39 research outputs found

    Image Encryption using AES Encryption Technique with Bernoulli Chaotic Map

    Get PDF
    In last few years, the progress in communication technology has seen strong interest in digital picture or image transmission. However, computer processor growth in possessing power and storage illegal access has become easier. Encryption method involves some special mathematical algorithms and keys to transform digital data into cipher text or code before they are transmitted and decrypted method involves the application of mathematical algorithms and keys to obtain the original data from cipher text or code, scientific community have seen strong interest in image transmission. However, illegal image or data access has become more easy and established in wireless and general communication networks. Information privacy becomes a difficult issue. In order to protect, secure your valuable image or data from unauthorized readers, data or image encryption or decryption is essential, furthermore. As such in this paper, AES based on encryption has been proposed for secure image transmission over channels

    A Study on Honeypot Technology for Future: Principles and Applications

    Get PDF
    Honeypot is an exciting new technology with enormous potential for the security community. It isresource which is intended to be attacked and compromised to gain more information about theattacker and his attack techniques. They are a highly flexible tool that comes in many shapes andsizes. This paper deals withunderstanding what a honeypot actually is, and how it works.There are different varieties of honeypots. Based on their category they have different applications. Thispaper gives an insight in to the use of honeypots in productive as well as educative environments.This paper alsodiscusses the advantages and disadvantages of honeypots, and what the futurehold in store forthem

    The development and validation of a scoring tool to predict the operative duration of elective laparoscopic cholecystectomy

    Get PDF
    Background: The ability to accurately predict operative duration has the potential to optimise theatre efficiency and utilisation, thus reducing costs and increasing staff and patient satisfaction. With laparoscopic cholecystectomy being one of the most commonly performed procedures worldwide, a tool to predict operative duration could be extremely beneficial to healthcare organisations. Methods: Data collected from the CholeS study on patients undergoing cholecystectomy in UK and Irish hospitals between 04/2014 and 05/2014 were used to study operative duration. A multivariable binary logistic regression model was produced in order to identify significant independent predictors of long (> 90 min) operations. The resulting model was converted to a risk score, which was subsequently validated on second cohort of patients using ROC curves. Results: After exclusions, data were available for 7227 patients in the derivation (CholeS) cohort. The median operative duration was 60 min (interquartile range 45–85), with 17.7% of operations lasting longer than 90 min. Ten factors were found to be significant independent predictors of operative durations > 90 min, including ASA, age, previous surgical admissions, BMI, gallbladder wall thickness and CBD diameter. A risk score was then produced from these factors, and applied to a cohort of 2405 patients from a tertiary centre for external validation. This returned an area under the ROC curve of 0.708 (SE = 0.013, p  90 min increasing more than eightfold from 5.1 to 41.8% in the extremes of the score. Conclusion: The scoring tool produced in this study was found to be significantly predictive of long operative durations on validation in an external cohort. As such, the tool may have the potential to enable organisations to better organise theatre lists and deliver greater efficiencies in care

    Multiple Scattering of Electromagnetic Waves by Random Scatterers of Finite Size

    No full text
    89 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 1964.U of I OnlyRestricted to the U of I community idenfinitely during batch ingest of legacy ETD

    A combined LIFOpriority scheme for overload control of e-Commerce web servers

    No full text
    E-commerce Web-servers often face overload conditions during which revenue-generating requests may be dropped or abandoned due to an increase in the browsing requests. In this paper we present a simple, yet effective, mechanism for overload control of E-commerce Web-servers. We develop an E-commerce workload model that separates the browsing requests from revenue-generating transaction requests. During overload, we apply LIFO discipline in the browsing queues and use a dynamic priority model to service them. The transaction queues are given absolute priority over the browsing queues. This is called the LIFO-Pri scheduling discipline. Experimental results show that LIFO-Pri dramatically improves the overall Web-server throughput while also increasing the completion rate of revenue-generating requests. The Web-server was able to operate at nearly 60 % of its maximum capacity even when offered load was 1.5 times its capacity. Further, when compared to a single queue FIFO system, there was a seven-fold increase in the number of completed revenue-generating requests during overload. Keywords: E-commerce, overload control, Web-servers, LIFO, priority. 1

    Fetal Valproate Syndrome with Limb Defects: An Indian Case Report

    No full text
    Epilepsy is a common disorder and exposure to antiepileptic drugs during pregnancy increases the risk of teratogenicity. Older AEDs such as valproate and phenobarbital are associated with a higher risk of major malformations in the fetus than newer AEDs like lamotrigine and levetiracetam. Exposure to valproic acid during first trimester can result in fetal valproate syndrome (FVS), comprising typical facial features, developmental delay, and a variety of malformations such as neural tube defects, cardiac and genitourinary malformations, and limb defects. We are presenting an Indian case of FVS with major limb defects

    2D Polarization Imaging of Turbid Media

    No full text
    corecore