 3 for various nodes and packet values. The outcome of this research proves that the black hole attack degrades the overall performance of the network, while the D_BH_AODV enhances the QoS performance since it detects the black hole nodes and avoids them to establish the communication between nodes.
APA, Harvard, Vancouver, ISO, and other styles
29

Kerrakchou, Imane, Sara Chadli, Yassine Ayachi, and Mohammed Saber. "Modeling the impact of jamming attacks in the internet of things." Indonesian Journal of Electrical Engineering and Computer Science 26, no. 2 (May 1, 2022): 1206. http://dx.doi.org/10.11591/ijeecs.v26.i2.pp1206-1215.

Full text
Abstract:
Security is a key requirement in the context of the Internet of Things. The IoT is connecting many objects together via wireless and wired connections with the goal of allowing ubiquitous interaction, where all components may communicate with others without constraints. The wireless sensor network is one of the most essential elements of IoT concepts. Because of their unattended and radio-shared nature for communication, security is becoming an important issue. Wireless sensor nodes are susceptible to different types of attacks. Such attacks can be carried out in several various ways. One of the most commonly utilized methods is Jamming. However, there are also some other attack types that we need to be aware of, such as Tampering, Wormhole, etc. In this paper, we have provided an analysis of the layered IoT architecture. A detailed study of different types of Jamming attacks, in a wireless sensor network, is presented. The packet loss rate, energy consumption, etc. are calculated, and the performance analysis of the WSN system is achieved. The protocol chosen to evaluate the performance of the WSN is the S-MAC protocol. Different simulations are realized to evaluate the performance of a network attacked by the different types of Jamming attacks.
APA, Harvard, Vancouver, ISO, and other styles
30

Xie, Qingqing, Fan Dong, and Xia Feng. "HLOChain: A Hierarchical Blockchain Framework with Lightweight Consensus and Optimized Storage for IoT." Security and Communication Networks 2023 (April 11, 2023): 1–14. http://dx.doi.org/10.1155/2023/3412200.

Full text
Abstract:
Blockchain can effectively deal with the security and trust issues in Internet of Things (IoT) due to its salient features including decentralization, immutability, traceability, openness, and transparency. However, most IoT devices have too limited computing, storage, and bandwidth resources to maintain the complete operation of a blockchain system. To this end, we propose a hierarchical blockchain framework called HLOChain for IoT scenarios. First, according to computing and storage capabilities, the IoT devices are classified into three levels, i.e., high, medium, and low. They are deployed on different layers. In this way, a hierarchical blockchain architecture is designed. Second, we propose a lightweight proof of random (PoR) consensus mechanism to provide low-energy block mining, so that even the medium nodes can participate in the consensus task. Third, in order to reduce the ledger storage overhead, we design a blockchain storage optimization strategy based on the account model. Finally, the security analysis demonstrates that our HLOChain is secure against double-spend attack, Sybil attack, and so on. The experimental evaluation shows that our HLOChain achieves better performance in ledger storage cost, consensus computing cost, throughput, and transaction confirmation latency.
APA, Harvard, Vancouver, ISO, and other styles
31

Perumal, Sundresan. "An Effectual Secured Approach Against Sybil Attacks in Wireless Networks." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 09 (May 10, 2022): 217–30. http://dx.doi.org/10.3991/ijim.v16i09.30213.

Full text
Abstract:
In both wireless and mobile ad hoc networks, assaults can come from a variety of different sources. The terms "active attack" and "passive attack" describe these two types of attacks. In the network community, the Sybil attack is one of the most often used and deployed techniques for sniffing identities and repurposing them. Multiple identities or Sybil attacks have recently sparked a lot of interest in the research community. The algorithms and networks on which they are tested are vastly different among the many methods that have been offered. Since researchers can't evaluate these systems side by side or test their efficacy on real-world social networks with a variety of structural features, it's difficult to say whether there are any other (perhaps more efficient) methods of Sybil protection. In the event of a Sybil attack, the gatecrasher subverts the system framework's notoriety arrangement by creating a large number of pseudonymous individuals and then using them to add an enormously imbalanced influence. Three factors determine a notoriety framework's susceptibility to a Sybil attack: how quickly personalities can be generated, how much the notoriety framework accepts inputs from substances that lack a chain of trust, and if the notoriety framework handles all components equally. A large-scale Sybil ambush in Bittorrent Mainline may be accomplished in a cheap and effective manner, according to confirmation. A substance on a distributed system is a piece of software that has access to the resources of the local community. By displaying a character, a distributed system element reveals itself to the world. A single chemical can have an impact on more than one character. Numerous characters can be assigned to a single element. The personalities of substances in shared systems are used for the objectives of repetition, asset transfer, reliability, and trustworthiness, among other reasons. For remote elements to be aware of characters without necessarily being aware of the personality-to-neighborhood correlation, distributed systems make use of the character as a decision. Each different identification is normally considered to be associated with a separate local entity by convention. A single local entity may have several identities in actuality. In order to avoid and identify Sybil assaults, an empirical technique is used in this study. According to the base paper, any nodes with RSS greater than the provided threshold are regarded to be attackers under the present approach. A centralized way to monitor the mobile nodes is required to prevent this assault. As the server agent assumes full control of the ad-hoc network, malevolent nodes or selfish nodes are fully eliminated from the system.
APA, Harvard, Vancouver, ISO, and other styles
32

Pisitpayat, Nichakul, Ram Rangsin, Kanlaya Jongcherdchootrakul, Chawetsan Namwat, Anek Mungaomklang, and Wanna Hanshaoworakul. "First-generation Cluster of Coronavirus Disease 2019 (COVID-19) Related to Boxing Stadiums in Bangkok and the Bangkok Metropolitan Region, March 2020." Outbreak, Surveillance, Investigation & Response (OSIR) Journal 15, no. 4 (December 30, 2022): 106–13. http://dx.doi.org/10.59096/osir.v15i4.262273.

Full text
Abstract:
In March 2020, clusters of COVID-19 cases were reported among attendees of a boxing stadium in Bangkok. This study aimed to investigate and describe the outbreak and identify its source. We conducted a descriptive analysis of cases and transmission patterns, performed a walk-through survey and interviewed stadium staffs for possible factors related to disease spreading. COVID-19 cases were those who had a history of visiting Bangkok or the Bangkok Metropolitan boxing stadiums, or contacting confirmed cases visiting boxing stadiums within 14 days of developing symptoms with laboratory confirmation using the RT-PCR method. An active case finding was accomplished through social media and the national disease surveillance system. High-risk contacts were self-quarantined and nasopharyngeal specimens were collected. Attack rate among boxing event attendees on 6 Mar 2020 was 11.0% (268/2,431). Attack rate among contacts of the first generation was 5.4% (110/2,024), and the second-generation contacts was 2.6% (6/229). Behavioral risks during the event included cheering and gambling among attendees. Some did not wear face masks. We recommend postponing all sporting matches as the most reasonable practice during an epidemic. To prevent and control future outbreaks, gambling should be restricted or limited to online payment and strict control measures should be considered.
APA, Harvard, Vancouver, ISO, and other styles
33

Amoako, Kingsley K., Michael J. Shields, Noriko Goji, Chantal Paquet, Matthew C. Thomas, Timothy W. Janzen, Cesar I. Bin Kingombe, Arnold J. Kell, and Kristen R. Hahn. "Rapid Detection and Identification ofYersinia pestisfrom Food Using Immunomagnetic Separation and Pyrosequencing." Journal of Pathogens 2012 (2012): 1–6. http://dx.doi.org/10.1155/2012/781652.

Full text
Abstract:
Interest has recently been renewed in the possible use ofY. pestis, the causative agent of plague, as a biological weapon by terrorists. The vulnerability of food to intentional contamination coupled with reports of humans having acquired plague through eating infected animals that were not adequately cooked or handling of meat from infected animals makes the possible use ofY. pestisin a foodborne bioterrorism attack a reality. Rapid, efficient food sample preparation and detection systems that will help overcome the problem associated with the complexity of the different matrices and also remove any ambiguity in results will enable rapid informed decisions to be made regarding contamination of food with biothreat agents. We have developed a rapid detection assay that combines the use of immunomagnetic separation and pyrosequencing in generating results for the unambiguous identification ofY. pestisfrom milk (0.9 CFU/mL), bagged salad (1.6 CFU/g), and processed meat (10 CFU/g). The low detection limits demonstrated in this assay provide a novel tool for the rapid detection and confirmation ofY. pestisin food without the need for enrichment. The combined use of theiCropTheBug system and pyrosequencing for efficient capture and detection ofY. pestisis novel and has potential applications in food biodefence.
APA, Harvard, Vancouver, ISO, and other styles
34

Kaur, J., and S. Kaur. "A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network." International Journal of Business Data Communications and Networking 15, no. 2 (July 2019): 35–54. http://dx.doi.org/10.4018/ijbdcn.2019070103.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) are comprised of an arrangement of self-sorting mobile hosts furnished with wireless interaction devices gathered in groups without the need of any settled framework as well as centralized organization to maintain a system over radio connections. Every mobile node can react as a host and also, the router freely utilizes the wireless medium inside the correspondence range to deal with the interaction between huge quantities of individual mobile nodes by framing a correspondence system and trading the information among them without using any described group of the base station. A trust-based model in MANET estimates and sets up trust relationship among objectives. Trust-based routing is utilized to keep away data from different attackers like a wormhole, DOS, black-hole, selfish attack and so forth. Trust can be executed in different steps like reputation, subjective rationale and from the supposition of the neighboring node. A trust estimation approach not just watches the behavior of neighbor nodes, additionally it screens the transmission of the information packet in the identification of the route for exact estimation of trust value. A survey is carried out to find some of the limitations behind the existing works which has been done by the researchers to implement various approaches thus to build the trust management framework. Through the survey, it is observed that existing works focused only on the authenticated transmission of the message, how it transmits packets to the destination node securely using a trust-based scheme. And also, it is observed that the routing approach only focused on the key management issues. Certain limitation observed in the implemented approaches of existing work loses the reliability of framework. Thus, to withstand these issues it is necessary to establish a reliable security framework that protects the information exchanged among the users in a network while detecting various misbehaving attacks among the users. Confidentiality, as well as the integrity of information, can be secured by combining context-aware access control with trust management. The performance parameters should be evaluated with the previous works packet delivery ratio, packet drop, detection accuracy, number of false positives, and overhead.
APA, Harvard, Vancouver, ISO, and other styles
35

Yu, Chao, Wenke Yang, Feiyu Xie, and Jianmin He. "Technology and Security Analysis of Cryptocurrency Based on Blockchain." Complexity 2022 (July 21, 2022): 1–15. http://dx.doi.org/10.1155/2022/5835457.

Full text
Abstract:
Blockchain technology applied to cryptocurrencies is the dominant factor in maintaining the security of cryptocurrencies. This article reviews the technological implementation of cryptocurrency and the security and stability of cryptocurrency and analyzes the security support from blockchain technology and its platforms based on empirical case studies. Our results show that the security support from blockchain technology platforms is significantly insufficient and immature. In addition, we further Zyskind and Nathan (2015) and Choi (2019) and find that the top ten platforms play critical roles in security support and have significant advantages in terms of funds, duration, and human resources. Moreover, these platforms provide computational resources and benefits to the consensus algorithm selection for blockchain practitioners. Second, encryption ensures the security of cryptocurrencies. On the one hand, the digital signatures identify the identity of the signatory and the transaction. However, the principle of the hash algorithm (SHA256) confirms ownership. Meanwhile, SHA256 is infeasible to compute in the reverse direction and is difficult to attack. Furthermore, the records in the blockchain can be queried by every participant, making the system information transparent and open reliable. Third, compared to the study of Fu and Fang 2016, we find that the blockchain structure is composed of security components and basic components of six layers that are independent and cannot be extended completely and have a certain coupling among them. Fourth, the underlying ledger structures of Bitcoin and DAG are highly correlated to their security. Specifically, we follow Sompolinsky et al. (2016) and detect that the structure of SPECTRE ensures network security and robustness from its block production, conflict resolution, and generated trusted transaction sets. Meanwhile, the voting algorithm of SPECTRE makes resolving conflicting transactions by calculating votes and ensuring the transaction information that is virtually unable to be tampered with possible. In particular, the security calculation power of SPECTRE can reach 51% and resist “double-spend attacks” and “censorship attacks” effectively. In addition, the RDL framework of SPECTRE achieves security confirmation of transferring funds. Moreover, PHANTOM identifies evil blocks by employing block connectivity analysis and ensures its security. Eventually, we also expand the studies of (Sompolinsky et al., 2016 and Sompolinsky et al., 2017) and compare the basic characteristics of the protocols of Bitcoin, SPECTRE, and PHANTOM and find that protocols play imperative roles throughout the implementation process of cryptocurrency. In addition, the underlying ledger structure and consensus mechanism make up a blockchain while the confirmation time, throughput limit, and ordering are prerequisites for smart contracts.
APA, Harvard, Vancouver, ISO, and other styles
36

Simpson, Colin R., Nazir Lone, Jim McMenamin, Rory Gunson, Chris Robertson, Lewis D. Ritchie, and Aziz Sheikh. "Early estimation of pandemic influenza Antiviral and Vaccine Effectiveness (EAVE): use of a unique community and laboratory national data-linked cohort study." Health Technology Assessment 19, no. 79 (October 2015): 1–32. http://dx.doi.org/10.3310/hta19790.

Full text
Abstract:
BackgroundAfter the introduction of any new pandemic influenza, population-level surveillance and rapid assessment of the effectiveness of a new vaccination will be required to ensure that it is targeted to those at increased risk of serious illness or death from influenza.ObjectiveWe aimed to build a pandemic influenza reporting platform that will determine, once a new pandemic is under way: the uptake and effectiveness of any new pandemic vaccine or any protective effect conferred by antiviral drugs once available; the clinical attack rate of pandemic influenza; and the existence of protection provided by previous exposure to, and vaccination from, A/H1N1 pandemic or seasonal influenza/identification of susceptible groups.DesignAn observational cohort and test-negative study design will be used (post pandemic).SettingA national linkage of patient-level general practice data from 41 Practice Team Information general practices, hospitalisation and death certification, virological swab and serology-linked data.ParticipantsWe will study a nationally representative sample of the Scottish population comprising 300,000 patients. Confirmation of influenza using reverse transcription polymerase chain reaction and, in a subset of the population, serology.InterventionsFuture available pandemic influenza vaccination and antivirals will be evaluated.Main outcome measuresTo build a reporting platform tailored towards the evaluation of pandemic influenza vaccination. This system will rapidly measure vaccine effectiveness (VE), adjusting for confounders, estimated by determining laboratory-confirmed influenza; influenza-related morbidity and mortality, including general practice influenza-like illnesses (ILIs); and hospitalisation and death from influenza and pneumonia. Once a validated haemagglutination inhibition assay has been developed (and prior to the introduction of any vaccination), cross-reactivity with previous exposure to A/H1N1 or A/H1N1 vaccination, other pandemic influenza or other seasonal influenza vaccination or exposure will be measured.ConclusionsA new sentinel system, capable of rapidly determining the estimated incidence of pandemic influenza, and pandemic influenza vaccine and antiviral uptake and effectiveness in preventing influenza and influenza-related clinical outcomes, has been created. We have all of the required regulatory approvals to allow rapid activation of the sentinel systems in the event of a pandemic. Of the 41 practices expressing an interest in participating, 40 have completed all of the necessary paperwork to take part in the reporting platform. The data extraction tool has been installed in these practices. Data extraction and deterministic linkage systems have been tested. Four biochemistry laboratories have been recruited, and systems for serology collection and linkage of samples to general practice data have been put in place.Future workThe reporting platform has been set up and is ready to be activated in the event of any pandemic of influenza. Building on this infrastructure, there is now the opportunity to extend the network of general practices to allow important subgroup analyses of VE (e.g. for patients with comorbidities, at risk of serious ILI) and to link to other data sources, in particular to test for maternal outcomes in pregnant patients.Study registrationThis study is registered as ISRCTN55398410.FundingThe National Institute for Health Research Health Technology Assessment programme.
APA, Harvard, Vancouver, ISO, and other styles
37

Kodera, Yoshihisa, Kazuhito Yamamoto, Shunichi Kato, Mine Harada, Yoshinobu Kanda, Nobuyuki Hamajima, Shigetaka Asano, et al. "Safety and Risk of Allogeneic Peripheral Blood Stem Cell Donation: The Comprehensive Report of Nation-Wide Consecutively Pre-Registered 3,264 Family Donor Survey In 10years Project by Japan Society for Hematopoietic Cell Transplantation." Blood 116, no. 21 (November 19, 2010): 1180. http://dx.doi.org/10.1182/blood.v116.21.1180.1180.

Full text
Abstract:
Abstract Abstract 1180 Background: Although peripheral blood stem cell (PBSC) donation has been considered safe and less stressful, certain fetal or life-threatening acute (within 30 days of post donation) adverse events as well as late occurrence of hematological malignancies have been reported among donors. Since the Japan Marrow Donor Program requires the confirmation of safety and risk of PBSC donation at family donors prior to applying this technique for volunteer donors, the Japan Society for Hematopoietic Cell Transplantation (JSHCT) performed nation-wide consecutive pre-registration and follow up for PBSC family donors from 2000 to 2010. This time, we report the comprehensive outcome of this project. Methods: The JSHCT mandated the registration of every PBSC family donor at the donor registration center then, issued donor identification number to each donor. The society required every harvest center to observe the JSHCT standards for donor eligibility, stem cell mobilization and harvest. The society also required to notify it of any severe adverse events, the results of the day30 clinical and laboratory check and of the annual health check for five years. Findings: Among 3,264 pre-registered donors, 47 emergency reports were submitted for 5 years and it was revealed that acute unexpectedly severe adverse events such as interstitial pneumonitis or anginal attack occurred at 0.58 % of donors although no mortality cases within 30 days of post donation were found. The relationship between donors' basic information such as age or gender and clinical and laboratory abnormalities obtained from 2,882 day 30 reports was studied and it revealed the followings; the risk factor for fatigue, headache, insomunia, anorexia and nausea was female, the risk factors for prolongation of hospitalized period were older age, low body weight, high total dose of granulocyte colony stimulating factor (G-CSF), the presence of past or current health problems and the episode of past stem cell donation, the risk factors for thrombocytopenia were older age and high total dose of G-CSF, the risk factors for splenomegary were older age and high total dose of G-CSF, the risk factors for poor CD34+ cell mobilization were older age, female and the episode of past stem cell donation, the risk factor for over CD34+ stem cell mobilization was younger age. The information from 6,233 annual health checks from 1,708 donors for 5 years showed the followings; the incidence of non-malignant but significant health problems was 1.5%, the incidence of non hematological malignancies was 0.7%, the incidence of hematological malignancy was 0.06%. It was also confirmed that the incidence of hematological malignancies among PBSC donors was not high compared with that among retrospectively surveyed bone marrow family donors. Interpretation: The consecutive donor pre-registration and annual follow up system that sets strict standards for donor eligibility, cell mobilization and harvest is effective in preventing real life-threatening acute adverse events and also is useful to know the real figures on PBSC donors and to assure donor safety. Such a system should be applied to all hematopoietic stem cell (family and volunteer, bone marrow and peripheral blood) donors. Disclosures: No relevant conflicts of interest to declare.
APA, Harvard, Vancouver, ISO, and other styles
38

Ettabonia, Santhosh Kumar, Komalatha Nakkala, and Nayana Chathalingath. "An Investigation on Omicron Variant Corona Virus and its Impact." Pharmaceutical Sciences and Resarch 1, no. 1 (April 1, 2022): 12–19. http://dx.doi.org/10.46632/psr/1/1/3.

Full text
Abstract:
Acid substitutes to examine whether the risk over time, Origin of beta, delta and omicron variants In spike protein, there are 15 receptor-binding domains, and syndrome corona virus 2 OMCR variant in travellers who are fully vaccinated in an isolated hotel in Hong Kong after the third vaccine dose is neutralized. SARS-CoV-2 pseudo viruses were first diagnosed with severe acute respiratory syndrome characterized by the presence of an omicron variant of the corona virus 2 that dominates SARS, with the presence of a synthetic protein in Background of omicron or abstract. ORS- variant precedes variant. Spike confirmation plays an important role in SARS. A third vaccine dose was first reported to neutralize omicron from 20 participants who received two serum samples. The summary of vaccine levels and 20 recipients of the trio, the recently announced Omicron variant, included 34 Spike protein mutations associated with corona virus-2 monoclonal acute respiratory syndrome antibody, and the antiviral activity against Omicron evaluated the test activity of seven monoclonal. Antibodies to Covit-19 and three antiviral drugs have led to fewer hospitalizations and deaths in South Africa, with the Omicron Corona virus being seen as a major threat to global public health during a wave of challenges in predicting the severity of 2019. Recently, variant has been reported in the South and Due to many mutations in spike protein, Dangerous SARS-CoV-2 of Omicron Variation raises serious concerns because it can significantly control the antibody. Aromatic mono deodorants are significantly extended by the Inter molecular Williamson set. Kinetic data two doses of the MRNA vaccine are now highly effective against SARS-CoV-2. We then tested the antibody against Omicron SARS-CoV-2 doses, of the highly contagious omicron variant of the acute respiratory disease corona virus Origin is about antibody. Origin of Omicron variant of SARSCoV-2 is an urgent global health concern, and in this study our statistical modelling suggests that the Omicron variant is spreading much faster than the world-designated Omicron variant of the Covid-19 type. Anxiety. On November 26, the health system triggered travel restrictions, betting to speed up the booster, until the end of November 2021, when the Omicron SARS-CoV-2 exploded following a Christmas party attended by, Norway. We observed a 74% attack rate and the acute respiratory syndrome in South Africa are characterized by three distinct waves of corona virus 2 SARS-CoV-2 infections. The first abbreviation relates to the SARS-CoV-2 Omicron BA compound. Variation 1 Appeared in late 2021 and is characterized by multiple spike mutations in all spike domains. The prevalence of the Omicron SARS-CoV-2 variant underscores the importance of analyzing cross-protection from previous Omicron infections. Concerns about the origin of the variant and its gradually increasing spread there is global public health among humans. Neutralization of Omicron BA. Variations Although two doses of the vaccine build up immunity, it decreases over time, and administration of a booster dose rapidly spreads to people who have been vaccinated against the acute respiratory syndrome corona virus-2 Omicron variant, raising concerns about the number of Omicron SARS. Anxiety that plays a major role in alleviating acute illness and mortality from COVID-19 over the past 12 months. Methods Net care is a private healthcare group with 49 intensive care units across South Africa.
APA, Harvard, Vancouver, ISO, and other styles
39

Korytin, Denys, and Anhelina Zavadska. "To the legal issues of startups in the conditions of armed aggression of the Russian Federation against Ukraine (Russian-Ukrainian War)." Law and innovations, no. 1 (37) (April 1, 2022): 56–62. http://dx.doi.org/10.37772/2518-1718-2022-1(37)-8.

Full text
Abstract:
Problem setting. The armed attack of the Russian Federation on Ukraine without a declaration of war, which took place at 5 am on February 24, 2022, at the same time radically changed the entire system of legal relations of our state. The unification of the whole nation (in the political sense of the term) against the unprecedented criminal actions of the “fraternal people” caused a temporary cessation (or modification) of the usual daily work of every citizen, foreigner or stateless person. Undoubtedly, business representatives, including startups, have been providing significant support for the resistance of our state to armed aggression since the first days. Realizing the value of such assistance and the importance of business entities for Ukraine, public authorities have developed and adopted a number of regulations aimed at updating legal relations with such entities. Analysis of resent researches and publications. Issues of startup activity have become the subject of research by such scientists as SV Glebko OV Rozgon, IV Podrez-Ryapolova, AS Petkevich, AV Sherstobitov, IV Yashchyshina and others. Within the framework of this scientific article, the specifics of the activities of startups in a state of martial law caused by an act of armed aggression of the Russian Federation against our state will be studied. The target of research is to study the legal issues of startups in the Russian-Ukrainian war. In this regard, we consider it appropriate in this article to focus on startups that are at the stage of Early Growth, because at this stage the startup acts as an officially registered business entity and, accordingly, it a number of normative legal acts regulating the activity of such subjects are extended. Article’s main body. As we have repeatedly mentioned before, a startup is an innovative idea or a newly created business entity (individual entrepreneur or legal entity). According to the officials of the international ecosystem Startup-Network, the main feature that distinguishes a startup from a normal small or medium enterprise is the mandatory trend of the startup to develop and further transform into a large enterprise. Agreeing with this feature, we consider it appropriate to supplement the characteristics of the startup with another mandatory feature innovation. This feature directly follows from the analysis of the legislation of European countries, international acts, EU documents and reference materials of a number of international organizations. Thus, based on the above mandatory features of startups, it follows that a startup goes through a number of stages of its formation and development. This research will address the issue of startups at the Early Growth stage. At this stage, the startup usually has the status of a small or medium enterprise and needs comprehensive government support. Startups in Ukraine that have faced the problem of fulfilling their commitments can now use the simplified procedure for obtaining a certificate from the Chamber of Commerce and Industry of Ukraine. However, it should be borne in mind that obtaining confirmation of the existence of force majeure does not in itself release you from liability for nonperformance or improper performance of obligations. There is a need to prove a direct and irreversible causal link between such circumstances and the inability to perform duties. In addition, in the field of international relations, it is necessary to take into account the existence of a number of international acts that regulate the consequences of force majeure. Changes in tax legislation concerning startups in the third group of the simplified taxation system are that, on the one hand, the tax burden on the business entity has been reduced, and on the other hand, the frequency of tax revenues has been reduced. Conclusions and prospects of the development. Most startups in Ukraine, which are at the initial stage of launching and selling innovative products on the market, face problems of inability to fully meet their commitments or complicate the process of doing business. Our state creates conditions for simplified implementation of the procedure of releasing startups from liability for non-performance or improper performance of their obligations under contracts, provided that such non-performance is directly related to the existence of force majeure in the form of armed aggression against Ukraine. In addition, the Verkhovna Rada of Ukraine amended the tax legislation, which, in particular, provided support to the largest (third) group of the simplified taxation system and expanded the list of entities that can be included in such a group of taxation. These changes are aimed at encouraging people to do business in this extremely difficult stage of development of our state and creating a foundation for postwar economic reconstruction and revival of Ukraine.
APA, Harvard, Vancouver, ISO, and other styles
40

Kwan, Vickie, Eric Kaplovitch, Rita Selby, and Jameel Abdulrehman. "Effectiveness and Safety of the Direct Oral Anticoagulants in Low-Risk Antiphospholipid Syndrome: A Case Series." Blood 136, Supplement 1 (November 5, 2020): 16–17. http://dx.doi.org/10.1182/blood-2020-142842.

Full text
Abstract:
Introduction: Thrombotic Antiphospholipid syndrome (TAPS) is an autoimmune condition where venous thromboembolism (VTE) and/or arterial thromboembolism (ATE) occurs in the presence of antiphospholipid antibodies (aPLs). TAPS is traditionally managed with long-term anticoagulation with vitamin K antagonists (VKA). Over the past decade, direct oral anticoagulants (DOACs) have been increasingly replacing VKAs as the oral anticoagulant of choice given their lower risk of bleeding, fixed dosing, and no requirement for routine monitoring. However, recent evidence has demonstrated inferiority of DOACs compared to VKAs in TAPS patients with high risk (triple positive) aPL profiles or previous arterial events. It remains unclear whether TAPS patients with low risk aPL profiles (single positive), and without previous ATE, can be treated effectively and safely with DOACs. Objectives: To assess the effectiveness and safety of DOACs at preventing recurrent VTE or ATE in TAPS patients with a low risk aPL profile, and without prior ATE. Methods: We conducted a retrospective review of all TAPS patients with a low risk aPL profile, without prior ATE, who were anticoagulated with a DOAC at two tertiary care hospitals in Toronto, Canada from January 2010 to July 2020. All patients with any positive aPL test results were first identified through the laboratory information system. This list was cross referenced with patients seen in specific thrombosis clinics and confirmed through individual electronic chart review. TAPS was defined as persistent (>12 weeks apart) lupus anticoagulant (LA) positivity, anti-cardiolipin titre (ACA) >40 GPL, or anti-2-glycoprotein 1 titre (a2GP1) >40 GPL, with a preceding thrombotic event. Patients were excluded if any of the aPLs were deemed to be simultaneously positive or if there was a history of previous ATE. a2GP1 was not systematically tested in all patients. Patient outcomes were assessed throughout the duration of anticoagulation with a DOAC. Recurrent VTE included deep vein thrombosis, pulmonary embolism, or VTE of atypical location, and required objective confirmation with appropriate diagnostic imaging. ATE included ischemic stroke, transient ischemic attack (TIA), myocardial infarction, or other systemic arterial embolism. Major bleeding (MB) and clinically relevant non major bleeding (CRNMB) were defined by International Society on Thrombosis and Hemostasis criteria. Results: 1195 patients were identified with at least one instance of single positive aPL who had been seen in one of the thrombosis clinics. Patients were excluded for the following reasons: 858 for non-persistent aPL positivity, 70 for simultaneous aPL positivity, 20 for a likely false positive LA due to DOAC therapy, 93 due to an absence of preceding VTE, 45 for history of previous ATE, and 59 due to no prior DOAC therapy. After exclusions, 50 patients were included in the analysis, encompassing 157.2 years of patient-follow up. The study population was comprised of 24 women and 26 men with a mean age of 49.6 (standard deviation (SD) 16.3)years at the start of DOAC therapy (Table 1). The mean duration of DOAC treatment was 37.7 (SD 23.8) months. Fifteen (30%) patients had prior diagnosis of systemic lupus erythematosus (SLE), while 4 (8%) had other systemic autoimmune disease diagnoses. Only 1 patient met criteria for obstetric APS, on the basis of 3 consecutive fetal losses before 10 weeks gestation. None of the patients had documented valvular disease or thrombocytopenia. All patients were treated initially with therapeutic dose rivaroxaban, although 6 (12%) patients were switched to therapeutic dose apixaban due to increased bruising or menorrhagia. Five patients on rivaroxaban and 3 patients on apixaban were switched to a reduced dose DOAC. No patient had recurrent VTE. One patient had a possible ATE as a TIA, presenting with an episode of loss of sight for 15 minutes while on reduced dose apixaban. None of the patients experienced MB. Two patients experienced CRNMB, both severe menorrhagia, one on therapeutic dose of rivaroxaban and the other patient on reduced dose of rivaroxaban. Conclusions: In our retrospective case series of 50 patients with TAPS, a low risk aPL profile and no previous ATE, DOACs were effective and safe in the secondary prevention of thrombotic events with no MB. Larger, prospective controlled studies are required to confirm these findings. Disclosures No relevant conflicts of interest to declare.
APA, Harvard, Vancouver, ISO, and other styles
41

Vidadala, Ramasubbarao, and Madhusudana Rao J. "Isolation, characterization and semi-synthesis of natural products dimeric amide alkaloids." Journal of Natural Products and Natural Products Synthesis 1, no. 1 (January 31, 2021): 1–14. http://dx.doi.org/10.55124/jnns.v1i1.17.

Full text
Abstract:
Isolation, characterization of natural products dimeric amide alkaloids from roots of the Piper chaba Hunter. The synthesis of these products using intermolecular [4+2] cycloaddition reaction has been described. Obtained products were characterized using IR, 1HNMR, 13CNMR and Mass Spectroscopy. Introduction The awesome structural diversity and complexity of natural products inspire many chemists to consider how nature creates these molecules. Nature’s biosynthetic enzymes offer a powerful and practical route to many organic compounds, and synthetic chemists sometimes seek to imitate the efficiency and elegance of the biosynthetic machinery by designing biomimetic reactions that approximate natural reaction pathways. Probably the most astonishing biomimetic reactions1 are tandem processes that combine several transformations in sequence and produce complicated structures from comparably simple starting materials in a single laboratory operation. Biosynthesis is described as “the reaction or reaction sequence occurred in organism or its immediate environment will be viewed as biosynthesis” where as biomimetic synthesis describes as “A specific reaction or a sequence of reactions that mimic a proposed biological pathway is defined as bimimetic synthesis. An early example is Sir Robert Robinson’s landmark synthesis of tropinone in 1917.2 Forty-two years later, Gilbert Stork and Albert Eschenmoser independently proposed that the steroid ring system could be formed by tandem cation-π cyclizations of a polyene in an ordered transition state.3 A non-enzymatic version of this reaction type was demonstrated in W. S. Johnson’s classic synthesis of progesterone in 1971.4 Chapman’s synthesis of carpanone is a striking example of the power of biomimetic strategies.5 In 1980, Black proposed that the endiandric acids could arise biosynthetically from linear polyenes.6 In 1982, K. C. Nicolaou gave chemical support to Black’s hypothesis by chemically synthesizing endiandric acids A-G.7 Biomimetic Synthesis of Natural Products which involves, The biomimetic polyene carbocyclizations reaction, The biomimetic cycloaddition reaction, The biomimetic electrocyclization reaction, The polyether biomimetic synthesis, The biomimetic oxidative coupling of phenol, Some other interesting biomimetic synthesis, The present biomimetic synthesis of chabamides or dimeric amide alkaloids involves cycloaddition reactions. The Diels Alder reaction In the Diels-Alder reaction a six membered ring is formed through fusion of a 4 π component, usually a diene and a 2 π component which is commonly referred to as the Figure 1. dienophile. The Diels Alder reaction has proven to be great synthetic value, forming a key-step in the construction of compounds containing six-membered rings. Cyclohexene ring generated all the way through the formation of two new σ-bonds and one π bond with four adjacent stereocenters. The reaction is named after Otto Diels and Kurt Alder, two German chemists who studied the synthetic and theoretical aspects of this reaction in great detail.8 Their efforts have been rewarded with the 1950 Noble prize. Figure 2 Schematic representation of the Diels-Alder reaction. Cis principle In Diels-Alder reactions, the stereoselectivity is generally high due to the “cis principle”, which states that Diels-Alder reactions require a cisoid conformation for the diene and suprafacial-suprafacial mode of reaction, meaning that both ends of the diene attack from the same face of the dienophile in a syn fashion. Frontier Molecular Orbital (FMO) Approach Diels-Alder rections can be devided into, normal electron demand and inverse electron demand additions. This difference is based on the way the rate of the reaction responds to the introduction of electron withdrawing and electron donating substituents. Normal electron demand Diels-Alder reactions are promoted by electron donating substituents on the diene and electron withdrawing substituents on the dienophile. In contrast, inverse electron demand reactions are accelerated by electron withdrawing substituents on the diene and electron donating ones on the dienophile. There also exists an intermediate class, the neutral Diels-alder reaction, which is accelerated by both electron withdrawing and donating substitutents. The way the substituents affect the rate of the reaction can be rationalized with aid of Frontier Molecular Orbital (FMO) theory. This theory was developed during a study of the role of orbital asymmetry in pericyclic reactions by Woodward and Hoffmann9 and, independently, by fukui10 Later, Houk contributed significantly to the understanding of the reactivity and selectivity of these processes.11 The FMO theory states that a reaction between two compounds is controlled by the efficiency with which the molecular orbitals of the individual reaction partners interact. The interaction is most efficient for the reactivity is completely determined by interactions of the electrons that are highest in energy of the of the reaction partners (those in the Highest Occupied Molecular Orbital, the HOMO) with the Lowest Unoccupied Molecular Orbital (LUMO) of the other partner, applied to the Diels-alder reactions, two modes of interaction are possible. The reaction can be controlled by the interaction of the HOMO of the diene and the LUMO of the Dienophile (normal electron demand), or by the interaction between the LUMO of the diene and the HOMO of the dienophile (inverse electron demand), as illustrated in Fig-B. In the former case, a reduction of the diene-HOMO and dienophile-LUMO energy gap can be realized by either raising the energy of the HOMO of the diene by introducing electron donating substituents or lowering the energy of the dienophile LUMO by the introduction of electron donating substituents or lowering the energy of the dienophile LUMO by the introduction of electron withdrawing substituents. A glance at Fig-A confirms that in the formation of two new bonds, orbital symmetry is conserved so that, according to Woodward and Hoffmann, the reaction is concerted. In other words, no intermediate is involved in the pericyclic process such as the Diels-Alder reaction.12 This conclusion is consistent with a number of experimental observations. The cis or trans conformation of the dienophile is fully conserved in the configuration of the cycloadduct, which proves that there is no intermediate involved with a lifetime long enough to allow rotation around C-C bond. Selectivity can arise when substituted dienes and dienophiles are employed in the Diels-Alder reaction. Two different cycloadducts denoted as endo and exo are possible. Under the usual conditions their ratio is kinetically controlled. Alder and Stein already discerned that there usually exists a preference for formation of the endo isomer i.e formulated as tendency of maximum accumulation of unsaturation, (the Alder-Stein rule)13 Indeed, there are only very few examples of Diels-Alder reactions where the exo isomer is major product.14 The interactions underlying this behavior have been subject of intensive research. Since the reactions leading to endo and exo product share the same initial state, the difference between the respective transition-state energies fully account for the observed selectivity. These differences are typically in the range of 10-15 kJ per mole.15 Woodward and Katz16 suggested that secondary orbital interactions are of primary importance. These interactions are illustrated in fig-B for the normal electron demand (HOMO-diene, LUMO-dienophile controlled). The symmetry allowed overlap between π-orbital of the carbonyl group of the dienophile and the diene-HOMO is only possible in the endo activiated complex. Hence, only the endo transition state is stabilized so that the reaction forming the endo adduct is faster than that yielding exo product. This interpretation has been criticized by Mellor, who attributed the endo selectivity to steric interactions. Steric effects are frequently suggested as important in determining the selectivity of Diels-Alder reactions, particularly of α-subsituted dienophiles, and may ultimately lead to exo-selectivity. 17 For other systems, steric effects in the exo activated complex can enhance endo selectivity. 18 In summary, it seems for most Diels-Alder reactions secondary orbital interactions afford a satisfactory rationalization of the endo-exo selectivity. However, since the endo-exo ratio is determined by small differences in transition state energies, the influence of other interactions, most often steric in origin and different for each particular reaction is likely to be felt. The compact character of the Diels-Alder activated complex (the activation volume of the retro Diels-Alder reaction is negative) will attenuate these effects.19 Results and Discussions Chabamides F & G as dimeric amide alkaloids were isolated from this plant Piper chaba Hunter. These two dimers were formed by Diels-Alder reaction employing monomer trichostachine. This hypothesis was further confirmed by the mass spectrum, which showed a significant peak at m/z 294.113 [M++Na], assigned to the trichostachine ion arising by the Retro-Diels–Alder cleavage of molecular ion into two halves. Finally, to confirm the existence of the compounds F and G, we extracted the roots of P.chaba with MeOH at room temperature followed HPLC/electron spray ionization (ESI) MS experiments. In HPLC/ESIMS of the MeOH extract showed the presence of peaks at m/z 563 [M++Na] and 543 [M++1] at about 8.8 min and 10.6 min of LC retention time, respectively. To prove this biosynthetic hypothesis we have carried out the intermolecular [4+2] cycloaddition reaction with the trichostachine under solvent free conditions (Scheme 1). Reaction mixture was analysed by the LC-MS, which clearly indicted the presence of the compounds 1 and 2 (retention time and mass). In HPLC analysis, retention times of the synthetic 1 and 2 were identical to those of chabamide F and G, confirming the structure and stereochemistry are same as that of isolated alkaloids. Based on above result during Diels-Alder reaction of trichostachine, we developed two kinds of methodologies for this biomimetic synthesis of dimeric amide alkaloids based on catalytic. On the basis of a biosynthetic hypothesis (described in Chapter I) by the intermolecular Diels-Alder reaction, we chosen piperine (1a), pellitorine (1c) and trans-fagaramide (1c) as substrates to perform the biomimetic synthesis of the dimeric chabamides (Compound H-K) and this study also identified plausible products between piperine (1a) and pellitorine (1c). This study not only explains formation of cyclo adducts but also explains the different mechanistic aspects in Diels-Alder reaction (endo and exo products) of copper salts in aqueous medium. Under normal conditions only combinations of dienes and dienophiles that have FMO’s of similar energy can be transformed into a Diels-Alder adduct. When the gap between the FMO’s large, forcing conditions are required, and undesired side reactions and retro Diels-Alder reactions can easily take over. These cases challenge the creativity of the organic chemist and have led to the invention of a number of methods for promoting reluctant Diels-Alder reactions under mild conditions.20 Plausible mechanism for Diels-Alder reaction: Sijbren Otto. et. al studied extensively on copper (II) catalyzed Diels-Alder reactions on various moieties. 25, 26 Based on these reports we proposed plausible mechanism for this copper catalyzed Diels-Alder reaction. The first step in the cycle comprises rapid coordination of the lewis acid to the dienophile leading to a complex in which the dienophile is activated for reaction with the diene. The cycloadduct has dissociated from the lewis acid in order to make the catalyst available for another cycle. However we didn’t carry any kinetic studies to prove this mechanism. Plausible mechanism of Diels-Alder reaction catalyzed by copper (II) salts Use of lewis acids in Diels-Alder reaction is to lower LUMO dienophile energy to result in the decrease of the LUMO dienophile-HOMO diene gap (normal electron demand) or reduce LUMO diene energy to result in the decrease of the LUMO diene-HOMO dienophile gap (inverse electron demand). The presence of Lewis acids, the Diels-Alder dimerization of piperine, pellitorine, piperine with fagaramide, peperine with pellitorine, gave much lower combined yields in neat conditions. Wie et al. previously reported 21, 22 Diels-Alder reaction of piperine and in both thermal and by lewis acid of Co(II) Cl2.6H2O/P(Ph)3/Zn (1:10:10 mol %) in 3-octanol at 170oC with isomerised product (24 %) and 77 % over all yield. To find the optimum conditions towards the catalyst, piperine (1a) was taken to perform the Diels-Alder reaction in presence of variety of lewis acids and metal salts (Table 1). The highest catalytic activity was attained for the reaction using 10 mol % of Cu (II) salts. The role of copper salts in this reaction can be attributed to its Lewis acid ability, which enhances both the electron donating capacity of diene and electron withdrawing capacity of the dienophile (required for normal electron demand for Diels-Alder reaction). The The catalytic activitiy of Lewis acids like Cu+2 mainly relies on their coordinating character to assemble both dienophile and diene to such a way that promote the reaction to wards the reaction barrier. To find the optimum conditions towards the solvent several reactions were carried out under the solvents like benzene, toluene, xylene, water and results were tabulated (Table 2). Among organic solvents xylene is better to get considerable yield with copper salts. Later water was found to be the best for both yield and selectivity of this cycloaddition. Cycloaddition reactions of piperine (1a): Lewis acids catalyzed cycloaddition reactions (Scheme 2) of piperine (1a) under organic and aqueous solvent conditions to give resultant cycloadducts 2a, 3a, 4a, 5a and 6a, among them 2a is major ortho-exo cyclohexene type dimeric amide alkaloid and also known as chabamide, which is previously isolated23 from this plant, isomer 3a is previously isolated from Piper nigrum21 Remaining isomers (4a-6a) were synthesized from piperine by Diels-Alder reaction by Kun Wei. et al. its physical and spectroscopic data were identical with reported data22 (1H-NMR, 13C-NMR & Mass spectra). In the cycloaddition of piperine (1a), solvents toluene, xylene and water were used in presence of cuper (II) salts. Reaction showed good overall yield and more exo selectivity in organic solvent like xylene. Water catalyzed reactions were ended with good overall yield and minute decrease in exo selectivity, infinitesimal increase in endo selectivity (Table 2). This reaction showed completely regioselectivity (yield of 2a+3a>4a+5a+6a) due to maximum involvement of α-double bond rather than γ-double bond of 1a during Diels-Alder reaction. Cycloaddition reactions of pellitorine (1b): Same catalytic and solvent conditions were employed for pellitorine (1b) as used in piperine (1a) for the biomimetic synthesis (Scheme 3) of chabamide J & K (Chapter-II). These dimers were plausibly generated by monomer pellitorine by cycloaddtion reactions in biosynthesis. During cycloaddition of pellitorine (1b), solvents like toluene xylene and water were used in presence of cupper (II) salts. In former catalyzed reaction showed good overall yield and more endo selectivity in both organic (xylene) and water. Increase in endo selectivity is more in aqueous medium rather than organic solvent like xylene (Table 2). Cycloaddition of pellitorine under above said catalytic conditions gave corresponding cycloadducts 2b, 3b, 4b and 5b. Physical and spectral data of adducts 2b & 3b are identical with compound J & K (chabamide J & K mentioned in Chapter-II) and all physical and spectral data of adduct 4b is identical with nigramide O which is isolated previously from piper nigrum.21 The structure of 5b a new cycloadduct formed during this biomoimetic synthesis employ pellitorine as monomer, its structure was elucidated by 1D and 2D spectral data. This reaction showed completely regioselectivity (yield of 2b+5b≈3b+4b) due to maximum involvement of α-double bond rather than γ-double bond of 1b during Diels-Alder reaction. Structure elucidation of compound 5b: Compound 5b was obtained as a pale yellow oil, had the molecular formula of C28H50N2O2, as deduced from the HRESIMS (Fig-9) m/z, 447.3958 [M++H]. IR spectrum (Fig-1) implied the presence of carbonyl (1648 cm-1) and NH (3304 cm-1). The 1H NMR spectrum of 5b revealed the presence of a trans double bond at δ 5.28 (dd, J = 15.0, 10.0 Hz, H-4"), 5.63 (m, H-5"), two isobutylamide groups at δ 3.15 (m), 3.17 (m), 3.17 (m, H2-1'), 1.74 (m, H-2'), 0.91 (d, J = 6.7 Hz, H-3'), 0.90 (d, J = 6.7, H- 3'), 5.53 (br t, J = 5.7 Hz, NH) and δ 2.96 (m, H1-1'''), 2.97 (m, H2-1'''), 1.73 (m, H-2'''), 0.87 (d, J = 6.7 Hz, H-3'''), 0.86 (d, J = 6.7 Hz, H-3'''), 3.15 (br t, J = 6.0 Hz, NH), n-amyl group and 1-heptene unit at δ 1.96 (m, H-6), 1.40 (m, H-7), 1.20 (m, H-8), 1.27 (m, H-9), 0.86 ( t, J = 6.5 Hz, H-10) and δ 5.28 (dd, J = 15.0, 10.0 Hz, H-4"), 5.63 (m, H-5"), 1.89 (m, H-6"), 1.30 (m, H-7"), 1.28 (m, H-8"), 1.27 (m, H-9"), 0.88 (t, J = 6.5 Hz, H-10"), respectively (Table 3). The 13C NMR spectrum (Fig-3) displayed the presence of 28 carbon atoms and were further classified by DEPT experiments (Fig-4) into categories of 6 methyls, 10 methylenes, 10 methines and 2 quaternary carbons including two carbonyls (δ 173.80 and 173.04). ' The analyses of the 1H and 13C NMR spectral data of 5b showed a high degree of similarity to dimeric alkaloid, compound J naturally isolated from this plant (Chapter-II) compound is meta-endo while 5b is meta-exo product. Furthermore, the detailed elucidation of the 2D NMR data (COSY, HSQC and HMBC) had determined the planar structure of 5b. The 1H homodecoupling NMR (Fig-7) experiments of 5b revealed the connectivities H-2 (δ 2.45, m) to H-3 (δ 5.56, ddd, J = 10.0, 4.3, 2.6 Hz) to H-4 (δ 5.98, dt, J = 10.0, 1.8 Hz) to H-5 (δ 2.41, m) to H-2"( δ 2.68, dd, J = 11.3, 10.0 Hz) to H-3" (δ 2.82, ddd, J = 10.1, 10.0, 5.0 Hz ) via cyclohexene ring protons. The meta-orientation of the carbonyl and isobutylamide groups were established by HMBC (Fig-6) correlations for δ 2.45 (m, H-2), 5.56 (ddd, J = 10.0, 4.3, 2.6 Hz, H-3), 2.82 (ddd, J = 10.3, 10.0, 5.0 Hz, H-3")/δ 173.80 (C-1) and δ 2.68 (dd, J = 10.3, 10.0 Hz, H-2"), 2.41 (m, H-5), 2.82 (ddd, J = 10.3, 10.0, 5.0 Hz, H-3")/δ 173.04 (C-1"). Furthermore, the 1H-1H COSY (Fig-7) cross-peaks between δ 2.82 (ddd, J = 10.3, 10.0, 5.0 Hz, H-3") and δ 5.28 (dd, J = 15.0, 10.0 Hz, H-4"), and δ 5.63 (m, H-5") and δ 2.41 (m, H-5), 1.96 (m, H-6), 1.40 (m, H-7), coupled with the HMBC correlation for δ 5.63 (m, H-5'') to δ 28.35 (C-7"), δ 1.40 (m, H-7) to δ 37.04 (C-5) established the attachment of the 1-heptene and n-amyl groups at C-3" and C-5, respectively. The analysis of the 1H-1H coupling constants and NOESY (Fig- 8) data allowed us to determine the relative stereochemistry of compound 5b. The coupling constants of H-2"/H-5 and H-2"/H-3" (10.3 Hz) indicated anti relations of H-2"/H-5 and H-2"/H-3". In the NOESY spectrum correlations were observed at δ 2.45 (H-2) δ 2.82 (H-3") and δ 2.41 (H-5) and correlations were not observed at δ 2.68 (H-2") with δ 2.82 (H-3") and δ 2.68 (H-2") with δ 2.41 (H-5). These data were in agreement with the β-orientation for H-2" and α-orientation for H-3" and H-5. Thus, based on these spectral data the stereostructure of 5b was confirmed and trivially named as chabamide L. Cycloaddition reaction between piperine (1a) and pellitorine (1b): Our aim of this cycloaddition reaction is to explain to study different cycloadducts and selectivity of diene among piperine and pellitorine (Scheme 4). This biomimetic synthesis will explain the probability of diene, which participated in Diels-Alder reaction between piperine (1a) and pellitorine (1b) both were isolated from same plant (P. chaba). Nigramide N, which is formed biosynthetically via cycloaddition reaction between piperine and pellitorine, this adduct previously isolated from roots of P. nigrum 21 by Wei. et. al. Lewis acid catalyzed cycloaddition reactions of piperine (1a) and pellitorine (1b) under organic and aqueous solvent conditions to give resultant cycloadducts 2c, 3c, 4c, 2a and 3b. Cycloadduct 2c and 3c is new cycloadducts and their structures were illustrated by 1D and 2D spectral data. Structure elucidation of compound 2c: Compound 2c was obtained as pale yellow liquid. The molecular formula of 2c was established as C31H44N2O4 by HRESIMS (Fig-18), which provided a molecular ion peak at m/z 509.3381 [M++H], in conjunction with its 13C NMR spectrum (Fig-12). The IR spectrum displayed absorption bands diagnostic of carbonyl (1640 cm-1) (Fig-10). The 300 MHz 1H NMR spectrum (in CDCl3) indicated the presence of two signals at δ 5.86 (dd, J = 15.6, 10.1 Hz) and 6.27 (d, J = 15.6 Hz), which were assigned to trans-olefinic protons by the coupling constant of 15.6 Hz. It also displayed aromatic protons due to two 1, 3, 4-trisubstituted aromatic rings at δ 6.82 (1H, br s), 6.76 (1H, dd, J = 7.8, 1.4 Hz), 6.75 (1H, d, J = 7.8 Hz) (Fig-11), (Table 4). In addition to the above-mentioned moieties, combined inspection of 1H NMR and 1H–1H COSY revealed the presence of cyclohexene ring, one isobutylamide and one pyrrolidine ring. The 13C NMR spectrum displayed the presence of 31 carbon atoms and were further confirmed by DEPT experiments into categories of 11 methylenes, 12 methines and 5 quaternary carbons including two carbonyls (δ 173.01 and 172.50). On the basis of these characteristic features, database and literature search led the skeleton of compound 2c as a dimeric alkaloidal framework. A comprehensive analysis of the 2D NMR data of compound 2c facilitated the proton and carbon assignments. 1H–1H COSY spectrum suggested the sequential correlations of δ 3.51 (dq, J = 5.0, 2.6 Hz)/5.62 (dt, J = 9.8, 2.6 Hz)/6.10 (ddd, J = 9.8, 1.5 Hz)/2.20 (m)/2.72 (ddd, J = 11.1, 10.1, 5.2 Hz)/3.35 (dd, J = 11.1, 9.8 Hz) assignable to H-2-H-3-H-4-H-5-H-3"-H-2" of the cyclohexene ring. Concerning the connections of the n-amyl and 3, 4-methylenedioxy styryl groups, HMBC spectrum (Fig-15) showed correlations of H-4, H-6, H-7/C-5; H-5", H-4"/C-3", which implies that these units were bonded to the cyclohexene ring at C-5 and C-3". Further, HMBC correlations of two methylene protons at δ 5.95 with 147.91 (C-8"), 146.87 (C-9"), confirmed the location of methylenedioxy group at C-8", and C-9". Remaining units, isobutylamine and pyrrolidine (rings) were connected through carbonyl groups at C-2 and C-2", which was confirmed by HMBC correlations of H-2 and H-1' to C-1 (δ 173.01) and H-2" and H-1''' to C-1" (δ 172.50). The assignment of the relative configuration of compound 2c, and confirmation of overall structure were achieved by the interpretation of the NOESY spectral data and by analysis of 1H NMR coupling constants. The large vicinal coupling constants of H-2"/H-2 (11.1 Hz) and H-2"/H-3" (11.1 Hz) indicated anti-relations of H-2"/H-2 and H-2"/H-3" and the axial orientations for these protons. In the NOESY spectrum (Fig-17), the occurrence of the correlations between H-2/H-3" and the absence of NOE effects between H-2/H-2" and H-2"/H-3" supported the above result. This data indicated β-orientation for H-2" and α-orientation for H-2 and H-3". The α-orientation of H-5 was suggested by the coupling constant of H-5/H-3" (5.2 Hz) and the absence of the NOESY correlations between H-3" and H-2". On the basis of these spectral data, the structure of compound 2c was unambiguously established and trivially named as chabamide M. Structure elucidation of compound 3c: Compound 3c was obtained as pale yellow liquid. The molecular formula of 3c was established as C31H44N2O4 by HRESIMS (Fig-27), which provided a molecular ion peak at m/z 509.3391 [M++H], in conjunction with its 13C NMR spectrum (Fig-21). The IR spectrum displayed absorption bands diagnostic of carbonyl (1624 cm-1) moiety (Fig-19). The 300 MHz 1H NMR spectrum (in CDCl3) indicated the presence of two signals at δ 4.63 (dd, J = 15.6, 10.0 Hz) and 5.46 (dt, J = 15.6, 6.8 Hz), which were assigned to trans-olefinic protons by the coupling constant of 15.6 Hz. It also displayed aromatic protons due to two 1, 3, 4-trisubstituted aromatic ring at δ 6.75 (1H, br s), 6.73 (1H, d, J = 7.8, 1.4 Hz), 6.71 (1H, d, J = 7.8 Hz) (Fig-20). In addition to the above-mentioned moieties, combined inspection of 1H NMR and 1H–1H COSY revealed the presence of cyclohexene ring, one isobutylamide and one pyrrolidine ring. The 13C NMR spectrum displayed the presence of 31 carbon atoms (Table 5), and were further classified by DEPT experiments (Fig-22) into categories of 11 methylenes, 12 methines and 5 quaternary carbons including two carbonyls (δ 173.34 and 173.88). On the basis of these characteristic features, database and literature searches led the skeleton of compound 3c as a dimeric alkaloidal framework. A comprehensive analysis of the 2D NMR data of compound 3c facilitated the proton and carbon assignments. 1H–1H COSY spectrum (Fig-25) suggested the sequential correlations of δ 2.82 (m)/5.63 (dt, J = 9.7, 1.9 Hz)/5.82 (ddd, J = 9.7, 4.8, 1.9 Hz)/3.94 (dq, J =.10.0, 1.9 Hz)/2.76 (ddd, J = 11.7, 10.0 Hz)/3.36 (dt, J = 11.7, 4.8 Hz) assignable to H-2-H-3-H-4-H-5-H-3"-H-2" of the cyclohexene ring. Concerning the connections of the 3, 4-methylenedioxyphenyl and 1-heptene groups, HMBC spectrum (Fig-24) showed correlations of H-7, H-11, H-3"/C-5; H-5", H-4", H-5/C-3", which implies that these units were bonded to the cyclohexene ring at C-5 and C-3". Further, HMBC correlations of two methylene protons at δ 5.92 with 147.42 (C-8"), 146.49 (C-9"), confirmed the location of methylenedioxy group at C-8", and C-9". Remaining units, pyrrolidine and isobutylamine were connected through carbonyl groups at C-2 and C-2", which was confirmed by HMBC correlations of H-2 and H-1' to C-1 (δ 171.34) and H-2" and H-1''' to C-1" (δ 173.88). The assignment of the relative configuration of compound 3c, and confirmation of overall structure were achieved by the interpretation of the NOESY spectral data and by analysis of 1H NMR coupling constants. The large vicinal coupling constants of H-3"/H-2" (11.7 Hz) and H-5/H-3" (10.0 Hz), indicated anti-relations of H-3"/H-5 and H-3"/H-2" and the axial orientations for these protons. In the NOESY spectrum (Fig-26), the occurrence of the correlations between H-2"/H-5 and the absence of NOE effects between H-3"/H-2" and H-3"/H-5 supported the above result. These data indicated β-orientation for H-2" and α-orientation for H-2 and H-3". The α-orientation of H-2 was suggested by the coupling constant of H-2/H-2" (4.8 Hz) and the occurrence of the NOESY correlations between H-2" and H-2. On the basis of this spectral data, the structure of compound 3c was unambiguously established and trivially named as Chabamide N. Cycloaddition reaction between piperine (1a) and E-fagaramide (1c) Lewis acid catalyzed cycloaddition reactions (Scheme 5) of piperine (1a) and trans-fagaramide (1c) under aqueous solvent conditions to give resultant cycloadducts 2d, 3d and 2a. To carry this biomimetic synthesis to explain compound H and I (mentioned in chapter-II), we taken piperine (1a) which is isolated from same plant and trans fagaramide was synthesized by reported method.24 Cycloaddition reaction between 1a and 1c end up with overall yield 70% in xylene and 75% in water. In both solvents ortho products were formed dominantly compared with meta products. Spectral data 1D and 2D of cycloadducts 2d & 3d were identical with compound H & I (see chapter I, compound H & K). Cycloadduct 2a is identical with chabamide. This cycloaddition reaction practically proved as biomimetic synthesis for compound H and I. Acknowledgements: The authors are thankful to Director IICT for his constant encouragement and CSIR New Delhi for providing the fellowship References and Notes Braun, M. Synth. Highlights 1991, 232 Robinson, R. Chem. Soc. 1917, 762. Stork, G.; Burgstahler, A. W. Am. Chem. Soc. 1955, 38, 1890. Johnson, W. S.; Gravestock, M. B.; McCarry, B. E. Am. Chem. Soc. 1971, 93, 4332. Chapman, O. L.; Engel, M. R.; Springer, J. P.; Clardy, J. C. Am. Chem. Soc. 1971, 93, 6696. Bandaranayake, W. M.; Banfield, J. E.; Black, D. St. C. Chem. Soc., Chem Commun. 1980, 902. Nicolaou, K. C.; Zipkin, R. E.; Petasis, N. A. Am. Chem. Soc. 1982, 104, 5558. O.; Alder, K. Ann. 1928, 460, 98. Woodward, R. B.; Hoffmann, R. Chem. 1969, 81, 797. Fakui, K. Chem. Res. 1971, 4, 57. Houk, K. N. Chem.. Res. 1975, 8, 361. Houk, K. N.; Li, Y.; Evanseck, D. Angew Chem., Ed. Engl. 1992, 31, 682. Alder, K.; Stein, G. Chem. 1937, 50, 510. Fotiadu, F.; Michel, F.; Buono, G. Tetraheron Lett. 1990, 34, 4863. Gleiter, R.; Bohm, M. C. Pure Appl. Chem. 1983, 55, 237. Woodward, R. B.; Katz, T. J. Terahedron 1958, 5, 70. Kakushima, M. J. Chem. 1979, 57, 2564. Houk, K. N. Tetrahedron Lett. 1970, 30, 2621. Houk, K. N.; Luskus, L. J. Am. Chem. Soc. 1971, 93, 4606. Otto, S.; Bertoncin, F.; Engberts, J. F. N. Am. Chem. Soc., 1996, 118, 7702–7707. Wei, K.; Li, W.; Koike, K.; Chen, Y-J.; Nikaido, T. Org. Chem. 2005, 70, 1164. Wei, K.; Li, W.; Koike, K.; Chen, Y-J.; Nikaido, T. Lett. 2005, 7, 2833–2835. Rukachaisirikul, T.; Prabpai, S.; Champung, P.; Suksamrarn, A. Planta Med. 2002, 68, 850-853. Nagao, Y.; Seno, K.; Kawabata, K.; Miyasaka, T.; Takao, S.; Fujita, Tetrahedron Lett. 1980, 21, 841. Otto, S.; Boccaletti, G.; Engberts, J. B. F. N. Am. Chem. Soc. 1998, 120, 4238–4239. Otto, S.; Bertoncin, F.; Engberts, J. B. F. N. Am. Chem. Soc. 1996, 118, 7702–7707. O.; Alder, K. Ann. 1931, 490, 243. Woodward, R. B.; Baer, H. Am. Chem. Soc. 1948, 70, 1161. Breslow, R.; Rideout, D. C. Am. Chem. Soc. 1980, 102, 7816. Breslow, R.; Guo, T. Am. Chem. Soc. 1988, 110, 5613. Grieco, P.A.; Nunes, J. J.; Gaul, M. D. Am. Chem. Soc. 1990, 112, 4595.
APA, Harvard, Vancouver, ISO, and other styles
42

Abdelhedi, Fatma, and Nabil Derbel. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (June 2016): 513–19. http://dx.doi.org/10.25046/aj020366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Biran, Yahav, George Collins, Borky John M, and Joel Dubow. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 513-519 (2017); View Description Modelization of cognition, activity and motivation as indicators for Interactive Learning Environment Asmaa Darouich, Faddoul Khoukhi, Khadija Douzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 520-531 (2017); View Description Homemade array of surface coils implementation for small animal magnetic resonance imaging Fernando Yepes-Calderon, Olivier Beuf Adv. Sci. Technol. Eng. Syst. J. 2(3), 532-539 (2017); View Description An Encryption Key for Secure Authentication: The Dynamic Solution Zubayr Khalid, Pritam Paul, Khabbab Zakaria, Himadri Nath Saha Adv. Sci. Technol. Eng. Syst. J. 2(3), 540-544 (2017); View Description Multi-Domain Virtual Network Embedding with Coordinated Link Mapping Shuopeng Li, Mohand Yazid Saidi, Ken Chen Adv. Sci. Technol. Eng. Syst. J. 2(3), 545-552 (2017); View Description Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (June 2017): 553–61. http://dx.doi.org/10.25046/aj020371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

"Artificial Immune System based Improved Secure-Aware Wormhole Attack Detection in MANET." International Journal of Recent Technology and Engineering 8, no. 2 (July 30, 2019): 2834–41. http://dx.doi.org/10.35940/ijrte.b1977.078219.

Full text
Abstract:
Typically, the most significant challenge in Mobile Adhoc Network (MANET) is detecting the wormhole attacks in the network during communication that degrades the overall network performance. Many routing protocols have been developed to detect and prevent the wormhole attacks based on the requirements of hardware, synchronization clocks, etc. To avoid those requirements, Improved Secure-aware Wormhole Attack Detection (ISWAD) technique was proposed by considering the maximum end-to-end delay and path length from source to the destination node. However, it requires more parameters to further increase the detection accuracy. Therefore in this article, an Artificial Immune System (AIS) based ISWAD is proposed to detect the wormhole attacks efficiently. Initially, a scalable and distributed scheme is applied to avoid single point failures and high mobility by using the sequential probability ratio test. In this scheme, system parameters are also considered with the maximum end-to-end delay and path length. To further improve the detection rate, these parameters are learned by the AIS to detect the wormhole attacks through the network precisely. After the wormhole links/nodes are detected, an alternative path is chosen from the routing table to transmit the data from source to the destination without any packet loss. Finally, the simulation results demonstrate that the proposed technique achieves better detection rate than the other wormhole attack detection techniques
APA, Harvard, Vancouver, ISO, and other styles
45

Umoren, Imeh, Ekemini Okpongkpong, and Ifreke Udoeka. "A Fuzzy Knowledge-Based Approach for End-2-End Behavioural Analysis of Wormhole Attacks on Mobile Ad-Hoc Networks." International Journal of Information Systems and Informatics 2, no. 4 (January 22, 2022). http://dx.doi.org/10.47747/ijisi.v2i4.581.

Full text
Abstract:
Mobile Ad hoc Networks (MANETs) involves series of travelling nodes communicating with each other without a fixed Set-up. Certainly, MANETs are networks that utilize communication peripatetic nodes such as; Personal Digital Assistants (PDAs), mobile phones, laptops which enable wireless transmission across an area and forwarding data packets to the other nodes resulting in frequent change in topology. MANETs are exposed to several communication assaults such as active attack and passive attack. The active attack disrupts network operations while the passive attack obtains information without upsetting normal networks operation. Wormhole is a typical case of active attack. Indeed, an attacker receives packets at one end of the network, tunnels them to another end of the network, and then replays them into the networks from that point resulting in a collapse in communication across wireless setups. This research work simulates and models a typical wormhole attack in MANET using Network Simulator (NS-2.35) and Fuzzy Inference System (FIS). The End-2-End behavioural analysis of wormhole attacks on the transmitting networks layer of MANET was realized. To detect the level of wormhole attack in the network several parameters such as Packet Delivery Ratio, Packet Forwarding Probability and Packet Dropping Probability were considered by determining the degree of severity of wormhole attack which may upset the Quality of Service (QOS) delivery. The aim of this research paper is in the direction of Network security optimization.
APA, Harvard, Vancouver, ISO, and other styles
46

"A Hybridized Immune System for Avoidance of Wormhole Attacks in Manet." International Journal of Engineering and Advanced Technology 9, no. 1 (October 30, 2019): 2189–95. http://dx.doi.org/10.35940/ijeat.a9707.109119.

Full text
Abstract:
In Mobile Ad-hoc Networks (MANETs), the most challenging task is detecting and mitigating wormhole links during data transmission between the source and destination nodes. Since it requires special hardware, synchronized clocks, mobile nodes equipped with GPS, etc. To overcome these challenges, Artificial Immune System-based Improved Secureaware Wormhole Attack Detection (AIS-ISWAD) technique has been proposed that considers maximum end-to-end delay, path length and system parameters for detecting wormhole attacks. To simplify the detection process, AIS has been used as a learning approach that learns those parameters to detect the wormhole links and select an alternative route for transmitting the data packets. However, an uncertainty problem is addressed in AIS during computation of affinity value between antibody and antigen. Also, route selection is still not satisfied since data transmission requires a high-performance stable path from source to destination nodes. Therefore, the main goal of this article is handling the uncertainty problem during affinity computation and selecting the high-performance stable paths to transmit the data. In this paper, a Fuzzy Logic and AIS-ISWAD (FLAIS-ISWAD) technique is proposed to improve the wormhole attack detection and mitigation. In this technique, all computed parameters are given to the FL system to handle the uncertainty problem and construct the high-performance stable paths among all available paths in the network. Also, AIS is applied as a learning method to identify and isolate the wormhole links/nodes in MANETs with the highest network performance. Finally, the performance of the FLAIS-ISWAD technique is evaluated and compared through simulation results in terms of different performance metrics.
APA, Harvard, Vancouver, ISO, and other styles
47

Bhosale, Snehal A., and S. S. Sonavane. "Wormhole Attack Detection System for IoT Network: A Hybrid Approach." Wireless Personal Communications, November 30, 2021. http://dx.doi.org/10.1007/s11277-021-09395-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

"Wormhole Attack Isolation Access from Mobile Ad hoc Network with Delay Prediction Method." International Journal of Recent Technology and Engineering 8, no. 6 (March 30, 2020): 3672–80. http://dx.doi.org/10.35940/ijrte.f8230.038620.

Full text
Abstract:
The moveable ad hoc networks are untrustworthy and inclined to any intrusion due to their wireless interaction approach. Therefore the information from these networks can be stolen very easily just by introducing the attacker nodes in the system. The straight route extent is calculated with the help of hop count metric. For this purpose, routing protocols are designed. The wormhole attack is considered to be the hazardous one among several attacks. This intrusion is commenced with the help of couple attacker nodes. These nodes make a channel by placing some sensor nodes between transmitter and receiver. The accessible system observes the wormhole intrusions in the absence of intermediary sensor nodes towards the target. This mechanism is significant for the areas where the route distance amid transmitter and receiver is two hops merely. This mechanism is not suitable for those scenarios where multi hops remain amid transmitter and receiver. In the projected study, a new technique is implemented for the recognition and separation of attacker sensor nodes from the network. The wormhole intrusions are triggered by these attacker nodes in the environment. The projected scheme is utilized in NS2 and it is depicted by the reproduction outcomes that the projected scheme shows better results in comparison with existing approaches.
APA, Harvard, Vancouver, ISO, and other styles
49

Jegan, G., and P. Samundiswary. "Wormhole Attack Detection in Zigbee Wireless Sensor Networks using Intrusion Detection System." Indian Journal of Science and Technology 9, no. 45 (December 9, 2016). http://dx.doi.org/10.17485/ijst/2016/v9i45/102866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

"MAR_Worm: Secure and Efficient Wormhole Detection Scheme through Trusted Neighbour Nodes in VANETs." International Journal of Innovative Technology and Exploring Engineering 9, no. 2S (December 31, 2019): 180–83. http://dx.doi.org/10.35940/ijitee.b1098.1292s19.

Full text
Abstract:
VANET is an application and subclass of MANET’s, in which nodes are mobiles and considered as moving, communicating vehicles in a wireless adhoc network. Vehicles communicate through dedicated short rage communication (DSRC) via IEEE 802.11p protocol. With the progress of wireless technology, vehicular ad hoc network has become emerging technology to support real-time traffic condition, safety, entertainment, enhance driver experience and emergency navigation in intelligent transport system (ITS). Core of VANETs application is the communication between vehicle to vehicle (V2V), vehicle to roadside unit (V2RSU) and securing the data messages from malicious activities and attackers in the network. Securing V2V and V2RSU communication has raised challenging issues in detecting and avoiding malicious attackers for secure communications. VANET’s are exposed to different threats while routing data, wormhole attack is the most threatening routing attack which severely effects VANET routing data and causes incorrect routing by private tunnels and damages to VANET’s communication in terms of data leakage, data dropping, and delayed delivery. However existing attack detection schemes have failed to meet secured VANETs communication leading to packet loss. In this paper we propose an efficient wormhole detection mechanism by creating potential and trusted neighbour nodes discovery (TNND) in VANETs, which can detect malicious nodes through enabling common forwarding neighbour nodes as witness to monitor data packets are forwarded by malicious nodes. Basically this mechanism is based on trust management. This scheme is resilient and resistant against attackers launching malicious nodes to corrupt entire network. Simulation is carried on event driven network simulator and results shows efficient detection of wormhole nodes, increases packet delivery and performs better than existing detection scheme.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography