2,189 research outputs found

    A Survey of Access Control Models in Wireless Sensor Networks

    Get PDF
    Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security in sensor networks is, therefore, a challenge. Access control is a critical security service that offers the appropriate access privileges to legitimate users and prevents illegitimate users from unauthorized access. However, access control has not received much attention in the context of WSNs. This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control models, including a comparison and evaluation based on their characteristics in WSNs. Potential challenging issues for access control schemes in WSNs are also discussed.Peer reviewe

    An evaluation of break-the-glass access control model for medical data in wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSNs) have recently attracted a lot of attention in the research community because it is easy to deploy them in the physical environment and collect and disseminate environmental data from them. The collected data from sensor nodes can vary based on what kind of application is used for WSNs. Data confidentiality and access control to that collected data are the most challenging issues in WSNs because the users are able to access data from the different location via ad-hoc manner. Access control is one of the critical requirements to prevent unauthorised access from users. The current access control models in information systems cannot be applied straightforwardly because of some limitations namely limited energy, resource and memory, and low computation capability. Based on the requirements of WSNs, we proposed the Break-The-Glass Access Control (BTG-AC) model which is the modified and redesigned version of Break-The-Glass Role-Based Access Control (BTG-RBAC) model. The several changes within the access control engine are made in BTG-RBAC to apply and fit in WSNs. We developed the BTG-AC model in Ponder2 package. Also a medical scenario was developed to evaluate the BTG-AC model for medical data in WSNs. In this paper, detail design, implementation phase, evaluation result and policies evaluation for the BTG-AC model are presented. Based on the evaluation result, the BTG-AC model can be used in WSNs after several modifications have been made under Ponder2 Package

    An Interesting Study of Capacity Improvement of a Shipyard in Myanmar

    Full text link
    ¾ Six shipyards are in operation under control of Engineering Department of Inland Water Transport. Among them, Dalla shipyard currently accounts for about 50 percent of repair work on ships owned by the Inland Water Transport (IWT). The efficiency of the shipyard, which is about 164 years old, is hampered by old equipment, including some from the WWII-era (Word War II). Now the shipyard needs to be upgraded to improve its current capacity in ship repair. In this study, we proposed two ways which are supporting facilities and re-layout shipyard to increase ship repair. This paper obtains two alternative layouts of shipyard. The first alternative layout does not change the existing layout of shipyard but steel plate warehouse are built. The second alternative changes the existing layout because machine shop and steel plate warehouse is too far from the slipways. The first and second alternatives renovate zone 5 shop, carpenter shop, pipe and boiler shop and repair slipways. The two alternatives have steel plate warehouse as well as the addition of two material handling equipment mobile crane and forklift. The second alternative re-locates new machine shop near the slip ways for better material handling and time consuming. The second alternative is the best alternative in terms of economically feasible, good flow of material and perfect of technical term and the most number of ship repairs. Then it can be improved capacity amount 1.43 times and docking time can be reduced from average 33 days to 27 days

    Experimental verification of parameters in automobile crankshaft modelling for vibration analysis

    Get PDF
    In the interest of utilized more stable automobile components at high speed for reduction the vibration of mechanical system, dynamic characteristics analysis plays a vital role in complex mechanical parts. This paper introduces a clarified approach on statistical investigation and modal analysis methodology to study, predict and accurate crankshaft natural frequencies by using design of experiment (DOE). In this research, first, simulation had been done with MSC Nastran/ Patran to find out the natural frequencies in each mode shape of crankshaft as well as the verification with experiment was carried out. In order to less inaccuracy, numerous simplified crankshaft models were created by using these as input and DOE was established to acquire precise parameters of optimized crankshaft design as the second phase. This method can be further used for the optimizing the structural parameters and would provide some value basis to qualitative measure of parameters and determination of optimized structure. In Conclusion, modal verification accuracy between experimental and simulation has improved

    Awareness of rabies and response to dog bites in a Bangladesh community

    Get PDF
    Community awareness regarding rabies and treatment seeking behaviours are critical both for the prevention and control of the disease in human and animals. We conducted a study to explore people’s awareness about rabies, their attitudes towards dogs and practices associated with treating dog bites in Satkhira Sadar, a southwestern sub-district of Bangladesh. Of the total 3200 households (HHs) surveyed, the majority of the respondents have heard about rabies (73%) and there was a high level of awareness that dog bite is the main cause of rabies (86%), and that rabies can be prevented by vaccination (85%). However, 59% of the dog bite victims first seek treatment from traditional healers instead of visiting the hospitals, 29% received the rabies vaccine, 2% practiced proper wound washing with soap and water, while 4.8% have not taken any measures. None of the victims have received rabies immunoglobulin (RIG). Of the respondents, 5.2% reported a history of dog bite in at least one family member, and 11.8% reported a history of dog bite in domestic animals during the previous year. The HHs having a higher number of family members (OR: 1.13, 95% CI: 1.07–1.2), having a pet dog (OR: 2.1, 95% CI: 1.4–3.2) and caring or feeding a community dog (OR: 2.1, 95% CI: 1.4–2.9) showed an increased risk of getting a dog bite. Among the bite victims, 3.6% (n = 6) humans and 15.8% (n = 60) animals died. As a measure for dog population management (DPM), 56% preferred sterilization while the rest preferred killing of dogs. The current treatment seeking behaviours of the respondents should be improved through additional education and awareness programme and better availability for the provision of post-exposure prophylaxis in Bangladesh. We recommend scaling up national mass dog vaccination and DPM to reduce the burden of rabies cases and dog bites in Bangladesh

    Composite structural motifs of binding sites for delineating biological functions of proteins

    Get PDF
    Most biological processes are described as a series of interactions between proteins and other molecules, and interactions are in turn described in terms of atomic structures. To annotate protein functions as sets of interaction states at atomic resolution, and thereby to better understand the relation between protein interactions and biological functions, we conducted exhaustive all-against-all atomic structure comparisons of all known binding sites for ligands including small molecules, proteins and nucleic acids, and identified recurring elementary motifs. By integrating the elementary motifs associated with each subunit, we defined composite motifs which represent context-dependent combinations of elementary motifs. It is demonstrated that function similarity can be better inferred from composite motif similarity compared to the similarity of protein sequences or of individual binding sites. By integrating the composite motifs associated with each protein function, we define meta-composite motifs each of which is regarded as a time-independent diagrammatic representation of a biological process. It is shown that meta-composite motifs provide richer annotations of biological processes than sequence clusters. The present results serve as a basis for bridging atomic structures to higher-order biological phenomena by classification and integration of binding site structures.Comment: 34 pages, 7 figure

    Language in tuberculosis services: can we change to patient-centred terminology and stop the paradigm of blaming the patients?

    Get PDF
    The words 'defaulter', 'suspect' and 'control' have been part of the language of tuberculosis (TB) services for many decades, and they continue to be used in international guidelines and in published literature. From a patient perspective, it is our opinion that these terms are at best inappropriate, coercive and disempowering, and at worst they could be perceived as judgmental and criminalising, tending to place the blame of the disease or responsibility for adverse treatment outcomes on one side-that of the patients. In this article, which brings together a wide range of authors and institutions from Africa, Asia, Latin America, Europe and the Pacific, we discuss the use of the words 'defaulter', 'suspect' and 'control' and argue why it is detrimental to continue using them in the context of TB. We propose that 'defaulter' be replaced with 'person lost to follow-up'; that 'TB suspect' be replaced by 'person with presumptive TB' or 'person to be evaluated for TB'; and that the term 'control' be replaced with 'prevention and care' or simply deleted. These terms are non-judgmental and patient-centred. We appeal to the global Stop TB Partnership to lead discussions on this issue and to make concrete steps towards changing the current paradigm
    corecore