The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we introduce a service framework for supply chain management, this is a top level rule based design, it can handle heterogeneous networks and allows integration with key enabling technologies like RFID tracking and leverages the power of an inference engine to manage, monitor and optimize flow networks and supply chain entities. An extension of previous work by the authors, some details...
Due to the increasing amount of data handled by business applications and the need of an easy way to access data by multiple servers, storage area networks (SAN) have been proposed as a solution to be deployed in enterprises networks. Introducing the wireless aspects to the SAN environment enables more flexibility but it introduces at the same time a set of threats and vulnerabilities that may be...
The academia-industry cooperative lectures on project management was begun starting from the fiscal year 2012 at Hiroshima City University and Hiroshima Shudo University. In the lecture, two campuses and the office of the Japan chapter of the Project Management Institute (PMIJ) at Tokyo are connected via a teleconference system. Teachers give their talk sometimes from one campus and sometimes from...
If a large scale disaster such as the East Japan Great Earthquake in 2011 occurs, quick network reactivations become one of the important objects for Disaster Information System. DTN (Delay Tolerant Network) is supposed to be one of the effective methods for such inoperable circumstances. However, when DTN is applied for vehicle-to-vehicle communication in local areas, there are some problems such...
Collaboration for communication has become a major practice in the world class healthcare industries, both small and large organizations are increasingly adopting the philosophy in all the organizations' activities to shorten required health service time while maintaining higher service quality and lower service costs. These changes have forced the organizations to consider wide improvement of their...
Wireless Sensor Networks (WSN) have been rapidly growning in the past few years in proportion to the improvement of Information and Communications Technologies (ICT). The WSN can realize effective environmental control on the basis of the data collected from WSN. However, in order for more widely deployment of WSN, further power-saving technologies are needed. In this paper, we discuss about the effects...
One of the key advantages of Wireless Mesh Networks (WMNs) is their importance for providing cost-efficient broadband connectivity. There are issues for achieving the network connectivity and user coverage, which are related with the node placement problem. In this paper, we use a Simulated Annealing (SA) system for mesh router node placement in Wireless Mesh Networks (WMNs). We compare the system...
Diffusion is the process of spreading information throughout a network. The degree of diffusion a has been used to measure the diffusion and the adoption rates of different complex networks. It is defined as the percentage between the adopters and non-adopters in a network during the diffusion process. In our previous work [1], we only studied the degree of diffusion for directed networks. In this...
In recent years, we have witnessed the influx of data driven by the exponential use of digital video, music, and mobile applications. The combination of the internet, mobile technologies and social media applications has been the most influential factor in the emergence of Big Data paradigm. Given that online activities of mobile users constitute the major contributors to the Big Data analytics, which...
Collaboration between business partners have become crucial these days. An important issue to be addressed is data privacy. In this paper, we address a problem of data privacy based on a prominent privacy model, (k, e)-Anonymous, when a new dataset is to be released, meanwhile there might be existing datasets released elsewhere. Since some attackers might obtain multiple versions of the datasets and...
The increasing number of smart phones is leveraging changes of business landscapes in the Internet. This demonstrates the importance of business model engineering in the post-PC era. The author proposes the hypothesis of mobile persuasive strength. Using this hypothesis, the author provides a strength analysis of the Mobile Gang of Four: Apple, Google, Amazon, and Facebook. The analysis provides a...
There is no doubt that Cloud Computing (CC) introduces opportunities that mobilize new strategic ICT agenda across organizations. Like the Internet when it was first introduced, the introduction of Cloud Computing unveils the creation of enormous possibilities in information sharing. Unlike the Internet, Cloud Computing allows organizations to transfer ICT assets externally to meet their cost reduction...
Patient's health history is very important during emergency interventions. The ubiquitous smart phones combined with the cloud resources could play an important role in providing such health history and data when needed the most. In this paper we present an architecture and an application bases on the use of Android smart phones and cloud computing that can be used in emergency situations. The application...
In recent years, the leakage of confidential files through the P2P (peer-to-peer) file sharing software has become a problem. Once sensitive files have been leaked to a P2P network, they are distributed rapidly and at random to a great many computers, bringing the danger of far-reaching damage. To deal with this, we propose a method to control the diffusion of sensitive file leakage on P2P networks...
In Elliptic Curve Cryptosystems (ECC), a scalar multiplication of a base point is the most time-consuming operation. Thus, a lot of improvemnets on the scalar multiplication algorithms have been proposed. In TwC 2013, Shirase introduced a new strategy for computing a scalar multiplication efficiently by transforming a base point to a new base point with its x-coordinate value 0 [Shi13]. In fact, Shirase...
With the ever increasing number of mobile devices and their computational capacity in terms of processing, storage and software, the use of smart devices is being employed each time more not only for basic use and entertainment and social networking but also for work. Besides this added value to use smart devices for work at individual level, the interest is of course to explore the use of such devices...
By the rapid adoption of information terminals such as tablets and smart phones, people having multiple wireless communication terminals are expected to increase the access and traffic amount. In public facilities, hot spots, and university campuses, the coverage area of the wireless Access Points (APs) is limited because of high cost. Therefore, it is difficult to provide stable network connectivity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.