9 research outputs found

    Feasibility of Comparing the Results of Pancreatic Resections between Surgeons: A Systematic Review and Meta-Analysis of Pancreatic Resections

    Get PDF
    Background. Indicators of operative outcomes could be used to identify underperforming surgeons for support and training. The feasibility of identifying HPB surgeons with poor operative performance ("outliers") based on the results of pancreatic resections is not known. Methods. A systematic review of Medline, Embase, and the Cochrane library was performed to identify studies on pancreatic resection including at least 100 patients and published between 2004 and 2014. Proportions that lay outside the upper 95% and 99.8% confidence intervals based on results of the systematic reviews were considered as "outliers." Results. In total, 30 studies reporting on 10712 patients were eligible for inclusion in this review. The average short-term mortality after pancreatic resections was 3.1% and proportion of patients with procedure-related complications was 47.0%. None of the classification systems assessed the long-term impact of the complications on patients. The surgeon-specific mortality should be 5 times the average mortality before he or she can be identified as an outlier with 0.1% false positive rate if he or she performs 50 surgeries a year. Conclusions. A valid risk prognostic model and a classification system of surgical complications are necessary before meaningful comparisons of the operative performance between pancreatic surgeons can be made

    Ensuring the Data Integrity and Confidentiality in Cloud Storage Using Hash Function and TPA

    Get PDF
    Main call for Cloud computing is that users only utilize what they required and only pay for whatever they are using. Mobile Cloud Computing refers to an infrastructure where data processing and storage can happen away from mobile device. Research estimates that mobile subscribers worldwide will reach 15 billion by the end of 2014 and 18 billion by at the ending of 2016. Due to increasing use of mobile devices the requirement of cloud computing in mobile devices arise, which evolves Mobile Cloud Computing. Mobile devices require large storage capacity and maximum CPU speed. As we are storing data on cloud there is an issue of data security. As there is risk associated with data storage many IT professionals are not showing their interest towards Mobile Cloud Computing. To ensure the users' data correctness in the cloud, here we are proposing an effective mechanism with salient feature of data integrity and confidentiality. This paper proposed a solution which uses the RSA algorithm and mechanism of hash function along with various cryptography tools to provide better security to the data stored on the cloud. This model can not only solve the problem of storage of massive data, but also make sure that it will give data access control mechanisms and ensure sharing data files with confidentiality and integrity. DOI: 10.17762/ijritcc2321-8169.15055

    Lightweight novel trust based framework for IoT enabled wireless network communications

    Get PDF
    For IoT enabled networks, the security and privacy is one of the important research challenge due to open nature of wireless communications, especially for the networks like Vehicular Ad hoc Networks (VANETs). The characteristics like heterogeneity, constrained resources, scalability requirements, uncontrolled environment etc. makes the problems of security and privacy even more challenging. Additionally, the high degree of availability needs of IoT networks may compromise the integrity and confidentially of communication data. The security threats mainly performed during the operations of data routing, hence designing the secure routing protocol main research challenge for IoT networks. In this paper, to design the lightweight security algorithm the use of Named Data Networking (NDN) which provides the benefits applicable for IoT applications like built-in data provenance assurance, stateful forwarding etc. Therefore the novel security framework NDN based Cross-layer Attack Resistant Protocol (NCARP) proposed in this paper. In NCARP, we designed the cross-layer security technique to identify the malicious attackers in network to overcome the problems like routing overhead of cryptography and trust based techniques. The parameters from the physical layer, Median Access Control (MAC) layer, and routing/network layer used to compute and averages the trust score of each highly mobility nodes while detecting the attackers and establishing the communication links. The simulation results of NCARP is measured and compared in terms of precision, recall, throughput, packets dropped, and overhead rate with state-of-art solutions

    Polyethersulfone supported titanium complexes as ethylene polymerization catalysts

    Get PDF
    Polyethersulfone has been used as the support to anchor TiCl4 or Cp2TiCl2 through dative 'O-Ti' bond. The supported complexes in combination with methylaluminoxane are effective ethylene polymerization catalysts. The polyethylene made by the supported catalysts, especially the titanocene-derived catalyst, has low polydispersity indicating single site character
    corecore