1,207 research outputs found

    Brief History of Quantum Cryptography: A Personal Perspective

    Full text link
    Quantum cryptography is the only approach to privacy ever proposed that allows two parties (who do not share a long secret key ahead of time) to communicate with provably perfect secrecy under the nose of an eavesdropper endowed with unlimited computational power and whose technology is limited by nothing but the fundamental laws of nature. This essay provides a personal historical perspective on the field. For the sake of liveliness, the style is purposely that of a spontaneous after-dinner speech.Comment: 14 pages, no figure

    Publications from NIAS: January 1988-June 2013 (NIAS Report No. R23-2014)

    Get PDF
    This report has a bibliographic listing of all the publications from NIAS since inception till June 201

    The adoption of web 2.0 technology in Malaysian retail-chain businesses

    Get PDF
    Motivation for this research derives from recognition that “Web 2.0” technology is being introduced and increased numbers of users. However, very little academic research has been done in reference to the phenomenon and its implications for Malaysian retail-chain businesses. This study attempts to answer three research questions; namely (1) What are the Web 2.0 technologies currently adopted by Malaysian retail-chain businesses? (2) What are the factors that influence Malaysian retail-chain businesses toward Web 2.0 technologies adoption? and (3) What are Malaysian retail-chain businesses perceptions towards Web 2.0 technologies? The research objectives are: (1) To identify the Web 2.0 technologies currently adopted by Malaysian retail-chain businesses, (2) To identify the factors that are likely to influence the Malaysian retail-chain businesses adoption of Web 2.0 technologies, and (3) To examine Malaysian retail-chain businesses perceived importance and satisfaction towards Web 2.0 technologies currently adopted. A theoretical framework for the organizational Web 2.0 adoption was built by reviewing the literature on information systems adoption and attitude towards behaviour. Based on the literature review, variables contexts such as perceived benefits, technology, organization, and environment were identified to predict the Malaysian retail-chain adoption of Web 2.0. Using a survey method, data were collected from 185 respondents in Malaysia. The data was analysed to test on eleven hypotheses. A research framework was proposed and tested using factor analysis, multiple regression analysis and Importance-Performance Analysis (IPA) grid techniques. Results showed that eight factors from the four contexts were found to play important role in the adoption of Web 2.0 except technology security, inter-organizational collaboration and organizational readiness. Lastly, this study provides empirical evidence that it is important to examine the organizations perception of importance and satisfaction toward different Web 2.0 technologies

    Journal Productivity in Fishery Science an informetric analysis

    Get PDF
    Knowledge is a human resource which has the ability to consolidate the valuable results of human thinking and civilization through different times. It is the totality of understanding of nature and its features for improved quality of life of human society. Because of this, knowledge has been increasing in volume, dimension and directions. The term ‘information’ and 'knowledge' are often used as if they are interchangeable. Information is ‘potential knowledge‘ which is converted into knowledge by the integration of memory of human beings. In modern times there is a confusion on knowledge usage. Therefore an understanding of the concept ‘knowledge’ is needed for formulation of strategies in information science

    A Practical Framework to Study Low-Power Scheduling Algorithms on Real-Time and Embedded Systems

    Get PDF
    With the advanced technology used to design VLSI (Very Large Scale Integration) circuits, low-power and energy-efficiency have played important roles for hardware and software implementation. Real-time scheduling is one of the fields that has attracted extensive attention to design low-power, embedded/real-time systems. The dynamic voltage scaling (DVS) and CPU shut-down are the two most popular techniques used to design the algorithms. In this paper, we firstly review the fundamental advances in the research of energy-efficient, real-time scheduling. Then, a unified framework with a real Intel PXA255 Xscale processor, namely real-energy, is designed, which can be used to measure the real performance of the algorithms. We conduct a case study to evaluate several classical algorithms by using the framework. The energy efficiency and the quantitative difference in their performance, as well as the practical issues found in the implementation of these algorithms are discussed. Our experiments show a gap between the theoretical and real results. Our framework not only gives researchers a tool to evaluate their system designs, but also helps them to bridge this gap in their future works

    NIAS NEWS Vol 4(2) - 1st January 1996

    Get PDF

    NIAS NEWS Vol 4(2) - January 1996

    Get PDF

    NIAS Annual Report 2018-2019

    Get PDF
    corecore