7,636 research outputs found

    Development of security in wireless sensor network using IPv6

    Get PDF
    The Wireless Sensor Networks (WSNs) is one of core technologies expected to become a potential basis of future ever-present networks. WSN consists of multiple low cost sensor nodes, which could either, have a fixed location or randomly deployed that can communicate with each other for monitoring environments, medical systems, home network, industry automation and so on. However, most of the application scenarios require connectivity between WSNs and the Internet. Though WSN is typically not IP-enabled, connection to the IP network makes it easy to monitor sensors everywhere in the world. One of the purposes of the research work is to incorporate the IPv6 with WSNs, where IPv6 offers a larger address space. Therefore each of the sensor nodes will have their own IP address compare to IPv4, which has limited address space.The main objective of this research is to implement security in WSNs. Sensor networks are typically characterized by limited power supplies, low bandwidth, small memory sizes and limited energy. In addition, unlike traditional networks, sensor nodes are often deployed in accessible areas, presenting the added risk of physical attack. This leads to a very demanding environment in providing security. The research proposed XOR encryption algorithm that possesses built-in and enhanced security measure. The encryption and decryption of the payload secure the data's of the packet transfer. Other than that the XOR encryption is meant to realize the real time routing where the packets will be delivered within their end-to-end deadlines.XOR encryption security has been implemented in the 61owpan/IPv6 stack for TinyOS 2.1. TinyOS 2.1 an embedded operating system commonly used in wireless sensor networks. The hardware platforms used in this project, the TelosB motes, the 802.15.4 wireless communication standard and the TinyOS 2.1 operating syste

    In Digital We Trust: The computerisation of retail finance in Western Europe and North America

    Get PDF
    This paper tells of the contents of a forthcoming volume, which offers a new and original approach to the study of technological change in retail finance. Most business history studies of businesses for the last 50 years note the emergence of computers and computer applications, but they do not analyze their role in shaping business practices and organizations. In this book we look directly at the processes of mechanisation and computerisation of retail financial services, throughout the 20th Century while articulating an international comparison. We bring together young, well established and independent historians, who come from different traditions (that is, economic, business, accounting, geography and political histories as well as historians of technology). Contributors look at stand alone and comparative case studies from different parts of the world (namely Britain, Denmark, France, Germany, Netherlands, Spain, Sweden, Mexico and the USA). The outcome is a rich survey of the broad literature examining different aspects of the technological and business histories of retail financial markets from a variety of perspectives.Retail finance, automation, Western Europe (Germany, UK, Spain, Netherlands, Sweden), North America (USA, Mexico)

    Book Review: Automating the Professions: Utopian Pipe Dream or Dystopian Nightmare?

    Get PDF

    PRIMA — Privacy research through the perspective of a multidisciplinary mash up

    Get PDF
    Based on a summary description of privacy protection research within three fields of inquiry, viz. social sciences, legal science, and computer and systems sciences, we discuss multidisciplinary approaches with regard to the difficulties and the risks that they entail as well as their possible advantages. The latter include the identification of relevant perspectives of privacy, increased expressiveness in the formulation of research goals, opportunities for improved research methods, and a boost in the utility of invested research efforts

    Data, ideology, and the developing critical program of social informatics

    Get PDF
    The rapidly shifting ideological terrain of computing has a profound impact on Social Informatics's critical and empirical analysis of computerization movements. As these movements incorporate many of the past critiques concerning social fit and situational context leveled against them by Social Informatics research, more subtle and more deeply ingrained modes of ideological practice have risen to support movements of computerization. Among these, the current emphasis on the promises of data and data analytics presents the most obvious ideological challenge. In order to reorient Social Informatics in relation to these new ideological challenges, Louis Althusser's theory of ideology is discussed, with its implications for Social Informatics considered. Among these implications, a changed relationship between Social Informatics's critical stance and its reliance on empirical methods is advanced. Addressed at a fundamental level, the practice of Social Informatics comes to be reoriented in a more distinctly reflective and ethical direction

    Mitigating risk in computerized bureaucracy

    Get PDF
    This paper presents an important aspect of the pragmatic dimensions of mitigating the risks that stem from computerized bureaucracy, and thereby, preserving the organizational integrity of a firm. A case study is used to provide valuable insights into the mechanics of such mitigation. The case refers to the problematic implementation and use of a computerized reservation system in a large budget hotel in London, United Kingdom. Following the empirical findings, Ciborra’s notions of bricolage, improvisation and tinkering are examined as practical and useful ways of addressing the downsides of computerized bureaucracy

    Public Libraries: techno trends and collective memory

    Get PDF
    By public library I mean here a library providing some kind of universal access to its assets, one whose readership isn’t exclusively tied and restricted to a particular organization – including the generally called public libraries, but also many specialized libraries, such as the academic of the open kind. Despite all efforts, public libraries continue to face strong barriers to their participation in the information society. Participants of the World Meeting on the Future of the ISIS Software recognized that “the ISIS Software Family has a unique technological concept and developmental mission to cope with Information Storage and Retrieval Systems (ISRS), particularly for developing countries where the technology is widely known and used; that the ISIS Software Family has now fully embraced the Free and Open Source Software approach and the support of UNICODE structures to be fully open and multilingual” (Rio Declaration 2008), restating thus the persistent relevance of this software family. OSS (Coar 2006) is defined as software whose source code is freely available, therefore allowing for free inspection and/or utilization, i.e., it is available for study and use by everyone without any payment or any other barrier to access. the lack of technical skill in libraries, a situation that libraries share with much of the public and cultural sectors. The study of OSS ILS, and of the their adaptation to the needs of specific public libraries may be the solution to this. Library Management Systems) that enhances digital archive interoperability between a diverse range of libraries
    • 

    corecore