1,146 research outputs found

    Modified Elliptic Curve Discrete Log Problem: A New One-Way Function and its Cryptanalysis

    Get PDF
    In this paper we explain the concept of the one-way functions and their use in cryptography. We explain in detail the use of one-way function like Integer factorization and it use in RSA algorithm. We describe its cryptanalysis. We explain the discrete log problem and its cryptanalysis. We introduce a novel one-way function called Modified Elliptic Curve discrete log problem (MECDLP). We explain its cryptanalysis also

    Multi-threshold Control of the BMAP/SM/1/K Queue with Group Services

    Get PDF
    We consider a finite capacity queue in which arrivals occur according to a batch Markovian arrival process (BMAP). The customers are served in groups of varying sizes. The services are governed by a controlled semi-Markovian process according to a multithreshold strategy. We perform the steady-state analysis of this model by computing (a) the queue length distributions at departure and arbitrary epochs, (b) the Laplace-Stieltjes transform of the sojourn time distribution of an admitted customer, and (c) some selected system performance measures. An optimization problem of interest is presented and some numerical examples are illustrated

    Ultrasound guided Fine Needle Aspiration Cytology (US-FNAC) for Palpable Thyroid Tumours

    Get PDF
    AIM : To study the effect of ultrasound guidance on the performance of Fine Needle Aspiration Cytology (FNAC). OBJECTIVES : 1. To determine the adequacy of US-FNAC. 2. To assess the accuracy of US-FNAC by comparing it with histopathology. MATERIALS AND METHODS : US-FNAC was done in 290 patients from December-2013 to December-2014 by the radiologist in the presence of a surgeon and an onsite cytotechnician to assess the adequacy of FNAC. All the samples were reported by a dedicated cytopathologist. Accuracy was calculated by comparing FNAC with histopathology for those who had thyroidectomy. Sensitivity, specificity and predictive probabilities were calculated for US-FNAC. RESULTS : 80.1% of the samples were adequate excluding 17 cystic swellings. 117/290 patients were operated till February-2015. The sensitivity and specificity of US-FNAC in this study is 83.1% and 81.3% respectively, with a positive predictive value of 89.1%, negative predictive value of 72.2% and an accuracy of 82.4% in predicting malignancy. CONCLUSIONS : The use of ultrasound guidance increases the adequacy of FNAC. The accuracy rate in inadequate, benign and AUS categories need to improve in this study and most of them had FVPTC which is known to have heterogenous features on ultrasound and patchy distribution of nuclear features for malignancy on histopathology

    Queueing System with Potential for Recruiting Secondary Servers

    Get PDF
    In this paper, we consider a single server queueing system in which the arrivals occur according to a Markovian arrival process (MAP). The served customers may be recruited (or opted from those customers’ point of view) to act as secondary servers to provide services to the waiting customers. Such customers who are recruited to be servers are referred to as secondary servers. The service times of the main as well as that of the secondary servers are assumed to be exponentially distributed possibly with different parameters. Assuming that at most there can only be one secondary server at any given time and that the secondary server will leave after serving its assigned group of customers, the model is studied as a QBD-type queue. However, one can also study this model as a G I/M/1-type queue. The model is analyzed in steady state, and a few illustrative numerical examples are presented

    A Hybrid Cryptographic System for Secured Device to Device Communication

    Get PDF
    It is general fact that even after enormous expansion of wireless communication there are still dead regions that hampers the effective communication. With exponential rise in the smart phones, a new layer of communication has evolved that could address the concerns of dead regions and capacity barriers. D2D is the evolving communication technology which focuses on short distance hops between the public devices to reach the destination. The major drawback of this technology is that most of the devices are public hence trustworthiness of the entire channel needs to be addressed in order to make it a viable solution. In this paper, we introduce a novel hybrid cryptographic approach that could address multiple eavesdroppers’ scenario. This approach incorporates both Huffman coding and Binary coding to enhance the crypto benefits for the information transmitted over D2D channel that consists of several public devices. The dual-crypto nature of the proposed algorithm offers higher efficiency, better security and improved key transmission.  Thus, the proposed hybrid cryptographic approach is robust in nature while easy and simple to operate. In addition, the proposed approach could recover the original information without any distortion from the encrypted data making the approach lossless in nature. Further simulation results prove that the proposed offers confidentiality to the transmitted to data while addressing the network capacity crunch
    • …
    corecore