Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
  • Copenhagen, Hovedstaden, Denmark
Edge Intelligence has become increasingly popular and has already made its place to increase the overall system performance by reducing the burden of the cloud and the network. In edge intelligent frameworks, a massive amount of data... more
Edge Intelligence has become increasingly popular and has already made its place to increase the overall system performance by reducing the burden of the cloud and the network. In edge intelligent frameworks, a massive amount of data generated are not provided to the central cloud, and data analysis is carried out at the edge. Edge intelligence IoT environments comprise heterogeneous devices that communicate over the network, making it essential to protect the data and users’ information. Through these edge frameworks, numerous users and devices take part in communication where the exchange of sensitive data occurs. Therefore, security in such frameworks is crucial and a key challenge for reliable communication. This paper performs an analysis of popular AI/ML applications toward edge intelligence focusing on highlighting the critical security and privacy concerns desired in such systems. After a thorough investigation, we show that although several promising edge intelligent frameworks have been developed to address energy and performance issues, they do not consider the security and privacy of the data as the researchers are more focused on the performance predicaments.
In this paper, different aspects of scaling interconnect systems beyond 400 Gbit/s towards 1 Tbit/s capacity are examined and discussed. Role playing devil’s advocate for different approaches, ultimately we concede on three points: we... more
In this paper, different aspects of scaling interconnect systems beyond 400 Gbit/s towards 1 Tbit/s capacity are examined and discussed. Role playing devil’s advocate for different approaches, ultimately we concede on three points: we will need to provide more capacity soon, any roadmap in terms of modulation format is blurry right now, and optics is plateauing in terms of performance while electronics keep going.
The remote monitoring of patients using the internet of things (IoT) is essential for ensuring continuous observation, improving healthcare, and decreasing the associated costs (i.e., reducing hospital admissions and emergency visits).... more
The remote monitoring of patients using the internet of things (IoT) is essential for ensuring continuous observation, improving healthcare, and decreasing the associated costs (i.e., reducing hospital admissions and emergency visits). There has been much emphasis on developing methods and approaches for remote patient monitoring using IoT. Most existing frameworks cover parts or sub-parts of the overall system but fail to provide a detailed and well-integrated model that covers different layers. The leverage of remote monitoring tools and their coupling with health services requires an architecture that handles data flow and enables significant interventions. This paper proposes a cloud-based patient monitoring model that enables IoT-generated data collection, storage, processing, and visualization. The system has three main parts: sensing (IoT-enabled data collection), network (processing functions and storage), and application (interface for health workers and caretakers). In ord...
Cybercrime has become the most widespread kind of economic fraud and is a serious challenge for businesses around the world. The topic of this paper is how SMEs in the Nordic Baltic Region should face this challenge. Possible technical... more
Cybercrime has become the most widespread kind of economic fraud and is a serious challenge for businesses around the world. The topic of this paper is how SMEs in the Nordic Baltic Region should face this challenge. Possible technical and organisational tasks to be performed by SMEs in order to ensure cybersecurity of their business are analysed. The paper looks at the different types of hackers and their motives. On this background, current cyberthreats and corresponding security measures are presented. It is concluded that awareness, training, and financial incentives are all important elements in defining a cybersecurity strategy for SMEs. The paper is based on research made in the DINNOCAP project funded by EU regional funds.
Beside its cost-efficient benefits, e-government plays an important role in reducing corruption. As most developing countries, especially in Africa are fighting corruption, e-government is seen as a new way of addressing it. E-government... more
Beside its cost-efficient benefits, e-government plays an important role in reducing corruption. As most developing countries, especially in Africa are fighting corruption, e-government is seen as a new way of addressing it. E-government is thought to reduce corruption through increased transparency, better accountability and, the disappearance of the “middle-man” in the acquisition of public services by the citizenry. This paper tries to find out how e-government can decrease corruption by analyzing the implementation of e-government service of the Driver and Vehicle Licensing Authority (DVLA) of Ghana using the “stages of growth” mode from socio-technical perspective. The outcome of the analysis suggests that the e-government service implementation by DVLA is still at its basic and rudimentary stage (Catalogue stage) and continuous presence of the “middle-man,” high level of corruption, lack of transparency, accountability and trust in the acquisition of services provided by the A...
Research Interests:
Research Interests:
Research Interests:
Reports an investigation into the information needs and information‐seeking behaviour of Members of Parliament in Ghana’s legislature. It concludes that a better understanding of this question is fundamental to the achievements of their... more
Reports an investigation into the information needs and information‐seeking behaviour of Members of Parliament in Ghana’s legislature. It concludes that a better understanding of this question is fundamental to the achievements of their job objectives. Includes the questionnaire used in the survey.
Research Interests:
The 5G suite of technologies currently rolled out globally represent the potential to establish internet access and connect rural communities to the already connected modern, global community, i.e. closing the digital divide. Further 5G... more
The 5G suite of technologies currently rolled out globally represent the potential to establish internet access and connect rural communities to the already connected modern, global community, i.e. closing the digital divide. Further 5G can provide substantial support to UNs 17 Social Development Goals (SDGs). There is also no doubt that there is a substantial risk that the promising potentials are not realized, mainly due to the lack of viable business models leading to that the private sector will not provide all the investments necessary to establish 5G technology in developing countries. This uncertainty makes it relevant – even necessary – to consider the alternative solutions to rural internet access.
© The Author(s) 2010. This article is published with open access at Springerlink.com Abstract This paper briefly presents some conclusions of a brainstorming session on the way technology is evolving in ICT. Technology advances have... more
© The Author(s) 2010. This article is published with open access at Springerlink.com Abstract This paper briefly presents some conclusions of a brainstorming session on the way technology is evolving in ICT. Technology advances have overcome society ability to answer, both in economic and in human aspects. The current design paradigms, of agnostic technology development, need to be reconsidered, and the user needs to be repositioned at the center of future developments.
All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.
Research Interests:
Research Interests:
Research Interests:

And 123 more