1,009 research outputs found

    Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings

    Full text link
    We present a proxy signature scheme using bilinear pairings that provides effective proxy revocation. The scheme uses a binding-blinding technique to avoid secure channel requirements in the key issuance stage. With this technique, the signer receives a partial private key from a trusted authority and unblinds it to get his private key, in turn, overcomes the key escrow problem which is a constraint in most of the pairing-based proxy signature schemes. The scheme fulfills the necessary security requirements of proxy signature and resists other possible threats

    UML Modeling of Network Topologies for Distributed Computer System

    Get PDF
    Nowadays distributed computer systems have become very popular approach due to its availability at low cost and high performance computers, which are connected through a communication network. For connection of the distributed computer systems, network topologies are must for the communication lines. In the present paper a detailed study of network topologies is done for the distributed computer systems. A most popular Unified Modeling Language (UML) is used for designing the different network topologies. A comparative study is done for 2D Mesh, Torus, and Hypercube topologies and performance is evaluated after designing the UML Class, Sequence, and Activity diagrams for these topologies

    Calm my Headspace: Motivations and Barriers for Adoption and Usage of Meditation Apps during Times of Crisis

    Get PDF
    Meditation applications for smartphones have been steadily growing in popularity. During the current Coronavirus pandemic, usership of various meditation apps has grown to reach record levels. This study explores the motivations for and barriers to adoption and usage of meditation apps during times of crisis. The study is based on qualitative, semi-structured interviews conducted with seventeen participants. The interviews were audio recorded, transcribed verbatim, and coded using the NVivo software. Inductive thematic analysis identifies five themes: job-related factors, changing lifestyles, psychological conditions and worries, perceived outcomes, and price. All themes except for pricing were found to be motivators for use, while price was deemed a barrier to use. The themes align with the constructs from the Technology Acceptance Model (TAM), the Unified Theory of Acceptance and Use of Technology (UTAUT), and the Diffusion of Innovation (DOI) Theory, providing some useful guidance to meditation app providers

    Factors Influencing Enterprise Systems Procurement in Public Service Organisation: A Socio-Technical Case Study

    Get PDF
    Enterprise Systems (ES) are often presented as a driver for business by providing business process integration and utilisation of technology in organising. However, the majority of the ES research is centred on the implementation phase and pre-implementation and post-implementation phases remain largely ignored. Another gap in the existing literature is that it usually ignores the implementation context in theorising. This study focuses on the procurement process of a public service organisation and analyses three instances of ES procurement in the case organisation. The data collection and analysis are conducted using the theoretical lens of socio-technical systems (STS) theory. It notes that while the work-system level and organisation-system level factors play some role in the ES procurement, macrosocial level factors (institutional context and the ES market) play a more important role in the public service context. It also notes the demonstrative nature of certain elements of the ES procurement process in public service organisations. In this way, this study brings out the complexity of ES procurement in public service organisations that result from the interplay of factors operating at work-system, organisational, and macro levels

    Yet Another ‘List’ Of Critical Success ‘Factors’ For Enterprise Systems: Review Of Empirical Evidence And Suggested Research Directions (2)

    Get PDF
    Critical Success Factors (CSF) remain the most-researched areas within the Enterprise Systems (ES) domain over the years and has resulted in a long ‘list’ of such factors. Consequently, many ‘factors’ are not more than ‘variables’ belonging to the same management area. Therefore, this paper argues for going back to the original definition of CSFs as few key areas and reviews empirical evidence in each CSF area. Thereafter, the paper notes other limitations of the CSF literature and suggests research directions to provide a deeper explanation of the ES phenomena. These include tracing CSFs across time, taking a change-centric view of the ES lifecycle, unpacking interrelationship among CSFs, paying attention to the implementation context, and moving from a list of CSFs to the identification of their underlying mechanisms. We hope that our suggestions will provide a roadmap to ES researchers on conducting focussed research on CSFs

    Self-brand Connection in the Digital Age: A Qualitative Exploration of Brand Usage on Instagram for Identity Creation Among Millennials

    Get PDF
    The distinction between the real and the virtual world has become increasingly complex in recent years, especially with the emergence of social media blurring those transitions. The use of social media platforms such as Instagram, which primarily operates with visual language, helps in selective presentation of the Self to the outside world. This exploratory study investigates the formation of an ideal Self on Instagram among millennials. Based on the Instagram profile analysis and ten semi-structured interviews, findings demonstrate that millennials are expressing their identity through brand preference yet exhibit low brand-loyalty. These findings, combined with existing research on the formation of (digital) identity associated with brand usage, suggest that millennials identify with the brands they follow on Instagram but do not extend it, as assumed, to present an ideal version of themselves to the outside world

    A NOVEL STILL IMAGE MOSAIC ALGORITHM CONSTRUCTION USING FEATURE BASED METHOD

    Get PDF
    An image mosaic is a method of assembling multiple overlapping images of same scene into a larger one. The output of image mosaic will be the union of two input images. In this paper we have to use three step automatic image mosaic method. The first step is taking two input images and finding out the corners in both the images, second step is finding its matched corner and third step is its blending and we get final output mosaic. The experimental results show the proposed algorithm produces an improvement in mosaic accuracy, efficiency and robustness
    • 

    corecore