scholarly journals Interoperability in the emergency management. A solution based on distributed databases and P2P networks

2018 ◽  
Vol 15 (2) ◽  
pp. 257-272
Author(s):  
Marcelo Zambrano ◽  
Francisco Pérez ◽  
Manuel Esteve ◽  
Carlos Palau

To successfully confront a disaster, it is necessary the coordinated and collaborative participation of multiple agencies related to public safety, which provide a response consistent with the requirements of emergency environment and all those affected. For this, is necessary the permanent information exchange between the involved agencies that allows to joint its efforts and to face the emergency of the best possible way. This article describes the interoperability platform architecture, which enables agencies involved in management of an emergency, exchange information using their own information systems and computer tools. The architecture core is inside its Shared Information Space, which manages it as a single storage entity, all information coming from the information systems integrated to the platform. It is founded on a non-relational distributed database and a P2P communications network, to share out the workload between all the platform nodes in order to award availability and scalability to the architecture.

2019 ◽  
Vol 23 (10) ◽  
pp. 87
Author(s):  
Saadi Hamad Thalij ◽  
Veli Hakkoymaz

The database replication refers to distributing a database among multiple locations. There are three kinds of database replication system: snapshot, transactional and merge. The snapshot replication refers to the fragment of database items and distributing them to multi databases at once. An important goal in this paper is to experiment with a distributed database study the snapshot replication and examine the issues associated with it. In this work, the data from another database is used to increase availability and flexibility as well as provide the information exchange between databases. In this process, the data is infrequently updated at specified periods by copying and changing the data from the original database towards the subscriber database. The work of agents in this technology will do the most of the work to achieve the stated goal. The experimental results show that at both vertical and horizontal fragmentation, the proposed approach of replicating distributed database is efficient and the performance is significantly improved in terms of data transfer time, load sharing and update of database fragmentation. Hence the snapshot replication system is much schedulable and protective replication in business markets.   http://dx.doi.org/10.25130/tjps.23.2018.177   


2021 ◽  
Vol 1155 (1) ◽  
pp. 012062
Author(s):  
I Ya Lvovich ◽  
Ya E Lvovich ◽  
A P Preobrazhenskiy ◽  
Yu P Preobrazhenskiy ◽  
O N Choporov

2020 ◽  
Vol 29 (01) ◽  
pp. 104-114
Author(s):  
Ursula H. Hübner ◽  
Nicole Egbert ◽  
Georg Schulte

Objective: The more people there are who use clinical information systems (CIS) beyond their traditional intramural confines, the more promising the benefits are, and the more daunting the risks will be. This review thus explores the areas of ethical debates prompted by CIS conceptualized as smart systems reaching out to patients and citizens. Furthermore, it investigates the ethical competencies and education needed to use these systems appropriately. Methods: A literature review covering ethics topics in combination with clinical and health information systems, clinical decision support, health information exchange, and various mobile devices and media was performed searching the MEDLINE database for articles from 2016 to 2019 with a focus on 2018 and 2019. A second search combined these keywords with education. Results: By far, most of the discourses were dominated by privacy, confidentiality, and informed consent issues. Intertwined with confidentiality and clear boundaries, the provider-patient relationship has gained much attention. The opacity of algorithms and the lack of explicability of the results pose a further challenge. The necessity of sociotechnical ethics education was underpinned in many studies including advocating education for providers and patients alike. However, only a few publications expanded on ethical competencies. In the publications found, empirical research designs were employed to capture the stakeholders’ attitudes, but not to evaluate specific implementations. Conclusion: Despite the broad discourses, ethical values have not yet found their firm place in empirically rigorous health technology evaluation studies. Similarly, sociotechnical ethics competencies obviously need detailed specifications. These two gaps set the stage for further research at the junction of clinical information systems and ethics.


Author(s):  
Savinay Mengi ◽  
Astha Gupta

A Blockchain protocol operates on top of the Internet, on a P2P network of computers that all run the protocol and hold an identical copy of the ledger of transactions, enabling P2P value transactions without a middleman though machine consensus. The concept of Blockchain first came to fame in October 2008, as part of a proposal for Bitcoin, with the aim to create P2P money without banks. Bitcoin introduced a novel solution to the age-old human problem of trust. The underlying blockchain technology allows us to trust the outputs of the system without trusting any actor within it. People and institutions who do not know or trust each other, reside in different countries, are subject to different jurisdictions, and who have no legally binding agreements with each other, can now interact over the Internet without the need for trusted third parties like banks, Internet platforms, or other types of clearing institutions. Ideas around cryptographically secured P2P networks have been discussed in the academic environment in different evolutionary stages, mostly in theoretical papers, since the 1980s. “Proof-of-Work” is the consensus mechanism that enables distributed control over the ledger. It is based on a combination of economic incentives and cryptography. Blockchain is a shared, trusted, public ledger of transactions, that everyone can inspect but which no single user controls. It is a distributed database that maintains a continuously growing list of transaction data records, cryptographically secured from tampering and revision.


2020 ◽  
pp. 2-13
Author(s):  
Vadim Kuchurov ◽  
◽  
Roman Maximov ◽  
Roman Sherstobitov ◽  
◽  
...  

Regulators charge to counter information security threats against the structural and functional characteristics of the information system to ensure the information security requirements. These requirements include information system structure and composition, information technologies and functioning characteristics, physical and logical, functional and technological interconnections between information system segments. They order false components of information system emulation as a basic step of protection, as well as information technologies hiding, information system configuration management and its switching to predetermined configuration that provides a protection. However that steps are not included into basic set and they protection aims are reached with compensative assets, formalizing and implementing inhibitory orders and set of organizational and technical measures on threat source. The purpose of research – to disclose and to state main ways of search of new technical solutions for structure masking of distributed information systems in cyberspace implementing masking traffic taking into account the requirements for the timeliness of information exchange. The method of research – operations research in the face of uncertainty, the application of the theory of Markov processes and Kolmogorov equation for solving the problem of increasing the efficiency of masking exchange. The result of research – finding the probabilistic and temporal characteristics of the functioning process of the data transmission network when applying technical solutions for information systems masking in cyberspace. The results obtained make it possible to explicitly implement protection measures aimed at forming persistent false stereotypes among violators about information systems and control processes implemented with their help.


2009 ◽  
Vol 133 (11) ◽  
pp. 1841-1849 ◽  
Author(s):  
Christel Daniel ◽  
Marcial García Rojo ◽  
Karima Bourquard ◽  
Dominique Henin ◽  
Thomas Schrader ◽  
...  

Abstract Context.—Integrating anatomic pathology information— text and images—into electronic health care records is a key challenge for enhancing clinical information exchange between anatomic pathologists and clinicians. The aim of the Integrating the Healthcare Enterprise (IHE) international initiative is precisely to ensure interoperability of clinical information systems by using existing widespread industry standards such as Digital Imaging and Communication in Medicine (DICOM) and Health Level Seven (HL7). Objective.—To define standard-based informatics transactions to integrate anatomic pathology information to the Healthcare Enterprise. Design.—We used the methodology of the IHE initiative. Working groups from IHE, HL7, and DICOM, with special interest in anatomic pathology, defined consensual technical solutions to provide end-users with improved access to consistent information across multiple information systems. Results.—The IHE anatomic pathology technical framework describes a first integration profile, “Anatomic Pathology Workflow,” dedicated to the diagnostic process including basic image acquisition and reporting solutions. This integration profile relies on 10 transactions based on HL7 or DICOM standards. A common specimen model was defined to consistently identify and describe specimens in both HL7 and DICOM transactions. Conclusion.—The IHE anatomic pathology working group has defined standard-based informatics transactions to support the basic diagnostic workflow in anatomic pathology laboratories. In further stages, the technical framework will be completed to manage whole-slide images and semantically rich structured reports in the diagnostic workflow and to integrate systems used for patient care and those used for research activities (such as tissue bank databases or tissue microarrayers).


Repositor ◽  
2020 ◽  
Vol 2 (12) ◽  
pp. 1647
Author(s):  
Hermansyah Adi Saputra ◽  
Galih Wasis Wicaksono ◽  
Yufis Azhar

AbstrakBelakangan ini hampir seluruh universitas yang ada di indonesia memiliki sistem informasi alumninya sendiri-sendiri. Sistem informasi alumni mampu memberikan informasi tentang kondisi alumninya setelah menyelesaikan masa perkuliahannya. Alumni merupakan aktor yang berperan penting dalam pendidikan. Saat ini jurusan Informatika Fakultas Teknik Universitas Muhammadiyah Malang telah memiliki website alumni. Permasalahannya belum adanya sistem yang memberikan alumni rekomendasi grup pada sistem, sehingga para alumni mampu saling bertukar informasi didalamnya. Dengan adanya data alumni dan juga di dukung dengan adanya tracer study, dapat di bentuk suatu rekomendasi grup dari data tracer study. K-medoid adalah metode pengelompokan data ke  dalam  sejumlah cluster  tanpa  adanya  struktur  hirarki antara satu dengan yang lainnya. Algoritma k-medoid memiliki nilai coefficient yang lebih tinggi di bandingkan dengan k-means dalam penelitian ini. Yang mana k-medoid mendapatkan nilai rata-rata Silhouette Score 0.7325888099 dalam pengujian dengan jumlah cluster 5 dan perulangan sebanyak 10 kali. Jika dibandingkan dengan k-means yang hanya memiliki nilai rata-rata Silhouette Score 0.6872873866.AbstractLately, Almost all universities in Indonesia have their own alumni information systems. The alumni information system is able to provide information about the condition of its alumni after collage graduation. Alumni are actors who play important role in education. Currently, the Department of Informatics, Faculty of Engineering, University of Muhammadiyah Malang has an alumni website.  The problem is the absence of system that gives alumni group recommendation on the system, so that alumni are able to exchange information in this website. With the alumni data and also supported by the existence of a tracer study, it can be formed as group recommendation from the data tracer study. Clustering is one of tools in data mining that aims to group object into clusters. K-medoid is a method of grouping data into a number of clusters without hierarchical structure from one another. The k-medoid algorithm has higher coefficient value compared to k-means in this study. This K-medoid gets an average value of Silhouette Score 0.7325888099 in testing with the number of clusters 5 and repetitions 10 times. When compared with k-means which only has an average value of Silhouette Score 0.6872873866.


2011 ◽  
pp. 1-27 ◽  
Author(s):  
Detlef Schoder ◽  
Kai Fischbach ◽  
Christian Schmitt

This chapter reviews core concepts of peer-to-peer (P2P) networking. It highlights the management of resources, such as bandwidth, storage, information, files, and processor cycles based on P2P networks. A model differentiating P2P infrastructures, P2P applications, and P2P communities is introduced. This model provides a better understanding of the different perspectives of P2P. Key technical and social challenges that still limit the potential of information systems based on P2P architectures are discussed.


Sign in / Sign up

Export Citation Format

Share Document