• Title/Summary/Keyword: Resource sharing system

Search Result 295, Processing Time 0.036 seconds

A Review of Security and Privacy of Cloud Based E-Healthcare Systems

  • Faiza Nawaz;Jawwad Ibrahim;Maida Junaid
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.153-160
    • /
    • 2024
  • Information technology plays an important role in healthcare. The cloud has several applications in the fields of education, social media and medicine. But the advantage of the cloud for medical reasons is very appropriate, especially given the large volume of data generated by healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Cloud computing has many advantages, such as "flexibility, cost and energy savings, resource sharing and rapid deployment". However, despite the significant benefits of using the cloud computing for health IT, data security, privacy, reliability, integration and portability are some of the main challenges and obstacles for its implementation. Health data are highly confidential records that should not be made available to unauthorized persons to protect the security of patient information. In this paper, we discuss the privacy and security requirement of EHS as well as privacy and security issues of EHS and also focus on a comprehensive review of the current and existing literature on Electronic health that uses a variety of approaches and procedures to handle security and privacy issues. The strengths and weaknesses of some of these methods were mentioned. The significance of security issues in the cloud computing environment is a challenge.

Analysis and Measurement of Interferences between UWB and Mobile Communication System (UWB 시스템과 이동통신 시스템간의 간섭측정 분석)

  • Kim Myung-Jong;Lee Hyung-Soo;Hong Ic-Pyo;Shin Yong-Sup
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.10 s.89
    • /
    • pp.1011-1017
    • /
    • 2004
  • Ultra Wideband(UWB) technologies have been developed to exploit a new spectrum resource in substances and to realize ultra-high-speed communication, high precision geolocation, and other applications. The energy of UWB signal is extremely spread from near DC to a few GHz. This means that the interference between conventional narrowband systems and UWB systems is inevitable. However, the interference effects had not previously been studied from UWB wireless systems to conventional mobile wireless systems sharing the frequency bands such as Korean Cellular CDMA and WCDMA. This paper experimentally evaluates the interference from two kinds of UWB sources, namely a direct-sequence spread-spectrum CDMA(DS-CDMA) UWB source and an impulse radio UWB source, to a Cellular CDMA and WCDMA digital transmission system. The average frame error rate degradation of each system are presented. From these experimental results, the interference effects of DS-CDMA UWB source is not severe compared to the Impulse UWB.

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

Development of a Data Reference Model for Joint Utilization of Biological Resource Research Data (생물자원 연구데이터의 공동 활용을 위한 데이터 참조모델 개발)

  • Kwon, Soon-chul;Jeong, Seung-ryul
    • Journal of Internet Computing and Services
    • /
    • v.19 no.4
    • /
    • pp.135-150
    • /
    • 2018
  • The biological resources research data around the world are not only very critical themselves but should be shared and utilized. Up to now, the biological resources have been compiled and managed individually depending on the purpose and characteristics of the study without any clear standard. So, in this study, the data reference model would be suggested which is applicable in the phase ranging from the start of the construction of the information system and which can be commonly used. For this purpose, the data model of the related information system would be expanded based on the domestic and foreign standards and data control policy so that the data reference model which can be commonly applicable to individual information system would be developed and its application procedure would be suggested. In addition, for the purpose of proving the excellence of the suggested data reference model, the quality level would be verified by applying the Korgstie's data model evaluation model and its level of data sharing with the domestic and foreign standards would be compared. The test results of this model showed that this model is better than the conventional data model in classifying the data into 4 levels of resources, target, activities and performances and that it has higher quality and sharing level of data in the data reference model which defines the derivation and relation of entity.

A Study for Efficient Transmission Policies using Multimedia Scenarios (멀티미디어 시나리오를 이용한 효율적인 데이터 전송 기법 연구)

  • Suh, Duk-Rok;Lee, Won-Suk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.11
    • /
    • pp.2797-2808
    • /
    • 1998
  • Multimedia scenario database system is a read-only multimedia-on-demand system which transfers scenarios representing the display ordering of multimedia objects. A scenario is a graph of multimedia objects and it contains spatial, temporal and contextual information of multimedia data. By structuring multimedia objects as a scenario, it is possible to enforce their display order based on their context. Furthermore, it can provide multiple display paths as well as the sharing of objects between different scenarios. As a result, the multimedia scenario database system can perform the pre-scheduling of multimedia objects, which makes it possible to reorder the transmission order of objects in a scenario. Consequently, the overall system resource such as data buffer and network bandwidth can be highly utilized. In this paper, we discuss the requirements of structuring a scenario to design a scenario database that stores and manages multimedia scenario. Furthermore, we devise and analyze several scheduling policies based on the reordering mechanism for the objects in a scenario.

  • PDF

The Development of Mobile Grid System and Performance Evaluation (모바일 그리드 시스템의 개발 및 성능평가)

  • Kim Tae-Kyung;Kim Hee-Seung;Lee Hyun-Joo;Chung Tai-Myung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.581-588
    • /
    • 2005
  • The performance of mobile devices and wireless networks is improved rapidly and Mobility management skills such as Mobile IP and ad-hoc technology were developed. So the requirement of processing the distributed computing is highly increased in any place and any time or in the state of movement. Therefore we studied the mobile grid system to process the distributed applications properly in wireless networks. In addition to typical computational resources, Mobile Grid brings new resources such as sensor, mobile devices or other wireless devices to distributed computing for the purpose of resource-sharing. In this paper, we design and implement the mobile grid system in wireless lan network environment for the providing the grid service. Also, we evaluate the performance of mobile grid system using the processing the distributed applications in implemented mobile grid environments.

A Linear System Approach to Serving Gaussian Traffic in Packet-Switching Networks (패킷 교환망에서 가우스 분포 트래픽을 서비스하는 선형 시스템 접근법)

  • Chong, Song;Shin, Min-Su;Chong, Hyun-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.553-561
    • /
    • 2002
  • We present a novel service discipline, called linear service discipline, to serve multiple QoS queues sharing a resource and analyze its properties. The linear server makes the output traffic and the queueing dynamics of individual queues as a linear function of its input traffic. In particular, if input traffic is Gaussian, the distributions of queue length and output traffic are also Gaussian with their mean and variance being a function of input mean and input power spectrum (equivalently, autocorrelation function of input). Important QoS measures including buffer overflow probability and queueing delay distribution are also expressed as a function of input mean and input power spectrum. This study explores a new direction for network-wide traffic management based on linear system theories by letting us view the queueing process at each node as a linear filter.

A Study on the Convergence Education Process for the Fourth Industrial Revolution - Healing Bio Sciences Consortium Convergence Healing Major Focus - (4차 산업혁명을 대비하는 융합교육과정에 관한 연구 : 힐링바이오공유대학 융합치유전공 중심으로)

  • Lee, Jin-Hong;Song, Deok-Geon;Kwon, Hyuk
    • Journal of Engineering Education Research
    • /
    • v.22 no.6
    • /
    • pp.28-39
    • /
    • 2019
  • In order to improve this, Korean universities should reorganize their curriculum such as job system research and job - based program development according to the demand of industry in order to improve their working ability due to the decrease of the school - age population and the youth unemployment rate. In this study, first, conceptualization of friendly education and definition of industry - university cooperation and analysis of cases related to friendly - educational cooperation between industry and academia, second, analysis of fusion healing majors in Healing Bio - I want to conduct research. Konkuk University Healing Bioresource College conducted a survey based on demand such as experts and industry for the development of industry - academic cooperation - friendly curriculum. As a result of this process, I developed a curriculum development committee to study the internal and external environment through the literature survey, focus group interviews, and Delphi research. The purpose of this study is to develop competitiveness curriculum reflecting competitiveness of human resource development in Korea, to develop competitiveness curriculum that reflects customized opinions of societal demand, to organize systematic curriculum to have practical ability, to strengthen the employment link through development of curriculum in accordance with the direction of human resources development, We will make contribution to build the system of operation from the center to the consumer center, evaluation of the practical ability through the curriculum and the feedback system.

Performance of Cognitive Radio Systems Based on Multiple Orthogonal Sequences (다중 직교 시퀀스를 이용한 인지 무선 시스템의 성능)

  • Lee, Kyung-Sun;Kim, Yoon-Hyun;Kim, Jin-Young
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.8
    • /
    • pp.976-984
    • /
    • 2012
  • Ad hoc networks can be used under difficult conditions, where it is difficult to construct infrastructures, such as shadowing areas, disaster areas, war area, and so on. In order to support to considerable and various wireless services, more spectrum resources are needed. However, efficient utilization of the frequency resource is difficult because of spectrum scarcity and the conventional frequency regulation. Ad-hoc networks employing cognitive radio(CR) system that guarantee high spectrum utilization provide effective way to increase the network capacity. However, there is a problem that all CR user do not fairly use the primary user's idle bandwidth which has been sensed. In this paper, to solve this problem, we propose the spectrum sharing algorithm which uses the multiple orthogonal sequences based on the code division multiple access(CDMA). From the proposed algorithm, it is expected that system performance of CR based ad-hoc network is improved significantly and it can be applied to the implementation of CR based ad-hoc network system.

A Configuration Change Control Procedure for Software Maintenance (소프트웨어 유지보수를 위한 형상변경통제절차)

  • Choe, Gwang-Jun;Kim, Gi-Bong;Jin, Seong-Il
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2745-2755
    • /
    • 1997
  • Many large-scale enterprises have developed software systems to build management information system for their business. However, it is hard to maintain share ability of data, compatibility of operation methedology, and interoperability among subsystems when the development project progresses since each distributed team prepares a development plan for its subsystem and must have poor communication problem among those teams. We must apply software configuration management to the whole life cycle of the software system in order to solve those Problems. We need a model and a repository in order to execute configuration management on configuration products like document, data, and source code which are generated through the life cycle of software development. In this paper, we suggest a model for configuration change control where cross- referencing among life cycle Phases and data-sharing are highlighted, and define ER model to use IRDS(Information Resource Dictionary system) and IRD schemas.

  • PDF