16 research outputs found
Securing library information system: Vulnerabilities and threats
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the
public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Library Information Systems is also vulnerable to attack since it is a public access institution. Majority of users are naive when it comes to computer and network securities. Some breaches in Library Information System are intentional and some are unintentional. Risks analysis should be done to find the threats and risks in designing the Library Information System. Threats are made possible due to lack of proper procedures, software flaws and policies. The administrators should anticipate all the possible attacks and their mitigation techniques. In this paper, we will try to address various issues arise from this vulnerabilities and threats. We will also describe how we can reduce and overcome this vulnerabilities and threats
Enhanced quality of electronic clinical record through open-source tool
Electronic records are significant to control
healthcare information and save patient lives to increase the value of service in healthcare.This paper is drawn from an ongoing, large-scale research project of implementing an Electronic Clinical Record (ECR).The overall aim in this study is to introduce a new tool for the ECR deeper understanding of the complexities and challenges emerging from the implementation of
the ECR, and in particular, to study how to
manage a gradual transition to a digital record.The aim is to enable the physician and patient to get access to the electronic clinical record.It will propose a new open-source tool to improve the clinical systems.The objective of this research is to ensure sufficient in-depth knowledge of the challenges confronting service delivery related to health, especially in the healthcare sector; and a grasp of how the
underlying ICT infrastructure and an ECR might
be expected to assist in meeting these challenges.Results of our study identified the
need for more research in this particular area as no definitive solution to the long-term access to electronic clinical records was revealed.Additionally, the research findings highlighted the fact that a few medical institutions may actually be concerned about long-term access to electronic records
A study of AODV friendship mechanism in mobile adhoc network trust feature
Mobile ad hoc networks (MANETS) are mobile nodes moving rapidly and they use wireless connections to connect to various networks or nodes.The dynamic nature of MANETs, make it vulnerable to attack by intruders. The sending and passing of nodes are based on several routing protocols. The packets do not reach the destination and some form of secure mechanism based on trust or friendship are deployed to protect the network integrity. Denial of service attacks is one of the typical attack type in mobile adhoc network.In this paper, we deployed Black hole and Grey hole attack. Black hole attack absord all data packets that are sent to its node whereas grey hole attack will drop some packet for a particular network destination based on packets type, time or randomly selected portion of packets.In this experiment we simulated several routing protocol to investigate the secure mechanism in protecting from the blackhole ad greyhole attack.The findings are presented and discussed
Efficient Feature Selection and Classification of Protein Sequence Data in Bioinformatics
Bioinformatics has been an emerging area of research for the last three decades. The ultimate aims of bioinformatics were to store and manage the biological data, and develop and analyze computational tools to enhance their understanding. The size of data accumulated under various sequencing projects is increasing exponentially, which presents difficulties for the experimental methods. To reduce the gap between newly sequenced protein and proteins with known functions, many computational techniques involving classification and clustering algorithms were proposed in the past. The classification of protein sequences into existing superfamilies is helpful in predicting the structure and function of large amount of newly discovered proteins. The existing classification results are unsatisfactory due to a huge size of features obtained through various feature encoding methods. In this work, a statistical metric-based feature selection technique has been proposed in order to reduce the size of the extracted feature vector. The proposed method of protein classification shows significant improvement in terms of performance measure metrics: accuracy, sensitivity, specificity, recall, F-measure, and so forth
Performance comparison of SCTP and UDP over mobile ad hoc networks
Countless researchers have put efforts to conduct researchs about the performance of the traditional transport control protocols (TCP) and user datagram protocol (UDP).Recently new transport protocol had been designed calledStream Control Transmission Protocol (SCTP).In this research, we will focus to study the effect of Mobile Ad Hoc Networks (MANET) on these two transport protocols SCTP and UDP and find out which one performs better over MANET.The transport protocol SCTP has more services and features compare to the traditional transport protocol.We also present some literatures on SCTP and UDP performance over MANET.The simulation parameters and the results of the simulation will also be discussed
Hybrid machine learning technique for intrusion detection system
The utilization of the Internet has grown tremendously resulting in more critical data are being transmitted and handled online.Hence, these occurring changes have led to draw the conclusion that thenumber of attacks on the important information over the internet is increasing
yearly.Intrusion is one of the main threat to the internet.Various techniques and approaches have been developed to address the limitations of intrusion detection system such as low accuracy, high false alarm rate, and time consuming. This research proposed a hybrid machine learning technique for network intrusion detection based on combination of K-means clustering and support vector machine classification.The aim of this research is to reduce the rate of false positive alarm, false negative alarm rate and to improve the detection rate.The NSL-KDD dataset has been used in the proposed technique.In order to improve classification performance, some steps have been taken on the dataset.The classification has been performed by using support vector machine. After training and testing the proposed hybrid machine learning technique, the results have shown that the proposed technique has achieved a positive detection rate and reduce the false alarm rate
The effectiveness of a knowledge-based system as a simulation front-end
This research has shown that a knowledge-based system is an effective tool to help novice
simulation users interpret and understand simulation output. The thesis describes the
development and empirical evaluation of the prototype.
A simulation program which adopts the discrete-event simulation approach simulates the
behaviour of a local area network protocol, i.e., the Ethernet, with different sets of parameter
values. The knowledge-based system carries out the 'analysis' of the simulation output covering
the protocol efficiency and throughput. The knowledge-based system summarises the simulation
output and upon request from the user, provides explanations to a conclusion arrived at. The
summary is the relationship between any pair of variables; and the explanation is the justification
as to how the pair are related.
The strategy for building the knowledge base using production rules is also elaborated. There are
different functions performed by the different sets of rules (or rule-sets). Their major functions, In
parallel with the development objective, are interpreting numerical data, presenting output to
users and providing explanations interactively. The rules are grouped accordingly to make the
knowledge bases easier to maintain. In the explanation aspect, the few approaches attempted by
other researchers to improve expert system explanation is discussed. It is argued that a mere
regurgitation of 'fired' rules to explain the Ethernet behaviour is not adequate in this case. To
circumvent this problem, a 'constructive' approach to explanation is employed. The explanation
procedure rewrites the 'fired' rules in a more understandable form than the if-then rules.
Unnecessary parts of the rules are ommitted to make the explanations clearer.
Finally, an experiment carried out to evaluate the effectiveness of the prototype is described in
detail. The effectiveness is measured from a few different perspectives. These are test scores,
completion time for the test and the users' degree of confidence, both in the interpretation and
explanation tasks. The results show that although some responses are mixed, there is evidence
to suggest that the knowledge-based simulation system environment is beneficial to the target
users