8,576 research outputs found

    Body language, security and e-commerce

    Get PDF
    Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations

    Serious Games in Cultural Heritage

    Get PDF
    Although the widespread use of gaming for leisure purposes has been well documented, the use of games to support cultural heritage purposes, such as historical teaching and learning, or for enhancing museum visits, has been less well considered. The state-of-the-art in serious game technology is identical to that of the state-of-the-art in entertainment games technology. As a result the field of serious heritage games concerns itself with recent advances in computer games, real-time computer graphics, virtual and augmented reality and artificial intelligence. On the other hand, the main strengths of serious gaming applications may be generalised as being in the areas of communication, visual expression of information, collaboration mechanisms, interactivity and entertainment. In this report, we will focus on the state-of-the-art with respect to the theories, methods and technologies used in serious heritage games. We provide an overview of existing literature of relevance to the domain, discuss the strengths and weaknesses of the described methods and point out unsolved problems and challenges. In addition, several case studies illustrating the application of methods and technologies used in cultural heritage are presented

    Developing serious games for cultural heritage: a state-of-the-art review

    Get PDF
    Although the widespread use of gaming for leisure purposes has been well documented, the use of games to support cultural heritage purposes, such as historical teaching and learning, or for enhancing museum visits, has been less well considered. The state-of-the-art in serious game technology is identical to that of the state-of-the-art in entertainment games technology. As a result, the field of serious heritage games concerns itself with recent advances in computer games, real-time computer graphics, virtual and augmented reality and artificial intelligence. On the other hand, the main strengths of serious gaming applications may be generalised as being in the areas of communication, visual expression of information, collaboration mechanisms, interactivity and entertainment. In this report, we will focus on the state-of-the-art with respect to the theories, methods and technologies used in serious heritage games. We provide an overview of existing literature of relevance to the domain, discuss the strengths and weaknesses of the described methods and point out unsolved problems and challenges. In addition, several case studies illustrating the application of methods and technologies used in cultural heritage are presented

    Requirements elicitation for robotic and computer-assisted minimally invasive surgery

    Get PDF
    The robotic surgical systems and computer-assisted technologies market has seen impressive growth over the last decades, but uptake by end-users is still scarce. The purpose of this article is to provide a comprehensive and informed list of the end-user requirements for the development of new generation robot- and computer-assisted surgical systems and the methodology for eliciting them. The requirements were elicited, in the frame of the EU project SMARTsurg, by conducting interviews on use cases of chosen urology, cardiovascular and orthopaedics procedures, tailored to provide clinical foundations for scientific and technical developments. The structured interviews resulted in detailed requirement specifications which are ranked according to their priorities. Paradigmatic surgical scenarios support the use cases

    Development of an Inverted Epifluorescence Microscope for Long-Term Monitoring of Bacteria in Multiplexed Microfluidic Devices

    Get PDF
    Developing more efficient methods for antibiotic susceptibility testing is a pressing issue in novel drug development as bacterial resistance to antibiotics becomes increasingly common. Microfluidic devices have been demonstrated to be powerful platforms that allow researchers to perform multiplexed antibiotic testing. However, the level of multiplexing within microdevices is limited, evidencing the need of creating simple, low-cost and high-resolution imaging systems that can be integrated in antibiotic development pipelines. This paper describes the design and development of an epifluorescence inverted microscope that enables long-term monitoring of bacteria inside multiplexed microfluidic devices. The goal of this work is to provide a simple microscope powerful enough to allow single-cell analysis of bacteria at a reduced cost. This facilitates increasing the number of microscopes that are simultaneously used for antibiotic testing. We prove that the designed system is able to accurately detect fluorescent beads of 100 nm, demonstrating comparable features to high-end commercial microscopes and effectively achieving the resolution required for single-cell analysis of bacteria. The proposed microscope could thus increase the efficiency in antibiotic testing while reducing cost, size, weight, and power requirements, contributing to the successful development of new antibiotic drugs.This work was partially funded by project TEC2016-78052-R from the Spanish Ministry of Economy and PID2019-109820RB-I00 from the Spanish Ministry of Science and Innovation. The research leading to these results received funding from the Innovative Medicines Innitiative 2 Joint Undertaking (JU) under grant agreement No 853989. The JU receives support from the European Union’s Horizon 2020 research and innovation programme and EFPIA and Global Alliance for TB Drug Development non profit organisation, Bill & Melinda Gates Foundation and University of Dundee

    Spartan Daily, April 25, 1960

    Get PDF
    Volume 47, Issue 113https://scholarworks.sjsu.edu/spartandaily/4029/thumbnail.jp

    Enhancement Security in Smart TV Web Application

    Get PDF
    During the course of its research, the security firmware of the TV's Internet interface failed to confirm script integrity before scripts were run. The attacker could intercept transmissions from the television to the network using common DNS, DHCP server, and TCP session hijacking techniques. The code could then be injected into the normal DataStream, allowing attackers to obtain total control over the device's Internet functionality. This attack could render the product unusable at important times and extend or limit its functionality without the manufacturer's permission. More importantly, however, this same mechanism could be used to extract sensitive credentials from the TV's memory, or prompt the user to fill out fake online forms to capture credit card information. Additionally, Hackers were able to recover the manufacturer's private third-party developer keys†from the television, because in many cases, these keys were transmitted unencrypted and in the clear. Many third-party searches, music, video and photo-sharing services delivered over the Internet require such keys, and a big TV Manufacturer often purchases high-volume special access privileges to these service provider's networks. A hacker could potentially employ these keys, for example, to access these high-volume services at no charge. This paper describes the new Authentication mechanism for online transaction payment for more secured service and, analyzing network managed challenge to avoid the vulnerabilities
    corecore