50,749 research outputs found
Internet of things security implementation using blockchain for wireless technology
Blockchain is a new security system which group many data into a block or so called classifying the data into a block. The block can have many types and each of them content data and security code. By using a decentralize mechanism, one security code protect all the data. That could happen at the server. In this research, a network of wireless sensor technology is proposed. The transmission of sensor data is via the Internet of things (Internet of Thing) technology. As many data transmitted, they have to classified and group them into a block. All the blocks are then send to the central processing unit, like a microcontroller. The block of data is then processed, identified and encrypted before send over the internet network. At the receiver, a GUI or Apps is developed to open and view the data. The Apps or GUI have an encrypted data or security code. User must key in the password before they can view the data. The password used by the end user at the Apps or GUI must be equivalent to the one encrypted at the sensor nodes. This is to satisfy the decentralized concept used in the Blockchain. To demonstrate the Blockchain technology applied to the wireless sensor network, a MATLAB Simulink function is used. The expected results should show a number of block of data in cryptography manner and chain together. The two set of data. Both have the data encrypted using hash. The black dots indicate the data has been encrypted whereas the white dot indicate indicates the data is not encrypted. The half white and half black indicates the data is in progress of encrypted. All this data should arrange in cryptography order and chain together in a vertical line. A protocol called block and chain group the data into the block and then chain then. The data appears in the blocks and send over the network. As seen in the simulation results, the yellow color represents the user data. This data has a default amplitude as 1 or 5. The data is chained and blocked to produce the Blockchain waveform
Keywords: Blockchain, Internet of things, Wireless Sensor Network and MATLAB Simulin
Recommended from our members
Factors impacting knowledge transfer success in information systems outsourcing
Despite increased research interest on knowledge transfer in information systems (IS) outsourcing, the field still lacks sound and holistic understanding of the key factors influencing knowledge transfer success. The present paper attempts to provide a synthesis of existing theoretical perspectives and empirical findings related to the factors that facilitate or hamper knowledge transfer success in IS outsourcing. The data collection method is discussed and the key findings are presented. Conclusion is drawn and further research is suggested
Foreign Direct Investments in Business Services: Transforming the VisegrĂĄd Four Region into a Knowledge-based Economy?
Foreign direct investments (FDIs) in the service sector are widely attributed an important role in bringing more skill-intensive activities into the Visegrad Four (V4). This regionâcomprising Poland, the Czech Republic, Hungary and Slovakiaârelied heavily on FDIs in manufacturing, which was often found to generate activities with limited skill content. This contribution deconstructs the chaotic concept of âbusiness servicesâ by analysing the actual nature of service sector activities outsourced and offshored to the V4. Using the knowledge-based economy (KBE) as a benchmark, the paper assesses the potential of service sector outsourcing in contributing to regional competitiveness by increasing the innovative capacity. It also discusses the role of state policies towards service sector FDI (SFDI). The analysis combines data obtained from case studies undertaken in service sector outsourcing projects in V4 countries. Moreover, it draws on interviews with senior employees of investment promotion agencies and publicly available data and statistics on activities within the service sector in the region. It argues that the recent inward investments in business services in the V4 mainly utilize existing local human capital resources, and their contribution to the development of the KBE is limited to employment creation and demand for skilled labour
Why do commercial companies contribute to open source software?
This is the post-print version of the Article. The official published version can be accessed from the link belowMany researchers have pointed out that the opensource movement is an interesting phenomenon that is difficult to explain with conventional economic theories. However, while there is no shortage on research on individualsâ motivation for contributing to opensource, few have investigated the commercial companiesâ motivations for doing the same. A case study was conducted at three different companies from the IT service industry, to investigate three possible drivers: sale of complimentary services, innovation and open sourcing (outsourcing). We offer three conclusions. First, we identified three main drivers for contributing to opensource, which are (a) selling complimentary services, (b) building greater innovative capability and (c) cost reduction through open sourcing to an external community. Second, while previous research has documented that the most important driver is selling complimentary services, we found that this picture is too simple. Our evidence points to a broader set of motivations, in the sense that all our cases exhibit combinations of the three drivers. Finally, our findings suggest that there might be a shift in how commercial companies view opensource software. The companies interviewed have all expressed a moral obligation to contribute to open source
Information systems offshore outsourcing: a descriptive analysis
Purpose - The present paper has as its aim to deepen in the study of Information Systems Offshore Outsourcing, proposing three essential steps to make this decision: weighing up the advantages and risks of Offshore Outsourcing; analysing the taxonomy of this phenomenon; and determining its current geography.
Design/Methodology/Approach - With that objective in mind, it was decided to base the research work on the literature about this topic and the review of reports and statistics coming from different sources (consultants, the press, public institutions, etc.).
Findings - Offshore Outsourcing has grown vertiginously in recent years. Its advantages exceed even those of onshore outsourcing, though it also involves greater risks derived from the (cultural and physical) distance existing between customer and provider. Various types of services and customer-provider relationships hide under the umbrella of Offshore Outsourcing; i.e. it is not a homogeneous phenomenon. The main Offshore Outsourcing customers can be found in the USA and Europe, mainly in the UK but also in other countries such as Germany and France. As for provider firms, most of them are located in Asia âoutstandingly in India but also in China and Russia. At present, there are important providers scattered in other continents as well.
Originality/Value - The conclusions suggest that the range of potential Offshore Outsourcing destinations must be widened and that the search for a provider cannot be based exclusively on cost savings; other considerations such as quality, security and proximity of the provider must also be taken into consideration. That is precisely the reason why the study of new countries like Spain as Offshore Outsourcing destinations is proposed
Outsourcing and acquisition models comparison related to IT supplier selection decision analysis
This paper presents a comparison of acquisition models related to decision analysis of IT supplier selection. The main standards are: Capability Maturity Model Integration for Acquisition (CMMI-ACQ), ISO / IEC 12207 Information Technology / Software Life Cycle Processes, IEEE 1062 Recommended Practice for Software Acquisition, the IT Infrastructure Library (ITIL) and the Project Management Body of Knowledge (PMBOK) guide. The objective of this paper is to compare the previous models to find the advantages and disadvantages of them for the future development of a decision model for IT supplier selection
A framework and tool to manage Cloud Computing service quality
Cloud Computing has generated considerable interest in both companies specialized
in Information and Communication Technology and business context in general.
The Sourcing Capability Maturity Model for service (e-SCM) is a capability model for
offshore outsourcing services between clients and providers that offers appropriate strategies
to enhance Cloud Computing implementation. It intends to achieve the required
quality of service and develop an effective working relationship between clients and
providers. Moreover, quality evaluation framework is a framework to control the quality of
any product and/or process. It offers a tool support that can generate software artifacts to
manage any type of product and service efficiently and effectively. Thus, the aim of this
paper was to make this framework and tool support available to manage Cloud Computing
service quality between clients and providers by means of e-SCM.Ministerio de Ciencia e InnovaciĂłn TIN2013-46928-C3-3-RJunta de AndalucĂa TIC-578
- âŠ