Search results for " networking"
showing 10 items of 1264 documents
State of the Art in Information Security Policy Development
2020
Despite the prevalence of research that exists under the label of “information security policies” (ISPs), there is no consensus on what an ISP means or how ISPs should be developed. This article reviews state-of-the-art ISP development by examining a diverse sample of literature on the subject. The definition and function of an ISP is studied first, revealing a rich tapestry of different notions behind the same term. When looking at the broad picture of the research on ISP development methods, we find different phases and levels of detail. Analyzing the different views on the content, context, and strategy alignment provides for further understanding on the complexity of the matter. As an o…
HyperLabelMe : A Web Platform for Benchmarking Remote-Sensing Image Classifiers
2017
HyperLabelMe is a web platform that allows the automatic benchmarking of remote-sensing image classifiers. To demonstrate this platform's attributes, we collected and harmonized a large data set of labeled multispectral and hyperspectral images with different numbers of classes, dimensionality, noise sources, and levels. The registered user can download training data pairs (spectra and land cover/use labels) and submit the predictions for unseen testing spectra. The system then evaluates the accuracy and robustness of the classifier, and it reports different scores as well as a ranked list of the best methods and users. The system is modular, scalable, and ever-growing in data sets and clas…
An efficient data model for energy prediction using wireless sensors
2019
International audience; Energy prediction is in high importance for smart homes and smart cities, since it helps reduce power consumption and provides better energy and cost savings. Many algorithms have been used for predicting energy consumption using data collected from Internet of Things (IoT) devices and wireless sensors. In this paper, we propose a system based on Multilayer Perceptron (MLP) to predict energy consumption of a building using collected information (e.g., light energy, day of the week, humidity, temperature, etc.) from a Wireless Sensor Network (WSN). We compare our system against four other classification algorithms, namely: Linear Regression (LR), Support Vector Machin…
Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study
2016
In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…
Shall we follow? Impact of reputation concern on information security managers’ investment decisions
2020
Information security (infosec) is important for organizations. While budgeting for infosec is a crucial resource allocation decision, infosec managers may choose to follow other fellow experts’ recommendations or baseline practices. The present paper uses reputational herding theory to explain the decision made by infosec managers to use a “let's follow others” strategy in this context. Based on a sample of 106 organizations in Finland, we find that infosec managers’ ability to accurately predict the benefit of infosec investment, as well as their reputations, have significant effects on motivating them to discount their own information. Infosec managers’ discounting of their own informatio…
Analysis of the Past Lifetime in a Replacement Model through Stochastic Comparisons and Differential Entropy
2020
A suitable replacement model for random lifetimes is extended to the context of past lifetimes. At a fixed time u an item is planned to be replaced by another one having the same age but a different lifetime distribution. We investigate the past lifetime of this system, given that at a larger time t the system is found to be failed. Subsequently, we perform some stochastic comparisons between the random lifetimes of the single items and the doubly truncated random variable that describes the system lifetime. Moreover, we consider the relative ratio of improvement evaluated at x &isin
Minimal forbidden patterns of multi-dimensional shifts
2005
We study whether the entropy (or growth rate) of minimal forbidden patterns of symbolic dynamical shifts of dimension 2 or more, is a conjugacy invariant. We prove that the entropy of minimal forbidden patterns is a conjugacy invariant for uniformly semi-strongly irreducible shifts. We prove a weaker invariant in the general case.
Climate and structure of the 8.2 ka event reconstructed from three speleothems from Germany
2020
Abstract The most pronounced climate anomaly of the Holocene was the 8.2 ka cooling event. We present new 230Th/U-ages as well as high-resolution stable isotope and trace element data from three stalagmites from two different cave systems in Germany, which provide important information about the structure and climate variability of the 8.2 ka event in central Europe. In all three speleothems, the 8.2 ka event is clearly recorded as a pronounced negative excursion of the δ18O values and can be divided into a ‘whole event’ and a ‘central event’. All stalagmites show a similar structure of the event with a short negative excursion prior to the ‘central event’, which marks the beginning of the …
Gray code for permutations with a fixed number of cycles
2007
AbstractWe give the first Gray code for the set of n-length permutations with a given number of cycles. In this code, each permutation is transformed into its successor by a product with a cycle of length three, which is optimal. If we represent each permutation by its transposition array then the obtained list still remains a Gray code and this allows us to construct a constant amortized time (CAT) algorithm for generating these codes. Also, Gray code and generating algorithm for n-length permutations with fixed number of left-to-right minima are discussed.
Demystifying the Possibilities of ICT4D in the Mountain Regions of Nepal
2011
Author's version of a chapter in the book: Proceedings of the 44th Hawaii International Conference on System Sciences. Also available from the publisher at: http://dx.doi.org/10.1109/HICSS.2011.142 Despite the substantial investments in ICT4D projects in developing countries, the benefits are yet to be realised by the majority of remote communities. Inaccessibility to ICT has widened educational, healthcare, information, and communication gaps between urban and remote communities. This paper focuses on an interpretive case study in Nepal to widen our understanding of how locally-initiated ICT4D projects may help to narrow these gaps. The study utilises the Assets Pentagon Model to identify …