Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which in...
详细信息
ISBN:
(纸本)9781424451012
Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which interest them (e.g., virus attack). Certain factors which may be important remain unexplored. In addition, lack of tools and technologies directed to limited number of threats traced in healthcare system. Thus it introduces bias in threat analysis. This study explored the use of biological computational termed Genetic Algorithm (GAs) combined with Cox regression (CoRGA) in identifying a potential threat for healthcare system. The results show that variable described “misused of e-mail” is the major information security threats for healthcare system. Results were compared with manual analysis using the same data, and it is shows that GAs not just introducing new threats for healthcare system but it was similar with others threats proposed by previous researches.
Since after the historical moment of Malaysia Independence Day on the year of 1957, the government had been trying hard in order to find the most efficient methods in learning. However, it is hard to actually access a...
详细信息
Since after the historical moment of Malaysia Independence Day on the year of 1957, the government had been trying hard in order to find the most efficient methods in learning. However, it is hard to actually access and evaluate students whom will then be called an excellent student. It because in our realtime student who excellent is only excel in academic. This evaluation become a problem because it not balance in our real life interm of to get an excellent student in whole area in their involvement of curiculum and co-curiculum. To overcome this scenario, we proposed a method called Student Idol to evaluate student through three categories which are academic, co-curiculum and leadership. All the categories have their own merit point. Using this method, student will be evaluated more accurate compared to the previously. So, teacher can easily evaluate their student without having any emotion factor, relation factor and others. As conclustion this method will helps student evaluation more accurate and valid.
In this research,we present the development of Building Submission Checklist System (BuSCLI).The objective of developing BuSCLI is to simplify the management of submission of building plan approval through online syst...
详细信息
In this research,we present the development of Building Submission Checklist System (BuSCLI).The objective of developing BuSCLI is to simplify the management of submission of building plan approval through online system for the Local Authority (LA) or State Town and Country Planning in *** minimize human contacts thus provide fast,efficient,transparent and effective service to contractor,engineer and *** and web base method applied in this system with combination of PHP and MySQL as *** this system can facilitate user by computerized all the form accordance to the building categories,submission,endorsement or approval through online.
Modeling parasitic parameters of Through-Silicon-Via (TSV) structures is essential in exploring electrical characteristics such as delay and signal integrity (SI) of circuits and interconnections in three-dimensional ...
详细信息
Modeling parasitic parameters of Through-Silicon-Via (TSV) structures is essential in exploring electrical characteristics such as delay and signal integrity (SI) of circuits and interconnections in three-dimensional (3-D) integrated circuits (ICs). This paper presents a complete set of self-consistent equations including self and coupling terms for resistance, capacitance and inductance of various TSV structures. Further, a reduced-order electrical circuit model is proposed for isolated TSVs as well as bundled structures for delay and SI analysis, and extracted TSV parasitics are employed in Spectre simulations for performance evaluations. Critical issues in the performance modeling for design space exploration of 3-D ICs such as cross-talk induced switching pattern dependent delay variation and cross-talk on noise are discussed. The error in these metrics when using the proposed models as compared to a field solver is contained to a few percentage points.
Right now,in most of the countries,inside the people’s wallet,they probably have a couple of credit cards,an identification card,automatic machine teller cards(ATM card),and maybe a few other plastic *** realizing it...
详细信息
Right now,in most of the countries,inside the people’s wallet,they probably have a couple of credit cards,an identification card,automatic machine teller cards(ATM card),and maybe a few other plastic *** realizing it,these plastic cards have become a very important part of their *** smart card technology improves security and convenient but it is not used in a wide range in Middle East *** acceptance is vital for further development of any fresh technology and smart card technology as *** of the factors that can effect on the acceptance of smart card technology is users’*** goal of this study is to present a general overview of smart card technology and identify the smart card’s benefits,features and characteristics and moreover,the level of users’knowledge and awareness about smart card technology will be *** order to achieve this goal,a survey was conducted among the international students of University Technology Malaysia to measure their awareness of smart card technology.
In this paper, we propose to improve the SvS algorithm by skipping elements of the smaller set for reducing a search boundary. The boundary of skipped element is determined by boundaries of elements prior to and next ...
详细信息
In this paper, we propose to improve the SvS algorithm by skipping elements of the smaller set for reducing a search boundary. The boundary of skipped element is determined by boundaries of elements prior to and next to it. We perform experiments on uniformly distributed random datasets to compare our algorithm with the standard SvS. We use regression analysis to get an equation for determining an appropriate skipping number. Our results show that the skipping SvS algorithm using the equation obtained can reduce approximately 41% on the number of comparisons of the standard SvS algorithm.
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of...
详细信息
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of the modified signal. We propose a novel approach of substitution technique of audio steganography. Using genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
"Malware" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all busin...
详细信息
"Malware" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all businesses at risk, no matter how big or small. Malware creates unique challenges to higher learning institutions (HLI) in protecting their information assets. This is largely due to the fact that HLI information technology (IT) departments must balance between enabling a highly collaborative, non-restrictive environment and ensuring the confidentiality, integrity, and availability of data and computing resources. HLIs can proactively defend the network to reduce the risks associated with this threat by assessing the vulnerabilities and threats present in their networks and implementing appropriate multilayer security. A multilayer approach involves applying countermeasures at every layer of the computer network, from the perimeter routers and firewalls to users' personal computers in order to increase network security. The goal of this study is to propose a framework for network security protection against malware to increase the level of protection using non technical countermeasures.
Ambiguity is a major problem of software errors because much of the requirements specification is written in a natural language format. Therefore, it is hard to identify consistencies because this format is too ambigu...
详细信息
暂无评论