5 research outputs found

    Digital Signatures Chain and El Gamal Scheme Integration for Data Transmission Integrity in Digital Transaction

    Get PDF
    Digital signatures have been widely used by both private and government agencies. However, the use of chain digital signatures is still not widely used, especially in the military world. This results in a lack of ability to ensure data integrity, where it will be difficult to find out who has made changes to the document and to find out the original source of the document. This paper proposes a digital signature chain as a solution to guarantee data authenticity and prevent tampering during transmission. This technique involves creating a chain of digital signatures that are attached to data before it is sent over the network. The proposed method is expected to provide a more secure and efficient way to ensure data integrity, compared to traditional methods such as encryption and checksums. This paper evaluates the effectiveness of the proposed method through a series of experiments and shows that digital signature chains are an effective and reliable way to secure and maintain data transmission over networks. The proposed research aims to evaluate the effectiveness of digital signature chain technology in ensuring data security and integrity and to provide recommendations for its implementation

    Skema Otentikasi Ringan Untuk Perangkat IoT Dengan Menggunakan Metode Rivest Shamir Adleman

    Get PDF
    Internet of Things (IoT) menghubungkan berbagai jenis perangkat ke internet, menciptakan sistem yang cerdas dan terintegrasi. Namun, keamanan menjadi tantangan yang signifikan dalam pengembangan IoT, karena perangkat yang terhubung ke internet rentan terhadap serangan cyber. Untuk mengatasi masalah keamanan pada IoT, skema otentikasi menjadi salah satu solusi yang penting. Penelitian ini bertujuan untuk mengembangkan skema otentikasi ringan menggunakan enkripsi RSA untuk perangkat IoT. Metode penelitian yang digunakan adalah penelitian eksperimental, dengan mengembangkan dan menguji implementasi skema otentikasi pada perangkat IoT. Data yang digunakan adalah data primer dari pengujian implementasi skema otentikasi pada perangkat IoT. Hasil pengujian implementasi skema otentikasi menunjukkan bahwa skema ini dapat memberikan tingkat keamanan yang memadai untuk perangkat IoT dengan overhead yang rendah. Kesimpulan dari penelitian ini adalah skema otentikasi ringan menggunakan enkripsi RSA dapat menjadi solusi yang efektif untuk meningkatkan keamanan pada perangkat IoT. Penelitian ini memberikan kontribusi untuk pengembangan teknologi IoT dengan menawarkan skema otentikasi yang aman dan efisien untuk perangkat IoT

    V241F KCNQ1 Mutation Shortens Electrical Wavelength and Reduces Ventricular Pumping Capabilities: A Simulation Study With an Electro-Mechanical Model

    Get PDF
    Death due to ventricular fibrillation (VF) can occur over a relatively short time period. During the first stage, an irregular heartbeat or arrhythmia of the heart may occur. Therefore, studying arrhythmia could reveal important insights relevant to the prevention of VF. One of the factors known to cause arrhythmia is the generation of mutations in the ion channels of myocytes. The current experimental methods to monitor and observe subjects with arrhythmia are invasive, and could possibly harm the subject with no guarantee of obtaining good results. These limitations could be overcome by using an extensively validated computational simulation study. This study aims to enhance our understanding of the effect of the V241F mutation on electromechanical behavior in the heart. We simulated three conditions; wild-type (WT), heterozygous/intermediate V241F, and pure V241F conditions in an electrophysiological single cell model and three-dimensional electro-mechanics ventricular model. The electro-mechanics model is a one-way coupling of the electrical compartment to the mechanical compartment by Ca2+ transient concentration. Consistent with a previous study, the V241F mutation significantly shortened the action potential duration at 90% repolarization (APD90) under pure V241F mutation conditions, due to the gain of function of the slow delayed rectifier potassium (IKs) channel. This APD90 shortening is associated with a short electrical wavelength, which shortens the Ca2+ activation time as well. The hemodynamic responses showed that the V241F mutation lowered ventricular contraction under normal sinus rhythm conditions by decreasing the stroke volume, stroke work, and ejection fraction. During reentry, the V241F mutation significantly reduced the ventricular contractility compared with the WT condition. In conclusions, the effect of the two variants of V241F (intermediate and pure) mutation not only disturbed the electrophysiological events but also affected the mechanical behavior significantly. The result of this study can be used as a reference for the cardiovascular expert to decide the appropriate pharmacology of IKs conductance block for the patient

    Computational Analysis of Pumping Efficacy of a Left Ventricular Assist Device according to Cannulation Site in Heart Failure with Valvular Regurgitation

    Get PDF
    Mitral valve regurgitation (MR) causes blood to flow in two directions during contraction of the left ventricle (LV), that is, forward into the aorta and backward into the left atrium (LA). In aortic valve regurgitation (AR), leakage occurs from the aorta into the LV during diastole. Our objective is to analyze the contribution of a left ventricular assist device (LVAD) to MR and AR for the following two different cannulation sites: from the LA to the aorta (LAAO) and from the LV to the aorta (LVAO). Using a computational method, we simulated three ventricular conditions (normal [HF without valvular regurgitation], 5% MR, and 5% AR) in three groups (control [no LVAD], LAAO, and LVAO). The results showed that LVAD with LAAO cannulation is appropriate for recovery of the MR heart, and the LVAD with LVAO cannulation is appropriate for treating the AR heart
    corecore