• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.036 seconds

Inquiring Prescriptions Using Geographic Information System (GIS)

  • Osman, Asim Seedahmed Ali;Kalil, Eman Galaleldin Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.409-414
    • /
    • 2021
  • Geographic Information Systems (GIS) is considered to be one of the most important technologies provided by the Internet in our era. GIS enables institutions and individuals to plan and make decisions in many fields. GIS assists in accessing new and updated information on planning process. GIS also enables determining distances such as length, width, area on a map, and allows analyzing and processing a large amount of data for the search of geographical characteristics of locations. This paper explains the concept of dispensing prescription through the specific code of drug on an electronic system using GIS technology. The proposed methodology aims to inform patients of all the prescriptions dispensed and to help individuals inquiring about prescription at the nearest pharmacy through GIS technology. This proposed methodology is considered significant in some cases, as the patient does not know price, specifications and pharmacy location where the drug required is available, thus increasing the time and effort cost that is spent searching for the prescription.

Formation of Information and Communication Competence of a University Teacher in the Sphere of Art and Culture

  • Merezhko, Mikhail Evgenyevich;Enina, Svetlana Alexandrovna;Kushchenko, Elena Sergeevna;Zamanova, Irina Fedoseevna;Kovalenko, Victor Ivanovich
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.189-191
    • /
    • 2022
  • The article is devoted to the study of the prerequisites and stages of the formation of information and communication competence, its place in the system of professional competence of a teacher, and the way its development occurs. Information and communication competence is presented in the paper as a systemic property of the subject's personality, and the components of this system, namely the activity, communication, reflexive, and cognitive components, are disclosed.

A Study on the Object Extraction and Tracking System for Intelligent Surveillance (지능형 감시를 위한 객체추출 및 추적시스템 설계 및 구현)

  • Jang, Tae-Woo;Shin, Yong-Tae;Kim, Jong-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.7
    • /
    • pp.589-595
    • /
    • 2013
  • The agents for security surveillance are not enough for monitoring CCTV system, so the intelligent automatic surveillance system is needed. In this paper, object detection, tracking and abnormal event detection system is implemented for intelligent CCTV system. Each modules are tested on the real CCTV environment and promoted for commercialization. Abnormal event detection module and loitering detection and sudden running detection function and it's detection time is under 1 second which is satisfied level.

A Cooperative Multiagent System for Enhancing Smart Grid Performance

  • Mohammad A Obeidat
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.164-172
    • /
    • 2023
  • Sharing power data between electrical power grids is crucial in energy management. The multi-agent approach has been applied in various applications to improve the development of complex systems by making them both independent and collaborative. The smart grid is one of the most intricate systems that requires a higher level of independence, reliability, protection, and adaptability to user requests. In this paper, a multi-agent system is utilized to share knowledge and tackle challenges in smart grids. The shared information is used to make decisions that aid in power distribution management within the grid and with other networks. The proposed multi-agent mechanism improves the reliability of the power system by providing the necessary information at critical times. The results indicate that the multi-agent system operates efficiently and promptly, making it a highly promising candidate for smart grid management.

A Secure Telemedicaine System in Smart Health Environment using BYOD (BYOD를 활용한 스마트헬스 환경에서 안전한 원격의료 시스템)

  • Cho, Young-bok;Woo, Sung-hee;Lee, Sang-ho;Park, Jong-bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2473-2480
    • /
    • 2015
  • In telemedicaine, people can make their health checked at anywhere from temporal and spatial constraints and It's environment can provide continuous health information regardless of the location of customers through PCs and smart phones. In addition, personal health information collected utilizing the BYOD(bring your own device) is the most important factor data security and guaranteed personal privacy because it's directly connected to the individual's health and life. In this paper, we provide a signature of the private key encryption system and method for providing the security of personal health information data collected utilizing the BYOD. Against replay attacks and man-in-the-middle attacks on security issues that are emerging as a smart environmental health was used as the timestamp and signature methods. Proposed method provides encryption overhead, while a communication was lower compared to the pre-encrypted with a mean 1.499mJ 1.212mJ shown by simulation to respond quickly in an emergency situation to be about 59%.

Deep Learning-Based Automation Cyber Attack Convergence Trend Analysis Mechanism for Deep Learning-Based Security Vulnerability Analysis (사이버공격 융합 동향 분석을 위한 딥러닝 기반 보안 취약점 분석 자동화 메커니즘)

  • Kim, Jinsu;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.99-107
    • /
    • 2022
  • In the current technological society, where various technologies are converged into one and being transformed into new technologies, new cyber attacks are being made just as they keep pace with the changes in society. In particular, due to the convergence of various attacks into one, it is difficult to protect the system with only the existing security system. A lot of information is being generated to respond to such cyber attacks. However, recklessly generated vulnerability information can induce confusion by providing unnecessary information to administrators. Therefore, this paper proposes a mechanism to assist in the analysis of emerging cyberattack convergence technologies by providing differentiated vulnerability information to managers by learning documents using deep learning-based language learning models, extracting vulnerability information and classifying them according to the MITRE ATT&CK framework.

Secured Search and Rescue Signal using COSPAS-SARSAT (COSPAS-SARSAT을 이용한 탐색구조 신호 보안)

  • Baek, Yoojin;Cho, Taenam;Kim, Jaehyun;Lee, Sanguk;Ahn, Woo-Geun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.2
    • /
    • pp.157-162
    • /
    • 2014
  • The international COSPAS-SARSAT program is a satellite-based search and rescue distress alert detection and information distribution system and best known as the system that detects and locates emergency beacons activated by aircraft, ships and so on. However, the current message format of the system is not encrypted so that, if the rescue signal can be intercepted by the unintended receivers, the subsequent rescue activities can be handled in a hostile environment. So, this article concerns how to deal with the rescue signals in a secure way and proposes some adequate encryption methods and the corresponding key management.

G-Pedigree and G-code System of RFID-based Development for Forward & Reverse Logistics Management (순물류와 역물류 관리에 적합한 RFID 기반의 G-Pedigree 시스템과 G-code 체계 개발)

  • Hwang, Bo-Hyun;Yun, Jong-Ho;Choi, Myung-Ryul
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.3
    • /
    • pp.112-118
    • /
    • 2010
  • This paper propose G-code and G-Pedigree system that are development based on the e-Pedigree and EPC, and RFID solutions for logistics management is proposed. The proposed G-Pedigree system to include the forward logistics and reverse logistics all logistics and management systems are appropriate for the event, with security features, security and accessibility of critical data was strengthened. The proposed G-code systems and the EPC code of the existing RFID readers, tags can be applied to, the more you can manage the logistics-related information.

  • PDF

The Framework for Authentication and Authorization for Constrained M2M Devices

  • Vakkosov, Sardorjon;Namgung, Jung-Il;Park, Soo-Hyun
    • Annual Conference of KIPS
    • /
    • 2015.04a
    • /
    • pp.482-484
    • /
    • 2015
  • M2M technology enables us to "Things" and collect various kinds of information from "Things". M2M is defined as a technology that enables electronic and mechanical devices to communicate with each other seamlessly and perform actions without human intervention. In this paper, we review some security solutions for M2M devices and show our light weight framework which is responsible for security of constrained M2M devices. In addition to the above-mentioned ones, we propose the framework can be applied for constrained environment and give conclusion and future works.

An Efficient E-learning and Internet Service Provision for Rural Areas Using High-Altitude Platforms during COVID-19 Pan-Demic

  • Sameer Alsharif;Rashid A. Saeed;Yasser Albagory
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.71-82
    • /
    • 2024
  • This paper proposes a new communication system for e-learning applications to mitigate the negative impacts of COVID-19 where the online massive demands impact the current commu-nications systems infrastructures and capabilities. The proposed system utilizes high-altitude platforms (HAPs) for fast and efficient connectivity provision to bridge the communication in-frastructure gap in the current pandemic. The system model is investigated, and its performance is analyzed using adaptive antenna arrays to achieve high quality and high transmission data rates at the student premises. In addition, the single beam and multibeam HAP radio coverage scenarios are examined using tapered uniform concentric circular arrays to achieve feasible communication link requirements.