Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061457
Ruizhen Wu, Xiaoyong Zhang, Mingming Wang, Lin Wang
The SHA-256 algorithm is used to ensure the integrity and authenticity of data in order to achieve a good security thus is playing an important role in various applications, such as e-transactions and bitcoins. The SHA-256 computation capacity is a main research direction of Hashing Algorithm. In order to improve the computation capacity of hardware, the proposed design first uses pipeline principle and circuitry of timing prediction to find a most efficient architecture for implementation. Then it is optimized with hash function and hardware characteristics to give a high-performance hardware architecture of SHA-256 hash. Three pipelines are used to replace the critical path in the round functions which can shorten the timing path, and divide the computation chain into independent steps. Multi-computation of SHA-256 is working in parallel pipelines, indicating that the computation capacity can be 3 times of that with standard SHA-256 implementation. The proposed SHA-256 hardware architecture has been implemented and synthesized with Intel 14nm technology. Simulation and synthesis results show the proposed SHA-256 hashing throughput can be improved by 3 times with 50.7% power reduction, at an area cost of 2.9 times compared to that of the standard implementation.
{"title":"A High-Performance Parallel Hardware Architecture of SHA-256 Hash in ASIC","authors":"Ruizhen Wu, Xiaoyong Zhang, Mingming Wang, Lin Wang","doi":"10.23919/ICACT48636.2020.9061457","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061457","url":null,"abstract":"The SHA-256 algorithm is used to ensure the integrity and authenticity of data in order to achieve a good security thus is playing an important role in various applications, such as e-transactions and bitcoins. The SHA-256 computation capacity is a main research direction of Hashing Algorithm. In order to improve the computation capacity of hardware, the proposed design first uses pipeline principle and circuitry of timing prediction to find a most efficient architecture for implementation. Then it is optimized with hash function and hardware characteristics to give a high-performance hardware architecture of SHA-256 hash. Three pipelines are used to replace the critical path in the round functions which can shorten the timing path, and divide the computation chain into independent steps. Multi-computation of SHA-256 is working in parallel pipelines, indicating that the computation capacity can be 3 times of that with standard SHA-256 implementation. The proposed SHA-256 hardware architecture has been implemented and synthesized with Intel 14nm technology. Simulation and synthesis results show the proposed SHA-256 hashing throughput can be improved by 3 times with 50.7% power reduction, at an area cost of 2.9 times compared to that of the standard implementation.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134363407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061540
Xiang Gao, Xiao-peng Yan, Zhiquan Bai
In this paper, a modulation scheme referred as spatial modulation based color-intensity shift keying (SM CISK) is proposed for visible light communication (VLC) systems. The proposed scheme amalgamates conventional color shift keying (CSK), pulse amplitude modulation (PAM), and SM together to efficiently exploit the degrees of freedom in the color, the intensity, and the spatial domains. It maintains a constant average transmit power to fulfill the non-flickering requirement for the normal illumination. The bit error rate (BER) of the proposed scheme is studied based on the maximal likelihood (ML) detection. Simulation results verify that the proposed scheme outperforms the joint color-and-spatial modulation (SM CSK) and CISK modulation scheme.
{"title":"Spatial Modulation Based Color-Intensity Shift Keying in VLC System","authors":"Xiang Gao, Xiao-peng Yan, Zhiquan Bai","doi":"10.23919/ICACT48636.2020.9061540","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061540","url":null,"abstract":"In this paper, a modulation scheme referred as spatial modulation based color-intensity shift keying (SM CISK) is proposed for visible light communication (VLC) systems. The proposed scheme amalgamates conventional color shift keying (CSK), pulse amplitude modulation (PAM), and SM together to efficiently exploit the degrees of freedom in the color, the intensity, and the spatial domains. It maintains a constant average transmit power to fulfill the non-flickering requirement for the normal illumination. The bit error rate (BER) of the proposed scheme is studied based on the maximal likelihood (ML) detection. Simulation results verify that the proposed scheme outperforms the joint color-and-spatial modulation (SM CSK) and CISK modulation scheme.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061283
WooHyun Park
Nowadays, there is a flood of data such as naked body photos and child pornography, which is making people bloodless. In addition, people also distribute drugs through unknown dark channels. In particular, most transactions are being made through the Deep Web, the dark path. “Deep Web refers to an encrypted network that is not detected on search engine like Google etc. Users must use Tor to visit sites on the dark web” [4]. In other words, the Dark Web uses Tor's encryption client. Therefore, users can visit multiple sites on the dark Web, but not know the initiator of the site. In this paper, we propose the key idea based on the current status of such crimes and a crime information visual system for Deep Web has been developed. The status of deep web is analyzed and data is visualized using Java. It is expected that the program will help more efficient management and monitoring of crime in unkown web such as deep web, torrent etc.
{"title":"A Study on Analytical Visualization of Deep Web","authors":"WooHyun Park","doi":"10.23919/ICACT48636.2020.9061283","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061283","url":null,"abstract":"Nowadays, there is a flood of data such as naked body photos and child pornography, which is making people bloodless. In addition, people also distribute drugs through unknown dark channels. In particular, most transactions are being made through the Deep Web, the dark path. “Deep Web refers to an encrypted network that is not detected on search engine like Google etc. Users must use Tor to visit sites on the dark web” [4]. In other words, the Dark Web uses Tor's encryption client. Therefore, users can visit multiple sites on the dark Web, but not know the initiator of the site. In this paper, we propose the key idea based on the current status of such crimes and a crime information visual system for Deep Web has been developed. The status of deep web is analyzed and data is visualized using Java. It is expected that the program will help more efficient management and monitoring of crime in unkown web such as deep web, torrent etc.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133388874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061437
Da-Yu Kao, Ting-Chi Wang, Fuching Tsai
Voice over Internet Protocol (VoIP) applications, such as WeChat, Whatsapp, or LINE, have gained increasing popularity during the last few years. Packets analysis of VoIP is one of the critical criminal investigation strategies for law enforcement agencies (LEAs). Due to its convenience and multi-functionality, the WeChat application is accessible by a massive amount of people in Asia, especially in Taiwan and China. Therefore, this study uses Wireshark to reveal the tool marks behind the WeChat messages and voice calls. It will be an excellent help for LEAs to identify cybercriminals and bring them to justice.
{"title":"Forensic Artifacts of Network Traffic on WeChat Calls","authors":"Da-Yu Kao, Ting-Chi Wang, Fuching Tsai","doi":"10.23919/ICACT48636.2020.9061437","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061437","url":null,"abstract":"Voice over Internet Protocol (VoIP) applications, such as WeChat, Whatsapp, or LINE, have gained increasing popularity during the last few years. Packets analysis of VoIP is one of the critical criminal investigation strategies for law enforcement agencies (LEAs). Due to its convenience and multi-functionality, the WeChat application is accessible by a massive amount of people in Asia, especially in Taiwan and China. Therefore, this study uses Wireshark to reveal the tool marks behind the WeChat messages and voice calls. It will be an excellent help for LEAs to identify cybercriminals and bring them to justice.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130393502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061266
Ju Jinquan, M. Al-Absi, A. Al-Absi, Hoon-Jae Lee
With the rapid development of information technology, the influence of network on human way of life is greatly enhanced, and network technology is rapidly popularized in all fields of society, which makes the security of computer network become an urgent problem to be solved. How to ensure the rapid and healthy development of the network has become the focus of attention of scholars, and has a very prominent realistic background and extremely important theoretical significance. In this paper, the research background of computer network security, the significance of this paper, the related research status at home and abroad and the research methods used in this paper are summarized. Then the theory of network security technology is advanced. This paper summarizes the connotation of network security, the research content of network security, the framework of network security information and the dynamic model of network security. In the third part, the problems of computer network security are analyzed, and the network security problems are studied from four aspects: network hardware, network software, network managers and network users, and the possible network security problems and their causes are analyzed. In the fourth part, the network security protection measures are put forward, and the security measures of hardware system, system security loophole, application software and manager are put forward respectively.
{"title":"Analysis and Protection of Computer Network Security Issues","authors":"Ju Jinquan, M. Al-Absi, A. Al-Absi, Hoon-Jae Lee","doi":"10.23919/ICACT48636.2020.9061266","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061266","url":null,"abstract":"With the rapid development of information technology, the influence of network on human way of life is greatly enhanced, and network technology is rapidly popularized in all fields of society, which makes the security of computer network become an urgent problem to be solved. How to ensure the rapid and healthy development of the network has become the focus of attention of scholars, and has a very prominent realistic background and extremely important theoretical significance. In this paper, the research background of computer network security, the significance of this paper, the related research status at home and abroad and the research methods used in this paper are summarized. Then the theory of network security technology is advanced. This paper summarizes the connotation of network security, the research content of network security, the framework of network security information and the dynamic model of network security. In the third part, the problems of computer network security are analyzed, and the network security problems are studied from four aspects: network hardware, network software, network managers and network users, and the possible network security problems and their causes are analyzed. In the fourth part, the network security protection measures are put forward, and the security measures of hardware system, system security loophole, application software and manager are put forward respectively.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114216778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061360
A. Bondok, Wonseok Lee, Taejoon Kim
The realization of intelligent transportation systems requires the use of specific networks such as Vehicular Ad Hoc Networks (VANETs). VANETs are used to connect vehicles with each other and with fixed infrastructure Road Side Units (RSUs). In powering the RSUs, renewable energy is a great alternative to conventional electric grid. This paper proposes an efficient scheduling algorithm for serving vehicles in a green vehicular network with the aim to maximize the number of served vehicles while maintaining a sustainable energy level. We define and compute four metrics, for each vehicle, of a substantial impact on both the quality of service (QoS) and the power to be consumed. The proposed scheme outperforms other scheduler in terms of the percentage of served vehicles under different arrival rates, various values of average vehicle velocities, variable data size and varying the amount of harvested energy.
智能交通系统的实现需要使用特定的网络,如车辆自组织网络(VANETs)。vanet用于车辆之间以及与固定基础设施Road Side Units (rsu)之间的连接。在为rsu供电方面,可再生能源是传统电网的绝佳替代品。本文提出了一种高效的绿色车辆网络服务车辆调度算法,其目标是在保持可持续能量水平的同时使服务车辆数量最大化。我们为每辆车定义并计算了四个指标,这些指标对服务质量(QoS)和消耗的功率都有重大影响。该方案在不同到达率、不同平均车速值、不同数据大小和不同能量收集量下的服务车辆百分比方面优于其他调度程序。
{"title":"Efficient Scheduling for VANET Considering Renewable Energy","authors":"A. Bondok, Wonseok Lee, Taejoon Kim","doi":"10.23919/ICACT48636.2020.9061360","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061360","url":null,"abstract":"The realization of intelligent transportation systems requires the use of specific networks such as Vehicular Ad Hoc Networks (VANETs). VANETs are used to connect vehicles with each other and with fixed infrastructure Road Side Units (RSUs). In powering the RSUs, renewable energy is a great alternative to conventional electric grid. This paper proposes an efficient scheduling algorithm for serving vehicles in a green vehicular network with the aim to maximize the number of served vehicles while maintaining a sustainable energy level. We define and compute four metrics, for each vehicle, of a substantial impact on both the quality of service (QoS) and the power to be consumed. The proposed scheme outperforms other scheduler in terms of the percentage of served vehicles under different arrival rates, various values of average vehicle velocities, variable data size and varying the amount of harvested energy.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116586714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061439
Yoon-Ji Kim, Geunbae Kim, D. Yoon
In this paper, we propose the method for blind estimation of convolutional interleaver parameters in a noncooperative context by analysing repetitive patterns in interleaved sequences. Simulation results verify that proposed method could effectively estimate convolutional interleaver parameters in a noisy environment.
{"title":"Estimation of Convolutional Interleaver in a Non-cooperative Context","authors":"Yoon-Ji Kim, Geunbae Kim, D. Yoon","doi":"10.23919/ICACT48636.2020.9061439","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061439","url":null,"abstract":"In this paper, we propose the method for blind estimation of convolutional interleaver parameters in a noncooperative context by analysing repetitive patterns in interleaved sequences. Simulation results verify that proposed method could effectively estimate convolutional interleaver parameters in a noisy environment.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116743329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061261
Kuang-yao Lin, Wei-Ren Huang
In recent years, everything has been more and more systematic, and it would generate many cyber security issues. One of the most important of these is the malware. Modern malware has switched to a high-growth phase. According to the AV-TEST Institute showed that there are over 350,000 new malicious programs (malware) and potentially unwanted applications (PUA) be registered every day. This threat was presented and discussed in the present paper. In addition, we also considered data privacy by using federated learning. Feature extraction can be performed based on malware. The proposed method achieves very high accuracy (≈0.9167) on the dataset provided by VirusTotal.
{"title":"Using Federated Learning on Malware Classification","authors":"Kuang-yao Lin, Wei-Ren Huang","doi":"10.23919/ICACT48636.2020.9061261","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061261","url":null,"abstract":"In recent years, everything has been more and more systematic, and it would generate many cyber security issues. One of the most important of these is the malware. Modern malware has switched to a high-growth phase. According to the AV-TEST Institute showed that there are over 350,000 new malicious programs (malware) and potentially unwanted applications (PUA) be registered every day. This threat was presented and discussed in the present paper. In addition, we also considered data privacy by using federated learning. Feature extraction can be performed based on malware. The proposed method achieves very high accuracy (≈0.9167) on the dataset provided by VirusTotal.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115273336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061472
Md. Moklesur Rahman, Md. Shafiqul Islam, Mir Kanon Ara Jannat, Md. Hafizur Rahman, Md. Arifuzzaman, R. Sassi, M. Aktaruzzaman
The classification of eye states (open or closed) has numerous potential applications such as fatigue detection, psychological state analysis, smart home devices controlling, etc. Due to its importance, there are a number of works already reported in the literature using traditional shallow neural networks or support vector machines, which have reported good accuracy (about 96%). However, there is still enough space to improve the accuracy of existing systems using proper classification methods. The major problem with traditional classifiers is that they depend on manual selection of features and that is very challenging to select meaningful features for such classifiers. Convolutional neural networks (CNNs) have become popular for computer vision and pattern recognition problems with better performance than traditional methods. In this study, we proposed a model of CNN (EyeNet) for eye states classification and tested it on three datasets (CEW, ZJU, and MRL Eye). The quality (or diversity) of a recently proposed larger dataset (MRL Eye) has been compared with two other existing datasets with respect to the sufficient training of the model. The model shows very high performance (about 99% accuracy for classification of eye states on the test set of data when it is trained by the training samples of the same dataset. The proposed model improves the accuracy of the best existing method by about 3%. The performance of the model for classification of samples coming from different datasets is reduced when it is trained with the MRL Eye dataset. This concludes that even though, the MRL Eye has a large number of samples compared to other datasets, but diversity still lacks in the MRL Eye samples to sufficiently train the model.
{"title":"EyeNet: An Improved Eye States Classification System using Convolutional Neural Network","authors":"Md. Moklesur Rahman, Md. Shafiqul Islam, Mir Kanon Ara Jannat, Md. Hafizur Rahman, Md. Arifuzzaman, R. Sassi, M. Aktaruzzaman","doi":"10.23919/ICACT48636.2020.9061472","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061472","url":null,"abstract":"The classification of eye states (open or closed) has numerous potential applications such as fatigue detection, psychological state analysis, smart home devices controlling, etc. Due to its importance, there are a number of works already reported in the literature using traditional shallow neural networks or support vector machines, which have reported good accuracy (about 96%). However, there is still enough space to improve the accuracy of existing systems using proper classification methods. The major problem with traditional classifiers is that they depend on manual selection of features and that is very challenging to select meaningful features for such classifiers. Convolutional neural networks (CNNs) have become popular for computer vision and pattern recognition problems with better performance than traditional methods. In this study, we proposed a model of CNN (EyeNet) for eye states classification and tested it on three datasets (CEW, ZJU, and MRL Eye). The quality (or diversity) of a recently proposed larger dataset (MRL Eye) has been compared with two other existing datasets with respect to the sufficient training of the model. The model shows very high performance (about 99% accuracy for classification of eye states on the test set of data when it is trained by the training samples of the same dataset. The proposed model improves the accuracy of the best existing method by about 3%. The performance of the model for classification of samples coming from different datasets is reduced when it is trained with the MRL Eye dataset. This concludes that even though, the MRL Eye has a large number of samples compared to other datasets, but diversity still lacks in the MRL Eye samples to sufficiently train the model.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123181735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061429
R. Khiati, Muhammed Hanif, Choonhwa Lee
With the increase in population, there is an increasing number of patients. Subsequently, we also see an increase in the amount of patient data that needs to be processed, further emphasizing the need for new systems and developments that can handle such large quantities of big data. To this end, this paper proposed a potential solution to this problem in the form of a system that can analyze a patient's data in real-time, providing doctors and other intended healthcare personnel with an immediate report of a patient's situation, allowing for a quicker response time, better treatment, and the first step towards a grand realized smart hospital system in the long-term. This system, aided by the rapid analysis of Apache Flink, produces the requested data to the doctor as intended, enabling for a swift response time to patient issues, thus highlighting a unique approach to the field, a contrast to other previous research in this field where there is a lack of said provisions.
{"title":"Adapting distributed stream processing technologies for the automation of modern health care systems","authors":"R. Khiati, Muhammed Hanif, Choonhwa Lee","doi":"10.23919/ICACT48636.2020.9061429","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061429","url":null,"abstract":"With the increase in population, there is an increasing number of patients. Subsequently, we also see an increase in the amount of patient data that needs to be processed, further emphasizing the need for new systems and developments that can handle such large quantities of big data. To this end, this paper proposed a potential solution to this problem in the form of a system that can analyze a patient's data in real-time, providing doctors and other intended healthcare personnel with an immediate report of a patient's situation, allowing for a quicker response time, better treatment, and the first step towards a grand realized smart hospital system in the long-term. This system, aided by the rapid analysis of Apache Flink, produces the requested data to the doctor as intended, enabling for a swift response time to patient issues, thus highlighting a unique approach to the field, a contrast to other previous research in this field where there is a lack of said provisions.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126210481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}