9 resultados para Internet fraud - Prevention

em Indian Institute of Science - Bangalore - Índia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Oxidative damage to DNA results in the occurrence of 7,8-dihydro-B-oxoguanine (8-oxoG) in the genome. In eubacteria, repair of such damage is initiated by two major base-excision repair enzymes, MutM and MutY. We generated a MutY-deficient strain of Mycobacterium smegmatis to investigate the role of this enzyme in DNA repair. The MutY deficiency in M. smegmatis did not result in either a noteworthy susceptibility to oxidative stress or an increase in the mutation rate. However, rifampicin resistant isolates of the MutY-deficient strain showed distinct mutations in the rifampicin-resistance-determining region of rpoB. Besides the expected C to A (or G to T) mutations, an increase in A to C (or T to G) mutations was also observed. Biochemical characterization of mycobacterial MutY (M. smegmatis and M. tuberculosis) revealed an expected excision of A opposite 8-oxoG in DNA. Additionally, excision of G and T opposite 8-oxoG was detected. MutY formed complexes with DNA containing 8-oxoG: A, 8-oxoG: G or 8-oxoG: T but not 8-oxoG : C pairs. Primer extension reactions in cell-free extracts of M. smegmatis suggested error-prone incorporation of nucleotides into the DNA. Based on these observations, we discuss the physiological role of MutY in specific mutation prevention in mycobacteria.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abuses in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as Activity-Event-Symptoms(AES) model for detecting fraud and intrusion attacks which appears during payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs during mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We provide analytical models for capacity evaluation of an infrastructure IEEE 802.11 based network carrying TCP controlled file downloads or full-duplex packet telephone calls. In each case the analytical models utilize the attempt probabilities from a well known fixed-point based saturation analysis. For TCP controlled file downloads, following Bruno et al. (In Networking '04, LNCS 2042, pp. 626-637), we model the number of wireless stations (STAs) with ACKs as a Markov renewal process embedded at packet success instants. In our work, analysis of the evolution between the embedded instants is done by using saturation analysis to provide state dependent attempt probabilities. We show that in spite of its simplicity, our model works well, by comparing various simulated quantities, such as collision probability, with values predicted from our model. Next we consider N constant bit rate VoIP calls terminating at N STAs. We model the number of STAs that have an up-link voice packet as a Markov renewal process embedded at so called channel slot boundaries. Analysis of the evolution over a channel slot is done using saturation analysis as before. We find that again the AP is the bottleneck, and the system can support (in the sense of a bound on the probability of delay exceeding a given value) a number of calls less than that at which the arrival rate into the AP exceeds the average service rate applied to the AP. Finally, we extend the analytical model for VoIP calls to determine the call capacity of an 802.11b WLAN in a situation where VoIP calls originate from two different types of coders. We consider N-1 calls originating from Type 1 codecs and N-2 calls originating from Type 2 codecs. For G711 and G729 voice coders, we show that the analytical model again provides accurate results in comparison with simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The incorporation of dUMP during replication or the deamination of cytosine in DNA results in the occurrence of uracils in genomes. To maintain genomic integrity, uracil DNA glycosylases (UDGs) excise uracil from DNA and initiate the base-excision repair pathway. Here, we cloned, purified and biochemically characterized a family 5 UDG, UdgB, from Mycobacterium smegmatis to allow us to use it as a model organism to investigate the physiological significance of the novel enzyme. Studies with knockout strains showed that compared with the wild-type parent, the mutation rate of the udgB(-) strain was approximately twofold higher, whereas the mutation rate of a strain deficient in the family 1 UDG (ung(-)) was found to be similar to 8.4-fold higher. Interestingly, the mutation rate of the double-knockout (ung(-)ludgB(-)) strain was remarkably high, at similar to 19.6-fold. While CG to TA mutations predominated in the ung(-) and ung(-)/udgb(-) strains, AT to GC mutations were enhanced in the udgB(-) strain. The ung(-)/udgB(-) strain was notably more sensitive to acidified nitrite and hydrogen peroxide stresses compared with the single knockouts (ung(-) or udgB(-)). These observations reveal a synergistic effect of UdgB and Ung in DNA repair, and could have implications for the generation of attenuated strains of Mycobacterium tuberculosis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This communication highlights unstable blue-green emitting Cu doped ZnSe nanocrystals stabilized by diluting the surface Se with a calculated amount of S.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Prevention or suppression of protein aggregation is of great importance in the context of protein storage, transportation and delivery. Traditionally chaperones or other chemically active agents are used to stop or diffuse native protein aggregation. We have used gold nanoparticles to prevent thermal aggregation of alcohol dehydrogenase (ADH), a protein that maintains the alcohol level in the liver and stomach. A light-scattering assay has been used to investigate the effect of gold nanoparticles on thermal aggregation of ADH and the result of our study has been summarized in Fig. 1. The scattered light intensity from the solution containing ADH decreases when 45 nm gold nanoparticles are added prior to heating (thermal denaturation) the solution, which indicates prevention of aggregation. The aggregation of the protein is suppressed to the extent of 96% with picomolar concentration of 45 nm gold nanoparticles while micromolar amounts of other proteins and biological substances are necessary to achieve the same effect. The extent varies with the size and the concentration of the gold NPs for the same protein concentration.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tuberculosis is continuing as a problem of mankind. With evolution, MDR and XDR forms of tuberculosis have emerged from drug sensitive strain. MDR and XDR strains are resistant to most of the antibiotics, making the management more difficult. BCG vaccine is not providing complete protection against tuberculosis. Therefore new infections are spreading at a tremendous rate. At the present moment there is experimental evidence to believe that Vitamin A and Vitamin D has anti-mycobacterial property. It is in this context, we have hypothesized a host based approach using the above vitamins that can cause possible prevention and cure of tuberculosis with minimal chance of resistance or toxicity. (C) 2015 Elsevier Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a probabilistic prediction based approach for providing Quality of Service (QoS) to delay sensitive traffic for Internet of Things (IoT). A joint packet scheduling and dynamic bandwidth allocation scheme is proposed to provide service differentiation and preferential treatment to delay sensitive traffic. The scheduler focuses on reducing the waiting time of high priority delay sensitive services in the queue and simultaneously keeping the waiting time of other services within tolerable limits. The scheme uses the difference in probability of average queue length of high priority packets at previous cycle and current cycle to determine the probability of average weight required in the current cycle. This offers optimized bandwidth allocation to all the services by avoiding distribution of excess resources for high priority services and yet guaranteeing the services for it. The performance of the algorithm is investigated using MPEG-4 traffic traces under different system loading. The results show the improved performance with respect to waiting time for scheduling high priority packets and simultaneously keeping tolerable limits for waiting time and packet loss for other services. Crown Copyright (C) 2015 Published by Elsevier B.V.