19,558 research outputs found
Physical and medium access control layer advances in 5G wireless networks
No abstract available
Recommended from our members
Information systems and healthcare XXIV: Factors affecting the EAI adoption in the healthcare sector
Recent developments in the field of integration technologies like Enterprise Application Integration (EAI) have emerged to support organizations towards improving the quality of services and reducing integration costs. Despite the importance of EAI, there is limited empirical research reported on its adoption in the healthcare sector. Khoumbati et al. [2006] developed a model for the evaluation of EAI in healthcare organizations. In doing so, the causal interrelationship of EAI adoption factors was identified by using fuzzy cognitive mapping. This paper is a progression of previous work in the area and seeks to contribute by validating the model through a different case environment. Thus, this paper contributes by deriving and proposing the MAESTRO model for EAI adoption. MAESTRO identifies a set of factors that influence EAI adoption and it is evaluated through a real-life case study. It provides an understanding of the EAI adoption process through its grounding on empirical data. In doing so, the MAESTRO model supports the management of healthcare organizations during the decision-making process for EAI adoption
Guest Editorial: Design and Analysis of Communication Interfaces for Industry 4.0
This special issue (SI) aims to present recent advances in the design and analysis of communication interfaces for Industry 4.0. The Industry 4.0 paradigm aims to integrate advanced manufacturing techniques with Industrial Internet-of-Things (IIoT) to create an agile digital manufacturing ecosystem. The main goal is to instrument production processes by embedding sensors, actuators and other control devices which autonomously communicate with each other throughout the value-chain [1]
A Taxonomy of Virtualization Security Issues in Cloud Computing Environments
Objectives: To identify the main challenges and security issues of virtualization in cloud computing environments. It reviews the alleviation techniques for improving the security of cloud virtualization systems. Methods/ Statistical Analysis: Virtualization is a fundamental technology for cloud computing, and for this reason, any cloud vulnerabilities and threats affect virtualization. In this study, the systematic literature review is performed to find out the vulnerabilities and risks of virtualization in cloud computing and to identify threats, and attacks result from those vulnerabilities. Furthermore, we discover and analyze the effective mitigation techniques that are used to protect, secure, and manage virtualization environments. Findings: Thirty vulnerabilities are identified, explained, and classified into six proposed classes. Furthermore, fifteen main virtualization threats and attacks ar defined according to exploited
vulnerabilities in a cloud environment. Application/Improvements: A set of common mitigation solutions are recognized and discovered to alleviate the virtualization security risks. These reviewed techniques are analyzed and evaluated according to five specified security criteria
SciTech News Volume 71, No. 1 (2017)
Columns and Reports From the Editor 3
Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division Aerospace Section of the Engineering Division 9 Architecture, Building Engineering, Construction and Design Section of the Engineering Division 11
Reviews Sci-Tech Book News Reviews 12
Advertisements IEEE
Will SDN be part of 5G?
For many, this is no longer a valid question and the case is considered
settled with SDN/NFV (Software Defined Networking/Network Function
Virtualization) providing the inevitable innovation enablers solving many
outstanding management issues regarding 5G. However, given the monumental task
of softwarization of radio access network (RAN) while 5G is just around the
corner and some companies have started unveiling their 5G equipment already,
the concern is very realistic that we may only see some point solutions
involving SDN technology instead of a fully SDN-enabled RAN. This survey paper
identifies all important obstacles in the way and looks at the state of the art
of the relevant solutions. This survey is different from the previous surveys
on SDN-based RAN as it focuses on the salient problems and discusses solutions
proposed within and outside SDN literature. Our main focus is on fronthaul,
backward compatibility, supposedly disruptive nature of SDN deployment,
business cases and monetization of SDN related upgrades, latency of general
purpose processors (GPP), and additional security vulnerabilities,
softwarization brings along to the RAN. We have also provided a summary of the
architectural developments in SDN-based RAN landscape as not all work can be
covered under the focused issues. This paper provides a comprehensive survey on
the state of the art of SDN-based RAN and clearly points out the gaps in the
technology.Comment: 33 pages, 10 figure
Software Defined Networks based Smart Grid Communication: A Comprehensive Survey
The current power grid is no longer a feasible solution due to
ever-increasing user demand of electricity, old infrastructure, and reliability
issues and thus require transformation to a better grid a.k.a., smart grid
(SG). The key features that distinguish SG from the conventional electrical
power grid are its capability to perform two-way communication, demand side
management, and real time pricing. Despite all these advantages that SG will
bring, there are certain issues which are specific to SG communication system.
For instance, network management of current SG systems is complex, time
consuming, and done manually. Moreover, SG communication (SGC) system is built
on different vendor specific devices and protocols. Therefore, the current SG
systems are not protocol independent, thus leading to interoperability issue.
Software defined network (SDN) has been proposed to monitor and manage the
communication networks globally. This article serves as a comprehensive survey
on SDN-based SGC. In this article, we first discuss taxonomy of advantages of
SDNbased SGC.We then discuss SDN-based SGC architectures, along with case
studies. Our article provides an in-depth discussion on routing schemes for
SDN-based SGC. We also provide detailed survey of security and privacy schemes
applied to SDN-based SGC. We furthermore present challenges, open issues, and
future research directions related to SDN-based SGC.Comment: Accepte
Recommended from our members
The role of intermediaries in facilitating e-government diffusion in Saudi Arabia
Recent studies of e-government activity have highlighted adoption and diffusion issues as important subjects for rating e-government success. However in developing countries inadequate resources and limited citizensâ capabilities regarding new e-government have resulted in low diffusion and adoption of e-government services. This paper examines the role of intermediaries, which can be played by a third party; in bridging the gap between e-government implementation and social reality, and looks at the roles a third party can add within the e-government services mechanism. This paper uses a case study approach in order to reflect e-government progress within the context of the Kingdom of Saudi Arabia (KSA) as one developing country. The result of this paper shows that intermediaries play an important role in the diffusion of e-services in relation to improving the availability, accessibility and enhancing privacy and security
- âŠ