2,284 research outputs found

    Twenty-Thirty: Health Care Scenarios – exploring potential changes in health care in England over the next 20 years

    Get PDF
    The purpose of this report is to stimulate debate about the opportunities and risks associated with delivering an affordable health care system over the next 20 years. As there are many factors that will influence health care in the future, we have undertaken a scenario planning exercise to explore political, social, economic and technological trends and develop possible and plausible futures

    Assessment of Security Trepidation in Cloud Applications with Enhanced Encryption Algorithms

    Get PDF
    To alleviate crank in routine process in IT related work environment we are maintaining information’s in cloud storage even though we affected by pandemic and other natural disaster still can able to access data by avoiding degrade in target process. Members who posses account in cloud no need to have separate high end configuration devices because even less configured devices could connect to cloud and make use of all services using virtual machine. Applications belong to cloud storage intimidated in the aspect of safety. This paper reviews the various security related issues and its causes along with latest cloud security attacks. We discussed about different technology to protect information resides in cloud and analyzed different enhanced algorithm for encryption for securing the data in cloud due to surge use of devices interacting cloud services

    Towards 6G: Key technological directions

    Get PDF
    Sixth-generation mobile networks (6G) are expected to reach extreme communication capabilities to realize emerging applications demanded by the future society. This paper focuses on six technological directions towards 6G, namely, intent-based networking, THz communication, artificial intelligence, distributed ledger technology/blockchain, smart devices and gadget-free communication, and quantum communication. These technologies will enable 6G to be more capable of catering to the demands of future network services and applications. Each of these technologies is discussed highlighting recent developments, applicability in 6G, and deployment challenges. It is envisaged that this work will facilitate 6G related research and developments, especially along the six technological directions discussed in the paper

    Container-based microservice architecture for local IoT services

    Get PDF
    Abstract. Edge services are needed to save networking and computational resources on higher tiers, enable operation during network problems, and to help limiting private data propagation to higher tiers if the function needing it can be handled locally. MEC at access network level provides most of these features but cannot help when access network is down. Local services, in addition, help alleviating the MEC load and limit the data propagation even more, on local level. This thesis focuses on the local IoT service provisioning. Local service provisioning is subject to several requirements, related to resource/energy-efficiency, performance and reliability. This thesis introduces a novel way to design and implement a Docker container-based micro-service system for gadget-free future IoT (Internet of Things) network. It introduces a use case scenario and proposes few possible required micro-services as of solution to the scenario. Some of these services deployed on different virtual platforms along with software components that can process sensor data providing storage capacity to make decisions based on their algorithm and business logic while few other services deployed with gateway components to connect rest of the devices to the system of solution. It also includes a state-of-the-art study for design, implementation, and evaluation as a Proof-of-Concept (PoC) based on container-based microservices with Docker. The used IoT devices are Raspberry Pi embedded computers along with an Ubuntu machine with a rich set of features and interfaces, capable of running virtualized services. This thesis evaluates the solution based on practical implementation. In addition, the thesis also discusses the benefits and drawbacks of the system with respect to the empirical solution. The output of the thesis shows that the virtualized microservices could be efficiently utilized at the local and resource constrained IoT using Dockers. This validates that the approach taken in this thesis is feasible for providing such services and functionalities to the micro and nanoservice architecture. Finally, this thesis proposes numerous improvements for future iterations

    Bluetooth Security Logical Link Control and Adaptation Protocol

    Get PDF
    The point of our work is to assess security dangers in Bluetooth-empowered frameworks. Our exploration work focuses on handy parts of Bluetooth security. It can be generally isolated into four sections. First and foremost, shortcomings of Bluetooth security are mulled over taking into account a writing survey, and a Bluetooth security research center environment for actualizing Bluetooth security assaults by and by has been manufactured. Also, distinctive sorts of assaults against Bluetooth security are researched and the possibility of some of them are shown in our exploration lab. Countermeasures against every sort of assault are likewise proposed. Thirdly, a portion of the current Bluetooth security assaults are upgraded and new assaults are proposed. To do these assaults by and by, Bluetooth security investigation devices are executed. Countermeasures that render these assaults unreasonable are likewise proposed. At long last, a relative examination of the current Man-In-The-Middle assaults on Bluetooth is displayed, a novel framework for distinguishing and forestalling interruptions in Bluetooth systems is proposed, and a further arrangement of Bluetooth-empowered specially appointed systems is give

    Relevance of Security Features Introduced in Modern Windows OS

    Get PDF
    Modern Windows Operating Systems contains a large collection of built-in security features. This thesis covers three of the features, namely, Early Launch Antimalware, Protected Processes Light and Control Flow Guard. The thesis discusses the internal mechanism of each of the features and examines how effective each of them was against real attack cases. The thesis also describes how each of the attacks work and why the features were or were not able to counter them. The thesis then provides some proof of concepts to demonstrate some practical approaches on how attackers might adapt to the new defense. Finally, the thesis concludes why it is important to understand as much of the features as possible by showing how some of the features are dependent on other features to be effective. The thesis also provides some advice to both end users and software vendors with regards to how the selected features would affect them moving forward

    Benefit of Digital Transformation for Telecommunication Organaization

    Get PDF
    This paper intends to outline the benefits that are realized by telecommunications industry when they transform digitally. The paper will also review some of the existing literature about the impacts that has already been realized by various telecommunications companies upon transforming digitally. Recommendations about how telecommunication organizations can better realize the benefits of digital transformation have also been covered. Keywords: digital transformation, telecommunication industry

    The Implications of IoT in the Modern Healthcare Industry post COVID-19

    Get PDF
    The healthcare industry has recently seen a massive surge in the use of the Internet of Things (IoT) during and after the COVID-19 pandemic. IoT’s main objective is to provide people with the necessities in these uncertain times. During the pandemic, the availability of IoT-based healthcare systems is crucial. Using IoT, healthcare systems are becoming more individualized, allowing for more precise patient diagnosis, treatment, and monitoring. Since the beginning of the epidemic, many researchers have worked tirelessly to find solutions to this global problem, and IoT technology has the potential to revamp the current system completely. Over 6 million people had lost their lives by the time this document was produced due to the ongoing COVID-19 epidemic. Many lives could have been saved. The problem today is that when people are too sick, they cannot call or contact an ambulance or get safely to the hospital. With new technology, perhaps a button or programming into a device, people in need can press a button on their phone or call out into a voice-enabled device to contact the ambulance or other emergency contacts that they might have. The research has found that if significant companies take this seriously, it could be a remarkable idea that could save many lives
    corecore