efficient communication
Recently Published Documents


TOTAL DOCUMENTS

848
(FIVE YEARS 272)

H-INDEX

28
(FIVE YEARS 5)

2022 ◽  
Vol 18 (1) ◽  
pp. 1-18
Author(s):  
Carson Labrado ◽  
Himanshu Thapliyal ◽  
Saraju P. Mohanty

Within vehicles, the Controller Area Network (CAN) allows efficient communication between the electronic control units (ECUs) responsible for controlling the various subsystems. The CAN protocol was not designed to include much support for secure communication. The fact that so many critical systems can be accessed through an insecure communication network presents a major security concern. Adding security features to CAN is difficult due to the limited resources available to the individual ECUs and the costs that would be associated with adding the necessary hardware to support any additional security operations without overly degrading the performance of standard communication. Replacing the protocol is another option, but it is subject to many of the same problems. The lack of security becomes even more concerning as vehicles continue to adopt smart features. Smart vehicles have a multitude of communication interfaces an attacker could exploit to gain access to the networks. In this work, we propose a security framework that is based on physically unclonable functions (PUFs) and lightweight cryptography (LWC). The framework does not require any modification to the standard CAN protocol while also minimizing the amount of additional message overhead required for its operation. The improvements in our proposed framework result in major reduction in the number of CAN frames that must be sent during operation. For a system with 20 ECUs, for example, our proposed framework only requires 6.5% of the number of CAN frames that is required by the existing approach to successfully authenticate every ECU.


2022 ◽  
Vol 14 (2) ◽  
pp. 926
Author(s):  
Tymon Zielinski ◽  
Izabela Kotynska-Zielinska ◽  
Carlos Garcia-Soto

In this paper, we discuss the importance of the efficient communication of science results to citizens across the world. In order for people to absorb information, we need to understand the principles and apply the best available means to facilitate the process of increasing global awareness of the changes. This explicitly applies to the verification of how we appeal to people with respect to various environmental issues and, hence, how we can modernize the educational approaches to challenge the global change. We state that, in order to follow the philosophy of sustainable development goals with respect to ocean issues, we need an attractive alternative to the existing areas of consumption. We also state that the ocean issues are at the core of any process aiming to secure sustainability. New methods and tools of education and scientific communication, especially those which are offered by non-formal approaches, are necessary, and we present here some of the activities of the EU4Ocean coalition as best practice examples.


2022 ◽  
Vol 1 (6) ◽  
pp. 135-148
Author(s):  
Rachmat Hidayat ◽  
Joko Marwoto ◽  
Lusia Hayati

All body functions depend on cell integrity. Therefore, understanding cell biology is intrinsically important for understanding disease. A vast amount of information reveals how the cell behaves like an organism with many social cells. At the heart of cell biology is cell communication—how messages originate and are transmitted, received, interpreted, and used by cells. This efficient communication between, and within the cell maintains the function of the cell and its specialization. Intercellular signals enable each cell to determine its position and specific role. Cells must demonstrate a "chemical preference" for other cells and the environment that surrounds them to maintain the integrity of the whole organism. When they no longer tolerate this preference, the conversation ends and the cell adapts (sometimes changes in function) or becomes vulnerable to isolation, injury, illness, or even death. This review explains the function of each component in the cell and its role in life.


SIASAT ◽  
2022 ◽  
Vol 7 (1) ◽  
pp. 13-27
Author(s):  
Akmala Hadita ◽  
Mulyaningsih

This study aims to develop a communication model based on local wisdom originating from Sundanese culture, namely Silih Simbeuh, which is carried out by bureaucrats to socialize their policies to the public. The method used is qualitative, with a survey approach – descriptive. Data were collected through interviews, observation, and documentation studies. 29 research informants were determined purposively. Data analysis was carried out through the stages of reduction, display, analysis, and concluding. The objects of research are three governors who actively use social media, namely Anis Baswedan (DKI Jakarta), Ridwan Kamil (West Java), and Ganjar Pranowo (Central Java). The results show that the use of social media can be an effective and efficient communication tool in disseminating policies, through increasing public participation. This is shown in the form of following social media accounts, comments, reposts, and other interactions. The results of other studies show that the communication model using social media based on the Silih Simbeuh concept has proven to be effective in minimizing potential conflicts between policymakers and citizens and between citizens. The research location is narrow, the respondents are limited, and the methods used do not allow for generalizations. Further research is needed with more comprehensive coverage of respondents and methods Silih Simbeuh's local wisdom values can minimize conflicts in the communication process between policymakers and the community


2022 ◽  
Vol 6 (2) ◽  
pp. 265
Author(s):  
Wishnu Agung Baroto

Email is an imperative method of communication that is changing the way people share their data and information. It provides effective and efficient communication, especially in business, convenience, and easy access and replication. Those electronic data should be considered by a fraud investigator to comprehend the investigation. Email can be divided into two parts: the head of the email and the email body. The head of the email is metadata that consists of unstructured data, and the body and its attachment consist of semi-structured data. The email data usually comes in large volumes and ranges of types. Therefore, a manual investigation of an email should be avoided. This paper uses the Design Science Research Methodology to discover the most profound framework in an email fraud investigation. Using email metadata and email body, this research performs a digital forensic framework: preparation, gathering, processing, and presentation, combines with social network analysis to be applicable in the investigation. The result shows that digital forensics process, network analysis, data visualization provides a more valuable and comprehensive insight into email analysis.


2022 ◽  
Author(s):  
Shayan Mookherjee

We study how the performance and utility of high-bandwidth, energy-efficient communication networks can be improved by enabling programmability and user-defined tunability in the optical front-ends using silicon photonics. Summary of a Project Outcomes report of research funded by the U.S. National Science Foundation under Project Number 1525090 (Year 1).


2022 ◽  
pp. 104-130
Author(s):  
Sudhakar Hallur ◽  
Roopa Kulkarni ◽  
Prashant P. Patavardhan ◽  
Vishweshkumar Aithal

A majority of the applications now go wireless involving IoT as a technology to communicate to their respective destination. IoT is considered as a future of internet. The internet of things integration and efficient communication of the patient health monitoring parameters is the need of the hour in this pandemic. This chapter discusses the three-layer architecture involving hardware communication protocols supporting a layer of healthcare services and applications. Also, the data-guarantee, security and integrity issues, threats risks, and solutions involving deployment of efficient privacy, control, integration methods to confront various prominent and erroneous data manipulation techniques, malicious, and a series of cyber-attacks are proposed. The deployment of various efficient privacy and security protocols in IoT networks is of extreme need to ensure the confidentiality, access-control, authentication, and integrity of the health data transferred and to guarantee the availability of the services to the user at any point of time.


2022 ◽  
Vol 75 (suppl 2) ◽  
Author(s):  
Laura Ferreira Cortes ◽  
Stela Maris de Mello Padoin ◽  
Jaqueline Arboit

ABSTRACT Objectives: to discuss the meanings attributed by professionals to the construction of the service network for women in situations of violence. Methods: Convergent Care Research developed with the application of a convergence group with 32 participants from the health, social assistance, or public security sectors, in Santa Maria, Rio Grande do Sul. The data was produced during ten meetings, based on the problematization methodology, and submitted to analysis of thematic content and interpreted with the referential of networks. Results: the construction of the network is an artisanal work carried out by people continuously, permeated by bonds, communication and partnerships between services and knowledge of work processes. Lashings require permanent movement. Final Considerations: building a network implies defining intertwining lines; form nodes that create cross-sector connections. There is a need to institutionalize processes through care continuity protocols, associated with an efficient communication system between sectors.


Sign in / Sign up

Export Citation Format

Share Document