EDITOR'S SUMMARY The 13th Annual SIG/USE Research Symposium focused on ways mobile technologies have influenced information needs, seeking and use. In her keynote address, Caroline Haythornthwaite framed movement ...
EDITOR'S SUMMARY The 13th Annual SIG/USE Research Symposium focused on ways mobile technologies have influenced information needs, seeking and use. In her keynote address, Caroline Haythornthwaite framed movement as changing contributorship, interactions and participation in multiple knowledge communities. A series of Ignite talks on the common theme of mobility followed, with topics ranging from mobile phones as the preferred Internet access device, credibility of mobile applications and online resources and public libraries' use of social media and mobile applications to mobile apps promoting health information literacy and supporting teleworking. Small groups brainstormed on opportunities, challenges and research ideas inspired by the theme. Annual SIG/USE awards recognized scholars for innovative work on topics including refugees' information seeking, factors influencing scholars' data sharing and drawings as visual representations of information. The symposium closed with encouragement to consider how information on the move influences perspectives and research into information behavior.
In this paper an EMD-based (Empirical Mode Decomposition) technique is proposed in order to improve the data compression and reconstructed signal accuracy trade-off for PQ (Power Quality) signals. We demonstrate that ...
详细信息
In this paper an EMD-based (Empirical Mode Decomposition) technique is proposed in order to improve the data compression and reconstructed signal accuracy trade-off for PQ (Power Quality) signals. We demonstrate that our technique saves computational cost and reduces the mode mixing problem when compared to the EEMD (Ensemble EMD) and traditional EMD, respectively. After simulations with recorded power line test-cases, we compare our results with DWT (Discrete Wavelet Transform), and both traditional and EEMD. Results have shown that our technique outperforms the DWT in both data compression ratio and reconstruction accuracy metrics. Moreover, we analyze the balance between computational costs and mode mixing reduction for the three EMD techniques.
Requirements Engineering involves different stakeholders and their different views of a system. Among these stakeholders, software designers are responsible for modeling the information gathered by domain experts. The...
详细信息
ISBN:
(纸本)9781467329125
Requirements Engineering involves different stakeholders and their different views of a system. Among these stakeholders, software designers are responsible for modeling the information gathered by domain experts. The communication between these specialists is not always easy, often leading to a semantic gap between what is desired and what is developed. This gap is characterized by inconsistencies between the requirements and the conceptual models produced. This paper tackles this issue by employing model-driven techniques to foster consistency in the conceptual modeling process, and by using a mind map model specification that facilitates communication between experts. Our approach defines a set of transformation rules to generate conceptual models from mind maps.
Wireless sensor networks can be applied to health care and disaster response, etc. The importance and accuracy of the information requirements of wireless sensors are more stringent. It corresponding to the use of inf...
详细信息
The number of VoIP users in Indonesia is very low, although the cost offered by VoIP is smaller than using pulsed phone. One of the reason is security provided by the VoIP service provider is still lacking. VoIP users...
详细信息
The number of VoIP users in Indonesia is very low, although the cost offered by VoIP is smaller than using pulsed phone. One of the reason is security provided by the VoIP service provider is still lacking. VoIP users have not received yet the security service to ensure the security of communications. This study tries to secure communications between VoIP users using encryption module that is integrated with VoIP client Sipdroid running on Android Smartphone. It is possible for VoIP users because VoIP client that can only be accessed by VoIP users. The result obtained after integration with encryption module using three encryption schemes, they are AES, DES, and RC4. Sipdroid able to resist passive attack from tapping information (eavesdropping) during the communication session. And the result of QoS measurements is an increase delay of 0.01 ms and no significant change in the throughput and the packet loss, for throughput generated about 78 kbps, and for the average packet loss is 0.8%. However there is a noise that follows the communication on Sipdroid integrated with the encryption module due to the wave skew from the increase time during the encryption process.
The increased in information security issues have caused great amount losses to enterprises and have damaged the reputation of those enterprises. In coping with a variety of information security issues, enterprises ar...
详细信息
The increased in information security issues have caused great amount losses to enterprises and have damaged the reputation of those enterprises. In coping with a variety of information security issues, enterprises are always in a dilemma when they need to make investment decisions for information security infrastructure. Managers need to achieve both goals of risk control and cost effectiveness. The aim of this research is to examine the variables influencing enterprises' information security investment decisions. We collected data from decision makers involved in information technology investment through interviews and questionnaires. Factors affecting enterprises information security investment were classified into internal and external factors such as information security manpower, software, hardware, management, outsourcing, and services. Using regression analysis, variables influencing information security investments were found. External environmental factors have no significant effect on enterprises information security investment. Variables that can predict "information security investment" by the order of beta coefficients are: "the senior executives' attitude toward control of information security," "information security risk index," "the scale of enterprise," and "the degree of enterprises' technology application." Consequently, enterprises need to empower the top management to control information security and risk perception to improve the quality of information security decision making. Decision analysis framework is recommended to tradeoff the information security risk control and cost effectiveness of information security investment.
The new trend in the process of data-intensive management indicates the importance of a distributed file system for both Internet large scale services and cloud computing environments. I/O latency and application buff...
详细信息
ISBN:
(纸本)9781479904051
The new trend in the process of data-intensive management indicates the importance of a distributed file system for both Internet large scale services and cloud computing environments. I/O latency and application buffering sizes are two of a number of issues that are essential to be analysed on different class of distributed file systems. In this paper, it is presented a research work comparing four different high performance distributed file systems. Those systems were employed to support a medical image server application in a private storage environment. Experimental results highlight the importance of an appropriate distributed file system to provide a differential level of performance considering application specific characteristics.
Distributed Collaborative Environments provide a common user interface that enables collaborative tasks of geographically dispersed users in a specific context. In such environments, many features can be provided, suc...
详细信息
Distributed Collaborative Environments provide a common user interface that enables collaborative tasks of geographically dispersed users in a specific context. In such environments, many features can be provided, such as asynchronous and synchronous communication mechanisms, a repository for shared resources, and concurrent (synchronous) edition of content. However, it is clear that there is still a shortage concerning the security support in such environments. This becomes even more severe when the context in which these environments are inserted deals with sensitive data, such as patient data and their medical records. The present work proposes a security model for distributed collaborative environments focusing the support for medical researches.
Elliptic Curve based El-Gamal (ECEG) cryptosystem is one of many widely used public key cryptosystems that makes use the elliptic curve discrete logarithm problem (ECDLP). For breaking ECDLP, Pollard Rho is currently ...
详细信息
暂无评论