Journal of information technology & software engineering最新文献

筛选
英文 中文
Systematic Survey of Data Mining Technology 数据挖掘技术系统综述
Journal of information technology & software engineering Pub Date : 2021-01-01 DOI: 10.35248/2165-7866.21.S2.004
Robert Hoehndor
{"title":"Systematic Survey of Data Mining Technology","authors":"Robert Hoehndor","doi":"10.35248/2165-7866.21.S2.004","DOIUrl":"https://doi.org/10.35248/2165-7866.21.S2.004","url":null,"abstract":"Data mining is the revelation of designs and examples in enormous and complex data sets. There are two types of data mining: model structure and example location. Model structure in Data mining is very much like factual demonstrating, albeit new issues emerge on account of the enormous sizes of the Data indexes and the way that Data mining is frequently optional information examination. Example discovery looks for peculiarities or little nearby designs in information, with the tremendous mass of the information being unimportant. For sure, one perspective on numerous large scale information mining exercises is that they basically comprise separating and data reduction.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Healthcare Usage of Cloud Computing and Resources 云计算和资源的医疗保健使用情况
Journal of information technology & software engineering Pub Date : 2021-01-01 DOI: 10.35248/2165-7866.21.S4.002
Christopher M Hannock
{"title":"Healthcare Usage of Cloud Computing and Resources","authors":"Christopher M Hannock","doi":"10.35248/2165-7866.21.S4.002","DOIUrl":"https://doi.org/10.35248/2165-7866.21.S4.002","url":null,"abstract":"Cloud computing has been an ever-growing field within information technology. As most businesses are finding ways to utilize cloud service providers, there is one industry that has not been as willing to make the shift. This paper will cover the different models of cloud computing, hesitation in making the shift, why the shift should be made, and discuss the overall benefits of cloud computing. With the current Coronavirus pandemic, the need for increased budgets, bandwidth, and access has increased drastically. Cloud computing is a computing model which takes place over the internet and provides scalability, reliability, availability and low cost of computer reassures. This paper also discusses the concerns that healthcare providers have in switching from legacy systems to a new cloud-based solution.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Security of Patient Health Information Regarding Wireless LANNetworks 提高无线局域网患者健康信息的安全性
Journal of information technology & software engineering Pub Date : 2021-01-01 DOI: 10.35248/2165-7866.21.11.246
David A. Walker
{"title":"Improving Security of Patient Health Information Regarding Wireless LANNetworks","authors":"David A. Walker","doi":"10.35248/2165-7866.21.11.246","DOIUrl":"https://doi.org/10.35248/2165-7866.21.11.246","url":null,"abstract":"The objective of this article is to report the results of data collected to search for solutions towards advancements in strengthening hospital wireless network security. Patient data breaches cost hospitals billions of dollars annually. The analysis of the data collected for this qualitative exploratory historic case study indicated that hospitals are searching for solutions to protect patient data from wireless network breaches, and the results of the analysis are available for review. This article presents results of the data collected and reviewed for this qualitative exploratory historical case study, as well as the results of the analysis of the data","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"10 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assembly Stations Performed by Mobile Robots 由移动机器人执行的装配站
Journal of information technology & software engineering Pub Date : 2021-01-01 DOI: 10.35248/2165-7866.21.S4.E001
N. Busis
{"title":"Assembly Stations Performed by Mobile Robots","authors":"N. Busis","doi":"10.35248/2165-7866.21.S4.E001","DOIUrl":"https://doi.org/10.35248/2165-7866.21.S4.E001","url":null,"abstract":"","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Living in the Future: Designing a Smart-Home with Information Security inMind 生活在未来:设计一个信息安全的智能家居
Journal of information technology & software engineering Pub Date : 2021-01-01 DOI: 10.35248/2165-7866.21.11.248
David Brehmer
{"title":"Living in the Future: Designing a Smart-Home with Information Security inMind","authors":"David Brehmer","doi":"10.35248/2165-7866.21.11.248","DOIUrl":"https://doi.org/10.35248/2165-7866.21.11.248","url":null,"abstract":"Around the world, there has been an increase in the number of IoT devices found in homes. These devices can range from temperature sensors and thermostats to security cameras and entire home security architecture. One study found that 63% of homes in North America had at least one IoT or ‘smart-home’ device. While the convenience of IoT devices in our homes is a value to the end user, many IoT makers do not prioritize security over convenience in their development life cycle. The development of IoT devices should include information security among the most important milestones to achieve, and one could argue it should be the top priority. In this paper we will discuss the concepts and best practices when developing a smart home and how information security should play a very large role.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"11 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things-Based Secure Healthcare Framework using Block Chain Technology 使用区块链技术的基于物联网的安全医疗框架
Journal of information technology & software engineering Pub Date : 2021-01-01 DOI: 10.35248/2165-7866.21.S2.003
P. Pawar
{"title":"Internet of Things-Based Secure Healthcare Framework using Block Chain Technology","authors":"P. Pawar","doi":"10.35248/2165-7866.21.S2.003","DOIUrl":"https://doi.org/10.35248/2165-7866.21.S2.003","url":null,"abstract":"Today, the Internet of Things (IoT) is becoming more common and finds applications in several domains, especially in the healthcare sector. Due to the rising demands of IoT, a massive quantity of sensing data gets generated from diverse sensing devices. Artificial Intelligence (AI) techniques are vital for providing a scalable and precise analysis of data in real time. But the design and development of a useful big data analysis technique face a few challenges, like centralized architecture, security, and privacy, resource constraints, and the lack of adequate training data. On the other hand, the rising blockchain technology offers a decentralized architecture. It enables secure sharing of data and resources to the different nodes of the IoT network and is promoted for removing centralized control and resolving the problems of AI.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Survey of Data Mining Technique 数据挖掘技术系统综述
Journal of information technology & software engineering Pub Date : 2021-01-01 DOI: 10.35248/2165-7866.21.S4.001
N. Busis
{"title":"Systematic Survey of Data Mining Technique","authors":"N. Busis","doi":"10.35248/2165-7866.21.S4.001","DOIUrl":"https://doi.org/10.35248/2165-7866.21.S4.001","url":null,"abstract":"Information mining is the disclosure of plans and models in huge and complex informational indexes. There are two sorts of information mining: Model construction and model area. Model design in data mining is actually similar to verifiable illustrating, but new issues arise by virtue of the huge sizes of the data records and the way that Data mining is habitually discretionary data assessment. Model disclosure searches for quirks or minimal close by plans in data, with the enormous mass of the data being insignificant. Without a doubt, one viewpoint on various large-scale data mining practices is that they essentially contain isolating and information decrease.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fundamental Principles, Processes, and Roles of Environmental Qualification Test Strategy for Complex Engineered Systems 复杂工程系统环境鉴定试验策略的基本原理、过程和作用
Journal of information technology & software engineering Pub Date : 2020-01-01 DOI: 10.24105/2165-7866.10.265
Phillip Jaramillo, Marco Rascon, Charles Adams, Eric Jauregui
{"title":"Fundamental Principles, Processes, and Roles of Environmental Qualification Test Strategy for Complex Engineered Systems","authors":"Phillip Jaramillo, Marco Rascon, Charles Adams, Eric Jauregui","doi":"10.24105/2165-7866.10.265","DOIUrl":"https://doi.org/10.24105/2165-7866.10.265","url":null,"abstract":"“In real life, strategy is actually very straightforward. You pick a general direction and implement it like hell.” Jack Welch Former CEO of General Electric. A qualification strategy, created and executed on complex systems, enables effective and efficient environmental testing at the component, unit, section and system levels. Cost, schedule, and technical challenges highlight the need for an environmental qualification test strategy that provides a robust test regime to verify the design meets user requirements, balanced with a timesaving approach. This paper explains three fundamentals to follow when creating an environmental qualification test strategy that cover risk reduction testing, test planning, and test design. Based on lessons learned through two decades of results, the strategies described in the fundamentals provide an optimized approach to qualification by; 1) demonstrating test environment capabilities as risk reduction, 2) defining key stakeholders, roles and responsibilities along with methods to reduce the possibility of increased test durations due to setup inefficiencies, and 3) providing methods to ensure the required test coverage and test methodology is robust enough to detect design deficiencies. This strategy aligns with customer desire to reduce test delays while at the same time not sacrificing test thoroughness.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"10 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69014917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Plan Your Network Project 计划你的网络项目
Journal of information technology & software engineering Pub Date : 2020-01-01 DOI: 10.24105/2165-7866.9.264
Anshuman Awasthi
{"title":"Plan Your Network Project","authors":"Anshuman Awasthi","doi":"10.24105/2165-7866.9.264","DOIUrl":"https://doi.org/10.24105/2165-7866.9.264","url":null,"abstract":"Planning for a Network Hardware Refresh is not an easy task as each project has a different set of requirements and unique objectives. Projects are done to accomplish End of Life and Support challenges or due to the requirement of a complete set of new features that were not available in the older technology. Whatever the case may be network projects need to plan carefully as the enterprise network is the last layer of enabling communication for critical business functions. Let us have a look at the planning tasks involved in the Network Project.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"10 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69014662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enterprise Network Hardware Refresh 企业网络硬件刷新
Journal of information technology & software engineering Pub Date : 2020-01-01 DOI: 10.24105/2165-7866.9.262
Anshuman Awasthi
{"title":"Enterprise Network Hardware Refresh","authors":"Anshuman Awasthi","doi":"10.24105/2165-7866.9.262","DOIUrl":"https://doi.org/10.24105/2165-7866.9.262","url":null,"abstract":"It is essential to keep the Network Hardware up and running in good condition to support enterprise applications connectivity. Network performance plays a critical role in providing adequate bandwidth to the collaboration tools for an organization. The average life of the some of the network equipment ranges between 3-5 years, however some may last more than 5 years based on the type of hardware and technology used. The older technology may add performance barriers in the enterprise network. Performing a Network hardware refresh can be a tedious and complicated task depending on the amount of devices and the architecture. Let us try to understand how to perform a hardware refresh for your Network that function in an enterprise and the types of devices that function in different layers in an OSI model.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"10 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69014960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信