Fundamental upgrade of the internal network system within the National Police Agency of Japan

Author(s):  
Toshinobu Yasuhira
2013 ◽  
Vol 655-657 ◽  
pp. 1141-1144
Author(s):  
Yi Wang ◽  
Li Ren He

As a field bus, CAN bus has been increasingly used in automotive electronic system.In this paper,a vehicle internal network architecture based on CAN bus system was introduced. Utilized the high-performance PIC18F258 MCU with CAN controller to design a CAN bus interface circuit, meanwhile shown the structure of major hardware and software design processes. The circuit has several advantages such as simple hardware design, high reliability,and powerful real-time.


2016 ◽  
Vol 44 ◽  
pp. 163-182 ◽  
Author(s):  
Jeong L. Kim ◽  
William Wells ◽  
James J. Vardalis ◽  
Sharon K. Johnson ◽  
Hyungjin Lim

2011 ◽  
Vol 145 ◽  
pp. 349-353
Author(s):  
Kuang Yang Kou ◽  
Jo Ting Wei ◽  
Hsin Hung Wu ◽  
Yu Huei Liu

Accidents and adverse effects was the sixth leading cause of death in Taiwan in 2008 provided by Department of Health, Executive Yuan, Taiwan. Based on Statistics of Police Administration released by National Police Agency, Ministry of Interior, Taiwan, the case of intoxicated driving accidents accounts for more than 19% in fatal traffic accidents from 2006 to 2009. Moreover, the cause in intoxicated driving accidents ranks first among thirteen causes. As a result, intoxicated driving accident is one of the critical reasons to cause death and often results in serious casualties.


Author(s):  
Wellington Amponsah ◽  
Simon Amonovi ◽  
Kwabena Gyeke-Lartey ◽  
Taiwo E. Ajagunsegun

Ghana’s Banking sector has seen much improvement and this is evidence by the establishment of Commercial Banks, Rural and Community Banks and Savings and Loans. Cyber-threats and the measures necessary to counter them in the Banking industry are the major security issue of the hour that the bank is facing. Information security issue is vital and more critical when it wants to implement and apply IT into its operations. Penetration and testing uses and techniques those hackers employ in penetrating the network system to verify presence of vulnerabilities in the network. This research demonstrates how to perform and identify the security strength and reveal the vulnerabilities, and possible exploits in the security of the internal network and misconfiguration of firewall of the Bank using penetration testing.


Sign in / Sign up

Export Citation Format

Share Document