Papers by abhinav srivastava
National Journal of Maxillofacial Surgery, 2017
Background and Objective: Forensic dentistry plays a vital role in detection and resolution of cr... more Background and Objective: Forensic dentistry plays a vital role in detection and resolution of crime, civil proceedings and personal identification. With ever-increasing demands placed upon law enforcement to provide sufficient physical evidence linking a perpetrator to a crime, it makes sense to utilize any type of physical characteristic to identify a suspect of an offense. The least invasive and cost-effective procedure among all methods of human identification is the study of lip prints and fingerprints. This study is done to determine the predominant pattern of fingerprint and lip print in males and females and to correlate it for gender identification. Materials and Methods: The study sample comprised 100 individuals (50 males and 50 females) aged between 20 and 50 years; dark-colored lipstick was applied uniformly on the lips. The glued portion of cellophane tape was dabbed first in the center and then pressed uniformly over the corner of lips. Cellophane tape was then stuck to a white chart sheet for the purpose of permanent record. Lip print patterns were analyzed following the classification of Suzuki and Tsuchihashi. The imprint of left thumb was taken on a white chart sheet using a blue ink stamp pad and visualized using magnifying lens. Fingerprints were analyzed by following the classification given by Kücken. Correlation of lip print and fingerprint was analyzed using Chi-square test. Results: The overall correlation of lip prints with fingerprints in males revealed branched lip pattern associated with whorl fingerprint and in females as vertical lip print pattern associated with loop fingerprint. Conclusion: We conclude that the study between lip print and fingerprint can aid in gender determination.
IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, 2017
The need of customized network functions for enterprises in Infrastructure-as-a-Service (IaaS) cl... more The need of customized network functions for enterprises in Infrastructure-as-a-Service (IaaS) clouds is emerging. However, existing network functions in IaaS clouds are very limited, inflexible, and hard to control by the tenants. Recently, the introduction of Software-Defined Networking (SDN) technology brings the hope of flexible control of network flows and creation of diverse network functions. Unfortunately, enterprises lose access to the SDN controller when they move to clouds. Moreover, the cloud SDN controller is only managed by the provider administrators for security and performance reasons. To allow enterprise tenants to develop and deploy their own SDN apps in the cloud, in this paper, we introduce a new cloud usage paradigm: Bring Your Own Controller (BYOC). BYOC offers each tenant an individual SDN controller, where tenants can deploy SDN apps to manage their network. To manage these tenant SDN controllers, we propose BYOC-VISOR, a new SDNbased virtualization platform. BYOC-VISOR addresses several security and performance challenges which are specific to IaaS clouds. We show that BYOC-VISOR supports different controller platforms and diverse SDN security applications such as firewall, IDS, and access control. We implement a prototype system and the performance evaluation results show that our system has low overhead.
2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC), 2017
Grid Computing is a dynamic, heterogeneous environment. Scheduling is the heart of Grid computing... more Grid Computing is a dynamic, heterogeneous environment. Scheduling is the heart of Grid computing. There are two Basic categories of scheduling in Grid: Resource Scheduling and Job Scheduling. Resources can be selected as per user demand and on the basis of specific scheduling algorithm. User can submit their jobs in Grid and these jobs are allocated to the resources according to the selected algorithm. In Priority based Scheduling algorithm, Priority of jobs are basic concern. In this paper we provide the flexibility in priority of jobs in specific condition. So the Utilization of resources is high as in some specific situation lowest priority jobs can be allocated before to higher priority jobs to available resources without waiting its priority order. Because of this flexibility, proposed algorithm dramatically reduces the processing cost.
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), 2017
Troubleshooting in an infrastructure-as-a-Service (IaaS) cloud platform is an inherently difficul... more Troubleshooting in an infrastructure-as-a-Service (IaaS) cloud platform is an inherently difficult task because it is a multi-player as well as multi-layer environment where tenant and provider effectively share administrative duties. To address these concerns, we present our work on CloudSight in which cloud providers allow tenants greater system-wide visibility through a transparency-as-a-service abstraction. We present the design, implementation, and evaluation of CloudSight in the OpenStack cloud platform. We also develop two example applications that make use of the CloudSight abstraction and use the applications to explore real cloud problems.
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016
In an Infrastructure-as-a-Service cloud, tenants rely on the cloud provider to provide "value-add... more In an Infrastructure-as-a-Service cloud, tenants rely on the cloud provider to provide "value-added" services such as data security and reliability. However, this providercontrolled service model is less flexible and cannot be customized to meet individual tenants' needs. In this paper, we present StorM, a novel middle-box service platform that allows each tenant to deploy tenant-specific security and reliability services-in virtualized middle-boxes-for their cloud data. With such middle-boxes, StorM divides the responsibilities of service creation between tenants and the provider by allowing tenants to customize their own cloud data polices and the provider to offer corresponding infrastructural support. In developing StorM, we address key challenges including network splicing, platform efficiency, and semantic gap. We implement a StorM prototype on top of OpenStack and demonstrate three tenant-defined security/reliability middle-box services, with low performance overhead (< 10%).
MAUSAM, 2021
Sea ice governs the fluxes of heat, moisture and momentum across the ocean-atmosphere interface. ... more Sea ice governs the fluxes of heat, moisture and momentum across the ocean-atmosphere interface. Because it is thin, sea ice is vulnerable to small perturbations within the ocean and the atmosphere, which considerably change the extent and thickness of the polar ice cover. Thus, sea ice is a climate change indicator. The DMSP SSM/I monthly ice concentration data over the Antarctic region have used to calculate the monthly sea ice extents (August to February) for each year during 1988-2006. Melting rates based on seasonal cycle of solar irradiance as well as the SSM/I data have been calculated. Compared to the melting rates based on seasonal cycle of solar irradiance, the SSM/I estimated melting rate, is less in the beginning of September and increases to its peak value by the end of December. The observed melting rate behaviour indicates that apart from the seasonal cycle of solar irradiance, it is controlled by other mechanisms also. The present study estimates the feedback impact ...
SRM Journal of Research in Dental Sciences, 2018
Background: Oral cancer is one of the ten most common cancers in the world. In India, it is the m... more Background: Oral cancer is one of the ten most common cancers in the world. In India, it is the most common cancer among male and the third most common among female population. Objective: The aim of this study was to evaluate retrospectively the epidemiologic profile of patients with oral squamous cell carcinoma (OSCC). Method: The study sample comprised of ninety eight biopsies diagnosed as OSCC. The clinical and histopathological features were analyzed using descriptive statistics, Student's t test and chi-square test. Results: Male to female ratio was 3.26:1. Mean age was 51.35 ± 14.39 years and 55.35 ± 8.87 years in males and females, respectively. The most common site of occurrence was buccal mucosa and gingivo-buccal sulcus (GBS). Most of the cases (66.32%) were well-differentiated OSCC. In most of the cases (66.32%) the diagnosis was made within 2-6 months of onset of symptoms. Conclusion: In India, OSCC is a major health problem. Strategies must be made to improve the present scenario of health care service, where Government-run health care centers are burdened with ever-increasing patient pool and to avail treatment in such centers is always a compromise with time and health. Effective oral health programs for spread of knowledge and awareness, prevention, early diagnosis and management, and follow up of oral cancer must be implemented.
International Journal of Advanced and Integrated Medical Sciences, 2016
Filariasis is endemic worldwide with the main focus in the tropical areas. Reported cases of fila... more Filariasis is endemic worldwide with the main focus in the tropical areas. Reported cases of filarial lymphadenopathy are caused by Wuchereria bancrofti, which is limited to the groin, the femoral triangle, and axilla, causing lymphedema of lower and upper limbs, and is usually diagnosed clinically and by the presence of microfilaria in peripheral blood smear. We are reporting an unusual case of cervical lymphadenitis, which on fine needle aspiration cytology (FNAC) showed microfilaria of a rare species, Brugia malayi. The purpose of this article is to make clinicians aware of this rare disease as one of the differential diagnoses of cervical lymphadenopathy in an endemic country like India. How to cite this article Srivastava A, Mohan C, Kumar S, Agarwal R. Brugia malayi in Cervical Lymph Node Aspirate: A Rare Case Report. Int J Adv Integ Med Sci 2016;1(2):79-80.
The Journal of Chemical Physics, 2018
Dynamics of hydration layers of a dimyristoylphosphatidylcholine (DMPC) bilayer are investigated ... more Dynamics of hydration layers of a dimyristoylphosphatidylcholine (DMPC) bilayer are investigated using an all atom molecular dynamics simulation. Based upon the geometric criteria, continuously residing interface water molecules which form hydrogen bonds solely among themselves and then concertedly hydrogen bonded to carbonyl, phosphate, and glycerol head groups of DMPC are identified. The interface water hydrogen bonded to lipids shows slower relaxation rates for translational and rotational dynamics compared to that of the bulk water and is found to follow sub-diffusive and non-diffusive behaviors, respectively. The mean square displacements and the reorientational auto-correlation functions are slowest for the interfacial waters hydrogen bonded to the carbonyl oxygen since these are buried deep in the hydrophobic core among all interfacial water studied. The intermittent hydrogen bond auto-correlation functions are calculated, which allows breaking and reformations of the hydrogen bonds. The auto-correlation functions for interfacial hydrogen bonded networks develop humps during a transition from cage-like motion to eventual power law behavior of t 3/2. The asymptotic t 3/2 behavior indicates translational diffusion dictated dynamics during hydrogen bond breaking and formation irrespective of the nature of the chemical confinement. Employing reactive flux correlation analysis, the forward rate constant of hydrogen bond breaking and formation is calculated which is used to obtain Gibbs energy of activation of the hydrogen bond breaking. The relaxation rates of the networks buried in the hydrophobic core are slower than the networks near the lipid-water interface which is again slower than bulk due to the higher Gibbs energy of activation. Since hydrogen bond breakage follows a translational diffusion dictated mechanism, chemically confined hydrogen bond networks need an activation energy to diffuse through water depleted hydrophobic environments. Our calculations reveal that the slow relaxation rates of interfacial waters in the vicinity of lipids are originated from the chemical confinement of concerted hydrogen bond networks. The analysis suggests that the networks in the hydration layer of membranes dynamically facilitate the water mediated lipid-lipid associations which can provide insights on the thermodynamic stability of soft interfaces relevant to biological systems in the future.
Journal of Maxillofacial and Oral Surgery, 2017
Objective The objective of this study was to assess the effectiveness of collagen membrane as bio... more Objective The objective of this study was to assess the effectiveness of collagen membrane as biological dressing over buccal fat pad (BFP) during crucial postoperative healing phase in the surgical management of oral submucous fibrosis (OSMF). Study Design The study comprised of 40 patients of OSMF of group IVa (Khanna and Andrade). Patients were randomly divided in two groups (20 patients in each group). Group I patients were treated using buccal fat pad only, whereas collagen membrane was used as a covering over harvested BFP in group II patients. Postoperative follow-up was done at 1 week, 3 weeks, 6 months and 1 year. Result Mean postoperative mouth opening achieved in both the groups was comparable at every follow-up visit. Infection was evident in four patients of group I at 1-week follow-up, whereas none of the group II patients developed infection. Pain score was lesser in group II patients as compared to group I. Relapse was seen in two patients in group I and one patient in group II. Time taken for epithelialization was 2-3 weeks in both the groups. Conclusion Although intraoperative time was increased in group II application of collagen membrane reduced infection when compared with group I. Also, the chances of damage to BFP are reduced during the hygiene maintenance at surgical site and jaw-opening exercise. Reduction in pain scores during postoperative period in group II patients was an additional advantage.
International Journal of Pharmaceutical and Clinical Research, 2017
Cancer is a major disease with millions of patients diagnosed each year with high mortality aroun... more Cancer is a major disease with millions of patients diagnosed each year with high mortality around the world. Various studies are still going on to study the further mechanisms and pathways of the cancer cell proliferation. Fucosylation is one of the most important oligosaccharide modifications involved in cancer and inflammation. In cancer development increased core fucosylation by FUT8 play an important role in cell proliferation. Down regulation of FUT8 expression may help cure lung cancer. Therefore the computational study based on the down regulation mechanism of FUT8 was mechanised. Sapota fruit extract, containing 4-Ogalloylchlorogenic acid was used as the inhibitor against FUT-8 as target and docking was performed using in-silico tool, Accelrys Discovery Studio. There were several conformations of the docked result, and conformation 1 showed 80% dock score between the ligand and the target. Further the amino acids of the inhibitor involved in docking were studied using anoth...
Scientific reports, Jan 25, 2017
Understanding the regulatory factors of self-assembly processes is a necessity in order to modula... more Understanding the regulatory factors of self-assembly processes is a necessity in order to modulate the nano-structures and their properties. Here, the self-assembly mechanism of a peptide-perylenediimide (P-1) conjugate in mixed solvent systems of THF/water is studied and the semiconducting properties are correlated with the morphology. In THF, right handed helical fibers are formed while in 10% THF-water, the morphology changes to nano-rings along with a switch in the helicity to left-handed orientation. Experimental results combined with DFT calculations reveal the critical role of thermodynamic and kinetic factors to control these differential self-assembly processes. In THF, P-1 forms right handed helical fibers in a kinetically controlled fashion. In case of 10% THF-water, the initial nucleation of the aggregate is controlled kinetically. Due to differential solubility of the molecule in these two solvents, elongation of the nuclei into fibers is restricted after a critical le...
Adult Onset Acute Otitis Media a Preliminary Report, Jun 5, 2014
Xii Congreso Mundial Irf Madrid 1993 Tomo 2, May 1, 1993
En el diseno de pavimentos, existe una necesidad de materiales que posean mejores propiedades y l... more En el diseno de pavimentos, existe una necesidad de materiales que posean mejores propiedades y las siguientes caracteristicas: baja susceptibilidad a la temperatura; mejora en la recuperacion o respuestas elastica, caucho-elastica y viscoelastica; mayor resistencia a la fatiga; alta flexibilidad y resistencia a los impactos; mayor estabilidad y resistencia a la deformacion permanente a temperaturas mas elevadas y frecuencias de carga menores. Estas caracteristicas pueden alcanzarse modificando el betun por medio de polimeros, no obstante, la mera adicion de un polimero a un betun compatible a alta temperatura no permitira obtener las propiedades deseadas. Hay que hacer frente a la incompatibilidad entre el betun y el polimero, a los problemas de estabilidad en almacenaje, de la distribucion por peso molecular, de susceptibilidad termica, etc. Todos estos aspectos han sido estudiados por medio de varios metodos de prueba junto con un analisis morfologico al microscopio. El trabajo aborda la metodologia a emplear al enfrentarse a los problemas asociados a la produccion, el procesamiento y el diseno de ligantes modificados por polimeros, con el fin de garantizar un mejor rendimiento de estos materiales a lo largo de su vida activa. Titulo en frances: "Produits modifies et leurs propietes". Ver ficha general IRRD 401001.
Ceramics International, 2015
ABSTRACT The present work was aimed to synthesize leucite based bioactive glass ceramic composite... more ABSTRACT The present work was aimed to synthesize leucite based bioactive glass ceramic composite with required characteristics for dental applications. The leucite glass-ceramic was prepared using mechanochemical synthesis. The microstructural, thermal, mechanical and biological properties of the composite coatings and its material-cell interaction were studied. The flexural strength and coefficient of thermal expansion (CTE) of a commercial dentine was also studied comparatively. Results of FTIR indicated the formation of hydroxyapatite layer on the surface of the composite. In-vitro cell proliferation and cytotoxicity assay of MCL composite material demonstrated that it did not inhibit proliferation and cytotoxicity of SCC-25 at low concentration, caused moderate levels of apoptosis at higher concentrations and were also tolerated by human RBC as studied by hemolytic assay. Based on the toxicity and bioactivity observed in this work, it can be concluded that this product may be further processed for potential clinical applications.
High Alumina cement was fabricated by wet chemical process using metal nitrate precursors at 1000... more High Alumina cement was fabricated by wet chemical process using metal nitrate precursors at 1000 °C and their cementing as well as mechanical behavior was compared with commercialized Secar 71. In a separate process cordierite was mechanochemically synthesized by mixing proper amounts of kaolin, talc and gibbsite. In order to understand the effects of process variables on the amount of synthesized product, the powder products were analyzed by XRD, and SEM. Based on XRD peak intensity measurements, the cordierite precursor mixture was completely amorphized by grinding at 600 rpm for 30 min. Cordierite was successfully produced at temperatures as low as 1150 °C by using the mixture after intensive grinding. Low cement castables were formulated introducing the prepared HAC as a binder phase in cordierite matrix with inclusion of silicon carbide for enhanced mechanical properties. Formulated LCC briquettes were analyzed by their physico-mechanical properties viz. B.D., A.P., CCS, CMOR ...
Lecture Notes in Computer Science, 2011
Many software security solutions-including malware analyzers, information flow tracking systems, ... more Many software security solutions-including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors-rely on knowledge of standard system call interfaces to reason about process execution behavior. In this work, we first obfuscate the Windows and Linux system call interfaces to degrade the effectiveness of these tools. Our attack, called Illusion, invokes privileged kernel operations in the kernel at the request of user-level processes without requiring those processes to call the actual system calls corresponding to the operations. The Illusion interface hides system operations from user-, kernel-, and hypervisor-level monitors mediating the conventional system-call interface. Illusion alters neither static kernel code nor read-only dispatch tables, remaining elusive from tools protecting kernel memory. We then consider the problem of Illusion attacks and augment system call data with kernel-level execution information to expose the hidden kernel operations. We present a Xen-based monitoring system, Sherlock, that adds kernel execution watchpoints to the stream of system call events. Sherlock automatically adapts its sensitivity based on security requirements to remain performant on desktop systems.
Proceedings of the 16th ACM conference on Computer and communications security, 2009
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct... more Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect these hidden objects by scanning kernel memory with handmade signatures; however, such signatures are brittle and rely on non-essential features of these data structures, making them easy to evade. In this paper, we present an automated mechanism for generating signatures for kernel data structures and show that these signatures are robust: attempts to evade the signature by modifying the structure contents will cause the OS to consider the object invalid. Using dynamic analysis, we profile the target data structure to determine commonly used fields, and we then fuzz those fields to determine which are essential to the correct operation of the OS. These fields form the basis of a signature for the data structure. In our experiments, our new signature matched the accuracy of existing scanners for traditional malware and found processes hidden with our prototype rootkit that all current signatures missed. Our techniques significantly increase the difficulty of hiding objects from signature scanning.
Lecture Notes in Computer Science, 2010
Malicious software includes functionality designed to block discovery or analysis by defensive ut... more Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it often subverts the normal execution of benign processes by modifying their in-memory code images to include malicious activity. It is important to find not only maliciouslyacting benign processes, but also the actual parasitic malware that may have infected those processes. In this paper, we present techniques for automatic discovery of unknown parasitic malware present on an infected system. We design and develop a hypervisor-based system, Pyrenée, that aggregates and correlates information from sensors at the network level, the network-to-host boundary, and the host level so that we correctly identify the true origin of malicious behavior. We demonstrate the effectiveness of our architecture with security and performance evaluations on a Windows system: we identified all malicious binaries in tests with real malware samples, and the tool imposed overheads of only 0%-5% on applications and performance benchmarks.
Uploads
Papers by abhinav srivastava