17 research outputs found

    A Systems Engineering Methodology for Wide Area Network Selection using an Analytical Hierarchy Process

    Get PDF
    In this paper, we apply a systems engineering methodology to select the most appropriate wide area network (WAN) media suite, according to organizational technical requirements, using an Analytic Hierarchy Process (AHP). AHP is a mathematical decision modeling tool that utilizes decomposition, determination, and synthesis to solve complex engineering decision problems. AHP can deal with the universal modeling of process engineering decision-making, which is difficult to describe quantitatively, by integrating quantitative and qualitative analysis. We formulate and apply AHP to a hypothetical case study in order to examine its feasibility for the WAN media selection problem. The results indicate that our model can improve the decision-making process by evaluating and comparing all alternative WANs. This shows that AHP can support and assist an organization in choosing the most effective solution according to its demands. AHP is an effective resource-saver from many perspectives—it gives high performance, economic, and high quality solutions. Keywords: Analytical Hierarchy Process, Wide Area Network, AHP Consistency, WAN alternatives

    A Novel Definition of Equivalent Uniform Dose Based on Volume Dose Curve

    Full text link
    © 2013 IEEE. With the improvement of mobile device performance, the requirement of equivalent dose description in intensity-modulated radiation therapy is increasing in mobile multimedia for healthcare. The emergence of mobile cloud computing will provide cloud servers and storage for intensity-modulated radiotherapy (IMRT) mobile applications, thus realizing visualized radiotherapy in a real sense. Equivalent uniform dose (EUD) is a biomedical indicator based on the dose measure. In this paper, the dose volume histogram is used to describe the dose distribution of different tissues in target and nontarget regions. The traditional definition of EUD, such as the exponential form and the linear form, has only a few parameters in the model for fast calculation. However, there is no close relationship between this traditional definition and the dose volume histogram. In order to establish the consistency between the EUD and the dose volume histogram, this paper proposes a novel definition of EUD based on the volume dose curve, called VD-EUD. By using a unique organic volume weight curve, it is easy to calculate VD-EUD for different dose distributions. In definition, different weight curves are used to represent the biological effects of different organs. For the target area, we should be more careful about those voxels with a low dose (cold point); thus, the weight curve is monotonically decreasing. While for the nontarget area, the curve is monotonically increasing. Furthermore, we present the curves for parallel, serial, and mixed organs of nontarget areas separately, and we define the weight curve form with only two parameters. Medical doctors can adjust the curve interactively according to different patients and organs. We also propose a fluence map optimization model with the VD-EUD constraint, which means that the proposed EUD constraint will lead to a large feasible solution space. We compare the generalized EUD (gEUD) and the proposed VD-EUD by experiments, which show that the VD-EUD has a closer relationship with the dose volume histogram. If the biological survival probability is equivalent to the VD-EUD, the feasible solution space would be large, and the target areas can be covered. By establishing a personalized organic weight curve, medical doctors can have a unique VD-EUD for each patient. By using the flexible and adjustable EUD definition, we can establish the VD-EUD-based fluence map optimization model, which will lead to a larger solution space than the traditional dose volume constraint-based model. The VD-EUD is a new definition; thus, we need more clinical testing and verification

    An internet of things and blockchain based smart campus architecture

    Get PDF
    Rapid development in science and information technologies, such as the Internet of things, has led to a growth in the number of studies and research papers on smart cities in recent years and more specifically on the construction of smart campus technologies. This paper will review the concept of a smart campus, discuss the main technologies deployed, and then propose a new novel framework for a smart campus. The architecture of this new smart campus approach will be discussed with particular consideration of security and privacy systems, the Internet of things, and blockchain technologies

    A secure and efficient data sharing framework with delegated capabilities in hybrid cloud

    Full text link
    Hybrid cloud is a widely used cloud architecture in large companies that can outsource data to the publiccloud, while still supporting various clients like mobile devices. However, such public cloud data outsourcing raises serious security concerns, such as how to preserve data confidentiality and how to regulate access policies to the data stored in public cloud. To address this issue, we design a hybrid cloud architecture that supports data sharing securely and efficiently, even with resource-limited devices, where private cloud serves as a gateway between the public cloud and the data user. Under such architecture, we propose an improved construction of attribute-based encryption that has the capability of delegating encryption/decryption computation, which achieves flexible access control in the cloud and privacy-preserving in datautilization even with mobile devices. Extensive experiments show the scheme can further decrease the computational cost and space overhead at the user side, which is quite efficient for the user with limited mobile devices. In the process of delegating most of the encryption/decryption computation to private cloud, the user can not disclose any information to the private cloud. We also consider the communication securitythat once frequent attribute revocation happens, our scheme is able to resist some attacks between private cloud and data user by employing anonymous key agreement

    Universal and secure object ownership transfer protocol for the Internet of Things

    No full text
    In this paper, we address the problem of ownership transfer of RFID tagged objects in Internet of Things (IoT) in a secure manner. In application domains such as supply chain management, RFID tagged objects are required to securely change hands several times during their life cycle. To this end, we propose a novel ownership transfer mechanism that securely transfers an RFID tagged objects in Internet of Things (IoT). An important property of the proposed approach is that the proposed ownership transfer mechanism ensures the security of both the RFID tagged objects and the object owners. We analysed the proposed object ownership transfer protocol both qualitatively and quantitatively to evaluate its effectiveness. The analysis shows that the proposed protocol is more secure and requires less computation as compared to existing similar protocols. © 2017 Elsevier B.V
    corecore