Total of 12 articles.


Go

Jan 12, 2023Open    AccessArticle

Trends in Workplace Wearable Technologies and Connected-Worker Solutions for Next-Generation Occupational Safety , Health , and Productivity

Vishal Patel, Austin Chesmore, Christopher M. Legner, Santosh Pandey
The workplace influences the safety, health, and productivity of workers at multiple levels. To protect and promote total worker health, smart hardware, and software tools have emerged for the identification, elimination, substitution, and control of occupational hazards. Wearable devices enable constant monitoring of individual workers and the environment, whereas connected worker solutions provide contextual information and decision support. Here, the recent trends in commercial workplace tech...

Information Technologies  Public Economics  Behavioral Economics  Automata  Computer and Network Security  Agricultural Engineering  Communication Protocols  Environmental Sciences  Environmental Sciences  Cloud Computing  Innovation Management  Artificial Intelligence  Big Data Search and Mining  Business Management  Information Management  Applications of Communication Systems  Chemical Engineering & Technology  Food Science & Technology  Marketing  Machine Learning  Diagnostics  Electric Engineering  Civil Engineering  Computer Engineering  Aquaculture, Fisheries & Fish Science  Information retrieval  Mechanical Engineering  Bioengineering  Mineral Engineering  Bioinformatics  Information and Communication: Security, Privacy, and Trust  Biophysics  Information and communication theory and algorithms  Distributed computing  Physical Education  Grid Computing  Business Communication  Consumer Behavior  Corporate Governance  Distance and Open Education  Engineering Management  Entrepreneurship  Software Engineering  Applied Physics  Opsearch  Information Science  Public Policy  E-Learning and Knowledge Management  Economics  Technology  Demography  Mobile and Portable Communications Systems  Mobile and Ubiquitous Networks  Mobile Computing Systems  Multimedia/Signal processing  Business Ethics and Corporate Social Responsibility  Socioeconomics  Business Finance and Investment  Business Analysis  Economic System  Business and Economics Education  Electronic Commerce  Information Economics  Advertising  Total Quality Management  Supply Chain Management  Drugs & Devices  Public Health  Sports Science  Sales Management  Marine Biology  Statistics  Risk Management  Project Management and Strategy  Dynamical System  Project Management  Public Administration  Materials Engineering 

Mar 11, 2020Open    AccessArticle

The Necessity and Importance of Incorporating Media and Information Literacy into Holistic Metaliteracy

Alireza Salehi-Nejad
Digitalization and the emergence of the Internet have resulted in escalating access to information and communication. Given the circumstances that soaring access to information amounts to the intensification of misinformation and disinformation, a set of critical skills to navigate and critically assess the information is necessary. This paper outlines the significance of these skills, and provides a perspective on metaliteracy as a supplement to media and information literacy, and argues that t...

Sociology  Journalism and Communication  Information Science  Information and Communication: Security, Privacy, and Trust  Information and communication theory and algorithms 

Mar 30, 2018Open    AccessArticle

AN EXPLORATION OF INNOVATION STRATEGIES ADOPTED BY TELECOMMUNICATION SERVICE PROVIDERS FOR COMPETITIVE ADVANTAGE IN KENYA: A STUDY OF AIRTEL KENYA

Dr. Bichang’a Evans
Innovation strategy provides a clear direction and focuses the effort of the entire organization on a common innovation goal. This study seeks to investigate the innovation strategies adopted by telecommunication service providers for competitive advantage in Kenya with special focus on Airtel Kenya. This research problem is studied through the use of descriptive research design. The target population for this study is the 68 employees of Airtel Kenya at the head office in Nairobi and 100 custom...

Information and communication theory and algorithms 
Doi:-

Mar 09, 2018Open    AccessArticle

The Success and Failures of ICT Governance in Enterprises

MR. JAMES NAMBUSI MAKHULO
Most enterprises are struggling with risky surroundings and constant technological changes in order to achieve the highly expected results. ICT governance considers many types of technologies touching on various areas of interest in enterprises. A number of times we hear of negative and positive happenings in organisations due to failure or success of ICT of which the blame or praises go to ICT management or system being used and not the governance of the ICT in place. The key agenda of ICT gove...

Information and communication theory and algorithms 
Doi:-

Mar 31, 2017Open    AccessArticle

Methods of Complex Data Processing from Technical Means of Monitoring

Serhii Tymchuk
The problem of processing the information from different types of monitoring equipment was examined. The use of generalized methods of information processing, based on the techniques of clustering combined territorial information sources for monitoring and the use of framing model of knowledge base for identification of monitoring objects was proposed as a possible solution of the problem. Clustering methods were formed on the basis of Lance-Williams hierarchical agglomerative procedure using th...

Information and communication theory and algorithms 

Aug 22, 2016Open    AccessArticle

Distributed And Typed Role-Based Access Control Mechanisms Driven By CRUD Expressions

Diogo Domingues Regateiro, Rui Luís Aguiar, óscar Mortágua Pereira
Business logics of relational databases applications are an important source of security violations, namely in respect to access control. The situation is particularly critical when access control policies are many and complex. In these cases, programmers of business logics can hardly master the established access control policies. Now we consider situations where business logics are built with tools such as JDBC and ODBC. These tools convey two sources of security threats: 1) the use of unautho...

Information and Communication: Security, Privacy, and Trust  Information and communication theory and algorithms 

Aug 22, 2016Open    AccessArticle

The Logical Implication Table In Binary Propositional Calculus: Justification, Proof Automatability, And Effect On Scientific Reasoning

Ahmed Shawky Moussa
Logic is the discipline concerned with providing valid general rules on which scientific reasoning and the resulting propositions are based. To evaluate the validity of sentences in propositional calculus, we, typically, perform a complete case analysis of all the possible truth-values assigned to the sentence’s propositional variables. Truth tables provide a systematic method for performing such analysis in order to determine whether the sentence is valid, satisfiable, contradictory, consistent...

Artificial Intelligence  Information and communication theory and algorithms 

Aug 22, 2016Open    AccessArticle

Proposing A Formal Method For Workflow Modelling:Temporal Logic Of Actions (TLA)

Jose L. Caro
The study and implementation of formal techniques to aid the design and implementation ofWorkflow Management Systems (WfMS) is still required. Using these techniques, we can provide this technology with automated reasoning capacities, which are required for the automated demonstration of the properties that will verify a given model. This paper develops a formalization of the workflow paradigm based on communication (speech-act theory) by using a temporal logic, namely, the Temporal Logic of Act...

Artificial Intelligence  Information and communication theory and algorithms 

Aug 18, 2016Open    AccessArticle

Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack

Mojtaba GhanaatPisheh Sanaei, Ismail Fauzi Isnin, Majid Bakhtiari
Today’s Mobile Ad hoc Networks (MANETs) became a popular issue for scientists, and diverse studies have been made to increase the performance of ad hoc networks. In MANET nodes compromise to forward packets for each other communicate beyond their transmission range. The mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks. One of these attacks called Wormhole Attack that two adversary node co...

Simulation/Analytical Evaluation of Communication Systems  Optical Communications  Online social network computing  Computer and Network Security  Computational Robotics  Complex network models  Communication Protocols  Information and Communication: Security, Privacy, and Trust  Cloud Computing  Information and communication theory and algorithms  Artificial Intelligence  Cooperative Communications  Mobile and Portable Communications Systems  Mobile and Ubiquitous Networks  Green networking  Applications of Communication Systems  Grid Computing  Network Modeling and Simulation  Numerical Methods  Mobile Computing Systems 

Jan 27, 2016Open    AccessArticle

Experimental Analysis and Reduction of FWM Using Optical Rectangle Filter for WDM

GHULAM FIZZA, ASHIQ HUSSAIN, SANA HOOR JOKHIO
Nonlinearities implanted by refractive index and scattering degrade the performance of optical networks. In this paper, FWM (Four Wave Mixing) has been analyzed for four different channels with 10 nm spacing. Due to the presence of resonant frequency, FWM interface of different channels in WDM (Wavelength Division Multiplexing) hinders the performance of the system. The system is affected by nonlinear cross talk. A system with the bandwidth of 10 Gbps has been investigated using External Modulat...

Electric Engineering  Applications of Communication Systems  Computer Engineering  Simulation/Analytical Evaluation of Communication Systems  Information and communication theory and algorithms 

Go