 | | | A Proposal of Decentralised and Distributed Blockchain Secured Educational Network for Higher Education The top use case of Blockchain is Identity Management. IndiaChain is the Government of India's plan to implement a complete blockchain infrastructure that will match IndiaStack. In future, IndiaChain will be linked with IndiaStack & other government Digital Identification Databases. IndiaStack is a set of code developed around India's unique Identity project Aadhar. If implemented, IndiaChain will be the largest blockchain implementation across the globe. With such massive plans of moving towards Digital India, in this paper we present a blockchain implementation on education system, in... | | Image Steganography using K-LSB Embedding with Edge Detection and Chaotic Map Steganography is the science of embedding secret data inside data so they can be sent to destination security. Image steganography is the most popular type of carrier to hold information. Many algorithms have been proposed to hide information into digital images; the least significant bit algorithm (LSB) is one of these algorithms that is widely used in steganography. In this paper, we introduced propose steganography method by using edge detection of 6 bits in the image by edge detection and chaotic map. In work, we use 1-LSB or 2-LSB embedding, it depends on the threshold for edge... | | Recent finance advances in information technology for inclusive development: a systematic review The overarching question tackled in this paper is: to what degree has financial development contributed to providing opportunities of human development for those on low-incomes and by what information technology mechanisms? We systematically review about 180 recently published papers to provide recent information technology advances in finance for inclusive development. Retained financial innovations are structured along three themes. They are: (i) the rural-urban divide, (ii) women empowerment and (iii) human capital in terms of skills and training. The financial instruments are... | | Technology and persistence in global software piracy This study examines the persistence of software piracy with internet penetration vis-à-vis of PC users, conditional on Intellectual Property Rights (IPRs) institutions. The empirical evidence is based on a panel of 99 countries for the period 1994-2010 and the Generalised Method of Moments. The main finding is that, compared to internet penetration, PC usage is more responsible for the persistence of global software piracy. Knowing how technology affects the persistence of piracy is important because it enables more targeted policy initiatives. We show that the sensitivity of software... | | Direct Experience, Once Removed: Unconcealing the Environmental Interface In this paper I will propose that as the physical infrastructure of computation approaches the invisibility and abstraction of software, its interface becomes environmentalized—interwoven with and increasingly indistinguishable from the context in which and on which it operates. While readiness and routine eventually cause all tools to disappear into engaged usefulness and habit, ambient technologies—designed as they are to preempt their users' notice—would seem to operate in an altogether different category, blending into and in some ways supplanting one's apparent, everyday... | | Preening for the Algorithmic Gaze: Bioinformatic Media and Panopticonic Performance Operating at the intersections of technology, biopolitics and social physics, the algorithmic gaze is an acquisitive, ambient computational force that influences and sculpts the behavior of those within its field of vision. While the human gaze is one of mutual accountability and consideration, the algorithmic gaze is non-reciprocal—a distributed visual memory that stores and extrapolates residual biodata to construct high-granularity representations mined for trends and behavior patterns. This paper will consider how augmentation, behavioral camouflage and technologies of the quantified... | | A hybrid modeling approach for predicting the educational use of mobile cloud computing services in higher education A B S T R A C T The decision to integrate mobile cloud computing (MCC) in education without determining optimal use scenarios is a universal problem as the adoption of such services becomes widespread. Accordingly, this study developed and validated a predictive model that explains the role of students' information management (i.e. retrieve, store, share, and apply) practices in predicting their attitudes toward using the MCC services for educational purposes. This study validated the model by the complementary use of machine learning algorithms alongside a classical SEM-based approach... | | Information Warfare : Redefining National Security Information Warfare, uses elements of information and technology to disrupt thought processes and paralyze an adversary with non- kinetic mean, violating sovereignty and achieving objectives without using conventional forces. We need to defend against such warfare and develop capability to strike back in similar coin. The conceptual construct of National Security itself has undergone a transformation in the digital era, hence there is a need to redefine the concept of National Security and review security systems in the era of Information Warfare. Information Security has to include... | | |
Academia, 580 California St., Suite 400, San Francisco, CA, 94104 Unsubscribe Privacy Policy Terms of Service © 2018 Academia | |
ConversionConversion EmoticonEmoticon