219 results on '"Malaiya A"'
Search Results
2. Education as an Instrument to Eradicate Unemployment in India: An Evaluation of Relationship between the Literacy Rate and the Unemployment Rate - An Analytical Study.
- Author
-
Malaiya, Mudit, Samaiya, Anupi, and Malaiya, Udit
- Subjects
UNEMPLOYMENT statistics ,SECONDARY analysis ,WAGES ,UNEMPLOYMENT ,LITERACY education - Abstract
Education plays a crucial role in eradicating unemployment because it imparts both skills and knowledge. An educated person is more likely to secure employment that offers adequate remuneration, allowing them to meet their basic needs. The specific aims of this study are: -to define the term-" Education as a Instrument to Eradicate Unemployment", to evaluate the relationship between the education and unemployment, present study is based on the secondary data, secondary data have collected from the some specific websites-www.geeksforgeeks.org and www.adda247.com. Data have analysed by the help of tables, correlation test to conduct this study by using SPSS software. [ABSTRACT FROM AUTHOR]
- Published
- 2024
3. Meropenem-Loaded Nanostructured Lipid Carriers For Skin and Soft Tissue Infection Caused by Staphylococcus aureus: Formulation, Design, and Evaluation
- Author
-
Rajpoot, Kshipra, Prajapati, Shiv Kumar, Malaiya, Akanksha, Jain, Richa, and Jain, Aakanchha
- Published
- 2022
- Full Text
- View/download PDF
4. Social media analytics of the Internet of Things
- Author
-
Jim A. Scheibmeir and Yashwant K. Malaiya
- Subjects
Internet of Things ,Social media ,Cybersecurity ,Machine learning ,Sentiment analysis ,Popularity prediction ,Computer engineering. Computer hardware ,TK7885-7895 ,Computer software ,QA76.75-76.765 - Abstract
Abstract The Internet of Things technology offers convenience and innovation in areas such as smart homes and smart cities. Internet of Things solutions require careful management of devices and the risk mitigation of potential vulnerabilities within cyber-physical systems. The Internet of Things concept, its implementations, and applications are frequently discussed on social media platforms. This research illuminates the public view of the Internet of Things through a content-based and network analysis of contemporary conversations occurring on the Twitter platform. Tweets can be analyzed with machine learning methods to converge the volume and variety of conversations into predictive and descriptive models. We have reviewed 684,503 tweets collected in a 2-week period. Using supervised and unsupervised machine learning methods, we have identified trends within the realm of IoT and their interconnecting relationships between the most mentioned industries. We have identified characteristics of language sentiment which can help to predict the popularity of IoT conversation topics. We found the healthcare industry as the leading use case industry for IoT implementations. This is not surprising as the current COVID-19 pandemic is driving significant social media discussions. There was an alarming dearth of conversations towards cybersecurity. Recent breaches and ransomware events denote that organizations should spend more time communicating about risks and mitigations. Only 12% of the tweets relating to the Internet of Things contained any mention of topics such as encryption, vulnerabilities, or risk, among other cybersecurity-related terms. We propose an IoT Cybersecurity Communication Scorecard to help organizations benchmark the density and sentiment of their corporate communications regarding security against their specific industry.
- Published
- 2021
- Full Text
- View/download PDF
5. Evaluation of Antidepressant Like Activity of Extract of Boerhavia diffusa in Swiss Albino Mice.
- Author
-
Yadav, Shailja, Malaiya, Saumya, Jain, Harshita, and Shrivastava, Arpit
- Subjects
PLANT extracts ,MENTAL depression ,IMMOBILIZATION stress ,LABORATORY mice ,TRADITIONAL medicine - Abstract
Depression often known as depressive disorder is described by a persistent lack of enjoyment, enthusiasm in pursuits, or melancholy feelings. Depression is not the same as normal mood swings and feelings about day-to-day living. It could affect every aspect of life, including relationships with friends, family, and the community. It could be brought on by or exacerbated by problems at work or in the classroom. This study aims to evaluate antidepressant like activity of ethanolic extract of roots of Boerhavia diffusa (Nyctaginaceae). control and cure of this diseases, a vast variety of medications are used daily. The herbal drugs are biodegradable and are natural medications hence are becoming more and more popular. Using a Soxhlet equipment and a normal extraction procedure, the ethanolic extract was produced. The mice were administered several dosages of the extract (100, 200, and 400 mg/kg) in addition to the vehicle (normal saline) for the control group & ARS (Acute Restraint Stress) Group and fluoxetine as the conventional medication. The mice were subjected to ARS and were treated with ethanolic extract of Boerhavia diffusa at a dose of 100mg/kg, 200mg/kg and 400mg/kg respectively. After that they were subjected to animal models, the tail suspension test (TST), force suspension test (FST) to assess the antidepressant potential and open field test (OFT), to assess locomotor & antidepressant potential of administered drug The TST revealed prolonged immobility in the BDEE (Boerhavia diffusa ethanolic extract) treated animals. The crossing over of squares activity in the OFT rose, indicating a decline in depression levels. The mice's FST revealed a decrease in their ability to reach the plateau stage following immobility. According to the study, BDEE demonstrates strong antidepressant effect and offer a natural alternative to pharmaceutical treatment for depression disorders. In futuristic study, further investigation is required to identify certain active molecules and have a deeper comprehension of the underlying processes of action. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Pharmacological evaluation of anxiolytic activity of ethanolic extract of Hemidesmus indicus in rodent model.
- Author
-
Malaiya, Saumya, Yadav, Shailja, Jain, Harshita, and Shrivastava, Arpit
- Subjects
AYURVEDIC medicine ,RODENTS ,DIAZEPAM ,ANXIETY ,DRUG standards - Abstract
The current study uses rodent models to explore the anxiolytic properties of Hemidesmus indicus' ethanolic extract (EEHI). Hemidesmus indicus, an evergreen plant well-known for its therapeutic characteristics, has been widely used in Ayurvedic medicine to treat a variety of conditions, including anxiety. This study seeks to give scientific validation for its anxiolytic properties. The ethanolic extract was made using normal extraction processes and given to rodents in varied doses (100,200 and 400 mg/kg). The anxiolytic activity was assessed using a variety of widely recognized behavioural assays, including the Elevated Plus Maze (EPM), Open Field Test (OFT), and Light-Dark Box (LDB) test. Diazepam (2 mg/kg) served as the standard reference drug. The results revealed that EEHI significantly reduced anxiety-like behaviours in all three tests when compared to the control group. In the EPM test, EEHI-treated rodents spent more time and entered the open arms. In the OFT, ambulation, rearing and assisted rearing increased, indicating lower levels of anxiety. The LDB test supported these findings, with a significant increase in time spent in the light compartment. The study suggests that EEHI has promising anxiolytic activity and may offer a natural treatment alternative for anxiety disorders. Further research is needed to isolate specific active molecules and better understand the underlying mechanisms of action. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Controlled delivery of rivastigmine using transdermal patch for effective management of alzheimer's disease
- Author
-
Malaiya, Mayank Kumar, Jain, Ashish, Pooja, Hurkat, Jain, Anki, and Jain, Dharmendra
- Published
- 2018
- Full Text
- View/download PDF
8. An Empirical Evaluation of Deep Learning for Network Anomaly Detection
- Author
-
Ritesh K. Malaiya, Donghwoon Kwon, Sang C. Suh, Hyunjoo Kim, Ikkyun Kim, and Jinoh Kim
- Subjects
Network anomaly detection ,traffic analysis ,deep learning ,neural networks ,sequence-to-sequence ,performance evaluation ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Deep learning has been widely studied in many technical domains such as image analysis and speech recognition, with its benefits that effectively deal with complex and high-dimensional data. Our preliminary experiments show a high degree of non-linearity from the network connection data, which explains why it is hard to improve the performance of identifying network anomalies by using conventional learning methods (e.g., Adaboosting, SVM, and Random Forest). In this study, we design and examine deep learning models constructed based on Fully Connected Networks (FCNs), Variational AutoEncoder (VAE), and Sequence-to-Sequence (Seq2Seq) structures. For the extensive evaluation, we employ a broad range of the public datasets with unique characteristics. Our experimental results confirm the feasibility of deep learning-based network anomaly detection, with the improved performance compared to the conventional learning techniques. In particular, the detection model based on Seq2Seq with LSTM is highly promising, consistently yielding over 99% of accuracy to identify network anomalies from the entire datasets employed in the evaluation.
- Published
- 2019
- Full Text
- View/download PDF
9. Chapter 12 - Fundamentals of a targeted drug delivery system
- Author
-
Chaurasiya, Akash, Singh, Sonali, Panchal, Kanan, Paliwal, Rishi, and Malaiya, Akanksha
- Published
- 2024
- Full Text
- View/download PDF
10. Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems
- Author
-
Abdullah M. Algarni, Vijey Thayananthan, and Yashwant K. Malaiya
- Subjects
data breach cost ,data breach probability ,cybersecurity ,risk assessment ,risk management ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
The evaluation of data breaches and cybersecurity risks has not yet been formally addressed in modern business systems. There has been a tremendous increase in the generation, usage and consumption of industrial and business data as a result of smart and computational intensive software systems. This has resulted in an increase in the attack surface of these cyber systems. Consequently, there has been a consequent increase in the associated cybersecurity risks. However, no significant studies have been conducted that examine, compare, and evaluate the approaches used by the risk calculators to investigate the data breaches. The development of an efficient cybersecurity solution allows us to mitigate the data breaches threatened by the cybersecurity risks such as cyber-attacks against database storage, processing and management. In this paper, we develop a comprehensive, formal model that estimates the two components of security risks: breach cost and the likelihood of a data breach within 12 months. The data used in this model are taken from the industrial business report, which provides the necessary information collected and the calculators developed by the major organizations in the field. This model integrated with the cybersecurity solution uses consolidated factors that have a significant impact on the data breach risk. We propose mathematical models of how the factors impact the cost and the likelihood. These models allow us to conclude that results obtained through the models mitigate the data breaches in the potential and future business system dynamically.
- Published
- 2021
- Full Text
- View/download PDF
11. Therapeutic efficacy of artemether–lumefantrine for the treatment of uncomplicated Plasmodium falciparum malaria from three highly malarious states in India
- Author
-
Praveen K. Bharti, Man M. Shukla, Pascal Ringwald, Sri Krishna, Pushpendra P. Singh, Ajay Yadav, Sweta Mishra, Usha Gahlot, Jai P. Malaiya, Amit Kumar, Shambhu Prasad, Pradeep Baghel, Mohan Singh, Jaiprakash Vadadi, Mrigendra P. Singh, Maria Dorina G. Bustos, Leonard I. Ortega, Eva-Maria Christophel, Sher S. Kashyotia, Gagan S. Sonal, and Neeru Singh
- Subjects
Therapeutic efficacy ,Artemether–lumefantrine ,Plasmodium falciparum ,Malaria ,India ,Arctic medicine. Tropical medicine ,RC955-962 ,Infectious and parasitic diseases ,RC109-216 - Abstract
Abstract Background Anti-malarial drug resistance continues to be a leading threat to malaria control efforts and calls for continued monitoring of waning efficacy of artemisinin-based combination therapy (ACT). Artesunate + sulfadoxine/pyrimethamine (AS + SP) is used for the treatment of uncomplicated Plasmodium falciparum malaria in India. However, resistance against AS + SP is emerged in northeastern states. Therefore, artemether–lumefantrine (AL) is the recommended first line treatment for falciparum malaria in north eastern states. This study investigates the therapeutic efficacy and safety of AL for the treatment of uncomplicated falciparum malaria in three malaria-endemic states in India. The data generated through this study will benefit the immediate implementation of second-line ACT as and when required. Methods This was a one-arm prospective evaluation of clinical and parasitological responses for uncomplicated falciparum malaria using WHO protocol. Patients diagnosed with uncomplicated mono P. falciparum infection were administered six-dose regimen of AL over 3 days and subsequent follow-up was carried out up to 28 days. Molecular markers msp-1 and msp-2 were used to differentiate recrudescence and re-infection and K13 propeller gene was amplified and sequenced covering the codon 450–680. Results A total of 402 eligible patients were enrolled in the study from all four sites. Overall, adequate clinical and parasitological response (ACPR) was 98 % without PCR correction and 99 % with PCR correction. At three study sites, ACPR rates were 100 %, while at Bastar, cure rate was 92.5 % on day 28. No early treatment failure was found. The PCR-corrected endpoint finding confirmed that one late clinical failure (LCF) and two late parasitological failures (LPF) were recrudescences. The PCR corrected cure rate was 96.5 %. The mean fever clearance time was 27.2 h ± 8.2 (24–48 h) and the mean parasite clearance time was 30.1 h ± 11.0 (24–72 h). Additionally, no adverse event was recorded. Analysis of total 186 samples revealed a mutation in the k13 gene along with non-synonymous mutation at codon M579T in three (1.6 %) samples. Conclusion AL is an efficacious drug for the treatment of uncomplicated falciparum malaria. However, regular monitoring of AL is required in view of malaria elimination initiatives, which will be largely dependent on therapeutic interventions, regular surveillance and targeted vector control.
- Published
- 2016
- Full Text
- View/download PDF
12. Periodicity in software vulnerability discovery, patching and exploitation
- Author
-
Joh, HyunChul and Malaiya, Yashwant K.
- Published
- 2017
- Full Text
- View/download PDF
13. Role of fine needle aspiration cytology as a diagnostic tool in orbital and adnexal lesions
- Author
-
Lubna Khan, Kamal Malukani, Siddharth Malaiya, Prashant Yeshwante, Saba Ishrat, and Shirish S Nandedkar
- Subjects
Fine Needle Aspiration Cytology ,Ocular Adnexal Lesions ,Orbital Lesions ,Ophthalmology ,RE1-994 - Abstract
Purpose: To evaluate the role of fine needle aspiration (FNAC) as a diagnostic tool in cases of orbital and ocular adnexal masses. Cytological findings were correlated with histopathological diagnosis wherever possible. Methods: FNAC was performed in 29 patients of different age groups presenting with orbital and ocular adnexal masses. Patients were evaluated clinically and investigated by non-invasive techniques before fine needle aspiration of the masses. Smears were analyzed by a cytologist in all cases. Further, results of cytology were compared with the histopathological diagnosis. Results: The age of patients ranged from 1 to 68 years (mean: 29.79±19.29). There were 14 males and 15 females with a male to female ratio of 0.93:1. Out of 29 cases, 26 aspirates were cellular. Cellularity was insufficient in three (10.34%) aspirates. Out of 26 cellular aspirates, 11 were non-neoplastic while 15 were neoplastic on cytology. Subsequent histopathologic examination was done in 21/26 cases. Concordance rate of FNAC in orbital and ocular adnexal mass lesions with respect to the precise histologic diagnosis was 90%. Conclusion: When properly used in well-indicated patients (in cases where a diagnosis cannot be made by clinical and imaging findings alone), FNAC of orbital and periorbital lesions is an invaluable and suitable adjunct diagnostic technique that necessitates close cooperation between the ophthalmologist and cytologist. However, nondiagnostic aspirates may sometimes be obtained, and an inconclusive FNAC should not always be ignored.
- Published
- 2016
- Full Text
- View/download PDF
14. Assessing vulnerability exploitability risk using software properties
- Author
-
Younis, Awad, Malaiya, Yashwant K., and Ray, Indrajit
- Published
- 2016
- Full Text
- View/download PDF
15. A Study on Development of the Camera-Based Blind Spot Detection System Using the Deep Learning Methodology
- Author
-
Donghwoon Kwon, Ritesh Malaiya, Geumchae Yoon, Jeong-Tak Ryu, and Su-Young Pi
- Subjects
blind spot detection ,deep learning ,internet of things ,embedded board ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
One of the recent news headlines is that a pedestrian was killed by an autonomous vehicle because safety features in this vehicle did not detect an object on a road correctly. Due to this accident, some global automobile companies announced plans to postpone development of an autonomous vehicle. Furthermore, there is no doubt about the importance of safety features for autonomous vehicles. For this reason, our research goal is the development of a very safe and lightweight camera-based blind spot detection system, which can be applied to future autonomous vehicles. The blind spot detection system was implemented in open source software. Approximately 2000 vehicle images and 9000 non-vehicle images were adopted for training the Fully Connected Network (FCN) model. Other data processing concepts such as the Histogram of Oriented Gradients (HOG), heat map, and thresholding were also employed. We achieved 99.43% training accuracy and 98.99% testing accuracy of the FCN model, respectively. Source codes with respect to all the methodologies were then deployed to an off-the-shelf embedded board for actual testing on a road. Actual testing was conducted with consideration of various factors, and we confirmed 93.75% average detection accuracy with three false positives.
- Published
- 2019
- Full Text
- View/download PDF
16. Association between age at disease onset of anti-neutrophil cytoplasmic antibody-associated vasculitis and clinical presentation and short-term outcomes
- Author
-
Monti, S., Craven, A., Klersy, C., Montecucco, C., Caporali, R., Watts, R., Merkel, P. A., Luqmani, R., Achilleos, K., Adler, M., Alba, M. A., Albert, D. A., Alibaz-Oner, F., Allcoat, P., Amano, K., Amarasuriya, M., Amudala, N. A., Andrews, J., Archer, A. M., Arimura, Y., Atukorala, I., Azevedo, E., Bajad, S., Baldwin, C., Barra, L. J., Baslund, B., Basu, N., Baykal, M., Berger, C., Berglin, E., Besada, E., Bhardwaj, M., Bischof, A., Blockmans, D., Blood, J., Draibe, J. B., Brand, S., Brandao, M., Bruce, I. N., Butler, A., Calabrese, L. H., Ferrer, D. C., Carette, S., Carmona, D., Ceunen, H., Chakravarty, K., Chapman, P. T., Chocova, Z., Chung, S. A., Ci, W., Cid, M. C., Clark, T. M., Clarkson, M. R., De Jesus Contreras-Rodriguez, F., Conway, R., Cooke, K., Viros, X. C., Cordeiro, A., Costa, A., Culfear, K., Daikeler, T., Danda, D., Das, S. K., Dasgupta, B., De Castro, A. M., Dehghan, N., Devassy, R., Dhindsa, N., Diamantopoulos, A. P., Direskeneli, H., Dobashi, H., Juan, D., Durrani, M., Edelsten, C., Eifert, J., Elhayek, S., Elsideeg, S., Endo, T., Erden, A., Erer, B., Eriksson, P., Erturk, Z., Espigol-Frigole, G., Felicetti, M., Ferraro, A., Ferro, J. M., Fifi-Mah, A., Flores-Suarez, L. F., Flossmann, O., Flynn, D., Fonseca, J. E., Foot, J., Foote, M., Forbess, L., Fujimoto, S., Fukuoka, K., Furtado, C., Furuta, S., Gaffo, A. L., Gallagher, P., Gao, N., Gatenby, P., Gendi, N., Geraldes, R., Gerits, A., Gioffredi, A., Gomples, L., Goncalves, M. J., Gondo, P., Graham, A., Grainger, R., Gray, D. T., Grayson, P. C., Griffiths, L., Guo, Y., Gupta, R., Gylling, M., Hajj-Ali, R. A., Hammam, N., Harigai, M., Hartley, L., Haslett, J., Hassan, A., Hatemi, G., Hellmich, B., Henckaerts, L., Henes, J. C., Hepburn, J., Herd, V., Hess, C., Hill, C., Hinojosa-Azaola, A., Hirahashi, J., Hirano, F., Hocevar, A., Holle, J., Hollinger, N., Homma, S., Howard, T., Hoyles, R. K., Hruskova, Z., Hutcheon, G., Ignacak, M., Igney-Oertel, A., Ikeda, K., Ikegaya, N., Jagadeesh, S., Jaquith, J., Jayne, D. R. W., Jewell, T., Jones, C., Joshi, A., Kalyoncu, U., Kamall, S., Kamath, S., Lai, K. S., Kaname, S., Kanchinadham, S., Karadag, O., Karube, M., Kaszuba, M., Kaur, R., Kawakami, T., Kawashima, S., Khalidi, N., Khan, A., Kikuchi, M., Kilic, L., Kimura, M., King, M. J., Klapa, S., Klocke, R., Kobayashi, T., Kobayashi, S., Komagata, Y., Kronbichler, A., Kuczia, P., Kumar, M. S., Kurosawa, M., Lamprecht, P., Langford, C. A., Lanyon, P., Laversuch, C., Lee, S. J., Leoni, S., Li, J., Liang, K., Liang, P., Liao, H., Lee, L. A., Luqmani, R. A., Lyle, A., Macdonald, M., Mackie, S. L., Madden, L., Magliano, M., Makino, H., Makol, A., Malaiya, R., Malaviya, A., Manthri, R., Maritati, F., Da Silva, A. M., Mason, J. C., Matara, C., Matsui, K., Matteson, E. L., Mcbride, D., Mccullough, K., Mcgeoch, L., Mclaren, J., Mcmillian, C., Mendiratta, N., Menon, A., Merinopoulos, D., Merkel, P., Messier, S., Micheletti, R. G., Mills, K., Milman, N., Minoda, M., Minz, R. W., Mock, C., Mohammad, A. J., Moiseev, S., Moitinho, M., Molloy, E., Monach, P. A., Montgomery, M., Moosig, F., Moradizadeh, M., Morgan, M., Morgan, A. W., Morgan, A. -M., Muir, A., Mukhtyar, C., Muller, A., Muratore, F., Muso, E., Nada, R., Nakajima, H., Nakajima, T., Nakano, H., Nandagudi, A., Neumann, T., Y. F., Ng, K. H., Ng, Nogueira, E. L., Nolkha, N., Nordstrom, D., Novikov, P., Nugaliyadde, A., O'Donnell, J. L., O'Donoghue, J., O'Neill, L., O'Riordan, E., Oatley, M., Okubo, K., Oliva, E., Oshikawa, H., Ota, Y., Padoan, R., Pagnoux, C., Pan, L., Panaritis, K., Park, J. K., Patel, S., Patil, P., Pazzola, G., Peall, A., Pearce, F., Pehlevan, S., Pereira, L., Pettersson, T., Pineau, C. A., Pirila, L., Poglodek, B., Ponte, C., Prieto-Gonzalez, S., Priya, S. R., Purewal, B., Purschke, S., Putaala, J., Quickert, S., Quincey, V., Raghuvanshi, S., Rajasekhar, L., Ranganathan, D., Rathi, M., Rees, D., Rees, F., Renken, U., Restuccia, G., Rhee, R. L., Rice, B., Robins, D., Robson, J., Rodrigues, M., Romao, V. C., Rotar, C., Ruediger, C., Rutgers, A., A. C., Sa, Saavedra, M. J., Sada, K. -E., Sahbudin, I., Salvarani, C., Sandhu, N., Santos, E., Sato, Y., Schafer, V. S., Schiavon, F., Schmidt, W. A., Segelmark, M., Shahin, A., Sharma, A., Shotton, J., Silva, C., Singer, O. G., Sivasuthan, G., Smolen, S., Solanich-Moreno, X., Boixader, L. S., Song, Y. W., Springer, J., Sreih, A. G., Srivastava, R., Stamp, L. K., Stevens, R., Strbian, D., Sugino, K., Sunderkotter, C., Suppiah, R., Suzuki, K., Szekanecz, Z., Sznajd, J., Taimen, K., Tak, P. P., Takeuchi, T., Takizawa, N., Tames, L., Tan, B. E., Tanaka, M., Tang, M. W., Tatlisumak, T., Tesar, V., Thomas, A., Tian, X., Tokunaga, K., Tombetti, E., Tomsic, M., Toz, B., Tsukamoto, T., Uchida, S., Unal, A. U., Urban, M. L., Usui, J., Vaglio, A., Venkatachalam, S., Vermaak, E., Viswanath, V., Wada, T., Wagh, S., Wallace, D. J., Walters, G., Walz, B., Wan, J., Wang, T., Wang, G., Warrington, K. J., Watts, R. A., Wawrzycka-Adamczyk, K., Weeratunga, P., Weisman, M. H., Wickramasinghe, S., Williams, M., Wojcik, K., Woodruff, L., Xenitidis, T., Yamada, H., Yamagata, K., Yee, C. -S., Yoon, M., Yoshida, K., Yoshifuji, H., Ytterberg, S. R., Yumura, W., Zayed, H., Zeng, X., Zhao, M. -H., Zugaj, A., Zuk, J., İç Hastalıkları, Clinical Haematology, and Translational Immunology Groningen (TRIGR)
- Subjects
Male ,Outcome ,Antineutrophil Cytoplasmic ,030232 urology & nephrology ,0302 clinical medicine ,Risk Factors ,80 and over ,Pharmacology (medical) ,Age of Onset ,Young adult ,Aged, 80 and over ,education.field_of_study ,age ,anti-neutrophil cytoplasmic antibody-associated vasculitis ,outcome ,Adolescent ,Adult ,Aged ,Anti-Neutrophil Cytoplasmic Antibody-Associated Vasculitis ,Antibodies, Antineutrophil Cytoplasmic ,Female ,Humans ,Middle Aged ,Morbidity ,Prognosis ,Retrospective Studies ,Risk Assessment ,Survival Rate ,United Kingdom ,Young Adult ,Vasculitis ,Systemic vasculitis ,medicine.medical_specialty ,Population ,anti-neutrophil cytoplasmic antibody–associated vasculitis ,Antibodies ,03 medical and health sciences ,Rheumatology ,Internal medicine ,medicine ,education ,Anti-neutrophil cytoplasmic antibody–associated vasculitis ,Survival rate ,Anti-neutrophil cytoplasmic antibody ,030203 arthritis & rheumatology ,business.industry ,Retrospective cohort study ,medicine.disease ,Age of onset ,business - Abstract
Objectives ANCA-associated vasculitis (AAV) can affect all age groups. We aimed to show that differences in disease presentation and 6 month outcome between younger- and older-onset patients are still incompletely understood. Methods We included patients enrolled in the Diagnostic and Classification Criteria for Primary Systemic Vasculitis (DCVAS) study between October 2010 and January 2017 with a diagnosis of AAV. We divided the population according to age at diagnosis: Results A total of 1338 patients with AAV were included: 66% had disease onset at Conclusion Within 6 months of diagnosis of AAV, patients >65 years of age display a different pattern of organ involvement and an increased risk of significant damage and mortality compared with younger patients.
- Published
- 2021
- Full Text
- View/download PDF
17. Chapter 2 - Basics of targeted nanodrug delivery of chemotherapeutics for breast cancer therapy
- Author
-
Malaiya, Akanksha, Singhai, Mansha, Paliwal, Shivani Rai, and Paliwal, Rishi
- Published
- 2022
- Full Text
- View/download PDF
18. Modeling vulnerability discovery process in Apache and IIS HTTP servers
- Author
-
Woo, Sung-Whan, Joh, HyunChul, Alhazmi, Omar H., and Malaiya, Yashwant K.
- Published
- 2011
- Full Text
- View/download PDF
19. Measure of Central Tendency and Partition Value
- Author
-
Udit Malaiya
- Published
- 2022
- Full Text
- View/download PDF
20. Measure of Central Tendency and Partition Value PRESENTED BY : UDIT MALAIYA
- Author
-
Udit Malaiya
- Published
- 2022
- Full Text
- View/download PDF
21. DR. HARI SINGH GOUR VISHWAVIDYALAYA Department of commerce SUBJECT -COM-CC-211 BUSINESS MATHEMATICS OF FINANCE TOPIC-UNIT -II (BUSINESS AND FINANCE) Profit and loss
- Author
-
Udit Malaiya
- Published
- 2022
- Full Text
- View/download PDF
22. Index Number
- Author
-
Udit Malaiya
- Published
- 2022
- Full Text
- View/download PDF
23. 000 Index Number 000
- Author
-
Udit Malaiya
- Published
- 2022
- Full Text
- View/download PDF
24. profitandloss-210825085626
- Author
-
Udit Malaiya
- Published
- 2022
- Full Text
- View/download PDF
25. Redundant Design in Interdependent Networks.
- Author
-
Lijun Liu, Yongfeng Yin, Zenghu Zhang, and Yashwant K Malaiya
- Subjects
Medicine ,Science - Abstract
Modern infrastructure networks are often coupled together and thus could be modeled as interdependent networks. Overload and interdependent effect make interdependent networks more fragile when suffering from attacks. Existing research has primarily concentrated on the cascading failure process of interdependent networks without load, or the robustness of isolated network with load. Only limited research has been done on the cascading failure process caused by overload in interdependent networks. Redundant design is a primary approach to enhance the reliability and robustness of the system. In this paper, we propose two redundant methods, node back-up and dependency redundancy, and the experiment results indicate that two measures are effective and costless. Two detailed models about redundant design are introduced based on the non-linear load-capacity model. Based on the attributes and historical failure distribution of nodes, we introduce three static selecting strategies-Random-based, Degree-based, Initial load-based and a dynamic strategy-HFD (historical failure distribution) to identify which nodes could have a back-up with priority. In addition, we consider the cost and efficiency of different redundant proportions to determine the best proportion with maximal enhancement and minimal cost. Experiments on interdependent networks demonstrate that the combination of HFD and dependency redundancy is an effective and preferred measure to implement redundant design on interdependent networks. The results suggest that the redundant design proposed in this paper can permit construction of highly robust interactive networked systems.
- Published
- 2016
- Full Text
- View/download PDF
26. List of contributors
- Author
-
Almeida, Tuanny Leite, Ashique, Sumel, Batheja, Sanya, Beraldo-de-Araújo, Viviane Lucia, Biswasroy, Prativa, Chaurasiya, Akash, Costa, Juliana Souza Ribeiro, Da Silva, Mariana Rodrigues, de Jesus, Marcelo Bispo, de Oliveira-Nascimento, Laura, Gandhi, Sonu, Garcia-Fossa, Fernanda, Garg, Ashish, Ghosh, Goutam, Goyal, Amit K., Gupta, Ujjwal, Gupta, Umesh, Guptha, Prathap Madeswara, Gurjar, Shaifali, Haldar, Jitu, Hussain, Afzal, Jain, Keerti, Janghorbani, Amin, Kanoujia, Jovita, Kar, Biswakanth, Khatik, Aadil Sk, Kothekar, Ameya, Kumar, Pramod, Kumari, Priyanka, Kurdhane, Satish, Lakshmi, S. Mohana, Maiti, Sabyasachi, Malaiya, Akanksha, Mazahir, Farhan, Mazzotta, Elisabetta, Mishra, Ansit, Mishra, Neeraj, Moraes-Lacerda, Thaís, Muzzalupo, Rita, Nair, Priyamvada, Nirbhavane, Gautami, Oliveira-Nascimento, Laura de, Paliwal, Rishi, Paliwal, Shivani Rai, Panchal, Kanan, Pathak, Anchal, Paul, Gajanan, Pereira, Rafaella Mascarelli, Pradhan, Deepak, Prakashan, Drishya, Rai, Vineet Kumar, Rajwar, Tushar Kanti, Rath, Goutam, Romeo, Martina, Sahu, Garima, Shah, Hinal, Shahdeo, Deepshikha, Singh, Sonali, Soeiro, Victória Soares, Sukhija, Rajesh, Sulakhiya, Kunjbihari, Suthar, Teeja, Taliyan, Rajeev, Van Vliet Lima, Marcelo, Yadav, A.K., and Yazdian, Fatemeh
- Published
- 2024
- Full Text
- View/download PDF
27. Varicella vaccination in the immunocompromised
- Author
-
Malaiya, Ritu, Patel, Sanjeev, Snowden, Neil, and Leventis, Pamela
- Published
- 2015
- Full Text
- View/download PDF
28. Social media analytics of the Internet of Things
- Author
-
Yashwant K. Malaiya and Jim Scheibmeir
- Subjects
Computer engineering. Computer hardware ,Cybersecurity ,Computer science ,media_common.quotation_subject ,Popularity prediction ,Internet privacy ,Internet of Things ,Brief Communication ,01 natural sciences ,Social media analytics ,010305 fluids & plasmas ,TK7885-7895 ,Social media ,03 medical and health sciences ,QA76.75-76.765 ,Sentiment analysis ,0103 physical sciences ,Machine learning ,Ransomware ,Conversation ,Computer software ,Implementation ,Risk management ,030304 developmental biology ,media_common ,0303 health sciences ,business.industry ,Popularity ,Corporate communication ,business - Abstract
The Internet of Things technology offers convenience and innovation in areas such as smart homes and smart cities. Internet of Things solutions require careful management of devices and the risk mitigation of potential vulnerabilities within cyber-physical systems. The Internet of Things concept, its implementations, and applications are frequently discussed on social media platforms. This research illuminates the public view of the Internet of Things through a content-based and network analysis of contemporary conversations occurring on the Twitter platform. Tweets can be analyzed with machine learning methods to converge the volume and variety of conversations into predictive and descriptive models. We have reviewed 684,503 tweets collected in a 2-week period. Using supervised and unsupervised machine learning methods, we have identified trends within the realm of IoT and their interconnecting relationships between the most mentioned industries. We have identified characteristics of language sentiment which can help to predict the popularity of IoT conversation topics. We found the healthcare industry as the leading use case industry for IoT implementations. This is not surprising as the current COVID-19 pandemic is driving significant social media discussions. There was an alarming dearth of conversations towards cybersecurity. Recent breaches and ransomware events denote that organizations should spend more time communicating about risks and mitigations. Only 12% of the tweets relating to the Internet of Things contained any mention of topics such as encryption, vulnerabilities, or risk, among other cybersecurity-related terms. We propose an IoT Cybersecurity Communication Scorecard to help organizations benchmark the density and sentiment of their corporate communications regarding security against their specific industry.
- Published
- 2021
29. Management of mucopolysaccharidosis type IH (Hurler’s syndrome) presenting in infancy with severe dilated cardiomyopathy: a single institution’s experience
- Author
-
Wiseman, Daniel H., Mercer, Jean, Tylee, Karen, Malaiya, Nilima, Bonney, Denise K., Jones, Simon A., Wraith, J Edmond, and Wynn, Robert F.
- Published
- 2013
- Full Text
- View/download PDF
30. Chapter 6 - Nanoparticles and pancreas cancer
- Author
-
Malaiya, Akanksha, Jain, Dolly, and Yadav, Awesh K.
- Published
- 2021
- Full Text
- View/download PDF
31. Application of vulnerability discovery models to major operating systems
- Author
-
Alhazmi, Omar H. and Malaiya, Yashwant K.
- Subjects
Operating systems -- Safety and security measures ,Mathematical models -- Usage ,32-bit operating system ,64-bit operating system ,Operating system ,Company business management ,Business ,Electronics ,Electronics and electrical industries - Abstract
The applicability of six vulnerability discovery models to four major operating systems is examined. Results for the evaluation of the risk of vulnerability exploitation show that some of the models tend to capture the discovery process better than the other models.
- Published
- 2008
32. The morphology of the medial gastrocnemius in typically developing children and children with spastic hemiplegic cerebral palsy
- Author
-
Malaiya, Ritu, McNee, Anne E., Fry, Nicola R., Eve, Linda C., Gough, Martin, and Shortland, Adam P.
- Published
- 2007
- Full Text
- View/download PDF
33. Measuring, analyzing and predicting security vulnerabilities in software systems
- Author
-
Alhazmi, O.H., Malaiya, Y.K., and Ray, I.
- Published
- 2007
- Full Text
- View/download PDF
34. House Arrest, Adolescent Unrest: Leisure Activities During Pandemic, Scenario of South Asian Countries.
- Author
-
Sharma, Akhand, Jain, Chandrakanta, and Malaiya, Udit
- Subjects
MANNERS & customs ,COVID-19 pandemic ,HOME detention ,SCHOOLS ,SMARTPHONES - Abstract
The educational and social life of adolescents has been transformed in the last one and a half years, due to the global pandemic COVID-19. In order, to control, the expansion of this virus during the second wave (Feb.-August 2021), as it is a severe acute respiratory syndrome with modified features, all the educational institutions had been closed and even board examinations of central as well as state boards were cancelled. Students were forced to stay at home and classes were organised through online mode. Now adolescents, spend most of their time with their smartphones for attending their online classes as well as during their leisure time for socialising with their peers. The specific objective of the study is to examine the leisure time activities of adolescents during the second wave. The study is a cross-cultural study of 460 adolescents in the age group of (16-18) years studying in senior secondary class (Grade XII
th ) in South Asian countries; India, Maldives, and Bhutan. The study has used tools such as Leisure Interest Measure (LIM by Ragheb and Beard, 1992) and a structured key information schedule designed for studying smartphone usage patterns (SPUP) for collecting information. AMOS 23, NVivo 12 and other statistical packages have been used for analysing the data, to test the model designed for studying leisure time activities and their effects. The results of the study focus on digital leisure and the health problems associated with it. The findings of the study will be helpful in policy formulation related to adolescents' technology usage and the effective use of their leisure time The study concluded that excess use of technology either for educational or any other purpose has a bad impact on the psycho-physiological health of adolescents and it requires serious attention. [ABSTRACT FROM AUTHOR]- Published
- 2022
35. The Safety of Continued Oral Anticoagulation Therapy in Joint Injections and Aspirations: A Qualitative Review of the Current Evidence.
- Author
-
Kotecha, Jalpa, Gration, Betty, Hunt, Beverley J., Goodman, Anna L., and Malaiya, Ritu
- Published
- 2022
- Full Text
- View/download PDF
36. A Study on Development of the Camera-Based Blind Spot Detection System Using the Deep Learning Methodology
- Author
-
Su-Young Pi, Ritesh K. Malaiya, Jeong-Tak Ryu, Donghwoon Kwon, and Geumchae Yoon
- Subjects
Source code ,Computer science ,media_common.quotation_subject ,blind spot detection ,02 engineering and technology ,Pedestrian ,lcsh:Technology ,lcsh:Chemistry ,0202 electrical engineering, electronic engineering, information engineering ,False positive paradox ,General Materials Science ,Computer vision ,Instrumentation ,lcsh:QH301-705.5 ,media_common ,Fluid Flow and Transfer Processes ,Data processing ,business.industry ,embedded board ,lcsh:T ,Process Chemistry and Technology ,Deep learning ,General Engineering ,deep learning ,020206 networking & telecommunications ,Object (computer science) ,Thresholding ,internet of things ,lcsh:QC1-999 ,Computer Science Applications ,Histogram of oriented gradients ,lcsh:Biology (General) ,lcsh:QD1-999 ,lcsh:TA1-2040 ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,lcsh:Engineering (General). Civil engineering (General) ,lcsh:Physics - Abstract
One of the recent news headlines is that a pedestrian was killed by an autonomous vehicle because safety features in this vehicle did not detect an object on a road correctly. Due to this accident, some global automobile companies announced plans to postpone development of an autonomous vehicle. Furthermore, there is no doubt about the importance of safety features for autonomous vehicles. For this reason, our research goal is the development of a very safe and lightweight camera-based blind spot detection system, which can be applied to future autonomous vehicles. The blind spot detection system was implemented in open source software. Approximately 2000 vehicle images and 9000 non-vehicle images were adopted for training the Fully Connected Network (FCN) model. Other data processing concepts such as the Histogram of Oriented Gradients (HOG), heat map, and thresholding were also employed. We achieved 99.43% training accuracy and 98.99% testing accuracy of the FCN model, respectively. Source codes with respect to all the methodologies were then deployed to an off-the-shelf embedded board for actual testing on a road. Actual testing was conducted with consideration of various factors, and we confirmed 93.75% average detection accuracy with three false positives.
- Published
- 2019
37. Biomedical applications and toxicities of carbon nanotubes.
- Author
-
Prajapati, Shiv Kumar, Malaiya, Akanksha, Kesharwani, Payal, Soni, Deeksha, and Jain, Aakanchha
- Subjects
- *
THERMAL properties , *SURFACE area , *NANOMEDICINE , *BIOACTIVE compounds , *NANOCARRIERS - Abstract
Carbon nanotubes are newer generation material broadly emerged for biomedical applications due to its tempting properties such as size and aspect ratio covering surface area to the length, electrical, mechanical and thermal properties in addition to their unique architecture. The view for CNT-based nanomedicines is attractive and promising. Carbon nanotubes compared to other nanocarriers can be easily modified for conjugation of bioactive compounds and ligands for targeting. The applications of carbon nanotubes are not only limited to drug delivery but also in diagnostic applications. Due to a variety of applications in drug delivery, it is necessary to bear in mind the toxicities of carbon nanotubes and catch the way to overcome the problems related to toxicities. Currently, many studies have explored the biodegradation mechanism of carbon nanotubes. Biodegradation shows a conspicuous pathway that enables degradation and removal of CNTs from living body and catalyzes the release of the load from the CNTs. Many articles have been published till date which evidentiary provides the promising applications of CNTs. The present review seeks to provide an overview on intracellular fate, applications and toxicities of CNTs. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
38. Aliasing errors in Parallel Signature Analyzers
- Author
-
Min Yinghua, Malaiya, Yashwant K., and Jin Boping
- Published
- 1990
- Full Text
- View/download PDF
39. List of contributors
- Author
-
Bhavana, Valamla, Bilensoy, Erem, Chary, Padakanti Sandeep, Chaudhari, Bhushan P., Das Kurmi, Balak, Dhapte, Vividha, Erdoğar, Nazlı, Fernandez-Carballido, A., Fraguas-Sanchez, A.I., Gajbe, Bharti, Gajbhiye, Kavita R., Gajbhiye, Virendra, Gautam, Laxmikant, Guo, Pengbo, Gupta, Umesh, Haider, Tanweer, Jain, Priyanka, Jain, Rupshee, Jain, Vikas, Jaiswal, Neha, Ji, Nan, Kanwar, Indu Lata, Kenwat, Rameshroo, Kumar, Hitesh, Kumar, Vinay, Kundu, Gopal C., Kundu, Ipsita G., Malaiya, Akanksha, Martin-Sabroso, C., Mazahir, Farhan, Mehata, Abhishesh Kumar, Mehra, Neelesh Kumar, Mishra, Barnalee, Mishra, Vijay, Mishra, Yachana, Moudgil, Aliesha, Muthu, Madaswamy S., Paliwal, Rishi, Paliwal, Shivani Rai, Pandey, Vikas, Pawar, Anil T., Radharani, N.N.V., Rajana, Naveen, Rani, Sarita, Sahoo, Rakesh Kumar, Shrivastava, Priya, Singhai, Mansha, Solomon, Viswas Raja, Soni, Vandana, Tambuwala, Murtaza M., Tan, Chalet, Torres-Suarez, A.I., Tripathi, Shourya, Varan, Cem, Varan, Gamze, Varma, Sanjana, Viswanadh, Matte Kasi, Vyas, S.P., Wen, Wucheng, Wong, Ho Lun, Xue, Hui Yi, Yadav, Amit Singh, and Yadav, Awesh K.
- Published
- 2022
- Full Text
- View/download PDF
40. Single-Nucleus RNA-Seq Reveals Dysregulation of Striatal Cell Identity Due to Huntington's Disease Mutations.
- Author
-
Malaiya, Sonia, Cortes-Gutierrez, Marcia, Herb, Brian R., Coffey, Sydney R., Legg, Samuel R. W., Cantle, Jeffrey P., Colantuoni, Carlo, Carroll, Jeffrey B., and Ament, Seth A.
- Subjects
- *
HUNTINGTON disease , *SPINOCEREBELLAR ataxia , *EPIGENOMICS , *RNA sequencing , *LABORATORY mice , *GENE regulatory networks , *CELL death - Abstract
Huntington's disease (HD) is a dominantly inherited neurodegenerative disorder caused by a trinucleotide expansion in exon 1 of the huntingtin (HTT) gene. Cell death in HD occurs primarily in striatal medium spiny neurons (MSNs), but the involvement of specific MSN subtypes and of other striatal cell types remains poorly understood. To gain insight into cell type-specific disease processes, we studied the nuclear transcriptomes of 4524 cells from the striatum of a genetically precise knock-in mouse model of the HD mutation, HttQ175/1, and from wild-type controls. We used 14- to 15-month-old male mice, a time point at which multiple behavioral, neuroanatomical, and neurophysiological changes are present but at which there is no known cell death. Thousands of differentially expressed genes (DEGs) were distributed across most striatal cell types, including transcriptional changes in glial populations that are not apparent from RNA-seq of bulk tissue. Reconstruction of cell type-specific transcriptional networks revealed a striking pattern of bidirectional dysregulation for many cell type-specific genes. Typically, these genes were repressed in their primary cell type, yet de-repressed in other striatal cell types. Integration with existing epigenomic and transcriptomic data suggest that partial loss-of-function of the polycomb repressive complex 2 (PRC2) may underlie many of these transcriptional changes, leading to deficits in the maintenance of cell identity across virtually all cell types in the adult striatum. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
41. Successful treatment of Candida discitis with 5-flucytosine and fluconazole
- Author
-
Rachapalli, Satish M., Malaiya, Ritu, Mohd, T. A. M. T., and Hughes, Rod A.
- Published
- 2010
- Full Text
- View/download PDF
42. Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems.
- Author
-
Algarni, Abdullah M., Thayananthan, Vijey, Malaiya, Yashwant K., and Vaccaro, Ugo
- Subjects
DATA security failures ,RISK assessment ,CORPORATION reports ,SYSTEMS software ,DATA modeling ,SMART power grids ,CYBER physical systems - Abstract
The evaluation of data breaches and cybersecurity risks has not yet been formally addressed in modern business systems. There has been a tremendous increase in the generation, usage and consumption of industrial and business data as a result of smart and computational intensive software systems. This has resulted in an increase in the attack surface of these cyber systems. Consequently, there has been a consequent increase in the associated cybersecurity risks. However, no significant studies have been conducted that examine, compare, and evaluate the approaches used by the risk calculators to investigate the data breaches. The development of an efficient cybersecurity solution allows us to mitigate the data breaches threatened by the cybersecurity risks such as cyber-attacks against database storage, processing and management. In this paper, we develop a comprehensive, formal model that estimates the two components of security risks: breach cost and the likelihood of a data breach within 12 months. The data used in this model are taken from the industrial business report, which provides the necessary information collected and the calculators developed by the major organizations in the field. This model integrated with the cybersecurity solution uses consolidated factors that have a significant impact on the data breach risk. We propose mathematical models of how the factors impact the cost and the likelihood. These models allow us to conclude that results obtained through the models mitigate the data breaches in the potential and future business system dynamically. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
43. Bridging faults in BiCMOS circuits
- Author
-
Menon, Sankaran M, Malaiya, Yashwant K, and Jayasumana, Anura P
- Subjects
Electronics And Electrical Engineering - Abstract
Combining the advantages of CMOS and bipolar, BiCMOS is emerging as a major technology for many high performance digital and mixed signal applications. Recent investigations revealed that bridging faults can be a major failure mode in IC's. Effects of bridging faults in BiCMOS circuits are presented. Bridging faults between logical units without feedback and logical units with feedback are considered. Several bridging faults can be detected by monitoring the power supply current (I(sub DDQ) monitoring). Effects of bridging faults and bridging resistance on output logic levels were examined along with their effects on noise immunity.
- Published
- 1993
44. Faulty behavior of asynchronous storage elements
- Author
-
Al-Assadi, Waleed K, Lu, Ding, Jayasumana, Anura P, Malaiya, Yashwant K, and Tong, Carol Q
- Subjects
Electronics And Electrical Engineering - Abstract
It is often assumed that the faults in storage elements (SE's) can be modeled as output/input stuck-at-faults of the element. They are implicitly considered equivalent to the stuck-at faults in the combinational logic surrounding the SE cells. A more accurate higher level fault model for elementary SE's used in asynchronous circuits is presented. This model offers better representation of the physical failures. It is shown that the stuck-at model may be adequate if only modest fault coverage is desired. The enhanced model includes some common fault behaviors of SE's that are not covered by the stuck-at model. These include data-feed-through behaviors that cause the SE to be combinational. Fault models for complex SE cells can be obtained without a significant loss of information about the structure of the circuit.
- Published
- 1993
45. Detection of feed-through faults in CMOS storage elements
- Author
-
Al-Assadi, Waleed K, Malaiya, Yashwant K, and Jayasumana, Anura P
- Subjects
Electronics And Electrical Engineering - Abstract
In testing sequential circuits, internal faults in the storage elements (SE's) are sometimes modeled as stuck-at faults in the combinational circuits surrounding the SE. The detection of some transistor-level faults that cannot be modeled as stuck-at are considered. These feed-through faults cause the cell to become either data-feed-through, which makes the cell combinational, or clock-feed-through, which causes the clock signal or its complement to appear at the output. Under such faults, the cell does not function as a memory element. Here it is shown that such faults may or may not be detected depending on delays involved. Conditions under which race-ahead occurs are identified.
- Published
- 1992
46. Behavior of faulty double BJT BiCMOS logic gates
- Author
-
Menon, Sankaran M, Malaiya, Yashwant K, and Jayasumana, Anura P
- Subjects
Electronics And Electrical Engineering - Abstract
Logic Behavior of a Double BJT BiCMOS device under transistor level shorts and opens is examined. In addition to delay faults, faults that cause the gate to exhibit sequential behavior were observed. Several faults can be detected only by monitoring the current. The faulty behavior of Bipolar (TTL) and CMOS logic families is compared with BiCMOS, to bring out the testability differences.
- Published
- 1992
47. Adaptive Testing Based on Moment Estimation.
- Author
-
Xiao, Peng, Yin, Yongfeng, Liu, Bin, Jiang, Bo, and Malaiya, Yashwant K.
- Subjects
ADAPTIVE testing ,DYNAMIC testing ,PARAMETER estimation ,TEST design - Abstract
Adaptive testing (AT) is a software testing approach that uses a feedback mechanism to enhance test effectiveness. Its testing strategy can be adjusted online by using the testing data collected during the software testing process. However, it requires complex parameter estimation which results in excessive computational overhead that may hinder the applicability of AT. In this paper, we propose an approach called AT based on moment estimation (AT-ME) to address this problem. The proposed approach uses moment estimation to serve as the algorithm of parameter estimation, which reduces the complexity of AT-ME. In addition, a dynamic length for testing action is set to limit the number of decisions without influencing the test effectiveness. The proposed approach has been validated on the Siemens test suite, which includes seven real programs. The experiments show that AT-ME can reduce the computational overhead of AT without compromising overall testing efficiency. Results demonstrate that AT-ME is a feasible and effective AT strategy. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
48. NRITTA GANAPATI IN INDIA AND BEYOND ITS FRONTIERS: SUMMARY
- Author
-
MALAIYA, SUDHA
- Published
- 1991
49. A Study on Development of the Camera-Based Blind Spot Detection System Using the Deep Learning Methodology.
- Author
-
Kwon, Donghwoon, Malaiya, Ritesh, Yoon, Geumchae, Ryu, Jeong-Tak, and Pi, Su-Young
- Subjects
DEEP learning ,OPEN source software ,AUTONOMOUS vehicles ,SOURCE code ,ELECTRONIC data processing - Abstract
One of the recent news headlines is that a pedestrian was killed by an autonomous vehicle because safety features in this vehicle did not detect an object on a road correctly. Due to this accident, some global automobile companies announced plans to postpone development of an autonomous vehicle. Furthermore, there is no doubt about the importance of safety features for autonomous vehicles. For this reason, our research goal is the development of a very safe and lightweight camera-based blind spot detection system, which can be applied to future autonomous vehicles. The blind spot detection system was implemented in open source software. Approximately 2000 vehicle images and 9000 non-vehicle images were adopted for training the Fully Connected Network (FCN) model. Other data processing concepts such as the Histogram of Oriented Gradients (HOG), heat map, and thresholding were also employed. We achieved 99.43% training accuracy and 98.99% testing accuracy of the FCN model, respectively. Source codes with respect to all the methodologies were then deployed to an off-the-shelf embedded board for actual testing on a road. Actual testing was conducted with consideration of various factors, and we confirmed 93.75% average detection accuracy with three false positives. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
50. Software Vulnerability Markets: Discoverers and Buyers
- Author
-
Algarni, Abdullah M. and Malaiya, Yashwant K.
- Subjects
software security ,vulnerability discoverers ,Risk management ,vulnerability markets - Abstract
Some of the key aspects of vulnerability—discovery, dissemination, and disclosure—have received some attention recently. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. Our study suggests that a major percentage of discoverers, a majority in some cases, are unaffiliated with the software developers and thus are free to disseminate the vulnerabilities they discover in any way they like. As a result, multiple vulnerability markets have emerged. In some of these markets, the exchange is regulated, but in others, there is little or no regulation. In recent vulnerability discovery literature, the vulnerability discoverers have remained anonymous individuals. Although there has been an attempt to model the level of their efforts, information regarding their identities, modes of operation, and what they are doing with the discovered vulnerabilities has not been explored. Reports of buying and selling of the vulnerabilities are now appearing in the press; however, the existence of such markets requires validation, and the natures of the markets need to be analyzed. To address this need, we have attempted to collect detailed information. We have identified the most prolific vulnerability discoverers throughout the past decade and examined their motivation and methods. A large percentage of these discoverers are located in Eastern and Western Europe and in the Far East. We have contacted several of them in order to collect firsthand information regarding their techniques, motivations, and involvement in the vulnerability markets. We examine why many of the discoverers appear to retire after a highly successful vulnerability-finding career. The paper identifies the actual vulnerability markets, rather than the hypothetical ideal markets that are often examined. The emergence of worldwide government agencies as vulnerability buyers has significant implications. We discuss potential factors that can impact the risk to society and the need for detailed exploration., {"references":["C. P. Pfleeger and S. L Pfleeger. Security in Computing, 3rd ed. Prentice Hall PTR, 2003.","O. H. Alhazmi and Y. K. Malaiya, \"Application of Vulnerability Discovery Models to Major Operating Systems,\" IEEE Trans. Reliability, March 2008, pp. 14-22","S.-W. Woo, H. Joh, O. H. Alhazmi and Y. K. Malaiya, \"Modeling Vulnerability Discovery Process in Apache and IIS HTTP Servers\", Computers & Security, January 2011, Pages 50-62.","\"Teen Exploits Three Zero-Day Vulns for $60K Win in Google Chrome Hack Contest | Threat Level | Wired.com,\" Threat Level. (Online). Available: http://www.wired.com/threatlevel/2012/03/zero-days-for-chrome/. (Accessed: 06-Oct-2013).","\"Bug brokers offering higher bounties.\" (Online). Available: http://www.securityfocus.com/news/11437. (Accessed: 06-Oct-2013).","\"Be a Millionaire: The Market for Zero-Day Software Exploits | Critical Start.\" (Online). Available: http://www.criticalstart.com/2012/04/be-a-millionaire-the-market-for-zero-day-software-exploits/. (Accessed: 06-Oct-2013).","R, Anderson, University of Cambridge, Home page. (Online). Available: http://www.cl.cam.ac.uk/~rja14/ (Accessed: 06-Oct-2013).","H.-C. Joh and Y. K. Malaiya, \"Seasonal variation in the vulnerability discovery process,\" in Software Testing Verification and Validation, 2009. ICST'09. International Conference on, 2009, pp. 191–200.","Karthik Kannan and Rahul Telang, Market for Software Vulnerabilities? Think Again, Management Science, Vol. 51, No. 5 (May, 2005), pp. 726-740.\n[10]\t\"White hat,\" Search security. (Online). Available: http://searchsecurity.techtarget.com/definition/white-hat (Accessed: 06-Oct-2013).\n[11]\t\"HacK, CouNterHaCk | New York Times Magazine,\" (Online). Available: http://www.nytimes.com/library/magazine/home/19991003mag-hackers.html. (Accessed: 06-Oct-2013).\n[12]\tC. Miller, \"The legitimate vulnerability market: the secretive world of 0-day exploit sales,\" in Workshop on the Economics of Information Security (WEIS), 2007, pp. 7–8.\n[13]\tD. McKinney, \"Vulnerability Bazaar,\" IEEE Security Privacy, vol. 5, no. 6, pp. 69–73, 2007.\n[14]\tAndy Greenberg, Meet The Hackers Who Sell Spies The Tools To Crack Your PC, Forbes, March 21, 2012, bit.ly/11cbLC6\n[15]\tM. Shahzad, M. Z. Shafiq, and A. X. Liu, \"A large scale exploratory analysis of software vulnerability life cycles,\" in 2012 34th International Conference on Software Engineering (ICSE), 2012, pp. 771–781.\n[16]\tThe Open Source Vulnerability Database. (Online). Available: http://www.osvdb.org. (Accessed: 06-Oct-2013).\n[17]\tArora, A.; Rahul Telang, \"Economics of software vulnerability disclosure,\" Security & Privacy, IEEE, vol.3, no.1, pp.20, 25, Jan.-Feb. 2005.\n[18]\tR. Böhme, \"Vulnerability markets,\" Proc. of 22C3, vol. 27, p. 30, 2005.\n[19]\tR. Anderson, C. Barton, R. Böhme, R. Clayton, M. J. van Eeten, M. Levi, T. Moore, and S. Savage, \"Measuring the cost of cybercrime,\" in 11th Workshop on the Economics of Information Security, 2012.\n[20]\t\"Shopping For Zero-Days: A Price List For Hackers' Secret Software Exploits - Forbes,\" Forbes. (Online). Available: http://www.forbes.com/ sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/. (Accessed: 06-Oct-2013).\n[21]\t\"Google throws stacks of cash at hackers to publicly crack its Chrome browser,\" VentureBeat. (Online). Available: http://venturebeat.com/ 2012/03/08/hackers-crack-chrome-in-publi/. (Accessed: 06-Oct-2013).\n[22]\t\"Cyber-security: The digital arms trade | The Economist.\" (Online). Available: http://www.economist.com/news/business/21574478-market-software-helps-hackers-penetrate-computer-systems-digital-arms-trade. (Accessed: 06-Oct-2013).\n[23]\tA. Ozment, \"Bug auctions: Vulnerability markets reconsidered,\" in Third Workshop on the Economics of Information Security, 2004.\n[24]\tVulnerability Reward Program for Google web properties. (Online). Available: http://www.google.com/about/appsecurity/reward-program/. (Accessed: 21-Jan-2014).\n[25]\tChrome Vulnerability Rewards Program. (Online). Available: http://www.chromium.org/Home/chromium-security/vulnerability-rewards-program. (Accessed: 21-Jan-2014).\n[26]\tThe Mozilla Security Bug Bounty Program. (Online). Available: http://www.mozilla.org/security/bug-bounty.html. (Accessed: 21-Jan-2014).\n[27]\tFacebook rewards program. (Online). Available: https://www.facebook.com/whitehat/bounty/. (Accessed: 21-Jan-2014).\n[28]\tWordpress rewards program. (Online). Available: http://www.whitefirdesign.com/about/wordpress-security-bug-bounty-program.html. (Accessed: 06-Oct-2013).\n[29]\tCCBill Vulnerability Reward Program. (Online). Available: http://www.ccbill.com/developers/security/vulnerability-reward-program.php. (Accessed: 21-Jan-2014].\n[30]\tMicrosoft Bounty Programs. (Online). Available: http://technet.microsoft.com/en-US/security/dn425036. (Accessed: 21-Jan-2014).\n[31]\t\"Microsoft Says No to Paying Bug Bounties,\" Threatpost. (Online). Available: http://threatpost.com/microsoft-says-no-paying-bug-bounties-072210/. (Accessed: 06-Oct-2013).\n[32]\t\"The Shadowy World Of Selling Software Bugs - And How It Makes Us All Less Safe,\" ReadWrite. (Online). Available: http://readwrite.com/ 2012/10/04/the-shadowy-world-of-selling-software-bugs-and-how-it-makes-us-all-less-safe. (Accessed: 06-Oct-2013).\n[33]\tSecunia Vulnerability Coordination Reward Program (SVCRP). (Online). Available: http://secunia.com/community/research/svcrp/. (Accessed: 21-Jan-2014).\n[34]\tZDI Rewards Program. (Online). Available: http://www.zerodayinitiative.com/about/benefits/. (Accessed: 21-Jan-2014).\n[35]\tRyan Gallagher, \"Cyberwar's Gray Market- Should the secretive hacker zero-day exploit market be regulated?\" Slate, Jan. 16, 2013. \n[36]\tMichael Riley and Ashlee Vance \"Cyber Weapons: The New Arms Race\" BloomsbergBusinessWeek, July 20, 2011. \n[37]\t\"Schneier on Security: The Vulnerabilities Market and the Future of Security.\" (Online). Available: https://www.schneier.com/blog/archives/ 2012/06/the_vulnerabili.html. (Accessed: 06-Oct-2013).\n[38]\t\"Stuxnet was work of U.S. and Israeli experts, officials say - The Washington Post.\" (Online). Available: http://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html. (Accessed: 06-Oct-2013).\n[39]\t\"Black hat greed reducing software vulnerability report rate • The Register.\" (Online). Available: http://www.theregister.co.uk/2013/02/ 26/grey_market_cuts_vulnerability_reporting/. (Accessed: 06-Oct-2013).\n[40]\t\"WabiSabiLabi may close 0day auction site.\" (Online). Available: http://www.networkworld.com/news/2008/103008-wabisabilabi-may-close-0day-auction.html. (Accessed: 06-Oct-2013).\n[41]\tS. Ransbotham, S. Mitra, and J. Ramsey, \"Are markets for vulnerabilities effective?,\" MIS Quarterly-Management Information Systems, vol. 36, no. 1, p. 43, 2012.\n[42]\t\"Cyber Weapons: The New Arms Race - Businessweek.\" (Online). Available: http://www.businessweek.com/magazine/cyber-weapons-the-new-arms-race-07212011.html. (Accessed: 06-Oct-2013).\n[43]\t\"Welcome to the Malware-Industrial Complex | MIT Technology Review.\" (Online). Available: http://www.technologyreview.com/news/ 507971/welcome-to-the-malware-industrial-complex/. (Accessed: 06-Oct-2013).\n[44]\tAlhazmi, O.H.; Malaiya, Y.K., \"Quantitative vulnerability assessment of systems software,\" Reliability and Maintainability Symposium, 2005. Proceedings. Annual, vol., no., pp.615, 620, Jan. 24-27, 2005.\n[45]\tRoss Anderson and Tyler Moore, The Economics of Information Security, Science, 27 October 2006: 314 (5799), 610-613. \n[46]\tBlog of r0t. (Online). Available: http://pridels-team.blogspot.com. (Accessed: 06-Oct-2013).\n[47]\tmain website of Janek Vind \"waraxe\". (Online). Available: http://www.waraxe.us. (Accessed: 06-Oct-2013).\n[48]\tFacebook's account of Lostmon. (Online). Available: https://www.facebook.com/lostmon. (Accessed: 06-Oct-2013).\n[49]\tBlog of Lostmon Lords. (Online). Available: http://lostmon.blogspot.com. (Accessed: 06-Oct-2013).\n[50]\tPersonal website of rgod. (Online). Available: http://retrogod.altervista.org. (Accessed: 06-Oct-2013).\n[51]\tPersonal website of Luigi Auriemma. (Online). Available: http://aluigi.altervista.org. (Accessed: 06-Oct-2013).\n[52]\tFinifter, Matthew,Devdatta Akhawe, and David Wagner.\" An empirical study of vulnerability rewards programs.\"In USENIX Security.2013, 273-288\n[53]\tH. Joh and Y. K. Malaiya, \"Defining and Assessing Quantitative Security Risk Measures Using Vulnerability Lifecycle and CVSS Metrics,'' SAM'11, The 2011 International Conference on Security and Management, pp.10-16, 2011.\n[54]\tReport: Eastern European Hackers More Sophisticated Than Asian Counterparts. (Online). Available: http://blogs.wsj.com/digits/2012/ 09/18/report-eastern-european-hackers-more-sophisticated-than-asian-counterparts/. (Accessed: 06-Oct-2013).\n[55]\t\"GCHQ Establishes Cyber Unit to Detect Software Vulnerabilities - IBTimes UK.\" (Online). Available: http://www.ibtimes.co.uk/articles/ 448951/20130321/gchq-establishes-cyber-research-unit-search-software.htm. (Accessed: 06-Oct-2013).\n[56]\tL. Allodi, W. Shim, and F. Massacci, \"Quantitative assessment of risk reduction with cybercrime black market monitoring\". The 2013 IEEE Security and Privacy Workshops, pp. 165-172, 2013."]}
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.