Pub Date : 2020-08-31DOI: 10.5121/ijcsit.2020.12408
T. Tsang
In every night of non-traffic hours, different jobs are conducting maintenance works in “Railway” trackside area. This project will explain a specific section of track under the sole control an Engineer’s Person-in-Charge as procedures. And how to provide protection methods by which a person or persons on or near a track are safeguarded from potential train movements or a train is safeguarded from other train movements or obstructions, or persons or equipment are safeguarded from traction power.Consolidated past several investigation reports and according to related is rules, workflow or procedures etc. to summarize. There are protection tools left on trackside area incident caused by the workers are forgetting and poor management. Proposed are different project themes in the light of their expertise, experience and observation in their daily works. The proposed themes are compared, assessed and prioritized under the criteria - “Manageable”, “Measurable”, “Result of Benefit”, “Standardization” and “Priority” in the Decision Matrix. Establish some solve problem methods for comparing to find out which that lower-cost plan accordingly. I came up with a conclusion and the ideas as develop a mobile application and create a unique QR code label with equipment naming to facilitate each worker management of protection tools. This is also fulfilled in popular terms of Creativity and Innovations. Used the MIT App Inventor (Massachusetts Institute of technology) an intuitive and visual programming preform for mobile application are development. Stage 1: program for individual mobile user application. Stage 2: build-up Network centralized storage with supervising console operation. Stage 3: testing system under with 5G network compatibility, bandwidth and network speed is applicable people will be able to use more of the network dedicated to each mobile phone.Finally, successful to apply trial works a fruitful outcome after implementation of the project solution. There was no missing of protection tools on trackside area within the trial period. With the safety-first culture boosted by us, I believe we can achieve a common goal: Everyone Going Home Safe and Well Every day.
{"title":"Railway Safety Protection with Android Mobile Application for 5G New Radio Network","authors":"T. Tsang","doi":"10.5121/ijcsit.2020.12408","DOIUrl":"https://doi.org/10.5121/ijcsit.2020.12408","url":null,"abstract":"In every night of non-traffic hours, different jobs are conducting maintenance works in “Railway” trackside area. This project will explain a specific section of track under the sole control an Engineer’s Person-in-Charge as procedures. And how to provide protection methods by which a person or persons on or near a track are safeguarded from potential train movements or a train is safeguarded from other train movements or obstructions, or persons or equipment are safeguarded from traction power.Consolidated past several investigation reports and according to related is rules, workflow or procedures etc. to summarize. There are protection tools left on trackside area incident caused by the workers are forgetting and poor management. Proposed are different project themes in the light of their expertise, experience and observation in their daily works. The proposed themes are compared, assessed and prioritized under the criteria - “Manageable”, “Measurable”, “Result of Benefit”, “Standardization” and “Priority” in the Decision Matrix. Establish some solve problem methods for comparing to find out which that lower-cost plan accordingly. I came up with a conclusion and the ideas as develop a mobile application and create a unique QR code label with equipment naming to facilitate each worker management of protection tools. This is also fulfilled in popular terms of Creativity and Innovations. Used the MIT App Inventor (Massachusetts Institute of technology) an intuitive and visual programming preform for mobile application are development. Stage 1: program for individual mobile user application. Stage 2: build-up Network centralized storage with supervising console operation. Stage 3: testing system under with 5G network compatibility, bandwidth and network speed is applicable people will be able to use more of the network dedicated to each mobile phone.Finally, successful to apply trial works a fruitful outcome after implementation of the project solution. There was no missing of protection tools on trackside area within the trial period. With the safety-first culture boosted by us, I believe we can achieve a common goal: Everyone Going Home Safe and Well Every day.","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121430726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper aims to spark a debate by presenting the need for developing data ecosystems in Europe that meet the social and public good while committing to democratic and ethical standards; suggesting a taxonomy of data infrastructures and institutions to support this need; using the case study of Barcelona as the flagship city trailblazing a critical policy agenda of smart cities to show the limitations and contradictions of the current state of affairs; and ultimately, proposing a preliminary roadmap for institutional and governance empowerment that could enable effective data ecosystems in Europe.,This paper draws on lessons learned in previous publications available in the sustainability (Calzada, 2018), regions (Calzada and Cowie, 2017; Calzada, 2019), Zenodo (Calzada and Almirall, 2019), RSA Journal (Calzada, 2019) and IJIS (Calzada, 2020) journals and ongoing and updated fieldwork about the Barcelona case study stemming from an intensive fieldwork action research that started in 2017. The methodology used in these publications was based on the mixed-method technique of triangulation via action research encompassing in-depth interviews, direct participation in policy events and desk research. The case study was identified as the most effective methodology.,This paper, drawing from lessons learned from the Barcelona case study, elucidates on the need to establish pan-European data infrastructures and institutions – collectively data ecosystems – to protect citizens’ digital rights in European cities and regions. The paper reveals three main priorities proposing a preliminary roadmap for local and regional governments, namely, advocacy, suggesting the need for city and regional networks; governance, requiring guidance and applied, neutral and non-partisan research in policy; and pan-European agencies, leading and mobilising data infrastructures and institutions at the European level.,From the very beginning, this paper acknowledges its ambition, and thus its limitations and clarifies its attempt to provide just an overview rather than a deep research analysis. This paper presents several research limitations and implications regarding the scope. The paper starts by presenting the need for data ecosystems, then structures this need through two taxonomies, all illustrated through the Barcelona case study and finally, concludes with a roadmap consisting of three priorities. The paper uses previous published and ongoing fieldwork findings in Barcelona as a way to lead, and thus encourage the proliferation of more cases through Cities Coalition for Digital Rights (CCDR).,This paper presents practical implications for local and regional authorities of the CCDR network. As such, the main three priorities of the preliminary roadmap could help those European cities and regions already part of the CCDR network to establish and build operational data ecosystems by establishing a comprehensive pan-European policy from the bottom-up that aligns with the ti
{"title":"Data Ecosystems for Protecting European Citizens' Digital Rights","authors":"Igor Calzada, E. Almirall","doi":"10.1108/tg-03-2020-0047","DOIUrl":"https://doi.org/10.1108/tg-03-2020-0047","url":null,"abstract":"This paper aims to spark a debate by presenting the need for developing data ecosystems in Europe that meet the social and public good while committing to democratic and ethical standards; suggesting a taxonomy of data infrastructures and institutions to support this need; using the case study of Barcelona as the flagship city trailblazing a critical policy agenda of smart cities to show the limitations and contradictions of the current state of affairs; and ultimately, proposing a preliminary roadmap for institutional and governance empowerment that could enable effective data ecosystems in Europe.,This paper draws on lessons learned in previous publications available in the sustainability (Calzada, 2018), regions (Calzada and Cowie, 2017; Calzada, 2019), Zenodo (Calzada and Almirall, 2019), RSA Journal (Calzada, 2019) and IJIS (Calzada, 2020) journals and ongoing and updated fieldwork about the Barcelona case study stemming from an intensive fieldwork action research that started in 2017. The methodology used in these publications was based on the mixed-method technique of triangulation via action research encompassing in-depth interviews, direct participation in policy events and desk research. The case study was identified as the most effective methodology.,This paper, drawing from lessons learned from the Barcelona case study, elucidates on the need to establish pan-European data infrastructures and institutions – collectively data ecosystems – to protect citizens’ digital rights in European cities and regions. The paper reveals three main priorities proposing a preliminary roadmap for local and regional governments, namely, advocacy, suggesting the need for city and regional networks; governance, requiring guidance and applied, neutral and non-partisan research in policy; and pan-European agencies, leading and mobilising data infrastructures and institutions at the European level.,From the very beginning, this paper acknowledges its ambition, and thus its limitations and clarifies its attempt to provide just an overview rather than a deep research analysis. This paper presents several research limitations and implications regarding the scope. The paper starts by presenting the need for data ecosystems, then structures this need through two taxonomies, all illustrated through the Barcelona case study and finally, concludes with a roadmap consisting of three priorities. The paper uses previous published and ongoing fieldwork findings in Barcelona as a way to lead, and thus encourage the proliferation of more cases through Cities Coalition for Digital Rights (CCDR).,This paper presents practical implications for local and regional authorities of the CCDR network. As such, the main three priorities of the preliminary roadmap could help those European cities and regions already part of the CCDR network to establish and build operational data ecosystems by establishing a comprehensive pan-European policy from the bottom-up that aligns with the ti","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129685715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We show how tensor network theory and deep learning theory can be combined to provide a ground-state network (Orus, 2014) of financial information for hyperfast training of business finance. The resulting minimal-complexity structure encodes an infinite number of probable outcomes into a finite graphical alphabet of 12 potential dynamic relations, called double-entries; the pixels of financial information. Using the proposed many-layered (Serb & Prodromakis, 2019), financial wave function (Schrodinger, 1935), as a computational resource (Biamonte, 2016), allows hyperfast processing of financial information, one pixel at a time; see fig. 1. This reveals a highly entangled architecture (Levine, et al., 2019), where complexity scales linearly, not exponentially (Huggins, et al., 2018). The new algorithm trains people on the fundamentals of business finance in about 10 hours; a process that would take at least one year with the conventional scheme. Results are based on solid empirical evidence.
我们展示了张量网络理论和深度学习理论如何结合起来,为企业财务的超高速训练提供财务信息的基态网络(Orus, 2014)。由此产生的最小复杂性结构将无限数量的可能结果编码为12个潜在动态关系的有限图形字母表,称为双条目;财务信息的像素。使用提出的多层(塞族和Prodromakis, 2019),金融波函数(薛定谔,1935)作为计算资源(Biamonte, 2016),允许超高速处理金融信息,一次一个像素;见图1。这揭示了一个高度纠缠的架构(Levine, et al., 2019),其中复杂性呈线性扩展,而不是指数扩展(Huggins, et al., 2018)。新算法在大约10个小时内训练人们了解商业金融的基础知识;按照传统方案,这一过程至少需要一年时间。结果基于可靠的经验证据。
{"title":"A Quantum Machine Learning Algorithm Provides Hyperfast Training of Business Finance","authors":"Alfredo Lacayo Evertsz, Lizelia Bravo Boza","doi":"10.2139/ssrn.3518838","DOIUrl":"https://doi.org/10.2139/ssrn.3518838","url":null,"abstract":"We show how tensor network theory and deep learning theory can be combined to provide a ground-state network (Orus, 2014) of financial information for hyperfast training of business finance. The resulting minimal-complexity structure encodes an infinite number of probable outcomes into a finite graphical alphabet of 12 potential dynamic relations, called double-entries; the pixels of financial information. Using the proposed many-layered (Serb & Prodromakis, 2019), financial wave function (Schrodinger, 1935), as a computational resource (Biamonte, 2016), allows hyperfast processing of financial information, one pixel at a time; see fig. 1. This reveals a highly entangled architecture (Levine, et al., 2019), where complexity scales linearly, not exponentially (Huggins, et al., 2018). The new algorithm trains people on the fundamentals of business finance in about 10 hours; a process that would take at least one year with the conventional scheme. Results are based on solid empirical evidence.","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117001585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rohit Hodage, Ritesh Hajare, Om Wangwad, Ashwini A. Pandagale, Faraz Bagwan
Cloud computing is a model which enables widespread access to a shared pool of resources including the characteristics of scalability, virtualization and many others. The most important service offered by cloud is storage wherein the users store the required data. Security is a concern here as the data is stored on remote server with multi user capabilities. The data is at the risk of unauthorized access thereby reducing reliability and privacy. The key issue in cloud regarding security is the openness of the host or service providers. A gateway to the hacker is being provided when a test environment is set on a cloud. Cloud allows exchange of information among its services which requires standards. This development of standards is tough due to the interoperability issues. An intruder can provide malicious threat to the cloud data. The developments of standards are still a concern in security of the cloud. Though there is increasing research done to enhance the security, new issue arises, or the security method becomes inappropriate for the scalable services. Program clustering and slicing for user efficiencies is difficult for the same reason.
{"title":"Data Security in Cloud Computing","authors":"Rohit Hodage, Ritesh Hajare, Om Wangwad, Ashwini A. Pandagale, Faraz Bagwan","doi":"10.32628/IJSRST205842","DOIUrl":"https://doi.org/10.32628/IJSRST205842","url":null,"abstract":"Cloud computing is a model which enables widespread access to a shared pool of resources including the characteristics of scalability, virtualization and many others. The most important service offered by cloud is storage wherein the users store the required data. Security is a concern here as the data is stored on remote server with multi user capabilities. The data is at the risk of unauthorized access thereby reducing reliability and privacy. The key issue in cloud regarding security is the openness of the host or service providers. A gateway to the hacker is being provided when a test environment is set on a cloud. Cloud allows exchange of information among its services which requires standards. This development of standards is tough due to the interoperability issues. An intruder can provide malicious threat to the cloud data. The developments of standards are still a concern in security of the cloud. Though there is increasing research done to enhance the security, new issue arises, or the security method becomes inappropriate for the scalable services. Program clustering and slicing for user efficiencies is difficult for the same reason.","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132247751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In today’s world, cloud computing plays an important role. It provides user with many services and facilities like software, platform, and infrastructure services. By using cloud computing user can access resources from anywhere, anytime whenever they need it. One of the factors for cloud computing is cloud services such as IAAS, PAAS, and SAAS. Resources get allocated according to the customer requirements, but many of them thinks that it is unsafe to use cloud services. It is said to be unsafe because there is no guarantee that all the information which is stored in cloud is secured and protected. Now a days, a major challenges in this cloud technology is security. Data stored in the cloud by the customers must be kept safe and should be easily accessible. Here we discuss about the various security issues in the data storage and challenges in cloud computing.
{"title":"A Review on Security Challenges and Issues in Cloud Computing","authors":"T. S. Vinutha, Sandeep Varma N","doi":"10.2139/ssrn.3507921","DOIUrl":"https://doi.org/10.2139/ssrn.3507921","url":null,"abstract":"In today’s world, cloud computing plays an important role. It provides user with many services and facilities like software, platform, and infrastructure services. By using cloud computing user can access resources from anywhere, anytime whenever they need it. One of the factors for cloud computing is cloud services such as IAAS, PAAS, and SAAS. Resources get allocated according to the customer requirements, but many of them thinks that it is unsafe to use cloud services. It is said to be unsafe because there is no guarantee that all the information which is stored in cloud is secured and protected. Now a days, a major challenges in this cloud technology is security. Data stored in the cloud by the customers must be kept safe and should be easily accessible. Here we discuss about the various security issues in the data storage and challenges in cloud computing.","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133520707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M(obile)-Apps are programs used by mobile devices (smartphones, tablets, smartwatch, …), now widespread, for various uses (system operation, chat, games, social networks, geolocation, e-commerce ...), available for download on unique digital platforms (store). Their legal and fiscal framework is still under discussion, also based on the distinction between developer and distributor. The economic evaluation of apps is based on software estimation methodologies appropriately adapted to the specific case (incremental economic or financial flows; expected royalties ...), considering the potential applicability on a large scale, with potentially exponential revenues and reduced additional costs.
{"title":"The Valuation of Mobile Apps","authors":"Roberto Moro Visconti","doi":"10.2139/ssrn.3533875","DOIUrl":"https://doi.org/10.2139/ssrn.3533875","url":null,"abstract":"M(obile)-Apps are programs used by mobile devices (smartphones, tablets, smartwatch, …), now widespread, for various uses (system operation, chat, games, social networks, geolocation, e-commerce ...), available for download on unique digital platforms (store). Their legal and fiscal framework is still under discussion, also based on the distinction between developer and distributor. The economic evaluation of apps is based on software estimation methodologies appropriately adapted to the specific case (incremental economic or financial flows; expected royalties ...), considering the potential applicability on a large scale, with potentially exponential revenues and reduced additional costs.","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122253386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-31DOI: 10.34218/ijcet.10.1.2019.009
B. Devender, Syed Abdul Sattar
Cloud computing offers many services among one is Storage as a service. Using this service user can outsource his data and whenever required he can download or he can share with others. Using cloud computing PHR owner can share his documents, but due to security challenges in cloud computing the health records of owner must be encrypted before outsourcing. In order to provide security for owner health records ABE (attribute-based encryption) is best suitable for other encryption techniques. Using ABE the PHR owner can define access control over his encrypted cloud data. But using ABE dynamic polices over encrypted cloud data is big challenge. In this paper for achieving grant and revoke privileges over encrypted data Timestamp server is introduced.
{"title":"Experimental Study on Cloud Security for Personal Health Records Over Patient Centric Data","authors":"B. Devender, Syed Abdul Sattar","doi":"10.34218/ijcet.10.1.2019.009","DOIUrl":"https://doi.org/10.34218/ijcet.10.1.2019.009","url":null,"abstract":"Cloud computing offers many services among one is Storage as a service. Using this service user can outsource his data and whenever required he can download or he can share with others. Using cloud computing PHR owner can share his documents, but due to security challenges in cloud computing the health records of owner must be encrypted before outsourcing. In order to provide security for owner health records ABE (attribute-based encryption) is best suitable for other encryption techniques. Using ABE the PHR owner can define access control over his encrypted cloud data. But using ABE dynamic polices over encrypted cloud data is big challenge. In this paper for achieving grant and revoke privileges over encrypted data Timestamp server is introduced.","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122762832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The cloud computing technology is providing the present world with the improved methods of storage, performance of an application and computation. Cloud computing could be described as on-demand availability of the resources of computer system, specifically the data storage as well as the computing power, deprived of any kind of direct active management by users. The opportunities and challenges that are associated with the cloud computing technology will be discussed within the paper.
{"title":"Cloud Computing: Opportunities And Challenges","authors":"Narendra Rao Tadapaneni","doi":"10.2139/ssrn.3563342","DOIUrl":"https://doi.org/10.2139/ssrn.3563342","url":null,"abstract":"The cloud computing technology is providing the present world with the improved methods of storage, performance of an application and computation. Cloud computing could be described as on-demand availability of the resources of computer system, specifically the data storage as well as the computing power, deprived of any kind of direct active management by users. The opportunities and challenges that are associated with the cloud computing technology will be discussed within the paper.","PeriodicalId":289043,"journal":{"name":"InfoSciRN: Information Networks (Topic)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117214660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}