Form Approved OMB No. 0704-0188 gu cf~erfnq coon r r.oe r naton. Send omg We 1efo 'e-,Vranq mi ýC... more Form Approved OMB No. 0704-0188 gu cf~erfnq coon r r.oe r naton. Send omg We 1efo 'e-,Vranq mi ýCom.(e nwafnat O ieev stn io cal cavA 2 64h 'cert an* audqft. Plott-orK Avouction PF01T (004 155,o-Wavannqton. DC203 S~AD-A264 591 °'°°"° ..
Wireless Communications and Mobile Computing, 2007
A growing need to have ubiquitous connectivity has motivated our research to provide continuous c... more A growing need to have ubiquitous connectivity has motivated our research to provide continuous connection between various wireless platforms such as cellular networks, WLANs and MANETs. In this paper we consider integration at the routing layer and propose two adaptable routing protocols (IRP-RD and IRP-PD) that exploit topology information stored at the fixed network components (cellular Base Stations and WLAN Access Points) for the route discovery and maintenance processes. Our proposed protocols can provide connectivity to the cellular network and/or WLAN hotspots through multi-hop routing, while differ in the gateway discovery approach used. In IRP-RD, multi-hop routes to gateways to the cellular network or WLAN hot spots are discovered on demand, while in IRP-PD out of coverage users proactively maintain routes to the gateways. Furthermore, proposed protocols can be used in any heterogeneous scenario, combining a cellular network and WLANs operating in infrastructure or ad hoc (MANET) mode. We provide simulation results that demonstrate the effectiveness of the proposed integrated routing protocols and show the advantages and drawbacks of each gateway discovery approach in different heterogeneous scenarios. * This work has been partially supported by the Ohio Board of Regents, Doctoral Enhancement Funds.
International Journal of Pervasive Computing and Communications, 2009
Purpose – Mobility management for single-hop cellular networks has received much research attenti... more Purpose – Mobility management for single-hop cellular networks has received much research attention in the last few years. One of the research challenges for 4G wireless systems is the design of mobility management techniques that integrate cellular and ad-hoc networks. Currently, there are no structured mobility management schemes for these heterogeneous multi-hop networks. This paper aims to address these issues.
Database Security course is an important part of the InfoSec curriculum. In many institutions thi... more Database Security course is an important part of the InfoSec curriculum. In many institutions this is not taught as an independent course. Parts of the contents presented in this paper are usually incorporated in other courses such as Network Security. The importance of database security concepts stems from the fact that a compromise of data at rest could expose an
Proceedings of the 5th ACM workshop on Wireless security - WiSe '06, 2006
Radio Frequency Identification (RFID) technology is emerging as an important tool with applicatio... more Radio Frequency Identification (RFID) technology is emerging as an important tool with applications in a variety of fields. The major concern regarding RFID is the ubiquitous nature of its deployment that extends far beyond the capabilities of any of the tools available today for monitoring any item without an RFID tag. Many of the applications envisioned have a legitimate use. However, this technology provides room for abuse of people's privacy. Moreover, since the communication between a RFID tag and its reader takes place in a wireless manner, issues concerning security of such a communication are also important. In this paper we briefly discuss RFID technology and its many positive uses; then we discuss the privacy concerns posed and the security considerations needed to alleviate doubts about the fair use of this technology. We have also specified additional security features that may be required to be incorporated in the tags and the associated readers so that privacy concerns can be addressed
Mobile ad hoc networks (MANET) are infrastructure free networks, temporary in nature and without ... more Mobile ad hoc networks (MANET) are infrastructure free networks, temporary in nature and without any centralized authority. These unique characteristics coupled with the increased vulnerability of MANET for security attacks demand an immediate solution for securing the ad hoc network, prior to its full-fledged deployment in commercial and military applications. So far, most of the research in MANET has been primarily focused on the routing and mobility aspects rather than securing the ad hoc networks. Due to the ever-increasing security threats, there is a need to develop architecture, algorithms, and mechanisms for a secured ad hoc network infrastructure. Existing intrusion detection approaches (IDA) in MANET suffer from the lack of design and implementation details for intrusion response. To address this limitation, we have proposed an intruder identification and response framework for MANET. Experimental results of the model simulated in NS2 for selected denial of service (DOS) attacks are very promising.
Proceedings - IEEE Symposium on Computers and Communications, 2002
In this paper, we present a variable pricing policy for the dynamic allocation of bandwidth capac... more In this paper, we present a variable pricing policy for the dynamic allocation of bandwidth capacity. Simulation studies using different scenarios illustrate the different features of a dynamic and scalable service delivery policy that provides an improved level of bandwidth ...
International urogynecology journal and pelvic floor dysfunction, 2007
Congenital absence of uterus and vagina, Mayer-Rokitansky-Kuster-Hauser (MRKH) syndrome, is mulle... more Congenital absence of uterus and vagina, Mayer-Rokitansky-Kuster-Hauser (MRKH) syndrome, is mullerian agenesis and is the second most frequent cause of primary amenorrhea. Only atypical form of MRKH (type B) is associated with renal skeletal and ovarian abnormalities. We report the management of an unusual case of atypical MRKH, unilateral gonadal agenesis, and solitary ectopic pelvic kidney with pelviureteric junction obstruction (PUJO). After doing thorough Medline search, to the best of our knowledge, this is the first case reported with this combination.
Journal of endourology / Endourological Society, 2009
Laparoscopic radical nephrectomy (LRN) has benefits in terms of cosmesis, less postoperative pain... more Laparoscopic radical nephrectomy (LRN) has benefits in terms of cosmesis, less postoperative pain, hospital stay, and early recovery when compared with open radical nephrectomy. One of the major points of concern of this surgery, especially in developing countries, is the additional cost because of the disposable instruments. We present our experience of laparoscopic radical nephrectomy with cost-reductive techniques. From 1998 to 2008, 141 patients undergoing cost-reductive LRN using minimal disposable equipment for clinically localized renal tumors were included in the study. Clinical data, including operative and postoperative management and follow-up, were recorded and analyzed statistically. The transperitoneal and retroperitoneal laparoscopic techniques were performed in 46.8% and 53.2 %, respectively. Overall, the mean operative time was 139.5 min, mean estimated blood loss was 192.3 mL, mean analgesic requirement was 12.69 mg morphine equivalent, and mean hospital stay was 3...
Background. Ductal carcinoma in situ (DCIS) is the most prevalent precursor to invasive breast ca... more Background. Ductal carcinoma in situ (DCIS) is the most prevalent precursor to invasive breast cancer (IBC), the second leading cause of death in women in the United States. The three most important prognostic markers for IBC are Estrogen receptor (ER), Progesterone receptor (PR) and HER2/neu. The four groups (IBC) defined as (1) ER and/or PR positive and HER2/neu negative, (2)
Impacted lower ureteral calculi are usually treated by retrograde ureteroscopic lithotripsy. We d... more Impacted lower ureteral calculi are usually treated by retrograde ureteroscopic lithotripsy. We describe an antegrade ureteroscopic salvage procedure for treating an impacted distal ureteral calculus that failed a retrograde ureteroscopic access.
Although non-steroidal anti-inflammatory drugs (NSAID) and spasmolytics have been used to relieve... more Although non-steroidal anti-inflammatory drugs (NSAID) and spasmolytics have been used to relieve biliary colic, the role of these drugs in the natural history of biliary colic has not been clarified. The objective of the present study is to compare the efficacy of intramuscular diclofenac with intramuscular hyoscine in the treatment of pain of acute biliary colic, and to study their role in the natural history of biliary colic and in the prevention of cholelithiasis-related complications. Seventy-two consecutive patients with biliary colic were enrolled in this prospective, randomized, double-blind study. They received either a single 75 mg intramuscular dose of diclofenac (n = 36) or similarly administered 20 mg of hyoscine (n = 36). Pain severity was recorded on a visual analogue scale 30 min, 1 h, 2 h and 4 h after injection of the drug. Patients were then followed closely for the next 72 h for persistence or relapse of pain, or development of acute cholecystitis, or drug relate...
Summary This paper presents our statistical based intrusion detection framework for computer netw... more Summary This paper presents our statistical based intrusion detection framework for computer networks. This framework uses the six sigma technique to identify the thresholds for the critical network parameters. With the help of raw network data, the thresholds identified are used to differentiate normal, uncertain and abnormal behavior due to network intrusion. This is then used for efficient detection and
Form Approved OMB No. 0704-0188 gu cf~erfnq coon r r.oe r naton. Send omg We 1efo 'e-,Vranq mi ýC... more Form Approved OMB No. 0704-0188 gu cf~erfnq coon r r.oe r naton. Send omg We 1efo 'e-,Vranq mi ýCom.(e nwafnat O ieev stn io cal cavA 2 64h 'cert an* audqft. Plott-orK Avouction PF01T (004 155,o-Wavannqton. DC203 S~AD-A264 591 °'°°"° ..
Wireless Communications and Mobile Computing, 2007
A growing need to have ubiquitous connectivity has motivated our research to provide continuous c... more A growing need to have ubiquitous connectivity has motivated our research to provide continuous connection between various wireless platforms such as cellular networks, WLANs and MANETs. In this paper we consider integration at the routing layer and propose two adaptable routing protocols (IRP-RD and IRP-PD) that exploit topology information stored at the fixed network components (cellular Base Stations and WLAN Access Points) for the route discovery and maintenance processes. Our proposed protocols can provide connectivity to the cellular network and/or WLAN hotspots through multi-hop routing, while differ in the gateway discovery approach used. In IRP-RD, multi-hop routes to gateways to the cellular network or WLAN hot spots are discovered on demand, while in IRP-PD out of coverage users proactively maintain routes to the gateways. Furthermore, proposed protocols can be used in any heterogeneous scenario, combining a cellular network and WLANs operating in infrastructure or ad hoc (MANET) mode. We provide simulation results that demonstrate the effectiveness of the proposed integrated routing protocols and show the advantages and drawbacks of each gateway discovery approach in different heterogeneous scenarios. * This work has been partially supported by the Ohio Board of Regents, Doctoral Enhancement Funds.
International Journal of Pervasive Computing and Communications, 2009
Purpose – Mobility management for single-hop cellular networks has received much research attenti... more Purpose – Mobility management for single-hop cellular networks has received much research attention in the last few years. One of the research challenges for 4G wireless systems is the design of mobility management techniques that integrate cellular and ad-hoc networks. Currently, there are no structured mobility management schemes for these heterogeneous multi-hop networks. This paper aims to address these issues.
Database Security course is an important part of the InfoSec curriculum. In many institutions thi... more Database Security course is an important part of the InfoSec curriculum. In many institutions this is not taught as an independent course. Parts of the contents presented in this paper are usually incorporated in other courses such as Network Security. The importance of database security concepts stems from the fact that a compromise of data at rest could expose an
Proceedings of the 5th ACM workshop on Wireless security - WiSe '06, 2006
Radio Frequency Identification (RFID) technology is emerging as an important tool with applicatio... more Radio Frequency Identification (RFID) technology is emerging as an important tool with applications in a variety of fields. The major concern regarding RFID is the ubiquitous nature of its deployment that extends far beyond the capabilities of any of the tools available today for monitoring any item without an RFID tag. Many of the applications envisioned have a legitimate use. However, this technology provides room for abuse of people's privacy. Moreover, since the communication between a RFID tag and its reader takes place in a wireless manner, issues concerning security of such a communication are also important. In this paper we briefly discuss RFID technology and its many positive uses; then we discuss the privacy concerns posed and the security considerations needed to alleviate doubts about the fair use of this technology. We have also specified additional security features that may be required to be incorporated in the tags and the associated readers so that privacy concerns can be addressed
Mobile ad hoc networks (MANET) are infrastructure free networks, temporary in nature and without ... more Mobile ad hoc networks (MANET) are infrastructure free networks, temporary in nature and without any centralized authority. These unique characteristics coupled with the increased vulnerability of MANET for security attacks demand an immediate solution for securing the ad hoc network, prior to its full-fledged deployment in commercial and military applications. So far, most of the research in MANET has been primarily focused on the routing and mobility aspects rather than securing the ad hoc networks. Due to the ever-increasing security threats, there is a need to develop architecture, algorithms, and mechanisms for a secured ad hoc network infrastructure. Existing intrusion detection approaches (IDA) in MANET suffer from the lack of design and implementation details for intrusion response. To address this limitation, we have proposed an intruder identification and response framework for MANET. Experimental results of the model simulated in NS2 for selected denial of service (DOS) attacks are very promising.
Proceedings - IEEE Symposium on Computers and Communications, 2002
In this paper, we present a variable pricing policy for the dynamic allocation of bandwidth capac... more In this paper, we present a variable pricing policy for the dynamic allocation of bandwidth capacity. Simulation studies using different scenarios illustrate the different features of a dynamic and scalable service delivery policy that provides an improved level of bandwidth ...
International urogynecology journal and pelvic floor dysfunction, 2007
Congenital absence of uterus and vagina, Mayer-Rokitansky-Kuster-Hauser (MRKH) syndrome, is mulle... more Congenital absence of uterus and vagina, Mayer-Rokitansky-Kuster-Hauser (MRKH) syndrome, is mullerian agenesis and is the second most frequent cause of primary amenorrhea. Only atypical form of MRKH (type B) is associated with renal skeletal and ovarian abnormalities. We report the management of an unusual case of atypical MRKH, unilateral gonadal agenesis, and solitary ectopic pelvic kidney with pelviureteric junction obstruction (PUJO). After doing thorough Medline search, to the best of our knowledge, this is the first case reported with this combination.
Journal of endourology / Endourological Society, 2009
Laparoscopic radical nephrectomy (LRN) has benefits in terms of cosmesis, less postoperative pain... more Laparoscopic radical nephrectomy (LRN) has benefits in terms of cosmesis, less postoperative pain, hospital stay, and early recovery when compared with open radical nephrectomy. One of the major points of concern of this surgery, especially in developing countries, is the additional cost because of the disposable instruments. We present our experience of laparoscopic radical nephrectomy with cost-reductive techniques. From 1998 to 2008, 141 patients undergoing cost-reductive LRN using minimal disposable equipment for clinically localized renal tumors were included in the study. Clinical data, including operative and postoperative management and follow-up, were recorded and analyzed statistically. The transperitoneal and retroperitoneal laparoscopic techniques were performed in 46.8% and 53.2 %, respectively. Overall, the mean operative time was 139.5 min, mean estimated blood loss was 192.3 mL, mean analgesic requirement was 12.69 mg morphine equivalent, and mean hospital stay was 3...
Background. Ductal carcinoma in situ (DCIS) is the most prevalent precursor to invasive breast ca... more Background. Ductal carcinoma in situ (DCIS) is the most prevalent precursor to invasive breast cancer (IBC), the second leading cause of death in women in the United States. The three most important prognostic markers for IBC are Estrogen receptor (ER), Progesterone receptor (PR) and HER2/neu. The four groups (IBC) defined as (1) ER and/or PR positive and HER2/neu negative, (2)
Impacted lower ureteral calculi are usually treated by retrograde ureteroscopic lithotripsy. We d... more Impacted lower ureteral calculi are usually treated by retrograde ureteroscopic lithotripsy. We describe an antegrade ureteroscopic salvage procedure for treating an impacted distal ureteral calculus that failed a retrograde ureteroscopic access.
Although non-steroidal anti-inflammatory drugs (NSAID) and spasmolytics have been used to relieve... more Although non-steroidal anti-inflammatory drugs (NSAID) and spasmolytics have been used to relieve biliary colic, the role of these drugs in the natural history of biliary colic has not been clarified. The objective of the present study is to compare the efficacy of intramuscular diclofenac with intramuscular hyoscine in the treatment of pain of acute biliary colic, and to study their role in the natural history of biliary colic and in the prevention of cholelithiasis-related complications. Seventy-two consecutive patients with biliary colic were enrolled in this prospective, randomized, double-blind study. They received either a single 75 mg intramuscular dose of diclofenac (n = 36) or similarly administered 20 mg of hyoscine (n = 36). Pain severity was recorded on a visual analogue scale 30 min, 1 h, 2 h and 4 h after injection of the drug. Patients were then followed closely for the next 72 h for persistence or relapse of pain, or development of acute cholecystitis, or drug relate...
Summary This paper presents our statistical based intrusion detection framework for computer netw... more Summary This paper presents our statistical based intrusion detection framework for computer networks. This framework uses the six sigma technique to identify the thresholds for the critical network parameters. With the help of raw network data, the thresholds identified are used to differentiate normal, uncertain and abnormal behavior due to network intrusion. This is then used for efficient detection and
Uploads
Papers by Anup kumar