scholarly journals A Theoretical Framework of Knowledge Management in M-Government

Author(s):  
Srikanth Kesavarapu ◽  
Choi Mun-Kee

M-government is one of the new and important developments in e-government. The promise of mgovernment to provide greater access to government information is progressing in many developed and developing countries. Current m-government does not exploit the full potential of available technology. M-government presents some challenges such as technical challenges, usability challenges, handset-limitations, social and legal issues, and so on. Also, knowledge management (KM) has changed from one generation to the next through constant improvements and perspectives. In this paper, we deal with the security issues in different forms of government using some technology-based KM and propose some ways to eradicate using latest technologies. In this context, this paper aims to present a conceptual analysis of process-based KM approach in m-government to which researchers must pay attention and describe a suitable knowledge model to achieve real-time, ubiquitous government.

Author(s):  
Qingtao Wu ◽  
Zaihui Cao

: Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.


Author(s):  
Gabriel Wilkes ◽  
Roman Engelhardt ◽  
Lars Briem ◽  
Florian Dandl ◽  
Peter Vortisch ◽  
...  

This paper presents the coupling of a state-of-the-art ride-pooling fleet simulation package with the mobiTopp travel demand modeling framework. The coupling of both models enables a detailed agent- and activity-based demand model, in which travelers have the option to use ride-pooling based on real-time offers of an optimized ride-pooling operation. On the one hand, this approach allows the application of detailed mode-choice models based on agent-level attributes coming from mobiTopp functionalities. On the other hand, existing state-of-the-art ride-pooling optimization can be applied to utilize the full potential of ride-pooling. The introduced interface allows mode choice based on real-time fleet information and thereby does not require multiple iterations per simulated day to achieve a balance of ride-pooling demand and supply. The introduced methodology is applied to a case study of an example model where in total approximately 70,000 trips are performed. Simulations with a simplified mode-choice model with varying fleet size (0–150 vehicles), fares, and further fleet operators’ settings show that (i) ride-pooling can be a very attractive alternative to existing modes and (ii) the fare model can affect the mode shifts to ride-pooling. Depending on the scenario, the mode share of ride-pooling is between 7.6% and 16.8% and the average distance-weighed occupancy of the ride-pooling fleet varies between 0.75 and 1.17.


2021 ◽  
Vol 3 (2) ◽  
pp. 363-382
Author(s):  
Md. Kamrul Hasan ◽  
Takashi S. T. Tanaka ◽  
Md. Rostom Ali ◽  
Chayan Kumer Saha ◽  
Md. Monjurul Alam

To reduce human drudgery and the risk of labor shortages in the Asian developing countries, the appropriate introduction of agricultural machinery, especially combine harvesters, is an urgent task. Custom hiring services (CHSs) are expected to contribute to making paddy harvesters prevalent in developing countries; however, the economic performance has been rarely quantified. The study was carried out to precisely evaluate the machine performance attributes of medium and large combine harvesters using the real-time kinematic (RTK) global navigation satellite system (GNSS) and to estimate the economic performance of CHSs of paddy harvesters in Japan, as a typical case of Asian countries. The financial profitability was evaluated by four major indicators: net present value, benefit–cost ratio, internal rate of return, and payback period. The financial indicators showed that both types of harvester could be considered financially viable. Thus, the investment in combine harvesters can be highly profitable for CHS business by a local service provider and custom-hire entrepreneur, providing a great opportunity to use a combine harvester without initial investment by general farmers. The findings demonstrated the high feasibility of CHSs of paddy harvesters in Japan, while they highlighted that further study is needed to estimate the feasibility of CHS in the other Asian developing countries.


2003 ◽  
Vol 125 (1) ◽  
pp. 76-82 ◽  
Author(s):  
T. D. Short ◽  
R. Oldach

Solar (photovoltaic) powered water pumps could be a real instrument for the alleviation of water related deaths and illnesses in developing countries through the provision of clean water. However, despite the benefits that access to sustainable potable water supplies can bring, solar powered water pumps have a long way to go before they even begin to meet the needs of those who could use them. This paper addresses some of the complex, inter-related social and technical issues that have prevented solar powered water pumping from reaching its full potential and shows how future efforts should be directed in order to respond to these issues.


2018 ◽  
Vol 15 (5) ◽  
pp. 172988141880444 ◽  
Author(s):  
Arne-Christoph Hildebrandt ◽  
Konstantin Ritt ◽  
Daniel Wahrmann ◽  
Robert Wittmann ◽  
Felix Sygulla ◽  
...  

Bipedal robots can be better alternatives to other robots in certain applications, but their full potential can only be used if their entire kinematic range is cleverly exploited. Generating motions that are not only dynamically feasible but also take into account the kinematic limits as well as collisions in real time is one of the main challenges towards that goal. We present an approach to generate adaptable torso height trajectories to exploit the full kinematic range in bipedal locomotion. A simplified 2D model approximates the robot’s full kinematic model for multiple steps ahead. It is used to optimize the torso height trajectories while taking future motion kinematics into account. The method significantly improves the robot’s motion not only while walking in uneven terrain, but also during normal walking. Furthermore, we integrated the method in our framework for autonomous walking and we validated its real-time character in successfully conducted experiments.


2018 ◽  
Vol 14 (1) ◽  
pp. 30-50 ◽  
Author(s):  
William H. Money ◽  
Stephen J. Cohen

This article analyzes the properties of unknown faults in knowledge management and Big Data systems processing Big Data in real-time. These faults introduce risks and threaten the knowledge pyramid and decisions based on knowledge gleaned from volumes of complex data. The authors hypothesize that not yet encountered faults may require fault handling, an analytic model, and an architectural framework to assess and manage the faults and mitigate the risks of correlating or integrating otherwise uncorrelated Big Data, and to ensure the source pedigree, quality, set integrity, freshness, and validity of the data. New architectures, methods, and tools for handling and analyzing Big Data systems functioning in real-time will contribute to organizational knowledge and performance. System designs must mitigate faults resulting from real-time streaming processes while ensuring that variables such as synchronization, redundancy, and latency are addressed. This article concludes that with improved designs, real-time Big Data systems may continuously deliver the value of streaming Big Data.


2011 ◽  
Vol 7 (4) ◽  
pp. 70-84
Author(s):  
Sung-kwan Kim ◽  
Joe Felan ◽  
Moo Hong Kang

Modeling approaches are gaining popularity in knowledge management (KM), especially in specifying knowledge contents. This paper addresses the enterprise knowledge modeling. An enterprise knowledge model provides users with an integrated, holistic view of organizational knowledge resources. Employing a reliable methodology is critical to building successful enterprise knowledge models. A good methodology provides an effective and efficient mechanism for developing a model. This paper first reviews the enterprise knowledge modeling (EKM) and its methodologies. An ontology-based EKM (OBEKM) methodology is proposed. Its products, procedures, and modeling language are described. The methodology is then applied to the construction of a shipping company’s knowledge model for demonstration.


2021 ◽  
Vol 9 (1) ◽  
pp. 80-91
Author(s):  
Adi Widiatmoko Wastumirad ◽  
Moh Irzam Darmawan

Today, the internet has become the most used tool for delivering information. Through the internet, people can search for information by freely accessing a web page. This freedom of access often raises security issues in the website provider's internal network. These security issues can be in the form of misuse of information, threats, and other attacks on the provider's internal network. Based on these conditions, a technique is needed to protect important data on the website owner's server from various attacks. In this research, a Honeypot security system has been implemented using Dionaea and Kippo in the Demilitarized Zone to increase the security of a network. The methodology of this research is Waterfall Model for software engineering. The system that has been built is able to detect, take action, record attack logs and display them in the form of a website in real time.


Sign in / Sign up

Export Citation Format

Share Document