scholarly journals Model of Secure File Exchange Information Technology Operation

2021 ◽  
pp. 52-62
Author(s):  
Tatyana Lebedkina ◽  
◽  
Sergey Sokolovsky ◽  

The purpose of this work: to develop a model that allows to assess the security of the information system of file exchange, to ensure the efficiency of servicing the maximum number of requests of authorized customers with a simultaneous decrease in the quality of service of requests from the attacker’s means. Methods used: formalization of service processes in the form of Markov random processes, as well as numerical methods. The result of the study: a criterion evaluation base for the effectiveness of the functioning of the information system of file exchange has been developed. The problem of dynamic management of the resource capabilities of the information system of file exchange by managing the parameters of data transmission has been solved. An assessment of the asymptotic stability and robustness of the model relative to the perturbations of the values of the initial parameters is solved in order to increase the adequacy of the model when choosing control modes for the data transmission process. Probabilistic and temporal characteristics and the process of functioning of the information system of file exchange in the conditions of unauthorized influences in various situations of interaction of the parties to the conflict, as well as in the managementand computational and time resource of the means of network intelligence of the attacker are obtained. The optimal modes of functioning of information systemsand file exchange, ensuring its compliance withthe established security requirements of critical information infrastructure objects, aresubstantiated.

Author(s):  
M. Nisha ◽  
S. Poongavanam

<p>There has been an increasing attentiveness in the uses of sensor networks. Because sensors are normally controlled in on-board power supply, proficient supervision of the network is essential in improving the life of the sensor.<strong> </strong>The majority research protocols objective at offering link breakage reducing and mitigating from the same. Yet, selecting the well-organized communication do all the beneficial to the transmission process thus demonstrating better improvement in the network performance. In this article, we propose Best Communication Node Election for well-organized Path in Flat Topology The main goal of this<strong> </strong>work is to choose the best data transmission node in flat topology for improve the multi hop routing. This scheme, the best communication node selection based on Path Metric and this Path Metric is measured by the packet obtained rate, dropped rate, latency rate and node energy. This scheme provide guarantees quality of Service in the network.</p>


1990 ◽  
Vol 9 (4) ◽  
pp. 207-210 ◽  
Author(s):  
G. Lapointe ◽  
M. Larue ◽  
M. Baril

The Toxicological Index, a division of the Commission de la Santé et de la Sécurité du Travail, was established in 1980 by the Quebec Government. Its main objective, as a database producer, is to provide health and safety related toxicological information to anyone who is involved in risk management in the workplace. In order to meet this requirement, a fully computerized information system was created. It has allowed us to process, over the past 5 years, 250,000 information inquiries, to register 100,000 contaminants, to exchange information with 3,300 product manufacturers and to provide our users with 6,500 fully reviewed toxicological information profiles. The procedure used to assess the information as well as the choices made to achieve our objective in terms of quantity and quality of the information provided are described.


2019 ◽  
Vol 12 (1) ◽  
pp. 41 ◽  
Author(s):  
Christy Atika Sari ◽  
Eko Hari Rachmawanto ◽  
Edi Jaya Kusuma

Transmitting image through the internet needs to be secured because of risk to be stolen. Security techniques that can be used for securing data especially image are cryptography and steganography. Combine these techniques can provide double protection in image security. In this research, we proposed the used of T-DES encryption with a selective bit to improve the time performance because time aspect is one of the important aspects of data transmission process. Four MSB of the secret image will be selected, then it will be encrypted using T-DES. After that, this encrypted results will be combined with other 4 LSB. This encryption scheme result will be embedded into a cover image using inverted LSB because inverted LSB can produce high imperceptible value. From 6 testing images which encrypted using proposed scheme present that proposed encryption scheme is twice faster than classic triple DES and slightly faster than double DES. While the embedding scheme can produce PSNR value above 40 dB with the range between 51 dB to 61 dB as well as SSIM which close to 1. This result denoted that proposed scheme generated good quality of stego images.


2018 ◽  
Vol 4 (1) ◽  
pp. 87-96
Author(s):  
Yanni Suherman

Research conducted at the Office of Archives and Library of Padang Pariaman Regency aims to find out the data processing system library and data archiving. All data processing is done is still very manual by using the document in writing and there is also a stacking of archives on the service. By utilizing library information systems and archives that will be applied to the Office of Archives and Library of Padang Pariaman Regency can improve the quality of service that has not been optimal. This research was made by using System Development Life Cycle (SDLC) which is better known as waterfall method. The first step taken on this method is to go directly to the field by conducting interviews and discussions. This information system will be able to assist the work of officers in terms of data processing libraries and facilitate in search data archives by presenting reports more accurate, effective and efficient.


2021 ◽  
Vol 1791 (1) ◽  
pp. 012054
Author(s):  
A A Lyubchenko ◽  
E Y Kopytov ◽  
A G Malyutin ◽  
A A Bogdanov

2021 ◽  
Vol 3 (2) ◽  
pp. 444-453
Author(s):  
Arturo Cervantes Trejo ◽  
Sophie Domenge Treuille ◽  
Isaac Castañeda Alcántara

AbstractThe Institute for Security and Social Services for State Workers (ISSSTE) is a large public provider of health care services that serve around 13.2 million Mexican government workers and their families. To attain process efficiencies, cost reductions, and improvement of the quality of diagnostic and imaging services, ISSSTE was set out in 2019 to create a digital filmless medical image and report management system. A large-scale clinical information system (CIS), including radiology information system (RIS), picture archiving and communication system (PACS), and clinical data warehouse (CDW) components, was implemented at ISSSTE’s network of forty secondary- and tertiary-level public hospitals, applying global HL-7 and Digital Imaging and Communications in Medicine (DICOM) standards. In just 5 months, 40 hospitals had their endoscopy, radiology, and pathology services functionally interconnected within a national CIS and RIS/PACS on secure private local area networks (LANs) and a secure national wide area network (WAN). More than 2 million yearly studies and reports are now in digital form in a CDW, securely stored and always available. Benefits include increased productivity, reduced turnaround times, reduced need for duplicate exams, and reduced costs. Functional IT solutions allow ISSSTE hospitals to leave behind the use of radiographic film and printed medical reports with important cost reductions, as well as social and environmental impacts, leading to direct improvement in the quality of health care services rendered.


Sign in / Sign up

Export Citation Format

Share Document