32,654 research outputs found

    Development of a Secured Information System to Manage Malaria Related Cases in South Western region of Nigeria

    Get PDF
    Effective community based management of malaria incidences in most community health care centers are hampered by failure in the prompt diagnosis and treatment of malaria. This challenge is exacerbated by the emergence of multidrug resistant plasmodium parasites which makes ineffective most of the effective therapeutic drugs used in the treatment of malaria. Furthermore, even at abrupt changes in the therapeutic recommendations does not always translate to an immediate change in the effective management and control of malaria. Thus, the quest for effective diagnosis and appropriate treatment becomes a daunting and necessary task. . In this article, a secured Information system to manage malaria related cases was developed by 2-tier architecture by using the VB.NET programming language within the Microsoft Visual studio 2008 edition. The database employed for storing relevant data was the SQL server 2005 edition and fingerprint device integrated into the information system was the Microsoft fingerprint reader. From the results in this study, we modeled a feasible medical history system for prompt diagnosis, effective drug recommendations and promulgation of policies that would serve as palliatives for community health care centers that suffers shortages in material and human resources handling malaria and its related diseases

    Informatics Research Institute (IRIS) December 2003 newsletter

    Get PDF

    SFTSDH: Applying Spring Security Framework with TSD-Based OAuth2 to Protect Microservice Architecture APIs

    Get PDF
    The Internet of Medical Things (IoMT) combines medical devices and applications that use network technologies to connect healthcare information systems (HIS). IoMT is reforming the medical industry by adopting information and communication technologies (ICTs). Identity verification, secure collection, and exchange of medical data are essential in health applications. In this study, we implemented a hybrid security solution to secure the collection and management of personal health data using Spring Framework (SF), Services for Sensitive Data (TSD) as a service platform, and Hyper-Text-Transfer-Protocol (HTTP (H)) security methods. The adopted solution (SFTSDH = SF + TSD + H) instigated the following security features: identity brokering, OAuth2, multifactor authentication, and access control to protect the Microservices Architecture Application Programming Interfaces (APIs), following the General Data Protection Regulation (GDPR). Moreover, we extended the adopted security solution to develop a digital infrastructure to facilitate the research and innovation work in the electronic health (eHealth) section, focusing on solution validation with theoretical evaluation and experimental testing. We used a web engineering security methodology to achieve and explain the adopted security solution. As a case study, we designed and implemented electronic coaching (eCoaching) prototype system and deployed the same in the developed infrastructure to securely record and share personal health data. Furthermore, we compared the test results with related studies qualitatively for the efficient evaluation of the implemented security solution. The SFTSDH implementation and configuration in the prototype system have effectively secured the eCoach APIs from an attack in all the considered scenarios. The eCoach prototype with the SFTSDH solution effectively sustained a load of (≈) 1000 concurrent users in the developed digital health infrastructure. In addition, we performed a qualitative comparison among the following security solutions: SF security, third-party security, and SFTSDH, where SFTSDH showed a promising outcome.publishedVersio

    Egyptian electronic government: The university enrolment case study

    Get PDF
    E-government projects have potential for greaterefficiency and effectiveness of government operations. For thisreason, many developing countries governments have investedheavily in this agenda and an increasing number of e- governmentprojects are being implemented. However, there is a lack of clearcase material, which describes the potentialities and consequenceexperienced by organizations trying to manage with this change. TheMinistry of State for Administrative Development (MSAD) is theorganization responsible for the e- Government program in Egyptsince early 2004. This paper presents a case study of the process ofadmission to public universities and institutions in Egypt which is ledby MSAD. Underlining the key benefits resulting from the initiative,explaining the strategies and the development steps used toimplement it, and highlighting the main obstacles encountered andhow they were overcome will help repeat the experience in otheruseful e-government projects.Keywords—Case studies, Egypt, Electro

    Lightning impulse tests on air-breakdown level in point-plane electrode configuration

    Get PDF
    In the past several decades, extensive amount of research work has been done to understand the fundamental characteristics of the electrical breakdown. Breakdown voltage is a phenomenon where the quantity of an electrical force is required to transform the electrical properties of an object. Many factors that lead to the breakdown voltage are still not fully discovered. These factors are including the physical parameters of the electrodes (sphere, plane, point etc.) and also the environmental conditions. In electrical power system, high voltage (HV) power equipment is mainly subjected with spark over voltage. In this study, point electrode and plane electrode have been used for the experimental study of the short air gap. The electrodes are vertically aligned. In order to simulate the performance characteristic of the air breakdown voltage and maximum electric field between the conducting point and plane electrodes, the electrodes is taken into considered in this work using FEMM simulation. The air breakdown voltages between the electrodes (point and plane) are measured by conducting the air breakdown voltage experiment in high voltage laboratory and corresponding electrical field strength. The electrodes gap distances are being varied to 5 different gaps which are 5mm, 10mm, 15mm, 20mm and 25mm. In order to achieve maximum strength in such a field, the point of the highest stress is controlled. From the experiment, it was established that the point at the electrode that produces maximum electric field is at the point with the smallest area or width. As for point electrode, the smallest area is at the angle of the electrode. Besides, it shows that the electrical breakdown characteristic is affected by the strength of the impulse voltage. Higher gap distance between the electrodes will result higher breakdown-impulse voltage while higher breakdown-impulse voltage will produce higher field intensity

    Informatics Research Institute (IRIS) July 2002 newsletter

    Get PDF

    Security of 5G-V2X: Technologies, Standardization and Research Directions

    Full text link
    Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) networking. Specifically, C-V2X lowers the number of entities involved in vehicular communications and allows the inclusion of cellular-security solutions to be applied to V2X. For this, the evolvement of LTE-V2X is revolutionary, but it fails to handle the demands of high throughput, ultra-high reliability, and ultra-low latency alongside its security mechanisms. To counter this, 5G-V2X is considered as an integral solution, which not only resolves the issues related to LTE-V2X but also provides a function-based network setup. Several reports have been given for the security of 5G, but none of them primarily focuses on the security of 5G-V2X. This article provides a detailed overview of 5G-V2X with a security-based comparison to LTE-V2X. A novel Security Reflex Function (SRF)-based architecture is proposed and several research challenges are presented related to the security of 5G-V2X. Furthermore, the article lays out requirements of Ultra-Dense and Ultra-Secure (UD-US) transmissions necessary for 5G-V2X.Comment: 9 pages, 6 figures, Preprin
    • 

    corecore