Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Arithmetic Cost (1)
- Aviation (1)
- Cryptography (1)
- Curriculum development (1)
- Cyberrisks (1)
-
- Cybersecurity (1)
- DACUM (1)
- Discrete Sine Transform (1)
- Evaluation; meta-HCI (1)
- Fast and Efficient Algorithms (1)
- Information assurance (1)
- Information security (1)
- Information systems (1)
- Intensive care (1)
- Job analysis (1)
- Methodology (1)
- N (1)
- Number of participants (1)
- Recursive Algorithms (1)
- Research (1)
- Research methods (1)
- Resuscitation (1)
- Sample size (1)
- Signal Flow Graphs (1)
- Sparse and Orthogonal Factors (1)
- Tablet applications (1)
Articles 1 - 7 of 7
Full-Text Articles in Physical Sciences and Mathematics
Aviation And Cybersecurity: Opportunities For Applied Research, Jon Haass, Radhakrishna Sampigethaya, Vincent Capezzuto
Aviation And Cybersecurity: Opportunities For Applied Research, Jon Haass, Radhakrishna Sampigethaya, Vincent Capezzuto
Publications
Aviation connects the global community and is moving more people and payloads faster than ever. The next decade will experience an increase in manned and unmanned aircraft and systems with new features and unprecedented applications. Cybertechnologies—including software, computer networks, and information technology—are critical and fundamental to these advances in meeting the needs of the aviation ecosystem of aircraft, pilots, personnel, passengers, stakeholders, and society. This article discusses current and evolving threats as well as opportunities for applied research to improve the global cybersecurity stance in the aviation and connected transportation industry of tomorrow.
Local Standards For Sample Size At Chi, Kelly Caine
Local Standards For Sample Size At Chi, Kelly Caine
Publications
We describe the primary ways researchers can determine the size of a sample of research participants, present the benefits and drawbacks of each of those methods, and focus on improving one method that could be useful to the CHI community: local standards. To determine local standards for sample size within the CHI community, we conducted an analysis of all manuscripts published at CHI2014. We find that sample size for manuscripts published at CHI ranges from 1 -- 916,000 and the most common sample size is 12. We also find that sample size differs based on factors such as study setting …
Development And Use Of A Tablet-Based Resuscitation Sheet For Improving Outcomes During Intensive Patient Care, Wasif Bokahri, Vimla L. Patel, Ashish Amresh, Ayan Sen
Development And Use Of A Tablet-Based Resuscitation Sheet For Improving Outcomes During Intensive Patient Care, Wasif Bokahri, Vimla L. Patel, Ashish Amresh, Ayan Sen
Publications
Data documentation from resuscitation events in hospitals, termed "code blue" events, utilizes a paper form, which is institution-specific. Problems with data capture and transcription exists, due to the challenges of dynamic documentation of patient, event and outcome variables as the code blue event unfolds. We hypothesize that an electronic version of code blue real-time data capture would lead to improved resuscitation data transcription, and enable clinicians to address deficiencies in quality of care. To this effect, we present the design of a tablet-based application and its use by 20 nurses at the Mayo Clinic hospital. The results showed that the …
An Overview Of Cryptography (Updated Version, 3 March 2016), Gary C. Kessler
An Overview Of Cryptography (Updated Version, 3 March 2016), Gary C. Kessler
Publications
There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography...While cryptography is necessary for secure communications, it is not by itself sufficient. This paper describes the first of many steps necessary for better security in any number of situations.
A much shorter, edited version of this paper appears in the 1999 edition of Handbook on Local Area Networks published by Auerbach in September 1998.
Performance Considerations Of Network Functions Virtualization Using Containers, Jason Anderson, Udit Agarwal, Hongda Li, Hongxin Hu, Craig Lowery, Amy W. Apon
Performance Considerations Of Network Functions Virtualization Using Containers, Jason Anderson, Udit Agarwal, Hongda Li, Hongxin Hu, Craig Lowery, Amy W. Apon
Publications
The network performance of virtual machines plays a critical role in Network Functions Virtualization (NFV), and several technologies have been developed to address hardware-level virtualization shortcomings. Recent advances in operating system level virtualization and deployment platforms such as Docker have made containers an ideal candidate for high performance application encapsulation and deployment. However, Docker and other solutions typically use lower-performing networking mechanisms. In this paper, we explore the feasibility of using technologies designed to accelerate virtual machine networking with containers, in addition to quantifying the network performance of container-based VNFs compared to the state-of-the-art virtual machine solutions. Our results show …
Signal Flow Graph Approach To Efficient Dst I-Iv Algorithms, Sirani M. Perera
Signal Flow Graph Approach To Efficient Dst I-Iv Algorithms, Sirani M. Perera
Publications
In this paper, fast and efficient discrete sine transformation (DST) algorithms are presented based on the factorization of sparse, scaled orthogonal, rotation, rotation-reflection, and butterfly matrices. These algorithms are completely recursive and solely based on DST I-IV. The presented algorithms have low arithmetic cost compared to the known fast DST algorithms. Furthermore, the language of signal flow graph representation of digital structures is used to describe these efficient and recursive DST algorithms having (n�1) points signal flow graph for DST-I and n points signal flow graphs for DST II-IV.
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Publications
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …