32,654 research outputs found
Recommended from our members
Going on-line on a shoestring: An experiment in concurrent development of requirements and architecture
A number of on-line applications were built for a small university using a micro-sized development team. Four ideas were tested during the project: the Twin Peaks development model, using fully functional prototypes in the requirements elicitation process, some core practices of Extreme Programming, and the use of open-source software in a production environment. Certain project management techniques and their application to a micro-sized development effort were also explored. These ideas and techniques proved effective in developing many significant Internet and networked applications in a short time and at very low cost
Development of a Secured Information System to Manage Malaria Related Cases in South Western region of Nigeria
Effective community based management of malaria incidences in most community health care centers are hampered by failure in the prompt diagnosis and treatment of malaria. This challenge is exacerbated by the emergence of multidrug resistant plasmodium parasites which makes ineffective most of the effective therapeutic drugs used in the treatment of malaria. Furthermore, even at abrupt changes in the therapeutic recommendations does not always translate to an immediate change in the effective management and control of malaria. Thus, the quest for effective diagnosis and appropriate treatment becomes a daunting and necessary task. . In this article, a secured Information system to manage malaria related cases was developed by 2-tier architecture by using the VB.NET programming language within the Microsoft Visual studio 2008 edition. The database employed for storing relevant data was the SQL server 2005 edition and fingerprint device integrated into the information system was the Microsoft fingerprint reader. From the results in this study, we modeled a feasible medical history system for prompt diagnosis, effective drug recommendations and promulgation of policies that would serve as palliatives for community health care centers that suffers shortages in material and human resources handling malaria and its related diseases
SFTSDH: Applying Spring Security Framework with TSD-Based OAuth2 to Protect Microservice Architecture APIs
The Internet of Medical Things (IoMT) combines medical devices and applications that use network technologies to connect healthcare information systems (HIS). IoMT is reforming the medical industry by adopting information and communication technologies (ICTs). Identity verification, secure collection, and exchange of medical data are essential in health applications. In this study, we implemented a hybrid security solution to secure the collection and management of personal health data using Spring Framework (SF), Services for Sensitive Data (TSD) as a service platform, and Hyper-Text-Transfer-Protocol (HTTP (H)) security methods. The adopted solution (SFTSDH = SF + TSD + H) instigated the following security features: identity brokering, OAuth2, multifactor authentication, and access control to protect the Microservices Architecture Application Programming Interfaces (APIs), following the General Data Protection Regulation (GDPR). Moreover, we extended the adopted security solution to develop a digital infrastructure to facilitate the research and innovation work in the electronic health (eHealth) section, focusing on solution validation with theoretical evaluation and experimental testing. We used a web engineering security methodology to achieve and explain the adopted security solution. As a case study, we designed and implemented electronic coaching (eCoaching) prototype system and deployed the same in the developed infrastructure to securely record and share personal health data. Furthermore, we compared the test results with related studies qualitatively for the efficient evaluation of the implemented security solution. The SFTSDH implementation and configuration in the prototype system have effectively secured the eCoach APIs from an attack in all the considered scenarios. The eCoach prototype with the SFTSDH solution effectively sustained a load of (â) 1000 concurrent users in the developed digital health infrastructure. In addition, we performed a qualitative comparison among the following security solutions: SF security, third-party security, and SFTSDH, where SFTSDH showed a promising outcome.publishedVersio
Egyptian electronic government: The university enrolment case study
E-government projects have potential for greaterefficiency and effectiveness of
government operations. For thisreason, many developing countries governments
have investedheavily in this agenda and an increasing number of e-
governmentprojects are being implemented. However, there is a lack of clearcase
material, which describes the potentialities and consequenceexperienced by
organizations trying to manage with this change. TheMinistry of State for
Administrative Development (MSAD) is theorganization responsible for the e-
Government program in Egyptsince early 2004. This paper presents a case study of
the process ofadmission to public universities and institutions in Egypt which
is ledby MSAD. Underlining the key benefits resulting from the
initiative,explaining the strategies and the development steps used toimplement
it, and highlighting the main obstacles encountered andhow they were overcome
will help repeat the experience in otheruseful e-government
projects.KeywordsâCase studies, Egypt, Electro
Lightning impulse tests on air-breakdown level in point-plane electrode configuration
In the past several decades, extensive amount of research work has been done to
understand the fundamental characteristics of the electrical breakdown. Breakdown
voltage is a phenomenon where the quantity of an electrical force is required to
transform the electrical properties of an object. Many factors that lead to the
breakdown voltage are still not fully discovered. These factors are including the
physical parameters of the electrodes (sphere, plane, point etc.) and also the
environmental conditions. In electrical power system, high voltage (HV) power
equipment is mainly subjected with spark over voltage. In this study, point electrode
and plane electrode have been used for the experimental study of the short air gap.
The electrodes are vertically aligned. In order to simulate the performance
characteristic of the air breakdown voltage and maximum electric field between the
conducting point and plane electrodes, the electrodes is taken into considered in this
work using FEMM simulation. The air breakdown voltages between the electrodes
(point and plane) are measured by conducting the air breakdown voltage experiment
in high voltage laboratory and corresponding electrical field strength. The electrodes
gap distances are being varied to 5 different gaps which are 5mm, 10mm, 15mm,
20mm and 25mm. In order to achieve maximum strength in such a field, the point of
the highest stress is controlled. From the experiment, it was established that the point
at the electrode that produces maximum electric field is at the point with the smallest
area or width. As for point electrode, the smallest area is at the angle of the electrode.
Besides, it shows that the electrical breakdown characteristic is affected by the
strength of the impulse voltage. Higher gap distance between the electrodes will
result higher breakdown-impulse voltage while higher breakdown-impulse voltage
will produce higher field intensity
Security of 5G-V2X: Technologies, Standardization and Research Directions
Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to
the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to
Vehicle (V2V) networking. Specifically, C-V2X lowers the number of entities
involved in vehicular communications and allows the inclusion of
cellular-security solutions to be applied to V2X. For this, the evolvement of
LTE-V2X is revolutionary, but it fails to handle the demands of high
throughput, ultra-high reliability, and ultra-low latency alongside its
security mechanisms. To counter this, 5G-V2X is considered as an integral
solution, which not only resolves the issues related to LTE-V2X but also
provides a function-based network setup. Several reports have been given for
the security of 5G, but none of them primarily focuses on the security of
5G-V2X. This article provides a detailed overview of 5G-V2X with a
security-based comparison to LTE-V2X. A novel Security Reflex Function
(SRF)-based architecture is proposed and several research challenges are
presented related to the security of 5G-V2X. Furthermore, the article lays out
requirements of Ultra-Dense and Ultra-Secure (UD-US) transmissions necessary
for 5G-V2X.Comment: 9 pages, 6 figures, Preprin
- âŠ