153 research outputs found
Audio Hiding based on Wavelet Transform and Linear Predictive Coding
In this work an efficient method for hiding a speech in audio is proposed. The features of secretspeech is extracted with LPC (Linear Predictive Coding), and these parameters embedded in audio inchaotic order. Discrete Wavelet Transform (DWT) is applied on audio frames to split the signal in high andlow frequencies. The embedding parameters are embedded in high frequency. The stego audio isperceptually indistinguishable from the equivalent cover audio. The proposed method allows hiding a sameduration of speech (secret) and audio (cover). The stego audio is subjected to objective tests such signal to noiseratio (SNR), signal to noise ratio segmental (SNRseg), Segmental Spectral SNR, Log Likelihood Ratio (LLR)and Correlation (Rxy) to determine the similarity with original audio
Anesthetic Considerations for Cardiac Tamponade after Internal Jugular Central Line Placement during Trauma Resuscitation: A Case Report
Numerous complications are associated with central venous catheters. Among them, cardiac tamponade is a rare but well-documented catastrophic complication. A 22-year-old healthy male presented with Code 1 trauma resulting from gunshot wounds in the abdomen. Upon examination, he was found to have a large pericardial fluid collection, a large right supraclavicular hematoma, and significant amount of bilateral pleural effusions secondary to extraluminal placement of the right internal jugular central line during resuscitation. After repairing the internal jugular injury and draining the pericardial fluid, the patient was transferred from the intensive care unit to the regular hospital floor. However, 15 days later, imaging revealed re-accumulation of a large pericardial effusion, which was eventually treated with a pericardial window operation. This case report explores potential complications that could arise from central line placement and the anesthetic considerations in a patient with cardiac tamponade from extraluminal central line placement
Lightweight digital imaging and communications in medicine image encryption for IoT system
Diagnosis in healthcare systems relies heavily on the use of medical images. Images such as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging (MRIs), and other scans of the brain and other internal organs of patients include private and personal information. However, these images are vulnerable to unauthorized users who unlawfully use them for non-diagnostic reasons due to the lack of security in communication routes and the gaps in the storage systems of hospitals or medical centers. Image encryption is a prominent technique used to protect medical images from unauthorized access in addition to enhancing the security of communication networks. In this paper, researchers offer a lightweight cryptosystem for the secure encryption of medical images that makes use of the present block cipher and a five-dimensional chaotic map. More than 25 images from the open science framework (OSF) public database of patients with coronavirus disease 2019 (COVID-19) were used to evaluate the proposed system. DICOM stands for “digital imaging and communications in medicine”. The efficiency of the proposed system is proved in terms of adjacent pixels’ correlation analysis, National Institute of Standards and Technology (NIST) analysis, mean square error, information entropy, unified average changing intensity, peak-to-signal noise ratio, entropy, and structure similarity index image
Adaptive Speech Coding Method Based on Singular Value Decomposition and Grey Wolf Optimization for Arabic Language
Speech coding plays a crucial role in maintaining speech quality while optimizing network resources and expediting transmission, as well as facilitating the storage of speech data. In this paper, an adaptive method for speech coding using singular value decomposition (SVD), grey wolf optimization (GWO), and run-length encoding (RLE) was proposed. The proposed method streamlines the speech matrix through preprocessing, converting it into short intervals. Subsequently, each interval undergoes decomposition using SVD, followed by optimization of compression quality using GWO. Finally, RLE is employed as the last step to increase space-saving. The developed method was conducted on two datasets: Quran and LibriSpeech using PSNR, PSEQ, and MOS tests. The results demonstrate promising outcomes, achieving space-saving up to 89.80, 84.04, 74.76, 67.24, and 59.52, respectively, for different values of quality (10, 20, 30, 40, and 50). GWO was used to optimize the quality factor which varies in each block, further increasing the space-saving up to 85.77. The average value of PSNR was equal to 21.3, MOS = 4.71, and PSEQ was equal to 3.95. Lastly, the RLE method effectively reduced the size of speech matrices, yielding a highly satisfactory space saving of up to 90.77, while maintaining excellent speech quality
Dynamic Key Generation Using GWO for IoT System
One well-known technological advancement that significantly impacts many things is the Internet of Things (IoT). These include connectivity, work, healthcare, and the economy. IoT can improve life in many situations, including classrooms and smart cities, through work automation, increased output, and decreased worry. However, cyberattacks and other risks significantly impact intelligent Internet of Things applications. Key generation is essential in information security and the various applications that use a distributed system, networks, or Internet of Things (IoT) systems. Several algorithms have been developed to protect IoT applications from malicious attacks; since IoT devices usually have small memory resources and limited computing and power resources, traditional key generation methods are inappropriate because they require high computational power and memory usage. This paper proposes a method of Dynamic Key Generation Method (DKGM) to overcome the difficulty using a specific chaotic map called the Zaslavskii Map and a swarm intelligent algorithm for optimization called Grey Wolf Optimizer (GWO). DKGM's ability to generate several groups-seed numbers using the Zaslavskii map depends on various initial parameters. GWO selects strong generated numbers depending on the randomness test as a fitness function. Three wolfs GWα, GWβ, and GWΩ, are used to simulate the behavior of a pack of grey wolves when attacking prey. The speed and position of each wolf are updated depending on the best three wolves. Finally, use the sets GWα in the round, GWβ in the subkey, and GWΩ in shifting operations of the Chacha20 hash function. The dynamic procedure was used to improve the high-security analysis of the DKGM approach over earlier methods. Simulations show that the suggested method is preferable for IoT applications
Lightweight Image Encryption Based on A Hybrid Approach
A secure image could be achieved by encryption, a technique for securing images over different media transmission lines with privacy and keeping them safe for the receiver. This paper proposes an image encryption approach to achieve excellent security by combining a lightweight encryption algorithm with the chaotic Peter De Jong map. The Lilliput algorithm, lightweight encryption, uses the Peter De-Jones map to produce keys. The suggested approach achieved a suitable level of complexity that matched the historical demands for transmission images. Two methods were used to conduct the tests on a standard image collection: an encrypted image and a generated key. Standard metrics find the similarity between the input and output images to achieve an accurate proposal performance. The encrypted image's entropy was assessed and discovered that it matched the original image values exactly. The results were satisfactory regarding obtaining a precise correlation rate between the original and encrypted photos. The decryption and reconstruction of the image were completed quickly and steadily, with a high success rate and excellent outcomes. The proposed approach was evaluated on a dataset of well-known test photos with unique features, including varying degrees of lightness and shade to create the perfect test
Anesthetic Management of a Patient with Renal Cell Carcinoma-Associated Venous Thrombosis and Massive Transfusion
A 53-year-old male with a history of multiple deep venous thromboses (DVTs) underwent a right open radical nephrectomy with inferior vena cava (IVC) thrombectomy in the context of renal cell carcinoma (RCC)-associated venous thrombosis. Imaging and renal biopsy revealed a diagnosis of RCC with non-occlusive thrombosis of the left renal vein and occlusive thrombosis of the infrarenal IVC. The major risks of concern for the procedure included thrombus embolization from surgical manipulation and massive bleeding. Intraoperatively, the patient experienced significant hemorrhage requiring massive transfusion protocol. The purpose of this case report is to emphasize the importance of multidisciplinary involvement, intraoperative thrombus monitoring, and principles of massive transfusion in the management of similar cases
Epidural Catheters for Cervical Epidural Steroid Injections to Target Higher Cervical Pathology: Clinical Images in Practice
Cervical radicular pain is commonly treated with cervical epidural steroid injections. The transforaminal approach allows for direct treatment of the steroid at a particular nerve root or level. Still, it carries a significant risk of morbidity and mortality with thromboembolism or injury to cervical vasculature. The interlaminar approach is commonly utilized as it avoids vascular structures. However, the epidural space becomes narrower at higher levels, limiting the ability to perform this approach at higher cervical levels. Cervical epidural catheters can be used and advanced to target higher cervical pathology through the interlaminar approach. We present clinical images demonstrating the utility of a cervical catheter for treating higher cervical levels
Peripheral Nerve Stimulation After Total Knee Arthroplasty and Non-Operable Patella Fracture
Chronic knee pain, affecting over 25% of adults in the United States, has surged by 65% over the past two decades leading to rising functional deficits, mobility problems, and a diminished quality of life. While conservative management with pharmacologic and minimally invasive injections are pursued early in the disease process, total knee arthroplasty for refractory osteoarthritis of the knee is often considered. This procedure usually improves pain and functionality within the first three months. However, a significant portion of patients often suffer from postoperative pain that can become chronic and debilitating. We detail the case of a patient with a previous TKA as well as a non-operable patella fracture who obtained significant relief with PNS despite prior conservative and minimally invasive management
A Need for Further Education on Buprenorphine in Pain Medicine
With the ongoing opioid epidemic in the United States there has been a strong transition towards utilizing multi-modal analgesia, interventional procedures, and non-opioid medications when managing acute and chronic pain. There has also been an increased interest in utilizing buprenorphine. Buprenorphine is a novel long-acting analgesic with partial mu-opioid agonist activity that can be utilized for analgesia as well as opioid use disorder. Buprenorphine also has a unique set of side effects as well pharmacodynamic and pharmacokinetic properties that require special attention, especially if these patients require future surgical interventions. Given the increased interest in this medication we believe that there needs to be increased education and awareness regarding this medication amongst physicians, specifically pain management physicians and trainees
- …
