14 research outputs found

    Impact of MD5 Authentication in Secured and Non-Secured Traffic Routing for the Case of EIGRP, RIPv2 and OSPF Routing Protocols

    Get PDF
    Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with built-in security constraints. In this thesis, we evaluate the impact of MD5 Authentication on routing traffic for the case of EIGRP, RIPv2 and OSPF routing protocols in case of secured and non-secured routing traffic. A network model of four Cisco routers has been employed and a traffic generation and analysis tools have been developed and used to generate traffic data and measure delay time, jitter and overhead. The results show that the average delay time and jitter in the secured MD5 case can become significantly larger when compared to the unsecured case even in steady state conditions. Also, the EIGRP protocol shows the minimum overhead even when the system is extremely overloaded

    Wireless body area sensor networks signal processing and communication framework: Survey on sensing, communication technologies, delivery and feedback

    Get PDF
    Problem statement: The Wireless Body Area Sensor Networks (WBASNs) is a wireless network used for communication among sensor nodes operating on or inside the human body in order to monitor vital body parameters and movements.This study surveys the state-of-the-art on Wireless Body Area Networks, discussing the major components of research in this area including physiological sensing and preprocessing, WBASNs communication techniques and data fusion for gathering data from sensors.In addition, data analysis and feedback will be presented including feature extraction, detection and classification of human related phenomena.Approach: Comparative studies of the technologies and techniques used in such systems will be provided in this study, using qualitative comparisons and use case analysis to give insight on potential uses for different techniques.Results and Conclusion: Wireless Sensor Networks (WSNs) technologies are considered as one of the key of the research areas in computer science and healthcare application industries.Sensor supply chain and communication technologies used within the system and power consumption therein, depend largely on the use case and the characteristics of the application.Authors conclude that Life-saving applications and thorough studies and tests should be conducted before WBANs can be widely applied to humans, particularly to address the challenges related to robust techniques for detection and classification to increase the accuracy and hence the confidence of applying such techniques without physician intervention

    Survey on wireless body area sensor networks for healthcare applications: Signal processing, data analysis and feedback

    Get PDF
    Wireless sensor networks (WSNs) technologies are considered as one of the key of the research areas in computer science and healthcare application industries.The wireless body area sensor networks (WBASNs) is a wireless network used for communication among sensor nodes operating on or inside the human body in order to monitor vital body parameters and movements.The paper surveys the state-of-the-art on WBASNs discussing the major components of research in this area including physiological sensing, data preprocessing, detection and classification of human related phenomena. We provide comparative studies of the technologies and techniques used in such systems

    SURVEY ON WIRELESS BODY AREA SENSOR NETWORKS FOR HEALTHCARE APPLICATIONS: SIGNAL PROCESSING, DATA ANALYSIS AND FEEDBACK

    Get PDF
    ABSTRACT. Wireless sensor networks (WSNs) technologies are considered as one of the key of the research areas in computer science and healthcare application industries. The wireless body area sensor networks (WBASNs) is a wireless network used for communication among sensor nodes operating on or inside the human body in order to monitor vital body parameters and movements. The paper surveys the state-of-the-art on WBASNs discussing the major components of research in this area including physiological sensing, data preprocessing, detection and classification of human related phenomena. We provide comparative studies of the technologies and techniques used in such systems

    N′-(Di-2-pyridylmethyl­ene)benzo­hydrazide

    Get PDF
    In the title Schiff base, C18H14N4O, the amido –NH– unit is connected to one of the two pyridyl N atoms at an N(—H)⋯N distance of 2.624 (2) Å. The mol­ecular packing features an inter­molecular C—H⋯N R 2 2(6) hydrogen-bonding ring motif

    Performance evaluation of secured versus non-secured EIGRP routing protocol

    Get PDF
    Routing is the process of forwarding data across an inter-network from a designated source to a final destination.Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with built-in security constraints.In this paper, we evaluate the performance of EIGRP routing protocol in the case of secured and non-secured routing traffic.This is done through studying and analyzing EIGRP routing traffic with and without security rules.A network model of four Cisco routers, from both software and hardware perspectives, has been employed and a traffic generation and analysis tools have been developed and used to generate traffic data and to measure the delay for performance evaluation.The results show that the average delay in the secured case can become significantly larger than the unsecured case even in steady state conditions.The differences between the delays are exponential and reach a steady state towards the end of the experiment

    Weak or no association of TCF7L2 variants with Type 2 diabetes risk in an Arab population

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The rs7903146 and rs12255372 variants of <it>TCF7L2 </it>have been strongly associated with type 2 diabetes (T2D) risk in most populations studied to date. Meta-analysis of 27 different studies has resulted in a global OR of 1.46 [1.42–1.51] (rs7903146 variant). Thus far, despite a high incidence of T2D, the role of this variant in Arabs has not been established.</p> <p>Methods</p> <p>We performed a case-control association study using 522 Saudi T2D patients (WHO criteria), and 346 controls (age > 60; fasting plasma glucose < 7 mmol/L). Genotyping was performed by pyrosequencing. Statistical analyses were performed using SPSS version 13.0 for Windows (SPSS, Chicago, IL, USA).</p> <p>Results</p> <p>For rs7903146, the T allele frequency of the cases (0.415) was not different from that observed in the controls (0.405). The crude odds ratio (OR) was 1.04 with a 95% CI of 0.86–1.27 (P = 0.675). For rs12255372, the T allele frequency of the cases (0.368) was not different from that observed in the controls (0.355). Retrospective power calculations based upon an OR of 1.46 reported in a comprehensive meta-analysis of <it>TCF7L2 </it>risk, indicated this study was sufficiently powered (96.92%; α = 0.05) to detect an effect of similar magnitude to that reported for rs7903146.</p> <p>Conclusion</p> <p>Our study is consistent with weak or no association of T2D in Arabs with the two <it>TCF7L2 </it>variants, however it cannot rule out an effect of other SNPs in this gene. Future studies in this population are required to confirm our findings and may indicate the presence of yet to be defined genetic risk factors for T2D.</p

    Burnout among surgeons before and during the SARS-CoV-2 pandemic: an international survey

    Get PDF
    Background: SARS-CoV-2 pandemic has had many significant impacts within the surgical realm, and surgeons have been obligated to reconsider almost every aspect of daily clinical practice. Methods: This is a cross-sectional study reported in compliance with the CHERRIES guidelines and conducted through an online platform from June 14th to July 15th, 2020. The primary outcome was the burden of burnout during the pandemic indicated by the validated Shirom-Melamed Burnout Measure. Results: Nine hundred fifty-four surgeons completed the survey. The median length of practice was 10&nbsp;years; 78.2% included were male with a median age of 37&nbsp;years old, 39.5% were consultants, 68.9% were general surgeons, and 55.7% were affiliated with an academic institution. Overall, there was a significant increase in the mean burnout score during the pandemic; longer years of practice and older age were significantly associated with less burnout. There were significant reductions in the median number of outpatient visits, operated cases, on-call hours, emergency visits, and research work, so, 48.2% of respondents felt that the training resources were insufficient. The majority (81.3%) of respondents reported that their hospitals were included in the management of COVID-19, 66.5% felt their roles had been minimized; 41% were asked to assist in non-surgical medical practices, and 37.6% of respondents were included in COVID-19 management. Conclusions: There was a significant burnout among trainees. Almost all aspects of clinical and research activities were affected with a significant reduction in the volume of research, outpatient clinic visits, surgical procedures, on-call hours, and emergency cases hindering the training. Trial registration: The study was registered on clicaltrials.gov "NCT04433286" on 16/06/2020

    Reducing the environmental impact of surgery on a global scale: systematic review and co-prioritization with healthcare workers in 132 countries

    Get PDF
    Abstract Background Healthcare cannot achieve net-zero carbon without addressing operating theatres. The aim of this study was to prioritize feasible interventions to reduce the environmental impact of operating theatres. Methods This study adopted a four-phase Delphi consensus co-prioritization methodology. In phase 1, a systematic review of published interventions and global consultation of perioperative healthcare professionals were used to longlist interventions. In phase 2, iterative thematic analysis consolidated comparable interventions into a shortlist. In phase 3, the shortlist was co-prioritized based on patient and clinician views on acceptability, feasibility, and safety. In phase 4, ranked lists of interventions were presented by their relevance to high-income countries and low–middle-income countries. Results In phase 1, 43 interventions were identified, which had low uptake in practice according to 3042 professionals globally. In phase 2, a shortlist of 15 intervention domains was generated. In phase 3, interventions were deemed acceptable for more than 90 per cent of patients except for reducing general anaesthesia (84 per cent) and re-sterilization of ‘single-use’ consumables (86 per cent). In phase 4, the top three shortlisted interventions for high-income countries were: introducing recycling; reducing use of anaesthetic gases; and appropriate clinical waste processing. In phase 4, the top three shortlisted interventions for low–middle-income countries were: introducing reusable surgical devices; reducing use of consumables; and reducing the use of general anaesthesia. Conclusion This is a step toward environmentally sustainable operating environments with actionable interventions applicable to both high– and low–middle–income countries

    A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2 & OSPF

    Get PDF
    Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given to routing protocols with built-in security constraints. In this paper, we conduct performance evaluation comparisons on MD5 authenticated routing traffic with respect to EIGRP, RIPv2 and OSPF protocols. A network model of four Cisco routers has been employed with an ON/OFF traffic model used to describe text files transmissions over the network. Eventually, analysis tool has been developed and used to measure the average delay time and average jitter. The collected results show that the average delay time and jitter in the secured MD5 case can become significantly larger when compared to the non-secured case even in steady state conditions. Among all, the secured OSPF protocol shows the highest performance even when the system is extremely overloaded
    corecore