Hasil untuk "cs.CR"

Menampilkan 9 dari ~9 hasil · dari DOAJ, Semantic Scholar

JSON API
S2 Open Access 2020
Cuscuta reflexa Roxb. Expedites the Healing Process in Contact Frostbite

W. Hassan, M. Buabeid, U. Kalsoom et al.

Frostbite is caused due to extreme vulnerability to cold, resulting in damage of deeper and superficial tissues alike. In this study, we report the anti-inflammatory and wound-healing properties of aqueous methanolic extract of Cuscuta reflexa (Cs.Cr) against contact frostbite. Thirty rats were divided into five groups including three treatment groups with increasing doses of Cs.Cr, a standard drug group receiving acetylsalicylic acid (ASA), and a metal bar-induced frostbite group. Frostbite injury was induced by a 3 × 3.5 cm metal bar frozen up to -79°C on shaved skin for continuous 3 minutes. Wounded area percentages were recorded to measure the healing rate in response to Cs.Cr administration. Haematological parameters and malondialdehyde content were also noted. On treatment with Cs.Cr, the healing rate is drastically increased and lipid peroxidation product malondialdehyde was decreased in a dose-dependent manner. Results were compared with frostbite and ASA (standard drug group). These results indicate that Cs.Cr possesses excellent wound-healing properties against frostbite injury and can prove to be a prospective compound in such conditions.

4 sitasi en Medicine
DOAJ Open Access 2018
A Secured Data Processing Technique for Effective Utilization of Cloud Computing

Mbarek Marwan, Ali Kartit, Hassan Ouahmane

Digital humanities require IT Infrastructure and sophisticated analytical tools, including datavisualization, data mining, statistics, text mining and information retrieval. Regarding funding, tobuild a local data center will necessitate substantial investments. Fortunately, there is another optionthat will help researchers take advantage of these IT services to access, use and share informationeasily. Cloud services ideally offer on-demand software and resources over the Internet to read andanalyze ancient documents. More interestingly, billing system is completely flexible and based onresource usage and Quality of Service (QoS) level. In spite of its multiple advantages, outsourcingcomputations to an external provider arises several challenges. Specifically, security is the majorfactor hindering the widespread acceptance of this new concept. As a case study, we review the use ofcloud computing to process digital images safely. Recently, various solutions have been suggested tosecure data processing in cloud environement. Though, ensuring privacy and high performance needsmore improvements to protect the organization's most sensitive data. To this end, we propose aframework based on segmentation and watermarking techniques to ensure data privacy. In this respect,segementation algorithm is used to to protect client's data against untauhorized access, whilewatermarking method determines and maintains ownership. Consequentely, this framework willincrease the speed of development on ready-to-use digital humanities tools.

History of scholarship and learning. The humanities, Bibliography. Library science. Information resources
DOAJ Open Access 2018
A novel approach based on segmentation for securing medical image processing over cloud

Mbarek Marwan, Ali Kartit, Hassan Ouahmane

Healthcare professionals require advanced image processing software to enhance the quality of clinical decisions. However, any investment in sophisticated local applications would dramatically increase healthcare costs. To address this issue, medical providers are interested in adopting cloud technology. In spite of its multiple advantages, outsourcing computations to an external provider arises several challenges. In fact, security is the major factor hindering the widespread acceptance of this new concept. Recently, various solutions have been suggested to fulfill healthcare demands. Though, ensuring privacy and high performance needs more improvements to meet the healthcare sector requirements. To this end, we propose a framework based on segmentation approach to secure cloud-based medical image processing in the healthcare system.

History of scholarship and learning. The humanities, Bibliography. Library science. Information resources
S2 Open Access 2016
A wireless physically secure key distribution system

G. Barbosa

A secure key distribution protocol protected by light's noise was introduced in 2003 [Phys. Rev. A 68, 052307 (2003)]. That protocol utilized the shot noise of light present in the optical channel (eg., an optical fiber) to restrict information leaks to an adversary. An initial shared information between the legitimate users allowed them to extract more information from the channel than the one obtained by the adversary. That original paper recognized the need for a privacy amplification step but no specific protocol was presented. More recently that original idea was improved with a specific privacy amplification protocol [arXiv:1406.1543v2 [cs.CR] 8 Jul 2015] while keeping the use of an optical communication channel. This work merges main ideas of the protection given by the light's noise in a protocol applied to wireless channels. The use of a wireless channels together with recorded physical noise was introduced from 2005 to 2007 (see eg, arXiv:quant-ph/0510011 v2 16 Nov 2005 and arXiv:0705.2243v2 [quant-ph] 17 May 2007). This work improves those embrionary ideas of wireless channels secured by recorded optical noise. The need for specific optical channels is eliminated with the wireless variation and opens up the possibility to apply the technique to mobile devices. This work introduces this new scheme and calculates the associated security level.

1 sitasi en Computer Science
DOAJ Open Access 2010
A Proof Theoretic Analysis of Intruder Theories

Alwen F Tiu, Rajeev Gore, Jeremy Dawson

We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages Gamma under the theory of blind signatures and arbitrary convergent equational theories modulo associativity and commutativity (AC) of certain binary operators. The traditional formulations of intruder deduction are usually given in natural-deduction-like systems and proving decidability requires significant effort in showing that the rules are "local" in some sense. By using the well-known translation between natural deduction and sequent calculus, we recast the intruder deduction problem as proof search in sequent calculus, in which locality is immediate. Using standard proof theoretic methods, such as permutability of rules and cut elimination, we show that the intruder deduction problem can be reduced, in polynomial time, to the elementary deduction problem, which amounts to solving certain equations in the underlying individual equational theories. We show that this result extends to combinations of disjoint AC-convergent theories whereby the decidability of intruder deduction under the combined theory reduces to the decidability of elementary deduction in each constituent theory. To further demonstrate the utility of the sequent-based approach, we show that, for Dolev-Yao intruders, our sequent-based techniques can be used to solve the more difficult problem of solving deducibility constraints, where the sequents to be deduced may contain gaps (or variables) representing possible messages the intruder may produce.

Logic, Electronic computers. Computer science