request message
Recently Published Documents


TOTAL DOCUMENTS

31
(FIVE YEARS 7)

H-INDEX

4
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Jitender Jakhar ◽  
Partha Sarathi Biswas ◽  
Mahima Kapoor ◽  
Amandeep Panghal ◽  
Amit Meena ◽  
...  

Aims: This study aimed to investigate how the psychological health of health care professionals (HCP) on COVID duty was different from those who were not directly in contact. Methodology: Of 473 (76%) randomly selected respondents (doctors and nurses) to a WhatsApp request message, 450 subjects’ data were finally analyzed. Result: The prevalence of stress, anxiety and depression among HCP was 33.8, 38.9 and 43.6%, respectively. Compared with nonexposed professionals, COVID-19-exposed professionals had roughly double the score of these morbidities (t = 6.3, p < 0.001; t = 6.9, p < 0.001; t = 6.0, p < 0.001). Most worry (71.11%) was about the health of their family, followed by themselves (35.55%). Conclusion: The level of exposure, feelings of uncertainty and fear of infection emerged in our study as possible risk factors for psychological morbidities among HCP.


2021 ◽  
Vol 13 (2) ◽  
pp. 407-413
Author(s):  
P. Nayak ◽  
R. S. Pippal

The security for Telecare Medicine Information Systems (TMIS) is extremely vital. In this context, numerous TMIS-based authentication schemes have been introduced, however different types of attacks and inefficiencies render these schemes inappropriate for this scenario. This paper investigates various TMIS-based authentication schemes present in the literature. It additionally compares these schemes based on computation cost and potential security attacks. Further, it also demonstrates that Zhian Zhu’s scheme is inaccurate as the server fails to approve and validate the login request message of a user in the authentication phase.


Symmetry ◽  
2020 ◽  
Vol 12 (3) ◽  
pp. 489 ◽  
Author(s):  
Hwi-Ho Lee ◽  
Jung-Hyok Kwon ◽  
Eui-Jik Kim

This paper presents a virtual private storage framework (VPSF) using Internet of Things (IoT) local networks. The VPSF uses the extra storage space of sensor devices in an IoT local network to store users’ private data, while guaranteeing expected network lifetime, by partitioning the storage space of a sensor device into data and system volumes and, if necessary, logically integrating the extra data volumes of the multiple sensor devices to virtually build a single storage space. When user data need to be stored, the VPSF gateway divides the original data into several blocks and selects the sensor devices in which the blocks will be stored based on their residual energy. The blocks are transmitted to the selected devices using the modified speedy block-wise transfer (BlockS) option of the constrained application protocol (CoAP), which reduces communication overhead by retransmitting lost blocks without a retransmission request message. To verify the feasibility of the VPSF, an experimental implementation was conducted using the open-source software libcoap. The results demonstrate that the VPSF is an energy-efficient solution for virtual private storage because it averages the residual energy amounts for sensor devices within an IoT local network and reduces their communication overhead.


Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 731 ◽  
Author(s):  
Guanghua Yan ◽  
Qiang Li ◽  
Dong Guo ◽  
Xiangyu Meng

As sensors become more prevalent in our lives, security issues have become a major concern. In the Advanced Persistent Threat (APT) attack, the sensor has also become an important role as a transmission medium. As a relatively weak link in the network transmission process, sensor networks often become the target of attackers. Due to the characteristics of low traffic, long attack time, diverse attack methods, and real-time evolution, existing detection methods have not been able to detect them comprehensively. Current research suggests that a suspicious domain name can be obtained by analyzing the domain name resolution (DNS) request to the target network in an APT attack. In past work based on DNS log analyses, most of the work would simply calculate the characteristics of the request message or the characteristics of the response message or the feature set of the request message plus the response message, and the relationship between the response message and the request message was not considered. This may leave out the detection of some APT attacks in which the DNS resolution process is incomplete. This paper proposes a new feature that represents the relationship between a DNS request and the response message, based on a deep learning method used to analyze the DNS request records. The algorithm performs threat assessment on the DNS behavior to be detected based on the calculated suspicious value. This paper uses the data of 4, 907, 147, 146 DNS request records (376, 605, 606 records after DNS Data Pre-processing) collected in a large campus network and uses simulation attack data to verify the validity and correctness of the system. The results of the experiments show that our method achieves an average accuracy of 97.6% in detecting suspicious DNS behavior, with the orange false positive (FP) at 2.3% and the recall at 96.8%. The proposed system can effectively detect the hidden and suspicious DNS behavior in APT.


2019 ◽  
Vol 54 (2) ◽  
pp. 261-281 ◽  
Author(s):  
Chi Pham ◽  
Felix Septianto

Purpose This paper aims to investigate how to improve the effectiveness of charitable advertising by matching emotional appeal (happy-faced vs sad-faced beneficiary) and message framing (recognition vs request) within advertising messages. Design/methodology/approach Two experiments examining real donation allocations were conducted. Study 1 established the “match-up” effect between advertising image and message. Study 2 replicated the findings of Study 1 as well as testing the mediating role of hope and sympathy. Findings The authors provide empirical evidence that consumers allocate a greater donation amount to a charity when they see an image of a sad-faced child combined with a request message (e.g. “please donate”), or an image of a happy-faced child combined with a recognition message (e.g. “thank you”). Notably, these effects are mediated by the emotions of hope and sympathy, respectively. Research limitations/implications This research highlights the importance of matching images of beneficiaries with the appropriate advertising copy. Depending on whether a charity seeks to position itself in a positive perspective to evoke hope, or alternatively, portray itself in relation to a sadder landscape that elicits sympathy, the respective choice of recognition or request messages can help boost donation outcomes. Practical implications Charities and non-profit organizations can develop more effective charitable advertising by purposively matching specific emotional appeals and message framings when designing advertisements. Originality/value The research illustrates a novel mechanism that shows when and how combining image and message can influence the effectiveness of charitable advertising.


2019 ◽  
Vol 16 (8) ◽  
pp. 3346-3350
Author(s):  
D. Usha Nandini ◽  
R. Sathyabama Krishna ◽  
M. Nithya ◽  
R. Pavithra

This paper presents intelligent method to collect safety information regarding the accident by means of Smart Black Box. When the information is needed regarding the accident that happened earlier, investigators seek for evidences non-systematically. The systematic approach makes use of an intelligent black box that analyzes and collects the information of neighbouring vehicles while driving. Initially, the vehicle that is responsible for an accident is identified. The colour of an image of the vehicle is converted into grayscale. The converted image is filtered using the bilateral filtering method. The algorithm used for detecting the edges of the license plate is canny edge detection algorithm. It is extracted and sent to the server which produces the stored video sequence in the created application. The functionality of the Internet of Things is used to receive the request message and respond to that message to the server via GSM respectively.


2016 ◽  
Vol 2 (2) ◽  
Author(s):  
Hari Antoni Musril

Jaringan komunikasi komputer didukung oleh protokol routing untuk mengirimkan paket data. Ada berbagai jenis protokol routing yang banyak digunakan, diantaranya Routing Information Protocol version 2 (RIPv2) dan Enhanced Interior Gateway Routing Protocol (EIGRP) yang masuk ke dalam dynamic routing protocol. RIPv2 menggunakan protokol distance vector, sedangkan EIGRP dikategorikan pada protokol hybrid. RIPv2 menggunakan request message untuk membangun hubungan dengan router tetangga, sedangkan EIGRP menggunakan hello packet.Tulisan ini membandingkan kedua protokol tersebut dari aspek daftar tabel routing, informasi mengenai protokol routing, kemampuan menghasilkan tabel topologi, kemampuan mengenali router tetangga (tabel neighbor), melihat konektivitas jaringan, dan memeriksa jalur yang dilewati oleh paket data. Hasilnya adalah EIGRP memiliki konvergensi yang lebih baik dibandingkan RIPv2. RIPv2 melakukan update tabel routing ke seluruh router, sedangkan EIGRP hanya pada router yang terkena dampak langsung dari perubahan topologi jaringan. EIGRP mampu menghasilkan tabel topologi dan tabel neighbor, sedangkan RIPv2 tidak.


2015 ◽  
Vol 14 (12) ◽  
pp. 6334-6342
Author(s):  
GARGI BHARDWAJ ◽  
UDAI SHANKAR

Integrating MANETs (Mobile Ad-hoc Networks) nodes to the Internet require either a connection to the Internet or they can connect to the Internet through the Internet gateways. For the second case if a node in a MANET has discover the gateway to connect to the fixed hosts in the Internet and it can be done either by broadcasting a gateway discovery request message initiated by nodes itself or by broadcasting periodic gateway advertisement messages from the gateways. End to end packet delay and throughput are strongly dependent on the time needed to discover the gateways.Nodes in a MANET use number of hops as metric to select a path to a gateway, if all the nodes select its nearest gateway to access the Internet then there may be situations when the network performance degrades because some nodes along the path have too many packets waiting in the queue.This paper presents a novel solution to access internet through mobile nodes in ad hoc network. Here the gateway replies with an advertisement message which is broadcasted to the whole network instead of sending a unicast reply to the requesting node. The traffic load taken into account along a path in addition with minimum hop count to select an efficient gateway. The AODV routing protocol has been used for routing in the MANET domain.A new strategy of gateway discovery was investigated and impact of new metric on the gateway selection in NS-2 was observed. Simulation results show that the proposed scheme outperforms over the existing scheme with high throughput and lower end to end delay.


Sign in / Sign up

Export Citation Format

Share Document