The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to a demand for computing of huge proportions and cheap in cost, cloud computing is now a favoured model. This type of technology has been utilized by some government organizations to address the demands and requirements of their citizen. However, constraints exist with the use of this model impacting on service provision and use of this technology. This paper will explore the disparate challenges...
Wireless communication is one of the key technologies that actualize the Internet of Things (IoT) concept into the real world. Understanding the security performance of wireless communications lays the foundation for the security management of IoT. Eavesdropper collusion represents a significant threat to wireless communication security, while physical-layer security serves as a promising approach...
Provenance, describes how a data item came to be its current state. A Directed Acyclic Graph, nature of the provenance poses challenges to access control models and querying languages. Access control policies are needed to protect the security of data provenance. In this paper, we apply proposed notions of regular expression for provenance as the structure of a provenance graph is very large. We use...
Sensor networks usually generate mass of data, which if not structured for future applications, will require much effort on analytical processing and interpretations. Thus, storing sensor data in an effective and structured format is a key issue in the area of sensor networks. In the meantime, even a little improvement on data storing structure may lead to a significant effect on the lifetime and...
This paper presents a High Availability Application Service Platform (HAASP) and analyses its high availability. The architecture of this platform contains application server platform and high availability architecture. Application server platform consists of three major components, application release platform, which is implemented with WebLogic and WebSphere cluster, application and database platforms,...
The terminology of cloud computing defines a network, which shares applications, processing power and large systems among many other computers. It can be a foundation for media channels and other applications. Cloud computing provides great opportunity for each practicing individuals to connect and extend their local computing capabilities over the global processing power. Advanced means of communication...
While most dental clinicians use some sort of information system, they are mainly for administrative purposes, with a noticeable lack in advisory features such as decision support in clinical situations. It will be exciting to see more research done to enable a robust system that can fit within the clinical workflow of the dentist to be used as a diagnostic tool at point-of-care, especially in drug...
Open Provenance Model (OPM) is a provenance model that can capture provenance data in terms of causal dependencies among the provenance data model components. Causal dependencies are relationships between an event (the cause) and a second event (the effect), where the second event is understood as a physical consequence of the first. Causal dependencies can represent a set of entities that are necessary...
Recently the massive open online course (MOOC) is an emerging trend that attracts many educators' and researchers' attentions. Based on our pilot study focusing on the development and operation of MOOC in Australia, we found MOOC is featured with mastery learning and blended learning, but it suffers from low completion rates. Brining micro learning into MOOC can be a feasible solution to improve current...
Cloud computing is seen as an increasingly important enabler for improving productivity, efficiency and cost reduction. This research aims to identify factors that are perceived likely to influence the adoption of cloud computing for Australian municipal governments. The research model draws from the technology-organization-environment (TOE) framework and the diffusion of innovation (DOI) model. The...
Motivated by applications in social networks, a new type of dominating set named Positive Influence Dominating Set (PIDS) has been studied in the literature. In this paper, we investigate cooperative cost games arising from PIDS problem on social network graphs. We propose two new game models, Rigid PIDS Game and Relaxed PIDS Game, and focus on their cores. First, a relationship between the cores...
Even though we are in the information age, we do not have quantitative, objective tools to evaluate organisational information systems. This paper contributes a fundamental theory: information systems balance theory for this purpose. We design and develop a theoretic framework based on an economic model. We use this robust economic model to explain the value chain of designated information systems...
Enhancing teamwork performance is a significant issue in mobile cloud-based learning. We introduce a service oriented system, Teamwork as a Service (TaaS), to realize a new approach for enhancing teamwork performance in the mobile cloud environment. To coordinate most learners' talents and give them more motivation, an appropriate task allocation is necessary. Utilizing the Kolb's learning style (KLS)...
Sentiment analysis or opinion mining is an important type of text analysis that aims to support decision making by extracting and analyzing opinion oriented text, identifying positive and negative opinions, and measuring how positively or negatively an entity (i.e., people, organization, event, location, product, topic, etc.) is regarded. As more and more users express their political and religious...
Advances in technology offers new opportunities in enhancing teaching and learning. The new technologies enable individuals to personalize the environment in which they work or learn, a range of tools to meet their interests and needs. In this paper, we try to explore the salient features of the nature and educational potential of ‘cloud computing’ (CC) in order to exploit the affordance of CC in...
With the increased development of cloud computing, access control policies have become an important issue in the security filed of cloud computing. Semantic web is the extension of current Web which aims at automation, integration and reuse of data among different web applications such as clouding computing. However, Semantic web applications pose some new requirements for security mechanisms especially...
Web service composition has become a promising technology in a variety of e-science or e-business areas. There are a variety of models and methods to deal with this issue from different aspects. Bio-inspired algorithms are becoming main approaches and solutions. This paper reviews the current researches on web service composition based on bio-inspired algorithms, such as Ant Colony Optimization (ACO),...
M-Learning is a learning model that blends wireless technology and mobile computing to educate the world. It is convenient in that it is accessible from virtually anywhere. However, it faces the challenges such as the high cost and lack of sufficient education resources. This paper presents a new M-learning architecture that is enhanced by cloud computing. Relying on this architecture, we can reach...
Ontology is specification of shared conceptualization and is building block of the semantic Web. Ontology building requires a detailed domain analysis that in turn requires financial resources, intensive domain knowledge and time. Most of industrial data is present in relational databases and a relational database schema represents a domain model. An ontology built from this schema can represent concepts...
Identity fraud has become one of major concerns for broad communities. The new information era needs a new digital identity infrastructure to support next generation Internet. This article suggests a hierarchical structure for digital identities. We define and classify all digital identities into three broad categories: Object, People and Organization. This paper is the first to systematically address...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.