95 research outputs found

    Biometric Security Through Visual Encryption for Fog Edge Computing

    Get PDF
    Fog and mobile edge computing have gained considerable attention from the research and development community. The problems related to security and privacy of biometric content are simpler to solve through edge computing resulting in improved security and privacy of biometric and other critically private information. Zero-watermarking has been proposed as a solution to help protect the ownership of multimedia content that is easy to copy and distribute. Visual cryptography is another approach to secure data that is to be shared through generating multiple shares. This paper is concerned with developing a biometric security solution for face images, using visual cryptography and zero-watermarking, that does not adversely impact the visual quality of the image. The original face image is not modified through the zero-watermarking and visual encryption procedures and this in turn does not adversely impact the recognition rate

    Effect of autoclave sterilisation and heat activated sodium hypochlorite irrigation on the performance of nickel-titanium rotary files against cyclic fatigue

    Get PDF
    The present study aims to assess the impact of heat-activated sodium hypochlorite (NaOCl) and/or autoclave sterilisation on the cyclic fatigue resistance (CFR) of heat-treated nickel-titanium rotary files used in root canal treatment. The CFR of One Curve (OC) files was evaluated under the following conditions: as received (Group 1; control), immersion in NaOCl at 23 ± 1ÂșC (Group 2), immersion in NaOCl at 60 ± 1ÂșC (Group 3), autoclave sterilisation at 135 1ÂșC (Group 4), combined treatment of autoclave sterilisation and immersion in NaOCl at 23 ± 1ÂșC (Group 5), and combined treatment of autoclave sterilisation and immersion in NaOCl at 60 ± 1ÂșC (Group 6). A simulated root canal in a zirconia block was utilised to test the performance of the files. All the types of treatments resulted in significant reductions in fracture resistance of the OC files. Immersion of the files in NaOCl at 23ÂșC revealed the smallest reduction, while combined treatment of autoclaving and immersion in NaOCl at 60ÂșC caused the greatest reduction. Autoclave sterilisation or exposure of OC files to 2.5% NaOCl adversely affect the cyclic fatigue life and increasing solution temperature or combined treatment caused additionally significant reduction in CFR

    Characterization of greater middle eastern genetic variation for enhanced disease gene discovery

    Get PDF
    The Greater Middle East (GME) has been a central hub of human migration and population admixture. The tradition of consanguinity, variably practiced in the Persian Gulf region, North Africa, and Central Asia1-3, has resulted in an elevated burden of recessive disease4. Here we generated a whole-exome GME variome from 1,111 unrelated subjects. We detected substantial diversity and admixture in continental and subregional populations, corresponding to several ancient founder populations with little evidence of bottlenecks. Measured consanguinity rates were an order of magnitude above those in other sampled populations, and the GME population exhibited an increased burden of runs of homozygosity (ROHs) but showed no evidence for reduced burden of deleterious variation due to classically theorized ‘genetic purging’. Applying this database to unsolved recessive conditions in the GME population reduced the number of potential disease-causing variants by four- to sevenfold. These results show variegated genetic architecture in GME populations and support future human genetic discoveries in Mendelian and population genetics

    Canine Brachycephaly is Associated with a Retrotransposon-Mediated Missplicing of SMOC2

    Get PDF
    In morphological terms, “form” is used to describe an object’s shape and size. In dogs, facial form is stunningly diverse. Facial retrusion, the proximodistal shortening of the snout and widening of the hard palate is common to brachycephalic dogs and is a welfare concern, as the incidence of respiratory distress and ocular trauma observed in this class of dogs is highly correlated with their skull form. Progress to identify the molecular underpinnings of facial retrusion is limited to association of a missense mutation in BMP3 among small brachycephalic dogs. Here, we used morphometrics of skull isosurfaces derived from 374 pedigree and mixed-breed dogs to dissect the genetics of skull form. Through deconvolution of facial forms, we identified quantitative trait loci that are responsible for canine facial shapes and sizes. Our novel insights include recognition that the FGF4 retrogene insertion, previously associated with appendicular chondrodysplasia, also reduces neurocranium size. Focusing on facial shape, we resolved a quantitative trait locus on canine chromosome 1 to a 188-kb critical interval that encompasses SMOC2. An intronic, transposable element within SMOC2 promotes the utilization of cryptic splice sites, causing its incorporation into transcripts, and drastically reduces SMOC2 gene expression in brachycephalic dogs. SMOC2 disruption affects the facial skeleton in a dose-dependent manner. The size effects of the associated SMOC2 haplotype are profound, accounting for 36% of facial length variation in the dogs we tested. Our data bring new focus to SMOC2 by highlighting its clinical implications in both human and veterinary medicine

    Information security management : a case study of an information security culture

    Get PDF
    This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area

    Common Bile Duct Stone Formed around a Migrated Clip: An Unexpected Complication of Laparoscopic Cholecystectomy

    No full text
    Surgical clip migration into the common bile duct with subsequent stone formation is a rare complication following laparoscopic cholecystectomy. Very few cases have been reported in the literature. We report a case of bile duct stone formation around a migrated surgical clip 16 years after laparoscopic cholecystectomy. The patient presented with right upper quadrant pain, fever, and chills for one week. Investigation with abdominal ultrasound showed dilatation of the common bile duct and moderate dilatation of the intrahepatic bile ducts. The diagnosis was confirmed by endoscopic retrograde cholangiopancreatography and the patient was managed successfully with sphincterotomy and stone extraction. The exact mechanism of clip migration is not fully understood. Presenting symptoms are similar to non-clip-induced choledocholithiasis. Time of presentation can vary significantly with an average of 26 months. Most cases reported in the literature required surgical intervention. Clip migration should be considered in the differential diagnosis of postcholecystectomy biliary colic and cholangitis. Management with endoscopic retrograde cholangiopancreatography is the treatment of choice

    Clinical features and visual outcomes of scleritis patients presented to tertiary care eye centers in Saudi Arabia

    No full text
    <AIM:> To describe the clinical features, systemic associations, treatment and visual outcomes in Saudi patients with scleritis. <METHODS:> A retrospective chart review was performed for patients with scleritis presenting to two tertiary care eye hospitals in Riyadh, Saudi Arabia, from 2001 to 2011. Data were collected on the clinical features of scleritis, subtypes of scleritis, associated systemic disease, history of previous ocular surgery and medical therapy, including the use of immunosuppressants. Treatment outcomes were evaluated based on best-corrected visual acuity (BCVA) and response to treatment. <RESULTS: >Of the 52 patients included in the study, non-necrotizing anterior scleritis was the most common type of scleritis in 22 patients (42.3%), followed by posterior scleritis in 14 patients (26.9%). The majority of cases, 31 patients (59.6%), were idiopathic in nature. Systemic associations were present in 12 patients (23.1%). Infectious scleritis was confirmed in 6 patients (11.5%): 3 with bacterial scleritis after pterygium excision, 2 patients with scleritis related to tuberculosis and 1 patient with scleritis resulting from herpes simplex infection. For the various subtypes of scleritis, BCVA values after treatment and time to remission significantly differed (P<0.05, all cases). Systemic immunosuppressive therapies in addition to steroids were administered to 46.2% of all patients. The T-sign was present on B-scan ultrasonography in 9 (64.3%) of the 14 posterior scleritis patients. <CONCLUSION: > Non-necrotizing anterior scleritis was the most common subtype of scleritis. Final visual outcome and time to remission differed among the various scleritis subtypes
    • 

    corecore