84 research outputs found

    High-Performance Data Compression-Based Design for Dynamic IoT Security Systems

    Get PDF
    IoT technology is evolving at a quick pace and is becoming an important part of everyday life. Consequently, IoT systems hold large amounts of data related to the user of the system that is vulnerable to security breaches. Thus, data collected by IoT systems need to be secured efficiently without affecting the IoT systems’ performance and without compromising security as well. In this paper, a high-performance dynamic security system is introduced. The system makes use of the ZedBoard’s dynamic partial reconfiguration capability to shift between three distinct cipher algorithms: AEGIS, ASCON, and DEOXYS-II. The switching between the three algorithms is performed using two different techniques: the algorithm hopping technique or the power adaptive technique. The choice of which technique to be used is dependent on whether the system needs to be focused on performance or power saving. The ciphers used are the CAESAR competition finalists that achieved the greatest results in each of the three competition categories, where each cipher algorithm has its own set of significant characteristics. The proposed design seeks to reduce the FPGA reconfiguration time by the application of LZ4 (Lempel-Ziv4) compression and decompression techniques on the ciphers’ bitstream files. The reconfiguration time decreased by a minimum of 38% in comparison to the state-of-the-art design, while the resource utilization increased by approximately 2%

    The influence of size and shape of Neodymium-doped:Yttrium Aluminium Garnet (Nd:YAG) laser capsulotomy on visual acuity and refraction

    Get PDF
    Background: Posterior capsule opacification is the most common complication of cataract surgery and results from the proliferation and migration of residual lenticular epithelial cells. Opacification may be diminished by atraumatic surgery; complete cleaning of cortex residues, polishing of both anterior and posterior capsules, clinical, pathological and experimental studies have shown that use of hydrodissection, the continuous curvilinear capsulorhexis or the use of specific intraocular lens (IOL) designs. The overall incidence of posterior capsule opacification (PCO) approaches 50% at 5 years following cataract surgery and disproportionately affects younger patients due to higher cell proliferation rates. Capsular-fixated, one-piece all-polymethylmethacrylate PC-IOLs with a Cshaped loop configuration and a posterior convexity of the optic are effective in reducing PCO. Objectives:To evaluate the influence of size and shape of neodymium: yttrium aluminum- Garnet (Nd:YAG) laser capsulotomy on visual acuity and refraction. Patients and method(s): A prospective study was performed in department of ophthalmology at Qena university hospital between September 2016 and September 2017. Informed consent was obtained from each patient before the study. A South Valley University institutional ethics committee approval was obtained. In this study 60 pseudophakic eyes of 58 patients of age range (30-70years) were included. All of the patients had undergone non complicated cataract surgery (phacoemulsification (48eyes) or extracapsular cataract extraction (12 eyes)). Result(s): All patients had significant vision loss and hazy fundus appearance due to posterior capsular opacification. There was significant improvement in VA in the four groups, with statistically significant improvement effect of cruciate shape capsulotomy with size >3.5mm on BCVA. Conclusion:The cruciate 0shape with size more than 3.5 mm capsulotomy openings show better improvement in BCVA than the other groups. Spherical equivalent show slight improvement in all groups which was insignificant

    A cross-sector analysis of human and organisational factors in the deployment of data-driven predictive maintenance

    Get PDF
    Domains such as utilities, power generation, manufacturing and transport are increasingly turning to data-driven tools for management and maintenance of key assets. Whole ecosystems of sensors and analytical tools can provide complex, predictive views of network asset performance. Much research in this area has looked at the technology to provide both sensing and analysis tools. The reality in the field, however, is that the deployment of these technologies can be problematic due to user issues, such as interpretation of data or embedding within processes, and organisational issues, such as business change to gain value from asset analysis. 13 experts from the field of remote condition monitoring, asset management and predictive analytics across multiple sectors were interviewed to ascertain their experience of supplying data-driven applications. The results of these interviews are summarised as a framework based on a predictive maintenance project lifecycle covering project motivations and conception, design and development, and operation. These results identified critical themes for success around having a target or decision-led, rather than data-led, approach to design; long-term resourcing of the deployment; the complexity of supply chains to provide data-driven solutions and the need to maintain knowledge across the supply chain; the importance of fostering technical competency in end-user organisations; and the importance of a maintenance-driven strategy in the deployment of data-driven asset management. Emerging from these themes are recommendations related to culture, delivery process, resourcing, supply chain collaboration and industry-wide cooperation

    Determinantes de la intención de uso de las aplicaciones de banca para móviles: una extensión del modelo TAM clásico

    Get PDF
    This study has been conducted with financial support received from Excellence Research Project P12-SEJ-1980 of the Andalusia Regional Government and Project ECO2012- 39576 of Spanish Ministry of Economy and Competitiveness.For financial institutions mobile banking has represented a breakthrough in terms of remote banking services. However, many customers remain uncertain due to its security. This study develops a technology acceptance model that integrates the innovation diffusion theory, perceived risk and trust in the classic TAM model in order to shed light on what factors determine user acceptance of mobile banking applications. The participants had to examine a mobile application of the largest European bank. In the proposed model, an approach to external influences was included, theoretically and originally stated by Davis et al. (1989). The proposed model was empirically tested using data collected from an online survey applying structural equation modeling (SEM). The results obtained in this study demonstrate how attitude determine mainly the intended use of mobile apps, discarding usefulness and risk as factors that directly improve its use. Finally, the study shows the main management implications and identifies certain strategies to reinforce this new business in the context of new technological advances.Para las entidades financieras la banca para móviles ha representado una innovación en términos de servicios de banca remota. Sin embargo, muchos clientes siguen considerando incierta su seguridad. Este estudio desarrolla un modelo de aceptación tecnológica que integra, en el modelo TAM clásico, la teoría de la difusión de la innovación, el riesgo percibido y la confianza, a fin de clarificar qué factores determinan la aceptación de las aplicaciones de banca para móviles por parte del usuario. Los participantes tuvieron que examinar una aplicación para móviles perteneciente al mayor banco europeo. En el modelo propuesto, se incluyó una aproximación hacia las influencias externas, que fue establecida de manera teórica y original por parte de Davis et al. (1989). El modelo propuesto se testó empíricamente utilizando la información recolectada mediante una encuesta online, aplicando el modelo de ecuaciones estructurales (SEM). Los resultados obtenidos en el estudio demuestran el modo en que la actitud determina principalmente el uso previsto de las aplicaciones para móvil, descartando la utilidad y el riesgo como factores que mejoran directamente su uso. Por último, el estudio muestra las principales implicaciones para la gestión, e identifica ciertas estrategias de refuerzo de este nuevo negocio en el contexto de los nuevos avances tecnológicos.Excellence Research Project P12-SEJ-1980 of the Andalusia Regional GovernmentProject ECO2012- 39576 of Spanish Ministry of Economy and Competitivenes

    Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model

    Get PDF
    YesBased on a critical review of the Unified Theory of Acceptance and Use of Technology (UTAUT), this study first formalized an alternative theoretical model for explaining the acceptance and use of information system (IS) and information technology (IT) innovations. The revised theoretical model was then empirically examined using a combination of meta-analysis and structural equation modelling (MASEM) techniques. The meta-analysis was based on 1600 observations on 21 relationships coded from 162 prior studies on IS/IT acceptance and use. The SEM analysis showed that attitude: was central to behavioural intentions and usage behaviours, partially mediated the effects of exogenous constructs on behavioural intentions, and had a direct influence on usage behaviours. A number of implications for theory and practice are derived based on the findings

    Supporting decision-making in higher education institutions Toward a grounded theory of computer-based information

    No full text
    Available from British Library Document Supply Centre- DSC:DXN057251 / BLDSC - British Library Document Supply CentreSIGLEGBUnited Kingdo

    Teleworking in United Arab Emirates (UAE): An empirical study of influencing factors, facilitators, and inhibitors

    No full text
    This research constitutes an empirical study of influencing factors, facilitators, and inhibitors to the choice of teleworking mode in the UAE context. The research reveals that gender, marital status, nationality, residence location, and work profession are relevant, whereas educational level, Internet use, number of children, age, and years of experience are irrelevant influencing factors for the choice of teleworking mode. Furthermore, the research identifies six distinct facilitators and seven distinct inhibitors. The perceived importance of most identified facilitators and inhibitors to the choice of teleworking mode in the UAE context are found almost similar among the respondents. An exception, however, is made to the association between choice of teleworking mode and individual freedom, travel overload, cost reduction, and union resistance. The study outlines the limitations of the present research and suggests some practical implications and recommendations for managers
    • …
    corecore