Journal articles on the topic '280000 Information, Computing and Communication Sciences'

To see the other types of publications on this topic, follow the link: 280000 Information, Computing and Communication Sciences.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic '280000 Information, Computing and Communication Sciences.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ploch, Donald R. "Computing: Communication and Control." Social Science Computer Review 8, no. 4 (December 1990): 614–26. http://dx.doi.org/10.1177/089443939000800412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Petry, Frederick E., and Ronald R. Yager. "Soft Computing Approaches for Human-Autonomous Agent Communication." International Journal of Intelligent Information Technologies 8, no. 4 (October 2012): 1–12. http://dx.doi.org/10.4018/jiit.2012100101.

Full text
Abstract:
This paper describes soft computing approaches for human-agent communications in the context of influencing decision making behavior. Several methods are illustrated including using a person’s predispositions and generalization techniques that allow issues to be viewed in a more favorable light with social interaction persuasion tendencies modeled with soft computing. The context of a robotic assistant for the elderly is used to illustrate the various communication techniques. Finally the related topic of negotiations using some the developed techniques is presented.
APA, Harvard, Vancouver, ISO, and other styles
3

Wasike, Jotham Milimo, and Lawrence Njoroge. "Opening libraries to cloud computing: a Kenyan perspective." Library Hi Tech News 32, no. 3 (May 5, 2015): 21–24. http://dx.doi.org/10.1108/lhtn-09-2014-0072.

Full text
Abstract:
Purpose – This paper aims to examine the types of cloud computing, models, characteristics, descriptions, applications, considerations for use and benefits of the following technologies to library users. Cloud computing has taken libraries in Kenya by storm. Because of this, many libraries do not know what to do. They are at cross-roads. They lack policies to govern them. However, the recent realization by information professionals that cloud computing has a critical role to play in the provision of information services has created a desire to effectively harness and manage them for scholarly communication. Design/methodology/approach – The research reviewed previous studies on the topic by examining both electronic and print information resources available in the libraries and internet. Findings – The findings revealed that libraries in Kenya are yet to fully embrace cloud computing in their operations. There are mixed feelings by librarians on the degree at which they should integrate these technologies in their service provisions. However, there is a positive progress toward this noble venture. Research limitations/implications – Kenya as a developing nation has limited local content on the subject. The study established that some of the available literature is restricted by intellectual property rights. This forced the researcher to rely heavily on foreign literature for the study. Practical implications – Appreciation of emerging cloud computing technologies by libraries is inevitable for the sustainability and management of modern libraries. Cloud computing makes libraries more competitive by adequately meeting user’s technological needs. This study will also act as a benchmark for the Government of Kenya to improve the current information communication technology (ICT) national policy. Social implications – Apart from revolutionalizing library operations and delivery of services, cloud computing will tremendously revolutionize the social-cultural and communication landscape of the society. Originality/value – The paper provides vital information and insights into how libraries are embracing cloud computing in the provision and dissemination of varied information services to library users.
APA, Harvard, Vancouver, ISO, and other styles
4

Varma, Roli. "DECODING THE FEMALE EXODUS FROM COMPUTING EDUCATION." Information, Communication & Society 10, no. 2 (April 2007): 181–93. http://dx.doi.org/10.1080/13691180701307396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hassan, Mohammad R., Feras A. Alnaimait, Qasem Kharma, Ashraf Sharah, and Khalil H. Al-Shqeerat. "Secure Group Key Management Protocol for Grid Computing." Webology 18, no. 2 (December 23, 2021): 1055–65. http://dx.doi.org/10.14704/web/v18i2/web18374.

Full text
Abstract:
In any multi–device / party systems supporting GRID and cloud-based applications, an essential constraint of these systems is the need of all tools and participants to interconnect with each other as members of a group in a secure approach. Group key management method is an essential functional element for any protected distributed communication setting. Key distribution method is a crucial factor in securing communication in grid computing. After the secure key management is executed, messages will be able to be securely exchanged between the grid units. A number of protocols have been proposed to maintain secure group key management. In this paper we present a new password base protocol for secure group key management in Grid computing environment, which is organized in two dynamic servicing layers: the grid application that needs grid services, and the grid services that act on behalf of the user.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Yingxu. "On the Mathematical Theories and Cognitive Foundations of Information." International Journal of Cognitive Informatics and Natural Intelligence 9, no. 3 (July 2015): 42–64. http://dx.doi.org/10.4018/ijcini.2015070103.

Full text
Abstract:
A recent discovery in computer and software sciences is that information in general is a deterministic abstract quantity rather than a probability-based property of the nature. Information is a general form of abstract objects represented by symbolical, mathematical, communication, computing, and cognitive systems. Therefore, information science is one of the contemporary scientific disciplines collectively known as abstract sciences such as system, information, cybernetics, cognition, knowledge, and intelligence sciences. This paper presents the cognitive foundations, mathematical models, and formal properties of information towards an extended theory of information science. From this point of view, information is classified into the categories of classic, computational, and cognitive information in the contexts of communication, computation, and cognition, respectively. Based on the three generations of information theories, a coherent framework of contemporary information is introduced, which reveals the nature of information and the fundamental principles of information science and engineering.
APA, Harvard, Vancouver, ISO, and other styles
7

Makori, Elisha Ondieki. "Exploration of cloud computing practices in university libraries in Kenya." Library Hi Tech News 33, no. 9 (November 7, 2016): 16–22. http://dx.doi.org/10.1108/lhtn-11-2015-0077.

Full text
Abstract:
Purpose Modern technological solutions are rapidly changing the information landscape in library and information establishments. One such innovative solution that is gaining momentum in information centers is cloud computing. The purpose of this paper is to explore and compare opportunities and challenges of “cloud computing paradigm” in handling and supporting delivery of information services in university libraries in the face of the present hard economic situation and limited financial budgets. Design/methodology/approach The study is based on current academic literature, document analysis, several editorials and articles on the potential and challenges of cloud computing paradigm in university library and information centers. Findings Cloud computing is proving as the best management practice of salvaging information services in university libraries due to numerous competing challenges and issues in institutions of higher education. University libraries in developing countries face many challenges of inadequate information infrastructure, limited financial budgets, manpower issues and rapid changes in technological systems. In the context of hard economic times, cloud computing is critical in adding value as well as advancing the goals and objectives of modern university libraries. Cloud computing is the “best technology practice” that is poised to play crucial roles in enhancing quality provision and delivery of information services in university library and information centers. There are many competing challenges and claims, but potential benefits count more. Research limitations/implications The study is based on the ideas of cloud services conceptualized from reading academic literature, document analysis, several editorials, articles and professional work experience. The paper identifies that cloud computing paradigm is useful in achieving the goals and objectives of university libraries in this hard economic situation facing institutions of higher learning. Practical implications The paper provides practical insights that cloud computing is the “must have technology” for modern university library and information centers already burdened with the demand to develop effective and efficient technological solutions due to subsequent changing needs of the digital information environment. This study is useful for university libraries, information professionals, information communication technology professionals and university management. Social implications Cloud computing paradigm provides university libraries with the business opportunity to use comprehensive technological solutions with reduced capital expenditure and safe methods of data storage. This eases the inconveniences normally caused by the need to develop and own such comprehensive technological solutions. Originality/value This research looks at the potential of the emerging trend of “cloud computing paradigm” in enhancing quality provision and delivery of information services in university library and information centers in the context of limited financial budgets. Cloud computing has been gaining momentum in Kenya, especially in business organizations as compared to library and information establishments.
APA, Harvard, Vancouver, ISO, and other styles
8

Saoud, Afaf, and A. RECIOUI. "review on Data communication in smart grids." Algerian Journal of Signals and Systems 2, no. 3 (September 15, 2017): 162–79. http://dx.doi.org/10.51485/ajss.v2i3.42.

Full text
Abstract:
Smart Grids require a complex two-way communication infrastructure, sustaining power flows between intelligent components, and sophisticated computing and information technologies, as well as business applications. Data will flow over generation, transmission, distribution, and user networks in the SG. The amount of data generated by smart devices will experience explosive growth in the future. This tremendous data amount places considerable load on the communications infrastructure of the SG. This paper highlights a review on the smart grid focusing on the communication infrastructure and the data issues. A scan of the most contributions relevant to the topic is presented. The key opportunities and challenges of the communication part of the smart grid are presented for further research.
APA, Harvard, Vancouver, ISO, and other styles
9

Sarwar, Musavarah, and Muhammad Akram. "Certain Algorithms for Computing Strength of Competition in Bipolar Fuzzy Graphs." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 25, no. 06 (November 17, 2017): 877–96. http://dx.doi.org/10.1142/s0218488517500374.

Full text
Abstract:
Fuzzy graph theory is one of the most developing area of research, which has a variety of applications in different fields, including computer science, communication networks, biological sciences, social networks, decision-making and optimization problems. A wide variety of human decision making is based on double-sided or bipolar judgmental thinking on a positive side and a negative side. In this research article, we present some interesting applications of bipolar fuzzy competition graphs in business marketing, social network and wireless communication network. We design and implement algorithms for computing the strength of competition in the bipolar fuzzy graphs. We also compute time complexity of each algorithm.
APA, Harvard, Vancouver, ISO, and other styles
10

Allmann, Kira, and Grant Blank. "Rethinking digital skills in the era of compulsory computing: methods, measurement, policy and theory." Information, Communication & Society 24, no. 5 (February 21, 2021): 633–48. http://dx.doi.org/10.1080/1369118x.2021.1874475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Poddubnyi, V. O., R. Y. Gvozdov, О. V. Sievierinov, and V. M. Fedorchenko. "Object-oriented model of a formal description of an information and communication system." Radiotekhnika, no. 209 (June 24, 2022): 110–17. http://dx.doi.org/10.30837/rt.2022.2.209.11.

Full text
Abstract:
The purpose of the article is to study algorithms for the formal description of information and communication systems. The article discusses the main provisions on the formal representation of objects of information and communication systems. It is noted that the main environments of the information and communication system that are subject to a formal description are: physical environment, computing system environment, user environment, information environment. These components of the information and communication system are considered in detail, analyzed and documented in an informal form (in the form of text). There is a need for a mechanism for a unified description of a system that includes all environments. Such a description will be unambiguously formalized with well-defined mathematical concepts. The mechanism of a single formal description or the technique of a formal description will be unambiguous in understanding and serve as a control description when developing an information security policy in an information and communication system. An algorithm for the formal description of the information and communication system is proposed. In this algorithm, it is proposed to focus on the types and interaction of objects with each other. In such a scheme, attention is focused on such concepts as the object, the characteristics of the object, and the type of interaction with the object. Further consideration of the created block diagrams (graphs) is proposed to explore the possibilities of using this model to simulate cyber-attacks. Since each element contains fields that connect it to other elements, and each attack has an "entry point" using graph theory, it is possible to traverse the graph to determine the possible horizontal propagation paths of a cyber-attack.
APA, Harvard, Vancouver, ISO, and other styles
12

Bulla, Chetan M., and Mahantesh N. Birje. "Improved Data-Driven Root Cause Analysis in a Fog Computing Environment." International Journal of Intelligent Information Technologies 18, no. 1 (January 2022): 1–28. http://dx.doi.org/10.4018/ijiit.296238.

Full text
Abstract:
Internet of Things (IoT) and cloud computing are used in many real-time smart applications such as smart health-care, smart traffic, smart city, and smart industries. Fog computing has been introduced as an intermediate layer to reduce communication delay between cloud and IoT Devices. To improve the performance of these smart applications, a predictive maintenance system needs to adopt an anomaly detection and root cause analysis model that helps to resolve anomalies and avoid such anomalies in the future. The state of art work on data-driven root cause analysis suffers from scalability, accuracy, and interpretability. In this paper, a multi-agent based improved data-driven root cause analysis technique is introduced to identify anomalies and its root cause. The deep learning model LSTM autoencoder is used to find the anomalies, and a game theory approach called SHAP algorithm is used to find the root cause of the anomaly. The evaluation result shows the improvement in accuracy and interpretability, as compared to state-of-the-art works.
APA, Harvard, Vancouver, ISO, and other styles
13

Diamond, Chris, and Gillian Whitehouse. "GENDER, COMPUTING AND THE ORGANIZATION OF WORKING TIME: Public/private comparisons in the Australian context." Information, Communication & Society 10, no. 3 (June 2007): 320–37. http://dx.doi.org/10.1080/13691180701409879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Khalimova, Sophia, and Anastasiya Ivanova. "Labor Productivity of Economic Sectors in the Regions: The Role of Information and Communication Technologies." Spatial Economics 17, no. 4 (2021): 69–96. http://dx.doi.org/10.14530/se.2021.4.069-096.

Full text
Abstract:
The attention of this article is focused on the impact that expanding of the usage of information and communication technologies (ICT) has on the economic development of Russian regions. As shown by various authors, the use of ICT ultimately leads to an increase in the factor productivity. Here, we assess to what extent the use of ICT contributes to the growth of economic development efficiency at the regional level, which is interpreted here as labor productivity in certain economic sectors, and measured as output per worker. Panel data analysis for Russian regions covers 2015–2018. The analysis shows that the spread of ICT has a positive effect on labor productivity in both mining and manufacturing, with dividing regions into two groups – ‘resource’ and ‘non-resource’ depending on role of the extractive industry in regional economy – when considering labor productivity in mining. It was found that there is a relationship between ICT development indicators and labor productivity, with significant factors being industry and regionally specific. The widespread adoption of ICT has a positive effect on the economic development effectiveness, with a stronger link in the manufacturing, while for the mining the discovered relation was not so clear. Among the factors affecting labor productivity in the mining in ‘resource’ regions are access to the Internet, the use of ‘cloud’ services, as well as involvement in research and development; for ‘non-resource’ regions significant factors are the use of local computer networks, regional ICT subsidies, and the purchase of computing equipment. For the manufacturing, the key factors are access to the Internet, the share of high-tech businesses in the regional economy, the purchase of computing equipment, and the use of the services of third-party organizations and ICT specialists
APA, Harvard, Vancouver, ISO, and other styles
15

Anoop, S., and Dr J. Amar Pratap Singh. "A LSTM Approach for Secure Energy Efficient Computational Offloading in Mobile Edge Computing." Webology 18, no. 2 (December 23, 2021): 856–74. http://dx.doi.org/10.14704/web/v18i2/web18359.

Full text
Abstract:
Mobile technologies is evolving so rapidly in every aspect, utilizing every single resource in the form of applications which creates advancement in day to day life. This technological advancements overcomes the traditional computing methods which increases communication delay, energy consumption for mobile devices. In today’s world, Mobile Edge Computing is evolving as a scenario for improving in these limitations so as to provide better output to end users. This paper proposed a secure and energy-efficient computational offloading scheme using LSTM. The prediction of the computational tasks done using the LSTM algorithm. A strategy for computation offloading based on the prediction of tasks, and the migration of tasks for the scheme of edge cloud scheduling based on a reinforcement learning routing algorithm help to optimize the edge computing offloading model. Experimental results show that our proposed algorithm Intelligent Energy Efficient Offloading Algorithm (IEEOA), can efficiently decrease total task delay and energy consumption, and bring much security to the devices due to the firewall nature of LSTM.
APA, Harvard, Vancouver, ISO, and other styles
16

Humbley, John. "Review of Ten Hacken (2006): Terminology, Computing and Translation." Terminology 14, no. 2 (December 12, 2008): 261–65. http://dx.doi.org/10.1075/term.14.2.10hum.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ferneley, Elaine, and Ben Light. "Unpacking User Relations in an Emerging Ubiquitous Computing Environment: Introducing the Bystander." Journal of Information Technology 23, no. 3 (September 2008): 163–75. http://dx.doi.org/10.1057/palgrave.jit.2000123.

Full text
Abstract:
The move towards technological ubiquity is allowing a more idiosyncratic and dynamic working environment to emerge that may result in the restructuring of information communication technologies, and changes in their use through different user groups’ actions. Taking a ‘practice’ lens to human agency, we explore the evolving roles of, and relationships between these user groups and their appropriation of emergent technologies by drawing upon Lamb and Kling's social actor framework. To illustrate our argument, we draw upon a study of a UK Fire Brigade that has introduced a variety of technologies in an attempt to move towards embracing mobile and ubiquitous computing. Our analysis of the enactment of such technologies reveals that Bystanders, a group yet to be taken as the central unit of analysis in information systems research, or considered in practice, are emerging as important actors. The research implications of our work relate to the need to further consider Bystanders in deployments other than those that are mobile and ubiquitous. For practice, we suggest that Bystanders require consideration in the systems development life cycle, particularly in terms of design and education in processes of use.
APA, Harvard, Vancouver, ISO, and other styles
18

Drummer, Daniel, Stefan Feuerriegel, and Dirk Neumann. "Crossing the Next Frontier: The Role of ICT in Driving the Financialization of Credit." Journal of Information Technology 32, no. 3 (September 2017): 218–33. http://dx.doi.org/10.1057/s41265-017-0035-9.

Full text
Abstract:
Financialization describes a phenomenon whereby financial markets assume an increasingly dominant role within the economy. This paper seeks to dissect the role of information and communications technology (ICT) in financialization by following a cross-disciplinary approach across finance, economics and information systems. Accordingly, we develop a general framework describing the relationship between ICT and financialization. This framework allows us to investigate the recent rise of online marketplaces for credit. Consequently, ICT is not only facilitating, but fundamentally driving a disintermediation of banks through advances in computing, communication and information technology. We also provide supporting evidence from interviews with almost 40 senior experts and C-level executives. Interestingly, only rather recent innovations have enabled the popularity of marketplace lending, such as cloud computing, big data, scalable IT infrastructures and comprehensive ecosystems of programming interfaces. In contrast, we observe a slow integration of advanced analytics in the field of risk management. Based on our analysis, the paper also discusses cross-country implications for marketplace lending, financialization and regulation.
APA, Harvard, Vancouver, ISO, and other styles
19

Gil de Zúñiga, Homero, and Trevor Diehl. "Citizenship, Social Media, and Big Data." Social Science Computer Review 35, no. 1 (August 3, 2016): 3–9. http://dx.doi.org/10.1177/0894439315619589.

Full text
Abstract:
This special issue of the Social Science Computer Review provides a sample of the latest strategies employing large data sets in social media and political communication research. The proliferation of information communication technologies, social media, and the Internet, alongside the ubiquity of high-performance computing and storage technologies, has ushered in the era of computational social science. However, in no way does the use of “big data” represent a standardized area of inquiry in any field. This article briefly summarizes pressing issues when employing big data for political communication research. Major challenges remain to ensure the validity and generalizability of findings. Strong theoretical arguments are still a central part of conducting meaningful research. In addition, ethical practices concerning how data are collected remain an area of open discussion. The article surveys studies that offer unique and creative ways to combine methods and introduce new tools while at the same time address some solutions to ethical questions.
APA, Harvard, Vancouver, ISO, and other styles
20

Popoveniuc, Bogdan. "Personal and Moral Identity in the 4th Space: Implications for Conspiracy Theories." Filozofia i Nauka Zeszyt specjalny, no. 10 (May 10, 2022): 157–86. http://dx.doi.org/10.37240/fin.2022.10.zs.7.

Full text
Abstract:
The 4th Space concept is a very challenging and puzzling one. The tremendous technological progress of Information and Communication Technologies (ICTs) or Computer-Mediated Communication (CMC), ubiquitous computing, and Extended Reality (XR) make the Gibsonian Cyberspace Matrix an imminent reality in the future. Although, some features can be made more salient, the structure, but most importantly, the effects of living in such environment for human consciousness and morality is almost impossible to predict. Hence, the requisite of a proactionary and comprehensive scientific and technical paradigm for designing the 4th Space, in order to facilitate the adaptation of human species to the brave new technological world, while preserving the humanness and humanism of the humans.
APA, Harvard, Vancouver, ISO, and other styles
21

Lepage-Richer, Théo, and Fenwick McKelvey. "States of computing: On government organization and artificial intelligence in Canada." Big Data & Society 9, no. 2 (July 2022): 205395172211233. http://dx.doi.org/10.1177/20539517221123304.

Full text
Abstract:
With technologies like machine learning and data analytics being deployed as privileged means to improve how contemporary bureaucracies work, many governments around the world have turned to artificial intelligence as a tool of statecraft. In that context, our paper uses Canada as a critical case to investigate the relationship between ideals of good government and good technology. We do so through not one, but two Trudeaus—celebrity Prime Minister Justin Trudeau (2015—…) and his equally famous father, former Prime Minister Pierre Elliott Trudeau (1968–1979, 1980–1984). Both shared a similar interest in new ideas and practices of both intelligent government and artificial intelligence. Influenced by Marshall McLuhan and his media theory, Pierre Elliott Trudeau deployed new communication technologies to restore centralized control in an otherwise decentralized state. Partly successful, he left his son with an informationally inclined political legacy, which decades later animated Justin Trudeau's own turn toward Big Data and artificial intelligence. Compared with one another, these two visions for both government and artificial intelligence illustrate the broader tensions between cybernetic and neoliberal approaches to government, which inform how new technologies are conceived of, and adopted, as political ones. As this article argues, Canada offers a paradigmatic case for how artificial intelligence is as much shaped by theories of government as by investments and innovations in computing research, which together delimit the contours of intelligence by defining which technical systems, people, and organizations come to be recognized as its privileged bearers.
APA, Harvard, Vancouver, ISO, and other styles
22

Adu, Kofi Koranteng, and Patrick Ngulube. "Preserving the digital heritage of public institutions in Ghana in the wake of electronic government." Library Hi Tech 34, no. 4 (November 21, 2016): 748–63. http://dx.doi.org/10.1108/lht-07-2016-0077.

Full text
Abstract:
Purpose The purpose of this paper is to examine digital preservation of e-government in Ghana under the research question: what are the current digital preservation strategies being deployed across the ministries and agencies in Ghana? Design/methodology/approach Guided by a conceptual framework, underpinned by a quantitative approach, the paper uses the survey approach, to address the digital preservation strategies deployed across public sector organisations in Ghana. It underscores the link between the conceptual framework and the literature to analyse the various digital preservation strategies. Findings Backup strategy, migration, metadata and trusted repositories were noted as the most widely implemented preservation strategies across the ministries and agencies. On the other hand, cloud computing, refreshing and emulation were the least implemented strategies used to address the digital preservation challenges. Research limitations/implications The paper adds to the existing conceptual underpinnings that have dominated the debate about data management, archival storage, preservation strategies, challenges and best practices of digital preservation of e-government. Originality/value This study draws its originality from the evidence of studies on digital preservation in Ghana as most studies have rather focussed on the preservation of documentary heritage, preservation and security of microfilms, preservation practices in the public records (Akussah, 2002; Ampofo, 2009; Festus, 2010). The emergence of this study addresses the knowledge gap in the preservation of digital records in a country where little attention has been accorded to digital preservation. The study also feeds into Ghana’s vision 2020 and the information communication technology policy document of the ministry of communication which aims at ensuring that Ghanaians have access to information and communication technology products and services.
APA, Harvard, Vancouver, ISO, and other styles
23

Et al., A. A. Abd El-Aziz. "Information Systems Outcomes based Assessment at Jouf University for ABET Accreditation." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 1675–88. http://dx.doi.org/10.17762/turcomat.v12i6.3375.

Full text
Abstract:
The Accreditation Board for Engineering and Technology (ABET) Criteria for Computing Accreditation Commission Programs are based upon knowledge, presentation skills, communication skills, team work and leadership skills that the students gain through the curriculum in a program. The student outcomes (SOs) are the procured skills and knowledge which the student accomplishes through the curriculum. Each program needs to have its own SOs and to evaluate it as per defined assessment cycle, just as to accomplish program educational objectives (PEOs). The continuous improvement plan depended on assessment and evaluation of the program SOs and PEOs. In this paper, an advancement cycle for continuous improvement, for Information systems (IS) program at College of Computer and Information Sciences (CIS), Jouf University, Sakaka, Aljouf, Saudi Arabia, to accomplish the accreditation is discussed. The proposed cycle is appropriate to get the accreditation for bachelor program in information systems discipline and to fulfill the ABET criteria. In result, we will show how the SOs and PEOs were surveyed and assessed through curriculum accordingly. Based on these processes, ABET team has visited CIS college, which had accomplished extraordinary achievement and all of the programs have completely accredited on August 2018 and the next visit to the computing and engineering programs will be on 2026.
APA, Harvard, Vancouver, ISO, and other styles
24

Valentín Ruiz, Francisco José, and Robert Torre-Marín Amorós. "Aplicación de tecnología cloud computing en bibliotecas y centros de documentación." Ibersid: revista de sistemas de información y documentación 7 (September 21, 2013): 41–47. http://dx.doi.org/10.54886/ibersid.v7i0.4062.

Full text
Abstract:
La evolución de la automatización de bibliotecas establecida en cuatro periodos —pre-MARC, después de OCLC, después de Internet y socialización de Internet— permite explicar la aparición del cloud computing aplicado a bibliotecas y centros de documentación como un servicio alternativo a los tradicionales sistemas integrados de gestión de bibliotecas (SIGB). En base a esta evolución, se analizan las ventajas e inconvenientes de los servicios en la nube. Estas características se ponen en relación con dos de los servicios de OCLC: WorldShare para bibliotecas y CONTENTdm de gestión de contenidos digitales. De estos dos servicios se ofrecen ejemplos de uso.
APA, Harvard, Vancouver, ISO, and other styles
25

Kovalenko, Vadim, Anna Rodakova, Hamza Mohammed Ridha Al-Khafaji, Artem Volkov, Ammar Muthanna, and Andrey Koucheryavy. "Resource Allocation Computing Algorithm for UAV Dynamical Statements based on AI Technology." Webology 19, no. 1 (January 20, 2022): 2307–19. http://dx.doi.org/10.14704/web/v19i1/web19157.

Full text
Abstract:
An unmanned aerial vehicle (UAV) is one of the complex and relevant communication networks of 5G and 2030 networks. Development of technologies for virtualization (NFV), containerization and orchestration of data systems. NFV technology can be implemented not only in the data center but also on the switch or router. Thus, by analogy with the above-described trend, flying network segments can also use computing power to solve any problems. For example, deployment on virtual distributed capacities of a flying station controller, an internal network controller. Within the framework of this direction, there are a number of interrelated tasks that need to be resolved by the trends and capabilities of Artificial Intelligence technologies. This paper proposes an algorithm for searching for computing resources in real time. The article defined the criteria for choosing the head node and the cluster with the highest total resources, considered the possibility of implementing the function of the SDN controller in the UAV cluster, the main possible functions and tasks of the UAV, proposed a three-level architecture based on the separation of the functions performed by the UAV. In this work, simulation was carried out in the Matlab program to detect areas of increased load, form UAV clusters, select a head node in clusters and select one UAV cluster with the highest total resources for its subsequent migration to the area of increased load.
APA, Harvard, Vancouver, ISO, and other styles
26

Yin, Yifeng, Zhaobo Wang, Wanyi Zhou, Yong Gan, and Yanhua Zhang. "Group key agreement protocol for edge computing in industrial internet." Mathematical Biosciences and Engineering 19, no. 12 (2022): 12730–43. http://dx.doi.org/10.3934/mbe.2022594.

Full text
Abstract:
<abstract><p>Industrial internet security is a critical component of cyberspace safety. Furthermore, the encryption protocol is a critical component of cyberspace security. Due to the rapid development of industrial internet and edge computing, increasingly more devices are outsourcing their data to cloud servers to save costs. Edge devices should have a secure session key to reduce communication costs and share information. However, most key generation and storage are completed by a centralized third-party organization, which carries some security risks. In this context, this paper will propose a lightweight multi-dimensional virtual iteration of the group key agreement protocol. Group key agreement protocol allows for one-at-a-time encryption and timely key updates without the involvement of a trusted third party, and each device in the network can agreement a large number of keys. According to the analysis of this protocol, it has high security, rapid computation speed, and little storage space.</p></abstract>
APA, Harvard, Vancouver, ISO, and other styles
27

Yao, Yuan, Zhiguo Jiang, Haopeng Zhang, and Yu Zhou. "On-Board Ship Detection in Micro-Nano Satellite Based on Deep Learning and COTS Component." Remote Sensing 11, no. 7 (March 29, 2019): 762. http://dx.doi.org/10.3390/rs11070762.

Full text
Abstract:
Micro-nano satellites have provided a large amount of remote sensing images for many earth observation applications. However, the hysteresis of satellite-ground mutual communication of massive remote sensing images and the low efficiency of traditional information processing flow have become the bottlenecks for the further development of micro-nano satellites. To solve this problem, this paper proposes an on-board ship detection scheme based on deep learning and Commercial Off-The-Shelf (COTS) component, which can be used to achieve near real-time on-board processing by micro-nano satellite computing platform. The on-board ship detection algorithm based on deep learning consists of a feature extraction network, Region Proposal Network (RPN) with square anchors, Global Average Pooling (GAP), and Bigger-Left Non-Maximum Suppression (BL-NMS). With the help of high performance COTS components, the proposed scheme can extract target patches and valuable information from remote sensing images quickly and accurately. A ground demonstration and verification system is built to verify the feasibility and effectiveness of our scheme. Our method achieves the performance with 95.9% recall and 80.5% precision in our dataset. Experimental results show that the scheme has a good application prospect in micro-nano satellites with limited power and computing resources.
APA, Harvard, Vancouver, ISO, and other styles
28

Boenig-Liptsin, Margarita. "Aiming at the good life in the datafied world: A co-productionist framework of ethics." Big Data & Society 9, no. 2 (July 2022): 205395172211397. http://dx.doi.org/10.1177/20539517221139782.

Full text
Abstract:
This article proposes an ethical framework to navigate life in the datafied world that combines the relational ethics approach of the philosopher Paul Ricoeur with the idiom of co-production from the field of Science and Technology Studies (STS). Mainstream data and computing ethics approaches, which tend to view ethics itself as a technology to produce particular outcomes, fail to adequately consider the context of the datafied world for ethics. The datafied world is a condition in which data and computing technologies form the ineluctable infrastructure for daily life, structuring social order, forming power relations, and supporting visions of desirable futures. I argue that the datafied world is not just a background upon which ethics unfolds, rather it demands a novel framework for ethics that understands the contexts of data and computing technologies and their consequences for human action. The idiom of co-production suggests how action gets tied to visions of the good in the datafied world. In particular, it draws attention to the evolution of these actions in the identities, institutions, representations, and discourses of the social world, creating specific forms of life and meaning in datafied societies.
APA, Harvard, Vancouver, ISO, and other styles
29

Ткачук, Вікторія, Вадим Щокін, and Віталій Тронь. "The Model of Use of Mobile Information and Communication Technologies in Learning Computer Sciences to Future Professionals in Engineering Pedagogy." Педагогіка вищої та середньої школи 51 (December 13, 2018): 136–46. http://dx.doi.org/10.31812/pedag.v51i0.3663.

Full text
Abstract:
Tkachuk V.V., Shchokin V.P. and Tron V.V. The Model of Use of Mobile Information and Communication Technologies in Learning Computer Sciences to Future Professionals in Engineering Pedagogy. Research goal: the research is aimed at developing a model of use of mobile ICT in learning Computer Sciences to future professionals in Engineering Pedagogy. Object of research is the model of use of mobileICT in learning Computer Sciences to future professionals in Engineering Pedagogy. Results of the research: the developed model of use of mobile ICT as tools of learning Computer Sciences to future professionals in Engineering Pedagogy is based on the competency-based, person-centered and systemic approaches considering principles of vocational education, general didactic principles, principles of Computer Science learning, and principles of mobile learning. It also takes into account current conditions and trends of mobile ICT development. The model comprises four blocks: the purpose-oriented block, the content-technological block, the diagnostic block and the result-oriented block. According to the model, the learning content of Computer Sciences consists of 5 main units: 1) Fundamentals of Computer Science; 2) Architecture of Modern Computers; 3) Fundamentals of Algorithmization and Programming; 4) Software of Computing Systems; 5) Computer Technologies in the Professional Activity of Engineer-pedagogues.
APA, Harvard, Vancouver, ISO, and other styles
30

Al-Aufi, Ali, and Crystal Fulton. "Impact of social networking tools on scholarly communication: a cross-institutional study." Electronic Library 33, no. 2 (April 7, 2015): 224–41. http://dx.doi.org/10.1108/el-05-2013-0093.

Full text
Abstract:
Purpose – This paper aims to investigate the extent to which social networking tools had an impact on academics’ patterns of informal scholarly communication in humanities and social science disciplines. Social networking tools, reinforced by proliferation and advances in portable computing and wireless technologies, have reshaped how information is produced, communicated and consumed. Design/methodology/approach – A cross-institutional quantitative study utilized an online questionnaire survey sent to 382 academics affiliated with humanities and social science disciplines in two different academic institutions: one that belongs to a Western tradition of scholarly communication in Ireland, and the other to a developing country in Oman. Descriptive interpretation of data compared findings from both universities. Frequencies, percentages and means were displayed in tables to enhance the meaning of collected data. Inferential analysis was also conducted to determine statistical significance. Findings – Overall findings indicate progressive use of social networking tools for informal scholarly communication. There is perceived usefulness on the impact of social networking tools on patterns of informal scholarly communication. However, nearly one-third of the respondents have never used social networking tools for informal scholarly communication. Institution-based data comparison revealed no significant differences on data except for few activities of informal scholarly communication. Research limitations/implications – Given that the number of study subjects was eventually small (total = 382) and that academics by their very nature are disinclined to respond to online surveys, results of the study may suggest non-response errors, and these may impact negatively on the acceptability of inferences and statistical conclusions. The results of the study are, therefore, unlikely to be useful for generalization, but they remain suggestive of a growing tendency among humanities and social sciences’ academics to use social networking tools for informal scholarly communication. Originality/value – Empirical findings provide a broad understanding about the potential of social networking tools on informal scholarly communication in areas of humanities and social sciences disciplines. Multi-disciplinary investigation and qualitative studies may further deepen our understanding of the impact of social networking tools on patterns of scholarly communication.
APA, Harvard, Vancouver, ISO, and other styles
31

Sabbar, Bayan M. "Quantum Inspired Genetic Algorithm Model based Automatic Modulation Classification." Webology 18, Special Issue 04 (September 30, 2021): 1070–85. http://dx.doi.org/10.14704/web/v18si04/web18182.

Full text
Abstract:
The popularity of automatic modulation categorization (AMC) is high in recent years owing to the many advantages. When it comes to communication, reliability in an AMC is very critical. Increasing the amount of signals exponentially increases the cost of using the AMC. Precise classification methods, such as neural network, in which either the parameters of the neural network or the dimensions of the input or output variables are modified dynamically, are not successful in obtaining high accuracy results. To improve the accuracy of the modulation categorization, this study employs a "QIGA" feature selection model based on Quantum (inspired) Genetic Algorithm (QIGA). QIGA is used to choose the correct functionality, and to limit the number of examples that must be learned so that the overall system time is shortened and the cost of computing is reduced. Selecting excellent characteristics is enhanced via quantum computing, and this is done to lower the complexity of the solutions. The internal validation results demonstrated that the QIGA model significantly improved the statistical match quality and significantly outperformed the other models.
APA, Harvard, Vancouver, ISO, and other styles
32

Ghazzawi, Nizar, Benoît Robichaud, Patrick Drouin, and Fatiha Sadat. "Automatic extraction of specialized verbal units." Terminology 23, no. 2 (December 31, 2017): 207–37. http://dx.doi.org/10.1075/term.00002.gha.

Full text
Abstract:
Abstract This paper presents a methodology for the automatic extraction of specialized Arabic, English and French verbs of the field of computing. Since nominal terms are predominant in terminology, our interest is to explore to what extent verbs can also be part of a terminological analysis. Hence, our objective is to verify how an existing extraction tool will perform when it comes to specialized verbs in a given specialized domain. Furthermore, we want to investigate any particularities that a language can represent regarding verbal terms from the automatic extraction perspective. Our choice to operate on three different languages reflects our desire to see whether the chosen tool can perform better on one language compared to the others. Moreover, given that Arabic is a morphologically rich and complex language, we consider investigating the results yielded by the extraction tool. The extractor used for our experiment is TermoStat (Drouin 2003). So far, our results show that the extraction of verbs of computing represents certain differences in terms of quality and particularities of these units in this specialized domain between the languages under question.
APA, Harvard, Vancouver, ISO, and other styles
33

S., Annie Christila, and Dr Sivakumar R. "An Empirical Review of DDOS Attack Mitigation System on SDN Using Cloud Environment." Webology 19, no. 1 (January 20, 2022): 283–94. http://dx.doi.org/10.14704/web/v19i1/web19022.

Full text
Abstract:
The separation of the control plane and the network data plane from the network defined by the software is making it easier for network management. As a result, SDN can be used in a variety of network settings, including network hiring networks. However, the construction of the novel network raises new security issues. Dedicated Shared Denial (DDoS) is easy to distribute and hard to protect on standard networks; on SDN networks, it can bypass the central controllers and bring the entire network down. Cloud computing has emerged as a modern and exciting computer space over the past decade, providing an affordable and awesome computer space. SDN technology combined with cloud computing highlights the challenges of cloud communication and enhances cloud adaptability, configuration, intelligence, and extreme density. Sensitive features of SDN, such as global network coverage, software-based traffic analysis, integrated network management, etc., greatly enhance the acquisition of DDoS cloud capabilities and scalability capabilities. In this study, a major effort was made to compare the various solutions currently available for programs to reduce DDoS attacks in cloud environments using SDN and provided performance tests such as detection rate, recovery time and False positive Rate.
APA, Harvard, Vancouver, ISO, and other styles
34

Padmaja, K., and K. Padmaja. "Radial Basis Kernel Regressive Feature Extraction and Robert Ensembled Brown Boost Classifier for Attack Detection in Cloud Environment." Webology 18, no. 2 (December 23, 2021): 41–59. http://dx.doi.org/10.14704/web/v18i2/web18306.

Full text
Abstract:
Cloud computing shares the resource in information technology field. The existing technique is failed to provide better results for identifying unknown attacks with higher accuracy and lesser time consumption. In order to address these problems, Radial Basis Kernel Regressive Feature Extracted Brown Boost Classification (RBKRFEBBC) method is introduced for performing the attack detection in cloud computing. The main objective of RBKRFEBBC method is to improve the attack detection performance with higher accuracy and minimal time consumption. Dichotomous radial basis kernelized regressive function is used in RBKRFEBBC method to extract the relevant features through determining the correlation between the output and one or more input variables (i.e., features of patient transaction data). After extracting relevant features, GRNBBC algorithm is used in RBKRFEBBC method to improve the secured data communication performance through classifying the patient data transaction as attack presence or attack absence. By this way, attack detection is carried out in accurate manner. Experimental evaluation is carried out by NSL-KDD dataset using different metrics like attack detection accuracy, attack detection time and error rate. The evaluation result shows RBKRFEBBC method improves the accuracy and minimizes the time consumption as well as error rate than existing works.
APA, Harvard, Vancouver, ISO, and other styles
35

Frasheri, Neki, and Emanouil Atanassov. "An Analysis for Parallel Wind Simulation Speedup using OpenFOAM." Scalable Computing: Practice and Experience 19, no. 2 (May 10, 2018): 97–105. http://dx.doi.org/10.12694/scpe.v19i2.1342.

Full text
Abstract:
An analysis of speedup for parallel execution of OpenFOAM software for wind simulation over rugged terrain is presented in the paper. Runtime speedup is analyzed using small and medium resolution DEM models for icoFoam and pisoFoam solvers, the latter due to consideration of turbulence, running in the parallel system Avitohol of Institute of Information and Communication Technologies of the Bulgarian Academy of Sciences. The results gave a clearer view about the possibility to run in reasonable time medium and high resolution models in regional scale, while indicating the weight of turbulence calculations for computing runtime requirements.
APA, Harvard, Vancouver, ISO, and other styles
36

Piotelat, Elisabeth, and Florence Raulin Cerceau. "New SETI prospects opened up by current information networking." International Journal of Astrobiology 12, no. 3 (June 20, 2013): 208–11. http://dx.doi.org/10.1017/s1473550413000141.

Full text
Abstract:
AbstractThis paper discusses ideas that impact the fc factor as defined by Frank Drake in 1961, i.e. the fraction of planets with intelligent creatures capable of interstellar communication. This factor remains one of the most speculative terms of the equation. We suggest that the ability of sharing information is an important parameter to take into account in evaluating the tendency of a civilization to make contact (or share data) with other civilizations. Thus, we give special consideration to the fraction of planets with intelligent creatures capable of producing and sharing large amount of data. First, we determine the level of our own civilization in the framework of Sagan's energy- and information-based classification, by taking into account the recent improvements in computing and networking technologies. Second, we distinguish two types of organization, hierarchical and heterarchical, with respect to information sharing. We illustrate this distinction in the case of SETI and we show that the probability to detect a civilization would be greater if it is heterarchical than if it is hierarchical and if we utilize heterarchical principles for SETI.
APA, Harvard, Vancouver, ISO, and other styles
37

Shin, Dong-Hee. "Ubiquitous city: Urban technologies, urban infrastructure and urban informatics." Journal of Information Science 35, no. 5 (September 15, 2009): 515–26. http://dx.doi.org/10.1177/0165551509100832.

Full text
Abstract:
South Korea continues to lead the way in digital opportunity with its recent, innovative and ubiquitous city projects. The u-city initiative in South Korea is a national urban development project that focuses on strengthening the role of information and communication technologies in civic planning and management. This study tracks the changing dynamics driving the information society initiative of South Korea to evaluate the process of design and development of u-city. This study reviews qualitative data related to the u-city projects, describes the transformations and translation of this data in the public, political, and social discourse, and discusses the prospectus of a ubiquitous information society environment. The findings raise fundamental, practical questions about the role of ubiquitous computing in shaping our future cities. The findings show that there are more challenges ahead than prospects, despite the fact that the u-city has all the advanced technological components for a positive development. The South Korean u-city is typically more prone to problems related to the lack of social infrastructure, market restrictions, political quagmires and vested financial interests. The paper discusses the deficiencies of the South Korean approach, namely a lack of holistic approach by integrating technological possibilities with social application needs.
APA, Harvard, Vancouver, ISO, and other styles
38

Lahlou, Saadi. "Identity, social status, privacy and face-keeping in digital society." Social Science Information 47, no. 3 (September 2008): 299–330. http://dx.doi.org/10.1177/0539018408092575.

Full text
Abstract:
Digitization of society raises concerns about privacy. This article first describes privacy threats of life-logging. It gives the technically novice reader a quick overview of what information and communication technology (ICT) is currently preparing for society, based on state-of-the art research in the industry laboratories: ubiquitous computing, aware environments, the Internet of Things, and so on. We explain how geolocation systems work and how they can provide detailed accounts of personal activity that will deeply affect privacy. At present, system designers rarely implement privacy-enhancing technologies — we explain why, based on empirical research. On the other hand, users, while expressing concern, do not protect themselves in practice — we list reasons for this. The problem is complex because the very nature of identity and social relations works against protecting personal data; this is the privacy dilemma. At least two key mechanisms in the production of good interaction and in the construction of social status are based on personal data disclosure. Then we discuss the nature of privacy, based on field observation. Privacy loss can be seen as `losing face'. We detail this notion, based on a discussion of the notion of face, and especially the Asian social construct of `Chemyon'. We then propose a new, positive, definition of privacy as `keeping face'. This positive notion can be used to build constructive guidelines for enhancing privacy in systems design, compatible with the way designers perceive their role. These guidelines are presented in an annex, after a short conclusion that advocates a constructive — perhaps risky — role for social science in the construction of future information and communication technology. 1
APA, Harvard, Vancouver, ISO, and other styles
39

Raja, M., Dr S. Dhanasekaran, and Dr V. Vasudevan. "Light Weight Cryptography based Medical Data and Image Encryption Scheme." Webology 18, no. 2 (December 23, 2021): 88–104. http://dx.doi.org/10.14704/web/v18i2/web18309.

Full text
Abstract:
Many medical companies use cloud technology to collect, distribute and transmit medical records. Given the need for medical information, confidentiality is a key issue. In this study, we propose an encrypted scheme based on encrypted data for an electronic healthcare environment. We use hybrid Attribute based encryption and Triple DES encryption technique (ABETDES) scheme, including identity-based cryptography (IBC), to ensure data privacy through communication channels և to improve the reliability of cloud computing. There are also limited indicators of light processing and storage resources. This solves a serious maintenance problem and ensures that a private key is created where it is not blind. The introduction of a security option, a comprehensive security analysis to protect ciphertext, shows that our program is effective against many known attacks and compared to existing methods.
APA, Harvard, Vancouver, ISO, and other styles
40

Demianenko, V. B. "Trends in the use of cloud computing technologies to create personalized learning trajectories for students of the Minor Academy of Sciences of Ukraine." CTE Workshop Proceedings 1 (March 21, 2013): 84–86. http://dx.doi.org/10.55056/cte.139.

Full text
Abstract:
In recent years, reform trends have been noticeable in the system of extracurricular education: the goal is to create a new system of education that promotes personal professional self-determination of children, their adaptation to life in a dynamic information society, development of creative abilities, and involvement in culture. Personality-oriented education is not the formation of a personality with predetermined properties, but the creation of favorable conditions for the full identification and development of personal functions of the student. Among the most fruitful applications of the computer Y. I. Mashbitz notes the importance of implementing problem-based learning; forming creative thinking of schoolchildren, their readiness for creative work. M.I. Zhaldak stresses that the use of ICTs in the learning process "should not be concerned only with the study of certain curriculum material, but above all with the all-round and harmonious development of students' personalities, their creative abilities". V. Yu. Bykov notes that in recent years, further dynamic development acquire means and technologies of information and communication networks, in particular, the Internet, forming a computer and technological platform of the educational environment of modern education, especially open. On this basis, the subject-technological organization of information educational space is carried out, the processes of accumulation and storage of various subject collections of electronic computing resources are put in order, equal access to them for students is provided, ICT-support of learning processes, scientific research and education management is significantly improved.
APA, Harvard, Vancouver, ISO, and other styles
41

Konikov, Alexander I. "Teaching advanced methods of signal processing and transmission at universities of civil engineering." Stroitel'stvo: nauka i obrazovanie [Construction: Science and Education] 11, no. 1 (March 30, 2021): 63–72. http://dx.doi.org/10.22227/2305-5502.2021.1.5.

Full text
Abstract:
Introduction. Development and widespread dissemination of information technologies, including the Internet, mobile communications, cloud computing, Big Data, the Internet of Things, digital twin, etc. are being proactively introduced into versatile production and business processes of the construction industry. Therefore, a graduate of a civil engineering university must master the fundamentals of the above-listed technologies and know how to use them in his/her practical activities. It’s particularly important for those specialities that deal with information technologies in civil engineering. However, a number of important areas of knowledge that serve as the basis for mobile communications, the Internet, and wireless technologies, are only taught at specialized universities and schools. Nevertheless, students of civil engineering universities need to understand the theoretical provisions and processes of information technologies. Materials and methods. Systematization, the benchmark method, theoretical generalization of data extracted from literary sources were applied. Results. The founding notions, needed to discuss digital technologies, encompass temporary signal notation, spectral characteristics, spectral bandwidth, time and frequency division, multiplexing, discrete sampling and quantization of a signal. It is impossible to successfully study and effectively use these advanced technologies without having understood these fundamental technologies. The author offers a simplified explanation of these notions and principal processes in terms of their application in the construction industry. Conclusions. The author addresses complicated issues of the theory of signals and their transmission over communication lines. He presents the three key ideas that serve as the basis for multiple advanced information technologies, including time and spectrum signal notation, time and frequency division, multiplexing, discrete sampling and quantization of a signal. The author’s ideas can be used to teach mobile technologies, the Internet, the Internet of Things, cloud and edge computing, digital twin, etc.
APA, Harvard, Vancouver, ISO, and other styles
42

Lee, Kiwon, and Kwangseob Kim. "A Performance Evaluation of a Geo-Spatial Image Processing Service Based on Open Source PaaS Cloud Computing Using Cloud Foundry on OpenStack." Remote Sensing 10, no. 8 (August 13, 2018): 1274. http://dx.doi.org/10.3390/rs10081274.

Full text
Abstract:
Recently, web application services based on cloud computing technologies are being offered. In the web-based application field of geo-spatial data management or processing, data processing services are produced or operated using various information communication technologies. Platform-as-a-Service (PaaS) is a type of cloud computing service model that provides a platform that allows service providers to implement, execute, and manage applications without the complexity of establishing and maintaining the lower-level infrastructure components, typically related to application development and launching. There are advantages, in terms of cost-effectiveness and service development expansion, of applying non-proprietary PaaS cloud computing. Nevertheless, there have not been many studies on the use of PaaS technologies to build geo-spatial application services. This study was based on open source PaaS technologies used in a geo-spatial image processing service, and it aimed to evaluate the performance of that service in relation to the Web Processing Service (WPS) 2.0 specification, based on the Open Geospatial Consortium (OGC) after a test application deployment using the configured service supported by a cloud environment. Using these components, the performance of an edge extraction algorithm on the test system in three cases, of 300, 500, and 700 threads, was assessed through a comparison test with another test system, in the same three cases, using Infrastructure-as-a-Service (IaaS) without Load Balancer-as-a-Service (LBaaS). According to the experiment results, in all the test cases of WPS execution considered in this study, the PaaS-based geo-spatial service had a greater performance and lower error rates than the IaaS-based cloud without LBaaS.
APA, Harvard, Vancouver, ISO, and other styles
43

Jung, Yujin, Eunsun Choi, and Namje Park. "Educational Aids for Teaching Hacking Principles to Strengthen Computational Thinking Skills to Elementary." Webology 19, no. 1 (January 20, 2022): 4527–36. http://dx.doi.org/10.14704/web/v19i1/web19299.

Full text
Abstract:
Modern society is changing into an era of digital transformation with the development of advanced information and communication technology (ICT) and information systems. Various information is digitized and stored, and the value of information is increasing. As the value of information increases, hackers' techniques to take advantage of unfair profits using them are subdivided and advanced, causing unexpected big problems in society. In particular, it was noted that cases in which elementary school students, a digital native generation, are often reported to be involved in crimes. Therefore, based on the basic concepts and principles of computing for elementary school students, we developed a learning teaching tool that can provide hacking-related education in an interesting way using gamification based on computing thinking ability that can efficiently solve unexpected problems. The learning goal was set for the development of educational aids by analyzing the cyber-attack process, and the game material was selected by applying the information security hacking principle learning to Samuel Livingstone's simulation game model. Then, we set game figures, roles, resources, external factors, and goals of the educational game and designed game boards, mission papers, and worksheets. We also established the game rules using the game data designed. Lastly, we found complementary points with security experts and education experts to supplement the learning aid while running the game. This paper helped learners to understand the security equipment applied in the network environment. In the end, we developed a teaching aid that can strengthen learners' computational thinking and understand hacking principles. This game ensures infinite scalability of the challenge by having students perform three missions per challenge. The educational aids proposed in this paper are limited at the primary level that elementary school students can understand. However, it can be designed and extended to infer interleaving by combining transaction and lock functions.
APA, Harvard, Vancouver, ISO, and other styles
44

Zhang, Kaisa, Gang Chuai, Jinxi Zhang, Xiangyu Chen, Zhiwei Si, and Saidiwaerdi Maimaiti. "DIC-ST: A Hybrid Prediction Framework Based on Causal Structure Learning for Cellular Traffic and Its Application in Urban Computing." Remote Sensing 14, no. 6 (March 16, 2022): 1439. http://dx.doi.org/10.3390/rs14061439.

Full text
Abstract:
The development of technology has strongly affected regional urbanization. With development of mobile communication technology, intelligent devices have become increasingly widely used in people’s lives. The application of big data in urban computing is multidimensional; it has been involved in different fields, such as urban planning, network optimization, intelligent transportation, energy consumption and so on. Data analysis becomes particularly important for wireless networks. In this paper, a method for analyzing cellular traffic data was proposed. Firstly, a method to extract trend components, periodic components and essential components from complex traffic time series was proposed. Secondly, we introduced causality data mining. Different from traditional time series causality analysis, the depth of causal mining was increased. We conducted causality verification on different components of time series and the results showed that the causal relationship between base stations is different in trend component, periodic component and essential component in urban wireless network. This is crucial for urban planning and network management. Thirdly, DIC-ST: a spatial temporal time series prediction based on decomposition and integration system with causal structure learning was proposed by combining GCN. Final results showed that the proposed method significantly improves the accuracy of cellular traffic prediction. At the same time, this method can play a crucial role for urban computing in network management, intelligent transportation, base station siting and energy consumption when combined with remote sensing map information.
APA, Harvard, Vancouver, ISO, and other styles
45

Nikkhah, Sarah, Swaroop John, Krishna Supradeep Yalamarti, Emily L. Mueller, and Andrew D. Miller. "Family Care Coordination in the Children's Hospital: Phases and Cycles in the Pediatric Cancer Caregiving Journey." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (November 7, 2022): 1–30. http://dx.doi.org/10.1145/3555187.

Full text
Abstract:
When a child is hospitalized with a serious illness, their family members must process emotional stress, quickly absorb complicated clinical information, and take on new caregiving tasks. They also have to coordinate with each other and with other family caregivers without abandoning existing work and home life responsibilities. Previous CSCW and HCI research has shown how the patient's experience changes across the illness journey, but less is known about the effect of this journey on family caregivers and their coordination work. CSCW technologies could support and augment family care coordination work across the journey, reducing stress levels and improving families' ability to stay connected and informed. In this paper, we report findings from an interview study we conducted with 14 parents of children undergoing extended hospitalization for cancer treatment. We propose the concept of caregiving coordination journeys and describe caregivers' current communication and coordination practices across different phases of the hospitalization journey, from diagnosis and early hospitalization to extended hospitalization and beyond. We characterize families' caregiving coordination routines across different time scales, and describe the current role of communication technologies in families' coordination practices. We then propose design opportunities for social computing technologies to support and augment families' communication and caregiving work during the hospitalization journey of their child.
APA, Harvard, Vancouver, ISO, and other styles
46

Makori, Elisha Ondieki. "Promoting innovation and application of internet of things in academic and research information organizations." Library Review 66, no. 8/9 (November 7, 2017): 655–78. http://dx.doi.org/10.1108/lr-01-2017-0002.

Full text
Abstract:
Purpose The purpose of the study was to investigate factors promoting innovation and application of internet of things in academic and research information organizations. Design/methodology/approach Quantitative research design involved survey of selected academic and research information organizations in public and private chartered institutions. Information professionals, digital content managers, information systems and technologists that normally consume big data and technological resources were involved in the process of data collection using structured questionnaire and content analysis. Information organizations and information practitioners were selected from public and private academic and research institutions. Findings Innovation of internet of things has increasingly transformed and changed academic and research information organizations as the source of knowledge in addition to expanding access to education, data, information and communication anywhere anytime through hyperconnectivity and networking. Internet of things technologies such as mobile of things, web of things, digital information systems and personal devices are widely applied by digital natives in academic and research information organizations. Mobilization platform and devices is the single biggest provider of data, information and knowledge in academic and research organizations. Modern trends in education and knowledge practices in academic institutions and information organizations depends upon internet of things, digital repositories, electronic books and journals, social media interfaces, multimedia applications, information portal hubs and interactive websites, although challenges regarding inadequate information communication technology infrastructure and social computing facilities still persist. Research limitations/implications Information organizations in public and private chartered academic and research institutions were adopted in the study. Respondents handling and supporting information management, planning and decision-making provided the necessary data. Information professionals, digital content managers, information systems and technologists are proactively involved in data and information analytics. Practical implications Academic and research information organizations are powerhouses that provide knowledge to support research, teaching and learning for sustainable development and the betterment of humanity and society. Innovation of internet of things and associated technologies provides practical aspects of attaining sustainable information development practices in the contemporary knowledge society. Internet of things technologies, principles of economies of scale and investment and customer needs entail that information organizations and practitioners should provide appropriate and smart systems and solutions. Social implications Modern academic and research information organizations have the social corporate responsibility to offer technological innovations to heighten access to knowledge and learning in academic and research institutions. Economically, innovation and application of internet of things provide unlimited access to big data and information in organizations all the time anywhere anytime. Originality/value Data management is a growing phenomenon that information practitioners need to fully understand in the digital economies. Information professionals need to embrace and appreciate innovation and application of internet of things technologies whose role in sustainable development practices is critical in academic and research organizations.
APA, Harvard, Vancouver, ISO, and other styles
47

Farooq, Ahmad, Uman Khalid, Junaid ur Rehman, and Hyundong Shin. "Robust Quantum State Tomography Method for Quantum Sensing." Sensors 22, no. 7 (March 30, 2022): 2669. http://dx.doi.org/10.3390/s22072669.

Full text
Abstract:
Reliable and efficient reconstruction of pure quantum states under the processing of noisy measurement data is a vital tool in fundamental and applied quantum information sciences owing to communication, sensing, and computing. Specifically, the purity of such reconstructed quantum systems is crucial in surpassing the classical shot-noise limit and achieving the Heisenberg limit, regarding the achievable precision in quantum sensing. However, the noisy reconstruction of such resourceful sensing probes limits the quantum advantage in precise quantum sensing. For this, we formulate a pure quantum state reconstruction method through eigenvalue decomposition. We show that the proposed method is robust against the depolarizing noise; it remains unaffected under high strength white noise and achieves quantum state reconstruction accuracy similar to the noiseless case.
APA, Harvard, Vancouver, ISO, and other styles
48

Wai, Iris Shuk Han, Sara Sze Yan Ng, Dickson K. W. Chiu, Kevin K. W. Ho, and Patrick Lo. "Exploring undergraduate students’ usage pattern of mobile apps for education." Journal of Librarianship and Information Science 50, no. 1 (August 30, 2016): 34–47. http://dx.doi.org/10.1177/0961000616662699.

Full text
Abstract:
In recent years, with the general adoption of smartphones with computing power comparable to desktop computers, mobile applications (apps) have experienced a surge in popularity. However, there are few studies conducted about their educational use, especially in Southeast Asia. To close this research gap, this study aims to provide a current overview of mobile apps usage in higher education. Besides exploring the actual use of apps, the technology acceptance model was applied to examine (1) undergraduate students’ perceptions, which involve perceived usefulness and perceived ease of use, towards adopting mobile apps for educational purposes, and (2) their overall attitude toward such adoption. Both quantitative and qualitative methods were used to collect data from 150 undergraduate students in Business, Education, and Engineering in Hong Kong. The results show undergraduate students use mobile apps frequently to engage in learning activities related to their academic studies, with a particularly focus on communication and collaborative working, accessing academic resources, and checking a dictionary. However, the discrepancies in using apps for academic purposes are not significant between the three faculties. Meanwhile, perceived usefulness has a more positive impact on overall attitude compared with the impact of perceived ease of use. The investigation will help tertiary institutions, library service providers, and educators develop and assess strategic planning for education collaborating with mobile apps. This paper could also give app developers some suggestions for app design based on actual usage and students’ information needs.
APA, Harvard, Vancouver, ISO, and other styles
49

Kay, Lily E. "Who Wrote the Book of Life? Information and the Transformation of Molecular Biology, 1945–55." Science in Context 8, no. 4 (1995): 609–34. http://dx.doi.org/10.1017/s0269889700002210.

Full text
Abstract:
The ArgumentThis paper focuses on the opening of a discursive space: the emergence of informational and scriptural representations of life and their self-negating consequences for the construction of biological meaning. It probes the notion of writing and the book of life and shows how molecular biology's claims to a status of language and texuality undermines its own objective of control. These textual significations were historically contingent. The informational representations of heredity and life were not an outcome of the internal cognitive momentum of molecular biology; they were not a logical necessity of the unravelling of the base-pairing of the DNA double-helix. They were transported into molecular biology still within the protein paradigm of the gene in the 1940s and permeated nearly every discipline in the life and social sciences. These information-based models, metaphors, linguistic, and semiotic tools which were central to the formulation of the genetic code were transported into molecular biology from cybernetics, information theory, electronic computing, and control and communication systems — technosciences that were deeply embedded with the military experiences of world war II and the Cold War. The information discourse thus became fixed in molecular biology not because it worked in the narrow epistemic sense (it did not), but because it positioned molecular biology within postwar discourse and culture, perhaps within the transition to a post-modern information-based society.
APA, Harvard, Vancouver, ISO, and other styles
50

Mohideen, Bremnavas Ismail, and Basem Assiri. "Internet of Things (IoT): Classification, Secured Architecture Based on Data Sensitivity, Security Issues and Their Countermeasures." Journal of Information & Knowledge Management 20, Supp01 (January 27, 2021): 2140001. http://dx.doi.org/10.1142/s0219649221400013.

Full text
Abstract:
In recent decades, the communication of electronic equipment and physical resources is combined. Internet of Things (IoT) distributes things widely in the network. The IoT is Internet-based pervasive computing, which created significant development in the recent disposition of IoT infrastructures. The IoT infrastructures lead, manage and generate large amounts of data across various applications including environmental, transportation and healthcare monitoring. In this regard, there are salient uncertainties about the use of security concepts that are frequently measured as a major concern of IoT distributed architecture design. This paper mainly focuses on the classification of IoT, novel architecture considering the sensitivity of data, IoT security layers, review of security issues and acclaimed countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography