98 research outputs found
Evaluation of the Omni-Secure Firewall System in a private cloud environment:Knowledge
This research explores the optimization of firewall systems within private cloud environments, specifically focusing on a 30-day evaluation of the Omni-Secure Firewall. Employing a multi-metric approach, the study introduces an innovative effectiveness metric (E) that amalgamates precision, recall, and redundancy considerations. The evaluation spans various machine learning models, including random forest, support vector machines, neural networks, k-nearest neighbors, decision tree, stochastic gradient descent, naive Bayes, logistic regression, gradient boosting, and AdaBoost. Benchmarking against service level agreement (SLA) metrics showcases the Omni-Secure Firewall’s commendable performance in meeting predefined targets. Noteworthy metrics include acceptable availability, target response time, efficient incident resolution, robust event detection, a low false-positive rate, and zero data-loss incidents, enhancing the system’s reliability and security, as well as user satisfaction. Performance metrics such as prediction latency, CPU usage, and memory consumption further highlight the system’s functionality, efficiency, and scalability within private cloud environments. The introduction of the effectiveness metric (E) provides a holistic assessment based on organizational priorities, considering precision, recall, F1 score, throughput, mitigation time, rule latency, and redundancy. Evaluation across machine learning models reveals variations, with random forest and support vector machines exhibiting notably high accuracy and balanced precision and recall. In conclusion, while the Omni-Secure Firewall System demonstrates potential, inconsistencies across machine learning models underscore the need for optimization. The dynamic nature of private cloud environments necessitates continuous monitoring and adjustment of security systems to fully realize benefits while safeguarding sensitive data and applications. The significance of this study lies in providing insights into optimizing firewall systems for private cloud environments, offering a framework for holistic security assessment and emphasizing the need for robust, reliable firewall systems in the dynamic landscape of private clouds. Study limitations, including the need for real-world validation and exploration of advanced machine learning models, set the stage for future research directions
Rupture of the Distal Biceps Tendon Combined with a Supinator Muscle Tear in a 51-Year-Old Woman: A Case Report
Distal biceps tendon rupture is a relatively uncommon occurrence in the general female population, and to our knowledge, has not been reported in association with a supinator muscle tear. We report a case of 51-year-old woman who experienced sharp pain in her forearm and elbow after lifting a heavy object. History and physical examination raised suspicion for a distal biceps tendon rupture. MRI imaging determined a combined distal biceps tendon tear with a supinator muscle tear with subsequent confirmation at surgery. Surgical repair was performed for the distal biceps tendon only through a single incision approach using the Endobutton technique
Frequency of different groove patterns seen on the occlusal surface of mandibular second premolars
Background: The Mandibular second premolar has commonly three different type traits depending on the occlusal groove patterns. In addition to that they are also recognized on the basis of number of cusps. The objectives of the study were to determine the frequency of different occlusal groove patterns of mandibular second premolars and to acquire base line data for future studies in this population and field of research.Material and Methods: This study was conducted in Islamabad Dental Hospital (IDH), from September 2017 to December 2017. A total of 600 patients (1200 teeth) with fully erupted mandibular second premolars of normal occlusal morphology, in age group of 15 years and above were screened in the Out Patient Department (OPD). Groove patterns on occlusal surfaces and their anatomical variations on both sides i.e. right and left, were observed and noted in a proforma. Data was analyzed using SPSS version 22.Results: Three different patterns of occlusal grooves (Y, U and H) were found in our study population. Y groove pattern was observed in 364 teeth (30.33%), U pattern in 447 teeth (37.25%) and H pattern was noted in 389 (32.41%) teeth. Among males, U pattern was predominant (43.84%) followed by H and then Y pattern. In females, H pattern grooves was found mostly (34.41%), followed by Y and U pattern.Conclusion: The most frequent occlusal groove pattern observed in our population was U followed by H and Y type
Complications Using Bioabsorbable Cross-Pin Femoral Fixation: A Case Report and Review of the Literature
The use of bioabsorbable cross-pin transcondylar fixation has remained a viable option for femoral fixation in anterior cruciate ligament reconstruction. Although numerous biomechanical studies have demonstrated high fixation strength and minimal slippage with use of this method of fixation, there have been increasing reports of a variety of clinical complications associated with these implants. We reviewed the literature for all complications associated with the Bio-TransFix implant and present a case report of a patient status after ACL reconstruction using Bio-TransFix cross-pin femoral fixation with iliotibial band friction syndrome from a broken cross-pin four month post-operatively
Group Work Assessment: Assessing Peer Assessment at Global College of Engineering and Technology
Students learning and autonomy can be improved by involving them in teaching and learning, especially in group work assessments, this can also greatly help cut down the amount of time spent by teachers on marking and providing feedback. Although peer assessment of student work can also accomplish these goals, but its application is frequently restricted to evaluating each participant's input or participation to a cooperative effort. This paper reports the considerations and lesson learnt to successfully develop a group work assessment and marked based on the individual’s contribution to avoid conflicts. It’s worth mentioning that the peer-assessed marks are not significantly different from those allocated by faculty based on evaluative criteria, quality definitions, and a scoring strategy
The missing link in knowledge sharing: the crucial role of supervisor support- moderated mediated model
Purpose
The purpose of current study was to investigate the impact of supervisor support on Knowledge Sharing Behavior through psychological well-being, psychological ownership, and Alturism. The study also took mindfulness as first path moderator in the relation to supervisor support and psychological well-being, and psychological ownership.
Design/methodology/approach
Positivism research philosophy followed by the deductive approach is followed to meet the objectives of the current study. A total of 219 employees from the telecom sector were identified as the respondents of the study. A purposive sampling technique was used to collect the data through self-administrated questionnaires. Exploratory and confirmatory factor analyses were used through AMOS to generate the results and test hypotheses.
Findings
The results suggested that supervisor support significantly contributes to the achievement of the knowledge-sharing behavior of employees with the chain of mediation, i.e. psychological well-being, ownership and altruism. Similarly, the moderating role of mindfulness is significant in the relationship between supervisor support and psychological well-being.
Originality/value
Although a number of researchers have studied the link between supervisor support and other employees related attitudinal and behavioral outcomes, few have explored the roles of psychological ownership, well-being and altruism in the relationship of knowledge sharing behavior. This study thus posits a novel sequential mediation and moderation mechanism, based on the social exchange theory, through which supervisor support is translated into knowledge sharing behavior
A biomechanical comparison between locked 3.5-mm plates and 4.5-mm plates for the treatment of simple bicondylar tibial plateau fractures: is bigger necessarily better?
BACKGROUND: Evolution of periarticular implant technology has led to stiffer, more stable fixation constructs. However, as plate options increase, comparisons between different sized constructs have not been performed. The purpose of this study is to biomechanically assess any significant differences between 3.5- and 4.5-mm locked tibial plateau plates in a simple bicondylar fracture model. MATERIALS AND METHODS: A total of 24 synthetic composite bone models (12 Schatzker V and 12 Schatzker VI) specimens were tested. In each group, six specimens were fixed with a 3.5-mm locked proximal tibia plate and six specimens were fixed with a 4.5-mm locking plate. Testing measures included axial ramp loading to 500 N, cyclic loading to 10,000 cycles and axial load to failure. RESULTS: In the Schatzker V comparison model, there were no significant differences in inferior displacement or plastic deformation after 10, 100, 1,000 and 10,000 cycles. In regards to axial load, the 4.5-mm plate exhibited a significantly higher load to failure (P = 0.05). In the Schatzker VI comparison model, there were significant differences in inferior displacement or elastic deformation after 10, 100, 1,000, and 10,000 cycles. In regards to axial load, the 4.5-mm plate again exhibited a higher load to failure, but this was not statistically significant (P = 0.21). CONCLUSIONS: In the advent of technological advancement, periarticular locking plate technology has offered an invaluable option in treating bicondylar tibial plateau fractures. Comparing the biomechanical properties of 3.5- and 4.5-mm locking plates yielded no significant differences in cyclic loading, even in regards to elastic and plastic deformation. Not surprisingly, the 4.5-mm plate was more robust in axial load to failure, but only in the Schatzker V model. In our testing construct, overall, without significant differences, the smaller, lower-profile 3.5-mm plate seems to be a biomechanically sound option in the reconstruction of bicondylar plateau fractures
Privacy preserving and serverless homomorphic-based searchable encryption as a service (SEaaS)
Serverless computing has seen rapid growth, thanks to its adaptability, elasticity, and deployment agility, embraced by both cloud providers and users. However, this surge in serverless adoption has prompted a reevaluation of security concerns and thus, searchable encryption has emerged as a crucial technology. This paper explores the Searchable Encryption as a Service (SEaaS) and introduces an innovative privacy-preserving Multiple Keyword Searchable Encryption (MKSE) scheme within a serverless cloud environment, addressing previously unmet security goals. The proposed scheme employs probabilistic encryption and leverages fully homomorphic encryption to enable operations on ciphertext, facilitating searches on encrypted data. Its core innovation lies in the use of probabilistic encryption for private multi-keyword searches. To validate its practicality, we deploy the scheme on the public cloud infrastructure, “Contabo,” and conduct rigorous testing on a real-world dataset. The results demonstrate that our novel scheme successfully preserves the privacy of search queries and access patterns, achieving robust security. This research contributes to the field of serverless cloud security, particularly in the context of searchable encryption, by providing a refined solution for safeguarding data while maintaining usability in a serverless computing landscape
- …