Search results for " Soft"
showing 10 items of 1710 documents
BlockSee: Blockchain for IoT video surveillance in smart cities
2018
The growing demand for safety in urban environments is supported by monitoring using video surveillance. The need to analyze multiple video-flows from different cameras deployed around the city by heterogeneous owners introduces vulnerabilities and privacy issues. Video frames, timestamps, and camera settings can be digitally manipulated by malicious users; the positions of cameras, their orientation and their mechanical settings can be physically manipulated. Digital and physical manipulations may have several effects, including the change of the observed scene and the potential violation of neighbors' privacy. To face these risks, we introduce BlockSee, a blockchain-based video surveillan…
Integrazione di celle solari di terza generazione nel vetromattone per la realizzazione di pannelli traslucidi fotovoltaici. Analisi prestazione e st…
2013
L’articolo illustra i primi risultati ottenuti nell’ambito dell’analisi prestazionale del vetromattone fotovoltaico, un prodotto edilizio innovativo derivato dall’integrazione di celle fotovoltaiche di terza generazione (DSSC) nel vetromattone, ideato per la realizzazione di involucri traslucidi energeticamente effi cienti ed “attivi”, in grado di ridurre i consumi energetici degli edifi ci e di produrre, al contempo, energia verde. L’analisi è stata condotta su quattro differenti ipotesi di integrazione. Attraverso simulazioni numeriche si è effettuata una valutazione dell’energia assorbita dagli strati attivi oltre che delle prestazioni ottiche complessive del dispositivo. Lo studio anali…
Removing the barriers to adoption of social OER environments
2015
Despite the opportunities and benefits of OER, research and practice has shown how the OER repositories have a hard time in reaching an active user-base. The opportunities of experience exchange and simple feedback mechanisms of social software have been realized for improving the situation and many are basing or transforming their OER offerings towards socially powered environments. Research on social software has shown how knowledge-sharing barriers in online environments are highly culture and context-specific and require proper investigation. It is crucial to study what challenges might arise in such environments and how to overcome them, ensuring a successful uptake. A large-scale (N =…
Delay-dependent exponential stabilization of positive 2D switched state-delayed systems in the Roesser model
2014
This paper deals with the controller synthesis for a class of positive two-dimensional (2D) switched delay systems described by the Roesser model. This kind of systems has the property that the states take nonnegative values whenever the initial boundaries are nonnegative, some delay-dependent sufficient conditions for the exponential stability of positive 2D switched systems with state delays are given. Furthermore, the design of positive state feedback controller under which the resulting closed-loop system meets the requirements of positivity and exponential stability is presented in terms of linear matrix inequalities (LMIs). An example is included to illustrate the effectiveness of the…
Using organizational influence processes to overcome IS implementation barriers: lessons from a longitudinal case study of SPI implementation
2014
A fundamental tenet of the information systems (IS) discipline holds that: (a) a lack of formal power and influence over the organization targeted for change, (b) weak support from top management, and (c) organizational memories of prior failures are barriers to implementation success. Our research, informed by organization influence, compellingly illustrates that such conditions do not necessarily doom a project to failure. In this paper, we present an analysis of how an IS implementation team designed and enacted a coordinated strategy of organizational influence to achieve implementation success despite these barriers. Our empirical analysis also found that technology implementation and …
Enterprise content management: An integrated perspective on information management
2005
Konferansebidrag fra 38th Annual Hawaii International Conference on System Sciences, 2005. HICSS 2005 Enterprise Content Management (ECM) is an emerging concept involving numerous software vendors, consultants, and information management practitioners around increasing market potential. However, there exist yet few academic reports on ECM from the viewpoint of organizational system implementations. This article analyses 58, mainly practitioner-oriented, case narratives of ECM projects and implementations to identify a framework of major issues that require managerial attention in organizations. The main areas covered by the framework are: objectives/impacts sought with ECM, enterprise model…
Errors and Complications in SQL Query Formulation
2018
SQL is taught in almost all university level database courses, yet SQL has received relatively little attention in educational research. In this study, we present a database management system independent categorization of SQL query errors that students make in an introductory database course. We base the categorization on previous literature, present a class of logical errors that has not been studied in detail, and review and complement these findings by analyzing over 33,000 SQL queries submitted by students. Our analysis verifies error findings presented in previous literature and reveals new types of errors, namely logical errors recurring in similar manners among different students. We…
Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions
2016
In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices. This new paradigm commonly identified as electronic healthcare (e-health) allows provisioning of healthcare services at an affordable price to its consumers. However, there have been questions raised about the security of the sensitive information such as health records as well as the privacy of involving parties raising doubts on the minds of the general public. Thus, it is important to understand the potential security challenges in e-health systems and successfully resolve them by taking adequate measures to ensure fair utilization of suc…
Security and privacy in the Internet of Things: Current status and open issues
2014
The Internet of Things at large will foster billions of devices, people and services to interconnect and exchange information and useful data. As IoT systems will be ubiquitous and pervasive, a number of security and privacy issues will arise. Credible, economical, efficient and effective security and privacy for IoT are required to ensure exact and accurate confidentiality, integrity, authentication, and access control, among others. In this paper, the IoT vision, existing security threats, and open challenges in the domain of IoT are discussed. The current state of research on IoT security requirements is discussed and future research directions with respect to IoT security and privacy ar…
Information Security and Privacy in Medical Application Scenario
2010
This chapter discusses security and privacy aspects for medical application scenario. The chapter analyze what kind security and privacy enforcements would be needed and how it can be achieved by technological means. Authors reviewed cryptographic mechanisms and solutions that can be useful in this context.