23 research outputs found

    From Conventional to State-of-the-Art IoT Access Control Models

    Get PDF
    open access articleThe advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices. The domain of internet of things uses billions of devices (ranging from tiny sensors to macro scale devices) that continuously produce and exchange huge amounts of data with people and applications. Similarly, more than a billion people are connected through social networking sites to collaborate and share their knowledge. The applications of IoT such as smart health, smart city, social networking, video surveillance and vehicular communication are quickly evolving people’s daily lives. These applications provide accurate, information-rich and personalized services to the users. However, providing personalized information comes at the cost of accessing private information of users such as their location, social relationship details, health information and daily activities. When the information is accessible online, there is always a chance that it can be used maliciously by unauthorized entities. Therefore, an effective access control mechanism must be employed to ensure the security and privacy of entities using OSN and IoT services. Access control refers to a process which can restrict user’s access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others. This survey examines the increasing literature on access control for traditional models in general, and for OSN and IoT in specific. Challenges and problems related to access control mechanisms are explored to facilitate the adoption of access control solutions in OSN and IoT scenarios. The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access control models. We evaluate the feasibility of current access control models for OSN and IoT and provide the future development direction of access control for the sam

    Prevalence And Risk Factors of Eye Allergies Among Adults In Ksa: A Cross-Sectional Study

    Get PDF
    Objective: To determine the prevalence of eye allergies and associated risk factors among adults in KSA. Methods: This research employs a cross-sectional study design to assess the prevalence and risk factors of eye allergies among adults in the Kingdom of Saudi Arabia (KSA). A cross-sectional approach allows for the collection of data at a single point in time, providing a snapshot of the condition's status within the study population. Results: The study included 640 participants. The most frequent age among them was 18-28 years (n= 331, 51.7%), followed by 40-50 years (n= 139, 21.7%). The most frequent gender among study participants was female (n= 389, 60.8%) followed by male (n= 251, 39.2 The most frequent nationality among study participants was Saudi (n= 613, 95.8%) followed by non-Saudi (n= 27, 4.2%). The educational level among study participants with most of them being the university (n= 553, 86.4%) followed by the school (n= 85, 13.3%). The work nature among study participants with most of was inside the building. Participants were asked if they had an eye problem that affected their daily life. The most frequent answer was moderately (n= 309, 48.3%) followed by never (n= 271, 42.3%), and the least was a lot (n=60, 9.4%).  Conclusion: The results of the study showed that most of the study participants are Saudis and most of them work inside the building. The majority have university education, and the largest percentage of participants are women. Most of the participants are non-smokers. Most study participants had good social communication

    Burnout among surgeons before and during the SARS-CoV-2 pandemic: an international survey

    Get PDF
    Background: SARS-CoV-2 pandemic has had many significant impacts within the surgical realm, and surgeons have been obligated to reconsider almost every aspect of daily clinical practice. Methods: This is a cross-sectional study reported in compliance with the CHERRIES guidelines and conducted through an online platform from June 14th to July 15th, 2020. The primary outcome was the burden of burnout during the pandemic indicated by the validated Shirom-Melamed Burnout Measure. Results: Nine hundred fifty-four surgeons completed the survey. The median length of practice was 10 years; 78.2% included were male with a median age of 37 years old, 39.5% were consultants, 68.9% were general surgeons, and 55.7% were affiliated with an academic institution. Overall, there was a significant increase in the mean burnout score during the pandemic; longer years of practice and older age were significantly associated with less burnout. There were significant reductions in the median number of outpatient visits, operated cases, on-call hours, emergency visits, and research work, so, 48.2% of respondents felt that the training resources were insufficient. The majority (81.3%) of respondents reported that their hospitals were included in the management of COVID-19, 66.5% felt their roles had been minimized; 41% were asked to assist in non-surgical medical practices, and 37.6% of respondents were included in COVID-19 management. Conclusions: There was a significant burnout among trainees. Almost all aspects of clinical and research activities were affected with a significant reduction in the volume of research, outpatient clinic visits, surgical procedures, on-call hours, and emergency cases hindering the training. Trial registration: The study was registered on clicaltrials.gov "NCT04433286" on 16/06/2020

    Global overview of the management of acute cholecystitis during the COVID-19 pandemic (CHOLECOVID study)

    Get PDF
    Background: This study provides a global overview of the management of patients with acute cholecystitis during the initial phase of the COVID-19 pandemic. Methods: CHOLECOVID is an international, multicentre, observational comparative study of patients admitted to hospital with acute cholecystitis during the COVID-19 pandemic. Data on management were collected for a 2-month study interval coincident with the WHO declaration of the SARS-CoV-2 pandemic and compared with an equivalent pre-pandemic time interval. Mediation analysis examined the influence of SARS-COV-2 infection on 30-day mortality. Results: This study collected data on 9783 patients with acute cholecystitis admitted to 247 hospitals across the world. The pandemic was associated with reduced availability of surgical workforce and operating facilities globally, a significant shift to worse severity of disease, and increased use of conservative management. There was a reduction (both absolute and proportionate) in the number of patients undergoing cholecystectomy from 3095 patients (56.2 per cent) pre-pandemic to 1998 patients (46.2 per cent) during the pandemic but there was no difference in 30-day all-cause mortality after cholecystectomy comparing the pre-pandemic interval with the pandemic (13 patients (0.4 per cent) pre-pandemic to 13 patients (0.6 per cent) pandemic; P = 0.355). In mediation analysis, an admission with acute cholecystitis during the pandemic was associated with a non-significant increased risk of death (OR 1.29, 95 per cent c.i. 0.93 to 1.79, P = 0.121). Conclusion: CHOLECOVID provides a unique overview of the treatment of patients with cholecystitis across the globe during the first months of the SARS-CoV-2 pandemic. The study highlights the need for system resilience in retention of elective surgical activity. Cholecystectomy was associated with a low risk of mortality and deferral of treatment results in an increase in avoidable morbidity that represents the non-COVID cost of this pandemic

    Some more bounded and singular pulses of a generalized scale-invariant analogue of the Korteweg–de Vries equation

    No full text
    We investigate a generalized scale-invariant analogue of the Korteweg–de Vries (KdV) equation, establishing a connection with the recently discovered short-wave intermediate dispersive variable (SIdV) equation. To conduct a comprehensive analysis, we employ the Generalized Kudryashov Technique (KT), Modified KT, and the sine–cosine method. Through the application of these advanced methods, a diverse range of traveling wave solutions is derived, encompassing both bounded and singular types. Among these solutions are dark and bell-shaped waves, as well as periodic waves. Significantly, our investigation reveals novel solutions that have not been previously documented in existing literature. These findings present novel contributions to the field and offer potential applications in various physical phenomena, enhancing our understanding of nonlinear wave equations

    A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions

    No full text
    A network of agents constituted of multiple unmanned aerial vehicles (UAVs) is emerging as a promising technology with myriad applications in the military, public, and civil domains. UAVs’ power, memory, and size constraints, ultra-mobile nature, and non-trusted operational environments make them susceptible to various attacks, including physical capturing and cloning attacks. A robust and resilient security protocol should be lightweight and resource-efficient in addition to providing protection against physical and tampering threats. This paper proposes an authentication protocol for a UAV-based multi-agent system robust against various threats and adversaries, including strong resistance against cloning and physical attacks. The proposed protocol is based on a physical unclonable function (PUF), a well-known hardware security primitive that is utilized for low-cost authentication and cryptographic key generation. The analysis of the proposed approach shows that it provides strong protection against various attacks, including tampering and cloning, and exhibits scalability and energy efficiency

    A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions

    No full text
    A network of agents constituted of multiple unmanned aerial vehicles (UAVs) is emerging as a promising technology with myriad applications in the military, public, and civil domains. UAVs’ power, memory, and size constraints, ultra-mobile nature, and non-trusted operational environments make them susceptible to various attacks, including physical capturing and cloning attacks. A robust and resilient security protocol should be lightweight and resource-efficient in addition to providing protection against physical and tampering threats. This paper proposes an authentication protocol for a UAV-based multi-agent system robust against various threats and adversaries, including strong resistance against cloning and physical attacks. The proposed protocol is based on a physical unclonable function (PUF), a well-known hardware security primitive that is utilized for low-cost authentication and cryptographic key generation. The analysis of the proposed approach shows that it provides strong protection against various attacks, including tampering and cloning, and exhibits scalability and energy efficiency

    Early versus interval cholecystectomy for acute cholecystitis: 5 years local experience

    No full text
    Early laparoscopic cholecystectomy for acute cholecystitis is technically demanding procedure associated with more rate of conversion to open cholecystectomy and more complications. Recently some studies demonstrate the feasibility of laparoscopic cholecystectomy for acute cholecystitis. However, many surgeons still prefer delayed laparoscopic cholecystectomy for acute cholecystitis. Our aim of this prospective randomized study was to compare the operative time, conversion rate, hospital stay, outcome and cost of early versus delayed laparoscopic cholecystectomy for acute cholecystitis Patients and Methods. Between January 2010and January 2015, 62patients with a diagnosis of acute cholecystitis underwent early laparoscopic cholecystectomy within 72 h of admission (group I). This study group was compared with a control group of 114patients of acute cholecystitis, who underwent delayed laparoscopic cholecystectomy after an initial period of conservative treatment (group II). Results. There was no significant difference in the conversion rates (3 in group I versus 2 in group II), duration of postoperative stay (2days in group I versus 3.5 days in group II) postoperative analgesia requirements and postoperative pain scores. However, duration of surgery was significantly more in group I (110 minutes versus 85 minutes in group II).No mortality was seen in either group. Total costs were higher (6450 ± 875.4 versus 8570 ± 775 Saudi Ryal; P = 0.0001) in group II patients. Conclusions. Early laparoscopic cholecystectomy for acute cholecystitis is safe, feasible, with shorter hospital stay and cost effective management of acute cholecystitis cases

    Inhibition of ITK Signaling Causes Amelioration in Sepsis-Associated Neuroinflammation and Depression-like State in Mice

    No full text
    Sepsis affects millions of people worldwide and is associated with multiorgan dysfunction that is a major cause of increased morbidity and mortality. Sepsis is associated with several morbidities, such as lung, liver, and central nervous system (CNS) dysfunction. Sepsis-associated CNS dysfunction usually leads to several mental problems including depression. IL-17A is one of the crucial cytokines that is expressed and secreted by Th17 cells. Th17 cells are reported to be involved in the pathogenesis of depression and anxiety in humans and animals. One of the protein tyrosine kinases that plays a key role in controlling the development/differentiation of Th17 cells is ITK. However, the role of ITK in sepsis-associated neuroinflammation and depression-like symptoms in mice has not been investigated earlier. Therefore, this study investigated the efficacy of the ITK inhibitor, BMS 509744, in sepsis-linked neuroinflammation (ITK, IL-17A, NFkB, iNOS, MPO, lipid peroxides, IL-6, MCP-1, IL-17A) and a battery of depression-like behavioral tests, such as sucrose preference, tail suspension, and the marble burying test. Further, the effect of the ITK inhibitor on anti-inflammatory signaling (Foxp3, IL-10, Nrf2, HO-1, SOD-2) was assessed in the CNS. Our data show that sepsis causes increased ITK protein expression, IL-17A signaling, and neuroinflammatory mediators in the CNS that are associated with a depression-like state in mice. ITK inhibitor-treated mice with sepsis show attenuated IL-17A signaling, which is associated with the upregulation of IL-10/Nrf2 signaling and the amelioration of depression-like symptoms in mice. Our data show, for the first time, that the ITK inhibition strategy may counteract sepsis-mediated depression through a reduction in IL-17A signaling in the CNS

    Using algorithmic trading to analyze short term profitability of Bitcoin

    No full text
    Abstract Cryptocurrencies such as Bitcoin (BTC) have seen a surge in value in the recent past and appeared as a useful investment opportunity for traders. However, their short term profitability using algorithmic trading strategies remains unanswered. In this work, we focus on the short term profitability of BTC against the euro and the yen for an eight-year period using seven trading algorithms over trading periods of length 15 and 30 days. We use the classical buy and hold (BH) as a benchmark strategy. Rather surprisingly, we found that on average, the yen is more profitable than BTC and the euro; however the answer also depends on the choice of algorithm. Reservation price algorithms result in 7.5% and 10% of average returns over 15 and 30 days respectively which is the highest for all the algorithms for the three assets. For BTC, all algorithms outperform the BH strategy. We also analyze the effect of transaction fee on the profitability of algorithms for BTC and observe that for trading period of length 15 no trading strategy is profitable for BTC. For trading period of length 30, only two strategies are profitable
    corecore