The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Any organization which is a large consumer of electrical energy should adopt suitable scheme of energy conservation to minimize the energy utility. Energy auditing, both the thermal energy auditing and electrical energy auditing is a usual procedure in an educational institution. Most of the commercial building in India, were not constructed by following the standard energy conservation code. Recent...
In computer-supported collaborative work (CSCW), role based access right (RBAC) is commonly accepted for controlling access to resources. Later, this role concept has been widely adopted into other CSCW research areas where it is known as role based management (RBM). However, RBM is studied within its limited scope without considering role in a bigger scale that covers various CSCW entities. Thus,...
In current time Cloud Computing is significant hi-tech research area in latest technology. These technologies give users several advantages: cost effectiveness, efficient resource utilisation, collaboration, disaster recovery and high performance. Cloud offers services for computing on single mouse click. Survey was carried out in form of an online questionnaire. This research also investigates Usability...
With the ever increasing man-machine interaction, automation of process and decline in hardware and software cost, the amount of digital data generated and used is increasing day by day. The big data referred here is the massive amount of digital data generated in each and every second in structured, semi-structured and unstructured format throughout the world. This emerging field of big data analytic...
Every cloud data center has a geographical location, which is known to, at least, its owner. Still, it is a challenge for a cloud customer to discover indisputably the location of the data center, which hosts an active cloud based service and its data. Knowing the location is necessary to assess that pertinent geographical obligations of service level agreements and legal requirements are fulfilled...
The aim of this study is to develop a conceptual model that could use to understanding the role of organizational factors in KMS acceptance. Theory Technology Acceptance Model (TAM) along with organizational factors are using in develop the conceptual model for this study. Study was conducted by collected and analysis relevant article in this area. Variable and indictors in the conceptual model was...
Searching relationship among persons is more and more growing importance to acquire related information, genealogical relationship and personnel history. In this paper, the framework with three portions is proposed for exploring peoples' relationship from their personnel information. The first portion focuses on storage structure to store data in Graph database by representing persons as nodes and...
Analyzing the implementation of private cloud and Openstack authentication is necessary to work in an Openstack environment. Private cloud is implemented using Openstack and the aim is to provide a better performance in using Openstack and focus is on the underlying infrastructure on the performance of private cloud deployment.This Openstack is highly beneficial for the Research Centre Communities...
There is a patient safety problem, specifically in maintaining practioner competency. Healthcare organizations feel the impact of regulatory, medical, and technological changes when practioners are unable to process, retain and utilize increasing amounts of information. The rising costs associated with medical errors have increased legal and financial impacts. With the majority of healthcare safety...
We present an interactive graphical tool for assisted curation of knowledge bases from unstructured text data. Given text input, the user can create a knowledge base from scratch, including sub-tasks of entity mention annotation, matching mentions that refer to the same entity, and extracting relations between entities. The interface is designed to enable organizations to extract valuable knowledge...
Green Information Technology (GIT) is emerging as an increasingly important issue as organizations come under pressure to address environmental sustainability concerns. Despite increased attention from business, government and more recently, Information Systems (IS) researchers, a measure to determine the capability of organizations to Green their IT remains elusive. The ultimate aim is to utilize...
We present the design and organization of an homogeneous asynchronous bit-level array based on Null Convention Logic. A bit element (bel) array represents a bit-level hybrid processor that exhibits both Spatial and Temporal computing characteristics. The bit elements are organized in a 2D grid, with eight-way connectivity. Programs represented as Directed Acyclic Graphs can be mapped to the array...
A defensive mechanism, which encompasses a variety of services and protections, has been proposed by several researchers for many organizations to protect system resources from misuse. In the practical use of defensive mechanisms such as CAPTCHAs and spam filters, attackers and defenders exchange 'victories,' each celebrating (temporary) success in breaking and defending. In this paper, since most...
This paper presents a web based virtual laboratory package which provides a hierarchical module level logic design tool equipped with a logic simulator, a set of pre-designed experiments with a facility to add new experiments. The tool contains a repertoire of components and design functionalities and provides features for aiding learning through experiments. For complex experiments, such as CPU design,...
This paper presents an approach to aid teaching of Digital Logic and Computer Organization through generation of dynamic assignment statements along with development of automatic generic checkers for those assignments using the COLDVL virtual laboratory package. Dynamically generated problem statements ensure a fairly large set of, distinct problems. The automated generic checkers allow the solutions...
A significant volume of security breaches occur as a result of human aspects and it is consequently important for these to be given attention alongside technical aspects. Researchers have argued that security culture stimulates appropriate employees' behavior towards adherence. Therefore, work within organizations should be guided by a culture of security, with the purpose of protecting the organization's...
Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
The innovation of Internet has enhanced the use of computers and mobile devices. As a result a large amount of data is being generated on daily basis. Information Technology infrastructure continues to grow with evolving technology and as a result a new business model has emerged known as "Cloud Computing". It is set of resources and services which are obtainable through the Internet. Cloud...
Physical security is a vital part of security efforts in any organization. Physical blueprints or maps show vital information such as room numbers and locations of exits and security cameras that can be used by security authorities to gain valuable information if a security threat occurs. In spite of advancements in new technologies for personnel access control, physical security development life...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.