The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Existing data publication methods retain the relationship between the quasi-identifier attributes and sensitive attributes of published data. We call them "positive data publication". However, it will lead to potential risk that attackers could deduce the privacy of the corresponding individuals from the published data. Recently, by combining the negative representation with k-anonymity...
FGAC model has been adopted by enterprise applications, for the protection of their databases. Most of these deployments are not only limited in purpose but are dependent upon various other factors including query modification algorithms and software development languages. These factors have not only limited their applicability for distributed computing environments but have also affected their widespread...
The UN Convention on the Rights of Persons with Disabilities states that governments shall “provide accessible information to persons with disabilities about mobility aids, devices and assistive technologies, including new technologies, as well as other forms of assistance, support services and facilities”.
Large enterprises have built very large "on-premise" data-sets that are critical to many business functions. With the availability of cloud-based storage, many of these enterprises are considering whether and how to make some of this data available on the cloud. One motivation is to offload the processing of new mobile application workloads from the on-premise system to the cloud. Another...
Nowadays Big Data becomes one of the biggest buzz concepts in IT world especially with the vertiginous development driving the increase of data encouraged by the emergence of high technologies of storage like cloud computing. Big Data can create efficient challenging solutions in health, security, government and more; and usher in a new era of analytics and decisions. Knowledge Management comprises...
Practical work in the laboratory is the most important component in training of the polytechnic specialists. The usage of information and communication technologies as well as Internet makes it possible to increase the number of laboratory facilities available for training students. Bauman University has some laboratories of remote access specialized in such important disciplines like robotics, nanotechnologies,...
The acceptance of the cloud as an infrastructure to host applications is a growing trend. Facilitating and hosting applications on the cloud reduces support and maintenance costs. However, concerns about the security of these applications is one of the primary reasons organizations avoid complete adoption of cloud services. Although cloud service providers (CSPs) offer standard security, they don't...
The main purpose of this paper is to review the literatures on the adoption of Cloud Computing by SMEs in order to learn the current state of Cloud Computing studies and identify gaps for future research. Twenty-two articles were reviewed and analyzed from various journals and conference proceedings that were published on Cloud Computing adoption, acceptance, and diffusion. Findings revealed that...
The problem statement of this research paper is focused around the challenge that any organization faces in today's day while synchronizing their strategy with real time challenges of the Market given the changing Demographics, increase in the Telecommunication Density and increase in the usage of Social Media. The method adapted by organizations to obtain competitive intelligence in the past has...
Knowledge management has become an important aspect of any enterprise today. In today's competitive environment capturing and sharing of knowledge are important for correct and timely decisions. Knowledge can be classified as mission critical, confidential or open knowledge. It may exist in variety of sources, formats and devices viz, in people's heads, databases, files etc. According to Larry Prusak,...
In 2010, the World Bank began its Open Data Initiative in an effort to publicize data that was previously limited to an audience within the organization, its associates, and subscribers. The goal of the initiative is to assure widespread access to a robust, comprehensive database that contains plentiful information regarding the world’s developing economies, including information about projects in...
The criminal justice system in Charlottesville/Albemarle, VA, is a national leader in promoting Evidence Based Decision Making (EBDM)—relying on data to support decisions and evaluate policies and practices rather than on anecdotes or judgment alone. To implement EBDM more effectively, local criminal justice authorities—police, jail, pre- and post-trial services, and courts—are working together to...
In last few decades Sentiment Analysis is one of the most researched area in the field of Speech Recognition. Different methods like use of textual data, face expressions, voice signals, body movements and physiological signals were adopted for sentiment detection. Presented paper discuss about emotions/Sentiment and proposed an approach for analyzing these sentiment based on speech signals of an...
Crime analysis is one of the most important activities of the majority of the intelligent and law enforcement organizations all over the world. Generally they collect domestic and foreign crime related data (intelligence) to prevent future attacks and utilize a limited number of law enforcement resources in an optimum manner. A major challenge faced by most of the law enforcement and intelligence...
The Internet-of-Things (IoT) environment continuously inspires any time-place-things connectivity of the smart objects in and around the universe. Day by day the rapid growth of enormous IoT objects and digital storage technology, lead to a large heterogeneous data depository, in which the IoT big-data are stored in the dissimilar database frameworks as a consequence of heterogeneous data sources...
This Modernization of technology requires training of personnel with new competencies and establishment of centers for innovation in education, research, and technologies within the framework of higher education system. According to that tendency Project activity direction was created in the system of Elite Engineering Education in Tomsk Polytechnic University. The key features of the organization...
Digital preservation has now become a key activity in every library and information center due to proliferation of Information and Communication Technologies (ICT) and advancement of Internet technologies. The availability of Open Source Software, training at desired time and market demand has revolutionized the creation of digital libraries. Digitization and preservation of readily available resources...
Developed a mathematical model and a functional schemes for workflow systems with protection information. The system is based on the role security model and provides multiple levels of attributes for documents. The developed system ensures the availability, integrity and confidentiality of information, protecting documents from tampering. For printed documents developed several levels of protection,...
Today is the world of knowledge economy. The business unit which believes in creating new innovations and implementing this technology in their organization as it always provides an edge over traditional working. Patents are used for preserving this knowledge. A large number of patents are filed every day. Identifying the best patent as per business need and extracting relevant knowledge from patients...
Knowledge management (KM) literature identifies numerous barriers that inhibit employees' knowledge sharing practices. Presently, there is a research gap that examines what factors promote such barriers and their direct impact on knowledge seeking and knowledge contributing behaviors via information and communication technologies (ICTs). To bridge the gap, a content analysis study of 104 KM articles...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.