client system
Recently Published Documents


TOTAL DOCUMENTS

85
(FIVE YEARS 14)

H-INDEX

7
(FIVE YEARS 1)

2021 ◽  
Vol 2 (1) ◽  
pp. 1-8
Author(s):  
Lutvia Resta Setyawati ◽  
Anneke Sri Avhanti ◽  
Ariska Dian Novarianti

AbstractThe wealth of marine resources in Indonesia does not necessarily guarantee the welfare of the fishing community. Poor fishermen in rich seas are a negative stigma attached to our maritime world. This study aims to reveal the supporting factors of the vicious circle of poverty that ensnares fishermen in the country. The researcher used a descriptive qualitative approach and literature study to obtain an appropriate description of the data. The results of the study show five factors that support fishermen's poverty, including the patron-client system, the economic impact of destructive and overfishing, environmental damage, low infrastructure quality, and negative perceptions of the fishing profession.Keywords: the vicious circle of poverty, fishing community, archipelagic state.Kekayaan sumber daya kelautan di Indonesia secara faktual ternyata tidak serta-merta menjamin kesejahteraan hidup masyarakat nelayan. Nelayan miskin di laut yang kaya adalah stigma negatif yang melekat di dunia kemaritiman kita. Penelitian ini bertujuan untuk mengungkap faktor-faktor pendukung vicious circle of poverty yang menjerat para nelayan di tanah air. Peneliti menggunakan pendekatan kualitatif deskriptif dan studi literatur untuk mendapatkan penggambaran data yang sesuai. Hasil studi menunjukkan lima faktor yang mendukung kemiskinan nelayan diantaranya adalah sistem patron-klien, dampak ekonomis dari destructive and over fishing, kerusakan lingkungan, kualitas infrastruktur yang rendah, dan persepsi negatif mengenai profesi nelayan.Kata Kunci: lingkaran setan kemiskinan, masyarakat nelayan, negara kepulauan.


2021 ◽  
Vol 11 (2) ◽  
pp. 35-39
Author(s):  
S. Selvam

This paper presents a creativity data prefetching scheme on the loading servers in distributed file systems for cloud computing. The server will get and piggybacked the frequent data from the client system, after analyzing the fetched data is forward to the client machine from the server. To place this technique to work, the data about client nodes is piggybacked onto the real client I/O requests, and then forwarded to the relevant storage server. Next, dual prediction algorithms have been proposed to calculation future block access operations for directing what data should be fetched on storage servers in advance. Finally, the prefetching data can be pressed to the relevant client device from the storage server. Over a series of evaluation experiments with a group of application benchmarks, we have demonstrated that our presented initiative prefetching technique can benefit distributed file systems for cloud environments to achieve better I/O performance. In particular, configuration-limited client machines in the cloud are not answerable for predicting I/O access operations, which can certainly contribute to preferable system performance on them.


Micromachines ◽  
2021 ◽  
Vol 12 (8) ◽  
pp. 852
Author(s):  
Suyeon Jang ◽  
Hyun Woo Oh ◽  
Young Hyun Yoon ◽  
Dong Hyun Hwang ◽  
Won Sik Jeong ◽  
...  

Recent advances in artificial intelligence (AI) technology encourage the adoption of AI systems for various applications. In most deployments, AI-based computing systems adopt the architecture in which the central server processes most of the data. This characteristic makes the system use a high amount of network bandwidth and can cause security issues. In order to overcome these issues, a new AI model called federated learning was presented. Federated learning adopts an architecture in which the clients take care of data training and transmit only the trained result to the central server. As the data training from the client abstracts and reduces the original data, the system operates with reduced network resources and reinforced data security. A system with federated learning supports a variety of client systems. To build an AI system with resource-limited client systems, composing the client system with multiple embedded AI processors is valid. For realizing the system with this architecture, introducing a controller to arbitrate and utilize the AI processors becomes a stringent requirement. In this paper, we propose an embedded AI system for federated learning that can be composed flexibly with the AI core depending on the application. In order to realize the proposed system, we designed a controller for multiple AI cores and implemented it on a field-programmable gate array (FPGA). The operation of the designed controller was verified through image and speech applications, and the performance was verified through a simulator.


2020 ◽  
Vol 3 (1) ◽  
pp. 86-98
Author(s):  
Anak Agung Ngurah Agung Wira Bima Wikrama

The palace as a traditional cultural heritage of Indonesia experiences cultural tensionalong with the occurrence of modernity in Indonesia. Modernization has marginalized the role andfunction of the Palace as the center of traditional power. Conversely, efforts to build the existence ofthe Palace can be questioned about its relevance or merely cultural romance. For this reason, thisstudy examines three main problems. First, why does the Keraton preserve the Keraton Culture inIndonesia? Second, how are the forms of preservation of Keraton Culture in Indonesia? Third, whatare the implications of the Keraton Cultural Preservation in Indonesia? These three problems areexamined with three theories, namely the theory of social change, cultural adaptation, and geneticstructuralism. The research method used is qualitative research with three data collection techniques,namely observation, interviews, and document studies. Data were analyzed with descriptiveinterpretativetechniques through three stages, namely data reduction, data presentation, and drawingconclusions. The results show that the reasons underlying the preservation of the Keraton Culture in Indonesia include rebuilding the existence of the Palace, maintaining the status quo, structuraldifferentiation, and the charm of modern life. The forms of preservation of Keraton Culture include(1) passive preservation, namely the construction of the physical structure of Keratondan andmaintaining the attributes of royal identity; (2) active preservation, i.e. optimizing capital owned bythe Palace with specific patterns and specific goals in the structure of modern society; and (3)Keraton network preservation, namely strengthening collegial collective systems and networkexpansion. Implications of Keraton Cultural Preservation in social life include reformulation ofsocial relations and shifting the patron-client system. The implication in cultural life is in the form ofstrengthening Keratonsas cultural heritage and strengthening Keratonsas the center of culturaldevelopment.


2020 ◽  
Vol 3 (1) ◽  
pp. 5-10
Author(s):  
Ionuț Cătălin Dumitru ◽  
◽  
Mihai Togan ◽  

In classic PKI systems, users resorted to cryptographic devices like smartcard or electronic-token to perform the required cryptographic operations, therefore all cryptographic operations will be done in a safe environment. Although a widely-accepted and highly-efficient method, along with the evolution of technology, it is also desirable to simplify user experience with the applications and at the same time to reduce costs. Thus, there is the problem of cryptographic devices and passwords needing to be retained and secret. To overcome all these impediments, we introduce the concept of remote signing, a concept that will simplify the signature generation process, and also increase security to the whole process while lowering costs for equipment. Therefore, by the fact that the signature generation process will be delegated to a remote service, the possibility of generating errors due to the client system is minimized, the need for a cryptographic device for users is eliminated. At the same time, the entire computational effort is also delegated to the remote service, which means an increased computing speed, and by the fact that the cryptographic devices that generate the signature are located at distance, there is also the possibility of physical securing and limiting unauthorized access.


The use of “Asymmetric Cryptography” provides the way to avail the feature of non-repudiation, encryption of data and defining the user digital identity to map with the authenticating user in the Public Cloud. A security technique is to be provided for the data even before it is stored on the Cloud. The public key certificate can be transferred into key server for encrypting the data by other users or devices in the public cloud. By using OpenPGP standard (PGP)/GNU Privacy Guard (GnuPG), public key certificate and the private key certificate can be generated by the user in the client system itself. The client private key can never be moved out from the client system and users only responsibility is to decrypt their data like images. This methodology will be very much suitable for authenticating, transferring, accessing and storing the images in the Public Cloud. The computational cost for encrypting the whole image with public key will be huge and so the hybrid methodology is proposed with visual cryptography technique and Elliptic-Curve Diffie–Hellman (ECDH) methodology. This paper proposes secure transfer of secret image by using visual cryptography technique and thereby modifying any one of the visual shares into encrypted data with ECDH secret key and finally converted those two shares into base64 format. The proposed algorithm is implemented by using the Python language and their results are discussed with sample images.


2019 ◽  
Vol 8 (4) ◽  
pp. 10766-10774

In the digital world, maintaining information is much difficult. Without security measures and controls in place, data might be subjected to an attack. Now a day’s several attacks are evolved & Distributed Denial of Service (DDOS) is one of them. There are various categories of DDOS attack.SYN flood is addressed as one of the most dangerous attacks. In three way handshaking method a SYN packet is generated and a received ACK acknowledgement is provided to the corresponding. When the SYN packet is generated continuously from random sourcesis considered as flooding. And it’s known as SYN flood attacks. This paper is constructed with a proposed technique for the betterment of both the detection and defense techniques against it. The detection process is improved by a database added in the server for accepting random flooding for a limited time interval. And the defense algorithm is a developed design operated by scrolling the pending requests from database and checking the accessibility of the user and stop requesting otherwise. There are two parts of this research paper. The first one is to discuss extensively the various aspects of SYN Flood attack and developing the knowledge of this flooding attack mechanisms and the second one is to detect the SYN Flood attack and finding a better mitigation process through which we can reduce the loss of any information that generally happens by this deadly flooding. For saving server from crush it is important to mitigate this attack. So it may prove effective in home appliance servers like IoT, IoE that any of the fraud can't get access into the server for any harmful activity


Author(s):  
Э.Д. Алисултанова ◽  
Д.С. Бицалов

Данная статья направлена на формирование эффективной системы защиты информации. В настоящее время ввиду совершенствования информационных технологий все более актуальной становится проблема защиты информации, так как вместе с улучшением методов защиты информации, к сожалению, развиваются и методы утечки информации. В данной статье рассмотрена одна из актуальных систем защиты информации, система ViPNet Client. Программный комплекс ViPNet Client предназначен для защиты рабочих мест корпоративных пользователей. ViPNet Client надежно защищает от внешних и внутренних сетевых атак за счет фильтрации трафика. Кроме того, ПК ViPNet Client обеспечивает защищенную работу с корпоративными данными через зашифрованный канал, в том числе для удаленных пользователей. This article is aimed at the formation of an effective system of information security. Currently, in view of the improvement of information technology, the problem of information security remains more urgent, as together with the improvement of information security methods, information leakage methods are unfortunately developing. This article describes one of the current information security systems, ViPNet Client system. The ViPNet Client servage software package is designed to protect the workplaces of corporate users. ViPNet Client podaressis protects the cigar from external and internal network attacks by filtering the representation of the traffic. In addition, the ViPNet Glukharev Client PC provides secure nonadministrative work with corporate data shunning through an encrypted channel, including for remote eliminated users.


10.2196/14310 ◽  
2019 ◽  
Vol 7 (3) ◽  
pp. e14310 ◽  
Author(s):  
Youngbin Shin ◽  
Kyung Won Kim ◽  
Amy Junghyun Lee ◽  
Yu Sub Sung ◽  
Suah Ahn ◽  
...  

Background With the rapid increase in utilization of imaging endpoints in multicenter clinical trials, the amount of data and workflow complexity have also increased. A Clinical Trial Imaging Management System (CTIMS) is required to comprehensively support imaging processes in clinical trials. The US Food and Drug Administration (FDA) issued a guidance protocol in 2018 for appropriate use of medical imaging in accordance with many regulations including the Good Clinical Practice (GCP) guidelines. Existing research on CTIMS, however, has mainly focused on functions and structures of systems rather than regulation and compliance. Objective We aimed to develop a comprehensive CTIMS to meet the current regulatory guidelines and various required functions. We also aimed to perform computerized system validation focusing on the regulatory compliance of our CTIMS. Methods Key regulatory requirements of CTIMS were extracted thorough review of many related regulations and guidelines including International Conference on Harmonization-GCP E6, FDA 21 Code of Federal Regulations parts 11 and 820, Good Automated Manufacturing Practice, and Clinical Data Interchange Standards Consortium. The system architecture was designed in accordance with these regulations by a multidisciplinary team including radiologists, engineers, clinical trial specialists, and regulatory medicine professionals. Computerized system validation of the developed CTIMS was performed internally and externally. Results Our CTIMS (AiCRO) was developed based on a two-layer design composed of the server system and the client system, which is efficient at meeting the regulatory and functional requirements. The server system manages system security, data archive, backup, and audit trail. The client system provides various functions including deidentification, image transfer, image viewer, image quality control, and electronic record. Computerized system validation was performed internally using a V-model and externally by a global quality assurance company to demonstrate that AiCRO meets all regulatory and functional requirements. Conclusions We developed a Good Practice–compliant CTIMS—AiCRO system—to manage large amounts of image data and complexity of imaging management processes in clinical trials. Our CTIMS adopts and adheres to all regulatory and functional requirements and has been thoroughly validated.


Sign in / Sign up

Export Citation Format

Share Document