Introduction: Mobile phones were originally seen as a gadget for communication but currently, the internet enabled mobile phones have become an integral part of our daily life. Their benefits are incomparable but at the same time, they have some negative effects too. Aim:To assess the pattern of usage of mobile phones and its effects on the academic performance of students. Materials and Methods:A descriptive cross-sectional study was conducted amongst 554 students of D. J. College of Dental Sciences and Research through a self-administered questionnaire to collect the data regarding the usage and associated anxiety with mobile phone.Results: About 39.5% students agreed that they score low marks in professional exams if they spend more time on phone.The number of students who frequently checked their cell phone during their classes or while doing clinical work were 24.7% . A total of 24.12% of the students were found to be nomophobic and at risk of being nomophobes were 40.97%. A statistically significant difference was found among preclinical, clinical, interns and postgraduates regarding the usage and effect of mobile phone on them.
Abstract-Malware remains one of the most significant security threats on the Internet. Antivirus solutions and blacklists, the main weapons of defense against these attacks, have only been (partially) successful. One reason is that cyber-criminals take active steps to bypass defenses, for example, by distributing constantly changing (obfuscated) variants of their malware programs, and by quickly churning through domains and IP addresses that are used for distributing exploit code and botnet commands.We analyze one of the core tasks that malware authors have to achieve to be successful: They must distribute and install malware programs onto as many victim machines as possible. A main vector to accomplish this is through drive-by download attacks where victims are lured onto web pages that launch exploits against the users' web browsers and their components. Once an exploit is successful, the injected shellcode automatically downloads and launches the malware program. While a significant amount of previous work has focused on detecting the drive-by exploit step and the subsequent network traffic produced by malware programs, little attention has been paid to the intermediate step where the malware binary is downloaded.In this paper, we study how clients in real-world networks download and install malware, and present Nazca, a system that detects infections in large scale networks. Nazca does not operate on individual connections, nor looks at properties of the downloaded programs or the reputation of the servers hosting them. Instead, it looks at the telltale signs of the malicious network infrastructures that orchestrate these malware installation that become apparent when looking at the collective traffic produced and becomes apparent when looking at the collective traffic produced by many users in a large network. Being content agnostic, Nazca does not suffer from coverage gaps in reputation databases (blacklists), and is not susceptible to code obfuscation. We have run Nazca on seven days of traffic from a large Internet Service Provider, where it has detected previously-unseen malware with very low false positive rates.
The web has become a platform that attackers exploit to infect vulnerable hosts, or deceive victims into buying rogue software. To accomplish this, attackers either inject malicious scripts into popular web sites or manipulate content delivered by servers to exploit vulnerabilities in users' browsers. To hide malware distribution servers, attackers employ HTTP redirections, which automatically redirect users' requests through a series of intermediate web sites, before landing on the final distribution site. In this paper, we develop a methodology to identify malicious chains of HTTP redirections. We build per-user chains from passively collected traffic and extract novel statistical features from them, which capture inherent characteristics from malicious redirection cases. Then, we apply a supervised decision tree classifier to identify malicious chains. Using a large ISP dataset, with more than 15K clients, we demonstrate that our methodology is very effective in accurately identifying malicious chains, with recall and precision values over 90% and up to 98%.
Peer-to-peer (P2P) systems enable users to share resources in a networked environment without worrying about issues such as scalability and load balancing. Unlike exchange of goods in a traditional market, resource exchange in P2P networks does not involve monetary transactions. This makes P2P systems vulnerable to problems including the free-rider problem that enables users to acquire resources without contributing anything, collusion between groups of users to incorrectly promote or malign other users, and zero-cost identity that enables nodes to obliterate unfavorable history without incurring any expenditure. Previous research addresses these issues using user-reputation, referrals, and shared history based techniques. Here, we describe a multi-agent based reciprocity mechanism where each user's agent makes the decision to share a resource with a requesting user based on the amount of resources previously provided by the requesting user to the providing user and globally in the system. A robust reputation mechanism is proposed to avoid the differential exploitations by the free-riders and to prevent collusion. Experimental results on a simulated P2P network addresses the problems identified above and shows that users adopting the reciprocative mechanism outperform users that do not share resources in the P2P network. Hence, our proposed reciprocative mechanism effectively suppresses free-riding.
Background: Developmental Defects of Enamel in the primary dentition may be associated and predictors of dental caries and nutritional status. The aim of the present study was to assess the Prevalence of Developmental Defects of Enamel and its Association with, Dental-Caries and Nutritional Status in PreSchool Children of Lucknow, India. Materials and Methods: Multistage Sampling was done.A total of 302 pre-school (Rural and Urban) children were examined. Type III examination was conducted with WHO Probe. Developmental Enamel Defects (DED) and Dental Caries were assessed using WHO (1997) Proforma. results:The prevalence of DED of any type was 39.9% with that of demarcated opacities being the highest, followed by hypoplasia. The most frequently affected teeth were maxillary anterior teeth, while the least affected teeth were mandibular incisors. The mean dmft was 3.5. A positive association between DED and caries was observed. Association between Dental Caries & BMI was non-significant whereas Pearson correlation showed a negative correlation between the two. conclusion:The prevalence of enamel defects and caries was high, as the enamel defects were strongly associated with caries.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.