- Browse by Date
Department of Computer Science
Permanent URI for this community
Browse
Browsing Department of Computer Science by Issue Date
Now showing 1 - 10 of 176
Results Per Page
Sort Options
Item Dependability and Security in Medical Information System(Springer Nature, 2007) Zou, Xukai; Dai, Yuan-Shun; Doebbeling, Bradley; Qi, Mingrui; Department of Computer and Information Science, School of ScienceMedical Information Systems (MIS) help medical practice and health care significantly. Security and dependability are two increasingly important factors for MIS nowadays. In one hand, people would be willing to step into the MIS age only when their privacy and integrity can be protected and guaranteed with MIS systems. On the other hand, only secure and reliable MIS systems would provide safe and solid medical and health care service to people. In this paper, we discuss some new security and reliability technologies which are necessary for and can be integrated with existing MISs and make the systems highly secure and dependable. We also present an implemented Middleware architecture which has been integrated with the existing VISTA/CPRS system in the U.S. Department of Veterans Affairs seamlessly and transparently.Item Secure Authentication in Heterogeneous Wireless Networks(Hindawi, 2008-04-03) Durresi, Arjan; Durresi, Mimoza; Barolli, Leonard; Computer and Information Science, School of ScienceThe convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a primary challenge for this new integrated wireless technology. Successful execution of 3G security algorithms can be limited to a specified area by encrypting a user's authentication challenge with spatial data defining his visited WLAN. With limited capacity to determine a user's location only to within a current cell and restrictions on accessing users' location due to privacy, 3G operators must rely on spatial data sent from visited WLANs to implement spatial authentication control. A potential risk is presented to 3G operators since no prior relationship or trust may exist with a WLAN owner. Algorithms to quantify the trust between all parties of 3G-WLAN integrated networks are presented to further secure user authentication. Ad-hoc serving networks and the trust relationships established between mobile users are explored to define stronger algorithms for 3G – WLAN user authentication.Item Networked Biomedical System for Ubiquitous Health Monitoring(Hindawi, 2008-11-20) Durresi, Arjan; Durresi, Mimoza; Merkoci, Arben; Barolli, Leonard; Computer and Information Science, School of ScienceWe propose a distributed system that enables global and ubiquitous health monitoring of patients. The biomedical data will be collected by wearable health diagnostic devices, which will include various types of sensors and will be transmitted towards the corresponding Health Monitoring Centers. The permanent medical data of patients will be kept in the corresponding Home Data Bases, while the measured biomedical data will be sent to the Visitor Health Monitor Center and Visitor Data Base that serves the area of present location of the patient. By combining the measured biomedical data and the permanent medical data, Health Medical Centers will be able to coordinate the needed actions and help the local medical teams to make quickly the best decisions that could be crucial for the patient health, and that can reduce the cost of health service.Item Advances in Mobile Communications and Computing(Hindawi, 2009) Durresi, Arjan; Denko, Mieso; Computer and Information Science, School of ScienceItem Advances in Wireless Networks(Hindawi, 2009-04-13) Durresi, Arjan; Denko, Mieso; Computer and Information Science, School of ScienceItem Tools for Performance Assessment of OLSR Protocol(Hindawi, 2009-04-29) Ikeda, Makoto; Barolli, Leonard; De Marco, Giuseppe; Yang, Tao; Durresi, Arjan; Xhafa, Fatos; Computer and Information Science, School of ScienceIn this paper, we evaluate the performance of Optimized Link State Routing (OLSR) protocol by experimental and simulation results. The experiments are carried out by using our implemented testbed and the simulations by using ns-2 simulator. We also designed and implemented a new interface for the ad-hoc network testbed in order to make more easier the experiments. The comparison between experimental and simulation results shows that for the same parameters set, in the simulation we did not notice any packet loss. On the other hand, in the experiments we experienced packet loss because of the environment effects and traffic interference.Item Simulating Real-Time Aspects of Wireless Sensor Networks(Springer Verlag, 2009-12-22) Pagano, Paolo; Chitnis, Mangesh; Lipari, Giuseppe; Nastasi, Christian; Liang, Yao; Computer and Information Science, School of ScienceWireless Sensor Networks (WSNs) technology has been mainly used in the applications with low-frequency sampling and little computational complexity. Recently, new classes of WSN-based applications with different characteristics are being considered, including process control, industrial automation and visual surveillance. Such new applications usually involve relatively heavy computations and also present real-time requirements as bounded end-to- end delay and guaranteed Quality of Service. It becomes then necessary to employ proper resource management policies, not only for communication resources but also jointly for computing resources, in the design and development of such WSN-based applications. In this context, simulation can play a critical role, together with analytical models, for validating a system design against the parameters of Quality of Service demanded for. In this paper, we present RTNS, a publicly available free simulation tool which includes Operating System aspects in wireless distributed applications. RTNS extends the well-known NS-2 simulator with models of the CPU, the Real-Time Operating System and the application tasks, to take into account delays due to the computation in addition to the communication. We demonstrate the benefits of RTNS by presenting our simulation study for a complex WSN-based multi-view vision system for real-time event detection.Item Architecture for Mobile Heterogeneous Multi Domain Networks(Hindawi, 2010-04-01) Durresi, Arjan; Zhang, Ping; Durresi, Mimoza; Barolli, Leonard; Computer and Information Science, School of ScienceMulti domain networks can be used in several scenarios including military, enterprize networks, emergency networks and many other cases. In such networks, each domain might be under its own administration. Therefore, the cooperation among domains is conditioned by individual domain policies regarding sharing information, such as network topology, connectivity, mobility, security, various service availability and so on. We propose a new architecture for Heterogeneous Multi Domain (HMD) networks, in which one the operations are subject to specific domain policies. We propose a hierarchical architecture, with an infrastructure of gateways at highest-control level that enables policy based interconnection, mobility and other services among domains. Gateways are responsible for translation among different communication protocols, including routing, signalling, and security. Besides the architecture, we discuss in more details the mobility and adaptive capacity of services in HMD. We discuss the HMD scalability and other advantages compared to existing architectural and mobility solutions. Furthermore, we analyze the dynamic availability at the control level of the hierarchy.Item Decision Support System For Geriatric Care(Office of the Vice Chancellor for Research, 2010-04-09) Palakal, Mathew; Pandit, Yogesh; Jones, Josette; Xia, Yuni; Bandos, Jean; Geesaman, Jerry; Pecenka, Dave; Tinsley, EricGeriatrics is a branch in medicine that focuses on the healthcare of the elderly. We propose to build a decision support system for the elderly care based on a knowledgebase system that incorporates best practices that are reported in the literature. A Bayesian network model is then used for decision support for the geriatric care tool that we develop.Item The IUPUI Signature Center on Bio-Computing(Office of the Vice Chancellor for Research, 2010-04-09) Fang, Shiaofen; Mukhopadhyay, SnehasisBio-Computing is the discipline that integrates biomedical concepts and Computer Science techniques for collecting, managing, processing and analyzing large-scale biomedical data, as well as enables a deeper understanding of biological processes and medical procedures through modeling, simulation, and visualization. Bio-Computing emphasizes the algorithmic, computational, and software system issues arising from biomedical problems. It focuses on developing new, improved, specialized and customized Computer Science techniques and tools for computing related needs in life science applications that do not have ready-to-use solutions. The IUPUI Signature Center on Bio-Computing (SCBC) aims to act as a catalyst to provide BioComputing infrastructure and expertise for Indiana life science initiative. The specific mission is the following: • Bio-Computing Infrastructure: To develop cutting-edge bio-computing techniques and tools to establish an infrastructure as a framework to support life science applications. • Collaborative Projects: To actively engage in collaborative research projects, and maximize the impact of bio-computing in life science research and funding efforts. The scope of the projects supported by SCBC can be best described by the figure below: