The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
On behalf of the FGCT 2015 conference, the program committee has the pleasure to welcome the attendees to participate in the Fourth edition of the International Conference on the Future Generation Communication Technologies (FGCT 2015) which is dedicated to addressing the challenges in computing technologies for the new generation.
Practical skills such as Programming Languages or Digital Systems Design are learned by experience. Such skills are not mechanical processes, but rather a creative ones. For this reason, students should practice repeatedly and receive constant feedback in order to further progress in their learning process. Nevertheless, it is difficult for instructors to give constant and individual feedback in this...
Is combination of computer networking, social computing and virtual markets undermining the stability of the corporation and thereby, radically changing the nature of work? Certainly, these technologies have facilitated outsourcing, the movement of jobs from one market to another. Since roughly 2008, they seem to have been reshaping the nature of the corporation and thereby creating new kinds of jobs...
This paper explains the importance of Information Security (IS) in the field of Information and Communication Technologies(ICT) as well as the use of concepts, standards and specialized tools, the application has become increasingly relevant for the organizations. Research and training in Information Security has an important role, since the preparation, defense and response to events that arise,...
The attempts of malicious access and attacks from the Internet to the internal computers of organizations never stop today and corresponding countermeasure for each technique is required. Most organizations introduce some firewall facilities as one of the solutions to protect their internal computers as well networks from those attacks. However, in most organizations, the network administrator has...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Large scale missions in unpredictable and unstable underwater environments are beyond the capabilities of a single intelligent and complex robot. Relying on one robot is far from optimal as loss of the unit means failure of the whole mission. On the contrary, robotic swarms depend on large numbers of simple, cheap, and error-prone robots that exhibit global desirable features like fault-tolerance,...
Recently, there has been increasing interest in the way in which a game thinking can encourage an active ageing and lifestyle. Although recent developments in game studies have heightened the potential of games for stimulating cognitive and physical capacities, its impact on the sense of security and participation in society, which are essential variables to characterize active ageing, have been overlook...
High performance computing is now one of the most strategic felds of research for many countries. However the developments in this feld in Russia face a number of problems. The high cost of high-performance equipment is among them. Many universities and enterprises can't purchase and maintain expensive computer systems. One way of overcoming this problem is to develop own high performance computing...
Emergence is a systemic phenomenon in an System-of-Systems (SoS) that cannot be reduced to the behavior of the isolated parts of a system. It is the objective of this paper to contribute to the understanding of emergent phenomena in SoSs. After a short look at the literature on emergence in the domains of philosophy and computer science, this paper continues with an elaboration on multi-level nearly-decomposable...
Radix conversion for conventional number systems can be computed using one of the four algorithms reviewed and discussed in [1], depending on whether the source or the destination radix arithmetic is used and whether an integer or a fraction is to be converted. Out of the four radix conversion algorithms, expensive division operations are required in two of them. In this short paper, two new radix...
Performance of the algorithms which process intracardiac electrograms (IEGMs) highly depends on the accuracy of estimating the times that electrical waves pass the area under the electrodes. Estimating these activation times (ATs) from IEGMs during atrial fibrillation (AF) is extremely challenging as electrical activities of atria are very complex, non-stationary, and irregular. In this paper, we...
The talk will discuss how open hardware, open software, and disaggregation enable to build efficient data centers in any size from small to super-big. The talk will show a real life Facebook architecture in network, hardware and software that will enable future data centers developers to control their destiny and scale at their own pace the data center capacity and size with the most effective PUI...
Today the U.S. Army is increasingly deploying regionally aligned brigades to new areas of interest while simultaneously placing greater emphasis on engagement, recently adding it to the Warfighting Functions. These regionally aligned forces often conduct engagement in unstable and austere environments with limited understanding of the primary actors. Traditional intelligence collection is often focused...
The purpose of this paper is to examine information security culture critical success factors. The current existing literature analyses have not clearly identified factors that have significant influence on information security culture adoption. This paper has examined current influential factors that could have influence information security culture creation within the organization setting. We found...
Opinion these days is considered vital to attract probable customers; hence e-commerce websites are facilitating the existing customers to share their experiences about the products they have used. The dawn of e-commerce business has resulted into some firms, which post reviews that are carefully designed to influence the opinion of prospective customers. Review sites provide an open platform for...
In the context of a heterogeneous trust environment, such as a hybrid cloud (consisting of public and private cloud), it is possible for an untrusted component to create a Byzantine fault intentionally. For example, a public cloud service provider may only do a partial (instead of a complete) database search just to save its computation. These malicious events can be particularly dangerous because...
Social networks are representation of complex systems defined by the patterns of relationships among a system's components. Networks are created by information flows or other relations among entities through time and space. The goal of network analysis is to describe the structure of a higher-level system based on the pattern of linkages among a set of lower level nodes, and how this structure changes...
The debates on materiality and sociomateriality, hailing from science studies and organization studies, allow information systems (IS) researchers to evade received distinctions between the social, natural and technical. The literatures that inform this Minitrack contest a purely information-based perspective that posit abstract meanings and immaterial data divorced from situated contexts. Instead...
This paper aims to advance understanding of information systems (IS) through a critical reflection on how IS are currently defined in the IS literature. Using the hermeneutic approach for conducting literature reviews the paper identifies 34 definitions of IS in the literature. Based on the analysis of these 34 definitions four different views of IS are distinguished: a technology view emphasizing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.