Cuscuta reflexa Roxb. Expedites the Healing Process in Contact Frostbite
W. Hassan, M. Buabeid, U. Kalsoom
et al.
Frostbite is caused due to extreme vulnerability to cold, resulting in damage of deeper and superficial tissues alike. In this study, we report the anti-inflammatory and wound-healing properties of aqueous methanolic extract of Cuscuta reflexa (Cs.Cr) against contact frostbite. Thirty rats were divided into five groups including three treatment groups with increasing doses of Cs.Cr, a standard drug group receiving acetylsalicylic acid (ASA), and a metal bar-induced frostbite group. Frostbite injury was induced by a 3 × 3.5 cm metal bar frozen up to -79°C on shaved skin for continuous 3 minutes. Wounded area percentages were recorded to measure the healing rate in response to Cs.Cr administration. Haematological parameters and malondialdehyde content were also noted. On treatment with Cs.Cr, the healing rate is drastically increased and lipid peroxidation product malondialdehyde was decreased in a dose-dependent manner. Results were compared with frostbite and ASA (standard drug group). These results indicate that Cs.Cr possesses excellent wound-healing properties against frostbite injury and can prove to be a prospective compound in such conditions.
An Improved Revocable Fuzzy Vault Scheme for Face Recognition Under Unconstrained Illumination Conditions
Chafia Ferhaoui Cherifi, Mohamed Deriche, Khaled-Walid Hidouci
2 sitasi
en
Computer Science
A Secured Data Processing Technique for Effective Utilization of Cloud Computing
Mbarek Marwan, Ali Kartit, Hassan Ouahmane
Digital humanities require IT Infrastructure and sophisticated analytical tools, including datavisualization, data mining, statistics, text mining and information retrieval. Regarding funding, tobuild a local data center will necessitate substantial investments. Fortunately, there is another optionthat will help researchers take advantage of these IT services to access, use and share informationeasily. Cloud services ideally offer on-demand software and resources over the Internet to read andanalyze ancient documents. More interestingly, billing system is completely flexible and based onresource usage and Quality of Service (QoS) level. In spite of its multiple advantages, outsourcingcomputations to an external provider arises several challenges. Specifically, security is the majorfactor hindering the widespread acceptance of this new concept. As a case study, we review the use ofcloud computing to process digital images safely. Recently, various solutions have been suggested tosecure data processing in cloud environement. Though, ensuring privacy and high performance needsmore improvements to protect the organization's most sensitive data. To this end, we propose aframework based on segmentation and watermarking techniques to ensure data privacy. In this respect,segementation algorithm is used to to protect client's data against untauhorized access, whilewatermarking method determines and maintains ownership. Consequentely, this framework willincrease the speed of development on ready-to-use digital humanities tools.
History of scholarship and learning. The humanities, Bibliography. Library science. Information resources
A novel approach based on segmentation for securing medical image processing over cloud
Mbarek Marwan, Ali Kartit, Hassan Ouahmane
Healthcare professionals require advanced image processing software to enhance the quality of clinical decisions. However, any investment in sophisticated local applications would dramatically increase healthcare costs. To address this issue, medical providers are interested in adopting cloud technology. In spite of its multiple advantages, outsourcing computations to an external provider arises several challenges. In fact, security is the major factor hindering the widespread acceptance of this new concept. Recently, various solutions have been suggested to fulfill healthcare demands. Though, ensuring privacy and high performance needs more improvements to meet the healthcare sector requirements. To this end, we propose a framework based on segmentation approach to secure cloud-based medical image processing in the healthcare system.
History of scholarship and learning. The humanities, Bibliography. Library science. Information resources
A wireless physically secure key distribution system
G. Barbosa
A secure key distribution protocol protected by light's noise was introduced in 2003 [Phys. Rev. A 68, 052307 (2003)]. That protocol utilized the shot noise of light present in the optical channel (eg., an optical fiber) to restrict information leaks to an adversary. An initial shared information between the legitimate users allowed them to extract more information from the channel than the one obtained by the adversary. That original paper recognized the need for a privacy amplification step but no specific protocol was presented. More recently that original idea was improved with a specific privacy amplification protocol [arXiv:1406.1543v2 [cs.CR] 8 Jul 2015] while keeping the use of an optical communication channel. This work merges main ideas of the protection given by the light's noise in a protocol applied to wireless channels. The use of a wireless channels together with recorded physical noise was introduced from 2005 to 2007 (see eg, arXiv:quant-ph/0510011 v2 16 Nov 2005 and arXiv:0705.2243v2 [quant-ph] 17 May 2007). This work improves those embrionary ideas of wireless channels secured by recorded optical noise. The need for specific optical channels is eliminated with the wireless variation and opens up the possibility to apply the technique to mobile devices. This work introduces this new scheme and calculates the associated security level.
1 sitasi
en
Computer Science
GASTROPROTECTIVE EFFECTS OF CUSCUTA REFLEXA ON ASPIRIN-INDUCED PEPTIC ULCER
Rubina Mubashar, Hafiz Muhammad Farhan Rasheed, Mushtaq Ahmed
et al.
Coriander fruit exhibits gut modulatory, blood pressure lowering and diuretic activities.
Q. Jabeen, S. Bashir, B. Lyoussi
et al.
A Proof Theoretic Analysis of Intruder Theories
Alwen F Tiu, Rajeev Gore, Jeremy Dawson
We consider the problem of intruder deduction in security protocol analysis:
that is, deciding whether a given message M can be deduced from a set of
messages Gamma under the theory of blind signatures and arbitrary convergent
equational theories modulo associativity and commutativity (AC) of certain
binary operators. The traditional formulations of intruder deduction are
usually given in natural-deduction-like systems and proving decidability
requires significant effort in showing that the rules are "local" in some
sense. By using the well-known translation between natural deduction and
sequent calculus, we recast the intruder deduction problem as proof search in
sequent calculus, in which locality is immediate. Using standard proof
theoretic methods, such as permutability of rules and cut elimination, we show
that the intruder deduction problem can be reduced, in polynomial time, to the
elementary deduction problem, which amounts to solving certain equations in the
underlying individual equational theories. We show that this result extends to
combinations of disjoint AC-convergent theories whereby the decidability of
intruder deduction under the combined theory reduces to the decidability of
elementary deduction in each constituent theory. To further demonstrate the
utility of the sequent-based approach, we show that, for Dolev-Yao intruders,
our sequent-based techniques can be used to solve the more difficult problem of
solving deducibility constraints, where the sequents to be deduced may contain
gaps (or variables) representing possible messages the intruder may produce.
Logic, Electronic computers. Computer science
Cryptanalysis of chaotic stream cipher
Adrian Skrobek