secure information
Recently Published Documents


TOTAL DOCUMENTS

670
(FIVE YEARS 193)

H-INDEX

31
(FIVE YEARS 3)

Author(s):  
Gloria Pérez-Garmendia ◽  
Abel Zapata-Dittrich ◽  
Jazmín Balderrabano-Briones ◽  
Pamela Hernández-Zurita

For organizations to have the growth that the global economy demands, they must bet on improvement alternatives that fully involve the entire system. One of these alternatives is to bet on the improvement of integral logistics, since it serves as a connection between production and markets. This research proposes the generation of a model for the improvement of the logistics system in a geological and petrographic laboratory, in the southeaster region of Mexico, with the sole purpose of adding value and providing alternative solutions to current or future problems that arise. It is also proposed to design an instrument that measures the current situation in logistics and provides a comprehensive scenario that serves as a starting point for improvement strategies. This instrument is created tailored to the company and introduces intangible aspects called factors so that with the help of the Likert scale they are transformed into qualitative values, and thus carefully visualize the study problem. The entire study is analysed and interpreted by the researcher, and with the help of the company's experts, it is considered to obtain reliable and secure information.


2021 ◽  
Vol 7 (4) ◽  
pp. 119-127
Author(s):  
A. Gerasimovich

In the current paper, some methods of information security protocols based on physical layer security are considered. It is proved that well known Shamir’s protocol can be applied to RSA cryptosystem but not to Rabin, Mac-Ellice and trellis based cryptosystems.The main stream of this paper is a description of key sharing protocol on constant public and noiseless channels (like Internet). It is shown that it is able to provide a high reliability and control of security in terms of Shannon’s information providing nothing-additional requirements to communication channels and without any cryptographic assumptions.


Author(s):  
Andrei Vladyko ◽  
Vasiliy Elagin ◽  
Anastasia Spirkina ◽  
Ammar Muthanna ◽  
Abdelhamied A. Ateya

As V2X technology develops, acute problems related to reliable and secure information exchange between network objects in real time appear. The article aims to solve the scientific problem of building a network architecture for reliable delivery of correct and uncompromised data within the V2X concept to improve the safety of road users, using blockchain technology and mobile edge computing (MEC). The authors present a formalized mathematical model of the system, taking into account the interconnection of objects and V2X information channels, and an energy-efficient algorithm of traffic offloading to the MEC server. The paper presents the results of application of blockchain technologies and mobile edge computing in the developed system, their description, evaluation of advantages and disadvantages of the implementation.


Buildings ◽  
2021 ◽  
Vol 11 (12) ◽  
pp. 608
Author(s):  
Ehsan Bakhtiarizadeh ◽  
Wajiha Mohsin Shahzad ◽  
Mani Poshdar ◽  
Malik Khalfan ◽  
James Olabode Bamidele Rotimi

New Zealand’s rising demand for new and affordable homes is driving innovative and effective methods for project delivery. Prefabrication or off-site construction is considered an innovative approach to project delivery that eliminates the limitations of traditional construction methods. However, the prefabrication industry struggles with several challenges, including poor coordination and low supply chain integration amongst its partner organisations. There has been previous literature on improving the prefabrication supply chain integration, but few studies about the role of technology in this sector. Therefore, this article provides intuitions into the applicability and benefits of advanced technologies, namely blockchain, for improving supply chain integration in the context of prefabrication in New Zealand. A questionnaire survey was used to identify the channels used for information exchange between clients and contractors. Moreover, the questionnaire ascertained the positive effects of blockchain on enhancing supply chain integration between the two partners. Blockchain has proven to be a secure information integration instrument that can improve the integration of the prefabrication supply chain by fostering collaboration between organisations.


Author(s):  
Shoumen Datta

Proposed SARS-CoV-2 surveillance tool using a mobile app for non-invasive monitoring of humans and animals. <p>Engineering a biomedical device as a low-cost, non-invasive, detection, and diagnostic platform for surveillance of infections in humans, and animals. The system embraces the IoT <i>“digital by design”</i> metaphor by incorporating elements of connectivity, data sharing and (secure) information arbitrage. Using an array of aptamers to bind viral targets may help in detection, diagnostics, and potentially prevention in case of SARS-CoV-2. The ADD tool may become part of a broader platform approach.</p>


Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2662
Author(s):  
Henry Vargas ◽  
Carlos Lozano-Garzon ◽  
Germán A. Montoya ◽  
Yezid Donoso

Internet of Things (IoT) networks have been integrated into industrial infrastructure schemes, positioning themselves as devices that communicate highly classified information for the most critical companies of world nations. Currently, and in order to look for alternatives to mitigate this risk, solutions based on Blockchain algorithms and Machine Learning techniques have been implemented separately with the aim of mitigating potential threats in IIoT networks. In this paper, we sought to integrate the previous solutions to create an integral protection mechanism for IoT device networks, which would allow the identification of threats, activate secure information transfer mechanisms, and it would be adapted to the computational capabilities of industrial IoT. The proposed solution achieved the proposed objectives and is presented as a viable mechanism for detecting and containing intruders in an IoT network. In some cases, it overcomes traditional detection mechanisms such as an IDS.


Webology ◽  
2021 ◽  
Vol 18 (05) ◽  
pp. 1158-1167
Author(s):  
Jagadeesan S ◽  
Mani C ◽  
Sambasivam S ◽  
Jaisankar P ◽  
Sasikala S

In the brand new technology of cutting-edge technological know-how and era is advanced day via way of means of day. The information confidentiality is danger everywhere in the global and it will increase rapidly. Steganography and cryptography are very vital strategies applied in facts safety to cowl and steady mystery messages in transmitting facts. In this we launch, put in force and check a completely sole technique that can be used as a steady and extraordinarily budget friendly technique {of facts|of knowledge|} interest in addition to information extracting (Jagadeesan, S., 2020). Some efficiency parameters are going to be thru an test received and in comparison with opportunity current approaches parameters to show the efficiency of the deliberate technique. Here we proposes a brand new method to hiding the information the use of steganography strategies primarily based totally on AES and RC5 set of rules cryptosystem. The word Steganography is the splendor of hiding mystery information in the back of the photos, videos, sound and textual content to cowl the name of the game communication. Cryptosystem is the system which given our technique extra perfection. The visible first-class of the quilt photo certainly nice, nobody can consider it how personal information are transmitted the use of this technique. This suggest technique and set of rules ability is exceedingly bendy than different posted set of rules. The AES and RC5 set of rules has no more difficulty and it looks as if thoroughly to hiding the personal information.


Author(s):  
Shoumen Datta

Proposed SARS-CoV-2 surveillance tool using a mobile app for non-invasive monitoring of humans and animals. <p>Engineering a biomedical device as a low-cost, non-invasive, detection, and diagnostic platform for surveillance of infections in humans, and animals. The system embraces the IoT <i>“digital by design”</i> metaphor by incorporating elements of connectivity, data sharing and (secure) information arbitrage. Using an array of aptamers to bind viral targets may help in detection, diagnostics, and potentially prevention in case of SARS-CoV-2. The ADD tool may become part of a broader platform approach.</p>


Author(s):  
Shoumen Datta

Proposed SARS-CoV-2 surveillance tool using a mobile app for non-invasive monitoring of humans and animals. <p>Engineering a biomedical device as a low-cost, non-invasive, detection, and diagnostic platform for surveillance of infections in humans, and animals. The system embraces the IoT <i>“digital by design”</i> metaphor by incorporating elements of connectivity, data sharing and (secure) information arbitrage. Using an array of aptamers to bind viral targets may help in detection, diagnostics, and potentially prevention in case of SARS-CoV-2. The ADD tool may become part of a broader platform approach.</p>


Sign in / Sign up

Export Citation Format

Share Document