Rancangan Sistem Pengingat Laporan Iranian Optical Distribution Purpose (ODP)

2019 ◽  
Vol 7 (4) ◽  
pp. 225
Author(s):  
Made Dimas Dwi Sutanegara ◽  
Cokorda Rai Adi Pramartha

PT. Telkom Indonesia is a State-Owned Enterprise (BUMN) that provides the largest telecommunications and network services in Indonesia. Data Access Management (DAMAN) is one of the divisions whose task is to update SISKA data, purify network data, and generate Iranian Optical Distribution Purpose (ODP). ODP functions as a protection or place for fiber optic cables at each Telkom pole. ODP can be viewed through the starclik website, for ODP that is not visible on the platform it could be because full ODP or ODP data is not correct on the server, due to the possibility that the field staff did not report the latest data to the division. So that it requires an ODP reporting reminder system to reduce errors that do not arise from ODP.

Author(s):  
S. A. Ostanin ◽  
M. D. Zhumadilov

The purpose and composition of the radio-photon components of the fiber-optic distribution system of reference signals of the decimeter wavelength range are described. The principle of the components of the fiber-optic distribution system of reference signals is described. The possibility of creating radio-photon components with improved technical characteristics in comparison with the closest foreign functional analogues has been proved. High technical characteristics are achieved by the original design and parametric compensation of the phase delay of the signal.


2019 ◽  
Author(s):  
Xiaochen Zheng ◽  
Shengjing Sun ◽  
Raghava Rao Mukkamala ◽  
Ravi Vatrapu ◽  
Joaquín Ordieres-Meré

BACKGROUND Huge amounts of health-related data are generated every moment with the rapid development of Internet of Things (IoT) and wearable technologies. These big health data contain great value and can bring benefit to all stakeholders in the health care ecosystem. Currently, most of these data are siloed and fragmented in different health care systems or public and private databases. It prevents the fulfillment of intelligent health care inspired by these big data. Security and privacy concerns and the lack of ensured authenticity trails of data bring even more obstacles to health data sharing. With a decentralized and consensus-driven nature, distributed ledger technologies (DLTs) provide reliable solutions such as blockchain, Ethereum, and IOTA Tangle to facilitate the health care data sharing. OBJECTIVE This study aimed to develop a health-related data sharing system by integrating IoT and DLT to enable secure, fee-less, tamper-resistant, highly-scalable, and granularly-controllable health data exchange, as well as build a prototype and conduct experiments to verify the feasibility of the proposed solution. METHODS The health-related data are generated by 2 types of IoT devices: wearable devices and stationary air quality sensors. The data sharing mechanism is enabled by IOTA’s distributed ledger, the Tangle, which is a directed acyclic graph. Masked Authenticated Messaging (MAM) is adopted to facilitate data communications among different parties. Merkle Hash Tree is used for data encryption and verification. RESULTS A prototype system was built according to the proposed solution. It uses a smartwatch and multiple air sensors as the sensing layer; a smartphone and a single-board computer (Raspberry Pi) as the gateway; and a local server for data publishing. The prototype was applied to the remote diagnosis of tremor disease. The results proved that the solution could enable costless data integrity and flexible access management during data sharing. CONCLUSIONS DLT integrated with IoT technologies could greatly improve the health-related data sharing. The proposed solution based on IOTA Tangle and MAM could overcome many challenges faced by other traditional blockchain-based solutions in terms of cost, efficiency, scalability, and flexibility in data access management. This study also showed the possibility of fully decentralized health data sharing by replacing the local server with edge computing devices.


2018 ◽  
Vol 6 (1) ◽  
pp. 23
Author(s):  
Pastima Simanjuntak

Usda Seroja Batam is one of the many companies that use computer network facilities. PT Usda Seroja Batam is in dire need of adequate network facilities to support two-way communication, namely employees with employees and employees with the company so as to create a good work environment to support all company activities. With the availability of a good computer network, data access speed is necessary. In accessing a data user or user wants fast access, but access speed is often constrained by the busy computer network used by all users or users in the company. The purpose of this research is to give perception how the use of LAN network at Usda Seroja Batam. The research method uses descriptive analysis that will obtain results from questionnaires that will be distributed to employees or network users in the company. From the results of descriptive analysis on the network, it will provide valuable information about the condition of a computer network


Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1000
Author(s):  
Yong Zhu ◽  
Chao Huang ◽  
Zhihui Hu ◽  
Abdullah Al-Dhelaan ◽  
Mohammed Al-Dhelaan

In the post-cloud era, edge computing is a new computing paradigm with data processed at the edge of the network, which can process the data close to the end-user in real time and offload the cloud task intelligently. Meanwhile, the decentralization, tamper-proof and anonymity of blockchain technology can provide a new trusted computing environment for edge computing. However, it does raise considerable concerns of security, privacy, fault-tolerance and so on. For example, identity authentication and access control rely on third parties, heterogeneous devices and different vendors in IoT, leading to security and privacy risks, etc. How to combine the advantages of the two has become the highlight of academic research, especially the issue of secure resource management. Comprehensive security and privacy involve all aspects of platform, data, application and access control. In. this paper, the architecture and behavior of an Access Management System (AMS) in a proof of concept (PoC) prototype are proposed with a Color Petri Net (CPN) model. The two domains of blockchain and edge computing are organically connected by interfaces and interactions. The simulation of operation, activity and role association proves the feasibility and effectiveness of the AMS. The instances of platform business access control, data access control, database services, IOT hub service are run on Advantech WISE-PaaS through User Account and Authentication (UAA). Finally, fine-grained and distributed access control can be realized with the help of a blockchain attribute. Namely, smart contracts are used to register, broadcast, and revoke access authorization, as well as to create specific transactions to define access control policies.


2020 ◽  
Vol 2 (1-2) ◽  
pp. 66-77 ◽  
Author(s):  
Christopher Brewster ◽  
Barry Nouwt ◽  
Stephan Raaijmakers ◽  
Jack Verhoosel

This paper focuses on fine-grained, secure access to FAIR data, for which we propose ontology-based data access policies. These policies take into account both the FAIR aspects of the data relevant to access (such as provenance and licence), expressed as metadata, and additional metadata describing users. With this tripartite approach (data, associated metadata expressing FAIR information, and additional metadata about users), secure and controlled access to object data can be obtained. This yields a security dimension to the “A” (accessible) in FAIR, which is clearly needed in domains like security and intelligence. These domains need data to be shared under tight controls, with widely varying individual access rights. In this paper, we propose an approach called Ontology-Based Access Control (OBAC), which utilizes concepts and relations from a data set's domain ontology. We argue that ontology-based access policies contribute to data reusability and can be reconciled with privacy-aware data access policies. We illustrate our OBAC approach through a proof-of-concept and propose that OBAC to be adopted as a best practice for access management of FAIR data.


Author(s):  
Arulananth T S ◽  
Baskar M ◽  
Anbarasu V ◽  
Thiyagarajan R ◽  
Rajendran T ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document