Enabling authenticity and integrity with information hiding for secure communication in internet of things

Internet of Things (IoT) enhances the global connectivity to all the remote sensing devices. It enables the connectivity of communication and processing the real-time data that has been collected from an enormous number of connected sensing devices. There is an increase in the IoT technology that leads to various malicious attacks. It is more important to overcome the malicious attacks, mainly to stop attackers or intruders from taking all the control of devices. Ensuring the safety and accuracy of the sensing devices is a serious task. It is very much important to enabling the authenticity and integrity to obtain the safety of the devices. Dynamic tree chaining, Geometric star chaining and Onion encryption are the three solutions that has been proposed in this project for in order to enable authenticity and integrity with information hiding for secure communication. The simulation results are driven displays that the proposed system is very stable and much better than other existing solution in means of security, space and time.

Jebin Bose S Jebin bose s

An efficient classifier decision tree for active context source discover on mobile pervasive environment

Mobile pervasive environment interact with several devices at varying service ranges. The technical heterogeneity of pervasive environment is expected to increase the system flexibility and adaptability on modeling with context training phase. While working with context based training phase, time entity measure is considered as the significant issue. The evaluation of the services through numerous devices during training phase does not acquire an effective service monitoring on mobile pervasive environment. Mobile pervasive environment based information extraction fails to modify the patterns as activities change over time. To improve the flexibility of context training phase in mobile pervasive environment, an Active Context Source Discover Training Phase (ACSDTP) with Classifier Decision Tree Support (CDTS) mechanism is proposed in this paper. Our research work is to develop an effective modification (i.e., updation) of the pattern on training phase with real world context as per changes over time. Initially, the ACSDTP set up the available sensors in pervasive environment to work with the ever changing set of context users. The available sensors are maintained using the Active Discover process. Second, the CDTS mechanism is designed using weighted prediction for easy identification of context result on the training phase. Decision tree is operated separately using the learning techniques, where the identification is performed in a significant manner with minimal time factor. The learning process is performed to identify the inferred situations. Finally, the integration process is carried out to work with the complex association between the situations and sensor data in the mobile pervasive environment to achieve flexibility and adaptability factor. Experiment is conducted on factors such as time entity measure rate, precision ratio, and user context result determination level.

Dr H Shaheen Dr h shaheen

Applying the third-party logistics concept to improve business profitability: a study of the manufacturing industry in the uk

This dissertation aimed to critically investigate how UK manufacturing companies can employ 3PL services to enhance business profitability. A simple, cross-sectional sequential mixed methods research methodology was implemented with the qualitative phase being used to explain the findings of the quantitative phase, which was performed first. Data for the quantitative period were collected using an online questionnaire that was designed and administered through a Google survey (N= 416). At the same time, semi-structured interviews were performed via Zoom calls with senior executives and managers of UK manufacturing firms (N= 5). Descriptive statistics, a one-sample t-test, and stepwise regression were used for quantitative data analysis using SPSS while manual analysis of interview data was performed in Microsoft Excel. The results showed that transportation and fleet management were the services that UK manufacturing companies outsourced to the most significant extent while clearing and forward and inventory management were the services that were outsourced to the lowest degree. The reasons behind this trend included the level of risk involved in outsourcing a particular service, availability of 3PL providers offering the outsourcing service, and the cost involved. In terms of feasibility, all items were scored highly, although increased operational flexibility and significant reduction of operational costs ranked highest. Finally, the stepwise regression test revealed four statistically significant models with an overall prediction power of 20.1% on business profitability. The statistically significant predictor variables were a reduction of operational costs, increased operational flexibility, reduced fixed asset costs, and the gaining of external resources from 3PL service providers.

Mohamed Sorogy Mohamed sorogy

The effects of covid-19 pandemic on the follow-up and treatment process of gynecological cancers and breast cancer

The present review was written to describe the effects of the COVID-19 pandemic on followup and treatment process of gynecological cancers and breast cancer in accordance with current literature, guidelines from national and international cancer associations. Recommendations were provided based on the consensus conference model. In the follow-up and treatment process of gynecological cancers and breast cancer, there are many factors, such as the clinical course of patient, the possibility of an emergency of the patient, the stage of the cancer and the current status of the chemotherapies. Although opinions in all types of cancer differ among themselves, general beliefs are postponement of non-urgent surgical operations, re-evaluation of chemotherapy processes, postponing appointments for new nonurgent diagnoses, reducing the length of hospital stay of patients in emergency procedures, conducting consultations by telemedicine or telephone, treatment of patients with COVID-19 suspicions after 15 days, planning biopsies or surgeries according to the staging status of cancers and planning conferences as video conferences in cases that require a multidisciplinary approach. Patients diagnosed with cancer during the COVID-19 pandemic should not be lost, followup and treatment should be continued without disruption, patients should be remembered to be in the high-risk group in this process and necessary hygiene measures should be taken in both follow-up and treatment concerning risks and COVID-19 pandemics.

Reyhan Aydin Doğan Reyhan aydin doğan

Satiating a user-delineated time constraints while scheduling workflow in cloud environments

Cloud computing is used to achieve sustainability in terms of computing. It reduces energy and resource consumption. Most of the companies have been moving their applications to the cloud to reduce power, energy re-source, and carbon emission. Today's computing landscape is rapidly shifting toward creating applications to leverage Cloud platforms to have necessary features such as elasticity, virtualization, low cost, and pay-per-use. Cloud computing's rising demand and versatility are achieving acceptance in the research community as a means of implementing large-scale electronic systems in the format of workflows (set of tasks). One of the most important objectives of this effort is to trim down makespan which is the total period taken by the resources to complete all workflow activities. Another foremost objective of this work is to satiate all the user-delineated time constraints while scheduling workflow activities.

Mohd haroon

Recent improvements in mrna and immunogenicity

Vaccines avoid many illnesses and save many lives every year. As a result of common vaccine use, the smallpox virus has entirely been eradicated and the occurrence of measles, polio and other childhood diseases have considerably been abridged around the world. Classical vaccine strategies, for instance inactivated pathogen, live attenuated and subunit vaccines, offer strong protection against diversity of hazardous diseases. In spite of this achievement, there remain chief obstacles to vaccine development against a diversity of infectious pathogens, part-icularly those better able to avoid the adaptive immune response. Furthermore, for most emer-ging virus vaccines, the main barrier is not the efficiency of usual approaches but the requirements for more rapid development and large-scale use. Nucleic acid therapeutics have appeared as hopeful option to classical vaccine approaches.

Mediterranean Journal of Pharmacy and Pharmaceutical Sciences Mediterranean journal of pharmacy and pharmaceutical sciences

K₂edta versus k₃edta stability in yemeni laboratories: toward climate-adapted protocols for resource-limited settings

Background: Preanalytical variability due to anticoagulant choice remains inadequately characterized in resource-limited tropical settings like Yemen, where environmental stressors exacerbate challenges. This study aimed to compare the stability and cost-effectiveness of K₂EDTA and K₃EDTA anticoagulants for complete blood count testing under simulated Yemeni conditions. Methods: Prospective study of 100 healthy adult male volunteers in Ad’Dla Governorate, Yemen (January–March 2025). Paired samples in K₂EDTA/K₃EDTA tubes were analyzed at baseline (T0) and after 6-hour storage at 22 ± 2°C (T6). Statistical analysis included Bonferroni-corrected repeated-measures ANOVA and paired t-tests. Results: Fresh samples showed high inter-anticoagulant concordance (ICC > 0.90). After 6-hour storage, K₂EDTA exhibited significant Mean Corpuscular Volume (MCV) reduction (Δ = −2.33 fL, p < 0 xss=removed xss=removed xss=removed> 2 hours), while K₃EDTA is preferable for immediate analysis. These findings provide preliminary guidance for hematology testing in Yemeni laboratories and similar tropical settings, pending validation in diverse populations and extreme conditions.

Karishma Karishma

Evaluasi optimalisasi alat forensik keamanan jaringan pada lalu lintas virtual router

This research aims to evaluate the optimization of network security forensic tools on virtual router (VR) traffic. The methodology used includes the selection of several forensic tools on the Windows operating system such as Wireshark, Windump, and Network Miner, with testing in a virtual network environment. Testing, includes simulating various attack scenarios to assess the effectiveness of threat detection, performance of forensic tools, and impact on network performance. The main results show that the tools have varying detection capabilities with variations in resource usage and impact on network latency. Network traffic has been successfully recorded using the Win-dump tool in the static-forensics method, the Wireshark tool and Network Miner in the live-forensics method. The evaluation results of the meta-router network forensic recording tool recommend Win-dump as a recording tool that does not burden the Windows operating system with memory usage of 1696 kb while the Wireshark and Network Miner applications are recorded at more than 20MB. Based on this research, the static forensic method which have been built with meta-router objects can be used by investigators to detect cyber attacks. Proper selection and configuration of forensic tools is critical to achieving a balance between security and network performance, and specific adjustments to network requirements can increase the effectiveness of threat detection and mitigation.

Firmansyah Yasin Firmansyah yasin

Bacteriological qualities of sources of domestic water supply and prevalence of typhoid fever in some communities of enugu state, southeast, nigeria: a cross-sectional study

Background: From the public health point of view, the microbiological properties of domestic water supply are the most important parameters of domestic water supply because of the propensity for microbial water-related diseases. In Enugu State, statistics have shown that reported cases of waterborne diseases (including typhoid fever) have been on the increase since 2003. The aim of the study was to determine the bacteriological qualities of domestic water supply and prevalence of typhoid fever in five communities of Enugu State in connection with the rising incidence of typhoid fever in the state. Methods: This was a cross-sectional study of sources of domestic water supply and prevalence of typhoid fever in five rural communities of Ezeagu Local Government Area. 297 copies of structured questionnaire, 10 grab water samples analysed using the membrane filtration method and 227 blood samples collected for Widal test were used to generate the data for the study, analysed as frequency distributions, t-test of means difference and Pearson product moment correlations using MaxStat (version 3.60) statistical software. Results: 2 (40%) of the 5 communities complied with the WHO standard for faecal coliform counts. Prevalence of typhoid fever was high in all the communities (71.4%-100%). Only faecal coliform counts correlated positively and strongly (r=0.69) with prevalence of typhoid fever. Conclusions: Since faecal coliform counts correlated positively and strongly (r=0.69) with prevalence of typhoid fever, improving the bacteriological qualities of domestic water supply may help to reduce the prevalence of typhoid fever.

Emmanuel umegbolu

Using microsoft excel in formulating poultry rations by linear programming

Formulation of the least cost rations that provides the nutrient requirements of birds is an important goal in poultry production . The aim of the present study was to create an application in the Excel program for formulation of low-cost poultry diets that provide adequate nutritional requirements using linear programming based on the Solver function of the Excel program and composition of common feed ingredients used in poultry diets (yellow corn, wheat, soybean meal , barley, wheat bran, protein concentrate, limestone, table salt, di-calcium phosphate, vitamins and minerals premix ,and vegetable oil), if their default prices are 500, 450, 750, 350, 250,1750, 250, 100, 500, 4500,and 1500) Iraqi Dinar / kg, respectively. The results showed that the Solver function in - Excel can be used to solve linear programming models such as those used for formulation of least cost poultry rations. This Microsoft Excel application is ready to use and can be used to assist researchers and students in formulating poultry rations that provide the desired nutritional requirements of poultry at the lowest cost.

RAFEA MOHAMMEDTAHER KHULEL Rafea mohammedtaher khulel

A comparative study of credit risk management: a case study of canara bank and karnataka bank.

Banks need finance to carry out their day to day activities smoothly. There will be times where the borrowers fail to repay the money leading a risk to the lenders. There are various types of risks faced by the banks such as financial and non-financial risk in the unstable environment. These risks may be a threat for the existence and achievements of banks. A Credit risk is the risk which arises when the borrower fails to make required payments. It is a huge loss to the lender where he loses both the principal and interest which leads to the interruption of the cash flows and increase in collection costs. Banks usually follow a certain framework while lending loans so that they can manage the credit risks. The main purpose of credit risk management is to find out how much credit should be provided to the borrowers and the different ways to collect the amount back. The success of banks depends on the formulation of the policies and procedures of lending the loans and collecting the amount back and avoid Non-Performing Assets (NPA) to the banks. When banks collect their debts systematically and avoid the Non- Performing Assets (NPA), they can survive in the competitive market. The study is focused on the comparison of two banks such as Canara Bank and Karnataka Bank with regard to loans, advances, interest received and expended and the variation in the levels of Non- Performing Assets. Methodology used is the secondary source of data where the balance sheet of the banks and the income and expenditure statement of the banks are being used to explore the credibility and the capacity of the banks in managing the credit risk.

Shaila Kamath Shaila kamath

Project risk and procurement management - procurement

Purchasing is one of the key managerial activities in every organisation, its significance having been identified during the 19th century. According to Kasilingham (2012, p.57), the period shortly before the Second World War marked the discovery of the fact that a firm’s success was not so much dependent upon what it was capable of selling but rather on how able organisations were to acquire necessary services together with materials from vendors. This discovery was triggered by a global shortage of virtually all fundamental materials for supporting operations, coupled with an abnormal rise in prices following the First World War. Since that time, purchasing has gained significance for the critical role it plays towards ensuring continuity of production (Hacioglu, 2019 p.265). Worth noting is that purchasing acts as “an interface between suppliers and functional areas within the buying organisation” (Crandall, Crandall & Chen, 2009 p.265). Among some of the functional areas that are influenced by purchasing are finance, marketing, production, and quality assurance (Magad & Amos, 2013 p.225). A vital deduction that can be made from this latter statement is that for the purchasing function to proceed smoothly and make the other functions- and the entire organisation- active, organisations must cultivate and maintain good relationships with suppliers and all other players in the supply chain. In addition, organisations operate in environments that are highly unpredictable; the techniques needed to perform the purchasing function become more refined almost every day due to constant changes in the market (Kasilingam, 2012 p.57). Subsequently, there is a need for managers in organisations to understand and embrace the idea of sustainable procurement.

Mohamed Sorogy Mohamed sorogy

Evaluation of the effects of thermal processing treatments on the nutrient and anti-nutrient composition of afzelia africana (akparata) flour

This research work aimed to evaluate the effects of thermal processing treatments on the nutrient anti-nutrient composition of Afzelia africana (Akparata) flour. The seeds were sorted, cleaned and processed into boiled, roasted and autoclaved lima bean flours. The flours obtained were analysed for proximate, vitamin and anti-nutrient contents using standard methods. The proximate composition of the samples revealed that the flours had a range of moisture, 8.23-12.40%, crude protein, 15.98-25.95%, fat, 21.00-28.21%, ash, 1.34-2.89%, crude fibre, 2.00-3.45%, carbohydrate, 38.68-49.33%, and energy 424.13 – 482.37kJ/100g, respectively. The vitamin contents of the flours showed that the samples contained 0.02±0.00 - 0.08±0.00mg/100g riboflavin, 0.78 - 1.98 mg/100g niacin, 0.40 - 0.89 mg/100g thiamine, 120.40-234.70mg/100g vitamin A, 72.11-134.19mg/100g ascorbic acid, 09.67-17.65mg/100g vitamin E, 310.60-430.60mg/100g B6, 3.47-5.87mg/100g B12, respectively. The result of the anti-nutrient composition of the flours also showed that the phytate, tannin, oxalate, cyanogenic glycosides, protease inhibitors, haemagglutinins inhibitors, levels of the samples were significantly (p<0.05) reduced by roasting and boiling treatments compared to the sample processed by autoclaving. In addition, the saponin content of the flours was relatively higher in boiled sample than in roasted and autoclaved flours. However, the nutrient and anti-nutrient contents of the flours observed that the flours have the potentials to be used as nutritional supplements in the preparation of a variety of food products than the raw sample.

OKECHUKWU OBED CHUKWUEMEKA Okechukwu obed chukwuemeka

Ayurvedic lipid based rasayans- a perspective on the preparation and pharmacological significance of lipids on the bioavailability of phytoconstituents

For thousands of years, lipid based Ayurvedic formulations have been made in India, and the craft has survived down the millennia up to the present time. Some of these deliciously potent phytonutrient preparations are very popular and have sustained the test of time pertaining to their efficacy. Recent researches on the role of phytonutrients in promoting cardio-pulmonary, brain and immune health substantially buttress the philosophy underlying the use of lipids in preparing these emulsions, since a large number of these bioactives are lipophilic. Being lipoidic, they are absorbed through the lacteals in the small intestine, and are then transported through the thoracic duct directly to the heart, bypassing the liver. The formulations utilizing ghee (clarified butter) or sesame oil as the carrier lipid, either while frying the myrobalams or as Anupana (adjuvant), have special significance in modulating bodily immunity, since the immune system is housed in lymphatics which are lipid rich. Amla and lipid based Ayurvedic rasayans (rejuvenating formulations) are a popular and highly palatable group of phytonutraceutical preparations. This group of polyherbal adaptogenic formulations is classified separately from other formulations in Ayurvedic therapeutics. Several of these healthpromoting rasayans are suitable to be consumed by all age-groups in the recommended season and dose. Current research on endothelial and immune cell receptor mediated uptake of lipoidic molecules, together with the knowledge of lipid absorption pathways, lends credence to the usefulness of rasayans in targeting the cardio-pulmonary and immune systems. An attempt has been made in this paper to elucidate the mechanisms underpinning the complex interplay between lipid delivered hydrophobic phyto-molecules, systemic lymphatics and the Immune system.

Sharadendu Bali Sharadendu bali

Acute systemic toxicity of four mimosaceous plants leaves in mice

Nature provides drugs in the form of medicinal plants to cure all ailments of mankind with fewer side effects. These medicinal plants can cause some serious damaging effects on the vital organs of the body too; there is a need of toxicity studies to provide their safe use both in human and animals. The present study reports the acute systemic toxicity of methanolic extracts of leaves of Adenanthera pavonina L., Peltophorum roxburghii Deneger., Prosopis cineraria Druce and Prosopis juliflora DC., (Mimosaceae) in swiss albino mice to explore their suitable doses for pharmacological screening. Observations were made immediately and after 1/2, 1, 4, 24 and 48hours of intraperitoneal drug administration. Adenanthera pavonina extract at the dose of 150 mg/kg body weight is considered to be safe. Whereas remaining extracts of investigated plants are relatively safe at the dose of 100 mg/kg body weight.

Dr. Salman Ahmed Dr. salman ahmed

An efficient sarcasm detection in audio using parameter-reduced depthwise cnn

In this study, we implement a lightweight CNN for sarcasm detection using audio input. To achieve this goal, we propose DepthFire block. We propose a lightweight version of the traditional Depthwise convolution layer that focuses on reduced memory. Unlike the traditional depthwise convolution layer that focuses on reducing the memory requirements of the entire architecture, our solution offers a specific and targeted approach that specifically reduces the memory requirements of the depthwise convolution layer through parameter reduction.We evaluated the impact of its energy consumption and the performance of our proposed solution with other existing solutions and on different activations, pooling functions and datasets.We further tested the applicability of the solution on 2D input.And our solution obtained 82.98 percent model size reduction as compared to MobileNetV2 and 58.94 percent as compared to MobileNetV3 small with a energy reduction of 56.48 percent on CIFAR10 dataset.

Jiby Mariya Jose Jiby mariya jose

Securing video files using steganography method in android mobile

The development of smart phone technology has lead to denigrate of the phone prepared with many sophisticated features such as sensors. Camera is one of the most extensively used sensors. Although the photographs capture by camera can be shared via Multimedia Message Service (MMS) which allows broadcast of files like photographs, audio and video. A major problem of MMS is, it doesn’t provide adequate safety mechanism. Because of this, the data of the people who wants to conceal confidential information from state-controlled systems that can be easily monitored. Video Steganography is a technique to hide any type of files in any extension into a Video file. The idea proposed in this paper is to embed any kind of data in another file, which is called carrier file. The carrier file must be image video file. Steganography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. In this paper, a steganography-based android mobile application that can insert the confidential information into an image, then into a video that can be send it to receiver. Finally we can extract the confidential information from the image in the receiver side.

Dr H Shaheen Dr h shaheen

Critical process parameters evaluation of modified nanoprecipitation method on lomustine nanoparticles and cytostatic activity study on l132 human cancer cell line.

This work was focused on identification and evaluation of process parameters of modified nanoprecipitation method, for fabrication of lomustine nanoparticles, with the aim of reducing cancer cell viability at low concentration of lomustine. The parameters controlling particle size, mostly in nanosize, were solvent/nonsolvent composition and emulsification speed of homogenizer along with aqueous phase volume. This controlled particle size is below 250 nm. The stabilizer concentration controlled particle size is within 68 nm ± 0.89 to 137 ± 0.94 nm with PDI 0.06 ± 0.008 to 0.25 ± 0.001. But, the stabilizer addition mode showed more uniform size distribution with PDI 0.085 ± 0.004. Entrapment efficiency was maintained well above 47 ± 0.23%. The drug release pattern was monophasic with controlled release over 24 hrs. In the method used, drug content was affected by ratio of polymer to drug to organic solvent, as well as homogenization speed and time. Percentage viable cells of L132 human lung cancer cell line remained, were only 5% at 100 μg/ml lomustine equivalent PLA nanoparticles.

Archana Mehrotra Archana mehrotra

Inhibition of hyperoxaluric calcium oxalate nephrolithiasis by macrotyloma uniflorum (lam.) verdc. seeds infusion on glass slide

Hyperoxaluria is a metabolic disorder responsible for calcium oxalate nephrolithiasis. The study was conducted on glass slides to observe the growth patterns of urinary calcium oxalate monohydrate crystals and their inhibition by 5, 10, 15 and 20 % infusion of Macrotyloma uniflorum seeds. For this purpose, a drop of gel medium (sodium metasilicate of 1.06 specific gravity and 3M acetic acid solution) at pH 5.02 - 5.17 was placed in the middle of a glass slide and converted into a gel. A 1 M oxalic acid drop was dropped to the left, and 1 M calcium chloride and magnesium acetate (1:1) solution was dropped to the right side of the properly formed gel. The glass slide was observed under a microscope till it was completely dried. In the case of the crystal inhibition study, a drop of M. uniflorum infusion was also added on the right side just after adding calcium chloride and magnesium acetate solution. The results without infusion showed detailed morphology and aggregation patterns of observed crystals such as donut, dumbbell, needles, platy, prismatic, rosette, round edges, X-shape crystals, loose and compact aggregates. All infusions of M. uniflorum affected the crystals, forming defective crystals. 5 % infusion inhibited crystals of all morphologies except donuts, X-shaped crystals, donuts, platy crystals and rosettes. Defected rosettes were observed in 10 % infusion, which was reduced gradually in the crowd by 15 and 20 %, respectively. From this study, it can be concluded that M. uniflorum seeds infusion is effective against calcium oxalate nephrolithiasis.

Dr. Salman Ahmed Dr. salman ahmed

Ai integration with electronic health records (ehr): a synergistic approach to healthcare informatics

This article investigates the integration of Artificial Intelligence (AI) with Electronic Health Records (EHR), exploring the transformative impact of this synergy on healthcare informatics. Through an in-depth analysis of recent advancements, practical implementations, and ethical considerations, the paper illuminates how AI is enhancing the efficiency, accuracy, and insights derived from EHR, ultimately contributing to improved patient care and clinical decision-making.

Dhruvitkumar Talati Dhruvitkumar talati

‹ First  < 37 38 39 40 41 >  Last ›