home computing
Recently Published Documents


TOTAL DOCUMENTS

42
(FIVE YEARS 4)

H-INDEX

11
(FIVE YEARS 1)

Author(s):  
Ayman Dawood Salman ◽  
Osamah Ibrahim Khalaf ◽  
Ghaida Muttasher Abdulsaheb

Security is one of the imperative issues in an advanced local condition. The current center around formative and research issues of Wireless Sensor Network(WSN) based Smart Home.  WSN based shrewd home detection system gives a safe and safe living condition. A Wireless Sensor System (WSN) is a system which is building by utilizing little independent hubs (sensors). Its motivation is to screen certain ecological parameters, for example, temperature, dampness, brilliance, weight, sound, movement, and so forth. This paper depicts the improvement of a smart home condition dependent on exact Wireless Sensor Network and furthermore depicts private vitality observing and controlling procedures for keen home systems administration framework. This paper proposes a basic and adaptable remote arrange for domestics computerization of temperature, moistness, gas, movement and light by executing dependable sensor hubs which can be controlled too observed. This innovation offers energizing and new chance to build the availability of devices inside the home for the home computing.


2019 ◽  
Author(s):  
Justin Fanelli ◽  
John Waxler

Hundreds of thousands of home users are victimized by cyber-attacks every year. Most experts agree that average home users are not doing enough to protect their computers and their information from cyber-attacks. Improperly managed home computers can lead to individuals losing data, systems performing slowly, loss of identity, and ransom payments; en masse attacks can act in concert to infect personal computers in business and government. Currently, home users receive conflicting guidance for a complicated terrain, often in the form of anecdotal 'Top 10' lists, that is not appropriate for their specific needs, and in many instances, users ignore all guidance. Often, these popular ‘Top 10’ lists appear to be based solely on opinion. Ultimately, we asked ourselves the following: how can we provide home users with better guidance for determining and applying appropriate security controls that meet their needs and can be verified by the cyber security community? In this paper, we propose a methodology for determining and prioritizing the most appropriate security controls for home computing. Using Multi Criteria Decision Making (MCDM) and subject matter expertise, we identify, analyze and prioritize security controls used by government and industry to determine which controls can substantively improve home computing security. We apply our methodology using examples to demonstrate its benefits.


2019 ◽  
Author(s):  
Justin Fanelli ◽  
John Waxler

Hundreds of thousands of home users are victimized by cyber-attacks every year. Most experts agree that average home users are not doing enough to protect their computers and their information from cyber-attacks. Improperly managed home computers can lead to individuals losing data, systems performing slowly, loss of identity, and ransom payments; en masse attacks can act in concert to infect personal computers in business and government. Currently, home users receive conflicting guidance for a complicated terrain, often in the form of anecdotal 'Top 10' lists, that is not appropriate for their specific needs, and in many instances, users ignore all guidance. Often, these popular ‘Top 10’ lists appear to be based solely on opinion. Ultimately, we asked ourselves the following: how can we provide home users with better guidance for determining and applying appropriate security controls that meet their needs and can be verified by the cyber security community? In this paper, we propose a methodology for determining and prioritizing the most appropriate security controls for home computing. Using Multi Criteria Decision Making (MCDM) and subject matter expertise, we identify, analyze and prioritize security controls used by government and industry to determine which controls can substantively improve home computing security. We apply our methodology using examples to demonstrate its benefits.


Author(s):  
Kenneth B. McAlpine

In the early days of home computing, writing music was as much a technical as a creative process. This chapter explores how the launch of a software music package, Ultimate Soundtracker, for Commodore’s Amiga created a new, symbolic way to compose and edit music. It was sample-based and structured music using a grid-style interface that could be navigated using the computer keyboard, and its music files distributed both, making it easy to share—and copy—others’ musical ideas. This ‘open-source’ approach allowed nonprogrammers and nonmusicians to experiment with music making and for the sound to promulgate. This was also the period from which the term ‘chiptune’ emerged; the Amiga’s sample-based chipset allowed it to create other sounds beside raw electronic waveforms, and chiptune was used to highlight tracks written in the 8-bit sound chip style.


2016 ◽  
Vol 25 (4) ◽  
pp. 509-518 ◽  
Author(s):  
Allan H. K. Yuen ◽  
Wilfred W. F. Lau ◽  
Jae Hyung Park ◽  
Gervas K. K. Lau ◽  
Albert K. M. Chan

2015 ◽  
Vol 44 (2) ◽  
pp. 175-187 ◽  
Author(s):  
Nicola Terry ◽  
Jason Palmer
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document