1,516 research outputs found
Go for it: Where IS researchers arenât researching
This viewpoint article describes two research topics under-researched by Information Systems (IS) researchers: Robotics and IT addiction. These topics offer great potential for IS researchers in terms of business and societal impacts and it would behoove IS researchers to study them more fully. The aspects of the research topics that are related to IS are discussed and potential research areas and questions are suggested
Go for it: Where IS researchers arenât researching
This viewpoint article describes two research topics under-researched by Information Systems (IS) researchers: Robotics and IT addiction. These topics offer great potential for IS researchers in terms of business and societal impacts and it would behoove IS researchers to study them more fully. The aspects of the research topics that are related to IS are discussed and potential research areas and questions are suggested
Improved fuel-cell-type hydrogen sensor
Modified hydrogen sensor replaces oxygen cathode with a cathode consisting of a sealed paste of gold hydroxide and a pure gold current collector. The net reaction which occurs during cell operation is the reduction of the gold hydroxide to gold and water, with a half-cell potential of 1.4 volts
The AI Family: The Information Security Managers Best Frenemy?
In this exploratory study, we deliberately pull apart the Artificial from the Intelligence, the material from the human. We first assessed the existing technological controls available to Information Security Managers (ISMs) to ensure their in-depth defense strategies. Based on the AI watch taxonomy, we then discuss each of the 15 technologies and their potential impact on the transformation of jobs in the field of security (i.e., AI trainers, AI explainers and AI sustainers). Additionally, in a pilot study we collect the evaluation and the narratives of the employees (n=6) of a small financial institution in a focus group session. We particularly focus on their perception of the role of AI systems in the future of cyber security
The impact of cyberattacks on small states
The âImpactâ series has often emphasized the importance of size and volume to survive in software and IT. But what if the size of your country is small and you face the same cyberthreats as much larger countries in the world? That is the case with small states that face the same cyberattacks while often having less means to defend themselves. You cannot grow a small state into a large state just to be able to defend yourself better against cyberattacks. What you can do is explained in this column.âLes Hatton and Michiel van Genuchte
Virtual Baby Visit Going Mobile
Applications of Information Technologies (ITs) are increasing in the healthcare domain. ITs have been proven to be a support for the dissemination of knowledge andtraining amongst specialists in the use of computer-aided surgery [2]. The development of new technologies advances care opportunities for patients, e.g., improving patientwell-being by reducing pain through clinical investigation [6]. Recent developments in ITs towards a digital hospital [8] address medical practitioners and patients within thewalls of the hospital. Little attention has been given to crossing these walls, for example, supporting relatives of hospitalized patients. This column presents an example oftraditional boundaries of the hospital disappearing by the use of standard ITs. It explores the potential benefit brought by external system integration in the connecting area of Health Informatics/Telematics
MN Draconis - peculiar, active dwarf nova in the period gap
Context: We present results of an extensive world-wide observing campaign of
MN Draconis.
Aims: MN Draconis is a poorly known active dwarf nova in the period gap and
is one of the only two known cases of period gap SU UMa objects showing the
negative superhumps. Photometric behaviour of MN Draconis poses a challenge for
existing models of the superhump and superoutburst mechanisms. Therefore,
thorough investigation of peculiar systems, such as MN Draconis, is crucial for
our understanding of evolution of the close binary stars.
Methods: To measure fundamental parameters of the system, we collected
photometric data in October 2009, June-September 2013 and June-December 2015.
Analysis of the light curves, diagrams and power spectra was carried out.
Results: During our three observational seasons we detected four
superoutburts and several normal outbursts. Based on the two consecutive
superoutbursts detected in 2015, the supercycle length was derived P_sc = 74
+/- 0.5 days and it has been increasing with a rate of P_dot = 3.3 x 10^(-3)
during last twelve years. Based on the positive and negative superhumps we
calculated the period excess epsilon = 5.6% +/- 0.1%, the period deficit
epsilon_ = 2.5% +/- 0.6%, and in result, the orbital period P_orb = 0.0994(1)
days (143.126 +/- 0.144 min). We updated the basic light curve parameters of MN
Draconis.
Conclusions: MN Draconis is the first discovered SU UMa system in the period
gap with increasing supercycle length.Comment: 14 pages, 20 figures, 8 tables, accepted for publication in Astronomy
and Astrophysic
Improvements for Vision-based Navigation of Small, Fixed-wing Unmanned Aerial Vehicles
Investigating alternative navigation approaches for use when GPS signals are unavailable is an active area of research across the globe. In this paper we focus on the navigation of small, fixed-wing unmanned aerial vehicles (UAVs) that employ vision-based approaches combined with other measurements as a replacement for GPS. We demonstrate with flight test data that vehicle attitude information, derived from cheap, MEMS-based IMUs is sufficient to improve two different types of vision processing algorithms. Secondly, we show analytically and with flight test data that range measurements to one other vehicle with global pose is sufficient to constrain the global drift of a visual inertial odometry-based navigation solution. Further, we demonstrate that such ranging information is not needed at a fast rate; that bounding can occur using data as infrequent as 0.01Hz
- âŠ