Hasil untuk "Information technology"

Menampilkan 20 dari ~25955443 hasil · dari DOAJ, CrossRef, Semantic Scholar

JSON API
S2 Open Access 2022
Climate change and COP26: Are digital technologies and information management part of the problem or the solution? An editorial reflection and call to action

Yogesh K. Dwivedi, Laurie Hughes, A. K. Kar et al.

this editorial article, offering a comprehensive opinion based insight to a multitude of diverse viewpoints that look at the many challenges through a technology lens. It is widely recognized that technology in all its forms, is an important and integral element of the solution, but industry and wider society also view technology as being part of the problem. Increasingly, researchers are referencing the importance of responsible digitalization to eliminate the significant levels of e-waste. The reality is that technology is an integral component of the global efforts to get to net zero, however, its adoption requires pragmatic tradeoffs as we transition from current behaviors to a more climate friendly society.

559 sitasi en Computer Science
S2 Open Access 2004
Information Technology Payoff in E-Business Environments: An International Perspective on Value Creation of E-Business in the Financial Services Industry

Kevin Zhu, K. Kraemer, S. Xu et al.

Grounded in the technology-organization-environment (TOE) framework, we develop a research model for assessing the value of e-business at the firm level. Based on this framework, we formulate six hypotheses and identify six factors (technology readiness, firm size, global scope, financial resources, competition intensity, and regulatory environment) that may affect value creation of e-business. Survey data from 612 firms across 10 countries in the financial services industry were collected and used to test the theoretical model. To examine how e-business value is influenced by economic environments, we compare two subsamples from developed and developing countries. Based on structural equation modeling, our empirical analysis demonstrates several key findings: (1) Within the TOE framework, technology readiness emerges as the strongest factor for e-business value, while financial resources, global scope, and regulatory environment also significantly contribute to e-business value. (2) Firm size is negatively related to e-business value, suggesting that structural inertia associated with large firms tends to retard e-business value. (3) Competitive pressure often drives firms to adopt e-business, but e-business value is associated more with internal organizational resources (e.g., technological readiness) than with external pressure to adopt. (4) While financial resources are an important factor in developing countries, technological capabilities become far more important in developed countries. This suggests that as firms move into deeper stages of e-business transformation, the key determinant of e-business value shifts from monetary spending to higher dimensions of organizational capabilities. (5) Government regulation plays a much more important role in developing countries than in developed countries. These findings indicate the usefulness of the proposed research model and theoretical framework for studying e-business value. They also provide insights for both business managers and policy-makers.

824 sitasi en Computer Science, Economics
DOAJ Open Access 2024
Energy leakage in OFDM sparse channel estimation: The drawback of OMP and the application of image deblurring

Gang Qiao, Xizhu Qiang, Lei Wan et al.

In this paper, in order to reduce the energy leakage caused by the discretized representation in sparse channel estimation for Orthogonal Frequency Division Multiplexing (OFDM) systems, we systematically have analyzed the optimal locations of atoms with discrete delays for each path reconstruction from the perspective of linear fitting theory. Then, we have investigated the adverse effects of the non-ideal inner product function on the iteration in one of the most widely used channel estimation method, Orthogonal Matching Pursuit (OMP). The study shows that the distance between the selected atoms for each path in OMP can be larger than the sampling interval, which prevents OMP-based methods from achieving better performance. To overcome this drawback, the image deblurring-based channel estimation method, in which the channel estimation problem is analogized to one-dimensional image deblurring, was proposed to improve the large compensation distance of traditional OMP. The advantage of the proposed method was validated by the results of numerical simulation and sea trial data decoding.

Information technology
DOAJ Open Access 2023
Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection

Guangquan Xu, Wenyu Dong, Jun Xing et al.

Cryptojacking is a type of resource embezzlement attack, wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits. It has been common since 2017, and in fact, it once became the greatest threat to network security. To better prove the attack ability the harm caused by cryptojacking, this paper proposes a new covert browser-based mining attack model named Delay-CJ, this model was deployed in a simulation environment for evaluation. Based on the general framework of cryptojacking, Delay-CJ adds hybrid evasion detection techniques and applies the delayed execution strategy specifically for video websites in the prototype implementation. The results show that the existing detection methods used for testing may become invalid as result of this model. In view of this situation, to achieve a more general and robust detection scheme, we built a cryptojacking detection system named CJDetector, which is based on cryptojacking process features. Specifically, it identifies malicious mining by monitoring CPU usage and analyzing the function call information. This system not only effectively detects the attack in our example but also has universal applicability. The recognition accuracy of CJDetector reaches 99.33%. Finally, we tested the web pages in Alexa 50K websites to investigate cryptojacking activity in the real network. We found that although cryptojacking is indeed on the decline, it remains a part of network security threats that cannot be ignored.

Information technology
DOAJ Open Access 2023
Case hacks in action: Examples from a case study on green chemistry in education for sustainable development

Per Fors, Thomas Taro Lennerfors, Jonathan Woodward

This paper aims to outline an approach for case-based chemistry and chemical engineering education for sustainability. Education for Sustainability is assumed to offer a holistic approach to equip students with the knowledge, skills, values, and attitudes needed to contribute to a more sustainable society in their future careers. While Case-Based Education traditionally focuses on disciplinary learning in simulated settings, it can also effectively teach essential sustainability-related skills like integrated problem-solving, critical thinking, and systems thinking. The approach we propose is “case hacking”, which should be understood as utilizing existing business cases while incorporating supplementary resources to align the assignment with intended learning objectives. This expansion of the cases involves, among other things, introducing additional questions and assignments, perspectives from stakeholders previously unexplored in the original case, and the integration of recent research articles from relevant fields. We advocate for the use of case hacking when educators want to harness the educational benefits of Case-Based Education while emphasizing the complexity of sustainability-related challenges faced by industrial companies today. As an illustrative example, we demonstrate the process of hacking a case related to Green Chemistry in the pharmaceutical industry, highlighting specific challenges for chemistry and chemical engineering education. We hope this example will inspire educators in these disciplinary contexts to engage with the case hacking approach as they navigate the complex terrain of sustainability.

Chemical engineering, Information technology
DOAJ Open Access 2023
The impact of technology on patient knowledge acquisition and retention of oral hygiene instructions and associated risks

Maram A. Aljabry, Khulud Alkadi, Mohammed Awawdeh

Objective: The aim of the study was to assess dental patients’ knowledge and perceptions of the risks associated with orthodontic treatment and oral hygiene instructions given at the start of their treatment regimen. Methods: The sample group included dental patients aged 12–16 years. Half of the participants were taught using Augmented Reality (AR) technology, while the other half were taught using traditional methods, such as paper-based leaflets. We then assessed retention of the Oral Hygiene Instructions (OHI) and their awareness of the risks associated with orthodontic treatment. This objective was achieved through a knowledge-based survey. Results: The feedback from the participants was highly positive and favorable toward AR. Conclusion: The videos and leaflet materials were provided to the patients, these two materials effects on patients to understand the information given, but, the group watching the videos had greater scores than those participants reading the leaflet.

Computer applications to medicine. Medical informatics
DOAJ Open Access 2023
TDLearning: Trusted Distributed Collaborative Learning Based on Blockchain Smart Contracts

Jing Liu, Xuesong Hai, Keqin Li

Massive amounts of data drive the performance of deep learning models, but in practice, data resources are often highly dispersed and bound by data privacy and security concerns, making it difficult for multiple data sources to share their local data directly. Data resources are difficult to aggregate effectively, resulting in a lack of support for model training. How to collaborate between data sources in order to aggregate the value of data resources is therefore an important research question. However, existing distributed-collaborative-learning architectures still face serious challenges in collaborating between nodes that lack mutual trust, with security and trust issues seriously affecting the confidence and willingness of data sources to participate in collaboration. Blockchain technology provides trusted distributed storage and computing, and combining it with collaboration between data sources to build trusted distributed-collaborative-learning architectures is an extremely valuable research direction for application. We propose a trusted distributed-collaborative-learning mechanism based on blockchain smart contracts. Firstly, the mechanism uses blockchain smart contracts to define and encapsulate collaborative behaviours, relationships and norms between distributed collaborative nodes. Secondly, we propose a model-fusion method based on feature fusion, which replaces the direct sharing of local data resources with distributed-model collaborative training and organises distributed data resources for distributed collaboration to improve model performance. Finally, in order to verify the trustworthiness and usability of the proposed mechanism, on the one hand, we implement formal modelling and verification of the smart contract by using Coloured Petri Net and prove that the mechanism satisfies the expected trustworthiness properties by verifying the formal model of the smart contract associated with the mechanism. On the other hand, the model-fusion method based on feature fusion is evaluated in different datasets and collaboration scenarios, while a typical collaborative-learning case is implemented for a comprehensive analysis and validation of the mechanism. The experimental results show that the proposed mechanism can provide a trusted and fair collaboration infrastructure for distributed-collaboration nodes that lack mutual trust and organise decentralised data resources for collaborative model training to develop effective global models.

Information technology
DOAJ Open Access 2023
Video images compression method based on floating positional coding with an unequal codograms length

Vladimir Barannik, Serhii Sidchenko, Dmitriy Barannik et al.

The subject of research in the article are the video images compression and encryption processes during the critically important objects managing process. The goal is to develop a method for compressing video images based on floating positional coding with an uneven codegrams length to simultaneously ensure information reliability and confidentiality during its transmission with a given time delay. Objectives: analyzing existing approaches to ensuring the video images confidentiality; development a method for compressing video images based on floating positional coding with an uneven codegrams length; evaluate the developed method effectiveness. The methods used are: digital image processing methods, digital image compression methods, image encryption and scrambling methods, structural-combinatorial coding methods, statistical analysis methods. The following results are obtained. The technology of floating encoding of an uneven sequence of blocks is proposed. Code values are formed from elements of different video image blocks. For this, a scheme for linearizing an image point coordinates from its four-dimensional representation on a plane into a one-dimensional element coordinate in a vector has been developed. The four-dimensional element coordinate on the plane describes the image block coordinates and the coordinates of the element in this block. Code values are formed under conditions of control their binary representation's length. At the same time, coding is implemented for an indeterminate number of video image elements. The number of elements depends on the length of the code word. Accordingly, codegrams with an indeterminate length are formed. Their length depends on the service data values, generated during the encoding process. Service data acts as a key element. Conclusions. The one-stage polyadic image encoding method in a differentiated basis has been further improved. The developed encoding method provides image compression without information quality loss. The original images volume compression provides by 3–20 % better compared to the TIFF data presentation format and by 4–15 % compared to the PNG format. The overhead amount is less than 2.5 % of the entire codestream size.

Computer engineering. Computer hardware, Electronic computers. Computer science

Halaman 11 dari 1297773