24 research outputs found

    An Efficient and Reliable Data Transmission Service using Network Coding Algorithms in Peer-to-Peer Network

    Get PDF
    Network coding is a progressive enhancement in natural network routing that increases throughput and reliability for unicast, multicast, and even broadcast transmissions. P2P networks are ideal for implementing network coding algorithms for two reasons: I. A P2P network's topology isn't predetermined. As a result, designing a topology that is compatible with the network coding algorithm is much easier. II. Every peer is an end host in this network.  As a result, instead of saving and sending the message, complex network coding operations, such as encoding and decoding, are now easier to perform. The objective of this work is to use the best features of network coding algorithms and properly apply them to P2P networks to create an efficient and reliable data transmission service. The goal of the network coding algorithm is to make better use of network resources and thus increase P2P network capacity. An encoding algorithm that enables an intermediate peer to produce output messages by encoding (that is, computing a function of the data it receives. The decoder's role is to obtain enough encoded packets so that the original information can be recovered. This research work has measured an amount of hypothetical and applied consequences in which the network coding procedure or a variation of it is used to improve performance parameters such as throughput and reliability in P2P network data transmission based on network coding. The comparison of data transmission between network routing and network coding algorithms was the main focus of this paper.  According to our simulations, the new network coding systems can reach 15% to 20% upper throughput than supplementary P2P network routing systems

    Policy-aware Distributed and Dynamic Trust based Access Control Scheme for Internet of Things

    Get PDF
     The use of smart devices is driving the Internet of Things (IoT) trend today. Day by day IoT helps to support more services like car services, healthcare services, home automation, and security services, weather prediction services, etc, to ease user’s life. Integration of heterogeneous IoT devices and social resources sometimes creates many problems like the privacy of data. To avoid privacy issues, an appropriate access control mechanism is required to check authorized and trusted devices, so that only valid devices can access the data which is only required.  In the sequel, this paper presents implementation of distributed and dynamic trust based access control mechanism (DDTAC) for secure machine to machine communication or distributed IoT environment. Novelty of this mechanism is that, it uses trust calculation and device classification for dynamic access control. The proposed scheme is implemented, tested and deployed on Node MCU and same mechanism is also simulated on NS-2 for large number of nodes. This access control model support Scalability, Heterogeneity, Privacy, Trust, Selective disclosure, Principle of least privileges, and lightweight calculation features. Results of this models proves that it gives good performance as compared to existing scheme in terms of scalability, throughput and delay. As number of devices increase it does not degrade performance. This mechanism is also protected against the Man-in-the-Middle attack, Sniffing attack, Session Hijacking attacks and Injection attacks. It required less time to detect and resist those attacks

    Occupational Health Interventions: Evaluating the Effectiveness of Workplace Wellness Programs

    Get PDF
    This exploration completely looks at the impacts of work environment Wellness programs on word related Wellness and representative prosperity in different hierarchical settings, utilizing an exhaustive methodology. Through a far reaching survey of writing from the beyond a decade, we have blended proof based rehearses that exhibit the positive effect of these projects on physical and psychological well-being. Thus, efficiency and occupation fulfillment are eventually improved. Our review centers around different intercessions, including Wellness screenings, work out schedules, stress the executives procedures, and ergonomic measures. Besides, we analyze the effect of authoritative culture, administration backing, and worker commitment on the aftereffects of the program. We utilize a blend of quantitative and subjective exploration techniques, for example, overviews, center gatherings, and objective Wellness measurements, to assess the viability of intercessions. Our review looks at an extensive variety of working environment health drives, offering nitty gritty bits of knowledge into their viability and distinguishing key factors that add to program achievement. This examination adds to the scholarly world and gives commonsense direction to industry, educating the turn of events and execution regarding proof based working environment health programs. Our examination gives associations a thorough comprehension that empowers them to tweak intercessions as per their labor force's particular requirements, consequently advancing a better and more useful workplace

    Web3 Chain Authentication and Authorization Security Standard (CAA)

    Get PDF
    Web3 is the next evolution of the internet, which uses blockchains, cryptocurrencies, and NFTs to return ownership and authority to the consumers. The potential of Web3 is highlighted by the creation of decentralized applications (dApps), which are more secure, transparent, and tamper-proof than their centralized counterparts, allowing for new business models that were previously impossible on the traditional internet.Web3 also focuses on user privacy, where users have more control over their personal data and can choose to share only what they want. The emergence of Web3 represents an exciting new frontier in blockchain technology, and its focus on decentralization, user privacy, and trustless systems has the potential to transform the way we interact with the internet.Web3 authentication is required for enhanced security, increased privacy, and simplified user interface. Traditional login procedures and an authorization flow using web3 authentication work together seamlessly. However, there are several challenges associated with Web3, including scalability and regulatory issues. Chain Authentication and Authorization (CAA) is a multi-layer security mechanism that allows users to choose the security layer that suits them, just like a heavy iron chain, where the user and CAA developers act as blacksmith and form their security protocol that suits them. CAA is a solution to the challenges associated with Web3 authentication and authorization, and it focuses on creating a secure and decentralized authentication and authorization system that is scalable, flexible, and user-friendly

    The Intersection of Technology and Public Health: Opportunities and Challenges

    Get PDF
    The intersection of technology and public health stands as a critical nexus, offering unprecedented opportunities as well as serious challenges. Recent technological advances bring new solutions that can transform healthcare delivery, disease prevention and healthcare. From telemedicine and telehealth services to wearable devices and artificial intelligence, these devices promise sophistication, affordability and efficiency in healthcareSignificant opportunities are emerging in data-driven decision making. Integrating big data analytics enables real-time monitoring of public health data, facilitates rapid response to emerging threats, and optimizes resource allocation Digital healthcare systems enable individual delivery they prioritize their well-being, encouraging a paradigm shift toward preventive health care. In particular, telehealth services bridge geographic gaps, providing remote consultations that extend health care to underserved populations.But the promising land is not without its challenges. Privacy concerns are more pronounced, as the collection and use of personal health information raises ethical dilemmas. Harnessing the power of data and striking a balance between protecting individual privacy is paramount to successfully integrating technology into public health. Additionally, the digital divide presents tangible risks, and disparities in access to technology can exacerbate existing health disparities. The convergence of technology and public health represents a positive path to transformative change. While the opportunities are great, navigating through the challenges requires critical thinking and collaboration

    Public Health Policy and Infectious Disease Control: Lessons from Recent Outbreaks

    Get PDF
    This research explores the complex dynamics of public health policy and its crucial role in managing pandemics, considering the unprecedented challenges presented by recent outbreaks of infectious diseases. Examining the worldwide consequences of the COVID-19 pandemic and the Ebola outbreak, we analyze the insights gained from these emergencies, highlighting the necessity for flexible policy development, cooperative endeavors, and the incorporation of community-led strategies. This study adds to the current discussion on pandemic preparedness and the development of robust public health systems. This research paper examines the significant influence of the COVID-19 pandemic and the Ebola outbreak on worldwide public health. It specifically analyzes the efficacy of public health policies and the involvement of mathematical models in managing infectious diseases. Understanding the development of public health responses requires considering the historical context of infectious disease outbreaks such as the Spanish Flu, H1N1, SARS, and MERS. This study conducts a comparative analysis of the responses to the COVID-19 pandemic and the Ebola outbreak, taking into account their distinct challenges and contextual factors. The emergence of the COVID-19 pandemic, resulting from the SARS-CoV-2 virus, has presented a multifaceted global health crisis that requires swift and flexible public health measures. Conversely, the Ebola epidemic in the Democratic Republic of Congo revealed difficulties that are unique to areas affected by conflict and emphasized the significance of involving the community in efforts to control the disease. The paper explores the global ramifications of these outbreaks, encompassing not only health consequences but also economic, societal, and international relations implications. The interdependence of global health is examined by analyzing the responses to COVID-19 and Ebola, highlighting the crucial requirement for collaborative endeavors, exchange of information, and fair allocation of resources. The research utilizes a case study methodology, specifically examining the COVID-19 pandemic and the Ebola outbreak as illustrative instances. Data collection encompasses the evaluation of implemented public health policies, the utilization of mathematical models for analysis, and the contemplation of ethical ramifications in the study of global health emergencies. The paper concludes by providing policy recommendations derived from the insights gained from these outbreaks. It highlights the importance of flexible and data-driven policymaking, international collaboration, and the incorporation of community-led strategies

    Prognostic Impact of Pattern of Mandibular Involvement in Gingivo-Buccal Complex Squamous Cell Carcinomas:Marrow and Mandibular Canal Staging System

    Get PDF
    PURPOSE: To study the pattern of mandibular involvement and its impact on oncologic outcomes in patients with gingivo-buccal complex squamous cell carcinoma (GBC-SCC) and propose a staging system based on the pattern of bone involvement (MMC: Marrow and mandibular canal staging system) and compare its performance with the 8th edition of the American Joint Committee on Cancer (AJCC8). METHODS: This retrospective observational study included treatment-naïve GBC-SCC patients who underwent preoperative computed tomography (CT) imaging between January 1, 2012, and March 31, 2016, at a tertiary care cancer center. Patients with T4b disease with high infratemporal fossa involvement, maxillary erosion, and follow-up of less than a year were excluded. The chi-square or Fisher’s exact test was used for descriptive analysis. Kaplan–Meier estimate and log-rank test were performed for survival analysis. Multivariate analysis was done using Cox regression analysis after making adjustments for other prognostic factors. p-Value <0.05 was considered as significant. Based upon the survival analysis with different patterns of bone invasion, a new staging system was proposed “MMC: Marrow and mandibular canal staging system”. “Akaike information criterion” (AIC) was used to study the relative fitted model of the various staging (TNM staging—AJCC8) with respect to survival parameters. RESULTS: A total of 1,200 patients were screened; 303 patients were included in the study. On radiology review, mandibular bone was involved in 62% of patients. The pattern of bone involvement was as follows: deep cortical bone erosion (DCBE) in 23%, marrow in 34%, and marrow with the mandibular canal in 43% of patients. Patients with DCBE and no bone involvement (including superficial cortical) had similar survival [disease-free survival (DFS) and locoregional recurrence-free survival (LRRFS)], and this was significantly better than those with marrow with or without mandibular canal involvement (for both DFS and LRRFS). Patients with DCBE were staged using the MMC, and when compared with the AJCC8, the MMC system was better for the prediction of survival outcomes, as AIC values were lower compared with those of the AJCC8. There was a significant association (p = 0.013) between the type of bone involvement and the pattern of recurrence. CONCLUSIONS: For GBC-SCC, only marrow with or without mandibular canal involvement is associated with poorer survival outcomes. As compared with the AJCC8, the proposed Mahajan et al. MMC staging system downstages DCBE correlates better with survival outcomes

    The journey of ultrasound-based thyroid nodule risk stratification scoring systems: Do all roads lead to Thyroid Imaging, Reporting and Data System (TIRADS)?

    No full text
    A number of qualitative and quantitative ultrasound (US) risk stratification systems for thyroid nodules are being used all over the world, new ones are being devised but so far, no consensus on a single system has emerged. Efforts by the worldwide medical community involved in the management of thyroid nodules are converging toward US risk stratification systems, which could provide a high-sensitivity and high-negative predictive value (NPV) for the diagnosis of clinically significant thyroid carcinomas. In this article, we review the fascinating journey of thyroid US-based thyroid imaging reporting and data system (TIRADS), the changing trends in TIRADS and emerging stratification systems to assess the risk of malignancy. Our recommendation is to develop a comprehensive system of risk stratification which incorporates clinically relevant as well as radiological risk factors and aims to accurately predict the risk of malignancy and oncologic outcome for each patient
    corecore