Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 1.040
Filtrar
Más filtros

Intervalo de año de publicación
1.
J Med Internet Res ; 22(4): e13188, 2020 04 21.
Artículo en Inglés | MEDLINE | ID: mdl-32314968

RESUMEN

BACKGROUND: A large quantity of data is collected during the delivery of cancer care. However, once collected, these data are difficult for health professionals to access to support clinical decision making and performance review. There is a need for innovative tools that make clinical data more accessible to support health professionals in these activities. One approach for providing health professionals with access to clinical data is to create the infrastructure and interface for a clinical dashboard to make data accessible in a timely and relevant manner. OBJECTIVE: This study aimed to develop and evaluate 2 prototype dashboards for displaying data on the identification and management of lymphedema. METHODS: The study used a co-design framework to develop 2 prototype dashboards for use by health professionals delivering breast cancer care. The key feature of these dashboards was an approach for visualizing lymphedema patient cohort and individual patient data. This project began with 2 focus group sessions conducted with members of a breast cancer multidisciplinary team (n=33) and a breast cancer consumer (n=1) to establish clinically relevant and appropriate data for presentation and the visualization requirements for a dashboard. A series of fortnightly meetings over 6 months with an Advisory Committee (n=10) occurred to inform and refine the development of a static mock-up dashboard. This mock-up was then presented to representatives of the multidisciplinary team (n=3) to get preliminary feedback about the design and use of such dashboards. Feedback from these presentations was reviewed and used to inform the development of the interactive prototypes. A structured evaluation was conducted on the prototypes, using Think Aloud Protocol and semistructured interviews with representatives of the multidisciplinary team (n=5). RESULTS: Lymphedema was selected as a clinically relevant area for the prototype dashboards. A qualitative evaluation is reported for 5 health professionals. These participants were selected from 3 specialties: surgery (n=1), radiation oncology (n=2), and occupational therapy (n=2). Participants were able to complete the majority of tasks on the dashboard. Semistructured interview themes were categorized into engagement or enthusiasm for the dashboard, user experience, and data quality and completeness. CONCLUSIONS: Findings from this study constitute the first report of a co-design process for creating a lymphedema dashboard for breast cancer health professionals. Health professionals are interested in the use of data visualization tools to make routinely collected clinical data more accessible. To be used effectively, dashboards need to be reliable and sourced from accurate and comprehensive data sets. While the co-design process used to develop the visualization tool proved effective for designing an individual patient dashboard, the complexity and accessibility of the data required for a cohort dashboard remained a challenge.


Asunto(s)
Neoplasias de la Mama/complicaciones , Redes de Comunicación de Computadores/normas , Presentación de Datos/normas , Linfedema/etiología , Neoplasias de la Mama/patología , Femenino , Grupos Focales , Humanos , Proyectos de Investigación
2.
BMC Med ; 17(1): 68, 2019 03 27.
Artículo en Inglés | MEDLINE | ID: mdl-30914045

RESUMEN

Blockchain is a shared distributed digital ledger technology that can better facilitate data management, provenance and security, and has the potential to transform healthcare. Importantly, blockchain represents a data architecture, whose application goes far beyond Bitcoin - the cryptocurrency that relies on blockchain and has popularized the technology. In the health sector, blockchain is being aggressively explored by various stakeholders to optimize business processes, lower costs, improve patient outcomes, enhance compliance, and enable better use of healthcare-related data. However, critical in assessing whether blockchain can fulfill the hype of a technology characterized as 'revolutionary' and 'disruptive', is the need to ensure that blockchain design elements consider actual healthcare needs from the diverse perspectives of consumers, patients, providers, and regulators. In addition, answering the real needs of healthcare stakeholders, blockchain approaches must also be responsive to the unique challenges faced in healthcare compared to other sectors of the economy. In this sense, ensuring that a health blockchain is 'fit-for-purpose' is pivotal. This concept forms the basis for this article, where we share views from a multidisciplinary group of practitioners at the forefront of blockchain conceptualization, development, and deployment.


Asunto(s)
Tecnología Biomédica , Redes de Comunicación de Computadores , Atención a la Salud/tendencias , Sistemas de Información Administrativa , Informática Médica , Tecnología Biomédica/métodos , Tecnología Biomédica/organización & administración , Tecnología Biomédica/tendencias , Redes de Comunicación de Computadores/organización & administración , Redes de Comunicación de Computadores/normas , Redes de Comunicación de Computadores/provisión & distribución , Redes de Comunicación de Computadores/tendencias , Data Warehousing/métodos , Data Warehousing/tendencias , Atención a la Salud/métodos , Atención a la Salud/organización & administración , Procesamiento Automatizado de Datos/métodos , Procesamiento Automatizado de Datos/organización & administración , Procesamiento Automatizado de Datos/tendencias , Utilización de Equipos y Suministros/organización & administración , Utilización de Equipos y Suministros/tendencias , Ensayos Analíticos de Alto Rendimiento/normas , Humanos , Sistemas de Información Administrativa/normas , Sistemas de Información Administrativa/tendencias , Informática Médica/métodos , Informática Médica/organización & administración , Informática Médica/tendencias , Registros Médicos/normas
3.
J Med Internet Res ; 21(6): e13665, 2019 06 14.
Artículo en Inglés | MEDLINE | ID: mdl-31199293

RESUMEN

BACKGROUND: Distributed ledger technology (DLT) holds great potential to improve health information exchange. However, the immutable and transparent character of this technology may conflict with data privacy regulations and data processing best practices. OBJECTIVE: The aim of this paper is to develop a proof-of-concept system for immutable, interoperable, and General Data Protection Regulation (GDPR)-compliant exchange of blood glucose data. METHODS: Given that there is no ideal design for a DLT-based patient-provider data exchange solution, we proposed two different variations for our proof-of-concept system. One design was based purely on the public IOTA distributed ledger (a directed acyclic graph-based DLT) and the second used the same public IOTA ledger in combination with a private InterPlanetary File System (IPFS) cluster. Both designs were assessed according to (1) data reversal risk, (2) data linkability risks, (3) processing time, (4) file size compatibility, and (5) overall system complexity. RESULTS: The public IOTA design slightly increased the risk of personal data linkability, had an overall low processing time (requiring mean 6.1, SD 1.9 seconds to upload one blood glucose data sample into the DLT), and was relatively simple to implement. The combination of the public IOTA with a private IPFS cluster minimized both reversal and linkability risks, allowed for the exchange of large files (3 months of blood glucose data were uploaded into the DLT in mean 38.1, SD 13.4 seconds), but involved a relatively higher setup complexity. CONCLUSIONS: For the specific use case of blood glucose explored in this study, both designs presented a suitable performance in enabling the interoperable exchange of data between patients and providers. Additionally, both systems were designed considering the latest guidelines on personal data processing, thereby maximizing the alignment with recent GDPR requirements. For future works, these results suggest that the conflict between DLT and data privacy regulations can be addressed if careful considerations are made regarding the use case and the design of the data exchange system.


Asunto(s)
Glucemia/análisis , Glucemia/metabolismo , Redes de Comunicación de Computadores/normas , Intercambio de Información en Salud/normas , Prueba de Estudio Conceptual , Análisis de Datos , Humanos
4.
J Med Syst ; 43(11): 324, 2019 Oct 16.
Artículo en Inglés | MEDLINE | ID: mdl-31620895

RESUMEN

Real-time and ubiquitous patient monitoring demands the use of wireless data acquisition through resource constrained medical sensors, mostly configured with No-input No-output (NiNo) capabilities. Bluetooth is one of the most popular and widely adopted means of communicating this sensed information to a mobile terminal. However, over simplified implementations of Bluetooth low energy (BLE) protocol in eHealth sector is susceptible to several wireless attacks, in particular the Man-in-the-Middle (MITM) attack. The issue arises due to a lack of mutual authentication and integrity protection between the communicating devices, which may lead to compromise of confidentiality, availability and even the integrity of this safety-critical information. This research paper presents a novel framework named MARC to detect, analyze, and mitigate Bluetooth security flaws while focusing upon MITM attack against NiNo devices. For this purpose, a comprehensive solution has been proposed, which can detect MITM signatures based upon four novel anomaly detection metrics: analyzing Malicious scan requests, Advertisement intervals, RSSI levels, and Cloned node addresses. The proposed solution has been evaluated through practical implementation and demonstration of different attack scenarios, which show promising results concerning accurate and efficient detection of MITM attacks.


Asunto(s)
Redes de Comunicación de Computadores/organización & administración , Seguridad Computacional/normas , Telemedicina/organización & administración , Tecnología Inalámbrica/organización & administración , Redes de Comunicación de Computadores/normas , Confidencialidad/normas , Humanos , Telemedicina/normas , Tecnología Inalámbrica/normas
5.
Sensors (Basel) ; 17(11)2017 Nov 17.
Artículo en Inglés | MEDLINE | ID: mdl-29149045

RESUMEN

As the number of elderly persons with chronic illnesses increases, a new public infrastructure for their care is becoming increasingly necessary. In particular, technologies that can monitoring bio-signals in real-time have been receiving significant attention. Currently, most healthcare monitoring services are implemented by wireless carrier through centralized servers. These services are vulnerable to data concentration because all data are sent to a remote server. To solve these problems, we propose self-organizing P2P middleware for healthcare monitoring that enables a real-time multi bio-signal streaming without any central server by connecting the caregiver and care recipient. To verify the performance of the proposed middleware, we evaluated the monitoring service matching time based on a monitoring request. We also confirmed that it is possible to provide an effective monitoring service by evaluating the connectivity between Peer-to-Peer and average jitter.


Asunto(s)
Redes de Comunicación de Computadores/normas , Atención a la Salud/métodos , Cuidadores , Computadores , Humanos
6.
J Biomed Inform ; 59: 308-15, 2016 Feb.
Artículo en Inglés | MEDLINE | ID: mdl-26732996

RESUMEN

OBJECTIVE: To introduce and evaluate a method that uses electronic medical record (EMR) data to measure the effects of computer system downtime on clinical processes associated with pathology testing and results reporting. MATERIALS AND METHODS: A matched case-control design was used to examine the effects of five downtime events over 11-months, ranging from 5 to 300min. Four indicator tests representing different laboratory workflows were selected to measure delays and errors: potassium, haemoglobon, troponin and activated partial thromboplastin time. Tests exposed to a downtime were matched to tests during unaffected control periods by test type, time of day and day of week. Measures included clinician read time (CRT), laboratory turnaround time (LTAT), and rates of missed reads, futile searches, duplicate orders, and missing test results. RESULTS: The effects of downtime varied with the type of IT problem. When clinicians could not logon to a results reporting system for 17-min, the CRT for potassium and haemoglobon tests was five (10.3 vs. 2.0days) and six times (13.4 vs. 2.1days) longer than control (p=0.01-0.04; p=0.0001-0.003). Clinician follow-up of tests was also delayed by another downtime involving a power outage with a small effect. In contrast, laboratory processing of troponin tests was unaffected by network services and routing problems. Errors including missed reads, futile searches, duplicate orders and missing test results could not be examined because the sample size of affected tests was not sufficient for statistical testing. CONCLUSION: This study demonstrates the feasibility of using routinely collected EMR data with a matched case-control design to measure the effects of downtime on clinical processes. Even brief system downtimes may impact patient care. The methodology has potential to be applied to other clinical processes with established workflows where tasks are pre-defined such as medications management.


Asunto(s)
Redes de Comunicación de Computadores/normas , Falla de Equipo/estadística & datos numéricos , Informática Médica/normas , Seguridad del Paciente , Estudios de Casos y Controles , Humanos , Laboratorios de Hospital , Flujo de Trabajo
7.
Sensors (Basel) ; 16(1)2016 Jan 06.
Artículo en Inglés | MEDLINE | ID: mdl-26751443

RESUMEN

Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.


Asunto(s)
Redes de Comunicación de Computadores/normas , Seguridad Computacional , Internet , Investigación
8.
J Digit Imaging ; 29(3): 321-4, 2016 06.
Artículo en Inglés | MEDLINE | ID: mdl-26530051

RESUMEN

Software methods that enable navigation of radiology cases on various digital platforms differ between handheld devices and desktop computers. This has resulted in poor compatibility of online radiology teaching files across mobile smartphones, tablets, and desktop computers. A standardized, platform-independent, or "agnostic" approach for presenting online radiology content was produced in this work by leveraging modern hypertext markup language (HTML) and JavaScript web software technology. We describe the design and evaluation of this software, demonstrate its use across multiple viewing platforms, and make it publicly available as a model for future development efforts.


Asunto(s)
Redes de Comunicación de Computadores/normas , Sistemas de Computación/normas , Lenguajes de Programación , Sistemas de Información Radiológica/normas , Radiología , Programas Informáticos , Redes de Comunicación de Computadores/organización & administración , Humanos , Radiografía , Sistemas de Información Radiológica/organización & administración
9.
J Stroke Cerebrovasc Dis ; 25(9): 2253-8, 2016 Sep.
Artículo en Inglés | MEDLINE | ID: mdl-27266620

RESUMEN

BACKGROUND: The benefits of intravenous tissue-type plasminogen activator (IV-tPA) in acute ischemic stroke (AIS) are time dependent. Because emergency rooms quickly initiate a stroke alert with more severe symptoms, we hypothesized that patients with lower National Institutes of Health Stroke Scale (NIHSS) scores, indicating a less severe stroke, would have longer door-to-needle (DTN) times compared to patients with higher NIHSS scores. METHODS: Data obtained from the 19-hospital Providence Stroke Registry were used to identify AIS patients who received IV-tPA within 4.5 hours of last-known-well. NIHSS scores were obtained prior to tPA administration at the time of emergency department presentation and categorized as low-NIHSS (score = 0-5) or high-NIHSS (score = 6-42) strokes. Median DTN times were collected for both groups as the primary outcome variable. Linear mixed-effects regression models were used to assess the effect of NIHSS scores on DTN and its 2 components: door-to-CT (DCT) and CT-to-needle (CTN) times. RESULTS: We identified 692 AIS patients who received IV-tPA within 4.5 hours of last-known-well, with 198 patients presenting with low-NIHSS strokes and 494 patients with high-NIHSS strokes. In multivariable analysis, median DTN time was estimated to be 18% higher for low-NIHSS strokes than high-NIHSS strokes after adjusting for covariates (P < .001). Median DCT times were also higher for low-NIHSS (19 minutes) compared to high-NIHSS (11 minutes) strokes after adjusting for covariates (P < .001), whereas CTN times were unchanged (P = .055). CONCLUSION: In AIS patients receiving IV-tPA in a telestroke network, lower NIHSS scores were associated with longer DTN and DCT times.


Asunto(s)
Redes de Comunicación de Computadores/normas , National Institutes of Health (U.S.)/normas , Índice de Severidad de la Enfermedad , Accidente Cerebrovascular/diagnóstico , Accidente Cerebrovascular/tratamiento farmacológico , Tiempo de Tratamiento/normas , Redes de Comunicación de Computadores/estadística & datos numéricos , Femenino , Fibrinolíticos/uso terapéutico , Humanos , Modelos Lineales , Masculino , Estudios Retrospectivos , Activador de Tejido Plasminógeno/uso terapéutico , Resultado del Tratamiento , Estados Unidos
10.
BMC Bioinformatics ; 16: 197, 2015 Jun 20.
Artículo en Inglés | MEDLINE | ID: mdl-26087842

RESUMEN

BACKGROUND: The universal qPCR data exchange file format RDML is today well accepted by the scientific community, part of the MIQE guidelines and implemented in many qPCR instruments. With the increased use of RDML new challenges emerge. The flexibility of the RDML format resulted in some implementations that did not meet the expectations of the consortium in the level of support or the use of elements. RESULTS: In the current RDML version 1.2 the description of the elements was sharpened. The open source editor RDML-Ninja was released (http://sourceforge.net/projects/qpcr-ninja/). RDML-Ninja allows to visualize, edit and validate RDML files and thus clarifies the use of RDML elements. Furthermore RDML-Ninja serves as reference implementation for RDML and enables migration between RDML versions independent of the instrument software. The database RDMLdb will serve as an online repository for RDML files and facilitate the exchange of RDML data (http://www.rdmldb.org). Authors can upload their RDML files and reference them in publications by the unique identifier provided by RDMLdb. The MIQE guidelines propose a rich set of information required to document each qPCR run. RDML provides the vehicle to store and maintain this information and current development aims at further integration of MIQE requirements into the RDML format. CONCLUSIONS: The editor RDML-Ninja and the database RDMLdb enable scientists to evaluate and exchange qPCR data in the instrument-independent RDML format. We are confident that this infrastructure will build the foundation for standardized qPCR data exchange among scientists, research groups, and during publication.


Asunto(s)
Redes de Comunicación de Computadores/normas , Bases de Datos Factuales , Reacción en Cadena de la Polimerasa/métodos , Programas Informáticos , Humanos
12.
ScientificWorldJournal ; 2014: 718698, 2014.
Artículo en Inglés | MEDLINE | ID: mdl-24616639

RESUMEN

Vehicular ad hoc networks (VANETs) are emerging as new research area and attracting an increasing attention from both industry and research communities. In this context, a dynamic resource allocation policy that maximizes the use of available resources and meets the quality of service (QoS) requirement of constraining applications is proposed. It is a combination of a fair packet scheduling policy and a new adaptive QoS oriented call admission control (CAC) scheme based on the vehicle density variation. This scheme decides whether the connection request is to be admitted into the system, while providing fair access and guaranteeing the desired throughput. The proposed algorithm showed good performance in testing in real world environment.


Asunto(s)
Redes de Comunicación de Computadores/normas , Modelos Teóricos , Asignación de Recursos , Algoritmos , Humanos , Control de Calidad
13.
ScientificWorldJournal ; 2014: 623670, 2014.
Artículo en Inglés | MEDLINE | ID: mdl-25254255

RESUMEN

Spectrum allocation is one of the key issues to improve spectrum efficiency and has become the hot topic in the research of cognitive wireless network. This paper discusses the real-time feature and efficiency of dynamic spectrum allocation and presents a new spectrum allocation algorithm based on the master-slave parallel immune optimization model. The algorithm designs a new encoding scheme for the antibody based on the demand for convergence rate and population diversity. For improving the calculating efficiency, the antibody affinity in the population is calculated in multiple computing nodes at the same time. Simulation results show that the algorithm reduces the total spectrum allocation time and can achieve higher network profits. Compared with traditional serial algorithms, the algorithm proposed in this paper has better speedup ratio and parallel efficiency.


Asunto(s)
Algoritmos , Redes de Comunicación de Computadores/normas , Modelos Teóricos , Tecnología Inalámbrica , Simulación por Computador , Reproducibilidad de los Resultados
14.
ScientificWorldJournal ; 2014: 238682, 2014.
Artículo en Inglés | MEDLINE | ID: mdl-25152904

RESUMEN

The behaviour of the routers' buffer may affect the quality of service (QoS) of network services under certain conditions, since it may modify some traffic characteristics, as delay or jitter, and may also drop packets. As a consequence, the characterization of the buffer is interesting, especially when multimedia flows are transmitted and even more if they transport information with real-time requirements. This work presents a new methodology with the aim of determining the technical and functional characteristics of real buffers (i.e., behaviour, size, limits, and input and output rate) of a network path. It permits the characterization of intermediate buffers of different devices in a network path across the Internet.


Asunto(s)
Redes de Comunicación de Computadores , Modelos Teóricos , Algoritmos , Redes de Comunicación de Computadores/normas , Humanos , Internet
15.
ScientificWorldJournal ; 2014: 452362, 2014.
Artículo en Inglés | MEDLINE | ID: mdl-25254243

RESUMEN

Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.


Asunto(s)
Algoritmos , Inteligencia Artificial , Seguridad Computacional , Modelos Teóricos , Redes de Comunicación de Computadores/normas , Simulación por Computador , Humanos , Reproducibilidad de los Resultados
16.
ScientificWorldJournal ; 2014: 101809, 2014.
Artículo en Inglés | MEDLINE | ID: mdl-25295288

RESUMEN

Both reliable detection of the primary signal in a noisy and fading environment and nullifying the effect of unauthorized users are important tasks in cognitive radio networks. To address these issues, we consider a cooperative spectrum sensing approach where each user is assigned nonuniform reliability based on the sensing performance. Users with poor channel or faulty sensor are assigned low reliability. The nonuniform reliabilities serve as identification tags and are used to isolate users with malicious behavior. We consider a link layer attack similar to the Byzantine attack, which falsifies the spectrum sensing data. Three different strategies are presented in this paper to ignore unreliable and malicious users in the network. Considering only reliable users for global decision improves sensing time and decreases collisions in the control channel. The fusion center uses the degree of reliability as a weighting factor to determine the global decision in scheme I. Schemes II and III consider the unreliability of users, which makes the computations even simpler. The proposed schemes reduce the number of sensing reports and increase the inference accuracy. The advantages of our proposed schemes over conventional cooperative spectrum sensing and the Chair-Varshney optimum rule are demonstrated through simulations.


Asunto(s)
Cognición , Redes de Comunicación de Computadores/normas , Seguridad Computacional/normas , Tecnología Inalámbrica/normas , Reproducibilidad de los Resultados
17.
ScientificWorldJournal ; 2014: 825984, 2014.
Artículo en Inglés | MEDLINE | ID: mdl-25276863

RESUMEN

We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof.


Asunto(s)
Algoritmos , Redes de Comunicación de Computadores/normas , Seguridad Computacional/normas , Modelos Teóricos , China , Confidencialidad/normas , Gobierno , Reproducibilidad de los Resultados
18.
ScientificWorldJournal ; 2014: 264654, 2014.
Artículo en Inglés | MEDLINE | ID: mdl-25243205

RESUMEN

Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.


Asunto(s)
Redes de Comunicación de Computadores/normas , Seguridad Computacional/normas , Tecnología Inalámbrica/normas , Redes de Comunicación de Computadores/tendencias , Seguridad Computacional/tendencias , Tecnología Inalámbrica/tendencias
19.
ScientificWorldJournal ; 2014: 172583, 2014.
Artículo en Inglés | MEDLINE | ID: mdl-25254229

RESUMEN

The paper outlines a bioinspired approach named "network nervous system" and methods of simulation of infrastructure attacks and protection mechanisms based on this approach. The protection mechanisms based on this approach consist of distributed procedures of information collection and processing, which coordinate the activities of the main devices of a computer network, identify attacks, and determine necessary countermeasures. Attacks and protection mechanisms are specified as structural models using a set-theoretic approach. An environment for simulation of protection mechanisms based on the biological metaphor is considered; the experiments demonstrating the effectiveness of the protection mechanisms are described.


Asunto(s)
Algoritmos , Redes de Comunicación de Computadores/normas , Seguridad Computacional/normas , Modelos Teóricos , Acceso a la Información , Simulación por Computador , Confidencialidad/normas , Sistemas de Información/normas , Reproducibilidad de los Resultados , Interfaz Usuario-Computador
20.
ScientificWorldJournal ; 2014: 473132, 2014.
Artículo en Inglés | MEDLINE | ID: mdl-25254245

RESUMEN

Even though existing low-power listening (LPL) protocols have enabled ultra-low-power operation in wireless sensor networks (WSN), they do not address trade-off between energy and delay, since they focused only on energy aspect. However, in recent years, a growing interest in various WSN applications is requiring new design factors, such as minimum delay and higher reliability, as well as energy efficiency. Therefore, in this paper we propose a novel sensor multiple access control (MAC) protocol, transmission rate based adaptive low-power listening MAC protocol (TRA-MAC), which is a kind of preamble-based LPL but is capable of controlling preamble sensing cycle adaptively to transmission rates. Through experiments, it is demonstrated that TRA-MAC enables LPL cycle (LC) and preamble transmission length to adapt dynamically to varying transmission rates, compensating trade-off between energy and response time.


Asunto(s)
Algoritmos , Redes de Comunicación de Computadores/normas , Modelos Teóricos , Tecnología Inalámbrica/normas , Redes de Comunicación de Computadores/instrumentación , Reproducibilidad de los Resultados , Procesamiento de Señales Asistido por Computador/instrumentación , Factores de Tiempo , Tecnología Inalámbrica/instrumentación
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA