2,717 research outputs found
Developing a secured image file management system using modified AES
Images are a means to share and convey relevant data in today’s digital world. This paper presents an image file management system to provide a platform for distributing and viewing images in a secured manner. The shared image files are stored in the server in an encrypted manner to provide additional security to the owner of the file. A modified AES algorithm using bit permutation was used to encrypt the image files. Based on the experimental result, image files were successfully encrypted in the server and can only be decrypted by the intended recipient of the file providing an efficient and reliable way of exchanging images
Horizon Report 2009
El informe anual Horizon investiga, identifica y clasifica las tecnologĂas emergentes que los expertos que lo elaboran prevĂ©n tendrán un impacto en la enseñanza aprendizaje, la investigaciĂłn y la producciĂłn creativa en el contexto educativo de la enseñanza superior. TambiĂ©n estudia las tendencias clave que permiten prever el uso que se hará de las mismas y los retos que ellos suponen para las aulas. Cada ediciĂłn identifica seis tecnologĂas o prácticas. Dos cuyo uso se prevĂ© emergerá en un futuro inmediato (un año o menos) dos que emergerán a medio plazo (en dos o tres años) y dos previstas a más largo plazo (5 años)
Custom Hardware Versus Cloud Computing in Big Data
The computational and data handling challenges in big data are immense yet a market is steadily growing traditionally supported by technologies such as Hadoop for management and processing of huge and unstructured datasets. With this ever increasing deluge of data we now need the algorithms, tools and computing infrastructure to handle the extremely computationally intense data analytics, looking for patterns and information pertinent to creating a market edge for a range of applications. Cloud computing has provided opportunities for scalable high-performance solutions without the initial outlay of developing and creating the core infrastructure. One vendor in particular, Amazon Web Services, has been leading this field. However, other solutions exist to take on the computational load of big data analytics. This chapter provides an overview of the extent of applications in which big data analytics is used. Then an overview is given of some of the high-performance computing options that are available, ranging from multiple Central Processing Unit (CPU) setups, Graphical Processing Units (GPUs), Field Programmable Gate Arrays (FPGAs) and cloud solutions. The chapter concludes by looking at some of the state of the art solutions for deep learning platforms in which custom hardware such as FPGAs and Application Specific Integrated Circuits (ASICs) are used within a cloud platform for key computational bottlenecks
Smart Healthcare solutions in China and Europe, an international business perspective
The thesis is part of the Marie Curie Fellowship project addressing health related challenges with IoT solutions. The author tries to address the challenge for the implementation of telehealth solutions by finding out the demand of the telehealth solution in selected European economies and in China (chapter 1), analyzing the emerging business models for telehealth solution ecosystems in China (chapter 2), how to integrate telehealth solutions with institutional stakeholders (chapter 3) and why are elderly users willing to use telehealth solutions in China.
Chapter 1 and chapter 2 form the theoretical background for empirical work in chapter 3 and chapter 4. The thesis addressed four research questions, namely “Which societal and social-economics unmet needs that Internet of Healthcare Things can help to resolve?”, “What are the business model innovation for tech companies in China for the smart health industry?”, “What are the facilitators and hurdles for implementing telehealth solutions”, “Are elderly users willing to use telehealth solutions in China?”.
Both qualitative study and quantitative analysis has been made based on data collected by in depth interviews with stakeholders, focus group study work with urban and rural residents in China.
The digital platform framework was used in chapter 2 as the theoretical framework where as the stakeholder power mapping framework was used in chapter 3. The discretion choice experiment was used in chapter 4 to design questionnaire study while ordered logit regression was used to analyze the data.
Telehealth solutions have great potential to fill in the gap for lack of community healthcare and ensuring health continuity between home care setting, community healthcare and hospitals. There is strong demand for such solutions if they can prove the medical value in managing chronic disease by raising health awareness and lowering health risks by changing the patients’ lifestyle. Analyzing how to realize the value for preventive healthcare by proving the health-economic value of digital health solutions (telehealth solutions) is the focus of research.
There remain hurdles to build trust for telehealth solutions and the use of AI in healthcare. Next step of research can also be extended to addressing such challenges by analyzing how to improve the transparency of algorithms by disclosing the data source, and how the algorithms were built. Further research can be done on data interoperability between the EHR systems and telehealth solutions. The medical value of telehealth solutions can improve if doctors could interpret data collected from telehealth solutions; furthermore, if doctors could make diagnosis and provide treatment, adjust healthcare management plans based on such data, telehealth solutions then can be included in insurance packages, making them more accessible
Building the Hyperconnected Society- Internet of Things Research and Innovation Value Chains, Ecosystems and Markets
This book aims to provide a broad overview of various topics of Internet of Things (IoT), ranging from research, innovation and development priorities to enabling technologies, nanoelectronics, cyber-physical systems, architecture, interoperability and industrial applications. All this is happening in a global context, building towards intelligent, interconnected decision making as an essential driver for new growth and co-competition across a wider set of markets. It is intended to be a standalone book in a series that covers the Internet of Things activities of the IERC – Internet of Things European Research Cluster from research to technological innovation, validation and deployment.The book builds on the ideas put forward by the European Research Cluster on the Internet of Things Strategic Research and Innovation Agenda, and presents global views and state of the art results on the challenges facing the research, innovation, development and deployment of IoT in future years. The concept of IoT could disrupt consumer and industrial product markets generating new revenues and serving as a growth driver for semiconductor, networking equipment, and service provider end-markets globally. This will create new application and product end-markets, change the value chain of companies that creates the IoT technology and deploy it in various end sectors, while impacting the business models of semiconductor, software, device, communication and service provider stakeholders. The proliferation of intelligent devices at the edge of the network with the introduction of embedded software and app-driven hardware into manufactured devices, and the ability, through embedded software/hardware developments, to monetize those device functions and features by offering novel solutions, could generate completely new types of revenue streams. Intelligent and IoT devices leverage software, software licensing, entitlement management, and Internet connectivity in ways that address many of the societal challenges that we will face in the next decade
Cybersecurity: Past, Present and Future
The digital transformation has created a new digital space known as
cyberspace. This new cyberspace has improved the workings of businesses,
organizations, governments, society as a whole, and day to day life of an
individual. With these improvements come new challenges, and one of the main
challenges is security. The security of the new cyberspace is called
cybersecurity. Cyberspace has created new technologies and environments such as
cloud computing, smart devices, IoTs, and several others. To keep pace with
these advancements in cyber technologies there is a need to expand research and
develop new cybersecurity methods and tools to secure these domains and
environments. This book is an effort to introduce the reader to the field of
cybersecurity, highlight current issues and challenges, and provide future
directions to mitigate or resolve them. The main specializations of
cybersecurity covered in this book are software security, hardware security,
the evolution of malware, biometrics, cyber intelligence, and cyber forensics.
We must learn from the past, evolve our present and improve the future. Based
on this objective, the book covers the past, present, and future of these main
specializations of cybersecurity. The book also examines the upcoming areas of
research in cyber intelligence, such as hybrid augmented and explainable
artificial intelligence (AI). Human and AI collaboration can significantly
increase the performance of a cybersecurity system. Interpreting and explaining
machine learning models, i.e., explainable AI is an emerging field of study and
has a lot of potentials to improve the role of AI in cybersecurity.Comment: Author's copy of the book published under ISBN: 978-620-4-74421-
Wearable Computing for Defence Automation : Opportunities and Challenges in 5G Network
Peer reviewedPublisher PD
- …