• Title/Summary/Keyword: Campus Network

Search Result 297, Processing Time 0.027 seconds

A Review of Security and Privacy of Cloud Based E-Healthcare Systems

  • Faiza Nawaz;Jawwad Ibrahim;Maida Junaid
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.153-160
    • /
    • 2024
  • Information technology plays an important role in healthcare. The cloud has several applications in the fields of education, social media and medicine. But the advantage of the cloud for medical reasons is very appropriate, especially given the large volume of data generated by healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Cloud computing has many advantages, such as "flexibility, cost and energy savings, resource sharing and rapid deployment". However, despite the significant benefits of using the cloud computing for health IT, data security, privacy, reliability, integration and portability are some of the main challenges and obstacles for its implementation. Health data are highly confidential records that should not be made available to unauthorized persons to protect the security of patient information. In this paper, we discuss the privacy and security requirement of EHS as well as privacy and security issues of EHS and also focus on a comprehensive review of the current and existing literature on Electronic health that uses a variety of approaches and procedures to handle security and privacy issues. The strengths and weaknesses of some of these methods were mentioned. The significance of security issues in the cloud computing environment is a challenge.

Congestion Detection and Control Strategies for Multipath Traffic in Wireless Sensor Networks

  • Razzaque, Md. Abdur;Hong, Choong Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.465-466
    • /
    • 2009
  • This paper investigates congestion detection and control strategies for multi-path traffic (CDCM) diss emination in lifetime-constrained wireless sensor networks. CDCM jointly exploits packet arrival rate, succ essful packet delivery rate and current buffer status of a node to measure the congestion level. Our objec tive is to develop adaptive traffic rate update policies that can increase the reliability and the network lif etime. Our simulation results show that the proposed CDCM scheme provides with good performance.

Optimal ELAN Configuration for Scaling Broadcast Traffic in a LAN Emulation Network (LANE망에서의 scalable한 broadcast traffic 관리를 위한 최적 ELAN 구성방법)

  • 손종희;김도훈;차동완
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.691-694
    • /
    • 2000
  • 기존 LAN 환경에서 인터넷을 이용한 멀티미디어 실시간 전송과 같은 QoS 보장형 서비스에 대한 요구가 증대되면서, 고속의 ATM 기술을 LAN에 적용하는 기술들이 등장하였다. LANE(LAN Emulation)은 그러한 기술 대안들 중에서 campus network와 enterprise network에 많이 보급되고 있는 기술이다. 그러나 이러한 급격한 LANE 도입에 비하여 이의 효과적인 운용에 대한 연구는 많지 않은 실정이다. 본 논문에서는 LANE을 도입한 campus network의 최적 운영방안에 대하여 논한다. Broadcast 데이터 트래픽 관리에서 발생하는 규모성(Scalability) 문제로 인하여 전체 LANE망은 여러 개의 ELAN으로 나뉘어 관리된다. 이 때 하나의 ELAN은 마치 단위 LAN로써, Broadcast 데이터의 전송범위를 제한한다. 즉, 서로 다른 ELAN에 속하는 노드간에는 Broadcast 방식으로 데이터를 전송할 수 없게 된다. 그런데, IPX 등을 사용하는 대화형 시뮬레이션 게임 등과 같은 응용프로그램에서는 Broadcast 방식이 이용되므로, 서로 다른 ELAN에 속하는 노드간의 데이터 전송은 불가능하게 되거나 별도의 복잡한 과정을 개입시켜야 하는 비용이 발생한다. 따라서 규모성 문제해결을 위한 ELAN 구성(configuration)에는 위와 같은 비용이 수반된다. 본 연구에서는 LANE망을 여러 개의 ELAN으로 분할하는 경우에 블로킹(blocking) 되는 Broadcast 트래픽 규모를 해당 ELAN 구성의 비용으로 간주한다. 이 경우에 규모성을 고려한 ELAN의 최적 구현방안(optimal configuration)은 ELAN 구성을 위한 기술적 제약하에서 블로킹되는 Broadcast 트래픽을 최소화시키는 문제로 요약된다. 이는 다시 그래프 분할문제(graph partition problem)의 변형된 형태로 모형화 될 수 있다. 본 논문에서는 이러한 사항들을 고려하여 제시된 수리적 모형을 대상으로, genetic algorithm을 이용하여 최적 ELAN 구성을 위한 여러 파라미터들의 효과를 살펴보고, 이러한 결과들이 LANE 운영과 관련하여 가지는 함축적인 의미를 고찰한다.

  • PDF

Modeling and identification of a class of MR fluid foam dampers

  • Zapateiro, Mauricio;Luo, Ningsu;Taylor, Ellen;Dyke, Shirley J.
    • Smart Structures and Systems
    • /
    • v.6 no.2
    • /
    • pp.101-113
    • /
    • 2010
  • This paper presents the results of a series of experiments conducted to model a magnetorheological damper operated in shear mode. The prototype MR damper consists of two parallel steel plates; a paddle covered with an MR fluid coated foam is placed between the plates. The force is generated when the paddle is in motion and the MR fluid is reached by the magnetic field of the coil in one end of the device. Two approaches were considered in this experiment: a parametric approach based on the Bingham, Bouc-Wen and Hyperbolic Tangent models and a non parametric approach based on a Neural Network model. The accuracy to reproduce the MR damper behavior is compared as well as some aspects related to performance are discussed.

A Study on the Improving Campus Network Information Services (네트워크 기반 대학 정보서비스의 개선 방안에 관한 연구)

  • 오경묵
    • Journal of Korean Library and Information Science Society
    • /
    • v.31 no.4
    • /
    • pp.165-189
    • /
    • 2000
  • 교육과 연구의 현자인 대학에서 네트워크를 이용한 디지털 정보자원의 활용은 특정 전공에 국한되지 않고 필수적인 도구가 되어가고 있다. 이러한 정보원과 도구를 대학 환경에서 모든 구성원들이 적극적이고도 손쉽게 활용하는 것이 대학의 정보서비스 업무에 기본이 되어야 한다. 하지만 급속히 변화하는 정보 네트워크 서비스 현장에서 발생하는 문제점들은 대체로 육안으로 확인하기 어려운 것들이기 때문에 이용자들의 요구사항을 정기적으로 조사·분석하여 이용자 측면에서 교내의 정보시스템을 평가·감사하는 것은 시스템을 성공적으로 운영하는데 있어서 필수적인 활동이다. 본 연구에서는 S 대학의 사례를 통하여 구성원들이 가지고 있고 또 필요로 하는 정보자원을 효과적으로 이용할 수 있도록 하는 최선의 방법을 조사 연구하여 문제 해결 방안을 제시하고자 하였다.

  • PDF

Advanced Business Process Management with Digital Innovations (Review)

  • Masood Ahmed Khalid;Muhammad Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.121-126
    • /
    • 2023
  • Many organizations are looking for digital innovation to apply in business process management and this information revolution leaves its effect on the businesses and anticipate competitors. In this article, investigates the strength of the relationship between business process management (BMP) and Digital Innovations (DI) since it has been underdeveloped. The results and findings are extracted from international survey with explanations of expert panel to generalized a positive and moderate link of multiple factors that are affecting the strategic decision-making in business process management. It is extended to the Technology Organization Environment (TOE) framework and contour organizations along their Digital Process Innovation (DPI).

Implementation of Self-adaptive System using the Algorithm of Neural Network Learning Gain

  • Lee, Seong-Su;Kim, Yong-Wook;Oh, Hun;Park, Wal-Seo
    • International Journal of Control, Automation, and Systems
    • /
    • v.6 no.3
    • /
    • pp.453-459
    • /
    • 2008
  • The neural network is currently being used throughout numerous control system fields. However, it is not easy to obtain an input-output pattern when the neural network is used for the system of a single feedback controller and it is difficult to obtain satisfactory performance with when the load changes rapidly or disturbance is applied. To resolve these problems, this paper proposes a new mode to implement a neural network controller by installing a real object for control and an algorithm for this, which can replace the existing method of implementing a neural network controller by utilizing activation function at the output node. The real plant object for controlling of this mode implements a simple neural network controller replacing the activation function and provides the error back propagation path to calculate the error at the output node. As the controller is designed using a simple structure neural network, the input-output pattern problem is solved naturally and real-time learning becomes possible through the general error back propagation algorithm. The new algorithm applied neural network controller gives excellent performance for initial and tracking response and shows a robust performance for rapid load change and disturbance, in which the permissible error surpasses the range border. The effect of the proposed control algorithm was verified in a test that controlled the speed of a motor equipped with a high speed computing capable DSP on which the proposed algorithm was loaded.

A Design of Integrated Security Policies for Enabling Adaptive Security in Campus Environment (캠퍼스 환경에서 적응적인 정보보안을 위한 통합 보안정책의 설계)

  • Ko, Bong-Koo;Park, Jong-Seon;Chung, Seung-Jong;Cho, Gi-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.617-624
    • /
    • 2014
  • A campus network nowadays adapts the security policies in detail and even in variety, along with firewall based access control. Nevertheless, security threats, such as information hacking, intrusion and DoS, are not decreasing yet. This paper proposes an enabling method of discriminative security policies to enforce an adaptive security for security objects on basis of the security elements. The security level of a security devices is decided based on the mapping between the users and the objects. The proposed security policies could improve the security effect in terms of investment in creative campus environment, and aim to provide fast and stable services to users.

Adopting a National Innovation Approach for Agro-Sustainability : A Case Study

  • Sankat, Clement K.;Pun, Kit F.;Motilal, Cavelle B.
    • International Journal of Quality Innovation
    • /
    • v.7 no.3
    • /
    • pp.98-106
    • /
    • 2006
  • Nowadays, agro-firms are confronted with competition from global suppliers in both domestic and export markets. Such competition in sustainable agro-operations is expected to intensify. The survival of these firms in developing countries urgently requires a significant transformation to be competitive. This paper discusses the rationale of adopting a national innovation (NI) approach from an industry-wide perspective. In order to attain sustainable agro-operations in developing countries, the approach stresses appropriate scientific and technological applications and effective linkages of technology transfer via the network between public and private institutions, universities and other research institutions. Central to this approach is the development of the agro-industrial sector whereby agri-chains are formed. An illustrated case of the NI approach is presented with respect to a small island developing state, the Republic of Trinidad and Tobago.

Handheld Automation Hacking Tool Development Using Raspberry Pi 4 (라즈베리 파이 4를 이용한 소형 자동화 해킹 툴 개발)

  • Sang-Hoon Han;Byeong-Jo Kang;Yeong-Seop Lee;Eun-Soo Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.477-478
    • /
    • 2024
  • 본 논문에서는 관련 지식이 없더라도 취약한 비밀번호를 사용하는 AP(Access Point)를 빠르고 편하게 점검할 수 있는 소형 해킹 장치를 제안한다. 터치 디스플레이를 이용한 입출력 장치의 통합으로 휴대성을 극대화시켰다. 필요한 정보를 특정하여 출력하고, 숫자 입력만으로 프로그램을 제어하며, AP의 보안 프로토콜 유형을 자동으로 인식하여 그에 맞는 공격을 시도하는 등의 사용자의 편의성을 고려한 프로그램 설계로 입력장치의 제한으로 인해 생길 수 있는 불편함을 해소하였다.

  • PDF