124 research outputs found

    Internet of Things in Asset Management: Insights from Industrial Professionals and Academia

    Get PDF
    The emerging Internet of Things (IoT) technologies could rationalize data processes from acquisition to decision making if future research is focused on the exact needs of industry. This article contributes to this field by examining and categorizing the applications available through IoT technologies in the management of industrial asset groups. Previous literature and a number of industrial professionals and academic experts are used to identify the feasibility of IoT technologies in asset management. This article describes a preliminary study, which highlights the research potential of specific IoT technologies, for further research related to smart factories of the future. Based on the results of literature review and empirical panels IoT technologies have significant potential to be applied widely in the management of different asset groups. For example, RFID (Radio Frequency Identification) technologies are recognized to be potential in the management of inventories, sensor technologies in the management of machinery, equipment and buildings, and the naming technologies are potential in the management of spare parts.</jats:p

    Coping Strategies and Paradoxes Related to BYOD Information Security Threats in France

    Get PDF
    Bring Your Own Device (BYOD) refers to the provision and use of personal mobile devices by employees for both private and business purposes. Although there has been research on BYOD, little attention has been paid to employees' perception of threats to their personal information security (ISS) when using a BYOD, especially in a professional context. This article investigates employee coping strategies related to BYOD ISS threats in France. The results of a survey of 223 employees indicate that while perceived behavioral control exerts only direct effects on problem-focused (i.e., disturbance handling) and emotion-focused (i.e., self-preservation) coping strategies, ISS concern exhibits significant direct and moderating influences. Several security paradoxes could be identified, namely, discrepancies between the respondents' ISS concern and the adopted coping strategies. This article offers the first insights into the French context and can serve as a basis for comparisons in future research and to help improve employees' personal ISS in the professional context

    Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?

    Get PDF
    There exist various vulnerabilities in computing hardware that adversaries can exploit to mount attacks against the users of such hardware. Microarchitectural Attacks, the result of these vulnerabilities, take advantage of Microarchitectural performance of processor implementations, revealing hidden computing process. Leveraging Microarchitectural resources, adversaries can potentially launch Timing-Based Side-Channel Attacks in order to leak information via timing. In view of these security threats against computing hardware, we analyse current attacks that take advantage of Microarchitectural elements in shared computing hardware. Our analysis focuses only on Timing-Based Side-Channel Attacks against the components of modern PC platforms - with references being made also to other platforms when relevant - as opposed to any other variations of Side-Channel Attacks which have a broad application range. To this end, we analyse Timing Attacks performed against processor and cache components, again with references to other components when appropriate

    The Alpha Magnetic Spectrometer (AMS) on the international space station: Part II — Results from the first seven years

    Get PDF
    The Alpha Magnetic Spectrometer (AMS) is a precision particle physics detector on the International Space Station (ISS) conducting a unique, long-duration mission of fundamental physics research in space. The physics objectives include the precise studies of the origin of dark matter, antimatter, and cosmic rays as well as the exploration of new phenomena. Following a 16-year period of construction and testing, and a precursor flight on the Space Shuttle, AMS was installed on the ISS on May 19, 2011. In this report we present results based on 120 billion charged cosmic ray events up to multi-TeV energies. This includes the fluxes of positrons, electrons, antiprotons, protons, and nuclei. These results provide unexpected information, which cannot be explained by the current theoretical models. The accuracy and characteristics of the data, simultaneously from many different types of cosmic rays, provide unique input to the understanding of origins, acceleration, and propagation of cosmic rays.</p

    An Access Control Model for Dynamic VR Applications

    No full text

    Modern power system planning

    No full text
    xi.465 : 23c
    • …
    corecore