61 research outputs found

    A Bibliometric Analysis of the HICSS Software Technology Track

    Get PDF
    The HICSS Software Technology track has a long tradition and many papers have been published as part of its history. Its impact in terms of citations, paper contributions, author share and community impact does not yet seem to have been investigated, though. In particular, software technology has evolved, and as it stands, it is of primary importance for mobile computing, the Internet-of-Things and Cyber-physical Systems. Hence, the development of these topics and the related impact of this track are of particular interest. In this paper, we present a bibliographic analysis as a first step towards such an investigation. We found that the history of the track is indeed noteworthy. Our results include finding a few extremely much cited papers, some curious tendencies, and a generally favourable outlook for HICSS. We found that indeed many papers in the history of this HICSS track addressed mobile technology and are highly cited. Together with providing insight into track, paper and author impact, we also raise questions worth of further investigation to understand the role of the HICSS Software Technology track and its impact on the academic field and society

    Demand-oriented Competency Development in a Manufacturing Context: The Relevance of Process and Knowledge Modeling

    Get PDF
    Competency management is a crucial success factor for organizations in the area of tension between knowledge management, human resource management, and process management, and has to be considered from a knowledge economy perspective. A basis for developing appropriate qualification measures in organizations is the comparison of necessary and available competencies. Given the time and cost intensity of the comparison process, the use of appropriate methods is of particular relevance for enterprises. This paper presents a procedural method and a software tool which enable resource-saving comparisons. Usually, employees’ “to competencies” are determined on a strategic level. Currently available “is competencies” can be derived from the actual knowledge transfer or from existing competence profiles. The method and tool first allow for the appropriate visualization of both competencies. After an automatized comparison of both contents, an overview of given and missing “to competencies” will be provided. Not available competencies can be addressed as qualification requirements and reflections regarding staffing or task allocation can be conducted

    Rapid prototyping of the SmartAR augmented reality control platform for multiple use cases

    Get PDF
    The technology of augmented reality (AR) is still in its infancy, but given the significant influence of mobile devices like smartphones and tablets, it can be said to be the next big thing for the next generation. The goal of this study is to create, utilizing fast application development approaches, a low-cost platform that can be applied to a variety of Smart City and Smart Building use cases. The many AR use cases discussed in this paper are all implemented using the same methodology. The Node-Red platform, which is perfectly suited to the Internet of Things and online applications, was used to swiftly construct a number of augmented reality use cases for the platfor

    A systematic literature review of cyberwarfare and state-sponsored hacking teams

    Full text link
    It is expected that the creation of next-generation wireless networks would result in the availability of high-speed and low-latency connectivity for every part of our life. As a result, it is important that the network is secure. The network's security environment has grown more complicated as a result of the growing number of devices and the diversity of services that 5G will provide. This is why it is important that the development of effective security solutions is carried out early. Our findings of this review have revealed the various directions that will be pursued in the development of next-generation wireless networks. Some of these include the use of Artificial Intelligence and Software Defined Mobile Networks. The threat environment for 5G networks, security weaknesses in the new technology paradigms that 5G will embrace, and provided solutions presented in the key studies in the field of 5G cyber security are all described in this systematic literature review for prospective researchers. Future research directions to protect wireless networks beyond 5G are also covered.Comment: 3 figure

    Fog computing pour l'intégration d'agents et de services Web dans un middleware réflexif autonome

    Get PDF
    International audienceService Oriented Architecture (SOA) has emerged as a dominant architecture for interoperability between applications, by using a weak-coupled model based on the flexibility provided by Web Services, which has led to a wide range of applications, what is known as cloud computing. On the other hand, Multi-Agent System (MAS) is widely used in the industry, because it provides an appropriate solution to complex problems, in a proactive and intelligent way. Specifically, Intelligent Environments (Smart City, Smart Classroom, Cyber Physical System, and Smart Factory, among others) obtain great benefits by using both architectures, because MAS endows intelligence to the environment, while SOA enables users to interact with cloud services, which improve the capabilities of the devices deployed in the environment. Additionally, the fog computing paradigm extends the cloud computing paradigm to be closer to the things that produce and act on the intelligent environment, allowing to deal with issues like mobility, real time, low latency, geo-localization, among other aspects. In this sense, in this article we present a middleware, which not only is capable of allowing MAS and SOA to communicate in a bidirectional and transparent way, but also, it uses the fog computing paradigm autonomously, according to the context and to the system load factor. Additionally, we analyze the performance of the incorporation of the fog-computing paradigm in our middleware and compare it with other works

    Big Data Management in Maritime Transport

    Get PDF
    As maritime transport produces a large amount of data from various sources and in different formats, authors have analysed current applications of Big Data by researching global applications and experiences and by studying journal and conference articles. Big Data innovations in maritime transport (both cargo and passenger) are demonstrated, mainly in the fields of seaport operations, weather routing, monitoring/tracking and security. After the analysis, the authors have concluded that Big Data analyses can provide deep understanding of causalities and correlations in maritime transport, thus improving decision making. However, there exist major challenges of an efficient data collection and processing in maritime transport, such as technology challenges, challenges due to competitive conditions etc. Finally, the authors provide a future perspective of Big Data usage in maritime transport
    corecore