scispace - formally typeset
Search or ask a question
Author

Izabella Lokshina

Bio: Izabella Lokshina is an academic researcher from State University of New York at Oneonta. The author has contributed to research in topics: Buffer overflow & Markov chain. The author has an hindex of 9, co-authored 54 publications receiving 301 citations. Previous affiliations of Izabella Lokshina include State University of New York System.


Papers
More filters
Journal ArticleDOI
TL;DR: A system design that employs the blockchain technology as a measure to secure and control the framework that involves integrated IoT and BIM technologies is proposed.

71 citations

Proceedings ArticleDOI
03 Jan 2018
TL;DR: The authors confirm that IoT-driven eHealth can happen and will happen; however, much more needs to be addressed to bring it back in sync with medical and general technological developments in an industrial state-of-the-art perspective and to recognize and get timely the benefits.
Abstract: eHealth has a major potential, and its adoption may be considered necessary to achieve increased ambulant and remote medical care, increased quality, reduced personnel needs, and reduced costs potential in healthcare. In this chapter, the authors try to give a reasonable, qualitative evaluation of IoT-driven eHealth from theoretical and practical viewpoints. They look at associated knowledge management issues and contributions of IoT to eHealth, along with requirements, benefits, limitations and entry barriers. Important attention is given to security and privacy issues. Finally, the conditions for business plans and accompanying value chains are realistically analyzed. The resulting implementation issues and required commitments are also discussed. The authors confirm that IoT-driven eHealth can happen and will happen; however, much more needs to be addressed to bring it back in sync with medical and general technological developments in an industrial state-of-the-art perspective and to recognize and get timely the benefits.

19 citations

Journal ArticleDOI
TL;DR: A first, knowledge-based management practices, business models, strategic implications and business opportunities for third-party data analysis services are considered for the Internet of Things.
Abstract: This article describes ubiquitous sensing devices, enabled by wireless sensor network (WSN) technologies, now cut across every area of modern day living, affecting individuals and businesses and offering the ability to obtain and measure environmental indicators. Proliferation of these devices in a communicating-actuating network creates an Internet of Things (IoT). The IoT provides the tools to establish a major, global data-driven ecosystem that also enables Big Data techniques to be used. New business models may focus on the provision of services, i.e., the Internet of Services (IoS). These models assume the presence and development of the necessary IoT measurement and control instruments, communications infrastructure, and easy access to the data collected and information generated. Different business models may support opportunities to create revenue and value for various types of customers. This article contributes to the literature by considering, a first, knowledge-based management practices, business models, strategic implications and business opportunities for third-party data analysis services.

19 citations

Journal ArticleDOI
TL;DR: Business models and opportunities for third-party data analysis services are considered and access to information generated by third parties in relation to Big Data techniques and potential business opportunities are discussed.
Abstract: The Internet of Things IoT provides the tools for the development of a major, global data-driven ecosystem. When accessible to people and businesses, this information can make every area of life, including business, more data-driven. In this ecosystem, with its emphasis on Big Data, there has been a focus on building business models for the provision of services, the so-called Internet of Services IoS. These models assume the existence and development of the necessary IoT measurement and control instruments, communications infrastructure, and easy access to the data collected and information generated by any party. Different business models may support opportunities that generate revenue and value for various types of customers. This paper contributes to the literature by considering business models and opportunities for third-party data analysis services and discusses access to information generated by third parties in relation to Big Data techniques and potential business opportunities.

17 citations

Journal ArticleDOI
TL;DR: The points of weakness and ethical concerns created by current business practices are identified and potential solutions are proposed in order to build and maintain business practices respecting ethical standards as a prerequisite for a sustainable Big Data industry.
Abstract: Big Data combines information from diverse sources to create knowledge, make better predictions and tailor services. This article analyzes Big Data both as a technology and an industrial activity, ...

15 citations


Cited by
More filters
Journal ArticleDOI
01 May 1975
TL;DR: The Fundamentals of Queueing Theory, Fourth Edition as discussed by the authors provides a comprehensive overview of simple and more advanced queuing models, with a self-contained presentation of key concepts and formulae.
Abstract: Praise for the Third Edition: "This is one of the best books available. Its excellent organizational structure allows quick reference to specific models and its clear presentation . . . solidifies the understanding of the concepts being presented."IIE Transactions on Operations EngineeringThoroughly revised and expanded to reflect the latest developments in the field, Fundamentals of Queueing Theory, Fourth Edition continues to present the basic statistical principles that are necessary to analyze the probabilistic nature of queues. Rather than presenting a narrow focus on the subject, this update illustrates the wide-reaching, fundamental concepts in queueing theory and its applications to diverse areas such as computer science, engineering, business, and operations research.This update takes a numerical approach to understanding and making probable estimations relating to queues, with a comprehensive outline of simple and more advanced queueing models. Newly featured topics of the Fourth Edition include:Retrial queuesApproximations for queueing networksNumerical inversion of transformsDetermining the appropriate number of servers to balance quality and cost of serviceEach chapter provides a self-contained presentation of key concepts and formulae, allowing readers to work with each section independently, while a summary table at the end of the book outlines the types of queues that have been discussed and their results. In addition, two new appendices have been added, discussing transforms and generating functions as well as the fundamentals of differential and difference equations. New examples are now included along with problems that incorporate QtsPlus software, which is freely available via the book's related Web site.With its accessible style and wealth of real-world examples, Fundamentals of Queueing Theory, Fourth Edition is an ideal book for courses on queueing theory at the upper-undergraduate and graduate levels. It is also a valuable resource for researchers and practitioners who analyze congestion in the fields of telecommunications, transportation, aviation, and management science.

2,562 citations

Book
26 Oct 2010
TL;DR: This issue contains three research papers and a comprehensive survey article on mobile ad hoc networks, describing the main characteristics of those networks and how they are being used, and discussing the most pressing issues and challenges associated with these temporary wireless networks.
Abstract: Welcome to the second installment of IJBDCN. This issue contains three research papers and a comprehensive survey article on mobile ad hoc networks. We would like to publish a couple of survey or tutorial articles per year as we believe this to be of value to our readers. Many research papers are necessarily focused and do not allow for a " panoramic " view of a particular subject. This is the gap that well-written survey or tutorial papers can fill. We are also planning a guest-edited special issue for the last quarter of this year and welcome your suggestions for future special issues of the journal. This second issue starts with a paper entitled " An Approach to Solving the Surviv-able Capacitated Network Design Problem " where Sridhar and Park studied the problem of selecting links of a network to construct primary and secondary routes for transfer of commodity traffic between nodes of the network. Their technique allows the design of survivable and cost-effective networks. In the second paper, " Query Processing Strategies for Location-Dependent Information Services " , Jayaputera and Taniar propose a new approach to generate a query result for location-dependent information services (LDIS). They argue that choosing a square as the scope of a query and dividing it into four equal regions, where a user is a center point of the scope, results in a faster searching time to find targets queried and brings a bigger chance to get rare targets. In addition, by avoiding resubmitting the same queries when the query results missed, the approach reduced bandwidth use at both the server and client sides. The third paper, " Addressing SPAM E-Mail Using Hashcash " by Curran and Honan tackles a problem experienced by most of us. The authors present the Hashcash proof-of-work approach and investigate the feasibility of implementing a solution based on that mechanism along with what they called a " cocktail " of antispam measures designed to keep junk mail under control. Finally , in the last paper, entitled " MANET: Applications, Issues, and Challenges for the Future " , Dhar presents an informative survey of mobile ad hoc networks, describing the main characteristics of those networks and how they are being used, and discussing the most pressing issues and challenges associated with these temporary wireless networks. We hope that you enjoy this and the upcoming issues of IJBDCN. Our goal is to …

262 citations

Journal ArticleDOI
TL;DR: A deep neural network (DNN) is used to develop effective and efficient IDS in the IoMT environment to classify and predict unforeseen cyberattacks and performs better than the existing machine learning approaches with an increase in accuracy and decreases in time complexity.

243 citations

Journal Article
TL;DR: Because interventions using goal setting appear to promote dietary change, dietitians should consider incorporating the goal-setting strategies to enhance the behavior change process in nutrition education programs.
Abstract: Recent reviews have noted that behavioral theory-based nutrition education programs are more successful at achieving food behavior change than knowledge-based programs and that a clear understanding of the mechanisms of behavior change procedures enable dietetics professionals to more effectively promote change. Successful dietary behavior change programs target 1 or more of the personal, behavioral, or environmental factors that influence the behavior of interest and apply theory-based strategies to influence or change those factors. Goal setting is a strategy that is frequently used to help people change. A 4-step goal-setting process has been identified: recognizing a need for change; establishing a goal; adopting a goal-directed activity and self-monitoring it; and self-rewarding goal attainment. The applications of goal setting in dietary interventions for adults and children are reviewed here. Because interventions using goal setting appear to promote dietary change, dietitians should consider incorporating the goal-setting strategies to enhance the behavior change process in nutrition education programs.

210 citations