Claim Missing Document
Check
Articles

Found 3 Documents
Search

An Analytical Review on Emerging Future Network Technologies in Healthcare: Issues, Challenges and Prospects for the Future Kumar, Narendar; Salman, Muhammad; Waqar, Abdul; Khan, Muhammad Salman
International Journal of Electrical, Computer, and Biomedical Engineering Vol. 2 No. 4 (2024)
Publisher : Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62146/ijecbe.v2i4.86

Abstract

This review research article covers in detail healthcare issues and problems related to emerging network technologies, including 5G, satellite communication, and body area networks. The main target is to provide readings that are preliminary so as to get a more rapid in-depth exploitation of this area through which the existing landscape can be figured out and related areas in which further research and probing can be done. This review focuses on core components such as security and privacy, transmission performance, regulatory issues, coexistence issues, and standardization, and explores the issues of securing patient data and confidentiality and measures of performance which play a critical role in healthcare application. Identifying key challenges and matured areas in the review, the review points out researchers to confirmed areas where more efforts are required, like robust security protocols, more innovative regulatory solutions, and new interoperability standards. In this way this study corroborates the need for continued innovation and research in healthcare network technologies that will ultimately result in an improved quality of healthcare delivery and, hence, an improved result for the patient
RTBTS: A Real-Time Behavioural Training System to Mitigate Psychological Vulnerabilities in Social Engineering Attacks Kumar, Narendar; Muhammad Salman
International Journal of Electrical, Computer, and Biomedical Engineering Vol. 3 No. 1 (2025)
Publisher : Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62146/ijecbe.v3i1.103

Abstract

The aim of this research is to identify the psychological traits that make people susceptible to social engineering attacks and the effectiveness of current cybersecurity training. The study tries to identify how these factors can be better utilized to enhance the resilience of individuals in response to such an attack, due to a psychological or training deficiency. This involves data collection through structured surveying on internet platforms such as Google Forms. The analysis has been done by means of Python using statistical techniques, focusing on the descriptive analysis and regression analyses that set the links of psychological features and sensitivity to social engineering influenced by training programs. It followed from the research that certain psychological features of a person, like a high level of trust without its verification and readiness to conform with authority, raise his or her susceptibility to social engineering essentially. The training programs assessment had shown positive attitude to their helpfulness though deficiencies in adaptability and frequency of trainings reduce its potential to neutralize sophisticated social engineering techniques. These results reflect that, although the existing training is fairly successful, there is an urgent need for more flexible training methods that would consider individual psychological profiles and be updated regularly in combat with emerging social engineering strategies. Guided by these considerations above, this research supports the establishment of a Real-Time Behavioural Training System, RTBTS, continuous monitoring of dangers for dynamic adapted training modules.
Modernizing Voting Systems: A Comprehensive Approach Using Blockchain, Biometrics and Zero Knowledge Proofs Kumar, Narendar; Kumar, Surendar; Waqar, Abdul; Ngantung, Clavincy Francis Yohanes
International Journal of Electrical, Computer, and Biomedical Engineering Vol. 3 No. 3 (2025)
Publisher : Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62146/ijecbe.v3i3.116

Abstract

This research article provides the design of an in-person and remote voting system, while at the same time ensuring the privacy of users that would guarantee openness, transparency, and at the same time fraud-free results. The aim is to solve various common problems associated with most conventional elections including fraud, vote manipulation, through adaptation of the usage of a safe, highly transparent decentralized logical Hyperledger Fabric-based system provided by blockchain implementation. The methodology in this article is to be implemented for the sheer reason of urgency needed in making a more secure and transparent system for voting, considering even the rising frauds in elections. The addition of Zero Knowledge Proof (ZKP) guarantees that votes are confident and correct, yet anonymous between a voter and their vote. Biometric identification makes the system resistant to double spending. This incorporation of technologies ensures there is privacy and immutability against the double transactions, which, in turn, would be put in place as foundation for the future to be provided wherein every process in an election becomes safe and transparent. Innovation via creating a voting system to be trusted to meet today's demands and set standards for future electoral processes.