38 research outputs found

    Wireless Strategic Information System In Managing Patients

    Get PDF
    The project aims is to investigate a new strategy for managing drug addicts patients. This paper presents an overview of the current situation and problems in the managing the patients. A strategic information system for managing the patients will be proposed. The benefit of having mobile application for managing the patients is also discussed. A prototype system for the mobile application will be developed. It specifically contains information such as the current situation, symptoms, problems and suggestion on how to improve the process of managing the patients so that they can have a good quality of life. Lastly, this paper also presents the result from the research analysis and it concludes by giving the expected outcomes from the proposed project

    Performance evaluation of user mobility on QoS classes in a 3G network

    Get PDF
    The popularity of IP services is increasing and the demand for managing traffic with different QoS classes has become more challenging. The stability of the system is affected by the rate of voice traffic. Mobility allows users to be connected at all time where handover may occur as it is not always possible to be connected to the same base station. Mobility and handover cause severe interference, which affects overall throughput and capacity of the system. The system requires greater capacity with more coverage area. This study deals with the impact of user mobility on voice quality in IP based application in a 3G Network. The aim is to improve the system performance in mixed traffic environment. A mathematical model is used to analyse the impact of using different type of coder on packet end-to-end delay and packet loss. The simulation results indicate that types of coder affect the system performance. Application of scheduling based on weight and load balancing technique can improve the system performance. The deployment of scheduling based on weight and a load balancing technique have been investigated to reduce the end-to-end delay and to improve overall performance in mixed traffic environment. The results under different conditions are analysed and it is found that by applying scheduling scheme, the quality of voice communication can be improved. In addition, load balancing technique can be used to improve the performance of the system. Apart from the decrease in delay, the technique can increase the capacity of the system and the overall stability of the system can be further improved. Finally, network security is another important aspect of network administration. Security policies have to be defined and implemented so that critical sections of the network are protected against unwarranted traffic or unauthorized personnel. The impact of implementing IPSec has been tested for voice communication over IP in a 3G network. Implementing the security protocol does not significantly degrade the performance of the system.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Simultaneous Latent Fingerprint Detection

    Get PDF

    Reduction the Effect of Mobility in Link Transmitting Using Efficient DSR Route Cache for MANETs

    Get PDF
    Communication between mobile users is becoming more popular than ever before due to the recent technological advances in wireless communication devices. Ad hoc networks are generally closed in that, it’s a collection of two or more devices equipped with wireless communications and networking capability; they do not connect to the Internet and are typically created between participants. This means that a formed network can be de-formed on-the-fly without the need for any system administration. Many routing protocol methods have been proposed in Mobile Ad-Hoc Network but still the challenges are to improve the routing performance. The DSR (Dynamic Source Routing) routing protocol dependent on the cache memory for every node to store the routing path from source to destination. This paper presented a new algorithm using DSR routing cache technique to improve the routing between mobile nodes to reduction the effect of mobility in link transmitting that can solve link broken problem. The simulation results show a low delay, stable link in routing and better performance in terms of Route Discovery Time. It indicates that DSR cache outperforms DSR standard and had a high quality of packet delivery

    A new biometric template protection based on secure data hiding approach

    Get PDF
    Biometrics is a technology that has been widely used in many official and commercial identification applications. The extracted features from the biometric sample is called biometric template which is used during a biometric authentication process. The security of templates is the critical part of biometric system and one of the most crucial issues in designing a secure system. The proposed approach focused on combining data hiding and biometrics to take advantage of the benefits of both fields and develop the hiding technique to find a secure solution for protecting biometric data. We deal with dental as a first biometric source and a user's speech as a second biometric source at same time it a reliable key from a user's speech for enhanced the security of the system. Two of the popular methods are combined DWT and DCT in the proposed security system (SDHA) for embedding and extraction the secret data in order to compensate the drawbacks of both of them and to make the hidden information much more secure against the attacks, Wavelet Transform which use Dyadic Filters to decompose cover image into 4-Levels (HH, HL, LH and LL) and Discrete Cosine Transforms to convert a signal of the selected coefficients (HH, HL and LH) into elementary frequency components. Simply the proposed hiding method are summarized by dividing the secret data into three sections according to the percentages that have been entered by a user then distribute these sections into the three chosen coefficient sets (HH,HL and LH) of the cover image which is an excellent secure locations for data hiding. The results show the efficiency of the proposed method comparing with other method that used skin tone region of images, DWT method and simple LSB method

    Multibiometric systems and template security survey

    Get PDF
    Multimodal biometric systems are capable of utilizing, more than one physiological or behavioral characteristic for enrolment either in verification or identification mode, It is generally believed that several biometric sources usually compensate for the weaknesses of single biometric fusion techniques. The features that extracted from the biometric samples considered a critical part of biometric system which is called biometric template it is one of the most crucial issues in designing a secure system

    A Review on Soft Computing Technique in Intrusion Detection System

    Get PDF
    Intrusion Detection System is significant in network security. It detects and identifies intrusion behavior or intrusion attempts in a computer system by monitoring and analyzing the network packets in real time. In the recent year, intelligent algorithms applied in the intrusion detection system (IDS) have been an increasing concern with the rapid growth of the network security. IDS data deals with a huge amount of data which contains irrelevant and redundant features causing slow training and testing process, higher resource consumption as well as poor detection rate. Since the amount of audit data that an IDS needs to examine is very large even for a small network, classification by hand is impossible. Hence, the primary objective of this review is to review the techniques prior to classification process suit to IDS data

    An Improved Algorithm for Prediction of Young's Modulus of Wood Plastic Composites

    Get PDF
    In this paper, a simulation model is proposed to predict Young’s Modulus for wood plastic composites (WPC) based on micromechanical models. Most of the previous models developed, have assumed that wood have uniform properties similar to synthetic fibers. But in reality wood behave differently due to different natural sources. During the manufacturing process of WPC, the cell wall of the wood fibers gets damaged during extrusion and injection molding. The percentage of void volume present inside the wood fiber is reduced. The proposed model is able to predict Young’s Modulus taking into account the impact of “void volume” and the moisture content of WPC. Model results were validated with experimental results and it was observed that predicted results have shown improvements in comparison to the previously reported models. The present model will be very useful for the people working in the wood composite industry and in research institutes, to increase the understanding of internal processes during manufacturing process. It will help in reducing the quality defects and improving the strength. Key words: Wood plastic composites, simulation model, Young’s Modulus
    corecore