149 research outputs found

    Raspberry Pi Technology

    Get PDF

    Cyber Security

    Get PDF
    This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: ​​data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition

    Cyber Security

    Get PDF
    This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: ​​data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition

    Optimization for Decision Making II

    Get PDF
    In the current context of the electronic governance of society, both administrations and citizens are demanding the greater participation of all the actors involved in the decision-making process relative to the governance of society. This book presents collective works published in the recent Special Issue (SI) entitled “Optimization for Decision Making II”. These works give an appropriate response to the new challenges raised, the decision-making process can be done by applying different methods and tools, as well as using different objectives. In real-life problems, the formulation of decision-making problems and the application of optimization techniques to support decisions are particularly complex and a wide range of optimization techniques and methodologies are used to minimize risks, improve quality in making decisions or, in general, to solve problems. In addition, a sensitivity or robustness analysis should be done to validate/analyze the influence of uncertainty regarding decision-making. This book brings together a collection of inter-/multi-disciplinary works applied to the optimization of decision making in a coherent manner

    Free Culture and the Digital Library Symposium Proceedings 2005: Proceedings of a Symposium held on October 14, 2005 at Emory University, Atlanta, Georgia.

    Get PDF
    Outlines the themes and contributions of the Free Culture and the Digital Library Symposium.The article provides a summary of the conflict of interests between those who seek to preserve ashared commons of information for society and those who seek to commodify information. Iintroduce a theoretical framework called Transmediation to help explain the changes in mediathat society is currently experiencing

    Ten Frontier Technologies for International Development

    Get PDF
    The report finds clear evidence of the potential of frontier technologies to contribute to social, economic and political development gains in a number of ways, by: ‱ Driving innovations in business models, products and processes that provide new goods and services to ‘bottom of the pyramid’ consumers; ‱ Providing the means by which to make better use of existing underutilised household and productive assets; ‱ Catalysing increases in demand, nationally and internationally, which create new industries and markets, leading to macro- and microeconomic growth; and ‱ Changing demand for labour and capital, leading to direct job creation and transformation of the workforce. For all of the potential upsides, potential downsides must also be considered. While it will largely be the private sector that will drive deployment of these technologies, the public sector through national regulation, as well as development financing, will have a major role in mediating the pace and direction of technological change, both to achieve development objectives, and to protect potential losers.As new technologies and digital business models reshape economies and disrupt incumbencies, interest has surged in the potential of novel frontier technologies to also contribute to positive changes in international development and humanitarian contexts. Widespread adoption of new technologies is acknowledged as centrally important to achieving the United Nations Sustainable Development Goals by 2030. But while frontier technologies can rapidly address large-scale economic, social or political challenges, they can also involve the displacement of existing technologies and carry considerable uncertainty and risk. Although there have been significant wins bringing the benefits of new technologies to poor consumers through examples such as mobile money or off-grid solar energy, there are many other areas where the applications may not yet have been developed into viable market solutions, or where opportunities have not yet been taken up in development practice

    Advances in Data Mining Knowledge Discovery and Applications

    Get PDF
    Advances in Data Mining Knowledge Discovery and Applications aims to help data miners, researchers, scholars, and PhD students who wish to apply data mining techniques. The primary contribution of this book is highlighting frontier fields and implementations of the knowledge discovery and data mining. It seems to be same things are repeated again. But in general, same approach and techniques may help us in different fields and expertise areas. This book presents knowledge discovery and data mining applications in two different sections. As known that, data mining covers areas of statistics, machine learning, data management and databases, pattern recognition, artificial intelligence, and other areas. In this book, most of the areas are covered with different data mining applications. The eighteen chapters have been classified in two parts: Knowledge Discovery and Data Mining Applications

    Copyright and shared networking technologies

    Get PDF
    PhDThe technological zeitgeist has transformed the social-cultural, legal and commercial aspects of society today. Networking technologies comprise one of the most influential factors in this. Although this transformation can be discounted as a mere historical phenomenon dating back to the advent of the printing press, empirical data concerning usage of these technologies shows that there has been a radical shift in the ability to control the dissemination of copyright works. Networking technologies allow, in an unprecedented manner, user-initiated activities including perfect replications, instantaneous dissemination, and abundant storage. They are immune to technological attempts to dismantle them, and impervious to legal attempts to control and harness them. They affect a global audience, which in turn, undermine at negligible costs, the legal and business parameters of copyright owners. The problem is whether it will now be possible to establish a copyright framework which balances the interests of the following groups: (a) copyright owners in their control of the dissemination of their works; (b) authors demanding remuneration for the exploitation of their works; (c) users wishing to consume works with clear immunity guidelines using networked technologies; (d) technologists striving to continuously innovate without legal and policy restrictions. Copyright law is not a mechanism for preserving the status quo or a particular business model. It is, as suggested above, a reflection of the needs and interests of authors, copyright owners, entertainment industries, users and technologists. This thesis examines whether the balance between these actors can be achieved and, if so, how it can be implemented within international, regional and national copyright laws. It finds that a balance can be struck; but that this balance should be aligned along three key concepts: user integrity; technological innovation; and authors‘ and owners‘ remuneration. The proposal is that the optimal method for achieving this triptych is the introduction and global implementation of a reasonable and unobtrusive system of remuneration

    A Social Network Approach to Provisioning and Management of Cloud Computing Services for Enterprises

    Get PDF
    • 

    corecore