1,814 research outputs found

    An Approach to Optimize the Management of Information Security in Public Organizations of Ecuador

    Get PDF
    The problems of information security in public organizations in Ecuador are evident, which, as a result, have led to corruptions that are present at all levels of operational, tactical and strategic management. The objective of this chapter is to analyze the available information found in different media, written, spoken, among others. The deductive method was used for the collection of information and observation techniques. It turned out the improve in the administrative processes, prototype diagram of sequence of access of users and services, prototype of integration of technologies of security of the information for public organizations of Ecuador. It was concluded that to avoid corruption in a country change should happen at all levels: the way of thinking and culture of the inhabitants, laws, penalties to politicians without parliamentary immunity, application of information and communications technologies (ICT) in an appropriate manner, and complying with international standards in information security. To improve information security, administrative policies on information security must be changed, and technologies related to immutable security algorithms, Ledger, Hyperledger, etc., must be used

    U.S. Military Innovation In The 21st Century: The Era Of The “Spin-On”

    Get PDF
    The intersection between the U.S. military and technological innovation, a “military-innovation nexus,” has led to the genesis of key technologies, including nuclear energy, general computing, GPS, and satellite technology from World War II to the present. However, an evolving innovation context in the twenty-first century, including the leadership of the commercial sector in technology innovation and the resurgence of great power competition, has led to doubts about the ability of the Department of Defense to discover and promote the technological innovations of the future. The Third Offset Strategy was formulated in 2014 in response to these concerns: The offset strategy promulgated reforms to bring the Pentagon and the commercial sector closer together while creating alternative contracting mechanisms for streamlined procurement and prototyping. Using defense biometrics and artificial intelligence as case studies of spin-on innovations adopted by the military, this Article seeks to understand the efficacy of the reforms undertaken under the auspices of the Third Offset Strategy to improve the institutional underpinnings of the U.S. innovation system for national security. I argue that the Third Offset Strategy has allowed the Pentagon to more effectively procure, develop, and field commercial technologies in the twenty-first century, and I conclude by proposing modest recommendations for the successful acquisition of spin-on innovations

    Data-driven evaluation of on-field player performance in football using sensor and video technologies

    Get PDF
    Data has become increasingly relevant and used in football over the years. Technological development has made it possible to gather data from various aspects of the game. However, despite the growing popularity of sports analytics, relatively little research, especially qualitative, has been done on the topic. The purpose of this thesis is to create understanding and practices for taking advance of data for evaluation of on-field player performance in football using sensor and video technologies. This is done by identifying and combining technological possibilities with sports knowledge and suggesting an approach for data-driven evaluation of the on-field player performance. Review of previous literature and semi-structured theme interviews have been used as a method to achieve the purpose of the thesis. The findings of the thesis show that data can be used in the evaluation of on-field player performance in football by assessing players’ physical, technical, tactical, and mental attributes. These attributes have several different metrics, the value of which depends on several factors such as the team's objectives. Furthermore, an approach is presented in the thesis which suggests that the selection of team-specific attributes and metrics guides the user to consider which data is needed to be able to evaluate the desired metrics, which then can be linked to certain technologies and analytical solutions presented in the thesis

    Augmenting the Production Operators for Continuous Improvement

    Get PDF
    This paper discusses how continuous improvement activities can be supported by augmenting the operators in production. After a brief literature background, real life case examples from manufacturing companies are provided and discussed. Enabling technologies, specifically AR and embedded sensors, can guide the operators in execution of their tasks, quality verification of work done step by step, and data collection from both manual and automated operations in much higher levels of details. Collected data provides an empirical foundation for data-driven analysis and improvement potentials in production and quality operations. The paper contributes to theory and practice by providing research-based innovation experiences on this emerging topic of interest for manufacturing companies.acceptedVersio

    No soldiers left behind: An IoT-based low-power military mobile health system design

    Get PDF
    © 2013 IEEE. There has been an increasing prevalence of ad-hoc networks for various purposes and applications. These include Low Power Wide Area Networks (LPWAN) and Wireless Body Area Networks (WBAN) which have emerging applications in health monitoring as well as user location tracking in emergency settings. Further applications can include real-Time actuation of IoT equipment, and activation of emergency alarms through the inference of a user\u27s situation using sensors and personal devices through a LPWAN. This has potential benefits for military networks and applications regarding the health of soldiers and field personnel during a mission. Due to the wireless nature of ad-hoc network devices, it is crucial to conserve battery power for sensors and equipment which transmit data to a central server. An inference system can be applied to devices to reduce data size for transfer and subsequently reduce battery consumption, however this could result in compromising accuracy. This paper presents a framework for secure automated messaging and data fusion as a solution to address the challenges of requiring data size reduction whilst maintaining a satisfactory accuracy rate. A Multilayer Inference System (MIS) was used to conserve the battery power of devices such as wearables and sensor devices. The results for this system showed a data reduction of 97.9% whilst maintaining satisfactory accuracy against existing single layer inference methods. Authentication accuracy can be further enhanced with additional biometrics and health data information

    FIT FOR USE ASSESSMENT OF BIOZEN AS A BIOMETRIC SENSOR CONCENTRATOR FOR REMOTE PATIENT MONITORING

    Get PDF
    In recent years, COVID-19 highlighted the importance of virtual health solutions with regard to improving patient health and conserving valuable hospital resources. Currently, the Defense Health Agency (DHA) does not own a remote patient-monitoring solution and relies on external commercial entities to provide the application and services. This could potentially lead to the DHA not retaining complete data ownership when patient data would reside on or traverse through commercial remote patient-monitoring solutions. This thesis evaluates BioZen, a DHA-owned biomedical sensor concentrator designed to run on a mobile phone, as a remote patient-monitoring tool. From this analysis, several key measures of effectiveness and measures of performance for remote patient-monitoring tools are identified and operationalized to measure the overall value BioZen brings to the DHA. Based on this research, it was found that the current build of BioZen, 2.0.0, is unable to meet any of the measures outlined in the study as a remote patient-monitoring tool. A future build of BioZen, or any remote patient-monitoring tool, could then be assessed using the measures of effectiveness and measures of performance within this study to determine the overall value brought to the DHA.Defense Health Agency, 7700 Arlington Boulevard, Falls Church, VA 22042Captain, United States ArmyLieutenant, United States NavyApproved for public release. Distribution is unlimited

    Unfamiliar face recognition : Security, surveillance and smartphones

    Get PDF
    A person’s ability to recognize familiar faces across a wide range of viewing conditions is one of the most impressive facets of human cognition. As shown in Figure 1, it is easy to conclude, for a known individual, that each image in the set shows the same person (British Prime Minister David Cameron), despite a wide range of variation in viewing angle, physical appearance, camera and lighting. In fact, familiar face recognition performance is often at or near ceiling level, even when the images are of poor quality [1] or artificially distorted. [2] At first glance, the aptitude for familiar face recognition may suggest a similar level of expertise for the recognition of unfamiliar faces, thus the reliance on face-to-photo ID for identity verification. [3] This is not the case, as recent research shows people are surprisingly poor at recognizing new instances of an unfamiliar person. The poor recognition of unfamiliar faces is a concern for the United States. Many preliminary screenings involve facial recognition by security agents. In order for this method to be effective, more robust training for security agents needs to be established. The Department of Defense utilizes facial and iris recognition technologies in order to eliminate human error in identifying persons of interest during surveillance operations. [4] DoD guidelines should be implemented by security agent guidance programs to ensure best practices in identification of potential threats

    CGAMES'2009

    Get PDF

    The Rise of iWar: Identity, Information, and the Individualization of Modern Warfare

    Get PDF
    During a decade of global counterterrorism operations and two extended counterinsurgency campaigns, the United States was confronted with a new kind of adversary. Without uniforms, flags, and formations, the task of identifying and targeting these combatants represented an unprecedented operational challenge for which Cold War era doctrinal methods were largely unsuited. This monograph examines the doctrinal, technical, and bureaucratic innovations that evolved in response to these new operational challenges. It discusses the transition from a conventionally focused, Cold War-era targeting process to one optimized for combating networks and conducting identity-based targeting. It analyzes the policy decisions and strategic choices that were the catalysts of this change and concludes with an in depth examination of emerging technologies that are likely to shape how this mode of warfare will be waged in the future.https://press.armywarcollege.edu/monographs/1436/thumbnail.jp
    • 

    corecore