65 research outputs found

    SPATA: Strong Pseudonym based AuthenTicAtion in Intelligent Transport System

    Get PDF
    Intelligent Transport System (ITS) is generally deployed to improve road safety, comfort, security, and traffic efficiency. A robust mechanism of authentication and secure communication is required to protect privacy and conditional resolution of pseudonyms to revoke malicious vehicles. In a typical ITS framework, a station can be a vehicle, Road Side Unit (RSU), or a server that can participate in communication. During authentication, the real identity of an Intelligent Transport System-Station (ITSS), referred to as a vehiclečň should not be revealed in order to preserve its privacy. In this paper, we propose a Strong Pseudonym based AutenTicAtion (SPATA) framework for preserving the real identity of vehicles. The distributed architecture of SPATA allows vehicles to generate pseudonyms in a very private and secure way. In the absence of a distributed architecture, the privacy cannot be preserved by storing information regarding vehicles in a single location. Therefore, the concept of linkability of certificates based on single authority is eliminated. This is done by keeping the real identity to pseudonym mappings distributed. Furthermore, the size of the Certificate Revocation List (CRL) is kept small, as only the most recent revoked communication pseudonyms are kept in the CRL. The privacy of the vehicle is preserved during the revocation and resolution phase through the distributed mechanism. Empirical results show that SPATA is a lightweight framework with low computational overhead, average latency, overhead ratio, and stable delivery ratio, in both sparse and dense network scenarios

    Some properties of generalized (S, k)-bessel function in two variables

    Get PDF
    The devotion of this paper is to study the Bessel function of two variables in k-calculus. we discuss the generating function of k-Bessel function in two variables and develop its relations. After this we introduce the generalized (s, k)-Bessel function of two variables which help to develop its generating function. The s-analogy of k-Bessel function in two variables is also discussed. Some recurrence relations of the generalized (s, k)-Bessel function in two variables are also derived. © 2022 All rights reserved

    In vitro antidiabetic, anti-inflammatory and antioxidant potential of the ethanol extract of Uromastyx hardwickii skin

    Get PDF
    Purpose: To evaluate the in vitro antidiabetic, anti-inflammatory and antioxidant potential of the ethanol extract of Uromastyx hardwickii Skin (UHSEE). Methods: The in vitro effects of UHSEE at various concentrations (10 - 250 µg/mL) on the activities of ߙ-amylase, ߙ-glucosidase and glucose uptake by yeast cells were used to evaluate its antidiabetic potential. Nitric oxide (NO), 2,2-diphenyl-1-picrylhydrazyl (DPPH) and hydrogen peroxide inhibitory assay were employed to determine its antioxidant effects, while the anti-inflammatory effects were evaluated using human red blood cell (HRBC) membrane stabilization assay. Results: UHSEE inhibited ߙ-amylase and ߙ-glucosidase enzymes but increased glucose uptake by yeast cells in a concentration-dependent manner (p < 0.05). It also inhibited NO, DPPH, hydrogen peroxide and HRBC hemolysis in a concentration-dependent manner (p < 0.05). Conclusion: Uromastyx hardwickii skin exhibits promising good antidiabetic, antioxidant and antiinflammatory properties in vitro. However, its true potentials in this regard needs to be evaluted in vivo

    BCON : Blockchain Based Access CONtrol across Multiple Conflict of Interest Domains

    Get PDF
    In today's on-demand computing and virtual coalition environment, cross-domain services are acquired and provided. These business domains may belong to either the same or different conflict of interest system. “Transitive access” can cause leakage of information between competitors through some other conflict of interest system's member. Therefore, a secure access control mechanism is required to detect and deny “transitive access” efficiently with minimal trust in externalist. Existing access control mechanisms focused on either single or multiple conflict of interest domains but with no “transitive access”. In addition, these existing mechanisms are centralized with inherited unfair access control and are a single point of failure. Blockchain (BC) is a shared digital ledger encompassing a list of connected blocks stored on a decentralized distributed network that is secured through cryptography. We propose a BC based access control for conflict of interest domains. We have integrated a BC in our architecture to make access control fair, verifiable and decentralized. Users access histories and “transitive accesses” are stored on BC ledger. We propose a novel mechanism called “Transitive Access Checking and Enforcement (TACE)” i.e., “Algorithm.1”. It makes an authorization decision based on BC endorsement that “transitive access” will not occur. “Algorithm.2” verifies and updates users access histories stored at BC before each request approval. Similarly, “Algorithm.3” detects possible future “transitive accesses” and updates Transitive Access Set (TAS) stored at BC after each request approval. The Simple Promela Interpreter (SPIN) model checker is used to verify the proposed mechanisms for “transitive access” detection and prevention. We have identified four conflicting sequences of execution that can cause “transitive access”. Results show that the proposed mechanism is safe against “transitive access” by checking all the four possible conflicting sequences of execution

    Post-operative pain management modalities employed in clinical trials for adult patients in LMIC; a systematic review

    Get PDF
    Background: Unrelieved postoperative pain afflicts millions each year in low and middle income countries (LMIC). Despite substantial advances in the study of pain, this area remains neglected. Current systematic review was designed to ascertain the types of clinical trials conducted in LMIC on postoperative pain management modalities over the last decade.Methods: A comprehensive search was performed in June 2019 on PubMed, Cochrane Library, CINAHL Plus, and Web of Science databases to identify relevant trials on the management of postoperative pain in LMIC. Out of 1450 RCTs, 108 studies were reviewed for quality evidence using structured form of critical appraisal skill program. Total of 51 clinical trials were included after applying inclusion/exclusion criteria.Results: Results are charted according to the type of surgery. Eleven trials on laparoscopic cholecystectomy used multimodal analgesia including some form of regional analgesia. Different analgesic modalities were studied in 4 trials on thoracotomy, but none used multimodal approach. In 11 trials on laparotomy, multimodal analgesia was employed along with the studied modalities. In 2 trials on hysterectomy, preemptive pregabalin or gabapentin were used for reduction in rescue analgesia. In 13 trials on breast surgical procedures and 10 on orthopaedic surgery, multimodal analgesia was used with some form of regional analgesia.Conclusion: We found that over the past 10 years, clinical trials for postoperative pain modalities have evolved in LMIC according to the current postoperative pain management guidelines i.e. multi-modal approach with some form of regional analgesia. The current review shows that clinical trials were conducted using multimodal analgesia including but not limited to some form of regional analgesia for postoperative pain in LMIC however this research snapshot (of only three countries) may not exactly reflect the clinical practices in all 47 countries. Post Operative Pain Management Modalities Employed in Clinical Trials for Adult Patients in LMIC; A Systematic Review

    An Efficient and Secure Energy Trading Approach with Machine Learning Technique and Consortium Blockchain

    Get PDF
    In this paper, a secure energy trading mechanism based on blockchain technology is proposed. The proposed model deals with energy trading problems such as insecure energy trading and inefficient charging mechanisms for electric vehicles (EVs) in a vehicular energy network (VEN). EVs face two major problems: finding an optimal charging station and calculating the exact amount of energy required to reach the selected charging station. Moreover, in traditional trading approaches, centralized parties are involved in energy trading, which leads to various issues such as increased computational cost, increased computational delay, data tempering and a single point of failure. Furthermore, EVs face various energy challenges, such as imbalanced load supply and fluctuations in voltage level. Therefore, a demand-response (DR) pricing strategy enables EV users to flatten load curves and efficiently adjust electricity usage. In this work, communication between EVs and aggregators is efficiently performed through blockchain. Moreover, a branching concept is involved in the proposed system, which divides EV data into two different branches: a Fraud Chain (F-chain) and an Integrity Chain (I-chain). The proposed branching mechanism helps solve the storage problem and reduces computational time. Moreover, an attacker model is designed to check the robustness of the proposed system against double-spending and replay attacks. Security analysis of the proposed smart contract is also given in this paper. Simulation results show that the proposed work efficiently reduces the charging cost and time in a VEN.publishedVersio

    First report of Rickettsia conorii in Hyalomma kumari ticks

    Get PDF
    As a vector of wide range of pathogenic agents, ticks pose health threats to wild and domestic animals, and humans. Information is unavailable about the prevalence and spatial survey of Hyalomma kumari ticks and associated Rickettsia spp. in Pakistan. Concerning this knowledge gap, the present study aimed to molecularly detect Rickettsia species associated with H. kumari infesting small ruminants in Khyber Pakhtunkhwa (KP), Pakistan. A total of 409 H. kumari ticks were collected from 163/295 infested hosts with an infestation rate of 55.25%. A total of 204 females, 158 males, and 47 nymphs were collected. Goats were heavily infested by 224 ticks having an infestation rate of 58.33% (98/168), whereas sheep were infested by 185 ticks having a lesser infestation rate of 51.18% (65/127). Genomic DNA extracted from ticks was used for the amplification of tick (cox I, 16S rRNA, ITS-2) species and Rickettsia (gltA, ompA, and ompB) partial genes. Eighty-three ticks were subjected to PCR, and 8/83 (9.6%) were found positive for rickettsial agents. The cox I and 16S rRNA sequences of H. kumari showed 98.90–99.74% identity with H. kumari sequences reported from Pakistan, and phylogenetically clustered to the corresponding species reported from Pakistan and India. The obtained rickettsial gltA, ompA, and ompB sequences showed 100% identity with Rickettsia sp. of the Rickettsia conorii reported from Pakistan. In the phylogenetic trees, rickettsial sequences clustered with uncharacterized Rickettsia sp. from Pakistan and R. conorii from Israel, Russia, South Africa, and India. The present molecular based detection of H. kumari-associated R. conorii will facilitate effective surveillance in the region

    Impact of Covid-19 on Yamuna River water quality: Possible ways to rejuvenate the riverine ecosystem in national capital of India

    Get PDF
    The water quality of Yamuna River was studied for four years from 2019 until August 2022. The period witnessed the onset of COVID-19 pandemic and government-imposed complete lockdown which caused slight improvement in the water quality. Five parameters pH, Biological Oxygen Demand (BOD), Chemical Oxygen Demand (COD), Dissolved Oxygen (DO) and Faecal Coliform (FC) monitored by Delhi Pollution Control Committee (DPCC) were analyzed to see the changes in water quality of Yamuna River in the Delhi stretch before the onset of COVID-19 (2019), during the COVID-19 (2020 and 2021) and after the pandemic (2022). Maximum improvement in some water quality parameters were observed only during the 1st lockdown in the year 2020 when government had imposed complete restriction on the movement of people and industries were not functioning at there maximum capacity. The water quality again declined in the year 2021 and further in the year 2022. Major cause of pollution was the untreated waste reaching the river from various drains. Therefore, it is extremely important to intersect all the major and minor drains through Sewage Treatment Plants (STPs). The floodplain of the river needs to be managed to keep the pollution in control

    Prevalence Pattern of Risk Factors for Coronary Artery Disease among Patients Presenting for Coronary Artery Bypass Grafting in Oman

    Get PDF
    Objectives: To identify the pattern of prevalence of risk factors in patients presenting for coronary artery bypass grafting at a single center in Oman. Methods: All patients who had coronary artery bypass grafting between March 2008 to March 2010 were included and data were obtained from history and laboratory investigations. The prevalence rates of eight conventional risk factors are presented as a retrospective single center observational study. Results: Out of 146 total patients, 107 (73.29%) were male. The age ranged from 31 to 87 years old. The mean age was 58.18 ± 10.08 years (males = 56.81 ± 10.42, females = 61.95 ± 7.97). Hypertension was present in 119 patients (81.51%), 115 patients (78.77%) had dyslipidemia, 107 patients (73.29%) were male, 79 patients (54.11%) had diabetes mellitus, 70 patients (47.95%) were over the age of 60 years, 41 patients (28.08%) gave a history of smoking, 31 patients (21.23%) were obese, and 19 patients (13.01%) gave a positive family history. Conclusions: The most common risk factor was hypertension, followed by dyslipidemia, male gender, diabetes mellitus, old age, smoking, obesity and positive family history; 87.7% had three or more risk factors. The females in this study were older than the males and had more risk factors at presentation. The most common combination of factors seen together was diabetes, hypertension, dyslipidemia and male gender

    Honour Crimes in Pakistan: Unveiling Reality and Perception

    Get PDF
    The focus of this research study is the opinion of the Pakistani people from urban and rural backgrounds of all four provinces, to ascertain their opinion on key issues concerning the widespread practice of honour crimes in Pakistan. The report is based on both qualitative and quantitative data. For the qualitative information, 70 key informant interviews and roundtable dialogues were used to gather opinions. Background and historical material used in the report came from a review of historical books, newspapers, reports, articles, journals, and the experience from CAMP programmes. The quantitative data comprised of interviews of 2,140 adult male and female respondents through a structured questionnaire
    corecore