715,359 research outputs found
Recommended from our members
Issues and challenges: cloud computing e-Government in developing countries
Cloud computing has become essential for IT resources that can be delivered as a service over the Internet. Many e-government services that are used worldwide provide communities with relatively complex applications and services. Governments are still facing many challenges in their implementation of e-government services in general, including Saudi Arabia, such as poor IT infrastructure, lack of finance, and insufficient data security. This research paper investigates the challenges of e-government cloud service models in developing countries. This paper finds that governments in developing countries are influenced by how the top management deals with the attention to the adoption of cloud computing. Further, organisational readiness levels of technologies, such as IT infrastructure, internet availability and social trust of the adoption of new technology as cloud computing, still present limitations for e-government cloud services adoption. Based on the findings of the critical review, this paper identifies the issues and challenges affecting the adoption of cloud computing in e- government such as IT infrastructure, internet availability, and trust adopted new technologies thereby highlighting benefits of cloud computing-based e-government services. Furthermore, we propose recommendations for developing IT systems focused on trust when adopting cloud computing in e-government services (CCEGov)
Fog computing, applications , security and challenges, review
The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet of things. Fog computing which is otherwise called edge computing was introduced in 2012 as a considered is a prioritized choice for the internet of things applications. As fog computing extend services of cloud near to the edge of the network and make possible computations, communications, and storage services in proximity to the end user. Fog computing cannot only provide low latency, location awareness but also enhance real-time applications, quality of services, mobility, security and privacy in the internet of things applications scenarios. In this paper, we will summarize and overview fog computing model architecture, characteristic, similar paradigm and various applications in real-time scenarios such as smart grid, traffic control system and augmented reality. Finally, security challenges are presented
Standardized connectivity and communication for constrained devices
By 2020, an estimated 50 billion devices will be connected to the Internet. This revolution will transform the traditional human-centric internet to an “Internet of Things” (IoT), thereby enabling a whole new range of intelligent services in domains such as manufacturing, health, smart homes, logistics, etc. After introducing the Internet of Things, this talk will discuss the challenges in integrating embedded devices into the Internet, as many of the widely adopted Internet technologies had not been designed for such devices, i.e. devices that have constraints in memory, processing power and energy. We will highlight the latest evolutions in this domain, starting from communication and networking, all the way up to services and semantics. To conclude, we will give a number of examples on how these evolutions have inspired some of our past and ongoing research activities
Economic location-based services, privacy and the relationship to identity
Mobile telephony and mobile internet are driving a new application paradigm: location-based services (LBS). Based on a person’s location and context, personalized applications can be deployed. Thus, internet-based systems will continuously collect and process the location in relationship to a personal context of an identified customer. One of the challenges in designing LBS infrastructures is the concurrent design for economic infrastructures and the preservation of privacy of the subjects whose location is tracked. This presentation will explain typical LBS scenarios, the resulting new privacy challenges and user requirements and raises economic questions about privacy-design. The topics will be connected to “mobile identity” to derive what particular identity management issues can be found in LBS
Development of Wearable Systems for Ubiquitous Healthcare Service Provisioning
This paper reports on the development of a wearable system using wireless
biomedical sensors for ubiquitous healthcare service provisioning. The
prototype system is developed to address current healthcare challenges such as
increasing cost of services, inability to access diverse services, low quality
services and increasing population of elderly as experienced globally. The
biomedical sensors proactively collect physiological data of remote patients to
recommend diagnostic services. The prototype system is designed to monitor
oxygen saturation level (SpO2), Heart Rate (HR), activity and location of the
elderly. Physiological data collected are uploaded to a Health Server (HS) via
GPRS/Internet for analysis.Comment: 6 pages, 3 figures, APCBEE Procedia 7, 2013. arXiv admin note:
substantial text overlap with arXiv:1309.154
Alternative internet(s): the benefits and challenges of distributed services
In our series on alternative internet(s), Melanie Dulong de Rosnay, researcher at the French National Centre for Scientific Research (CNRS) Institute for Communication Sciences and a visiting fellow at the LSE, looks at the benefits and challenges of distributed internet architectures, including difficulties in assigning responsibility, liability, and identity. Read the introduction to the series that explains more about alternative internet(s) here
- …