Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
494,447
result(s) for
"COMPUTER COMMUNICATIONS "
Sort by:
‘Fit-for-purpose?’ – challenges and opportunities for applications of blockchain technology in the future of healthcare
by
Clauson, Kevin A.
,
Kuo, Tsung-Ting
,
Church, George
in
Beyond Big Data to new Biomedical and Health Data Science moving to next century precision health
,
Biomedical Technology - methods
,
Biomedical Technology - organization & administration
2019
Blockchain is a shared distributed digital ledger technology that can better facilitate data management, provenance and security, and has the potential to transform healthcare. Importantly, blockchain represents a data architecture, whose application goes far beyond Bitcoin – the cryptocurrency that relies on blockchain and has popularized the technology. In the health sector, blockchain is being aggressively explored by various stakeholders to optimize business processes, lower costs, improve patient outcomes, enhance compliance, and enable better use of healthcare-related data. However, critical in assessing whether blockchain can fulfill the hype of a technology characterized as ‘revolutionary’ and ‘disruptive’, is the need to ensure that blockchain design elements consider actual healthcare needs from the diverse perspectives of consumers, patients, providers, and regulators. In addition, answering the real needs of healthcare stakeholders, blockchain approaches must also be responsive to the unique challenges faced in healthcare compared to other sectors of the economy. In this sense, ensuring that a health blockchain is ‘fit-for-purpose’ is pivotal. This concept forms the basis for this article, where we share views from a multidisciplinary group of practitioners at the forefront of blockchain conceptualization, development, and deployment.
Journal Article
Network routing: algorithms, protocols, and architectures
by
Ramasamy, Karthik
,
Medhi, Deep
in
Computer network architectures
,
Computer networks
,
Routers (Computer networks)
2017
Network Routing: Algorithms, Protocols, and Architectures, Second Edition explores network routing and how it can be broadly categorized into Internet routing, PSTN routing, and telecommunication transport network routing. The book systematically considers these routing paradigms, as well as their interoperability, discussing how algorithms, protocols, analysis, and operational deployment impact these approaches and addressing both macro-state and micro-state in routing. Readers will learn about the evolution of network routing, the role of IP and E.164 addressing and traffic engineering in routing, the impact on router and switching architectures and their design, deployment of network routing protocols, and lessons learned from implementation and operational experience. Numerous real-world examples bring the material alive. Bridges the gap between theory and practice in network routing, including the fine points of implementation and operational experienceRouting in a multitude of technologies discussed in practical detail, including, IP/MPLS, PSTN, and optical networkingPresents routing protocols such as OSPF, IS-IS, BGP in detailDetails various router and switch architecturesDiscusses algorithms on IP-lookup and packet classificationAccessible to a wide audience with a vendor-neutral approach
The sustainable network : the accidental answer for a troubled planet
This book demonstrates how we can tackle challenges, ranging from energy conservation to economic and social innovation, using the global network of which the public Internet is just one piece. To help solve a myriad of problems today, author Sarah Sorensen points out that the best tool for enacting change already exists, lying literally at our fingertips. This book demystifies the power of the network and issues a strong call to action.
Understanding videoconference fatigue: a systematic review of dimensions, antecedents and theories
2023
PurposeWhile videoconferencing has allowed for meetings to continue in a virtual space without the need for face-to-face interaction, there have been increasing reports of individuals affected by a phenomenon colloquially known as videoconference fatigue (VF). This paper presents a systematic review of existing literature to understand the empirical manifestations of the phenomenon, the causes behind it and potential theoretical explanations behind its effects.Design/methodology/approachA comprehensive search on four academic databases was conducted using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines and produced 34,574 results, with 14 articles meeting the eligibility criteria.FindingsAnalyses showed that VF can be classified into four dimensions: physical, emotional, cognitive and social. Antecedents of VF can be organized into psychological, social, technical, chronemic and productivity factors. Potential theoretical explanations applied in existing studies were described and elaborated upon. The authors also highlight the importance of addressing social concerns as a key priority in alleviating VF.Originality/valueTo our knowledge, this is the first comprehensive systematic review of existing research on VF. The contribution of this paper is twofold: First, the authors described VF in a systematic and rigorous manner and provide theoretical insights, as much of the current discourse around VF tends to be based on anecdotal evidence and reports. Second, the authors explore potential theoretical explanations surrounding the phenomena, to address the lack of understanding behind the processes by which VF affects individuals.
Journal Article
Enabling blockchain technology for secure networking and communications
\"This book consolidates the recent research initiatives directed towards exploiting the advantages of Blockchain technology for benefiting several areas of applications from security and robustness to scalability and privacy-preserving. The central focus of this book is investigate several current topics, such as Blockchain for IoT and its derivatives, applications of Blockchain for security and privacy across various domains, Blockchain for Identity Management, Integration of Artificial Intelligence and Blockchain, Blockchain and energy efficiency challenges\"-- Provided by publisher.
A novel graph-based approach for IoT botnet detection
by
Quoc-Dung, Ngo
,
Nguyen Huy-Trung
,
Van-Hoang, Le
in
Activities of daily living
,
Comparative analysis
,
Comparative studies
2020
The Internet of things (IoT) is the extension of Internet connectivity into physical devices and everyday objects. These IoT devices can communicate with others over the Internet and fully integrate into people’s daily life. In recent years, IoT devices still suffer from basic security vulnerabilities making them vulnerable to a variety of threats and malware, especially IoT botnets. Unlike common malware on desktop personal computer and Android, heterogeneous processor architecture issue on IoT devices brings various challenges for researchers. Many studies take advantages of well-known dynamic or static analysis for detecting and classifying botnet on IoT devices. However, almost studies yet cannot address the multi-architecture issue and consume vast computing resources for analyzing. In this paper, we propose a lightweight method for detecting IoT botnet, which based on extracting high-level features from function–call graphs, called PSI-Graph, for each executable file. This feature shows the effectiveness when dealing with the multi-architecture problem while avoiding the complexity of control flow graph analysis that is used by most of the existing methods. The experimental results show that the proposed method achieves an accuracy of 98.7%, with the dataset of 11,200 ELF files consisting of 7199 IoT botnet samples and 4001 benign samples. Additionally, a comparative study with other existing methods demonstrates that our approach delivers better outcome. Lastly, we make the source code of this work available to Github.
Journal Article