首页 > 最新文献

InfoSciRN: Information Networks (Topic)最新文献

英文 中文
Railway Safety Protection with Android Mobile Application for 5G New Radio Network 基于Android移动应用的5G新无线网络铁路安全防护
Pub Date : 2020-08-31 DOI: 10.5121/ijcsit.2020.12408
T. Tsang
In every night of non-traffic hours, different jobs are conducting maintenance works in “Railway” trackside area. This project will explain a specific section of track under the sole control an Engineer’s Person-in-Charge as procedures. And how to provide protection methods by which a person or persons on or near a track are safeguarded from potential train movements or a train is safeguarded from other train movements or obstructions, or persons or equipment are safeguarded from traction power.Consolidated past several investigation reports and according to related is rules, workflow or procedures etc. to summarize. There are protection tools left on trackside area incident caused by the workers are forgetting and poor management. Proposed are different project themes in the light of their expertise, experience and observation in their daily works. The proposed themes are compared, assessed and prioritized under the criteria - “Manageable”, “Measurable”, “Result of Benefit”, “Standardization” and “Priority” in the Decision Matrix. Establish some solve problem methods for comparing to find out which that lower-cost plan accordingly. I came up with a conclusion and the ideas as develop a mobile application and create a unique QR code label with equipment naming to facilitate each worker management of protection tools. This is also fulfilled in popular terms of Creativity and Innovations. Used the MIT App Inventor (Massachusetts Institute of technology) an intuitive and visual programming preform for mobile application are development. Stage 1: program for individual mobile user application. Stage 2: build-up Network centralized storage with supervising console operation. Stage 3: testing system under with 5G network compatibility, bandwidth and network speed is applicable people will be able to use more of the network dedicated to each mobile phone.Finally, successful to apply trial works a fruitful outcome after implementation of the project solution. There was no missing of protection tools on trackside area within the trial period. With the safety-first culture boosted by us, I believe we can achieve a common goal: Everyone Going Home Safe and Well Every day.
在夜间非交通时段,不同工种在“铁路”轨道旁进行维修工作。本项目将对一段由工程师负责人单独控制的轨道进行程序说明。以及如何提供保护方法,以保护轨道上或轨道附近的一个或多个人员免受潜在列车运动的影响,或保护列车免受其他列车运动或障碍物的影响,或保护人员或设备免受牵引动力的影响。整合过去几次调查报告,并根据相关的规章制度、工作流程或程序等进行总结。有保护工具遗留在轨旁区域,事故是由于工人遗忘和管理不善造成的。根据他们在日常工作中的专业知识、经验和观察,提出不同的项目主题。根据决策矩阵中的“可管理”、“可衡量”、“效益结果”、“标准化”和“优先级”标准,对提议的主题进行比较、评估和排序。建立了一些解决问题的方法进行比较,找出相应的低成本方案。我的结论和想法是开发一个移动应用程序,并创建一个独特的带有设备名称的二维码标签,方便每个工人管理防护工具。这也体现在创造力和创新的流行术语中。使用MIT App Inventor(麻省理工学院)一个直观和可视化的移动应用程序开发编程工具。第一阶段:个人移动用户应用程序。第二阶段:建立网络集中存储与监督控制台操作。第三阶段:测试系统下与5G网络的兼容性,带宽和网速是否适用,人们将能够使用更多的网络专用于每一部手机。最后,成功应用试验工程取得丰硕成果后,实施了项目解决方案。试验期内轨旁区域未出现防护工具缺失现象。在安全第一文化的推动下,我相信我们可以实现一个共同的目标:每个人每天都安全回家。
{"title":"Railway Safety Protection with Android Mobile Application for 5G New Radio Network","authors":"T. Tsang","doi":"10.5121/ijcsit.2020.12408","DOIUrl":"https://doi.org/10.5121/ijcsit.2020.12408","url":null,"abstract":"In every night of non-traffic hours, different jobs are conducting maintenance works in “Railway” trackside area. This project will explain a specific section of track under the sole control an Engineer’s Person-in-Charge as procedures. And how to provide protection methods by which a person or persons on or near a track are safeguarded from potential train movements or a train is safeguarded from other train movements or obstructions, or persons or equipment are safeguarded from traction power.Consolidated past several investigation reports and according to related is rules, workflow or procedures etc. to summarize. There are protection tools left on trackside area incident caused by the workers are forgetting and poor management. Proposed are different project themes in the light of their expertise, experience and observation in their daily works. The proposed themes are compared, assessed and prioritized under the criteria - “Manageable”, “Measurable”, “Result of Benefit”, “Standardization” and “Priority” in the Decision Matrix. Establish some solve problem methods for comparing to find out which that lower-cost plan accordingly. I came up with a conclusion and the ideas as develop a mobile application and create a unique QR code label with equipment naming to facilitate each worker management of protection tools. This is also fulfilled in popular terms of Creativity and Innovations. Used the MIT App Inventor (Massachusetts Institute of technology) an intuitive and visual programming preform for mobile application are development. Stage 1: program for individual mobile user application. Stage 2: build-up Network centralized storage with supervising console operation. Stage 3: testing system under with 5G network compatibility, bandwidth and network speed is applicable people will be able to use more of the network dedicated to each mobile phone.Finally, successful to apply trial works a fruitful outcome after implementation of the project solution. There was no missing of protection tools on trackside area within the trial period. With the safety-first culture boosted by us, I believe we can achieve a common goal: Everyone Going Home Safe and Well Every day.","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121430726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Ecosystems for Protecting European Citizens' Digital Rights 保护欧洲公民数字权利的数据生态系统
Pub Date : 2020-03-23 DOI: 10.1108/tg-03-2020-0047
Igor Calzada, E. Almirall
This paper aims to spark a debate by presenting the need for developing data ecosystems in Europe that meet the social and public good while committing to democratic and ethical standards; suggesting a taxonomy of data infrastructures and institutions to support this need; using the case study of Barcelona as the flagship city trailblazing a critical policy agenda of smart cities to show the limitations and contradictions of the current state of affairs; and ultimately, proposing a preliminary roadmap for institutional and governance empowerment that could enable effective data ecosystems in Europe.,This paper draws on lessons learned in previous publications available in the sustainability (Calzada, 2018), regions (Calzada and Cowie, 2017; Calzada, 2019), Zenodo (Calzada and Almirall, 2019), RSA Journal (Calzada, 2019) and IJIS (Calzada, 2020) journals and ongoing and updated fieldwork about the Barcelona case study stemming from an intensive fieldwork action research that started in 2017. The methodology used in these publications was based on the mixed-method technique of triangulation via action research encompassing in-depth interviews, direct participation in policy events and desk research. The case study was identified as the most effective methodology.,This paper, drawing from lessons learned from the Barcelona case study, elucidates on the need to establish pan-European data infrastructures and institutions – collectively data ecosystems – to protect citizens’ digital rights in European cities and regions. The paper reveals three main priorities proposing a preliminary roadmap for local and regional governments, namely, advocacy, suggesting the need for city and regional networks; governance, requiring guidance and applied, neutral and non-partisan research in policy; and pan-European agencies, leading and mobilising data infrastructures and institutions at the European level.,From the very beginning, this paper acknowledges its ambition, and thus its limitations and clarifies its attempt to provide just an overview rather than a deep research analysis. This paper presents several research limitations and implications regarding the scope. The paper starts by presenting the need for data ecosystems, then structures this need through two taxonomies, all illustrated through the Barcelona case study and finally, concludes with a roadmap consisting of three priorities. The paper uses previous published and ongoing fieldwork findings in Barcelona as a way to lead, and thus encourage the proliferation of more cases through Cities Coalition for Digital Rights (CCDR).,This paper presents practical implications for local and regional authorities of the CCDR network. As such, the main three priorities of the preliminary roadmap could help those European cities and regions already part of the CCDR network to establish and build operational data ecosystems by establishing a comprehensive pan-European policy from the bottom-up that aligns with the ti
本文旨在通过提出在欧洲开发满足社会和公共利益的数据生态系统的必要性,同时致力于民主和道德标准,从而引发一场辩论;建议对数据基础设施和机构进行分类,以支持这一需求;以巴塞罗那作为引领智慧城市关键政策议程的旗舰城市的案例研究,展示当前事态的局限性和矛盾;最终,提出了一个初步的制度和治理赋权路线图,可以在欧洲实现有效的数据生态系统。本文借鉴了可持续性(Calzada, 2018)、地区(Calzada and Cowie, 2017;Calzada, 2019)、Zenodo (Calzada和Almirall, 2019)、RSA Journal (Calzada, 2019)和IJIS (Calzada, 2020)期刊,以及2017年开始的密集实地调查行动研究中关于巴塞罗那案例研究的持续和更新的实地调查。这些出版物中使用的方法是基于三角测量的混合方法技术,通过行动研究,包括深度访谈,直接参与政策事件和案头研究。案例研究被认为是最有效的方法。本文借鉴巴塞罗那案例研究的经验教训,阐述了建立泛欧数据基础设施和机构——集体数据生态系统——以保护欧洲城市和地区公民数字权利的必要性。本文揭示了三个主要优先事项,为地方和区域政府提出了初步路线图,即倡导,建议需要建立城市和区域网络;治理,需要对政策进行指导和应用、中立和无党派的研究;以及泛欧洲机构,在欧洲层面领导和调动数据基础设施和机构。从一开始,本文就承认了它的野心,从而也承认了它的局限性,并澄清了它只是一个概述,而不是一个深入的研究分析。本文就研究范围提出了若干研究局限性和启示。本文首先提出了对数据生态系统的需求,然后通过两种分类法构建了这种需求,所有这些都通过巴塞罗那案例研究进行了说明,最后以包含三个优先事项的路线图结束。本文利用之前在巴塞罗那发表的和正在进行的实地调查结果作为指导,从而通过城市数字权利联盟(CCDR)鼓励更多案例的扩散。本文提出了CCDR网络的地方和区域当局的实际意义。因此,初步路线图的三个主要优先事项可以帮助那些已经成为CCDR网络一部分的欧洲城市和地区建立和构建业务数据生态系统,通过自下而上地建立全面的泛欧洲政策,与欧盟委员会倡导的及时政策发展保持一致。本文可以通过提供指导方针来更好地协调欧洲不同城市和地区之间的关系,从而激励政策制定者。中美等全球领先的数据治理模式和大数据的出现正在极大地重塑公民与数据的关系。在这样的背景下,受到《通用数据保护条例》(GDPR)的直接影响,欧洲或许是第一次通过融合数据和智慧城市研究以及政策制定,发出了自己的声音。对数据生态系统(包括在欧洲城市和地区运营的数据基础设施和机构)的潜在城市实验的调查和新兴见解变得越来越重要。因此,主要的社会影响是那些已经在欧洲城市和地区运作的多方利益相关者政策计划。在之前的研究中,在全球数字地缘政治背景下,数据生态系统与数字权利没有直接关系,更具体地说,与可以直接应用于案例研究的两种分类(关于数据基础设施和机构)没有联系,就像关于巴塞罗那的研究一样。因此,本文的新颖性和独创性在于(基于以往的实地行动研究)开辟了一种采取战略行动的方式,通过三个具体的优先事项在城市和地区之间建立泛欧战略。这篇论文最终可以支持实践,并导致新的研究和政策途径。
{"title":"Data Ecosystems for Protecting European Citizens' Digital Rights","authors":"Igor Calzada, E. Almirall","doi":"10.1108/tg-03-2020-0047","DOIUrl":"https://doi.org/10.1108/tg-03-2020-0047","url":null,"abstract":"This paper aims to spark a debate by presenting the need for developing data ecosystems in Europe that meet the social and public good while committing to democratic and ethical standards; suggesting a taxonomy of data infrastructures and institutions to support this need; using the case study of Barcelona as the flagship city trailblazing a critical policy agenda of smart cities to show the limitations and contradictions of the current state of affairs; and ultimately, proposing a preliminary roadmap for institutional and governance empowerment that could enable effective data ecosystems in Europe.,This paper draws on lessons learned in previous publications available in the sustainability (Calzada, 2018), regions (Calzada and Cowie, 2017; Calzada, 2019), Zenodo (Calzada and Almirall, 2019), RSA Journal (Calzada, 2019) and IJIS (Calzada, 2020) journals and ongoing and updated fieldwork about the Barcelona case study stemming from an intensive fieldwork action research that started in 2017. The methodology used in these publications was based on the mixed-method technique of triangulation via action research encompassing in-depth interviews, direct participation in policy events and desk research. The case study was identified as the most effective methodology.,This paper, drawing from lessons learned from the Barcelona case study, elucidates on the need to establish pan-European data infrastructures and institutions – collectively data ecosystems – to protect citizens’ digital rights in European cities and regions. The paper reveals three main priorities proposing a preliminary roadmap for local and regional governments, namely, advocacy, suggesting the need for city and regional networks; governance, requiring guidance and applied, neutral and non-partisan research in policy; and pan-European agencies, leading and mobilising data infrastructures and institutions at the European level.,From the very beginning, this paper acknowledges its ambition, and thus its limitations and clarifies its attempt to provide just an overview rather than a deep research analysis. This paper presents several research limitations and implications regarding the scope. The paper starts by presenting the need for data ecosystems, then structures this need through two taxonomies, all illustrated through the Barcelona case study and finally, concludes with a roadmap consisting of three priorities. The paper uses previous published and ongoing fieldwork findings in Barcelona as a way to lead, and thus encourage the proliferation of more cases through Cities Coalition for Digital Rights (CCDR).,This paper presents practical implications for local and regional authorities of the CCDR network. As such, the main three priorities of the preliminary roadmap could help those European cities and regions already part of the CCDR network to establish and build operational data ecosystems by establishing a comprehensive pan-European policy from the bottom-up that aligns with the ti","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129685715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
A Quantum Machine Learning Algorithm Provides Hyperfast Training of Business Finance 量子机器学习算法为企业财务提供超高速训练
Pub Date : 2020-01-12 DOI: 10.2139/ssrn.3518838
Alfredo Lacayo Evertsz, Lizelia Bravo Boza
We show how tensor network theory and deep learning theory can be combined to provide a ground-state network (Orus, 2014) of financial information for hyperfast training of business finance. The resulting minimal-complexity structure encodes an infinite number of probable outcomes into a finite graphical alphabet of 12 potential dynamic relations, called double-entries; the pixels of financial information. Using the proposed many-layered (Serb & Prodromakis, 2019), financial wave function (Schrodinger, 1935), as a computational resource (Biamonte, 2016), allows hyperfast processing of financial information, one pixel at a time; see fig. 1. This reveals a highly entangled architecture (Levine, et al., 2019), where complexity scales linearly, not exponentially (Huggins, et al., 2018). The new algorithm trains people on the fundamentals of business finance in about 10 hours; a process that would take at least one year with the conventional scheme. Results are based on solid empirical evidence.
我们展示了张量网络理论和深度学习理论如何结合起来,为企业财务的超高速训练提供财务信息的基态网络(Orus, 2014)。由此产生的最小复杂性结构将无限数量的可能结果编码为12个潜在动态关系的有限图形字母表,称为双条目;财务信息的像素。使用提出的多层(塞族和Prodromakis, 2019),金融波函数(薛定谔,1935)作为计算资源(Biamonte, 2016),允许超高速处理金融信息,一次一个像素;见图1。这揭示了一个高度纠缠的架构(Levine, et al., 2019),其中复杂性呈线性扩展,而不是指数扩展(Huggins, et al., 2018)。新算法在大约10个小时内训练人们了解商业金融的基础知识;按照传统方案,这一过程至少需要一年时间。结果基于可靠的经验证据。
{"title":"A Quantum Machine Learning Algorithm Provides Hyperfast Training of Business Finance","authors":"Alfredo Lacayo Evertsz, Lizelia Bravo Boza","doi":"10.2139/ssrn.3518838","DOIUrl":"https://doi.org/10.2139/ssrn.3518838","url":null,"abstract":"We show how tensor network theory and deep learning theory can be combined to provide a ground-state network (Orus, 2014) of financial information for hyperfast training of business finance. The resulting minimal-complexity structure encodes an infinite number of probable outcomes into a finite graphical alphabet of 12 potential dynamic relations, called double-entries; the pixels of financial information. Using the proposed many-layered (Serb & Prodromakis, 2019), financial wave function (Schrodinger, 1935), as a computational resource (Biamonte, 2016), allows hyperfast processing of financial information, one pixel at a time; see fig. 1. This reveals a highly entangled architecture (Levine, et al., 2019), where complexity scales linearly, not exponentially (Huggins, et al., 2018). The new algorithm trains people on the fundamentals of business finance in about 10 hours; a process that would take at least one year with the conventional scheme. Results are based on solid empirical evidence.","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117001585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Security in Cloud Computing 云计算中的数据安全
Pub Date : 2019-09-09 DOI: 10.32628/IJSRST205842
Rohit Hodage, Ritesh Hajare, Om Wangwad, Ashwini A. Pandagale, Faraz Bagwan
Cloud computing is a model which enables widespread access to a shared pool of resources including the characteristics of scalability, virtualization and many others. The most important service offered by cloud is storage wherein the users store the required data. Security is a concern here as the data is stored on remote server with multi user capabilities. The data is at the risk of unauthorized access thereby reducing reliability and privacy. The key issue in cloud regarding security is the openness of the host or service providers. A gateway to the hacker is being provided when a test environment is set on a cloud. Cloud allows exchange of information among its services which requires standards. This development of standards is tough due to the interoperability issues. An intruder can provide malicious threat to the cloud data. The developments of standards are still a concern in security of the cloud. Though there is increasing research done to enhance the security, new issue arises, or the security method becomes inappropriate for the scalable services. Program clustering and slicing for user efficiencies is difficult for the same reason.
云计算是一种模型,它支持对共享资源池的广泛访问,包括可伸缩性、虚拟化和许多其他特性。云提供的最重要的服务是存储,用户可以在其中存储所需的数据。安全性是这里的一个问题,因为数据存储在具有多用户功能的远程服务器上。数据面临未经授权访问的风险,从而降低了可靠性和隐私性。云计算中关于安全性的关键问题是主机或服务提供商的开放性。当在云上设置测试环境时,就提供了通往黑客的网关。云允许在其服务之间交换信息,这需要标准。由于互操作性问题,标准的开发非常困难。入侵者可以对云数据提供恶意威胁。标准的发展仍然是云安全的一个关注点。尽管有越来越多的研究来增强安全性,但是出现了新的问题,或者安全性方法变得不适合可扩展的服务。出于同样的原因,提高用户效率的程序聚类和切片也很困难。
{"title":"Data Security in Cloud Computing","authors":"Rohit Hodage, Ritesh Hajare, Om Wangwad, Ashwini A. Pandagale, Faraz Bagwan","doi":"10.32628/IJSRST205842","DOIUrl":"https://doi.org/10.32628/IJSRST205842","url":null,"abstract":"Cloud computing is a model which enables widespread access to a shared pool of resources including the characteristics of scalability, virtualization and many others. The most important service offered by cloud is storage wherein the users store the required data. Security is a concern here as the data is stored on remote server with multi user capabilities. The data is at the risk of unauthorized access thereby reducing reliability and privacy. The key issue in cloud regarding security is the openness of the host or service providers. A gateway to the hacker is being provided when a test environment is set on a cloud. Cloud allows exchange of information among its services which requires standards. This development of standards is tough due to the interoperability issues. An intruder can provide malicious threat to the cloud data. The developments of standards are still a concern in security of the cloud. Though there is increasing research done to enhance the security, new issue arises, or the security method becomes inappropriate for the scalable services. Program clustering and slicing for user efficiencies is difficult for the same reason.","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132247751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Security Challenges and Issues in Cloud Computing 云计算安全挑战与问题综述
Pub Date : 2019-05-17 DOI: 10.2139/ssrn.3507921
T. S. Vinutha, Sandeep Varma N
In today’s world, cloud computing plays an important role. It provides user with many services and facilities like software, platform, and infrastructure services. By using cloud computing user can access resources from anywhere, anytime whenever they need it. One of the factors for cloud computing is cloud services such as IAAS, PAAS, and SAAS. Resources get allocated according to the customer requirements, but many of them thinks that it is unsafe to use cloud services. It is said to be unsafe because there is no guarantee that all the information which is stored in cloud is secured and protected.  Now a days, a major challenges in this cloud technology is security. Data stored in the cloud by the customers must be kept safe and should be easily accessible. Here we discuss about the various security issues in the data storage and challenges in cloud computing.
在当今世界,云计算扮演着重要的角色。它为用户提供许多服务和设施,如软件、平台和基础设施服务。通过使用云计算,用户可以随时随地访问资源。云计算的因素之一是云服务,如IAAS、PAAS和SAAS。资源是根据客户需求分配的,但是他们中的许多人认为使用云服务是不安全的。之所以说不安全,是因为无法保证存储在云中的所有信息都是安全的和受保护的。如今,云计算技术面临的主要挑战是安全性。客户存储在云中的数据必须保证安全,并且应该易于访问。在这里,我们将讨论数据存储中的各种安全问题以及云计算中的挑战。
{"title":"A Review on Security Challenges and Issues in Cloud Computing","authors":"T. S. Vinutha, Sandeep Varma N","doi":"10.2139/ssrn.3507921","DOIUrl":"https://doi.org/10.2139/ssrn.3507921","url":null,"abstract":"In today’s world, cloud computing plays an important role. It provides user with many services and facilities like software, platform, and infrastructure services. By using cloud computing user can access resources from anywhere, anytime whenever they need it. One of the factors for cloud computing is cloud services such as IAAS, PAAS, and SAAS. Resources get allocated according to the customer requirements, but many of them thinks that it is unsafe to use cloud services. It is said to be unsafe because there is no guarantee that all the information which is stored in cloud is secured and protected.  Now a days, a major challenges in this cloud technology is security. Data stored in the cloud by the customers must be kept safe and should be easily accessible. Here we discuss about the various security issues in the data storage and challenges in cloud computing.","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133520707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Valuation of Mobile Apps 手机应用的估值
Pub Date : 2019-03-02 DOI: 10.2139/ssrn.3533875
Roberto Moro Visconti
M(obile)-Apps are programs used by mobile devices (smartphones, tablets, smartwatch, …), now widespread, for various uses (system operation, chat, games, social networks, geolocation, e-commerce ...), available for download on unique digital platforms (store). Their legal and fiscal framework is still under discussion, also based on the distinction between developer and distributor. The economic evaluation of apps is based on software estimation methodologies appropriately adapted to the specific case (incremental economic or financial flows; expected royalties ...), considering the potential applicability on a large scale, with potentially exponential revenues and reduced additional costs.
M(移动)-应用程序是移动设备(智能手机,平板电脑,智能手表等)使用的程序,现在广泛用于各种用途(系统操作,聊天,游戏,社交网络,地理定位,电子商务等),可在独特的数字平台(商店)上下载。他们的法律和财政框架仍在讨论中,也是基于开发商和发行商之间的区别。应用程序的经济评估基于适合特定情况的软件评估方法(增量经济或财务流量;预期的版税…),考虑到潜在的大规模适用性,潜在的指数级收入和减少的额外成本。
{"title":"The Valuation of Mobile Apps","authors":"Roberto Moro Visconti","doi":"10.2139/ssrn.3533875","DOIUrl":"https://doi.org/10.2139/ssrn.3533875","url":null,"abstract":"M(obile)-Apps are programs used by mobile devices (smartphones, tablets, smartwatch, …), now widespread, for various uses (system operation, chat, games, social networks, geolocation, e-commerce ...), available for download on unique digital platforms (store). Their legal and fiscal framework is still under discussion, also based on the distinction between developer and distributor. The economic evaluation of apps is based on software estimation methodologies appropriately adapted to the specific case (incremental economic or financial flows; expected royalties ...), considering the potential applicability on a large scale, with potentially exponential revenues and reduced additional costs.","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122253386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental Study on Cloud Security for Personal Health Records Over Patient Centric Data 以患者为中心的个人健康记录云安全实验研究
Pub Date : 2019-01-31 DOI: 10.34218/ijcet.10.1.2019.009
B. Devender, Syed Abdul Sattar
Cloud computing offers many services among one is Storage as a service. Using this service user can outsource his data and whenever required he can download or he can share with others. Using cloud computing PHR owner can share his documents, but due to security challenges in cloud computing the health records of owner must be encrypted before outsourcing. In order to provide security for owner health records ABE (attribute-based encryption) is best suitable for other encryption techniques. Using ABE the PHR owner can define access control over his encrypted cloud data. But using ABE dynamic polices over encrypted cloud data is big challenge. In this paper for achieving grant and revoke privileges over encrypted data Timestamp server is introduced.
云计算提供了许多服务,其中之一就是存储即服务。使用此服务,用户可以将其数据外包,并且在需要时可以下载或与他人共享。使用云计算,PHR所有者可以共享他的文档,但由于云计算中的安全挑战,所有者的健康记录必须在外包之前加密。为了为所有者健康记录提供安全性,ABE(基于属性的加密)最适合于其他加密技术。使用ABE, PHR所有者可以定义对其加密云数据的访问控制。但是在加密的云数据上使用ABE动态策略是一个巨大的挑战。为了实现对加密数据的授权和撤销权限,本文介绍了时间戳服务器。
{"title":"Experimental Study on Cloud Security for Personal Health Records Over Patient Centric Data","authors":"B. Devender, Syed Abdul Sattar","doi":"10.34218/ijcet.10.1.2019.009","DOIUrl":"https://doi.org/10.34218/ijcet.10.1.2019.009","url":null,"abstract":"Cloud computing offers many services among one is Storage as a service. Using this service user can outsource his data and whenever required he can download or he can share with others. Using cloud computing PHR owner can share his documents, but due to security challenges in cloud computing the health records of owner must be encrypted before outsourcing. In order to provide security for owner health records ABE (attribute-based encryption) is best suitable for other encryption techniques. Using ABE the PHR owner can define access control over his encrypted cloud data. But using ABE dynamic polices over encrypted cloud data is big challenge. In this paper for achieving grant and revoke privileges over encrypted data Timestamp server is introduced.","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122762832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Computing: Opportunities And Challenges 云计算:机遇与挑战
Pub Date : 2018-03-20 DOI: 10.2139/ssrn.3563342
Narendra Rao Tadapaneni
The cloud computing technology is providing the present world with the improved methods of storage, performance of an application and computation. Cloud computing could be described as on-demand availability of the resources of computer system, specifically the data storage as well as the computing power, deprived of any kind of direct active management by users. The opportunities and challenges that are associated with the cloud computing technology will be discussed within the paper.
云计算技术正在为当今世界提供改进的存储、应用程序性能和计算方法。云计算可以被描述为计算机系统资源的按需可用性,特别是数据存储和计算能力,剥夺了用户任何形式的直接主动管理。本文将讨论与云计算技术相关的机遇和挑战。
{"title":"Cloud Computing: Opportunities And Challenges","authors":"Narendra Rao Tadapaneni","doi":"10.2139/ssrn.3563342","DOIUrl":"https://doi.org/10.2139/ssrn.3563342","url":null,"abstract":"The cloud computing technology is providing the present world with the improved methods of storage, performance of an application and computation. Cloud computing could be described as on-demand availability of the resources of computer system, specifically the data storage as well as the computing power, deprived of any kind of direct active management by users. The opportunities and challenges that are associated with the cloud computing technology will be discussed within the paper.","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117214660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
InfoSciRN: Information Networks (Topic)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1