The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Big data analytics and visualization emerged as socio-technical needs in this current century as well as will be main dominant workforces in next generation technologies. Today’s social and technological operations are centered around massive data transfer. These activities are more predominant for dynamic real-time data handling and operations. Better visualization techniques will help for clear...
New superconductor single flux quantum (SFQ) technology, such as Reciprocal Quantum Logic (RQL), is currently considered one of the promising candidates for highperformance energy-efficient computing. This paper presents our work on the design and detailed energy efficiency analysis of three types of 32- and 64-bit RQL multi-ported pipelined local storage structures (13 total), namely 1) random access...
One-time signatures are known to be one of the most promising solution for time-critical multicast authentication in environments with resource-constrained devices such as smart grid. There have been several solutions for multicast applications and TV-OTS has been known to be the most efficient scheme so far. However, there still exists several challenges for one-time signatures to be deployed in...
Data assurance is one of the biggest concerns in adopting Cloud Computing. In Cloud Storage environment organizations outsource the storage and management of their documents for great flexibility and economic savings. However, contracting data storage to a third-party even in private cloud deployment could lead to potential security and privacy risks. Encryption of remotely stored documents before...
This study investigates the security issues related to the use of open source software by students in online education. Research studies and common wisdom contend that open source software, by having being developed and continuously updated by numerous knowing experts, is more secure and less prone to hacking attacks. Using a systematic three-step approach, this study surveys journal and conference...
The congestion of the urban traffic is becoming one of critical issues with increasing population and automobiles in cities. Traffic jams not only cause extra delay and stress for the drivers, but also increase fuel consumption, add transportation cost, and increase carbon dioxide air pollution. The traffic controller is one of critical factors affecting the traffic flow. The conventional traffic...
Cyber-human systems support the increasingly complex and coupled relationships between humans and machines. This paper demonstrates that within a state based behavioral view that supports state refinement, the addition of event refinement is a natural way to define complex behavior in these systems. The paper provides a meta-model of terms and relationships which the systems analyst can use to create...
Plant factories are cultivation facilities that enable year-round production of vegetables and other produce by allowing precise control and monitoring of cultivation conditions and plant growth. At Osaka Prefecture University, the Research and Development Center for the Plant Factory has been established as a cutting-edge R&D base specializing in the development of a plant growth facility operated...
In this paper we first develop models of privacy and anonymity from an examination of various categories of data and the motivations of the various persons and groups involved. We point out where specific risk-reduction tools and methods apply and where they do not. We also examine whether the desire for privacy and anonymity favors lawful or criminal activities. Then we propose methods, including...
Copyright and Reprint Permission Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers,...
The recent explosion in Dynamic (a.k.a., "Big") Data Analytics1 research provides a massive amount of software capabilities, published papers, and conference proceedings that make it difficult to sift through and inter-relate it all. This paper proposes a trial classification scheme with several orthogonal dimensions of classification. These dimensions include stages of application, challenges,...
There are many potential security risks associated with viewing, accessing, and storage of DICOM files on mobile devices. Digital Imaging and Communications in Medicine (DICOM) is the industry standard for the communication and management of medical imaging. DICOM files contain multidimensional image data and associated meta-data (e.g., patient name, date of birth, etc.) designated as electronic protected...
A significant body of research demonstrates strong connections between social connectedness, stress, and health. However, to date it is unclear whether the beneficial aspects of social connectedness are due to quantity, quality, stability, or role within the network. Here we describe a Bluetooth LE proximity sensor based on the Intel Edison that allows us to track interpersonal distances as function...
Recently released smartphones is equipped with support for Near Field Communication. Near Field Communication (NFC) is a short-range contactless technology allowing smart phones to act primarily as either a reader or a token. NFC on mobile phones presents new opportunities and threats. NFC provides convenient and easier payment service. However, it is vulnerable to relay attacks. Some countermeasure...
the environmental impact of the healthcare sector has become an important factor globally and is continuing to draw the attention of regulators. The energy use of the healthcare sector (whose largest sub-segment is 'hospitals') has been growing due to many factors. These factors include the rapid growth and adoption of Information and Communication Technology (ICT) in healthcare. The new IT technologies...
In the age of the Internet of Things, use of Smartwatch devices in the enterprise is evolving rapidly and many companies are exploring, adopting and researching the use of these devices in the Enterprise IT (Information Technology). The biggest challenge presented to an organization is understanding how to integrate these devices with the back end systems, building the data correlation and analytics...
Most students know about Information Technology (IT) through the use of their PCs, laptops, IPads, smart phones, and all the social media used with those devices. Thus energy efficient IT (or Green IT), is an area that should grab their interest. Most schools in the U.S. use IT as a tool with their instruction. The student will need to understand the basics on data centers since data centers house...
We present our experience with exploring the configuration space for accelerating BFS's on large complex networks in the context of a heterogeneous GPU + CPU HPC platform. We study the feasibility of the heterogeneous computing approach by systematically studying different graph partitioning strategies while processing synthetic and real-world complex networks. To achieve this, we exploit the coreness...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.