• 제목/요약/키워드: network security equipment

검색결과 211건 처리시간 0.027초

Designing a Vehicles for Open-Pit Mining with Optimized Scheduling Based on 5G and IoT

  • Alaboudi, Abdulellah A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.145-152
    • /
    • 2021
  • In the Recent times, various technological enhancements in the field of artificial intelligence and big data has been noticed. This advancement coupled with the evolution of the 5G communication and Internet of Things technologies, has helped in the development in the domain of smart mine construction. The development of unmanned vehicles with enhanced and smart scheduling system for open-pit mine transportation is one such much needed application. Traditional open-pit mining systems, which often cause vehicle delays and congestion, are controlled by human authority. The number of sensors has been used to operate unmanned cars in an open-pit mine. The sensors haves been used to prove the real-time data in large quantity. Using this data, we analyses and create an improved transportation scheduling mechanism so as to optimize the paths for the vehicles. Considering the huge amount the data received and aggregated through various sensors or sources like, the GPS data of the unmanned vehicle, the equipment information, an intelligent, and multi-target, open-pit mine unmanned vehicle schedules model was developed. It is also matched with real open-pit mine product to reduce transport costs, overall unmanned vehicle wait times and fluctuation in ore quality. To resolve the issue of scheduling the transportation, we prefer to use algorithms based on artificial intelligence. To improve the convergence, distribution, and diversity of the classic, rapidly non-dominated genetic trial algorithm, to solve limited high-dimensional multi-objective problems, we propose a decomposition-based restricted genetic algorithm for dominance (DBCDP-NSGA-II).

A Portable IoT-cloud ECG Monitoring System for Healthcare

  • Qtaish, Amjad;Al-Shrouf, Anwar
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.269-275
    • /
    • 2022
  • Public healthcare has recently become an issue of great importance due to the exponential growth in the human population, the increase in medical expenses, and the COVID-19 pandemic. Speed is one of the crucial factors in saving life, particularly in case of heart attack. Therefore, a healthcare device is needed to continuously monitor and follow up heart health conditions remotely without the need for the patient to attend a medical center. Therefore, this paper proposes a portable electrocardiogram (ECG) monitoring system to improve healthcare for heart attack patients in both home and ambulance settings. The proposed system receives the ECG signals of the patient and sends the ECG values to a MySQL database on the IoT-cloud via Wi-Fi. The signals are displayed as an ECG data chart on a webpage that can be accessed by the patient's doctor based on the HTTP protocol that is employed in the IoT-cloud. The proposed system detects the ECG data of the patient to calculate the total number of heartbeats, number of normal heartbeats, and the number of abnormal heartbeats, which can help the doctor to evaluate the health status of the patient and decide on a suitable medical intervention. This system therefore has the potential to save time and life, but also cost. This paper highlights the five main advantages of the proposed ECG monitoring system and makes some recommendations to develop the system further.

Adopting the Electronic Services in the Light of Coved 19 from Employees' Perceptive in Karak University College

  • Allahawiah, Sattam;Altarawneh, Haroon;nawaiseh, Kafa al
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.389-399
    • /
    • 2022
  • This study aims to investigate and analyze the impact of the COVID-19 pandemic on the adopt electronic services in education sector in Jordan, where the COVID-19 pandemic has left huge threats in terms of health and led to a significant decrease in economic output and a rise in unemployment. This study also aims to know the steps taken by the Jordanian governments and higher education ministry and universities to overcome this crisis and mitigate the economic and financial impacts that would enhance the resilience of the education sector. To achieve the goal of the study, both methods of deductive and inductive analysis were used, which helped us to systematically consider the economic and other consequences of the COVID-19 pandemic, such as statistical analyses and other tools that helped us in this study. The results of this study, showed that the COVID-19 pandemic led to a significant increase in adopt electronic services in education sector in Jordan, and decline in economic growth, a significant rise in unemployment, an increase in market instability, and a decrease in the financial position of companies. The recommendations concluded that Jordan should begin to change its policies according to the new data, and take Measures to advance the education sector by relay on electronic services and directing investment in education sector through saving policies and infrastructure equipment in parallel with the population boom in Jordan.

Establishing and Designing the Financial System for the Research Program of the Deanship of Scientific Research at Northern Border University

  • Hamad, Sofian;Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.35-40
    • /
    • 2021
  • The study aimed to realize one of the basic requirements for designing and building the integrated automated system for scientific research at Northern Border University, which includes the establishment of an automated interconnected system to manage all academic and financial operations of scientific research. From receiving the budget of the funded research courses, then the regular financial regulation of all the research team's rewards, the cost of publishing, translation and equipment, then receiving the research plans and linking them financially, preparing the total and detailed financial value for all stages, then financial disbursement operations, financial closure of research when published, and preparing financial reports The research team used the analytical approach to build the main and subsidiary requirements for designing the financial system, and the study concluded that all the elements required for the stages of financial management for scientific research at Northern Border University can be met based on sufficient by sequencing these processes and how they are sequenced as e It is designed in the research study.

Debugging of Parallel Programs using Distributed Cooperating Components

  • Mrayyan, Reema Mohammad;Al Rababah, Ahmad AbdulQadir
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.570-578
    • /
    • 2021
  • Recently, in the field of engineering and scientific and technical calculations, problems of mathematical modeling, real-time problems, there has been a tendency towards rejection of sequential solutions for single-processor computers. Almost all modern application packages created in the above areas are focused on a parallel or distributed computing environment. This is primarily due to the ever-increasing requirements for the reliability of the results obtained and the accuracy of calculations, and hence the multiply increasing volumes of processed data [2,17,41]. In addition, new methods and algorithms for solving problems appear, the implementation of which on single-processor systems would be simply impossible due to increased requirements for the performance of the computing system. The ubiquity of various types of parallel systems also plays a positive role in this process. Simultaneously with the growing demand for parallel programs and the proliferation of multiprocessor, multicore and cluster technologies, the development of parallel programs is becoming more and more urgent, since program users want to make the most of the capabilities of their modern computing equipment[14,39]. The high complexity of the development of parallel programs, which often does not allow the efficient use of the capabilities of high-performance computers, is a generally accepted fact[23,31].

Breast Cancer Detection with Thermal Images and using Deep Learning

  • Amit Sarode;Vibha Bora
    • International Journal of Computer Science & Network Security
    • /
    • 제23권8호
    • /
    • pp.91-94
    • /
    • 2023
  • According to most experts and health workers, a living creature's body heat is little understood and crucial in the identification of disorders. Doctors in ancient medicine used wet mud or slurry clay to heal patients. When either of these progressed throughout the body, the area that dried up first was called the infected part. Today, thermal cameras that generate images with electromagnetic frequencies can be used to accomplish this. Thermography can detect swelling and clot areas that predict cancer without the need for harmful radiation and irritational touch. It has a significant benefit in medical testing because it can be utilized before any observable symptoms appear. In this work, machine learning (ML) is defined as statistical approaches that enable software systems to learn from data without having to be explicitly coded. By taking note of these heat scans of breasts and pinpointing suspected places where a doctor needs to conduct additional investigation, ML can assist in this endeavor. Thermal imaging is a more cost-effective alternative to other approaches that require specialized equipment, allowing machines to deliver a more convenient and effective approach to doctors.

A Systematic Review of Predictive Maintenance and Production Scheduling Methodologies with PRISMA Approach

  • Salma Maataoui;Ghita Bencheikh;Ghizlane Bencheikh
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.215-225
    • /
    • 2024
  • Predictive maintenance has been considered fundamental in the industrial applications in the last few years. It contributes to improve reliability, availability, and maintainability of the systems and to avoid breakdowns. These breakdowns could potentially lead to system shutdowns and to decrease the production efficiency of the manufacturing plants. The present article aims to study how predictive maintenance could be planed into the production scheduling, through a systematic review of literature. . The review includes the research articles published in international journals indexed in the Scopus database. 165 research articles were included in the search using #predictive maintenance# AND #production scheduling#. Press articles, conference and non-English papers are not considered in this study. After careful evaluation of each study for its purpose and scope, 50 research articles are selected for this review by following the 2020 Preferred Reporting Items for Systematic Review and Meta-Analysis Protocols (PRISMA) statement. A benchmarking of predictive maintenance methods was used to understand the parameters that contributed to improve the production scheduling. The results of the comparative analysis highlight that artificial intelligence is a promising tool to anticipate breakdowns. An additional impression of this study is that each equipment has its own parameters that have to be collected, monitored and analyzed.

TCAM을 이용한 패킷 분류를 위한 효율적인 갱신 알고리즘 (An Efficient Update Algorithm for Packet Classification With TCAM)

  • 정해진;송일섭;이유경;권택근
    • 한국통신학회논문지
    • /
    • 제31권2A호
    • /
    • pp.79-85
    • /
    • 2006
  • 고성능 라우터, 스위치 및 네트워크 보안 장비에서 패킷 포워딩 기능을 고속으로 수행하기 위해서는 효과적인 패킷 분류 기술이 필수적인데, 최근에는 TCAM과 검색엔진 등, 고속의 컨텐트 기반 검색 하드웨어를 이용하는 방법들이 사용되고 있다. 패킷 분류 시에는 트래픽 차단, 트래픽 모니터링 등의 목적을 위해서 많은 규칙들이 사용될 수 있고, 삽입과 삭제가 시스템 운용 중에 발생할 수 있다. 특히, 고속의 네트워크 환경에서 패킷 포워딩의 성능을 저하시키지 않기 위해서는 동적으로 변화하는 규칙들을 효과적으로 갱신하는 방법이 필요하다. 본 논문에서는 TCAM을 이용한 패킷 분류시 효과적인 갱신이나 재배치를 위해서 순서화된 부분 정렬 알고리즘을 제안하고, 실험을 통하여 TCAM의 이용률이 70$\%$까지 높은 상황에서도 갱신으로 인한 재배치가 거의 일어나지 않도록 하여 재배치로 인한 패킷 처리의 지연을 줄일 수 있다는 결과를 보인다.

빌딩 에너지시스템 통합네트워크 구축에 관한 연구 (The Novel Configuration of Integrated Network for Building Energy System)

  • 홍원표
    • 한국조명전기설비학회:학술대회논문집
    • /
    • 한국조명전기설비학회 2008년도 추계학술대회 논문집
    • /
    • pp.229-234
    • /
    • 2008
  • The new millennium has started with several innovations driven by fast evolution of the technologies in energy sector. A strong impulse towards the diffusion of new economical efficient technologies regulatory incentives related to energy production from renewable source and a small scale building trigeneration and to promotion of more sustainable environmental-friendly generation solutions, the evolution of electricity markets, more and more binding local emission constraints, and the need for improving the security of supply to reduce the energy system vulnerability. The 24 percentage energy quantify of total energy consumption consumes in commercial buildings and residential houses and the 30% portion of total $CO_2$ emissions covers also in the commercial buildings and residential houses sector. To cope with efficiently this energy sinuation in building sector, Building microgrid or building tooling, heating & power(BCHP) system has been interested in recent day due to meeting thermal and electric energy requirements efficiently and with appropriate energy quality. A multi agent system is a collective of intelligent agents that communicate with each other and work cooperatively to achieve common goals. Also, it is to medicate and coordinate communication between Control Areas and Security Coordinators for teal-time control of the BCHP system and the power pid. In this new circumstance, it is very important to integrate the power and energy delivery system and the information system(communication, networks, and intelligent equipment) that controls it. Therefore, development of smart control modules with open communication protocol and seamlessly interchange the data and information between control network and data network including extranet and intranet give a great meanings. We designed and developed the TCP/IP-CAN IED agent modules and ModBus./LonTalk/(TCP/IP) IED agent ones to configure the multi-agent system based smart energy network of commercial buildings and also intelligent algorithms for inverter fault diagnostics which ran be operated in control level or agent level network.

  • PDF

A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS

  • Song, Jae-Gu;Lee, Jung-Woon;Lee, Cheol-Kwon;Kwon, Kee-Choon;Lee, Dong-Young
    • Nuclear Engineering and Technology
    • /
    • 제44권8호
    • /
    • pp.919-928
    • /
    • 2012
  • The applications of computers and communication system and network technologies in nuclear power plants have expanded recently. This application of digital technologies to the instrumentation and control systems of nuclear power plants brings with it the cyber security concerns similar to other critical infrastructures. Cyber security risk assessments for digital instrumentation and control systems have become more crucial in the development of new systems and in the operation of existing systems. Although the instrumentation and control systems of nuclear power plants are similar to industrial control systems, the former have specifications that differ from the latter in terms of architecture and function, in order to satisfy nuclear safety requirements, which need different methods for the application of cyber security risk assessment. In this paper, the characteristics of nuclear power plant instrumentation and control systems are described, and the considerations needed when conducting cyber security risk assessments in accordance with the lifecycle process of instrumentation and control systems are discussed. For cyber security risk assessments of instrumentation and control systems, the activities and considerations necessary for assessments during the system design phase or component design and equipment supply phase are presented in the following 6 steps: 1) System Identification and Cyber Security Modeling, 2) Asset and Impact Analysis, 3) Threat Analysis, 4) Vulnerability Analysis, 5) Security Control Design, and 6) Penetration test. The results from an application of the method to a digital reactor protection system are described.