2,717 research outputs found

    Developing a secured image file management system using modified AES

    Get PDF
    Images are a means to share and convey relevant data in today’s digital world. This paper presents an image file management system to provide a platform for distributing and viewing images in a secured manner. The shared image files are stored in the server in an encrypted manner to provide additional security to the owner of the file. A modified AES algorithm using bit permutation was used to encrypt the image files. Based on the experimental result, image files were successfully encrypted in the server and can only be decrypted by the intended recipient of the file providing an efficient and reliable way of exchanging images

    Horizon Report 2009

    Get PDF
    El informe anual Horizon investiga, identifica y clasifica las tecnologías emergentes que los expertos que lo elaboran prevén tendrán un impacto en la enseñanza aprendizaje, la investigación y la producción creativa en el contexto educativo de la enseñanza superior. También estudia las tendencias clave que permiten prever el uso que se hará de las mismas y los retos que ellos suponen para las aulas. Cada edición identifica seis tecnologías o prácticas. Dos cuyo uso se prevé emergerá en un futuro inmediato (un año o menos) dos que emergerán a medio plazo (en dos o tres años) y dos previstas a más largo plazo (5 años)

    Custom Hardware Versus Cloud Computing in Big Data

    Get PDF
    The computational and data handling challenges in big data are immense yet a market is steadily growing traditionally supported by technologies such as Hadoop for management and processing of huge and unstructured datasets. With this ever increasing deluge of data we now need the algorithms, tools and computing infrastructure to handle the extremely computationally intense data analytics, looking for patterns and information pertinent to creating a market edge for a range of applications. Cloud computing has provided opportunities for scalable high-performance solutions without the initial outlay of developing and creating the core infrastructure. One vendor in particular, Amazon Web Services, has been leading this field. However, other solutions exist to take on the computational load of big data analytics. This chapter provides an overview of the extent of applications in which big data analytics is used. Then an overview is given of some of the high-performance computing options that are available, ranging from multiple Central Processing Unit (CPU) setups, Graphical Processing Units (GPUs), Field Programmable Gate Arrays (FPGAs) and cloud solutions. The chapter concludes by looking at some of the state of the art solutions for deep learning platforms in which custom hardware such as FPGAs and Application Specific Integrated Circuits (ASICs) are used within a cloud platform for key computational bottlenecks

    Smart Healthcare solutions in China and Europe, an international business perspective

    Get PDF
    The thesis is part of the Marie Curie Fellowship project addressing health related challenges with IoT solutions. The author tries to address the challenge for the implementation of telehealth solutions by finding out the demand of the telehealth solution in selected European economies and in China (chapter 1), analyzing the emerging business models for telehealth solution ecosystems in China (chapter 2), how to integrate telehealth solutions with institutional stakeholders (chapter 3) and why are elderly users willing to use telehealth solutions in China. Chapter 1 and chapter 2 form the theoretical background for empirical work in chapter 3 and chapter 4. The thesis addressed four research questions, namely “Which societal and social-economics unmet needs that Internet of Healthcare Things can help to resolve?”, “What are the business model innovation for tech companies in China for the smart health industry?”, “What are the facilitators and hurdles for implementing telehealth solutions”, “Are elderly users willing to use telehealth solutions in China?”. Both qualitative study and quantitative analysis has been made based on data collected by in depth interviews with stakeholders, focus group study work with urban and rural residents in China. The digital platform framework was used in chapter 2 as the theoretical framework where as the stakeholder power mapping framework was used in chapter 3. The discretion choice experiment was used in chapter 4 to design questionnaire study while ordered logit regression was used to analyze the data. Telehealth solutions have great potential to fill in the gap for lack of community healthcare and ensuring health continuity between home care setting, community healthcare and hospitals. There is strong demand for such solutions if they can prove the medical value in managing chronic disease by raising health awareness and lowering health risks by changing the patients’ lifestyle. Analyzing how to realize the value for preventive healthcare by proving the health-economic value of digital health solutions (telehealth solutions) is the focus of research. There remain hurdles to build trust for telehealth solutions and the use of AI in healthcare. Next step of research can also be extended to addressing such challenges by analyzing how to improve the transparency of algorithms by disclosing the data source, and how the algorithms were built. Further research can be done on data interoperability between the EHR systems and telehealth solutions. The medical value of telehealth solutions can improve if doctors could interpret data collected from telehealth solutions; furthermore, if doctors could make diagnosis and provide treatment, adjust healthcare management plans based on such data, telehealth solutions then can be included in insurance packages, making them more accessible

    Building the Hyperconnected Society- Internet of Things Research and Innovation Value Chains, Ecosystems and Markets

    Get PDF
    This book aims to provide a broad overview of various topics of Internet of Things (IoT), ranging from research, innovation and development priorities to enabling technologies, nanoelectronics, cyber-physical systems, architecture, interoperability and industrial applications. All this is happening in a global context, building towards intelligent, interconnected decision making as an essential driver for new growth and co-competition across a wider set of markets. It is intended to be a standalone book in a series that covers the Internet of Things activities of the IERC – Internet of Things European Research Cluster from research to technological innovation, validation and deployment.The book builds on the ideas put forward by the European Research Cluster on the Internet of Things Strategic Research and Innovation Agenda, and presents global views and state of the art results on the challenges facing the research, innovation, development and deployment of IoT in future years. The concept of IoT could disrupt consumer and industrial product markets generating new revenues and serving as a growth driver for semiconductor, networking equipment, and service provider end-markets globally. This will create new application and product end-markets, change the value chain of companies that creates the IoT technology and deploy it in various end sectors, while impacting the business models of semiconductor, software, device, communication and service provider stakeholders. The proliferation of intelligent devices at the edge of the network with the introduction of embedded software and app-driven hardware into manufactured devices, and the ability, through embedded software/hardware developments, to monetize those device functions and features by offering novel solutions, could generate completely new types of revenue streams. Intelligent and IoT devices leverage software, software licensing, entitlement management, and Internet connectivity in ways that address many of the societal challenges that we will face in the next decade

    Cybersecurity: Past, Present and Future

    Full text link
    The digital transformation has created a new digital space known as cyberspace. This new cyberspace has improved the workings of businesses, organizations, governments, society as a whole, and day to day life of an individual. With these improvements come new challenges, and one of the main challenges is security. The security of the new cyberspace is called cybersecurity. Cyberspace has created new technologies and environments such as cloud computing, smart devices, IoTs, and several others. To keep pace with these advancements in cyber technologies there is a need to expand research and develop new cybersecurity methods and tools to secure these domains and environments. This book is an effort to introduce the reader to the field of cybersecurity, highlight current issues and challenges, and provide future directions to mitigate or resolve them. The main specializations of cybersecurity covered in this book are software security, hardware security, the evolution of malware, biometrics, cyber intelligence, and cyber forensics. We must learn from the past, evolve our present and improve the future. Based on this objective, the book covers the past, present, and future of these main specializations of cybersecurity. The book also examines the upcoming areas of research in cyber intelligence, such as hybrid augmented and explainable artificial intelligence (AI). Human and AI collaboration can significantly increase the performance of a cybersecurity system. Interpreting and explaining machine learning models, i.e., explainable AI is an emerging field of study and has a lot of potentials to improve the role of AI in cybersecurity.Comment: Author's copy of the book published under ISBN: 978-620-4-74421-

    Wearable Computing for Defence Automation : Opportunities and Challenges in 5G Network

    Get PDF
    Peer reviewedPublisher PD
    • …
    corecore