Sphygmomanometers are the cornerstone of blood pressure management and yet there is no national standard for the regulation of this equipment in the UK. It is known that these machines may often be inaccurate, particularly those used in the community. We embarked upon a survey of all sphygmomanometers in current use in one inner city primary care group. Contrary to our initial hypothesis, inaccuracy rates were lower than
The problem of online packet scheduling to minimize the required conventional grid energy for transmitting a fixed number of packets given a common deadline is considered. The total number of packets arriving within the deadline is known, but the packet arrival times are unknown, and can be arbitrary. The proposed algorithm tries to finish the transmission of each packet assuming all future packets are going to arrive at equal time intervals within the left-over time. The proposed online algorithm is shown to have competitive ratio that is logarithmic in the number of packet arrivals. The hybrid energy paradigm is also considered, where in addition to grid energy, energy is also available via extraction from renewable sources. The objective here is to minimize the grid energy use. A suitably modified February 5, 2016 DRAFT 2 version of the previous algorithm is also shown to have competitive ratio that is logarithmic in the number of packet arrivals.
Communication security is one of the areas where research is highly required. The data used in communication is very sensitive and needs to be protected and made abstract from intruders of system. This research is all about securing the messages or data that is being communicated among two parties.The recent branch of Network security is Cryptography using Elliptic Curve Architectures which is based on the arithmetic of elliptic curves and discrete logarithmic problems. ECC schemes are public-key based mechanisms that provide encryption, digital signatures and key exchange algorithms. The best known encryption scheme is the Elliptic Curve Integrated Encryption Scheme (ECIES) which is included in IEEE and also in SECG SEC 1 standards. The key establishment protocol is Elliptic Curve MQV, with implicit certificates and symmetric key cryptographic techniques. The research focuses on achieving secrecy using ECIES algorithm for encryption, and authentication using Hashing technique. The hashed plaintext is again encrypted with RSA. At the receiver end, the hashed text is decrypted first. The hash value of the plaintext decrypted is compared with the latter hash. If they are found equal, the integrity can also be assured. The parameters to considered choosing Elliptic Curves are presented in NIST document of recommended elliptic curves.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.