The Model Design of the Security of Electronic Records under Digital Office Environment

2014 ◽  
Vol 1014 ◽  
pp. 391-394
Author(s):  
Da Peng Tong ◽  
Li Ren Zou ◽  
Zhi Guo Shi ◽  
Nan Huang

In this paper, to meet the security need of electronic records under the digital office environment, technological requirement of the security of electronic records is analyzed, and the security model of electronic records based on IPSec protocol is designed and tested under Windows 2000 Server system. As is showed in the test result, this model can secure the electronic records based on digital office environment.

2017 ◽  
Vol 28 (1) ◽  
pp. 31-46
Author(s):  
A.A. Adas A.A. Adas

This paper focuses on secure data communication between nodes in Ad-Hoc networks by employing IPSec (Internet Protocol Security). In wireless communication, Ad-Hoc network is a new paradigm since, which is used for highly sensitive and emergency operations. Ad-Hoc network is considered a number of mobile nodes that are connected through wireless interfaces and moves arbitrarily. Ensuring security is one of the main issues due to its infrastructure less solutions. This research aims for IPSec protocol that provides security for an Ad-Hoc networking in a various applications. IPSec incorporates security model, i.e. AES (Advanced Encryption Standard) into its framework. In this work, we consider the problem of incorporating security mechanisms to securing data communication for Ad-Hoc networks. We look at AODV routing protocol (Ad-Hoc On-Demand Distance Vector) in detail and it is used for secure routing. Simulation of IPSec protocol is simulated using NS-3 simulator. Results from NS-3 simulator is compared with AH, ESP, and AES in terms of Quality of Service parameters throughput, average processing time and average end-to-end delay.


Author(s):  
Dr.M. Ramabai ◽  
◽  
J.V. Prashanthi ◽  
P.Monika Raju ◽  
A.V.L Prasuna ◽  
...  

2013 ◽  
Vol 442 ◽  
pp. 291-297
Author(s):  
Jun Hua Yu ◽  
Li Jia Xu ◽  
Ke Fan Ren ◽  
Wei Peng Zhang ◽  
Zhi Gang Lu ◽  
...  

This Paper designs a mechanical device for the manipulator of the watermelon picking machine against the low mechanical degree of watermelon picking machine. The mechanical device utilizes a mechanical arm to drive the end effector to run and the end effector is responsible for clamping and shearing watermelon vines, which avoids vine disturbance and sorts out vines to be easily cut down through the process design of clamping, promoting, and re-shearing. In addition, this Paper applies Pro/E modeling, finite element analysis, and simulation analysis to complete the 3D model design of the mechanical device and transforms the 3D model into 2D drawings in Auto CAD to complete the manufacturing and assembly of the manipulator, and the test result verifies the mechanical device may realize the reliable picking of watermelons.


2020 ◽  
Vol 2020 ◽  
pp. 1-13
Author(s):  
Daegeon Kim ◽  
Do Hyung Gu ◽  
Huy Kang Kim

National disasters can threaten national security and require several organizations to integrate the functionalities to correspond to the event. Many countries are constructing a nationwide mobile communication network infrastructure to share information and promptly communicate with corresponding organizations. Public Safety Long-Term Evolution (PS-LTE) is a communication mechanism adopted in many countries to achieve such a purpose. Organizations can increase the efficiency of public protection and disaster relief (PPDR) operations by securely connecting the services run on their legacy networks to the PS-LTE infrastructure. This environment allows the organizations to continue facilitating the information and system functionalities provided by the legacy network. The vulnerabilities in the environment, which differ from commercial LTE, need to be resolved to connect the network securely. In this study, we propose a security model design framework to derive the system architecture and the security requirements targeting the restricted environment applied by certain technologies for a particular purpose. After analyzing the PPDR operation environment’s characteristics under the PS-LTE infrastructure, we applied the framework to derive the security model for organizations using PPDR services operated in their legacy networks through this infrastructure. Although the proposed security model design framework is applied to the specific circumstance in this research, it can be generally adopted for the application environment.


1972 ◽  
Vol 15 (4) ◽  
pp. 852-860 ◽  
Author(s):  
Zoe Zehel ◽  
Ralph L. Shelton ◽  
William B. Arndt ◽  
Virginia Wright ◽  
Mary Elbert

Fourteen children who misarticulated some phones of the /s/ phoneme were tape recorded articulating several lists of items involving /s/. The lists included the Mc-Donald Deep Test for /s/, three lists similar to McDonald’s but altered in broad context, and an /s/ sound production task. Scores from lists were correlated, compared for differences in means, or both. Item sets determined by immediate context were also compared for differences between means. All lists were found to be significantly correlated. The comparison of means indicated that both broad and immediate context were related to test result. The estimated “omega square” statistic was used to evaluate the percentage of test score variance attributable to context.


2005 ◽  
Vol 36 (6) ◽  
pp. 57
Author(s):  
CHRISTINE KILGORE
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document