Libraries & Information Technology eJournal最新文献

筛选
英文 中文
Data-Driven Competitor-Aware Positioning in On-Demand Vehicle Rental Networks 按需汽车租赁网络中数据驱动的竞争意识定位
Libraries & Information Technology eJournal Pub Date : 2021-09-01 DOI: 10.2139/ssrn.3915466
K. Schroer, W. Ketter, Thomas Lee, Alok Gupta, Micha Kahlen
{"title":"Data-Driven Competitor-Aware Positioning in On-Demand Vehicle Rental Networks","authors":"K. Schroer, W. Ketter, Thomas Lee, Alok Gupta, Micha Kahlen","doi":"10.2139/ssrn.3915466","DOIUrl":"https://doi.org/10.2139/ssrn.3915466","url":null,"abstract":"We study a novel operational problem that considers vehicle positioning in on-demand rental networks, such as car sharing in the wider context of a competitive market in which users select vehicles based on access. Existing approaches consider networks in isolation; our competitor-aware model takes supply situations of competing networks into account. We combine online machine learning to predict market-level demand and supply with dynamic mixed integer nonlinear programming. For evaluation, we use discrete event simulation based on real-world data from Car2Go and DriveNow. Our model outperforms conventional models that consider the fleet in isolation by a factor of two in terms of profit improvements. In the case we study, the highest theoretical profit improvements of 7.5% are achieved with a dynamic model. Operators of on-demand rental networks can use our model under existing market conditions to build a profitable competitive advantage by optimizing access for consumers without the need for fleet expansion. Model effectiveness increases further in realistic scenarios of fleet expansion and demand growth. Our model accommodates rising demand, defends against competitors’ fleet expansion, and enhances the profitability of own fleet expansions.","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131220551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Review of Knowledge Management in Optical Networks, Lambda Architecture using Database Technologies in Cloud Settings 光网络知识管理综述,Lambda架构在云环境下使用数据库技术
Libraries & Information Technology eJournal Pub Date : 2021-08-01 DOI: 10.29322/ijsrp.11.08.2021.p11663
Abdul Joseph Fofanah
{"title":"Review of Knowledge Management in Optical Networks, Lambda Architecture using Database Technologies in Cloud Settings","authors":"Abdul Joseph Fofanah","doi":"10.29322/ijsrp.11.08.2021.p11663","DOIUrl":"https://doi.org/10.29322/ijsrp.11.08.2021.p11663","url":null,"abstract":"In this paper, we present concepts, theories, and overview of knowledge management in an autonomous optical networks and Lamba Architecture in cloud related environment. This study presents some illustrative cases that has been used to illustrate the potential application of KM architecture and to evaluate the various policies for the knowledge sharing and integration algorithm. Here the knowledge is used at the optical transponder system level, sharing, and integration implemented at the node level and supervising and data analytics (SDA) controller level. The KM process has been evaluated by integrating on a metro-network situation in terms of model error convergence time and the data shared among agents. Indeed, the propagation and reinforcement actions illustrated by similar convergence time than data-based policies at various phases of the network learning process without compromising the convergence accuracy of the model prediction. The Lambda Architecture is the new model for Big Data and database research focus, that helps in data processing with a balance on throughput, latency, and fault-tolerance. To provide a complete solution and better accuracy, low latency, and high throughput, there exists no single tool. This introduced the idea to use a set of tools and methods to build a comprehensive Big Data approach. Although this paper does not provide a developed and working tool, however, provides an outline and the methods used by researchers to overcome some of the shortcomings of Lambda Architecture. The Lambda Architecture defines a set of layers to fit in a set of tools and methods rightly for constructing a comprehensive Big Data scheme: Speed Layer, Serving Layer, Batch Layer. Each layer satisfies a set of features and builds upon the functionality delivered by the layers beneath it. The Batch Layer is the place where the master dataset is warehoused, which is an unchangeable and add-only set of raw data. Also, the batch layer computes before the results using a distributed processing system like Hadoop, Apache Spark that can manage large amounts of data. The Speed Layer encapsulates new data coming in real-time and processes it. The Serving Layer comprises a parallel processing query steam engine, that takes results from both Batch and Speed Layers and responds to questions and requests in real-time with low latency. Stack Overflow is a Question-and-Answer forum with an enormous user community, millions of posts with rapid growth over the years. This paper demonstrates the Lambda Architecture by constructing a data pipeline, to add a new “Recommended Questions” section in the Stack Overflow user profile and update the questions suggested in real-time. Additionally, various indicators such as trending tags, user performance numbers such as are shown in user dashboard by querying through batch processing layer. Finally, this paper provides a seamless search of the various methods or techniques used to help solve complex databases wh","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131952630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Telecom's Road to 2030: “What If We Were to Do Nothing?” 电信业通往2030年的道路:“如果我们什么都不做会怎么样?”
Libraries & Information Technology eJournal Pub Date : 2021-08-01 DOI: 10.2139/ssrn.3897409
Richard D. Taylor
{"title":"Telecom's Road to 2030: “What If We Were to Do Nothing?”","authors":"Richard D. Taylor","doi":"10.2139/ssrn.3897409","DOIUrl":"https://doi.org/10.2139/ssrn.3897409","url":null,"abstract":"Telecom’s Road to 2030: “What if We Were to Do Nothing?” By 2030, current U.S. broadband policy may be unable to fulfill its mission of providing all Americans with equal access to the capabilities of advanced digital products and services, while geopolitical competitors forge ahead. This paper compares the information technology strategies of the U.S., the EU and China, and proposes a distinctively American leadership vision, building from the FCC’s 2010 National Broadband Plan (NBP). According to Blair Levin, NBP Exc. Dir., “We started with the question of what if we were to do nothing; what would be the biggest problem in a decade?” Revisiting that question in 2021 reveals very different problems and calls for a new paradigm for solutions. Digital networks are growing at near-exponential rates, along with networked technologies, platforms and applications which are increasingly critical for full societal participation. According to the NBP, “Broadband networks only create value to consumers and businesses when they are used in conjunction with broadband capable devices to deliver useful applications and content.” By 2030, for U.S. citizens to be fully engaged and productive members of society, broadband access alone will not be enough. Multi-Gb connectivity will be near ubiquitous, with mobile and fixed technologies functionally equivalent. The goal of universal broadband access will shift from connecting geographies and devices to connecting individuals (PANs, wearables, implantables), enabling use of an array of networked services and applications. Leading geopolitical competitors are aggressively pursuing new information technology opportunities. The EU hopes to become a global rule-maker for consumer digital protection. It is calling the current decade, “Europe’s Digital Decade”, embracing “digital citizenship”. In addition to the 2018 GDPR, the Digital Services and Digital Markets Acts, and rules for Commercial Data and AI are pending. China, in its 13th and now 14th Five Year Plans, is focused on international market leadership in critical new technologies (e.g., “Made in China 2025”), integrating strategies for AI, quantum information, Cyberspace, Big Data centers, and 5G, while domestically emphasizing rural development, social stability and regime perpetuation, merging Informatization with Cybersecurity. The paper compares the current goals, laws and structures of each related to emerging digital technologies. It asks if the U.S. is disadvantaged relative to its main competitors and offers a holistic policy alternative. It argues it is time to reforge U.S. broadband policy so policy and technology can develop in tandem. This will require an evolved policy framework that is flexible and responsive, with an integrative view of the digital ecosystem, focused on outcomes, not technologies, with full digital inclusion as the basic condition of the social contract. What if we were to do nothing? Domestically, broadband policy and regulation","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133376209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The mHealth Power Paradox: Improving Data Protection in Health Apps through Self-Regulation in the European Union 移动医疗权力悖论:通过欧盟的自我监管改善健康应用程序的数据保护
Libraries & Information Technology eJournal Pub Date : 2021-06-21 DOI: 10.2139/ssrn.3871033
Hannah van Kolfschooten
{"title":"The mHealth Power Paradox: Improving Data Protection in Health Apps through Self-Regulation in the European Union","authors":"Hannah van Kolfschooten","doi":"10.2139/ssrn.3871033","DOIUrl":"https://doi.org/10.2139/ssrn.3871033","url":null,"abstract":"An increasing number of EU citizens uses self-monitoring mHealth apps: apps used by consumers in a private setting to monitor their general health. The extensive processing of health data by these apps poses severe risks to users’ privacy. These risks are exacerbated by the inapplicability of the EU legal framework on health and patients’ rights to these apps. Furthermore, while the EU’s General Data Protection Regulation provides a solid legal framework for the protection of health data, in practice, many mHealth apps do not comply. In light of the lack of effective EU regulation, this paper examines the feasibility of self-regulation by app stores as a complementary form of regulation in order to improve the level of protection of EU mHealth app users. App stores already play an important role by regulating third-party mHealth apps distributed on their platforms in a top-down manner by means of app review procedures. In order to assess the effectiveness of these existing practices, a case study analysis is performed on the regulatory practices of Apple’s App Store and Google’s Google Play Store. This analysis is the basis for recommendations on how to strengthen current self-regulation initiatives by app stores in the context of health data protection.","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133354573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predictably Satisfied: Contributions of Artificial Intelligence to Intra-Organizational Communication 可预见的满足:人工智能对组织内部沟通的贡献
Libraries & Information Technology eJournal Pub Date : 2021-05-14 DOI: 10.2139/ssrn.3856479
Alicia von Schenk
{"title":"Predictably Satisfied: Contributions of Artificial Intelligence to Intra-Organizational Communication","authors":"Alicia von Schenk","doi":"10.2139/ssrn.3856479","DOIUrl":"https://doi.org/10.2139/ssrn.3856479","url":null,"abstract":"Artificially intelligent (AI) applications make data-driven predictions that enable personalization on a large scale. As such, recent advances in AI's predictive power might have the potential to create more productive work environments. Using a principal-agent model and understanding AI as signal production technology, I show that, within an organization, higher accuracy of an AI's predictions reduces information asymmetries and fosters truthful communication. Detailed information about employees allows for individually tailored management which ultimately raises production and profits. Using observational data, I test the main implications of the theoretical model concerning optimal behavior and heterogeneity in employee satisfaction. I exploit a unique individual-level panel dataset from Attuned, a Japanese startup that developed an AI tool measuring employees' intrinsic motivation. Empirical results show that when communicating via the AI tool, employee satisfaction increases over time. The effect is particularly pronounced in the long run, for initially dissatisfied individuals, in small teams, and for those whose motivational profile resembles that of their teammates. This heterogeneity suggests personalized work experiences due to managers' better targeting.","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132649492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Impact of Animated Banner Ads on Online Consumers: A Feature-Level Analysis Using Eye Tracking 动画横幅广告对在线消费者的影响:使用眼动追踪的特征级分析
Libraries & Information Technology eJournal Pub Date : 2021-01-09 DOI: 10.17705/1jais.00659
Weiyin Hong, Muller Y. M. Cheung, J. Thong
{"title":"The Impact of Animated Banner Ads on Online Consumers: A Feature-Level Analysis Using Eye Tracking","authors":"Weiyin Hong, Muller Y. M. Cheung, J. Thong","doi":"10.17705/1jais.00659","DOIUrl":"https://doi.org/10.17705/1jais.00659","url":null,"abstract":"Despite the popular use of animated banner ads on websites, extant research on the effects of web animation has generated mixed results. We argue that it is critical to identify feature-level animation characteristics and examine their individual and combined effects on capturing online consumers’ attention across different task conditions. We identify three key animation features (i.e., motion, lagging, and looming) based on three attention theories and investigate their effects on online consumers’ attention and recall across browsing and searching tasks in three laboratory experiments using an eye tracking machine. Experiment 1 found that both motion and looming (animation features) are effective in attracting online consumers’ attention to animated ads when they are performing a browsing task. However, combining a salient feature (e.g., motion) with another salient feature (e.g., looming) does not improve the original attention attraction effect, suggesting a “banner saturation” effect. Further, we found that online consumers’ attention positively affects their recall performance. In Experiment 2, none of the animation features or their interactions had a significant effect when the subjects were performing a searching task, indicating that task is an important boundary condition when applying attention theories. Experiment 3 replicated Experiment 1 in a more realistic context and produced similar results. We conclude the paper by discussing theoretical and practical implications as well as avenues for future research.","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"526 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132381531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
AI Impact Assessment: A Policy Prototyping Experiment 人工智能影响评估:一个政策原型实验
Libraries & Information Technology eJournal Pub Date : 2021-01-01 DOI: 10.2139/ssrn.3772500
Norberto Nuno Gomes de Andrade, V. Kontschieder
{"title":"AI Impact Assessment: A Policy Prototyping Experiment","authors":"Norberto Nuno Gomes de Andrade, V. Kontschieder","doi":"10.2139/ssrn.3772500","DOIUrl":"https://doi.org/10.2139/ssrn.3772500","url":null,"abstract":"This report presents the outcomes of the Open Loop policy prototyping program on Automated Decision Impact Assessment (ADIA) in Europe. Open Loop (www.openloop.org) is a global program that connects policymakers and technology companies to help develop effective and evidence-based policies around AI and other emerging technologies. \u0000 \u0000In this particular case, Open Loop partnered with 10 European AI companies to co-create an ADIA framework (policy prototype) that those companies could test by applying it to their own \u0000AI applications. The policy prototype was structured into two parts: the prototype law, which was drafted as legal text, and the prototype guidance, which was drafted as a playbook. The latter provided participants with additional guidance on procedural and substantive aspects of performing the ADIA through: \u0000 \u0000- A step-by-step risk assessment methodology; \u0000 \u0000- An overview of values often associated with AI applications; \u0000 \u0000- A taxonomy of harms; \u0000 \u0000- Examples of mitigating measures. \u0000 \u0000The prototype was tested against the following three \u0000criteria: 1) policy understanding; 2) policy effectiveness; 3) policy costs.The goal was to derive evidence-based recommendations relevant to ongoing policy debates around the future of AI regulation. \u0000 \u0000Based on the results of the prototyping exercise and the feedback on the prototype law and playbook, the report advises lawmakers formulating requirements for AI risk assessments to take the following recommendations into account: \u0000 \u0000- Focus on procedure instead of prescription as a way to determine high-risk AI applications; \u0000 \u0000- Leverage a procedural risk assessment approach to determine what is the right set of regulatory requirements that apply to organisations deploying AI applications; \u0000 \u0000- Provide specific and detailed guidance on how to implement an ADIA process, and release it alongside the law; \u0000 \u0000- Be as specific as possible in the definition of risks within regulatory scope; \u0000 \u0000- Improve documentation of risk assessment and decision-making processes by including justifications for mitigation choices; \u0000 \u0000- Develop a sound taxonomy of the different AI actors involved in risk assessment; \u0000 \u0000- Specify, as much as possible, the set of values that may be impacted by AI/ADM and provide guidance on how they may be in tension with one another; \u0000 \u0000- Don’t reinvent the wheel; combine new processes with established ones, improving the overall approach.","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"634 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126962852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Topmodpy: A Simple Python Script for Topic Modeling 主题建模的简单Python脚本
Libraries & Information Technology eJournal Pub Date : 2020-12-10 DOI: 10.2139/ssrn.3746196
K. Musunuru
{"title":"Topmodpy: A Simple Python Script for Topic Modeling","authors":"K. Musunuru","doi":"10.2139/ssrn.3746196","DOIUrl":"https://doi.org/10.2139/ssrn.3746196","url":null,"abstract":"Subjective assessment is rampant in literature verification and title evaluation. While subjective assessment is a valid practice but creates a void in terms of validity of results. Intuition is unique and tend to depend on several other aspects which are not methodological. As a result of which, there may be a possibility of unreasonable yet unfair amount of personal opinion in action. Natural Language Processing (NLP) offers robust mechanisms or techniques to evaluate unstructured data. Latent Dirichlet Allocation (LDA) is one of such techniques which adds logic while processing unstructured but subjective data. This article explains suitability of topmodpy to perform Latent Semantic Analysis (LSA) using Latent Dirichlet Allocation (LDA). topmopy is a Python script and is a collection of 12 different functions each with a unique aim. This article shows as how to use topmopy module on certain data collected using a valid search criteria. topmodpy module found to have obtained these latent constructs related to search criteria. Hence the efficacy of the topmodpy module has been proved.","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130987952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Changing Markets for Domain Names: Technical, Economic, and Policy Challenges 不断变化的域名市场:技术、经济和政策挑战
Libraries & Information Technology eJournal Pub Date : 2020-12-10 DOI: 10.2139/ssrn.3746594
W. Lehr, D. Clark, Steven J. Bauer
{"title":"Changing Markets for Domain Names: Technical, Economic, and Policy Challenges","authors":"W. Lehr, D. Clark, Steven J. Bauer","doi":"10.2139/ssrn.3746594","DOIUrl":"https://doi.org/10.2139/ssrn.3746594","url":null,"abstract":"The Domain Name System (DNS) is critical infrastructure for the Internet. The growth in size and complexity of the DNS, together with changes in its governance and operational practices, have raised numerous challenges. Herein, we provide a qualitative and empirical overview of DNS ecosystem economics and the relationships among key participants, including ICANN, the registries, registrars, and registrants. With this as background, the paper examines three key issues: (1) market power; (2) trends impacting the importance of domain names; and (3) concerns over DNS abuse and security.","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130274013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Mechanism to Secure the Transaction of IoT Devices Using Blockchain Technology 使用区块链技术保护物联网设备交易的机制
Libraries & Information Technology eJournal Pub Date : 2020-11-21 DOI: 10.2139/ssrn.3734799
Mahesh Arse, Jigyasu Dubey
{"title":"A Mechanism to Secure the Transaction of IoT Devices Using Blockchain Technology","authors":"Mahesh Arse, Jigyasu Dubey","doi":"10.2139/ssrn.3734799","DOIUrl":"https://doi.org/10.2139/ssrn.3734799","url":null,"abstract":"Currently, Internet of Things (IoT) is one of the rapidly growing technologies. It becomes popular because IoT devices are helpful in day to day work of humans. IoT devices have a small amount of memory, computation power, and energy by which they work like smart devices. Due to fewer resources, it is very difficult to apply any security mechanism efficiently, which makes these devices vulnerable and easy target to the attacker. Thus, there is a need for an efficient mechanism to secure the data of IoT devices from attackers. Blockchain technology is popular for providing security in a decentralized environment and it uses the distributed database. In this study, a mechanism is designed to secure the transactions of IoT devices using Blockchain technology. This mechanism will help to protect the data of IoT devices from unauthorized access.","PeriodicalId":139603,"journal":{"name":"Libraries & Information Technology eJournal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129085250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信