scholarly journals A Master Station and Terminal Data Exchange Method Based on Symmetric and Asymmetric Algorithms

2021 ◽  
Author(s):  
Fan He ◽  
Zhengquan Ang ◽  
Guanglun Yang ◽  
Qingqin Fu ◽  
Ling Yi ◽  
...  

This paper analyzes the disadvantages of the traditional method of data security between the master station and the terminal, and proposes a new method of data exchange between the master station and the terminal. This method improves the security of data interaction. In the process of using it, symmetric algorithm and asymmetric algorithm are combined, involving security mechanisms such as signature, certificate, MAC and symmetric encryption, so as to establish a secure link between the master station and the terminal, so as to protect the communication security between them.

2012 ◽  
Vol 163 ◽  
pp. 133-137
Author(s):  
Ao Yu Chen ◽  
Xu Dong Pan ◽  
Guang Lin Wang

Traditional method of buoy gauge design is rather complicated, so an advanced method by building and solving fluid mechanics equations is proposed in this paper. The curve of the taper pipe inner surface is calculated, according to different buoy gravity and diameter. In order to examine the effect of this improved method, an experiment is carried out. Results show that linear property of the buoy gauge improved by new method is excellent.


2003 ◽  
Vol 9 (1_suppl) ◽  
pp. 48-50 ◽  
Author(s):  
P Soegner ◽  
Th Rettenbacher ◽  
A Smekal ◽  
D Zur Nedden

summary The Tyrolean telemedicine pilot project linked the University Clinic of Innsbruck and the district hospital in Reutte. Five medical specialties were investigated: teleradiology, telepathology, teledermatology, tele-ophthalmology and tele-oncology. A Tyrolean ‘four-column model of quality management in telemedicine’ was introduced to ensure a global view of the project and to avoid mistakes. In teleradiology, a 12-step workflow was developed, which described the medical responsibilities at each stage. We found that the defined teleradiology workflow and the technical equipment for data security and data exchange worked without problems in over 79% of a total of 424 cases. To ensure continuous quality assurance, the whole teleradiology workflow was ISO 9001:2000 certified.


2011 ◽  
Vol 418-420 ◽  
pp. 1804-1807
Author(s):  
Li Li ◽  
Zheng Hui Tan ◽  
Jia Wen Liu

Traditional method for measuring liquid level of absorption tower in wet flue gas desulfurization (WFGD) system is introduced in this paper, and it's found that measuring accuracy of the method exists in large deviation. A new method is proposed to measure liquid level of absorption tower for this situation. The local test results show that not only measurement result of new method is more close to the actual liquid level than traditional method, but also using new method can save operation cost and ensure the safety, stability, and economic operation of WFGD system.


Humaniora ◽  
2014 ◽  
Vol 5 (2) ◽  
pp. 1114
Author(s):  
Wishnoebroto Wishnoebroto

Flipping a classroom is not only recording classroom lesson into a video and bringing homework into the classroom. It is a whole new method with a lot better result compared to the traditional method. In western countries such as the US, flipping a classroom is already becoming a new method adopted by many different schools and universities. This paper tries to explore the possibility of flipping a classroom for learning foreign language at BINUS University by comparing it with the recent practices and findings in the western countries. After the analysis it can be concluded that this method can be applied at BINUS University but on several conditions such as the improvement of infrastructures, and the teacher’s awareness and understanding to optimize their understanding about flipped learning. 


2021 ◽  
pp. 1329-1338
Author(s):  
Jinfeng Lou ◽  
Weisheng Lu ◽  
Fan Xue

2013 ◽  
Vol 9 (2) ◽  
pp. 36-48
Author(s):  
Qutaiba Ali ◽  
Sahar Lazim

The incredible growth of FPGA capabilities in recent years and the new included features have made them more and more attractive for numerous embedded systems. There is however an important shortcoming concerning security of data and design. Data security implies the protection of the FPGA application in the sense that the data inside the circuit and the data transferred to/from the peripheral circuits during the communication are protected. This paper suggests a new method to support the security of any FPGA platform using network processor technology. Low cost IP2022 UBICOM network processor was used as a security shield in front of any FPGA device. It was supplied with the necessary security methods such as AES ciphering engine, SHA-1, HMAC and an embedded firewall to provide confidentiality, integrity, authenticity, and packets filtering features.


2013 ◽  
Vol 448-453 ◽  
pp. 2137-2142
Author(s):  
Xiao Jian Ye ◽  
Zhen Gang Duan ◽  
Zhuo Shen ◽  
Xiao Qin Lian ◽  
Xiao Li Zhang

This paper elaborates a method to realize the single phase full bridge inverter digital controller based on DSP TMS320F28027 and gives the design scheme of both its hardware and its software. In accordance with SPWM duty ratio parameter calculated with DSP algorithm, utilizing the EPWM module on DSP, it finally attains the inverting control from direct current signal to sine wave signal. Compared with traditional method, this new method improves the output waveform effectively and shows stable performance.


2000 ◽  
Vol 6 (1_suppl) ◽  
pp. 160-161 ◽  
Author(s):  
Peter Sögner ◽  
Klaus Goidinger ◽  
Dietmar Reiter ◽  
Alfons Stoeger ◽  
Dieter Zur Nedden

We assessed a data security system using biometric fingerprint techniques and smartcards to control access to a teleradiology system. Clinical cases were initially discussed between the referring physician and radiologist in Tyrol using a video-phone. Subsequent correspondence, including the transmission of images between the referring physician and the radiologist, was carried out by email using the security system to prevent unauthorized access to patient information. Seventy-eight teleradiology sessions were conducted using this data security system. Speed and stability of data exchange were unaffected by the additional security feature. The average log-on time to the system was 7.8 s. The average training time on how to use the system was 15 min. The radiologist was able to issue a final patient report using the system within 1.5 of the initial contact. The data security feature was user-friendly and did not hinder the normal teleradiology consultation.


Sign in / Sign up

Export Citation Format

Share Document