996,090 results
Search Results
52. A streamlined workflow for conversion, peer review, and publication of genomics metadata as omics data papers
- Author
-
Teodor Georgiev, Lyubomir Penev, Seyhan Demirov, Pier Luigi Buttigieg, Raïssa Meyer, Georgi Zhelezov, Mariya Dimitrova, and Vincent S. Smith
- Subjects
0106 biological sciences ,Representational state transfer ,European Nucleotide Archive ,Databases, Factual ,computer.internet_protocol ,Computer science ,workflow ,AcademicSubjects/SCI02254 ,Health Informatics ,01 natural sciences ,data paper ,03 medical and health sciences ,Technical Note ,030304 developmental biology ,XPath ,Structure (mathematical logic) ,0303 health sciences ,Metadata ,FAIR principles ,Findability ,Genomics ,Data science ,Computer Science Applications ,omics ,Open data ,Workflow ,data ,MIxS ,standards ,AcademicSubjects/SCI00960 ,MINSEQE ,computer ,010606 plant biology & botany - Abstract
Background Data papers have emerged as a powerful instrument for open data publishing, obtaining credit, and establishing priority for datasets generated in scientific experiments. Academic publishing improves data and metadata quality through peer review and increases the impact of datasets by enhancing their visibility, accessibility, and reusability. Objective We aimed to establish a new type of article structure and template for omics studies: the omics data paper. To improve data interoperability and further incentivize researchers to publish well-described datasets, we created a prototype workflow for streamlined import of genomics metadata from the European Nucleotide Archive directly into a data paper manuscript. Methods An omics data paper template was designed by defining key article sections that encourage the description of omics datasets and methodologies. A metadata import workflow, based on REpresentational State Transfer services and Xpath, was prototyped to extract information from the European Nucleotide Archive, ArrayExpress, and BioSamples databases. Findings The template and workflow for automatic import of standard-compliant metadata into an omics data paper manuscript provide a mechanism for enhancing existing metadata through publishing. Conclusion The omics data paper structure and workflow for import of genomics metadata will help to bring genomic and other omics datasets into the spotlight. Promoting enhanced metadata descriptions and enforcing manuscript peer review and data auditing of the underlying datasets brings additional quality to datasets. We hope that streamlined metadata reuse for scholarly publishing encourages authors to create enhanced metadata descriptions in the form of data papers to improve both the quality of their metadata and its findability and accessibility.
- Published
- 2021
53. Position Paper
- Author
-
Scharenborg, O.E., Hasegawa-Johnson, Mark, and Marchi, E.
- Subjects
Stimulus (psychology) ,Computer science ,Human–computer interaction ,Imagined speech ,Emerging technologies ,SIGNAL (programming language) ,Position paper ,Speech synthesis ,Disabled people ,computer.software_genre ,computer - Abstract
This position paper focuses on the problem of building dialogue systems for people who have lost the ability to communicate via speech, e.g., patients of locked-in syndrome or severely disabled people. In order for such people to communicate to other people and computers, dialogue systems that are based on brain responses to (imagined) speech are needed. A speech-based dialogue system typically consists of an automatic speech recognition module and a speech synthesis module. In order to build a dialogue system that is able to work on the basis of brain signals, a system needs to be developed that is able to recognize speech imagined by a person and can synthesize speech from imagined speech. This paper proposes combining new and emerging technology on neural speech recognition and auditory stimulus construction from brain signals to build brain signal-based dialogue systems. Such systems have a potentially large impact on society.
- Published
- 2021
54. A categorization scheme for software engineering conference papers and its application
- Author
-
Eda Marchetti, Breno Miranda, Antonello Calabrò, Francesca Lonetti, and Antonia Bertolino
- Subjects
Paper type ,0301 basic medicine ,Scheme (programming language) ,Paper categorization ,Research problem ,Computer science ,business.industry ,Conference ,020207 software engineering ,02 engineering and technology ,Research contribution ,03 medical and health sciences ,030104 developmental biology ,Categorization ,Hardware and Architecture ,Validation ,0202 electrical engineering, electronic engineering, information engineering ,Software engineering ,business ,computer ,Software ,Information Systems ,computer.programming_language - Abstract
Background In Software Engineering (SE), conference publications have high importance both in effective communication and in academic careers. Researchers actively discuss how a paper should be organized to be accepted in mainstream conferences. Aiming This work tackles the problem of generalizing and characterizing the type of papers accepted at SE conferences. Method The paper offers a new perspective in the analysis of SE literature: a categorization scheme for SE papers is obtained by merging, extending and revising related proposals from a few existing studies. The categorization scheme is used to classify the papers accepted at three top-tier SE conferences during five years (2012–2016). Results While a broader experience is certainly needed for validation and fine-tuning, preliminary outcomes can be observed relative to what problems and topics are addressed, what types of contributions are presented and how they are validated. Conclusions The results provide insights to paper writers, paper reviewers and conference organizers in focusing their future efforts, without any intent to provide judgments or authoritative guidelines.
- Published
- 2018
55. Computer-based versus paper-based testing: Investigating testing mode with cognitive load and scratch paper use
- Author
-
Jared A. Danielson and Anna Agripina Prisacari
- Subjects
Class (computer programming) ,Multimedia ,Computer science ,05 social sciences ,Computer based ,050301 education ,Paper based ,computer.software_genre ,050105 experimental psychology ,Test (assessment) ,Variety (cybernetics) ,Human-Computer Interaction ,Mode (computer interface) ,Arts and Humanities (miscellaneous) ,Scratch ,Human–computer interaction ,0501 psychology and cognitive sciences ,0503 education ,computer ,General Psychology ,Cognitive load ,computer.programming_language - Abstract
The aim of the present study was to explore the relationship between testing mode (taking a test on computer versus paper) and two other factors: (1) cognitive load and (2) scratch paper use in an undergraduate general chemistry class setting. Cognitive load was measured with two self-report questions (perceived mental effort and level of difficulty) and scratch paper use was analyzed manually. All 221 students completed three assessments administered either on computer or paper. The assessments included a variety of chemistry topics with an equal number of three question types (algorithmic, conceptual, and definition). There was no significant difference in the cognitive load imposed by computer or paper-based tests at the overall test level or by question type. Students utilized scratch paper more on paper-based than online tests, especially when the questions were conceptual, and they used scratch paper the most for algorithmic questions. Altogether, these results provide further support that online testing can be implemented in educational settings without imposing additional cognitive load on students.
- Published
- 2017
56. The Norwegian State Railway System GTL (1976)
- Author
-
Steine, Tor Olav, Rannenberg, Kai, Editor-in-chief, Sakarovitch, Jacques, Series editor, Goedicke, Michael, Series editor, Tatnall, Arthur, Series editor, Neuhold, Erich J., Series editor, Pras, Aiko, Series editor, Tröltzsch, Fredi, Series editor, Pries-Heje, Jan, Series editor, Whitehouse, Diane, Series editor, Reis, Ricardo, Series editor, Murayama, Yuko, Series editor, Dillon, Tharam, Series editor, Gulliksen, Jan, Series editor, Rauterberg, Matthias, Series editor, Gram, Christian, editor, Rasmussen, Per, editor, and Østergaard, Søren Duus, editor
- Published
- 2015
- Full Text
- View/download PDF
57. Usability Evaluation of Self-Diagnosis User Interfaces for Depression: A Comparative Study among Paper-Based, Text-Based, and Voice-Based Conversational Interfaces
- Author
-
Jae Young Yun and Omtawan Mangkang
- Subjects
business.industry ,Computer science ,Usability ,Paper based ,Self-diagnosis ,computer.software_genre ,Chatbot ,Mental health ,Voice user interface ,Human–computer interaction ,User interface ,business ,computer ,Depression (differential diagnoses) - Published
- 2019
58. Construct Equivalence of PISA Reading Comprehension Measured With Paper‐Based and Computer‐Based Assessments
- Author
-
Ulf Kroehne, Carolin Hahnel, Frank Goldhammer, and Sarah Buerger
- Subjects
business.industry ,Computer based ,Construct validity ,Paper based ,computer.software_genre ,Education ,Reading comprehension ,Achievement test ,Artificial intelligence ,business ,Psychology ,computer ,Equivalence (measure theory) ,Natural language processing - Published
- 2019
59. White paper: technology for surgical telementoring—SAGES Project 6 Technology Working Group
- Author
-
Christopher M. Schlachta, Etai M. Bogen, and Todd A. Ponsky
- Subjects
Health Insurance Portability and Accountability Act ,geography ,Summit ,geography.geographical_feature_category ,Multimedia ,Guiding Principles ,Video capture ,business.industry ,Mentoring ,Usability ,computer.software_genre ,Telemedicine ,United States ,Videoconferencing ,White paper ,Need to know ,Humans ,Minimally Invasive Surgical Procedures ,Medicine ,Surgery ,Prospective Studies ,business ,computer ,Design technology - Abstract
Recent advances in telecommunication technology and video conferencing systems have opened a new avenue for surgical instruction called “surgical telementoring.” This report from the Technology Working Group of the SAGES Project 6 Summit reviews the telementoring technology that currently exists and proposes recommendations for minimum technology requirements and future technology development. While also providing insight in regulatory considerations, this review offers what prospective surgical telementoring participants need to know about the underlying technology with a specific focus on safety, reliability, transmission quality, ease of use, and cost. Content experts from around the world, in minimally invasive surgery, surgical mentoring and telementoring, surgical education, business development, healthcare innovation, and regulation were invited to attend a 2-day summit in Los Angeles, USA to outline the current state of surgical telementoring and chart the challenges and opportunities going forward. This article summarizes the discussion, conclusions, and recommendation of the technology group with regard to telementoring technology. This article reviews the technical requirements which can be divided into the following categories: (1) safety, (2) reliability, (3) transmission quality, (4) ease of use, and (5) cost. Telementoring applications are technology driven. Given the pace of change of technology, guiding principles in technology design and selection are warranted (Table 4). Telementoring technologies require two basic components, video capturing and display devices at the transmitting and receiving end, and a telecommunication link between them. Many additional features can be added to this basic setup including multiple cameras or video sources, remote camera zoom and pan, recording and storage of videos and images, and telestration capabilities to mention just a few. In general, the cost of these technologies is feature driven. The education framework for each specific application should determine the need for these features (Schlachta in Surg Endosc https://doi.org/10.1007/s00464-016-4988-5 ).
- Published
- 2019
60. Auto-generated Test Paper Based on Knowledge Embedding
- Author
-
Guo-Sheng Hao, Fang Luo, Yi-Yang He, Xiao-Dan He, Zeng-Hui Duan, and Xing-Liu Hu
- Subjects
Computer science ,Embedding ,Data mining ,Paper based ,computer.software_genre ,computer ,Computer Science Applications ,Education ,Test (assessment) - Published
- 2019
61. Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models
- Author
-
David Gerault
- Subjects
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Bounding overwatch ,Computer science ,Short paper ,Terrorism ,Rfid authentication ,Key (cryptography) ,ComputingMilieux_COMPUTERSANDSOCIETY ,Adversary ,Gas meter prover ,Computer security ,computer.software_genre ,computer - Abstract
Terrorist fraud is an attack against distance bounding protocols, whereby a malicious prover allows an adversary to authenticate on their behalf without revealing their secret key. In this paper, we propose new attack strategies that lead to successful terrorist frauds on proven-secure protocols.
- Published
- 2021
62. Vision and Value of Blockchain Media - Analysis on White Paper of Blockchain Media in Initial Coin Offering (ICO)
- Author
-
Kyung Han You and Ho Young Yoon
- Subjects
White paper ,Blockchain ,Information retrieval ,Semantic network analysis ,Computer science ,Sentiment analysis ,ICO ,computer.file_format ,Value (mathematics) ,computer - Published
- 2018
63. ENHANCING LANGUAGE STUDENTS AUTONOMYTHROUGH PERFORMING WORD-FORMATION PROCESSES A TERM PAPER
- Subjects
Term paper ,Computer science ,business.industry ,Language and Literature ,General Medicine ,Artificial intelligence ,Word formation ,computer.software_genre ,business ,computer ,Natural language processing - Abstract
A man's use of words is commonly taken as a measure of his knowledge and even of his intelligence. Creativity is one of the distinctive properties of human language, it is the ability to produce and understand new forms in a language. Creativity is mostly crystallized when it comes to words formation in general and internet created words in particular. It is apparent in speakers’ lexical knowledge as well , where new lexes are appended to our mental repertoire constantly. The aim of this study is to determine whether performing word formation processes supports EFL college students autonomy and to identify the most vital word formation processes activated on internet language . The research is an experimental one where a sample of (30) students of 2nd year students at the College of Education / Ibn-Rushd for the academic year 2014-2015 randomly selected to take a pre-test on morphology in general and word formation processes characterized by affixation in particular to identify the formed words and to derive new words mainly by the process of derivation being the most focused process in the curriculum. After three months course teaching of word formation processes highlighted mostly by the most common processes Developed by internet language , a post-test is administered. Finally, in order to capture the probable significance of performing these processes on students’ autonomy, a(Mann-Whitney U test ) is used. The results come to reject the null hypothesis, and prove positively the enhancement achieved through learning and performing these processes especially when enriched by up-to-date internet derivations and creativity.
- Published
- 2018
64. Session details: BSCI Short Paper Session 2
- Author
-
Xuyun Zhang
- Subjects
Multimedia ,Computer science ,Short paper ,Session (computer science) ,computer.software_genre ,computer - Published
- 2021
65. Synergistic networks of COVID-19’s top papers
- Author
-
Nosrat Riahinia, Farshid Danesh, and Somayeh Ghavidel
- Subjects
education.field_of_study ,Computer science ,business.industry ,media_common.quotation_subject ,Population ,Library and Information Sciences ,Python (programming language) ,Space (commercial competition) ,Data science ,Visualization ,Originality ,Publishing ,education ,business ,Social network analysis ,computer ,Information Systems ,computer.programming_language ,media_common ,Network analysis - Abstract
PurposeSynergy indicators and social network analysis (SNA), as practical tools, provide the possibility of explaining the pattern of scientific collaboration and visualization of network relations. Recognition of scientific capacities is the basis of synergy. The present study aims to measure and discover the synergistic networks of COVID-19’s top papers at the level of co-authorship, countries, journals, bibliographic couples and titles.Design/methodology/approachThe synergy indicator, co-authorship co-citation network analysis methods were applied. The research population comprises COVID-19’s top papers indexed in Essential Science Indicator and Web of Science Core Collection 2020 and 2021. Excel 2016, UCINET 6.528.0.0 2017, NetDraw, Ravar Matrix, VOSviewer version 1.6.14 and Python 3.9.5 were applied to analyze the data and visualize the networks.FindingsThe findings indicate that considering the three possible possibilities for authors, countries and journals, more redundancy and information are created and potential for further cooperation is observed. The synergy of scientific collaboration has revealed that “Wang, Y,” “USA” and “Science of the Total Environment” have the most effective capabilities and results. “Guan (2020b)” and “Zhou (2020)” are bibliographic couplings that have received the most citations. The keywords “CORONAVIRUS DISEASE 2019 (COVID-19)” were the most frequent in article titles.Originality/valueIn a circumstance that the world is suffering from a COVID-19 pandemic and all scientists are conducting various researches to discover vaccines, medicines and new treatment methods, scientometric studies, and analysis of social networks of COVID-19 publications to be able to specify the synergy rate and the scientific collaboration networks, are not only innovative and original but also of great importance and priority; SNA tools along with the synergy indicator is capable of visualizing the complicated and multifaceted pattern of scientific collaboration in COVID-19. As a result, analyses can help identify existing capacities and define a new space for using COVID-19 researchers’ capabilities.
- Published
- 2021
66. ElmNet: a benchmark dataset for generating headlines from Persian papers
- Author
-
Mohammad E. Shenassa and Behrouz Minaei-Bidgoli
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Deep learning ,Comparability ,Headline ,computer.software_genre ,Automatic summarization ,language.human_language ,Task (project management) ,Hardware and Architecture ,Media Technology ,language ,Benchmark (computing) ,Artificial intelligence ,business ,computer ,Software ,Natural language processing ,Sentence ,Persian - Abstract
Headline generation is a challenging subtask of abstractive text summarization, which its output should be a summary, shorter than one sentence. It would be precious to develop a dataset for the evaluation of abstractive summarization methods on this task in the Persian language. There are several datasets for headline generation in Persian, most of which are not large enough to be used by more sophisticated methods of text summarization, such as deep learning models. Moreover, all of these datasets are focused on daily news and there is no dataset for summarizing scientific Persian papers. In this article, we present “ElmNet,” a headline generation dataset of about 400,000 abstract/headline pairs of scientific papers, gathered from six major publishers for scientific articles in Persian. We, moreover, evaluate the performance of the most important deep learning-based headline generation methods, on the proposed dataset. The results prove the comparability of the performance of the state-of-the-art methods on this task, to their results on the existing English datasets.
- Published
- 2021
67. SISTEM PENGOLAHAN DATA LOG QUALITY CONTROL SYSTEM PAPER MACHINE MENJADI INFORMASI PAPER PROFILE
- Author
-
Wawan Kustiawan and Darmansyah Darmansyah
- Subjects
Database ,Computer science ,computer.software_genre ,computer - Abstract
Sistem QCS (Quality Control System) bisa memonitor kualitas kertas secara in-line saat proses produksi. Sistem QCS dapat mengeluarkan data kualitas kertas dalam bentuk log file teks. Data pada log file teks dapat diolah dan dianalisa untuk menjadi informasi kualitas kertas dengan parameter-parameter yang terdiri dari : basis weight (gramature), ash titrasi, moisture content, opasitas dan porositas. Informasi kualitas kertas ini disebut informasi paper profile. sistem Pengolahan Data Log QCS Menjadi Informasi Paper Profile pada penelitian ini dikembangkan dengan menggunakan metodologi prototyping dan bahasa pemrograman Visual Basic .Net. Pengolahan data pada sistem ini menggunakan metoda SPC (Statistical Process Control) dan memanfaatkan fasilitas-fasilitas yang dimiliki oleh Microsoft Excel yaitu pemrograman VBA, fungsi-fungsi statistik dan kemampuan membuat tampilan grafis yang menarik dan sudah sangat dikenal oleh pengguna komputer. Sistem informasi paper profile akan menyimpan dan mendistribusikan informasi paper profile melalui sebuah aplikasi berbasis web kepada pihak-pihak yang berkepentingan. Sehingga informasi paper profile dapat dibuat dan didistribusikan dengan mudah dan cepat . Informasi paper profile ini diperlukan untuk mengetahui kualitas produk dan untuk memonitor kapabilitas proses dalam menghasilkan produk. Kata kunci : QCS, Log File, Paper Profile, Statistical Process Control
- Published
- 2021
68. A comparative analysis of an electronic exams versus paper exams between different gender of iraqi students
- Author
-
Marwa M. Ismail, Bashar S. Bashar, and Bashar Bahaa Qas Elias
- Subjects
Response rate (survey) ,Control and Optimization ,Multimedia ,Computer Networks and Communications ,Computer science ,Process (engineering) ,computer.software_genre ,Continuous training ,Paper exam ,MSQ, SQL server ,E-exam ,NET Framework 4.5 ,Hardware and Architecture ,Signal Processing ,ComputingMilieux_COMPUTERSANDEDUCATION ,Electrical and Electronic Engineering ,computer ,Information Systems - Abstract
When students believe they can get smarter, they understand that effort makes them stronger. Therefore, they put in extra time and effort, and that leads to higher achievement. Besides that, the arrangement of question papers and answer sheets process for a high number of students takes a long time. In this paper, the sheet exam has been proposed to change into an electric exam (E-exam). This system depended on the client-server framework to convert the traditional exam environment into an electronic exam, providing multiple and different questions at the same time. In additions, kept the grades of students and providing them automatically. In this paper, Visual Studio and Microsoft SQL server have been proposed to develop the electronic exam. The questionnaire is made by distributed it among 30 students, and after the data analysis, the results have been collected have been represented a response rate of 100%. It is recommended that, to take electronic exams and e-learning for students periodically. To improve their performance through continuous training on computerized exams and to increase the student’s efficiency in this type of learning.
- Published
- 2020
69. Construction of Cognitive Maps to Improve Reading Performance by Text Signaling: Reading Text on Paper Compared to on Screen
- Author
-
Zifu Shi, Ting Tang, and Lin Yin
- Subjects
Background information ,media_common.quotation_subject ,lcsh:BF1-990 ,050105 experimental psychology ,03 medical and health sciences ,0302 clinical medicine ,physical signaling ,Reading (process) ,Psychology ,0501 psychology and cognitive sciences ,navigation ,General Psychology ,media_common ,Original Research ,paper reading ,Cognitive map ,Plain text ,05 social sciences ,Significant difference ,computer.file_format ,cognitive map ,verbal signaling ,Comprehension ,lcsh:Psychology ,Reading comprehension ,on-screen reading ,Construct (philosophy) ,computer ,030217 neurology & neurosurgery ,Cognitive psychology - Abstract
Reading text from a screen has been shown to be less effective compared with reading text from paper. Various signals may provide both background information and navigational cues, and may promote the construction of cognitive maps during on-screen reading, thus improving reading performance. This study randomly divided 75 college students into a paper reading group and an on-screen reading group. Both groups were tested for navigation and reading comprehension in response to three different forms of signaling (plain text, physical signaling, and verbal signaling). The results showed that when plain text was presented, the navigation and comprehension scores of the paper reading group were significantly higher than those of the on-screen reading group. However, no significant difference was found between both groups under signaling conditions. The navigation and comprehension scores of both groups were significantly higher under signaling conditions than under plain text. Moreover, the comprehension score of the on-screen reading group under physical signaling was significantly higher than that under verbal signaling. This research suggested that signals help to construct cognitive maps and effectively improve reading performance. Besides, physical signaling, such as underlining and bold formatting, is more effective for on-screen reading. The present study provides a practical and effective approach for improving on-screen reading based on cognitive map theory.
- Published
- 2020
70. Comparing a Multimedia Digital Informed Consent Tool With Traditional Paper-Based Methods: Randomized Controlled Trial
- Author
-
James Dziura, Fuad Abujarad, Sandra L. Alfano, Cynthia Brandt, Chelsea Edwards, Kristina Carlson, Sophia Mun, Geoffrey Chupp, and Peter Peduzzi
- Subjects
Original Paper ,mobile phone ,Multimedia ,business.industry ,informed consent ,digital health ,Medicine (miscellaneous) ,digital consent ,Health Informatics ,Usability ,Cognition ,computer.software_genre ,Coaching ,Digital health ,Computer Science Applications ,law.invention ,Comprehension ,Randomized controlled trial ,Mobile phone ,law ,Informed consent ,e-consent ,business ,Psychology ,computer - Abstract
Background The traditional informed consent (IC) process rarely emphasizes research participants’ comprehension of medical information, leaving them vulnerable to unknown risks and consequences associated with procedures or studies. Objective This paper explores how we evaluated the feasibility of a digital health tool called Virtual Multimedia Interactive Informed Consent (VIC) for advancing the IC process and compared the results with traditional paper-based methods of IC. Methods Using digital health and web-based coaching, we developed the VIC tool that uses multimedia and other digital features to improve the current IC process. The tool was developed on the basis of the user-centered design process and Mayer’s cognitive theory of multimedia learning. This study is a randomized controlled trial that compares the feasibility of VIC with standard paper consent to understand the impact of interactive digital consent. Participants were recruited from the Winchester Chest Clinic at Yale New Haven Hospital in New Haven, Connecticut, and healthy individuals were recruited from the community using fliers. In this coordinator-assisted trial, participants were randomized to complete the IC process using VIC on the iPad or with traditional paper consent. The study was conducted at the Winchester Chest Clinic, and the outcomes were self-assessed through coordinator-administered questionnaires. Results A total of 50 participants were recruited in the study (VIC, n=25; paper, n=25). The participants in both groups had high comprehension. VIC participants reported higher satisfaction, higher perceived ease of use, higher ability to complete the consent independently, and shorter perceived time to complete the consent process. Conclusions The use of dynamic, interactive audiovisual elements in VIC may improve participants’ satisfaction and facilitate the IC process. We believe that using VIC in an ongoing, real-world study rather than a hypothetical study improved the reliability of our findings, which demonstrates VIC’s potential to improve research participants’ comprehension and the overall process of IC. Trial Registration ClinicalTrials.gov NCT02537886; https://clinicaltrials.gov/ct2/show/NCT02537886
- Published
- 2020
71. SwiftPad: Exploring WYSIWYG TEX Editing on Electronic Paper
- Author
-
Elliott Wen and Gerald Weber
- Subjects
010302 applied physics ,Focus (computing) ,Computer science ,05 social sciences ,Composition system ,WYSIWYG ,Cascading Style Sheets ,01 natural sciences ,Readability ,Refresh rate ,law.invention ,Human–computer interaction ,law ,0103 physical sciences ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Identity (object-oriented programming) ,0501 psychology and cognitive sciences ,Electronic paper ,computer ,050107 human factors ,computer.programming_language - Abstract
Electronic paper (i.e., e-paper) is a display technology that aims to imitate and substitute the conventional paper. Previous studies of e-paper mainly focus on evaluating or making practical use of its readability. However, there is little research to explore the potential of e-paper on input-oriented applications. In this paper, we introduce a document composition system named SwiftPad for e-paper. Specifically, SwiftPad renovates the famous TEX typesetting system, enabling users to compose high typographic quality documents on e-paper in a WYSIWYG (what you see is what you get), offline-first, and collaborative fashion. Building such a system on resource-constrained e-paper with low screen refresh rate creates unique challenges. In this paper, we identity these challenges and provides workable solutions. We also provide a preliminary evaluation of the new system.
- Published
- 2020
72. Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities
- Author
-
Thomas Haines, Olivier Pereira, Peter B. Rønne, and UCL - SST/ICTM - Institute of Information and Communication Technologies, Electronics and Applied Mathematics
- Subjects
Scheme (programming language) ,Computer science [C05] [Engineering, computing & technology] ,050101 languages & linguistics ,Computer science ,business.industry ,05 social sciences ,Short paper ,Proof of security ,02 engineering and technology ,Computer security ,computer.software_genre ,Encryption ,Sciences informatiques [C05] [Ingénierie, informatique & technologie] ,Order (exchange) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,business ,computer ,ElGamal encryption ,Quantum computer ,computer.programming_language - Abstract
Marked mix-nets were introduced by Pereira and Rivest as a mechanism to allow very efficient mixing that ensures privacy but at the cost of not guaranteeing integrity. This is useful in a number of e-voting schemes such as STAR-Vote and Selene. However, the proposed marked mix-net construction comes with no proof of security and, as we show in this paper, does not provide privacy even in the presence of a single corrupt authority. Fortunately, the attack that we present is easy to prevent and we show several possible ways to address it. Finally while the original marked mix-net paper worked with ElGamal, we identify conditions that the adopted encryption scheme should satisfy in order to be appropriate for a marked mix-net. This opens the possibility of building marked mix-nets based on intractability assumptions which are believed to hold in the presence of a quantum computer.
- Published
- 2020
73. Experimental Comparison in Sensing Breast Cancer Mutations by Signal ON and Signal OFF Paper-Based Electroanalytical Strips
- Author
-
Emily P. Nguyen, Fabiana Arduini, Claudio Parolo, Giulia Cinotti, Danila Moscone, Stefano Cinti, Arben Merkoçi, Veronica Caratelli, Cinti, S., Cinotti, G., Parolo, C., Nguyen, E. P., Caratelli, V., Moscone, D., Arduini, F., and Merkoci, A.
- Subjects
Paper ,DNA, Single-Stranded ,Breast Neoplasms ,STRIPS ,Biosensing Techniques ,010402 general chemistry ,computer.software_genre ,01 natural sciences ,Signal ,Field (computer science) ,Analytical Chemistry ,law.invention ,Biosensing Technique ,DNA-based biosensors ,Breast cancer ,Settore CHIM/01 ,Design and Development ,law ,Experimental comparison ,Detection methods ,medicine ,Humans ,Liquid biopsy ,Protocol (science) ,Electrochemical Technique ,Chemistry ,010401 analytical chemistry ,Analytical performance ,Electrochemical Techniques ,medicine.disease ,Signal on ,0104 chemical sciences ,Emerging technologies ,Mutation ,Single strand DNA ,Female ,Data mining ,Detection protocols ,Biosensor ,computer ,Breast Neoplasm ,Human - Abstract
Altres ajuts: the ICN2 is funded by the CERCA Programme/Generalitat de Catalunya. The development of paper-based electroanalytical strips as powerful diagnostic tools has gained a lot of attention within the sensor community. In particular, the detection of nucleic acids in complex matrices represents a trending topic, especially when focused toward the development of emerging technologies, such as liquid biopsy. DNA-based biosensors have been largely applied in this direction, and currently, there are two main approaches based on target/probe hybridization reported in the literature, namely Signal ON and Signal OFF. In this technical note, the two approaches are evaluated in combination with paper-based electrodes, using a single strand DNA relative to H1047R (A3140G) missense mutation in exon 20 in breast cancer as the model target. A detailed comparison among the analytical performances, detection protocol, and cost associated with the two systems is provided, highlighting the advantages and drawbacks depending on the application. The present work is aimed to a wide audience, particularly for those in the field of point-of-care, and it is intended to provide the know-how to manage with the design and development stages, and to optimize the platform for the sensing of nucleic acids using a paper-based detection method.
- Published
- 2019
74. A blockchain future for internet of things security: a position paper
- Author
-
Mandrita Banerjee, Junghee Lee, and Kim-Kwang Raymond Choo
- Subjects
Blockchain ,lcsh:T58.5-58.64 ,Computer Networks and Communications ,Computer science ,business.industry ,lcsh:Information technology ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,World Wide Web ,Smart grid ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Position paper ,020201 artificial intelligence & image processing ,Research questions ,Intrusion prevention system ,Internet of Things ,business ,computer - Abstract
Internet of Things (IoT) devices are increasingly being found in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Things, Internet-of-Battlefield-Things, etc. In this paper, we survey articles presenting IoT security solutions published in English since January 2016. We make a number of observations, including the lack of publicly available IoT datasets that can be used by the research and practitioner communities. Given the potentially sensitive nature of IoT datasets, there is a need to develop a standard for sharing IoT datasets among the research and practitioner communities and other relevant stakeholders. Thus, we posit the potential for blockchain technology in facilitating secure sharing of IoT datasets (e.g., using blockchain to ensure the integrity of shared datasets) and securing IoT systems, before presenting two conceptual blockchain-based approaches. We then conclude this paper with nine potential research questions. Keywords: Blockchain, Blockchain security, Collaborative security, Internet-of-military things, IoT dataset, IoT self-healing, IoT security, Intrusion-prevention system, Predictive IoT security, Predictive security
- Published
- 2018
75. Effects of average molar weight, crystallinity, and hemicelluloses content on the enzymatic hydrolysis of sisal pulp, filter paper, and microcrystalline cellulose
- Author
-
Elisabete Frollini and Joice Jaqueline Kaschuk
- Subjects
Molar mass ,Filter paper ,020209 energy ,Pulp (paper) ,CELULOSE ,food and beverages ,02 engineering and technology ,engineering.material ,021001 nanoscience & nanotechnology ,Microcrystalline cellulose ,chemistry.chemical_compound ,Crystallinity ,chemistry ,Enzymatic hydrolysis ,0202 electrical engineering, electronic engineering, information engineering ,engineering ,Cellulose ,0210 nano-technology ,Agronomy and Crop Science ,computer ,SISAL ,Nuclear chemistry ,computer.programming_language - Abstract
Properties of cellulosic materials, such as average molar mass (MMvis), crystallinity index and hemicelluloses content may influence the efficiency of the enzymatic conversion of cellulose to glucose. Studies on the simultaneous influence of these parameters have been scarcely found in the literature. In the present study, the conversion of cellulose to glucose was investigated using cellulosic materials with different MMvis, crystallinity, and hemicelluloses content: microcrystalline cellulose (MCC, MMvis = 22104 g mol−1, CI = 79%, no hemicelluloses detected), sisal pulp (SP, MMvis = 94618 g mol−1, CI = 66%, hemicelluloses content = 2.6%) and filter paper (FP, MMvis = 98530 g mol−1, CI = 63%, hemicelluloses content = 19.2%). During the reactions, aliquots were withdrawn and, in addition to the liquors, the unreacted cellulosic materials were evaluated by MMvis, CI, SEM, length and thickness, which can help further understand the reaction as a whole. The liquors were characterized by high-performance liquid chromatography (HPLC) and Miller's method (or DNS). The highest yield for the conversion of cellulose to glucose was observed for SP (88%), followed by MCC (64%) and FP (52%). The results indicated that the presence of high hemicelluloses content (FP) had a more significant interference effect than high crystallinity (MCC).
- Published
- 2018
76. Low-Rank and Sparse Matrix Factorization for Scientific Paper Recommendation in Heterogeneous Network
- Author
-
Li Zhu, Xiaoyan Cai, Tianyu Gao, Shirui Pan, and Tao Dai
- Subjects
General Computer Science ,Rank (linear algebra) ,Computer science ,heterogeneous network ,General Engineering ,02 engineering and technology ,low rank and sparse matrix factorization ,Recommender system ,computer.software_genre ,Matrix decomposition ,Matrix (mathematics) ,Paper recommendation ,Cold start ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Collaborative filtering ,020201 artificial intelligence & image processing ,General Materials Science ,Data mining ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,computer ,lcsh:TK1-9971 ,Heterogeneous network ,Sparse matrix - Abstract
© 2013 IEEE. With the rapid growth of scientific publications, it is hard for researchers to acquire appropriate papers that meet their expectations. Recommendation system for scientific articles is an essential technology to overcome this problem. In this paper, we propose a novel low-rank and sparse matrix factorization-based paper recommendation (LSMFPRec) method for authors. The proposed method seamlessly combines low-rank and sparse matrix factorization method with fine-grained paper and author affinity matrixes that are extracted from heterogeneous scientific network. Thus, it can effectively alleviate the sparsity and cold start problems that exist in traditional matrix factorization based collaborative filtering methods. Moreover, LSMFPRec can significantly reduce the error propagated from intermediate outputs. In addition, the proposed method essentially captures the low-rank and sparse characteristics that exist in scientific rating activities; therefore, it can generate more reasonable predicted ratings for influential and uninfluential papers. The effectiveness of the proposed LSMFPRec is demonstrated by the recommendation evaluation conducted on the AAN and CiteULike data sets.
- Published
- 2018
77. Network Security for Home IoT Devices Must Involve the User: A Position Paper
- Author
-
Antonio Mignano and Lorenzo De Carli
- Subjects
business.industry ,Bar (music) ,Computer science ,Security design ,Network security ,05 social sciences ,Fingerprint (computing) ,050801 communication & media studies ,Computer security ,computer.software_genre ,0508 media and communications ,Position paper ,0501 psychology and cognitive sciences ,Internet of Things ,business ,computer ,050107 human factors - Abstract
Many home IoT devices suffer from poor security design and confusing interfaces, lowering the bar for successful cyberattacks. A popular approach to identify compromised IoT devices is network-based detection, in which network traffic is analyzed to fingerprint and identify such devices. However, while several network-based techniques for identifying misbehaving devices have been proposed, the role of the user in remediating IoT security incidents has been conspicuously overlooked.
- Published
- 2021
78. Terahertz Imaging for Paper Handling of Legacy Documents
- Author
-
David S. Citrin, Min Zhai, Alexandre Locquet, Georgia Tech Lorraine [Metz], Université de Franche-Comté (UFC), and Université Bourgogne Franche-Comté [COMUE] (UBFC)-Université Bourgogne Franche-Comté [COMUE] (UBFC)-Ecole Supérieure d'Electricité - SUPELEC (FRANCE)-Georgia Institute of Technology [Atlanta]-CentraleSupélec-Ecole Nationale Supérieure des Arts et Metiers Metz-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Computer science ,Terahertz radiation ,TP1-1185 ,02 engineering and technology ,terahertz dielectric properties ,computer.software_genre ,01 natural sciences ,Biochemistry ,Article ,Analytical Chemistry ,010309 optics ,terahertz imaging ,[SPI]Engineering Sciences [physics] ,paper handling ,0103 physical sciences ,Electrical and Electronic Engineering ,education ,Instrumentation ,terahertz nondestructive evaluation ,education.field_of_study ,Writing paper ,Multimedia ,Chemical technology ,Paperless office ,Terahertz nondestructive evaluation ,Possession (law) ,021001 nanoscience & nanotechnology ,Atomic and Molecular Physics, and Optics ,Terahertz spectroscopy and technology ,Terahertz spectroscopy ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,0210 nano-technology ,computer - Abstract
International audience; Despite predictions of the paperless office, global demand for printing and writing paper remains strong, and paper appears to be here to stay for some time. Not only firms, but also governments, libraries, and archives are in possession of large collections of legacy documents that still must be sorted and scanned. In this study, terahertz-based techniques are demonstrated to address several routine tasks related to the automated paper handling of unsorted legacy documents. Specifically, we demonstrate terahertz-based counting of the number of sheets in unconsolidated paper stacks, as well as locating stapled documents buried in paper stacks.
- Published
- 2021
79. Security Memory System for Mobile Device or Computer Against Memory Attacks
- Author
-
Liu, Genxian, Zhang, Xi, Wang, Dongsheng, Liu, Zhenyu, Wang, Haixia, Yuan, Yuyu, editor, Wu, Xu, editor, and Lu, Yueming, editor
- Published
- 2014
- Full Text
- View/download PDF
80. Review Paper on Introduction to Cyber Forensics
- Author
-
Priya R. Yadav
- Subjects
Engineering ,business.industry ,ComputingMilieux_COMPUTERSANDSOCIETY ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Computer security ,computer.software_genre ,business ,computer - Abstract
Cyber Forensics is termed as scientific methods or applications in association with the judiciary or court of laws. The aim behind these methods is to unveil the digital evidence to be utilized in court for solving crime cases. This sort of technology wasn’t practiced before therefore most criminals tend to urge away with their criminal acts without valid proof to incriminate or prosecute them. During that time the oaths, confessions, testimonies from witnesses were the sole determining factors of evidence Crimes committed within electronic or digital domains, particularly within cyberspace, have become common. Criminals are using technology to commit their offenses and make new challenges for law enforcement agents, attorneys, judges, military, and security professionals. Digital forensics has become a vital instrument in identifying and solving computer-based and computerassisted crime. This paper provides a quick introduction to cyber forensics. During this paper we present a typical model for both Incident Response and Computer Forensics processes which mixes their advantages in an exceedingly flexible way: It allows for a management oriented approach in digital investigations while retaining the chance of a rigorous forensics investigation. Keywords: cyber forensics, digital forensic science, computer forensics, evidence, judicial system.
- Published
- 2021
81. A Review Paper on Automatic Text Summarization in Indonesia Language
- Author
-
Bryan Andreas, Adi Wibowo P, Nurul Khotimah, and Abba Suganda Girsang
- Subjects
Computer science ,business.industry ,General Engineering ,General Earth and Planetary Sciences ,Artificial intelligence ,business ,computer.software_genre ,Automatic summarization ,computer ,Natural language processing - Abstract
Text summarization is one problem in natural language processing that generates a brief version of the original document. This research took attention for some researchers in this last decade and growing fast, including Indonesia language. This paper aims to recap summarization text research especially in Indonesia language. As usual, this paper discusses two summarization approaches, extractive and abstractive. In fact, the number of research of extractive is more than abstractive. This paper investigates some methods such as Statistical Based Approach, Graph Based Approach, Machine Learning Approach, Fuzzy Logic Approach, Algebraic Approach, and Hybrid Approach. This paper shows some methods details and summarize the results. Keywords— Text summarization, extractive summary, abstractive summary, natural language processing
- Published
- 2021
82. KEBI 1.0: Indonesian Spelling Error Detection System for Scientific Papers using Dictionary Lookup and Peter Norvig Spelling Corrector
- Author
-
Cagiva Chaedar Bey Lirna, Burhan Syarif Acarya, Ibnu Zahy’ Atha Illah, Tresna Maulana Fahrudin, Latipah Latipah, and Ilmatus Sa’diyah
- Subjects
Computer science ,business.industry ,QA75.5-76.95 ,computer.software_genre ,language.human_language ,Spelling ,Indonesian ,Electronic computers. Computer science ,language ,Artificial intelligence ,Error detection and correction ,business ,computer ,Natural language processing - Abstract
Many Indonesian spelling errors occur in research papers published to the public, closely related to academics in all institutions such as research institutions, government, schools, and universities. The spelling errors usually writing punctuation, writing letters, writing words, writing words originating from foreign or regional languages (uptake words), using affixed words, and writing ineffective sentences. The mistakes made by the academics then become a cycle in the academic environment. They usually provide guidance for writing an undergraduate thesis, thesis, dissertations to students, or the other forms of documents and scientific papers. Therefore, the research proposed the application to facilitate all authors of scientific papers in producing quality scientific works based on the General Guidelines for Indonesian Spelling published by the Agency for Development and Language Development. The application is named KEBI 1.0 Checker (Indonesian Spelling Error 1.0 Checker), a web-based application with a built-in algorithm to detect and correct Indonesian Spelling in scientific papers. The experiment result shows that the application has given the best accuracy performance to correct the non-standard words, and typographical errors reached 100% and 55,52%, respectively. The application also has been detected 209 meaningless words. The application processing time is relatively low, the average time needed to correct non-standard words is 0.016 seconds, and typo words are 14.58 seconds. KEBI 1.0 Checker is helpful for the end-user in academics but needs to improve the vocabulary of the large corpus in various fields of science for correcting typo words.
- Published
- 2021
83. Elaboration of Digital Watermarking Method for a Protection of Cloning Attack on Paper Certificates
- Author
-
Vladimir Starostin, Valery Korzhik, and D Flaksman
- Subjects
Cloning (programming) ,Computer science ,Computer security ,computer.software_genre ,Digital watermarking ,computer ,Elaboration - Abstract
Paper (or plastic) certificates are considered as a means against different forgery of product quality and brand falsification. It is commonly to use barcodes or data matrices to solve this problem. However such approach does not work usually against such sophisticated attacks as cloning of certificate copies. In the current paper we propose to use a digital watermarking and estimation of inner noises of scanners and printers in order to detect cloning attack effectively. Algorithm of cloning attack detecting is presented. The probabilities of attack missing and false alarm are proved.
- Published
- 2021
84. A new method of co-author credit allocation based on contributor roles taxonomy: proof of concept and evaluation using papers published in PLOS ONE
- Author
-
Qiao Zheng, Jingda Ding, Wei Cai, and Chao Liu
- Subjects
Scheme (programming language) ,Computer science ,business.industry ,General Social Sciences ,Accounting ,Library and Information Sciences ,Allocation method ,Computer Science Applications ,Proof of concept ,Taxonomy (general) ,business ,computer ,Inflationary bias ,computer.programming_language - Abstract
Scientific research cooperation and co-authored papers are becoming increasingly popular in the era of big science. However, allocating appropriate credit to each co-author of papers remains a challenge. We consider author contribution declarations according to the contributor roles taxonomy (CRediT) scheme (assigning each co-author to 14 contributor roles) and propose a new method of author contribution to allocate co-authors’ credits reasonably by converting the 14 contributor roles in an article into a binary author-role matrix. Based on the data of PLOS ONE, we further explore the new method’s advantages by comparing with other representative methods: It normalizes the total credits of different articles to 1, avoiding the inflationary bias caused by the increasing number of co-authors; awards different credits per co-author based on the participation rate of contributor roles to avoid the equalization bias; reduces the impact of the increasing number of co-authors on the credit of the first co-author.
- Published
- 2021
85. Short Paper: Secure Multiparty Logic Programming
- Author
-
Alisa Pankova and Joosep Jääger
- Subjects
021110 strategic, defence & security studies ,Focus (computing) ,Computer science ,Programming language ,Simple (abstract algebra) ,Process (engineering) ,Short paper ,0211 other engineering and technologies ,Secure multi-party computation ,02 engineering and technology ,computer.software_genre ,computer ,Logic programming - Abstract
Logic Programming (LP) is considered to be relatively simple for non-programmers, and allows the developer to focus on developing facts and rules of a logical derivation, and not on algorithms. Secure multiparty computation (MPC) is a methodology that allows several parties to process private data collaboratively without revealing the data to any party. In this paper, we bring together the notions of MPC and LP, allowing users to write privacy-preserving applications in logic programming language.
- Published
- 2020
86. Position Paper:Defending Direct Memory Access with CHERI Capabilities
- Author
-
John Baldwin, Simon W. Moore, A. Theodore Markettos, Peter G. Neumann, Robert N. M. Watson, and Ruslan Bukin
- Subjects
Microcontroller ,Software ,Computer science ,business.industry ,Systems architecture ,Position paper ,business ,Computer security ,computer.software_genre ,Direct memory access ,computer ,Bridge (nautical) - Abstract
We propose new solutions that can efficiently address the problem of malicious memory access from pluggable computer peripherals and microcontrollers embedded within a system-on-chip. This problem represents a serious emerging threat to total-system computer security. Previous work has shown that existing defenses are insufficient and poorly deployed, in part due to performance concerns. In this paper we explore the threat and its implications for system architecture. We propose a range of protection techniques, from lightweight to heavyweight, across different classes of systems. We consider how emerging capability architectures (and specifically the CHERI protection model) can enhance protection and provide a convenient bridge to describe interactions among software and hardware components. Finally, we describe how new schemes may be more efficient than existing defenses.
- Published
- 2020
87. Watermarking for Paper-Based Digital Microfluidic Biochips
- Author
-
Tsung-Yi Ho, Katherine Shu-Min Li, Jian-De Li, and Sying-Jyan Wang
- Subjects
Scheme (programming language) ,021110 strategic, defence & security studies ,Computer science ,business.industry ,Microfluidics ,0211 other engineering and technologies ,02 engineering and technology ,Paper based ,Man-in-the-middle attack ,020202 computer hardware & architecture ,Trojan ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Biochip ,business ,computer ,Digital watermarking ,Countermeasure (computer) ,computer.programming_language - Abstract
Paper-based digital microfluidic biochip (PB-DMFB) technology provides a promising solution to many biochemical applications. However, PB-DMFB manufacturing process may suffer from potential security threats. For example, both Trojan insertion and man-in-the-middle attack may affect the functionality of PB-DMFBs. To ensure the correct functionality of PB-DMFBs, we propose a watermarking scheme to hides information in the PB-DMFB layout, which allows users to check design integrity and authenticate the source of the PB-DMFB design. As a result, it serves as a first countermeasure against both Trojan insertion and man-in-the-middle attacks for PB-DMFBs.
- Published
- 2020
88. Position paper
- Author
-
Guonian Lü, Jin Wang, Alexey Voinov, Songshan Yue, Jonathan L. Goodall, Fengyuan Zhang, Min Chen, Yongning Wen, Cecelia DeLuca, Daniel P. Ames, Susan Cuddy, Michael Barton, Quillon Harpham, Anthony Jakeman, and Albert J. Kettner
- Subjects
Geographic research ,010504 meteorology & atmospheric sciences ,Computer science ,computer.internet_protocol ,Open ,Integrated geographic modelling ,Service-oriented architecture ,010502 geochemistry & geophysics ,01 natural sciences ,Data science ,Field (geography) ,Web-distributed ,Shared resource ,Geographic simulation ,Conceptual framework ,General Earth and Planetary Sciences ,Systems design ,Position paper ,Use case ,Set (psychology) ,computer ,0105 earth and related environmental sciences - Abstract
Integrated geographic modelling and simulation is a computational means to improve understanding of the environment. With the development of Service Oriented Architecture (SOA) and web technologies, it is possible to conduct open, extensible integrated geographic modelling across a network in which resources can be accessed and integrated, and further distributed geographic simulations can be performed. This open web-distributed modelling and simulation approach is likely to enhance the use of existing resources and can attract diverse participants. With this approach, participants from different physical locations or domains of expertise can perform comprehensive modelling and simulation tasks collaboratively. This paper reviews past integrated modelling and simulation systems, highlighting the associated development challenges when moving to an open web-distributed system. A conceptual framework is proposed to introduce a roadmap from a system design perspective, with potential use cases provided. The four components of this conceptual framework - a set of standards, a resource sharing environment, a collaborative integrated modelling environment, and a distributed simulation environment - are also discussed in detail with the goal of advancing this emerging field.
- Published
- 2020
89. A Review Paper of Security in Internet of Things (IoT)
- Author
-
Shruthi Cs, Vaishnavi Ps, Vshker Mayengbam, Sudeep Poojary, Nayana Ms, and Nagesh Ub
- Subjects
Computer science ,business.industry ,Computer security ,computer.software_genre ,Internet of Things ,business ,computer - Abstract
Internet of Things (IoT) has drawn important attention in recent years since it has made revolutionary changes in human life. The IoT enables the exchange of information or data in a wide variety of applications such as smart buildings, smart health, smart transport, and so on. As billions of connected things communicate with each other and can interchange sensitive information that may be revealed. Hence, strengthening IoT’s security and preserving users’ privacy is a crucial challenge. The aim of this paper is to provide a comprehensive study of the IoT security. Several IoT security attacks are examined and a taxonomy of the security requirements based on the attacks purposes is proposed. Furthermore, recent security solutions are described and classified based on their application area. Ultimately, open research directions and security challenges are discussed.
- Published
- 2021
90. SURVEY PAPER ON THE VARIOUS SECURITY ALGORITHMS USED FOR E-COMMERCE SECURITY
- Author
-
Polsani Jahnavi and Balla Manoj Kumar
- Subjects
business.industry ,Computer science ,E-commerce ,business ,Computer security ,computer.software_genre ,computer - Abstract
Due to the growth of e-commerce, most of the banking transactions are made on the online platform and all these transactions are made on the websites provided by the merchant or the payable apps and because of this the vulnerability of attacks has increased and there are also chances of using fraudulent websites and apps by the attackers though there are many high-security algorithms are been used for safeguarding against vulnerabilities. The way of judging the relation of trust on the online platform has become a major issue, so a proper trust model also needs to be maintained. In this paper, we reviewed various security algorithms which involve cryptographic algorithms, machine learning, anonymization, and masking techniques, blockchain, distributed networks, and many more to provide integrity, privacy, reliability, authentication, security, and risk-less e-commerce platform.
- Published
- 2021
91. The Most-Cited Authors Who Published Papers in JMIR mHealth and uHealth Using the Authorship-Weighted Scheme: Bibliometric Analysis
- Author
-
Tsair-Wei Chien, Yu-Tsen Yeh, Wei-Chih Kan, Willy Chou, and Po-Hsin Chou
- Subjects
Scheme (programming language) ,Bibliometric analysis ,social network analysis ,Computer science ,MEDLINE ,Health Informatics ,Information technology ,knowledge concept map ,03 medical and health sciences ,0302 clinical medicine ,Betweenness centrality ,Google Maps ,Humans ,030212 general & internal medicine ,Social network analysis ,mHealth ,computer.programming_language ,Original Paper ,Information retrieval ,Impact factor ,Publications ,T58.5-58.64 ,authorship collaboration ,Authorship ,Telemedicine ,United Kingdom ,United States ,Bibliometrics ,Public aspects of medicine ,RA1-1270 ,Citation ,computer ,030217 neurology & neurosurgery ,betweenness centrality ,the author-weighted scheme - Abstract
Background Many previous papers have investigated most-cited articles or most productive authors in academics, but few have studied most-cited authors. Two challenges are faced in doing so, one of which is that some different authors will have the same name in the bibliometric data, and the second is that coauthors’ contributions are different in the article byline. No study has dealt with the matter of duplicate names in bibliometric data. Although betweenness centrality (BC) is one of the most popular degrees of density in social network analysis (SNA), few have applied the BC algorithm to interpret a network’s characteristics. A quantitative scheme must be used for calculating weighted author credits and then applying the metrics in comparison. Objective This study aimed to apply the BC algorithm to examine possible identical names in a network and report the most-cited authors for a journal related to international mobile health (mHealth) research. Methods We obtained 676 abstracts from Medline based on the keywords “JMIR mHealth and uHealth” (Journal) on June 30, 2018. The author names, countries/areas, and author-defined keywords were recorded. The BCs were then calculated for the following: (1) the most-cited authors displayed on Google Maps; (2) the geographical distribution of countries/areas for the first author; and (3) the keywords dispersed by BC and related to article topics in comparison on citation indices. Pajek software was used to yield the BC for each entity (or node). Bibliometric indices, including h-, g-, and x-indexes, the mean of core articles on g(Ag)=sum (citations on g-core/publications on g-core), and author impact factor (AIF), were applied. Results We found that the most-cited author was Sherif M Badawy (from the United States), who had published six articles on JMIR mHealth and uHealth with high bibliometric indices (h=3; AIF=8.47; x=4.68; Ag=5.26). We also found that the two countries with the highest BC were the United States and the United Kingdom and that the two keyword clusters of mHealth and telemedicine earned the highest indices in comparison to other counterparts. All visual representations were successfully displayed on Google Maps. Conclusions The most cited authors were selected using the authorship-weighted scheme (AWS), and the keywords of mHealth and telemedicine were more highly cited than other counterparts. The results on Google Maps are novel and unique as knowledge concept maps for understanding the feature of a journal. The research approaches used in this study (ie, BC and AWS) can be applied to other bibliometric analyses in the future.
- Published
- 2020
92. Laser-Induced Graphene Paper Heaters with Multimodally Patternable Electrothermal Performance for Low-Energy Manufacturing of Composites
- Author
-
Junyu Chen, Fu Liu, Yanan Wang, and Sida Luo
- Subjects
Materials science ,Curing (food preservation) ,02 engineering and technology ,010402 general chemistry ,021001 nanoscience & nanotechnology ,computer.software_genre ,Laser ,01 natural sciences ,Flexible electronics ,0104 chemical sciences ,Working range ,law.invention ,Robustness (computer science) ,law ,Autoclave (industrial) ,Computer Aided Design ,General Materials Science ,Composite material ,0210 nano-technology ,computer ,Graphene oxide paper - Abstract
Low-energy manufacturing of polymeric composites through two-dimensional electrothermal heaters is a promising strategy over the traditional autoclave and oven. Laser-induced graphene paper (LIGP) is a recent emergent multifunctional material with the merits of one-step computer aided design and manufacturing (CAD/CAM) as well as a flexible thin nature. To fully explore its capabilities of in situ heating, herein, we adventurously propose and investigate the customizable manufacture and modulation of LIGP enabled heaters with multimodally patternable performance. Developed by two modes (uniform and nonuniform) of laser processing, the LIGP heaters (LIGP-H) show distinctively unique characteristics, including high working range (>600 °C), fast stabilization (
- Published
- 2020
93. OS Services for VR in Psychology: A Position Paper
- Author
-
Pablo Figueroa and K. Cabas-Hoyos
- Subjects
Computer graphics ,Software ,Human–computer interaction ,Scratch ,business.industry ,Intervention (counseling) ,Position paper ,Virtual reality ,business ,computer ,Computing Methodologies ,Visualization ,computer.programming_language - Abstract
We envision a richer support from Virtual Reality (VR) development environments than the one available today. We believe this will be part of an Operating System (OS) for VR applications, since those services should be uniform and widespread for all experiences within a VR system, they are generic enough to be part of any application, and possibly they will not have to be developed from scratch. This position paper explores some of the shortcomings in current technology we are identifying while developing an application for the intervention of kids with ADD (Attention Deficit Disorder), and how these OS services might be defined and used.
- Published
- 2020
94. Point-of-care test for early-stage Lyme disease using a multiplexed paper-based assay and machine learning
- Author
-
Paul M. Arnaboldi, Raymond J. Dattwyler, Aydogan Ozcan, Linghao Zhang, Hailemariam Teshome, Derek Tseng, Zachary S. Ballard, Omai B. Garner, Hyou-Arm Joung, Jing Wu, and Dino Di Carlo
- Subjects
Lyme disease ,business.industry ,Point-of-care testing ,medicine ,Stage (hydrology) ,Paper based ,Artificial intelligence ,Machine learning ,computer.software_genre ,medicine.disease ,business ,computer - Abstract
We report a multiplexed paper-based assay powered by mobile imaging and machine learning for point-of-care diagnosis of Lyme Disease. Blind testing of 96 serum samples showed a sensitivity and specificity of 85.7% and 96.3%, respectively.
- Published
- 2020
95. Talmudic Norms Approach to Mixtures with a Solution to the Paradox of the Heap: A Position Paper
- Author
-
Esther David, Rabbi S. David, Uri J. Schild, and Dov M. Gabbay
- Subjects
Programming language ,Computer science ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Sorites paradox ,Position paper ,computer.software_genre ,computer ,Object (philosophy) ,Heap (data structure) - Abstract
This paper offers a Talmudic norms solution to the paradox of the heap. The claim is that the paradox arises because philosophers use the wrong language to discuss it. We need a language about objects which is capable of expressing not only the declarative properties of the object (such as being a heap) but also how the object/heap was constructed. Such a view of objects comes from the Talmudic theory of mixtures.
- Published
- 2020
96. Short Paper - Taming the Shape Shifter: Detecting Anti-fingerprinting Browsers
- Author
-
Babak Amin Azad, Pierre Laperdrix, Oleksii Starov, and Nick Nikiforakis
- Subjects
Current generation ,Computer science ,Data_MISCELLANEOUS ,Fingerprint (computing) ,Short paper ,020206 networking & telecommunications ,02 engineering and technology ,Variation (game tree) ,Computer security ,computer.software_genre ,Credit card ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,computer - Abstract
When it comes to leaked credentials and credit card information, we observe the development and use of anti-fingerprinting browsers by malicious actors. These tools are carefully designed to evade detection, often by mimicking the browsing environment of the victim whose credentials were stolen. Even though these tools are popular in the underground markets, they have not received enough attention by researchers. In this paper, we report on the first evaluation of four underground, commercial, and research anti-fingerprinting browsers and highlight their high success rate in bypassing browser fingerprinting. Despite their success against well-known fingerprinting methods and libraries, we show that even slightest variation in the simulated fingerprint compared to the real ones can give away the presence of anti-fingerprinting tools. As a result, we provide techniques and fingerprint-based signatures that can be used to detect the current generation of anti-fingerprinting browsers.
- Published
- 2020
97. Effects of Data-Collection Designs in the Comparison of Computer-Based and Paper-Based Tests
- Author
-
Alvaro J. Arce-Ferrer and Okan Bulut
- Subjects
Data collection ,Computer science ,Item analysis ,05 social sciences ,Computer based ,050301 education ,Test validity ,Paper based ,computer.software_genre ,Education ,Item response theory ,Developmental and Educational Psychology ,Data mining ,0503 education ,computer - Abstract
This study investigated the performance of four widely used data-collection designs in detecting test-mode effects (i.e., computer-based versus paper-based testing). The experimental conditions inc...
- Published
- 2018
98. A Paper Machine of Clinical Research in the Early Twentieth Century
- Author
-
Volker Hess
- Subjects
Cognitive science ,History ,Paper machine ,business.product_category ,Mode (computer interface) ,History and Philosophy of Science ,Computer science ,Earth and Planetary Sciences (miscellaneous) ,business ,Turing ,computer ,computer.programming_language - Abstract
This article introduces Turing’s idea of a “paper machine” to identify and understand one important mode of clinical research in the modern hospital, how that research worked, and how offic...
- Published
- 2018
99. Reconstruction of Konrad Zuse’s Z3
- Author
-
Zuse, Horst, Tatnall, Arthur, editor, Blyth, Tilly, editor, and Johnson, Roger, editor
- Published
- 2013
- Full Text
- View/download PDF
100. Exhibiting the Online World: A Case Study
- Author
-
Weber, Marc, Tatnall, Arthur, editor, Blyth, Tilly, editor, and Johnson, Roger, editor
- Published
- 2013
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.