16 research outputs found

    Securing library information system: Vulnerabilities and threats

    Get PDF
    Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet. Library Information Systems is also vulnerable to attack since it is a public access institution. Majority of users are naive when it comes to computer and network securities. Some breaches in Library Information System are intentional and some are unintentional. Risks analysis should be done to find the threats and risks in designing the Library Information System. Threats are made possible due to lack of proper procedures, software flaws and policies. The administrators should anticipate all the possible attacks and their mitigation techniques. In this paper, we will try to address various issues arise from this vulnerabilities and threats. We will also describe how we can reduce and overcome this vulnerabilities and threats

    Enhanced quality of electronic clinical record through open-source tool

    Get PDF
    Electronic records are significant to control healthcare information and save patient lives to increase the value of service in healthcare.This paper is drawn from an ongoing, large-scale research project of implementing an Electronic Clinical Record (ECR).The overall aim in this study is to introduce a new tool for the ECR deeper understanding of the complexities and challenges emerging from the implementation of the ECR, and in particular, to study how to manage a gradual transition to a digital record.The aim is to enable the physician and patient to get access to the electronic clinical record.It will propose a new open-source tool to improve the clinical systems.The objective of this research is to ensure sufficient in-depth knowledge of the challenges confronting service delivery related to health, especially in the healthcare sector; and a grasp of how the underlying ICT infrastructure and an ECR might be expected to assist in meeting these challenges.Results of our study identified the need for more research in this particular area as no definitive solution to the long-term access to electronic clinical records was revealed.Additionally, the research findings highlighted the fact that a few medical institutions may actually be concerned about long-term access to electronic records

    A study of AODV friendship mechanism in mobile adhoc network trust feature

    Get PDF
    Mobile ad hoc networks (MANETS) are mobile nodes moving rapidly and they use wireless connections to connect to various networks or nodes.The dynamic nature of MANETs, make it vulnerable to attack by intruders. The sending and passing of nodes are based on several routing protocols. The packets do not reach the destination and some form of secure mechanism based on trust or friendship are deployed to protect the network integrity. Denial of service attacks is one of the typical attack type in mobile adhoc network.In this paper, we deployed Black hole and Grey hole attack. Black hole attack absord all data packets that are sent to its node whereas grey hole attack will drop some packet for a particular network destination based on packets type, time or randomly selected portion of packets.In this experiment we simulated several routing protocol to investigate the secure mechanism in protecting from the blackhole ad greyhole attack.The findings are presented and discussed

    Efficient Feature Selection and Classification of Protein Sequence Data in Bioinformatics

    Get PDF
    Bioinformatics has been an emerging area of research for the last three decades. The ultimate aims of bioinformatics were to store and manage the biological data, and develop and analyze computational tools to enhance their understanding. The size of data accumulated under various sequencing projects is increasing exponentially, which presents difficulties for the experimental methods. To reduce the gap between newly sequenced protein and proteins with known functions, many computational techniques involving classification and clustering algorithms were proposed in the past. The classification of protein sequences into existing superfamilies is helpful in predicting the structure and function of large amount of newly discovered proteins. The existing classification results are unsatisfactory due to a huge size of features obtained through various feature encoding methods. In this work, a statistical metric-based feature selection technique has been proposed in order to reduce the size of the extracted feature vector. The proposed method of protein classification shows significant improvement in terms of performance measure metrics: accuracy, sensitivity, specificity, recall, F-measure, and so forth

    Performance comparison of SCTP and UDP over mobile ad hoc networks

    Get PDF
    Countless researchers have put efforts to conduct researchs about the performance of the traditional transport control protocols (TCP) and user datagram protocol (UDP).Recently new transport protocol had been designed calledStream Control Transmission Protocol (SCTP).In this research, we will focus to study the effect of Mobile Ad Hoc Networks (MANET) on these two transport protocols SCTP and UDP and find out which one performs better over MANET.The transport protocol SCTP has more services and features compare to the traditional transport protocol.We also present some literatures on SCTP and UDP performance over MANET.The simulation parameters and the results of the simulation will also be discussed

    Hybrid machine learning technique for intrusion detection system

    Get PDF
    The utilization of the Internet has grown tremendously resulting in more critical data are being transmitted and handled online.Hence, these occurring changes have led to draw the conclusion that thenumber of attacks on the important information over the internet is increasing yearly.Intrusion is one of the main threat to the internet.Various techniques and approaches have been developed to address the limitations of intrusion detection system such as low accuracy, high false alarm rate, and time consuming. This research proposed a hybrid machine learning technique for network intrusion detection based on combination of K-means clustering and support vector machine classification.The aim of this research is to reduce the rate of false positive alarm, false negative alarm rate and to improve the detection rate.The NSL-KDD dataset has been used in the proposed technique.In order to improve classification performance, some steps have been taken on the dataset.The classification has been performed by using support vector machine. After training and testing the proposed hybrid machine learning technique, the results have shown that the proposed technique has achieved a positive detection rate and reduce the false alarm rate

    The effectiveness of a knowledge-based system as a simulation front-end

    Get PDF
    This research has shown that a knowledge-based system is an effective tool to help novice simulation users interpret and understand simulation output. The thesis describes the development and empirical evaluation of the prototype. A simulation program which adopts the discrete-event simulation approach simulates the behaviour of a local area network protocol, i.e., the Ethernet, with different sets of parameter values. The knowledge-based system carries out the 'analysis' of the simulation output covering the protocol efficiency and throughput. The knowledge-based system summarises the simulation output and upon request from the user, provides explanations to a conclusion arrived at. The summary is the relationship between any pair of variables; and the explanation is the justification as to how the pair are related. The strategy for building the knowledge base using production rules is also elaborated. There are different functions performed by the different sets of rules (or rule-sets). Their major functions, In parallel with the development objective, are interpreting numerical data, presenting output to users and providing explanations interactively. The rules are grouped accordingly to make the knowledge bases easier to maintain. In the explanation aspect, the few approaches attempted by other researchers to improve expert system explanation is discussed. It is argued that a mere regurgitation of 'fired' rules to explain the Ethernet behaviour is not adequate in this case. To circumvent this problem, a 'constructive' approach to explanation is employed. The explanation procedure rewrites the 'fired' rules in a more understandable form than the if-then rules. Unnecessary parts of the rules are ommitted to make the explanations clearer. Finally, an experiment carried out to evaluate the effectiveness of the prototype is described in detail. The effectiveness is measured from a few different perspectives. These are test scores, completion time for the test and the users' degree of confidence, both in the interpretation and explanation tasks. The results show that although some responses are mixed, there is evidence to suggest that the knowledge-based simulation system environment is beneficial to the target users
    corecore