Nowadays, terabytes of digital data are generated and sent online every second. However, securing this extent of information has always been a challenging task. Cryptography is a fundamental method for securing data, as it makes data unintelligible for attackers, offering privacy to authorized clients. Different cryptographic algorithms have different speeds and costs that make them suitable for different applications. For instance, banking applications need outrageous security amenities, as they utilize superior algorithms having greater requirements, while gaming applications focus more on speed and cost reduction. Consequently, cryptographic algorithms are chosen based on a client's prerequisites. This study compared DES, AES, Blowfish, and RSA, examining their speed, cost, and performance, and discussed their adequacy for use in wireless sensor networks and peer-to-peer communication.
BackgroundVenous thromboembolism (VTE) is a condition that occurs when a blood clot forms in veins. Hospitalization increases the risk of VTE so timely risk assessment and adequate prophylaxis for VTE should be done to prevent this potentially fatal complication. Local problemData from developing countries regarding VTE prophylaxis is scarce. VTE is a neglected area of research in Pakistan. So this closed-loop clinical audit was conducted to evaluate the VTE risk assessment and prophylaxis practices and to analyze the importance of educational intervention in improving the standard of care. Patients and methodsWe adopted the National Institute for Health and Care Excellence (NICE) guidelines for VTE prophylaxis as an audit standard. We collected data on a specially designed proforma by prospectively reviewing the hospital notes of patients in the Medical Ward of
<abstract> <p>Among the most sought after breakthroughs nowadays to combat computational saturation in the electronic hardware realm, neuromorphic and cytomorphic mimetics of biological structures seem potentially promising. Biological circuits are distinguishable due to their minuscule dimensions and immensely low power consumption; yet they achieve extremely complex and magnificent tasks of life, such as, thinking, memorizing, decision making and self-regulating in response to the surroundings. Low power analog circuit solutions are edged over digital ones as they are inherently noisy and fuzzy like bio-systems. In this paper, an analog circuit equivalent for a well-known biological pathway, cyclic adenosine monophosphate (cAMP), has been proposed, exploiting the fabrication characteristics of an analog transistor. The work demonstrates an application of previously published research of the authors, where it was shown that a single transistor operating in analog mode can mimic some fundamental biological circuit processes like receptor-ligand binding, Michaelis Menten and Hill process reactions. Since biological pathways are chain connections of such reactions, same modular approach can be used to build electronic pathways using those basic transistor circuits. Although the idea of creating silicon life seems far-fetched at this stage, this work supplements the idea of cytomorphic chips which is already gaining interest of bio-engineering community.</p> </abstract>
With the technological advancements in the field of networking and information technology in general, organizations are enjoying the technological blessings and simultaneously under perpetual threats that are present in the form of attacks, designed especially to disable organizations and their infrastructure, as the gravest cyber threats in recent times. Compromised computers or BOTNETs are unarguably the most severe threat to the security of internet community. Organizations are doing their best to curb BOTNETs in every possible way, spending huge amount of their budget every year for available hardware and software solutions. This paper presents a survey on the security issues raised by the BOTNETs, their future; how they are evolving and how they could be circumvent to secure the most valuable resource of the organizations which is data. The compromised systems may be treated like viruses in the network which are capable of performing substantial loss to the organization including theft of confidential information. This paper highlights the parameters that should be considered by the organizations or Network administrators to find out the anomalies that may point to the presence of BOTNET in the network. The early detection may reduce the impact of damage by taking timely actions against compromised systems.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.