172 research outputs found

    Leonard Bloomfields View of Structuralism and Linguistics

    Get PDF
    Leonard Bloomfield is accused of neglecting the meaning of Language and focusing on its structural aspect only The present paper is an attempt to clarify Bloomfield s understanding of linguistics This is done by means of studying his views of structuralism and linguistic

    Image based ECC Mutual Authentication Scheme for Cloud Assisted TMIS

    Get PDF
    In this modern era, cloud-based services like e-commerce, e-gate, and so on provide immense services to humans.    Healthcare centers are gradually moving to cloud-based services. In which, both the hospital and patients are connected remotely online and patient gets treatment quickly. Increasing the demand in Telecare Medical Information System (TMIS) needs to ensure the security and privacy of the healthcare centers and patients’ information. In this paper, we have proposed an e?cient and provably secure Elliptic Curve cryptography image based mutual authentication scheme for cloud assisted TMIS. The proposed authentication schemes ensure the secured treatment provided to patients from healthcare center through online. The patient can upload their health condition data to cloud via mobile device for the treatment.  The proposed authentication scheme required minimum computational cost with minimum communication overhead. The proposed authentication scheme preserves patient anonymity and withstands the known and chosen plaintext attack. The security analysis for the proposed scheme shows that the proposed authentication scheme is more secure. It shows that the proposed authentication scheme is performing well compare to the related authentication schemes

    Heuristic Evaluation of Microsoft Teams as an Online Teaching Platform: An Educators’ Perspective

    Get PDF
    The way that education is delivered changed significantly during the COVID-19 pandemic to be completely online in many countries for many institutions. Despite the fact that they are not online teaching platforms, virtual meeting platforms were utilized to deal with this transformation. One of the platforms Philadelphia University utilized for the unplanned shift to online teaching was Microsoft Teams. This paper examines how heuristic evaluation may be used to guide the evaluation of online meeting platforms for teaching and focuses on the use of heuristic evaluation to assess the level of usability of Microsoft Teams. The level of Zoom’s usability is also evaluated using heuristic evaluation in order to compare it to that of Microsoft Teams and to assess Microsoft Teams’ overall usability in comparison to other platforms being used for the same purpose. Microsoft Teams was identified as having a few issues that need to be addressed. Additionally, strengths, weaknesses, opportunities, and threats to Microsoft Teams’ usability were assessed

    Onboarding Citizens to Digital Identity Systems

    Full text link
    Digital Identity (DI) technologies have the potential to enhance the quality of life of citizens through the provision of seamless services, improve the effectiveness of public services, and increase overall economic competitiveness. However, lack of access to DIs can limit these benefits, while unequal access can lead to uneven distribution of these benefits across social groups and escalate existing tensions. Accessible, user-friendly and efficient onboarding can play a key role in ensuring equitable access and wide adoption of DI technologies. This paper proposes the development of physical locations (Experience Centres) that can be used for citizen onboarding to national DI systems, positively shaping citizens' first impression with the technology and, in turn, promoting adoption. To this end, we outline a multidisciplinary research approach for identifying and addressing the considerations necessary for designing, developing and operating a model Experience Centre for DI onboarding in an inclusive manner.Comment: Accepted Author Manuscript to appear at the International Conference on AI and the Digital Economy, CADE 202

    Twin Pregnancy with a Complete Hydatidiform Mole and a Coexisting Live Fetus : Rare entity

    Get PDF
    A hydatidiform mole with a coexisting live fetus is a rare occurrence and the optimal management for this condition is not yet known. We report the case of a 32-year-old woman (gravida 3, para 2) who presented to the Sultan Qaboos University Hospital, Muscat, Oman, in March 2012 at 13 gestational weeks with abdominal pain and vaginal bleeding. An ultrasound examination revealed a hydatidiform mole pregnancy coexisting with a live fetus. After extensive counselling, the patient and her husband opted for a conservative management approach. Unfortunately, a hysterotomy had to be performed at 17 gestational weeks due to severe haemorrhage. The postoperative period was uneventful and histopathology results confirmed one complete mole with a coexisting fetus and normal placenta. The patient’s serum β-human chorionic gonadotropin level remained normal for 18 months following her surgery

    Deep feature meta-learners ensemble models for Covid-19 CT scan classification

    Get PDF
    The infectious nature of the COVID-19 virus demands rapid detection to quarantine the infected to isolate the spread or provide the necessary treatment if required. Analysis of COVID-19-infected chest Computed Tomography Scans (CT scans) have been shown to be successful in detecting the disease, making them essential in radiology assessment and screening of infected patients. Single-model Deep CNN models have been used to extract complex information pertaining to the CT scan images, allowing for in-depth analysis and thereby aiding in the diagnosis of the infection by automatically classifying the chest CT scan images as infected or non-infected. The feature maps obtained from the final convolution layer of the Deep CNN models contain complex and positional encoding of the images’ features. The ensemble modeling of these Deep CNN models has been proved to improve the classification performance, when compared to a single model, by lowering the generalization error, as the ensemble can meta-learn from a broader set of independent features. This paper presents Deep Ensemble Learning models to synergize Deep CNN models by combining these feature maps to create deep feature vectors or deep feature maps that are then trained on meta shallow and deep learners to improve the classification. This paper also proposes a novel Attentive Ensemble Model that utilizes an attention mechanism to focus on significant feature embeddings while learning the Ensemble feature vector. The proposed Attentive Ensemble model provided better generalization, outperforming Deep CNN models and conventional Ensemble learning techniques, as well as Shallow and Deep meta-learning Ensemble CNNs models. Radiologists can use the presented automatic Ensemble classification models to assist identify infected chest CT scans and save lives

    Protracted Chemical Peritonitis Following Laparoscopy for Dermoid Cyst: A management dilemma

    Get PDF
    Dermoid cysts are common benign ovarian tumors arising from totipotent germ cells. We report a rare case of chemical peritonitis and prolonged fever following laparoscopic salpingo-oophorectomy for torsion of a large ovarian dermoid and discuss the management of this patient with prolonged hospital stay, antibiotics and anti-inflammatory use, repeated drainage of the collection as well as re-laparotomy. The occurrence of this rare condition can be extremely distressing for the patient and treating surgeon alike, as the recommendations for management are limited. The management of chemical peritonitis may require one or more surgical procedures along with prolonged anti-inflammatory therapy. Keywords: peritonitis, dermoid cyst, laparoscop

    A threat based approach to computational offloading for collaborative cruise control

    Get PDF
    The interaction between discrete components of Internet of Things (IoT) and Intelligent Transportation Systems (ITS) is vital for a collaborative system. The secure and reliable use of Cruise Control (CC) with Cloud and Edge Cloud to achieve complete autonomy for a vehicle is a key component and a major challenge for ITS. This research unravels the complications that arise when Adaptive Cruise Control (ACC) is incorporated into a collaborative environment. It mainly answers the question of where to securely compute Collaborative Cruise Control’s (CCC) data in a connected environment. To address this, the paper initially reviews previous research in the domain of Vehicular Cloud, ITS architecture, related threat modelling approaches, and secure implementations of ACC. An overview application model for CCC is developed for performing a threat analysis with the purpose of investigating the reasons why a vehicle suffers collision. Through the use of interviews, the research analyses and suggests the location of computational data by creating a taxonomy between the Edge Cloud, Cloud and the On-board Unit (OBU) while validating the model

    Analysis of cyber risk and associated concentration of research (ACR)² in the security of vehicular edge clouds

    Get PDF
    Intelligent Transportation Systems (ITS) is a rapidly growing research space with many issues and challenges. One of the major concerns is to successfully integrate connected technologies, such as cloud infrastructure and edge cloud, into ITS. Security has been identified as one of the greatest challenges for the ITS, and security measures require consideration from design to implementation. This work focuses on providing an analysis of cyber risk and associated concentration of research (ACR2). The introduction of ACR2 approach can be used to consider research challenges in VEC and open up further investigation into those threats that are important but under-researched. That is, the approach can identify very high or high risk areas that have a low research concentration. In this way, this research can lay the foundations for the development of further work in securing the future of ITS
    • …
    corecore