Search results for " Soft"

showing 10 items of 1710 documents

BlockSee: Blockchain for IoT video surveillance in smart cities

2018

The growing demand for safety in urban environments is supported by monitoring using video surveillance. The need to analyze multiple video-flows from different cameras deployed around the city by heterogeneous owners introduces vulnerabilities and privacy issues. Video frames, timestamps, and camera settings can be digitally manipulated by malicious users; the positions of cameras, their orientation and their mechanical settings can be physically manipulated. Digital and physical manipulations may have several effects, including the change of the observed scene and the potential violation of neighbors' privacy. To face these risks, we introduce BlockSee, a blockchain-based video surveillan…

Immutabilityblockchain video surveillance privacyBlockchainbusiness.industryPHYSICAL MANIPULATIONSComputer scienceOrientation (computer vision)Settore ING-INF/03 - TelecomunicazioniComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineeringMonitoring system02 engineering and technologyComputer securitycomputer.software_genreFace (geometry)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingTimestampInternet of Thingsbusinesscomputer
researchProduct

Integrazione di celle solari di terza generazione nel vetromattone per la realizzazione di pannelli traslucidi fotovoltaici. Analisi prestazione e st…

2013

L’articolo illustra i primi risultati ottenuti nell’ambito dell’analisi prestazionale del vetromattone fotovoltaico, un prodotto edilizio innovativo derivato dall’integrazione di celle fotovoltaiche di terza generazione (DSSC) nel vetromattone, ideato per la realizzazione di involucri traslucidi energeticamente effi cienti ed “attivi”, in grado di ridurre i consumi energetici degli edifi ci e di produrre, al contempo, energia verde. L’analisi è stata condotta su quattro differenti ipotesi di integrazione. Attraverso simulazioni numeriche si è effettuata una valutazione dell’energia assorbita dagli strati attivi oltre che delle prestazioni ottiche complessive del dispositivo. Lo studio anali…

In this article the fi rst results of the performance analysis of the photovoltaic glassblock are given. The photovoltaic glassblock is an innovative product which integrates third generation solar cells (DSSC) invented for the construction of translucent building envelopes energetically effi cient and “active” able to reduce the energy consumption in buildings and to produce at the same time green energy. The analysis was conducted on four different hypotheses of integration through numerical simulations in order to evaluate the energy absorption and the optical performance of the device. The software simulations represent a fi rst step for the understanding of the performance of the element and prelude to an experimental analysis session. The results of a research conducted about national and international patents publications on the DSSC technology and its applications will be illustrated too. The data collected during this research had been organized in a digital database.Settore ICAR/10 - Architettura Tecnica
researchProduct

Removing the barriers to adoption of social OER environments

2015

Despite the opportunities and benefits of OER, research and practice has shown how the OER repositories have a hard time in reaching an active user-base. The opportunities of experience exchange and simple feedback mechanisms of social software have been realized for improving the situation and many are basing or transforming their OER offerings towards socially powered environments. Research on social software has shown how knowledge-sharing barriers in online environments are highly culture and context-specific and require proper investigation. It is crucial to study what challenges might arise in such environments and how to overcome them, ensuring a successful uptake. A large-scale (N =…

InformatikKnowledge managementbusiness.industryComputer scienceCultural distanceSocial softwareContext (language use)businesscomputer.software_genrecomputerSimple (philosophy)Knowledge sharing
researchProduct

Delay-dependent exponential stabilization of positive 2D switched state-delayed systems in the Roesser model

2014

This paper deals with the controller synthesis for a class of positive two-dimensional (2D) switched delay systems described by the Roesser model. This kind of systems has the property that the states take nonnegative values whenever the initial boundaries are nonnegative, some delay-dependent sufficient conditions for the exponential stability of positive 2D switched systems with state delays are given. Furthermore, the design of positive state feedback controller under which the resulting closed-loop system meets the requirements of positivity and exponential stability is presented in terms of linear matrix inequalities (LMIs). An example is included to illustrate the effectiveness of the…

Information Systems and Management2D system; Exponential stability; Positive switched system; Stabilization; Time delay; Artificial Intelligence; Software; Control and Systems Engineering; Theoretical Computer Science; Computer Science Applications1707 Computer Vision and Pattern Recognition; Information Systems and ManagementComputer Science Applications1707 Computer Vision and Pattern RecognitionState (functional analysis)Linear matrixExponential stabilityStabilizationComputer Science ApplicationsTheoretical Computer Science2D systemDelay dependentExponential stabilizationPositive switched systemExponential stabilityArtificial IntelligenceControl and Systems EngineeringControl theoryFull state feedbackTime delaySoftwareMathematicsInformation Sciences
researchProduct

Using organizational influence processes to overcome IS implementation barriers: lessons from a longitudinal case study of SPI implementation

2014

A fundamental tenet of the information systems (IS) discipline holds that: (a) a lack of formal power and influence over the organization targeted for change, (b) weak support from top management, and (c) organizational memories of prior failures are barriers to implementation success. Our research, informed by organization influence, compellingly illustrates that such conditions do not necessarily doom a project to failure. In this paper, we present an analysis of how an IS implementation team designed and enacted a coordinated strategy of organizational influence to achieve implementation success despite these barriers. Our empirical analysis also found that technology implementation and …

Information managementKnowledge managementlongitudinal case studyComputer sciencebusiness.industrybarriersIS implementation; longitudinal case study; organizational influence processes; software process improvement; barriersInformation technologyLibrary and Information SciencesBusiness modelManagement information systemsIS implementationAccounting information systemInformation systemSoft systems methodologyStrategic information systemorganizational influence processessoftware process improvementbusinessInformation SystemsEuropean Journal of Information Systems
researchProduct

Enterprise content management: An integrated perspective on information management

2005

Konferansebidrag fra 38th Annual Hawaii International Conference on System Sciences, 2005. HICSS 2005 Enterprise Content Management (ECM) is an emerging concept involving numerous software vendors, consultants, and information management practitioners around increasing market potential. However, there exist yet few academic reports on ECM from the viewpoint of organizational system implementations. This article analyses 58, mainly practitioner-oriented, case narratives of ECM projects and implementations to identify a framework of major issues that require managerial attention in organizations. The main areas covered by the framework are: objectives/impacts sought with ECM, enterprise model…

Information managementMarketingSocieties and institutionsKnowledge managementEnterprise content managementbusiness.industryElectronic document exchangeComputingMilieux_LEGALASPECTSOFCOMPUTINGDocument management systemcomputer.software_genreEnterprise modellingTechnology managementInformation managementComputer softwarebusinessDigital firmcomputerEnterprise softwareContent management
researchProduct

Errors and Complications in SQL Query Formulation

2018

SQL is taught in almost all university level database courses, yet SQL has received relatively little attention in educational research. In this study, we present a database management system independent categorization of SQL query errors that students make in an introductory database course. We base the categorization on previous literature, present a class of logical errors that has not been studied in detail, and review and complement these findings by analyzing over 33,000 SQL queries submitted by students. Our analysis verifies error findings presented in previous literature and reveals new types of errors, namely logical errors recurring in similar manners among different students. We…

Information managementlanguagesSQLkieli ja kieletGeneral Computer ScienceComputer scienceexercise designListing (computer)02 engineering and technologytietotekniikkaQuery languageDatabase designkyselykieletEducation020204 information systemsstandardointi0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDEDUCATIONerrorstietojenkäsittelycomputer.programming_languageComplement (set theory)inhimilliset tekijätta113query languagesstandardizationClass (computer programming)SQLInformation retrievalInformationSystems_DATABASEMANAGEMENT020207 software engineeringCategorizationvirheetcomputerhuman factors
researchProduct

Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions

2016

In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices. This new paradigm commonly identified as electronic healthcare (e-health) allows provisioning of healthcare services at an affordable price to its consumers. However, there have been questions raised about the security of the sensitive information such as health records as well as the privacy of involving parties raising doubts on the minds of the general public. Thus, it is important to understand the potential security challenges in e-health systems and successfully resolve them by taking adequate measures to ensure fair utilization of suc…

Information privacy020205 medical informaticsPrivacy by DesignComputer Networks and Communicationsbusiness.industryPrivacy softwareComputer scienceInternet privacyAccess controlProvisioning02 engineering and technologyLibrary and Information SciencesComputer securitycomputer.software_genreInformation sensitivityInformation and Communications Technology0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputerPersonally identifiable informationInformation SystemsInternational Journal of Information Management
researchProduct

Security and privacy in the Internet of Things: Current status and open issues

2014

The Internet of Things at large will foster billions of devices, people and services to interconnect and exchange information and useful data. As IoT systems will be ubiquitous and pervasive, a number of security and privacy issues will arise. Credible, economical, efficient and effective security and privacy for IoT are required to ensure exact and accurate confidentiality, integrity, authentication, and access control, among others. In this paper, the IoT vision, existing security threats, and open challenges in the domain of IoT are discussed. The current state of research on IoT security requirements is discussed and future research directions with respect to IoT security and privacy ar…

Information privacyCloud computing securityPrivacy by DesignComputer sciencePrivacy softwarebusiness.industryInternet privacyData securityAccess controlComputer securitycomputer.software_genreInternet securitybusinessPersonally identifiable informationcomputer2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

Information Security and Privacy in Medical Application Scenario

2010

This chapter discusses security and privacy aspects for medical application scenario. The chapter analyze what kind security and privacy enforcements would be needed and how it can be achieved by technological means. Authors reviewed cryptographic mechanisms and solutions that can be useful in this context.

Information privacyCloud computing securityPrivacy by Designbusiness.industryPrivacy softwareInternet privacyComputer securitycomputer.software_genreSecurity information and event managementInformation sensitivityInformation security managementbusinessPersonally identifiable informationcomputer
researchProduct