14,162 research outputs found

    Illuminating the Law of Copyright: Holographic Data Storage Takes Intellectual Property to a New Dimension

    Get PDF

    OEXP Analysis Tools Workshop

    Get PDF
    This publication summarizes the software needs and available analysis tools presented at the OEXP Analysis Tools Workshop held at the NASA Langley Research Center, Hampton, Virginia on June 21 to 22, 1988. The objective of the workshop was to identify available spacecraft system (and subsystem) analysis and engineering design tools, and mission planning and analysis software that could be used for various NASA Office of Exploration (code Z) studies, specifically lunar and Mars missions

    A Methodology for Engineering Collaborative and ad-hoc Mobile Applications using SyD Middleware

    Get PDF
    Today’s web applications are more collaborative and utilize standard and ubiquitous Internet protocols. We have earlier developed System on Mobile Devices (SyD) middleware to rapidly develop and deploy collaborative applications over heterogeneous and possibly mobile devices hosting web objects. In this paper, we present the software engineering methodology for developing SyD-enabled web applications and illustrate it through a case study on two representative applications: (i) a calendar of meeting application, which is a collaborative application and (ii) a travel application which is an ad-hoc collaborative application. SyD-enabled web objects allow us to create a collaborative application rapidly with limited coding effort. In this case study, the modular software architecture allowed us to hide the inherent heterogeneity among devices, data stores, and networks by presenting a uniform and persistent object view of mobile objects interacting through XML/SOAP requests and responses. The performance results we obtained show that the application scales well as we increase the group size and adapts well within the constraints of mobile devices

    <i>Medicago truncatula</i> functional genomics: an invaluable resource for studies on agriculture sustainability

    Get PDF
    Legume functional genomics has moved many steps forward in the last two decades thanks to the improvement of genomics technologies and to the efforts of the research community. Tools for functional genomics studies are now available in Lotus japonicus, Medicago truncatula and soybean. In this chapter we focus on M.truncatula, as a model species for forage legumes, on the main achievements obtained due to the reported resources and on the future perspectives for the study of gene function in this species

    To Share or Not to Share in Client-Side Encrypted Clouds

    Full text link
    With the advent of cloud computing, a number of cloud providers have arisen to provide Storage-as-a-Service (SaaS) offerings to both regular consumers and business organizations. SaaS (different than Software-as-a-Service in this context) refers to an architectural model in which a cloud provider provides digital storage on their own infrastructure. Three models exist amongst SaaS providers for protecting the confidentiality data stored in the cloud: 1) no encryption (data is stored in plain text), 2) server-side encryption (data is encrypted once uploaded), and 3) client-side encryption (data is encrypted prior to upload). This paper seeks to identify weaknesses in the third model, as it claims to offer 100% user data confidentiality throughout all data transactions (e.g., upload, download, sharing) through a combination of Network Traffic Analysis, Source Code Decompilation, and Source Code Disassembly. The weaknesses we uncovered primarily center around the fact that the cloud providers we evaluated were each operating in a Certificate Authority capacity to facilitate data sharing. In this capacity, they assume the role of both certificate issuer and certificate authorizer as denoted in a Public-Key Infrastructure (PKI) scheme - which gives them the ability to view user data contradicting their claims of 100% data confidentiality. We have collated our analysis and findings in this paper and explore some potential solutions to address these weaknesses in these sharing methods. The solutions proposed are a combination of best practices associated with the use of PKI and other cryptographic primitives generally accepted for protecting the confidentiality of shared information

    Hydrogen Evolution on Hydrophobic Aligned Carbon Nanotube Arrays

    Get PDF
    We investigate for the first time hydrophobic carbon nanotube-based electrochemical cells as an alternative solution to hydrogen sorting. We show that the electrically conducting surface of the nanotube arrays can be used as a cathode for hydrogen generation and absorption by electrolyzing water. We support our findings with Raman and gas chromatography measurements. These results suggest that carbon nanotube forests, presenting a unique combination of hydrophobicity and conductivity, are suitable for application in fuel cells and microelectromechanical devices

    Technology Options to Support the Implementation of Knowledge Management

    Full text link
    Company is more aware that knowledge management is one of the important factors because it gives competitive advantages for them. Knowledge is intellectual asset that is owned by individual or company. Knowledge becomes very useful if it is documented or stored, organized, shared to others and can be understood and applied. Knowledge Management System (KMS) is made to manage knowledge. KMS does identifying process, capturing, organizing and disseminating knowledge. Technology is one of three model of KM that supports the implementation of KM. This time there are various options of technology that support the KM implementation for companies. In this research, there are various options or types of technology that can be used to support the implementation of knowledge management

    Implementasi Manajemen Kearsipan Berbasis Lotus Notes

    Full text link
    This research, compiled an alternative of trouble-shooting in the form of archiving management implementation by using technology Lotus Domino Server version of 8.0.5 and Lotus Notes version of 8.0.5. This archiving management information system is very wide and complex on that account in this research to study problem of observation (auditing) done by Internal Control Identity. This study concerning Information systems to based on the literature. Data collecting based on data any kind of which required to design this information systems. After gathering data, the design an information system and to testing the design

    Exploring food retail logistics internationalisation in South East Asia

    Get PDF
    Paper originally presented at the 20th Annual Logistics Research Network Conference, 9th to 11th Sept 2015, Derby. Introduction: Two recent market research reports noted UK consumers enjoy lower food prices than other Western economies. There are many reasons for this but one is due to the UK’s world-leading food retail logistics systems. However, as highly-efficient UK and other Western grocery retailers have entered developing markets, such as South East (SE) Asia, this expertise has not necessarily been successful. Western systems are usually expected to contribute to retailing internationalisation through ‘follow-sourcing’ where retailers entering new markets will encourage existing suppliers to follow them into it, concentrating on procurement modernisation, the establishment of centralised distribution, and the use of third-party logistics (3PL) service providers

    Collaborative knowledge management system model in facilitating knowledge sharing among halal practitioners

    Get PDF
    Knowledge Management (KM) system is recognized as a tool for helping community of practice (CoP) such as the enforcement parties, the related producers or manufacturers, as well as the customers or users in capturing, storing, disseminating, and applying knowledge for their benefits in a collaborative environment. While, halal is an object or an action of the industry which is identified by applying Islamic knowledge in ensuring the goods as a product and the services are working based on the Islamic rules and according to sharia practice in the CoP daily life. In this context, there is a lack of the existing of Collaborative KM (CKM) as a system model of the CoP to facilitate halal practitioners as a standard mechanism to share knowledge especially that is related to promote the best practice or lesson learnt for the CoP’s purposes. Therefore, there is a need of a special mechanism in terms of CKM system (CKMS)model on how to manage halal knowledge as a system called CKMS application towards quality of services (QoS) based on its KM processes which are starting from knowledge acquisition, knowledge storage, knowledge dissemination, and knowledge application. Besides that, the system model of CKMS has been translated into a system prototype by using groupware software (i.e: Lotus Notes) which is evaluated based on its usability, accessibility, reliability, and security in supporting the CoP to work collaboratively anywhere, anytime and at any platform whether through desktop or mobile computing environment
    corecore