8 research outputs found
An Efficient and Reliable Data Transmission Service using Network Coding Algorithms in Peer-to-Peer Network
Network coding is a progressive enhancement in natural network routing that increases throughput and reliability for unicast, multicast, and even broadcast transmissions. P2P networks are ideal for implementing network coding algorithms for two reasons: I. A P2P network's topology isn't predetermined. As a result, designing a topology that is compatible with the network coding algorithm is much easier. II. Every peer is an end host in this network. As a result, instead of saving and sending the message, complex network coding operations, such as encoding and decoding, are now easier to perform. The objective of this work is to use the best features of network coding algorithms and properly apply them to P2P networks to create an efficient and reliable data transmission service. The goal of the network coding algorithm is to make better use of network resources and thus increase P2P network capacity. An encoding algorithm that enables an intermediate peer to produce output messages by encoding (that is, computing a function of the data it receives. The decoder's role is to obtain enough encoded packets so that the original information can be recovered. This research work has measured an amount of hypothetical and applied consequences in which the network coding procedure or a variation of it is used to improve performance parameters such as throughput and reliability in P2P network data transmission based on network coding. The comparison of data transmission between network routing and network coding algorithms was the main focus of this paper. According to our simulations, the new network coding systems can reach 15% to 20% upper throughput than supplementary P2P network routing systems
Policy-aware Distributed and Dynamic Trust based Access Control Scheme for Internet of Things
The use of smart devices is driving the Internet of Things (IoT) trend today. Day by day IoT helps to support more services like car services, healthcare services, home automation, and security services, weather prediction services, etc, to ease user’s life. Integration of heterogeneous IoT devices and social resources sometimes creates many problems like the privacy of data. To avoid privacy issues, an appropriate access control mechanism is required to check authorized and trusted devices, so that only valid devices can access the data which is only required. In the sequel, this paper presents implementation of distributed and dynamic trust based access control mechanism (DDTAC) for secure machine to machine communication or distributed IoT environment. Novelty of this mechanism is that, it uses trust calculation and device classification for dynamic access control. The proposed scheme is implemented, tested and deployed on Node MCU and same mechanism is also simulated on NS-2 for large number of nodes. This access control model support Scalability, Heterogeneity, Privacy, Trust, Selective disclosure, Principle of least privileges, and lightweight calculation features. Results of this models proves that it gives good performance as compared to existing scheme in terms of scalability, throughput and delay. As number of devices increase it does not degrade performance. This mechanism is also protected against the Man-in-the-Middle attack, Sniffing attack, Session Hijacking attacks and Injection attacks. It required less time to detect and resist those attacks
Occupational Health Interventions: Evaluating the Effectiveness of Workplace Wellness Programs
This exploration completely looks at the impacts of work environment Wellness programs on word related Wellness and representative prosperity in different hierarchical settings, utilizing an exhaustive methodology. Through a far reaching survey of writing from the beyond a decade, we have blended proof based rehearses that exhibit the positive effect of these projects on physical and psychological well-being. Thus, efficiency and occupation fulfillment are eventually improved. Our review centers around different intercessions, including Wellness screenings, work out schedules, stress the executives procedures, and ergonomic measures. Besides, we analyze the effect of authoritative culture, administration backing, and worker commitment on the aftereffects of the program. We utilize a blend of quantitative and subjective exploration techniques, for example, overviews, center gatherings, and objective Wellness measurements, to assess the viability of intercessions. Our review looks at an extensive variety of working environment health drives, offering nitty gritty bits of knowledge into their viability and distinguishing key factors that add to program achievement. This examination adds to the scholarly world and gives commonsense direction to industry, educating the turn of events and execution regarding proof based working environment health programs. Our examination gives associations a thorough comprehension that empowers them to tweak intercessions as per their labor force's particular requirements, consequently advancing a better and more useful workplace
Web3 Chain Authentication and Authorization Security Standard (CAA)
Web3 is the next evolution of the internet, which uses blockchains, cryptocurrencies, and NFTs to return ownership and authority to the consumers. The potential of Web3 is highlighted by the creation of decentralized applications (dApps), which are more secure, transparent, and tamper-proof than their centralized counterparts, allowing for new business models that were previously impossible on the traditional internet.Web3 also focuses on user privacy, where users have more control over their personal data and can choose to share only what they want. The emergence of Web3 represents an exciting new frontier in blockchain technology, and its focus on decentralization, user privacy, and trustless systems has the potential to transform the way we interact with the internet.Web3 authentication is required for enhanced security, increased privacy, and simplified user interface. Traditional login procedures and an authorization flow using web3 authentication work together seamlessly. However, there are several challenges associated with Web3, including scalability and regulatory issues. Chain Authentication and Authorization (CAA) is a multi-layer security mechanism that allows users to choose the security layer that suits them, just like a heavy iron chain, where the user and CAA developers act as blacksmith and form their security protocol that suits them. CAA is a solution to the challenges associated with Web3 authentication and authorization, and it focuses on creating a secure and decentralized authentication and authorization system that is scalable, flexible, and user-friendly
The Intersection of Technology and Public Health: Opportunities and Challenges
The intersection of technology and public health stands as a critical nexus, offering unprecedented opportunities as well as serious challenges. Recent technological advances bring new solutions that can transform healthcare delivery, disease prevention and healthcare. From telemedicine and telehealth services to wearable devices and artificial intelligence, these devices promise sophistication, affordability and efficiency in healthcareSignificant opportunities are emerging in data-driven decision making. Integrating big data analytics enables real-time monitoring of public health data, facilitates rapid response to emerging threats, and optimizes resource allocation Digital healthcare systems enable individual delivery they prioritize their well-being, encouraging a paradigm shift toward preventive health care. In particular, telehealth services bridge geographic gaps, providing remote consultations that extend health care to underserved populations.But the promising land is not without its challenges. Privacy concerns are more pronounced, as the collection and use of personal health information raises ethical dilemmas. Harnessing the power of data and striking a balance between protecting individual privacy is paramount to successfully integrating technology into public health. Additionally, the digital divide presents tangible risks, and disparities in access to technology can exacerbate existing health disparities. The convergence of technology and public health represents a positive path to transformative change. While the opportunities are great, navigating through the challenges requires critical thinking and collaboration
Public Health Policy and Infectious Disease Control: Lessons from Recent Outbreaks
This research explores the complex dynamics of public health policy and its crucial role in managing pandemics, considering the unprecedented challenges presented by recent outbreaks of infectious diseases. Examining the worldwide consequences of the COVID-19 pandemic and the Ebola outbreak, we analyze the insights gained from these emergencies, highlighting the necessity for flexible policy development, cooperative endeavors, and the incorporation of community-led strategies. This study adds to the current discussion on pandemic preparedness and the development of robust public health systems. This research paper examines the significant influence of the COVID-19 pandemic and the Ebola outbreak on worldwide public health. It specifically analyzes the efficacy of public health policies and the involvement of mathematical models in managing infectious diseases. Understanding the development of public health responses requires considering the historical context of infectious disease outbreaks such as the Spanish Flu, H1N1, SARS, and MERS. This study conducts a comparative analysis of the responses to the COVID-19 pandemic and the Ebola outbreak, taking into account their distinct challenges and contextual factors. The emergence of the COVID-19 pandemic, resulting from the SARS-CoV-2 virus, has presented a multifaceted global health crisis that requires swift and flexible public health measures. Conversely, the Ebola epidemic in the Democratic Republic of Congo revealed difficulties that are unique to areas affected by conflict and emphasized the significance of involving the community in efforts to control the disease. The paper explores the global ramifications of these outbreaks, encompassing not only health consequences but also economic, societal, and international relations implications. The interdependence of global health is examined by analyzing the responses to COVID-19 and Ebola, highlighting the crucial requirement for collaborative endeavors, exchange of information, and fair allocation of resources. The research utilizes a case study methodology, specifically examining the COVID-19 pandemic and the Ebola outbreak as illustrative instances. Data collection encompasses the evaluation of implemented public health policies, the utilization of mathematical models for analysis, and the contemplation of ethical ramifications in the study of global health emergencies. The paper concludes by providing policy recommendations derived from the insights gained from these outbreaks. It highlights the importance of flexible and data-driven policymaking, international collaboration, and the incorporation of community-led strategies
Delayed complication of pelvic lymphocele: Ileal conduit obstruction
Radical cystectomy is the standard treatment for muscle invasive bladder cancer. Lymphocele is a common sequalae of pelvic lymphadenectomy. We report an unusual presentation of pelvic lymphocele developing after radical cystectomy reconstructed with an ileal conduit where the patient developed obstruction of the ileal conduit loop due to external pressure of the lymphocele. Catheter drainage of the conduit relieved the symptoms and a computerized tomography scan showed a large lymphocele causing acute angulation and resultant obstruction of the ileal conduit. The patient was treated with percutaneous drainage of the lymphocele and remains symptom-free on follow-up at 1 year
Pragmatic Approach for Online Document Verification Using Block-Chain Technology
As we all know, India has a plethora of universities, and many people graduate from them. Because it is possible for someone to falsify a degree, a secure based verification mechanism is required. It will be achieved in an existing system through the exchange of e-mails or postal mail; however, this is a time-consuming process that is insecure owing to human involvement. And, in order to solve these drawbacks, we implemented block chain technology into our system. When there is a security risk, block chain comes to mind. When it comes to data breaches, education is also not far away. For attackers, student data with little financial information has become a valuable commodity. At the same time, student verification is becoming a serious worry at educational institutions, which are being breached to generate phony identities and records. As a result, the greater the digitization of student information, the greater the need to protect student privacy