Search results

1 – 10 of over 4000
Content available
Article
Publication date: 1 September 2000

704

Abstract

Details

Circuit World, vol. 26 no. 3
Type: Research Article
ISSN: 0305-6120

Keywords

Open Access
Article
Publication date: 18 April 2023

Patience Mpofu, Solomon Hopewell Kembo, Marlvern Chimbwanda, Saulo Jacques, Nevil Chitiyo and Kudakwashe Zvarevashe

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics…

Abstract

Purpose

In response to food supply constraints resulting from coronavirus disease 2019 (COVID-19) restrictions, in the year 2020, the project developed automated household Aquaponics units to guarantee food self-sufficiency. However, the automated aquaponics solution did not fully comply with data privacy and portability best practices to protect the data of household owners. The purpose of this study is to develop a data privacy and portability layer on top of the previously developed automated Aquaponics units.

Design/methodology/approach

Design Science Research (DSR) is the research method implemented in this study.

Findings

General Data Protection and Privacy Regulations (GDPR)-inspired principles empowering data subjects including data minimisation, purpose limitation, storage limitation as well as integrity and confidentiality can be implemented in a federated learning (FL) architecture using Pinecone Matrix home servers and edge devices.

Research limitations/implications

The literature reviewed for this study demonstrates that the GDPR right to data portability can have a positive impact on data protection by giving individuals more control over their own data. This is achieved by allowing data subjects to obtain their personal information from a data controller in a format that makes it simple to reuse it in another context and to transmit this information freely to any other data controller of their choice. Data portability is not strictly governed or enforced by data protection laws in the developing world, such as Zimbabwe's Data Protection Act of 2021.

Practical implications

Privacy requirements can be implemented in end-point technology such as smartphones, microcontrollers and single board computer clusters enabling data subjects to be incentivised whilst unlocking the value of their own data in the process fostering competition among data controllers and processors.

Originality/value

The use of end-to-end encryption with Matrix Pinecone on edge endpoints and fog servers, as well as the practical implementation of data portability, are currently not adequately covered in the literature. The study acts as a springboard for a future conversation on the topic.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Open Access
Article
Publication date: 20 August 2021

Daniel Hofer, Markus Jäger, Aya Khaled Youssef Sayed Mohamed and Josef Küng

For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases…

2199

Abstract

Purpose

For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases, timestamps are the only linking points between events caused by attackers, faulty systems or simple errors and their corresponding entries in log files. With the idea of storing and analyzing this log information in graph databases, we need a suitable model to store and connect timestamps and their events. This paper aims to find and evaluate different approaches how to store timestamps in graph databases and their individual benefits and drawbacks.

Design/methodology/approach

We analyse three different approaches, how timestamp information can be represented and stored in graph databases. For checking the models, we set up four typical questions that are important for log file analysis and tested them for each of the models. During the evaluation, we used the performance and other properties as metrics, how suitable each of the models is for representing the log files’ timestamp information. In the last part, we try to improve one promising looking model.

Findings

We come to the conclusion, that the simplest model with the least graph database-specific concepts in use is also the one yielding the simplest and fastest queries.

Research limitations/implications

Limitations to this research are that only one graph database was studied and also improvements to the query engine might change future results.

Originality/value

In the study, we addressed the issue of storing timestamps in graph databases in a meaningful, practical and efficient way. The results can be used as a pattern for similar scenarios and applications.

Details

International Journal of Web Information Systems, vol. 17 no. 5
Type: Research Article
ISSN: 1744-0084

Keywords

Content available
Article
Publication date: 1 April 2004

Jon Rigelsford

269

Abstract

Details

Industrial Robot: An International Journal, vol. 31 no. 2
Type: Research Article
ISSN: 0143-991X

Keywords

Content available
Article
Publication date: 27 November 2020

Petar Jackovich, Bruce Cox and Raymond R. Hill

This paper aims to define the class of fragment constructive heuristics used to compute feasible solutions for the traveling salesman problem (TSP) into edge-greedy and…

Abstract

Purpose

This paper aims to define the class of fragment constructive heuristics used to compute feasible solutions for the traveling salesman problem (TSP) into edge-greedy and vertex-greedy subclasses. As these subclasses of heuristics can create subtours, two known methodologies for subtour elimination on symmetric instances are reviewed and are expanded to cover asymmetric problem instances. This paper introduces a third novel subtour elimination methodology, the greedy tracker (GT), and compares it to both known methodologies.

Design/methodology/approach

Computational results for all three subtour elimination methodologies are generated across 17 symmetric instances ranging in size from 29 vertices to 5,934 vertices, as well as 9 asymmetric instances ranging in size from 17 to 443 vertices.

Findings

The results demonstrate the GT is the fastest method for preventing subtours for instances below 400 vertices. Additionally, a distinction between fragment constructive heuristics and the subtour elimination methodology used to ensure the feasibility of resulting solutions enables the introduction of a new vertex-greedy fragment heuristic called ordered greedy.

Originality/value

This research has two main contributions: first, it introduces a novel subtour elimination methodology. Second, the research introduces the concept of ordered lists which remaps the TSP into a new space with promising initial computational results.

Content available
Article
Publication date: 2 May 2024

Sydney Austin, Ahad Bandealy and Elizabeth Cawley

The purpose of this paper is to highlight current utilizations of advanced technology within the digital mental health platform Keel Mind.

Abstract

Purpose

The purpose of this paper is to highlight current utilizations of advanced technology within the digital mental health platform Keel Mind.

Design/methodology/approach

Keel Mind, based out of Ontario, Canada is a therapeutic delivery platform that dually functions to train clinicians and deliver virtual therapy to clients.

Findings

From personalizing client and therapist matching to using natural language processing (NLP) and artificial intelligence (AI)-driven features Keel Mind supports clinician decision-making to meet the growing mental health needs of the population. Keel Mind functions to provide accessible service, efficiently train high-quality clinicians and enhance clinical outcomes for clients. In a preliminary study within post-secondary students from Ontario, Canada, 90.1% of clients reported liking the platform, and 83.4% reported that they experienced positive mental health outcomes as a result of using Keel Mind.

Practical implications

Keel Mind is a leader within the rapidly developing field of telepsychology and aims to promote positive mental health outcomes worldwide.

Originality/value

This digital showcase is the first published piece of work highlighting the technological capabilities of Keel Mind as a digital therapeutic platform. The intention of this work is to highlight current uses of digital technology within the field of therapeutic practice and to promote technological growth within the field.

Details

Mental Health and Digital Technologies, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2976-8756

Keywords

Content available
Article
Publication date: 25 January 2008

115

Abstract

Details

Sensor Review, vol. 28 no. 1
Type: Research Article
ISSN: 0260-2288

Content available
Article
Publication date: 2 January 2007

68

Abstract

Details

Microelectronics International, vol. 24 no. 1
Type: Research Article
ISSN: 1356-5362

Content available
Article
Publication date: 1 December 2002

58

Abstract

Details

Sensor Review, vol. 22 no. 4
Type: Research Article
ISSN: 0260-2288

Keywords

Abstract

Details

Sensor Review, vol. 22 no. 1
Type: Research Article
ISSN: 0260-2288

Keywords

1 – 10 of over 4000