System design and biomedical data processing in a life support Computer network system for aged people

1998 ◽  
Vol 43 (s2) ◽  
pp. 165-166 ◽  
Author(s):  
S. KATO ◽  
S. TAKEDA ◽  
K. TORIUMI ◽  
M. NOGUCHI
2019 ◽  
Vol 17 (2) ◽  
pp. 61
Author(s):  
Budi Hartanto

In a computer network system when using more than one router that is interconnected will experience a problem in the process of sending data packets. The problem is that if the main line is disconnected, then the data packet is unable to send data to a computer network system. The purpose of this study is to make a computer network system design with fail over technique on the type of static routing that is not directly connected. In this case the researcher used the Microtub Router Board RB-951-2nd. Failover technique is a way to transfer routing paths when the main line is broken, so it can be diverted to the backup routing path, this is so that the computer network connection path continues smoothly. The researcher used a recursive network connection case or the router is not connected directly to the main point center (main gateway), so the researcher used the optimization of the Target Scope and Distance features in the Microtic Router Board. The results of this study was that the backup routing path was able to channel data packets within the network if the main line did not respond or could not be connected.


1976 ◽  
Author(s):  
N. I. Moiseeva ◽  
M. Yu. Simonov ◽  
V. M. Sysuev

2011 ◽  
Vol 121-126 ◽  
pp. 3195-3199
Author(s):  
Li Feng Yang ◽  
Jun Yuan ◽  
Wei Na Liu ◽  
Xiu Ming Nie ◽  
Xue Liang Pei

Use Kingview to acquire and display the centrifugal pump performance parameters for the real-time data, and will stored the collected experimental data in Access databases, using VB database read, and drawing function for the data processing and rendering performance parameters of relationship curves.


1967 ◽  
Author(s):  
Robert Ebersole ◽  
Louis Pochettino ◽  
Walter Kugler

2007 ◽  
Vol 16 (01) ◽  
pp. 138-140
Author(s):  
S. Diouny ◽  
K. Balar ◽  
M. Bennani Othmani

SummaryIn 2005, Medical Informatics Laboratory (CMIL) became an independent research unit within the Faculty of Medicine and Pharmacy of Casablanca. CMIL is currently run by three persons (a university professor, a data processing specialist and a pedagogical assistant). The objectives of CMIL are to promote research and develop quality in the field of biomedical data processing and health, and integrate new technologies into medical education and biostatistics. It has four units: Telehealth Unit, Network Unit, Biostatistics Unit, Medical data processing Unit.The present article seeks to give a comprehensive account of Casablanca Medical informatics laboratory (CMIL) activities. For ease of exposition, the article consists of four sections: Section I discusses the background of CMIL; section II is devoted to educational activities; section III addresses professional activities; and section IV lists projects that CMIL is involved in.Since its creation, CMIL has been involved in a number of national and international projects, which have a bearing on Telemedicine applications, E-learning skills and data management in medical studies in Morocco.It is our belief that the skills and knowledge gained in the past few years would certainly enrich our research activities, and improve the situation of research in Medical informatics in Morocco.


Author(s):  
Adam Blair ◽  
Thomas Brown ◽  
Keith M. Chugg ◽  
Mark Johnson

2021 ◽  
Vol 14 (2) ◽  
pp. 268-277
Author(s):  
Etza nofarita

Security issues of a system are factors that need to be considered in the operation of information systems, which are intended to prevent threats to the system and detect and correct any damage to the system. Distributed Denial of Services (DDOS) is a form of attack carried out by someone, individuals or groups to damage data that can be attacked through a server or malware in the form of packages that damage the network system used. Security is a mandatory thing in a network to avoid damage to the data system or loss of data from bad people or heckers. Packages sent in the form of malware that attacks, causing bandwidth hit continuously. Network security is a factor that must be maintained and considered in an information system. Ddos forms are Ping of Death, flooding, Remote controled attack, UDP flood, and Smurf Attack. The goal is to use DDOS to protect or prevent system threats and improve damaged systems. Computer network security is very important in maintaining the security of data in the form of small data or large data used by the user.


Sign in / Sign up

Export Citation Format

Share Document