36 research outputs found

    Video conferencing made easy

    Get PDF
    Network video conferencing is advancing rapidly throughout the nation, and the Idaho National Engineering Laboratory (INEL), a Department of Energy (DOE) facility, is at the forefront of the development. Engineers at INEL/EG&G designed and installed a very unique DOE videoconferencing system, offering many outstanding features, that include true multipoint conferencing, user-friendly design and operation with no full-time operators required, and the potential for cost effective expansion of the system. One area where INEL/EG&G engineers made a significant contribution to video conferencing was in the development of effective, user-friendly, end station driven scheduling software. A PC at each user site is used to schedule conferences via a windows package. This software interface provides information to the users concerning conference availability, scheduling, initiation, and termination. The menus are 'mouse' controlled. Once a conference is scheduled, a workstation at the hubs monitors the network to initiate all scheduled conferences. No active operator participation is required once a user schedules a conference through the local PC; the workstation automatically initiates and terminates the conference as scheduled. As each conference is scheduled, hard copy notification is also printed at each participating site. Video conferencing is the wave of the future. The use of these user-friendly systems will save millions in lost productivity and travel cost throughout the nation. The ease of operation and conference scheduling will play a key role on the extent industry uses this new technology. The INEL/EG&G has developed a prototype scheduling system for both commercial and federal government use

    Reviewing the Challenges of Big Data Use in Smart Industries

    Get PDF
    Purpose: In recent years, data has been growing on a large scale, and the development of Internet applications, mobile applications, and network-connected sensors has also increased dramatically. These programs and extensive Internet communications continuously generate large volumes of data that are diverse and structurally different, called big data. Methodology: This article first reviews big data and defines its features, and then discusses the challenges it faces in the smart industry. Finally, using fuzzy hierarchical analysis, the most important challenges of using big data in smart industries have been prioritized. Findings: Due to the increasing volume of information transfer in the space of industrial generation, big data problem, import and storage of large volume of data information items and its management, preprocessing and post-processing, speed, accuracy and security of information are very important. It has gained a lot of attention and has attracted the attention of many researchers and experts in the field of information technology and active in the industry. Originality/Value: This article review the challenges of big data use in smart industries

    Security Knowledge Management Systems: A Solid Shield Against Computer Abuse

    Get PDF
    Even though organizations have developed and implemented a number of security countermeasures, computer abuse continues to be a problem, and information systems in organizations today remain in jeopardy. Researchers recommend security awareness programs as a means to increase security interest and knowledge, but this has not provided satisfactory results. In this paper, we introduce the concept of security knowledge management systems (SKMS). These systems overcome time and place limitations, consider different levels of security knowledge among users, promote voluntary participation, and provide a positive framework for learning security knowledge. SKMS gives users a way to overcome the limitations of traditional awareness programs through the ability to acquire the most current, diversified security knowledge, to search the knowledge more quickly and accurately, to store it more securely, to share it conveniently, and to maintain it cost effectively. As a result, SKMS allows users to acquire better security knowledge, while giving organizations a cost-effective way of reducing computer abuse

    Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation

    Get PDF
    This paper presents a general theory of event compensation as an information flow security enforcement mechanism for Cyber-Physical Systems (CPSs). The fundamental research problem being investigated is that externally observable events in modern CPSs have the propensity to divulge sensitive settings to adversaries, resulting in a confidentiality violation. This is a less studied yet emerging concern in modern system security. A viable method to mitigate such violations is to use information flow security based enforcement mechanisms since access control based security models cannot impose restrictions on information propagation. Further, the disjoint nature of security analysis is not appropriate for systems with highly integrated physical and cyber infrastructures. The proposed compensation based security framework is foundational work that unifies cyber and physical aspects of security through the shared semantics of information flow. A DC circuit example is presented to demonstrate this concept

    Development of Smart Security System for Building or Laboratory Entrance based on human’s brain (EEG) and Voice Signals

    Get PDF
    The drastic increment in cyber-crimes and violent attacks involving our properties and lives made the world become much vigilant towards ill-intentioned peoples. Thus, it leads to the booming of smart security system industry which relies heavily on biometrics technology. However, due to certain circumstances, some users may find the existing biometrics technologies such as fingerprint, palm, iris and face recognition are unable to detect the necessary data precisely due to the physical injuries of the users. Furthermore, the fact that these biometrics technologies are easily retrieved from the user and be used as counterfeit to access to the security system undetected. Thus, in this research, in order to enhance the existing security system based on the biometric technologies, the combination of the human physiological signals such as brain and voice signals will be employed in order to unlock the magnetic door entrance to the laboratory, building or office. This research has utilized mobile Electroencephalogram (EEG) headset and voice recognizer to capture human’s brain and voice signals respectively. The extracted features from the captured signals then are analyzed, classified and translated to determine the device command for the microcontroller to control the door entrance’s locking system. The high rate of classification results of the selected features of EEG and voice signals at 96.7% and 99.3% respectively show that selected features can be translated to command parameters to control device

    The United States Marine Corps Data Collaboration Requirements: Retrieving and Integrating Data From Multiple Databases

    Get PDF
    The goal of this research is to develop an information sharing and database integration model and suggest a framework to fully satisfy the United States Marine Corps collaboration requirements as well as its information sharing and database integration needs. This research is exploratory; it focuses on only one initiative: the IT-21 initiative. The IT-21 initiative dictates The Technology for the United States Navy and Marine Corps, 2000-2035: Becoming a 21st Century Force. The IT-21 initiative states that Navy and Marine Corps information infrastructure will be based largely on commercial systems and services, and the Department of the Navy must ensure that these systems are seamlessly integrated and that information transported over the infrastructure is protected and secure. The Delphi Technique, a qualitative method approach, was used to develop a Holistic Model and to suggest a framework for information sharing and database integration. Data was primarily collected from mid-level to senior information officers, with a focus on Chief Information Officers. In addition, an extensive literature review was conducted to gain insight about known similarities and differences in Strategic Information Management, information sharing strategies, and database integration strategies. It is hoped that the Armed Forces and the Department of Defense will benefit from future development of the information sharing and database integration Holistic Model
    corecore