95 resultados para INFORMATION SCIENCE


Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper presents a new approach to filtering the reconstructed image of block based transform coded images.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Small to medium-sized enterprises (SMEs) contribute significantly to the national economies and to the employment levels of different countries and represent a viable source for inventions and innovations. The recent emergence of electronic commerce in the early nineties could provide different opportunities to the small business sector to overcome its inadequacies. However, in view of the electronic commerce/business (EC) literature in organisations in general and in SMEs specifically, it was observed that EC research is scarce. Therefore, this research attempts, by reviewing relevant EC literature, to develop deeper understanding about the factors influencing EC success in SMEs. The researcher found the following issues significantly influence EC success in SMEs: e-Value, e-Cost, e-Transformation, e-Product, e-Nvolvement, e-Nnovativeness, e-Competition, external e-Support, and e-Pressure. These factors are of importance to researchers, SMEs, professionals including educational institutions and policymakers in driving SMEs and EC forward. <br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The dynamic nature of threats and vulnerabilities within the E-business environment can impede online functionality, compromise organisational or customer information, contravene security implementations and thereby undermine online customer confidence. To negate these problems, E-business security has to become proactive, by reviewing and continuously improving security to strengthen E-business security measures and policies. This can be achieved through benchmarking the security measures and policies utilised within the Ebusiness, against recognised information technology (IT) and information security (IS) security standards.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A new characteristic free approach to constructing large sets of mutually unbiased bases in Hilbert space is developed. We associate with a seed set of bases a finite subgroup of which defines a strongly regular graph. Large sets of mutually unbiased bases are obtained as the cliques of the graph.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The idea of a gateway or portal to another world is common in myth and fantasy, and, obviously, far older than the use of the same notion in computing. While computing portals take researchers to other domains of data, the use of portals in myths is often far more complex. In creation myths, the passing of portals has immense consequences for humankind, as in Adam and Eve's expulsion from their carefree existence in the Garden of Eden (unleashing the world's woes upon their descendants), and in the carrying away of Persephone by Pluto into the Underworld (leaving a legacy of cold and sunless months each year). In other types of myths, and in the fantastic tales they have bequeathed, portals provide heroes with strange and wonderful adventures, and with experiences that leave heroes irrevocably changed. This article will now explore these types of portals in more detail.The idea of a gateway or portal to another world is common in myth and fantasy, and, obviously, far older than the use of the same notion in computing. While computing portals take researchers to other domains of data, the use of portals in myths is often far more complex. In creation myths, the passing of portals has immense consequences for humankind, as in Adam and Eve's expulsion from their carefree existence in the Garden of Eden (unleashing the world's woes upon their descendants), and in the carrying away of Persephone by Pluto into the Underworld (leaving a legacy of cold and sunless months each year). In other types of myths, and in the fantastic tales they have bequeathed, portals provide heroes with strange and wonderful adventures, and with experiences that leave heroes irrevocably changed. This article will now explore these types of portals in more detail.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Certificate verification in PKI is a complex and time consuming process. In the classical PKI methodology, in order to obtain a public key and to accept a certificate as valid, a verifier needs to extract a certificate path from the PKI and to verify the certificates on this path recursively. Levi proposed a nested certificate model vvith the aim to simplify and speed up certificate verification. Such a nested certificate-based PKI significantly improves certificate verification, but it also requires a large increase in the number of issued certificates, which makes this model impractical for real life deployment. In order to solve this drawback of nested PKI, while retaining its speed in certificate verification, we propose in this paper the innovative concept of a compressed nested certificate, which is a significantly modified version of the nested certificate model. Compressed nested certificate PKI deploys compressed nested certificates which speed up and simplify certificate verification while keeping certificate load to a minimum, thus providing implementers the option of integrating it into the existing PKI model or building it separately as an independent model.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper reports on the application of systems modelling benchmarks to determine the viability of systems modelling software and its suitability for modelling critical infrastructure systems. This research applies the earlier research that related to developing benchmarks that when applied to systems modelling software will indicate its likely suitability to modelling critical infrastructure systems. In this context, the systems modelling benchmarks will assess the practicality of CPNTools to the task of modelling critical infrastructure systems.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Secure management of Australia&rsquo;s commercial critical infrastructure presents ongoing challenges to owners and the government. Although it is currently managed through high-level information sharing via collaboration, but does this suit the commercial sector. One of the issues facing Australia is that the majority of critical infrastructure resides under the control of the business sector and certain aspects such of the critical infrastructure such as Supply Chain Management (SCM) systems are distributed entities and not a single entity. The paper focuses upon the security issues associated with SCM systems and critical infrastructure protection.<br />

Relevância:

60.00% 60.00%

Publicador:

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This chapter analyses local government&rsquo;s response to the pressure to modernise its structures through its use of Information Communication Technologies (ICT) to execute its broad range of tasks. The chapter begins by discussing Chadwick and May&rsquo;s (2003) three basic models of e-government; managerial, consultative and participatory. Using data collected from an analysis of 658 local government websites in Australia together with existing survey research the chapter then analyses the extent to which local government sites fit into the three models. The chapter concludes with a discussion of the issues and problems faced by local government in its attempt to develop e-governance as both an extension of administrative as well as democratic functions.<br />