876 resultados para bigdata, data stream processing, dsp, apache storm, cyber security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Es vol proporcionar una solució en el camp de la sanitat perquè els metges puguin gestionar els historials mèdics dels seus pacients de forma remota i segura, i perquè els pacients puguin consultar la seva història mèdica també remotament i amb total seguretat en qualsevol moment i ubicació.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A prospective study was undertaken to determine prognostic markers for patients with obstructive jaundice. Along with routine liver function tests, antipyrine clearance was determined in 20 patients. Four patients died after basal investigations. Five patients underwent definitive surgery. The remaining 11 patients were subjected to percutaneous transhepatic biliary decompression. Four patients died during the drainage period, while surgery was carried out for seven patients within 1-3 weeks of drainage. Of 20 patients, only six patients survived. Basal liver function tests were comparable in survivors and nonsurvivors. Discriminant analysis of the basal data revealed that plasma bilirubin, proteins and antipyrine half-life taken together had a strong association with mortality. A mathematical equation was derived using these variables and a score was computed for each patient. It was observed that a score value greater than or equal to 0.84 indicated survival. Omission of antipyrine half-life from the data, however, resulted in prediction of false security in 55% of patients. This study highlights the importance of addition of antipyrine elimination test to the routine liver function tests for precise identification of high risk patients.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cognitive radio networks (CRN) sense spectrum occupancy and manage themselves to operate in unused bands without disturbing licensed users. The detection capability of a radio system can be enhanced if the sensing process is performed jointly by a group of nodes so that the effects of wireless fading and shadowing can be minimized. However, taking a collaborative approach poses new security threats to the system as nodes can report false sensing data to force a wrong decision. Providing security to the sensing process is also complex, as it usually involves introducing limitations to the CRN applications. The most common limitation is the need for a static trusted node that is able to authenticate and merge the reports of all CRN nodes. This paper overcomes this limitation by presenting a protocol that is suitable for fully distributed scenarios, where there is no static trusted node.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present a polarimetric-based optical encoder for image encryption and verification. A system for generating random polarized vector keys based on a Mach-Zehnder configuration combined with translucent liquid crystal displays in each path of the interferometer is developed. Polarization information of the encrypted signal is retrieved by taking advantage of the information provided by the Stokes parameters. Moreover, photon-counting model is used in the encryption process which provides data sparseness and nonlinear transformation to enhance security. An authorized user with access to the polarization keys and the optical design variables can retrieve and validate the photon-counting plain-text. Optical experimental results demonstrate the feasibility of the encryption method.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Slides on presentations on the following topics: 2.1 Privacy and Security Legal overview, 2.2 Creative Commons open source, open movements 2.3 Crime online, Cyber security 2.4 Freedom of Speech and Defamation

Relevância:

100.00% 100.00%

Publicador:

Resumo:

What is cyber security?

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Monday 12th May Building 34 Room 3001, 12.00-13.45 Su & Rikki Presenting: Groups: E, F, G, H Marking Groups: I, J, K, L Schedule and Topics 12.00-12.05: Introduction and protocol for the session 12.05-12.25 Group E: Creative commons, open source, open movements 12.25-12.45 Group F: Trolling, Banter, Cyber Hate, Online Bullying 12.45-13.05 Group G: Personal Privacy and Security 13.05-13.25 Group H: Crime online; cyber security 13.25-13.45: Wash-up: feedback session for presentation groups

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La presente investigación tiene como objetivo analizar la incidencia de las agresiones cibernéticas en el desarrollo informático de las Fuerzas Armadas de Estados Unidos. Los diferentes estudios que se han realizado sobre el ciberespacio se han enfocado en el papel del individuo como actor principal y se ha dejado de lado las repercusiones que éste ha tenido para el Estado, como un nuevo eje de amenazas. Teniendo en cuenta lo anterior, esta investigación demostrará a partir del concepto de securitización, que se busca priorizar la “ciberseguridad” dentro de la agenda del gobierno estadounidense. Al ser este un estudio que aborda experiencias concretas durante un periodo de tiempo de más de 10 años, el diseño metodológico de la investigación será longitudinal, ya que abarcará estudios, artículos, textos y resoluciones que se han realizado desde 2003 hasta la actualidad.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador: