Due to the rapid life changes and the fourth industrial revolution, every day the birth of new domains is witnessed such as the Internet of Things (IoT), Cloud computing, and Artificial Intelligence (AI). These domain...
详细信息
ISBN:
(纸本)9781665442930
Due to the rapid life changes and the fourth industrial revolution, every day the birth of new domains is witnessed such as the Internet of Things (IoT), Cloud computing, and Artificial Intelligence (AI). These domains have a lot of advantages which make our life easier and more efficient, despite these advantages, a lot of risks come along with them. This paper aims to highlight the threats, vulnerabilities, and risk remediation, as well as the standards and regulations. A comparison was then made between the three technologies and the international standards (OWASP, NIST, ISO, and GDPR), the results showed that most of AI and IoT standards and regulations are under development, however cloud computing has a sufficient base of supporting standards.
Emerging information technologies such as Building information Modelling (BIM) offer the architecture, engineering and construction (AEC) industry enormous potential to develop collaborative workflows. Cloud computing...
详细信息
ISBN:
(纸本)9781479915484
Emerging information technologies such as Building information Modelling (BIM) offer the architecture, engineering and construction (AEC) industry enormous potential to develop collaborative workflows. Cloud computing has similarly gained popularity in the IT service provision for efficient web based data exchange and storage with enormous potential benefits for BIM, resulting in recent calls for their integration. Security and privacy concerns, however, continue to impede wide spread adoption of both technologies. The implication of real and perceived threats on secure collaboration is analysed systematically, towards formulation of a research agenda. It is observed that, secure collaboration threats within the AEC need appropriate characterization in relation to four levels of protective solutions, namely: infrastructure and technical, information partitioning and protection, legal and contractual management and relationship management. This will aid appropriate selection or adoption of the best available cloud technology offerings towards appropriate fit of BIM-cloud integration. Research towards formulation of this agenda is proposed through a high level project-based security or risk assessment framework for BIM-cloud integration and adoption.
The rapid penetration of cloud and distributed computingtechnology is accelerating the need for one-to-many file transfers for sharing and duplicating data and applications among distributed data centers in an effici...
详细信息
ISBN:
(纸本)9781509042975
The rapid penetration of cloud and distributed computingtechnology is accelerating the need for one-to-many file transfers for sharing and duplicating data and applications among distributed data centers in an efficient manner. The purpose of our work is to develop a scheme to transfer a largesized file from a single sender to multiple receivers over an OpenFlow-based network as quickly as possible. In Multipath-Multicast (MPMC) file transfer model we proposed previously, assuming that a file is appropriately divided into multiple equally sized blocks, a file (i. e., a set of blocks) is transferred to all receivers over multiple phases. In each phase, different blocks are concurrently transmitted to the same receiver over multiple paths to fully utilize the link capacities, while the same block is concurrently transmitted to multiple receivers by multicast to efficiently utilize the link capacities. In this paper, we propose an efficient schedule search procedure in MPMC to construct a good "schedule" that consists of the allocation of link capacities to flow routes from the sender to receivers and the allocation of blocks to those flow routes. Furthermore, to make the performance more stable and better when the number of trials in the schedule search is limited, we introduce the coded-MPMC scheme, in which the sender can generate a coded block by combining two or more plain blocks in an XOR coding manner and send it to multiple receivers. Through simulation on a large-scale topology, the schedule search procedure in MPMC model is validated to be applicable to a large network effectively and the coded-MPMC is shown to more likely find a better schedule than the original scheme that is not coding-enabled.
Recently wide distributions to a practice have got the complex territorially distributed information systems which include devices of realization of system functions of formation, transformations, transfers, processin...
详细信息
ISBN:
(纸本)9781424413478
Recently wide distributions to a practice have got the complex territorially distributed information systems which include devices of realization of system functions of formation, transformations, transfers, processing and documenting of messages [1]. At construction of information systems the problem of a choice of basis and corresponding code system is shown important [2]. In this work classification and the analysis of the system functions developed by the author and code Galois's systems with the purpose of a theoretical substantiation, generalization of results of experimental researches of application to problems of realization of system functions of informationtechnology is made.
By research on the Algorithm for computing Rendered Images of Fingerprint, IFS model of image expression is set up, and the steps and the methods about the recognition of the characteristics of fingerprint image basin...
详细信息
ISBN:
(纸本)9780769536828
By research on the Algorithm for computing Rendered Images of Fingerprint, IFS model of image expression is set up, and the steps and the methods about the recognition of the characteristics of fingerprint image basing on encode of iterated function system are put forward as well. With the model and the computing similar parameter between source image and result image, the characteristics of fingerprint image can be quickly acquired. Thus, the recognition of fingerprint image can be realized. The result of the example indicates that the computing velocity of IFS model is 5 similar to 10 times quicker than the traditional image matrix digital image. Meanwhile, the ratio of its recognition reaches to 99.86 percent. IFS model produces a fairly good effect by application on the identity authentication at the entrance of a network user on the platform of information network under WEB.
information Communications Technologies (ICT) has made an impact in the tourism, travel and hospitality industry in a big way in the last decade or so. The amalgamation of ICT with the tourism industry has been the ke...
详细信息
ISBN:
(纸本)9781509063673
information Communications Technologies (ICT) has made an impact in the tourism, travel and hospitality industry in a big way in the last decade or so. The amalgamation of ICT with the tourism industry has been the key factor for the growth and spread of tourism beyond the physical boundaries and for bringing it within the reach of everyone. ICT enables every individual to access the information, book products and services at any time, from any place about any place. The end users are a mouse click away from the service provider through the use of technology involving computers, mobile phones and computer network. This paper discusses the different means and ways through which ICT can be used to support tourism.
With the proliferation of mobile computing devices there is an increasing demand for applications supporting collaboration among users working in the field and in the office. A key component for collaboration in this ...
详细信息
ISBN:
(纸本)9539676959
With the proliferation of mobile computing devices there is an increasing demand for applications supporting collaboration among users working in the field and in the office. A key component for collaboration in this domain is sharing and manipulation of information using very different devices and communications. We propose a novel, data-centric collaboration paradigm, where each user can obtain a subset of the shared data and the data may be visualized differently for different users. The data amount and the visualization technique reflect the user's interests and/or computing and communication capabilities. The Users collaborate on and exchange data, and the data is dynamically transformed to adapt to the particular computing network platform. The resulting design is simple yet very powerful and scalable. It is implemented and tested by developing several complex groupware applications.
This paper presents literature review that covered key areas in this research such as e-Business development, Cloud computing concept and opportunities for Malaysian SMEs. This research aims to investigate the best pr...
详细信息
ISBN:
(纸本)9781479924868
This paper presents literature review that covered key areas in this research such as e-Business development, Cloud computing concept and opportunities for Malaysian SMEs. This research aims to investigate the best practices of Cloud computing within the e-Business context for the Malaysian SMEs. This paper also discussed the qualitative and quantitative approaches that were used to gather data on how the Cloud computing can strategically provide technology and business opportunities to the SMEs in Malaysia. Deliverable from this research will be a set of recommendations to guide the Malaysian SMEs to adopt both e-Business and Cloud computing technologies. This paper presented a recommendation for creating awareness of Cloud computing approach among the SMEs for their e-Business needs.
Starting from constitution of design symbols, this article analyzes the constitution forms before sending and receiving messages, the decomposed information carriers of senders and receivers, the coding rules of sendi...
详细信息
ISBN:
(纸本)9783038351153
Starting from constitution of design symbols, this article analyzes the constitution forms before sending and receiving messages, the decomposed information carriers of senders and receivers, the coding rules of sending messages formulated by senders and decoding rules of receiving messages by receivers, thus concludes three basic rules, namely, regular, irregular and mixed type of understanding. And the design symbol reveals the distribution and enjoyment of culture. Without social relationships and communication of individuals, there will be no symbols and transmission, the systematic integration of various human design symbols as well as the approaches of the accumulation of collective experience and the pass of behaviors of individuals.
This paper presents a novel multi-input multi-output (MIMO) multicast and broadcast scheme for scalable video coding (SVC)-based transmission in the mobile system. This scheme provides differentiated video quality, th...
详细信息
ISBN:
(纸本)9781509013258
This paper presents a novel multi-input multi-output (MIMO) multicast and broadcast scheme for scalable video coding (SVC)-based transmission in the mobile system. This scheme provides differentiated video quality, that depends on the channel quality of the individual user, by employing different modulation and coding schemes (MCSs) for unequal error protection (UEP) of individual layers. Matching each SVC layer with individual antennas, packet-based successive interference cancellation (SIC) is performed to achieve a diversity gain in each layer, without knowing the channel condition for individual users in the broadcasting environment. Furthermore, we present an optimal power control scheme that can ensure the target service coverage, maximizing the average utility function for users in each layer.
暂无评论