Support of Research and Development Activities Via the Internet: NASA’s Access Mechanism

1993 ◽  
Vol 3 (3) ◽  
Author(s):  
Denise Duncan ◽  
Curtis Generous ◽  
Judy F. Hunter
Author(s):  
Oľga Holá

Abstract The lecture-experimental tours at secondary schools of Slovakia have been realized within the scope of the APVV (The Slovak Research and Development Agency) project solving: “Physics and Chemistry in our Life Today and Tomorrow”. These lectures consist of lectures supported by power-point presentations, illustrative demos of lectured problems, as well as simple experiments. In the lecture part various information and communication means are used - e.g. the Internet connection, various CDs, DVDs and our own video film library. In our paper we inform of these courses and of their objectives and responses.


Author(s):  
Ahmed Waleed Al-Khafaji

Physical security systems are applied to alert in advance a well-known vector of attacks. This paper presents an analysis of the research and assessment of physical security systems applying the PSMECA technique (analysis of modes, efforts, and criticality of physical security). The object of research and analysis is the physical security system of the Ministry of Education and Science of Iraq (as the infrastructure of the region's objects), as well as the area of the compact living of students and co-workers (campus). This paper discusses the organization of physical security systems, which are based on devices with low power consumption and function in the Internet of things environment. The main aim is to describe and develop a physical security system that functions in the Internet of things environment, as well as the development of a scheme for the research and development of models and methods for risk analysis, models of functions and components, models of failures and conducting research and analysis of occurrence failures of PSS. The generalized structural and hierarchical scheme of the physical security system of the infrastructure of the region is presented, as well as the applied application of the scheme is illustrated by the example of the physical security system of a student campus of one of the universities of Baghdad. The functional modeling scheme of the object is provided and is based on the use of the Raspberry Pi microcomputer and the Arduino microcontroller. The set-theoretical models of functions, components, and failures of the system under study, as well as the projection of a hierarchical failure structure in the table of the basic structural elements of the system, are presented. The IDEF0 diagram, showing a power outage scenario (accidental or intentional) in connection with lighting and video subsystems, is presented. The scheme of research and development of models and methods of analysis of risks of PSS is carried out in the paper. A PSMECA table for the CCTV system has been created, which allows you to more precisely determine the cause of the failure in the physical security system and the importance of failure criticality


2020 ◽  
Vol 49 ◽  
Author(s):  
Szymon Wróbel

Luciano Floridi and Nick Srnicek claims that with a decline in manufacturing profitability, capitalism has turned to data as one way to maintain economic growth in the face of a slow production sector. In the twenty-first century data have become central to firms and their relations with workers and customers (Floridi, 2013; Srnicek 2017). The platform has emerged as a new model, capable of extracting and controlling immense amounts of data, and with this shift we have seen the rise of monopolistic firms. We are told that today we are living in an age of massive transformation. Platforms, big data, additive manufacturing, advanced robotics, machine learning, and the internet of things – create our current living environment. In the presented text I am going to ask what is the place of the university in such a new digital constellation? What are universities for in the time of platform capitalism? My main line of reasoning follows to idea of “entrepreneurial state”. An innovative university is understood as an analogue of an “entrepreneurial state”. Mariana Mazzucato has convincingly demonstrated that developments like railways, the internet, computing, supersonic flight, space travel, satellites, pharmaceuticals, voice-recognition software, nanotechnology, touchscreensand clean energy have all been nurtured and guided by states, not corporations. During the golden postwar era of research and development, two-thirds of research and development was publicly funded. High-risk inventions and new technologies are too risky for private capitalists to invest in (Mazzucato, 2014; Srnicek, Williams, 2015). Socializing of the risk and privatization of profits – this is the main climate of “non-innovative capitalism”.


Author(s):  
Alex Ng ◽  
Paul Watters ◽  
Shiping Chen

The digital profile of a person has become one of the tradable digital commodities over the Internet. Identity management has gained increasing attention from both enterprises and government organisations, in terms of security, privacy, and trust. A considerable number of theories and techniques have been developed to deal with identity management issues using biometric multimodal approaches. In this chapter, the authors review, assess, and consolidate the research and development activities of contemporary biometric and non-biometric identity management in 21 privately and publicly funded organisations. Furthermore, they develop a taxonomy to characterise and classify these identity management frameworks into two categories: processes and technologies. The authors then study these frameworks by systematically reviewing the whole lifecycle of an identity management framework, including actors, roles, security, privacy, trust, interoperability, and federation. The goal is to provide readers with a comprehensive picture of the state of the art of the existing identity management frameworks that utilise biometric and non-biometric technologies with the aim to highlight the contemporary issues and progress in this area of identity management.


Author(s):  
Andrew Targowski

The purpose of this chapter is to show that the Cold War is behind the invention of the Internet. This is one of a very few positive results of this war, which had tremendous influence on the further development of civilization. The research on the universality of info-communication processes was conducted on both sides of the Iron Curtain, which indicates the similarities in engineering thinking, regardless of the geographic locations. The political meaning of the Internet does not only result from its history but also stands for the support of democratic development and the obstruction of dictatorships. The history of the Internet is also an example of the development of great engineering talents and research and development centers, which rise to the occasion on such ambitious projects. All of these aspects of the Internet will be investigated in this paper, as well as its impact upon the emergence of the Global Civilization.


The first chapter addresses the phenomenon and concept of a network organization. It is a form that is more and more present in today's digital world. It does not solely concern typical network, virtual organizations that are established and operate only on the internet. We ever more frequently see organizations that go beyond their own traditional organizational structures. They are often interdisciplinary and cover a wide range of seemingly different areas of life and economy. Network organizations are particularly common where knowledge and innovation are created; therefore, they are extremely popular when research and development (R&D) and scientific projects are implemented. How widespread network structures are in the life of today's organizations will be established by means of the survey results that will be described in this chapter and in the further part of this monograph.


Author(s):  
Alex Ng ◽  
Paul Watters ◽  
Shiping Chen

The digital profile of a person has become one of the tradable digital commodities over the Internet. Identity management has gained increasing attention from both enterprises and government organisations, in terms of security, privacy, and trust. A considerable number of theories and techniques have been developed to deal with identity management issues using biometric multimodal approaches. In this chapter, the authors review, assess, and consolidate the research and development activities of contemporary biometric and non-biometric identity management in 21 privately and publicly funded organisations. Furthermore, they develop a taxonomy to characterise and classify these identity management frameworks into two categories: processes and technologies. The authors then study these frameworks by systematically reviewing the whole lifecycle of an identity management framework, including actors, roles, security, privacy, trust, interoperability, and federation. The goal is to provide readers with a comprehensive picture of the state of the art of the existing identity management frameworks that utilise biometric and non-biometric technologies with the aim to highlight the contemporary issues and progress in this area of identity management.


Sign in / Sign up

Export Citation Format

Share Document