Sharad Damodar Gore

Learn More
Intruders computers, who are spread across the Internet have become a major threat in our world, The researchers proposed a number of techniques such as (firewall, encryption) to prevent such penetration and protect the infrastructure of computers, but with this, the intruders managed to penetrate the computers. IDS has taken much of the attention of(More)
A lipase producing Acinetobacter haemolyticus TA106 was isolated from healthy human skin of tribal population. The maximum activity of 55 U/ml was observed after medium optimization using the "one variable at a time" and the statistical approaches. The optimal composition of the medium was determined as (% w/v or v/v): tryptone--1, yeast extract--0.5,(More)
Intruders computers, who are spread across the Internet have become a major threat in our world, The researchers proposed a number of techniques such as (firewall, encryption) to prevent such penetration and protect the infrastructure of computers, but with this, the intruders managed to penetrate the computers. IDS has taken much of the attention of(More)
Integrating security into enterprise level applications requires expertise and experience. Frameworks, tools and guidelines have been developed for the incorporation of security. Expert guidance is also encapsulated in the form of security design patterns which provide reusable solutions to recurring security problems. This field has been greatly enriched(More)
BACKGROUND Air pollutants of iron- and steel-making operations have historically been an environmental and health hazard. These pollutants include gaseous substances such as sulfur oxide, nitrogen dioxide, and carbon monoxide. The Iran National Steel Industrial Group beam rolling mills factory has two production lines viz. line 630 and line 650, with(More)
Statistical literature has several methods for coping with multicollinearity. This paper introduces a new shrinkage estimator, called modified unbiased ridge (MUR). This estimator is obtained from unbiased ridge regression (URR) in the same way that ordinary ridge regression (ORR) is obtained from ordinary least squares (OLS). Properties of MUR are derived.(More)
A common problem in multiple regression models is multicollinearity, which produces undesirable effects on the least squares estimator. To circumvent this problem, two well known estimation procedures are often suggested in the literature. They are Generalized Ridge Regression (GRR) estimation suggested by Hoerl and Kennard [8] and the Jackknifed Ridge(More)
A Network intrusion detection system (NIDS) is gaining ever increasing importance in security of the information from network attacks. For better system performance and lesser response time an improved NIDS system is proposed anomaly detection is achieved by using various agents and by implementing adaptive threshold algorithm. Thus utilizing multi agents(More)