8 research outputs found

    A review of graph-based extractive text summarization models

    No full text
    The amount of text data is continuously increasing both at online and offline storage, that makes is difficult for people to read across and find the desired information within a possible available time. This necessitate the use of technique such as automatic text summarization. A text summary is the briefer form of the original text, in which the principal document message is preserved. Many approaches and algorithms have been proposed for automatic text summarization including, supervised machine learning, clustering, graph-based and lexical chain, among others. This paper presents a review of various graph-based automatic text summarization models

    Graph-based extractive text summarization models: a systematic review

    No full text
    The volume of digital text data is continuously increasing both online and offline storage, which makes it difficult to read across documents on a particular topic and find the desired information within a possible available time. This necessitates the use of technique such as automatic text summarization. Many approaches and algorithms have been proposed for automatic text summarization including; supervised machine learning, clustering, graph-based and lexical chain, among others. This paper presents a novel systematic review of various graph-based automatic text summarization models

    Endovascular suction thrombectomy for severe cerebral venous sinus thrombosis: A report of two cases

    No full text
    Cerebral venous sinus thrombosis (CVST) is a severe clinical condition that manifests with diverse symptoms that can be mild, taking the form of a headache, or can be life-threatening, with raised intracranial pressure and herniation. Despite systemic anticoagulation treatment, CVST still carries a mortality risk of approximately 10% because of the failure of venous recanalization by anticoagulants alone. This paper describes two cases with extensive CVST who presented with progressive neurological deterioration despite adequate systemic anticoagulation treatment. Both patients were successfully treated with endovascular clot removal using suction thrombectomy techniques with immediate recanalization of the sinuses and rapid radiographic improvement. The described therapy appears effective and safe; however, further studies are needed to validate the effectiveness of this treatment

    Provably Secure with Efficient Data Sharing Scheme for Fifth-Generation (5G)-Enabled Vehicular Networks without Road-Side Unit (RSU)

    No full text
    The vehicles in the fifth-generation (5G)-enabled vehicular networks exchange the data about road conditions, since the message transmission rate and the downloading service rate have been considerably brighter. The data shared by vehicles are vulnerable to privacy and security issues. Notably, the existing schemes require expensive components, namely a road-side unit (RSU), to authenticate the messages for the joining process. To cope with these issues, this paper proposes a provably secure efficient data-sharing scheme without RSU for 5G-enabled vehicular networks. Our work included six phases, namely: TA initialization (TASetup) phase, pseudonym-identity generation (PIDGen) phase, key generation (KeyGen) phase, message signing (MsgSign) phase, single verification (SigVerify) phase, and batch signatures verification (BSigVerify) phase. The vehicle in our work has the ability to verify multiple signatures simultaneously. Our work not only achieves privacy and security requirements but also withstands various security attacks on the vehicular network. Ultimately, our work also evaluates favourable performance compared to other existing schemes with regards to costs of communication and computation

    CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks

    No full text
    The security and privacy concerns in vehicular communication are often faced with schemes depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the operations used by BP and EC are time-consuming and more complicated. None of the previous studies fittingly tackled the efficient performance of signing messages and verifying signatures. Therefore, a chaotic map-based conditional privacy-preserving authentication (CM-CPPA) scheme is proposed to provide communication security in 5G-enabled vehicular networks in this paper. The proposed CM-CPPA scheme employs a Chebyshev polynomial mapping operation and a hash function based on a chaotic map to sign and verify messages. Furthermore, by using the AVISPA simulator for security analysis, the results of the proposed CM-CPPA scheme are good and safe against general attacks. Since EC and BP operations do not employ the proposed CM-CPPA scheme, their performance evaluation in terms of overhead such as computation and communication outperforms other most recent related schemes. Ultimately, the proposed CM-CPPA scheme decreases the overhead of computation of verifying the signatures and signing the messages by 24.2% and 62.52%, respectively. Whilst, the proposed CM-CPPA scheme decreases the overhead of communication of the format tuple by 57.69%

    Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular Communications

    No full text
    Vehicular fog systems that are enabled by fifth-generation (5G) networks can significantly improve traffic safety and efficiency through vehicle-to-vehicle communication. Vehicles must have their legal status verified before they can join the network, as vehicular systems depend on open communication. Consequently, several anonymous authentication schemes have been created to withstand malicious vehicles, with the foundations being bilinear pairing or elliptic curve cryptography. But quantum attacks can easily defeat these schemes. To address this problem, this study introduces a 5G-supported vehicular fog system anonymous authentication strategy that makes use of lattice-based cryptography. The suggested system communicates with trusted authorities (TAs) and automobiles over the 5G-base station’s communication range, and it employs fog servers to authenticate vehicles and distribute anonymous data. By recognizing the cars and the users they are affiliated with, the TA in the suggested method can keep tabs on everyone working on a specific task. With the use of ProVerif, a protocol verification tool, we were able to determine that our authentication mechanism effectively hides user, vehicle, and fog server data. After calculating the associated computation and transmission costs, we integrated the suggested technique with state-of-the-art anonymous authentication utilizing lattice-based encryption to ward off quantum attacks. The computational costs of the proposal technique for message signing and batch/single verification are 0.3149 ms, 0.0724 ms, and 0.0724 n ms, respectively. Whereas, 18448 bits is the communication cost of the suggested method. Thus, the results show that our solution has a reduced processing cost for creating and verifying message signatures, but a much higher transmission cost

    Pancreatic surgery outcomes: multicentre prospective snapshot study in 67 countries

    No full text
    Background: Pancreatic surgery remains associated with high morbidity rates. Although postoperative mortality appears to have improved with specialization, the outcomes reported in the literature reflect the activity of highly specialized centres. The aim of this study was to evaluate the outcomes following pancreatic surgery worldwide.Methods: This was an international, prospective, multicentre, cross-sectional snapshot study of consecutive patients undergoing pancreatic operations worldwide in a 3-month interval in 2021. The primary outcome was postoperative mortality within 90 days of surgery. Multivariable logistic regression was used to explore relationships with Human Development Index (HDI) and other parameters.Results: A total of 4223 patients from 67 countries were analysed. A complication of any severity was detected in 68.7 percent of patients (2901 of 4223). Major complication rates (Clavien-Dindo grade at least IIIa) were 24, 18, and 27 percent, and mortality rates were 10, 5, and 5 per cent in low-to-middle-, high-, and very high-HDI countries respectively. The 90-day postoperative mortality rate was 5.4 per cent (229 of 4223) overall, but was significantly higher in the low-to-middle-HDI group (adjusted OR 2.88, 95 per cent c.i. 1.80 to 4.48). The overall failure-to-rescue rate was 21 percent; however, it was 41 per cent in low-to-middle-compared with 19 per cent in very high-HDI countries.Conclusion: Excess mortality in low-to-middle-HDI countries could be attributable to failure to rescue of patients from severe complications. The authors call for a collaborative response from international and regional associations of pancreatic surgeons to address management related to death from postoperative complications to tackle the global disparities in the outcomes of pancreatic surgery (NCT04652271; ISRCTN95140761)

    Pancreatic surgery outcomes: multicentre prospective snapshot study in 67 countries

    No full text
    corecore