31,391 research outputs found

    Invited; An overview of the three-dimensionally stacked dynamic random access memory

    Get PDF
    As the DRAM scaling proceeds, challenges related to device integration are becoming overwhelming. The challenges include securing the cell transistor performance, cell capacitance, and low wire resistance. The current two-dimensional integration will meet a significant barrier for further device integration near the design rule of ~ 10nm, which will happen within the next ten years. The die-stacking technology, making the highbandwidth memory, is an alternative approach but lacks cost-competitiveness. Therefore, cell-stacking technology will be needed for the higher-density DRAM fabrication up to tera-bit, which has been implemented in the vertical-NAND flash. However, DRAM requires a much higher cell transistor performance than the NAND flash, where the polycrystalline Si could meet cell transistor requirements. Please click Download on the upper right corner to see the full abstract

    Integration of multimedia technology into the curriculum of forensic science courses using crime scene investigations.

    Get PDF
    Virtual reality technology is a powerful tool for the development of experimental learning in practical situations. Creation of software packages with some element of virtual learning allows educators to broaden the available experience of students beyond the scope that a standard curriculum provides. This teaching methodology is widely used in the delivery of medical education with many surgical techniques being practised via virtual reality technologies (see Engum et al., 2003). Use has been made of this technology for a wide range of teaching applications such as virtual field trials for an environmental science course (Ramasundaram et al., 2005), and community nursing visiting education scenarios (Nelson et al., 2005) for example. Nelson et al. (2005) imaged three-dimensional representations of patient living accommodation incorporating views of patient medication in order to deliver care modules via a problem-based learning approach. The use of virtual reality in the teaching of crime scene science was pioneered by the National Institute of Forensic Science in Australia as part of their Science Proficiency Advisory Committee testing programme. A number of scenarios were created using CDROM interfacing, allowing as near as possible normal procedures to be adopted. This package included proficiency testing integrated into the package and serves as a paradigm for the creation of virtual reality crime scene scenarios (Horswell, 2000). The package is commercially available on CD-ROM as part of the series ‘After the Fact’ (http://www.nfis.com.au). The CD-ROM package is geared to proficiency training of serving scenes of crime officers and thus contains details that may not be needed in the education of other parties with a need for forensic awareness. These include undergraduate students studying towards forensic science degree programmes in the UK as well as serving Police Officers. These groups may need virtual reality crime scene material geared to their specific knowledge requirements. In addition, Prof J Fraser, President of the Forensic Science Society and a former police Scientific Support Manager, speaking to the United Kingdom, House of Commons Science and Technology Select Committee in its report ‘Forensic Science on Trial’ (2005) states: ‘The documented evidence in relation to police knowledge of forensic science, in terms of making the best use of forensic science, is consistently clear, that their knowledge needs to improve and therefore their training needs to improve’. This clearly identifies a need for further training of serving police officers in forensic science. It was with this in mind that staff at the University collaborated with the West Midlands Police Service. The aim was to create a virtual reality CD-ROM that could serve as part of the continuing professional development of serving police officers in the area of scene management. Adaptation of the CD-ROM could allow some introductory materials to help undergraduate students of forensic science

    Intrinsically Legal-For-Trade Objects by Digital Signatures

    Full text link
    The established techniques for legal-for-trade registration of weight values meet the legal requirements, but in praxis they show serious disadvantages. We report on the first implementation of intrinsically legal-for-trade objects, namely weight values signed by the scale, that is accepted by the approval authority. The strict requirements from both the approval- and the verification-authority as well as the limitations due to the hardware of the scale were a special challenge. The presented solution fulfills all legal requirements and eliminates the existing practical disadvantages.Comment: 4 pages, 0 figure

    Securing the Internet of Things Infrastructure - Standards and Techniques

    Get PDF
    The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users. Applications running on an IoT infrastructure generally handle sensitive information such as a patient’s healthcare record, the position of a logistic vehicle, or the temperature readings obtained through wireless sensor nodes deployed in a bushland. The protection of such information from unlawful disclosure, tampering or modification, as well as the unscathed presence of IoT devices, in adversarial environments, is of prime concern. In this paper, a descriptive analysis of the security of standards and technologies for protecting the IoT communication channel from adversarial threats is provided. In addition, two paradigms for securing the IoT infrastructure, namely, common key based and paired key based, are proposed

    Fordham Law Forward: Community, Service, Excellence: The Fordham Law Strategic Plan

    Get PDF
    Strategic plan for facing the challenges of legal education and the legal profession.https://ir.lawnet.fordham.edu/fa_administration/1000/thumbnail.jp

    Survey on remnant data research: the artefacts recovered and the implications in a cyber security conscious world

    Get PDF
    The prevalence of remnant data in second hand storage media is well documented. Since 2004 there have been ten separate papers released through Edith Cowan University alone. Despite numerous government agencies providing advice on securing personal and corporate information, and news articles highlighting the need for data security, the availability of personal and confidential data on second hand storage devices is continuing, indicating a systemic laissez faire attitude to data security, even in our supposedly cyber security conscious world. The research continues, but there seems to be a lack of correlation of these studies to identify trends or common themes amongst the results. The fact that this type of research continues to be conducted highlights the deficiencies in the methods used to advertise warnings publicised by Government departments and industry experts. Major media organisations seem reluctant to broadcast these warnings, unless there is a bigger story behind the issue. This paper highlights the ongoing issues and provides insight to the factors contributing to this growing trend

    Future Diffusion of PK1-Technology — A German Delphi Study

    Get PDF

    Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment

    Get PDF
    In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the business environment is critical to the success of an organization. This study builds on the previous research of the authors on the enablers of knowledge management by identifying the relationship between the enablers of knowledge management and the role played by information communication technologies (ICT) and ICT infrastructure in a business setting. This paper provides the findings of a survey collected from the four major Indian cities (Chennai, Coimbatore, Madurai and Villupuram) regarding their views and opinions about the enablers of knowledge management in business setting. A total of 80 organizations participated in the study with 100 participants in each city. The results show that ICT and ICT infrastructure can play a critical role in the creating, managing and sharing of knowledge in an Indian business environment
    • …
    corecore