Search results for " Software"
showing 10 items of 1178 documents
A feasibility analysis on the use of ultrasonic multihop communications for E-health applications
2017
Rise in population aging as well as diffusion of chronic diseases and health consciousness require constant monitoring of health conditions but also lead to increasing costs for the governments. Body Area Networks represent the next frontier in health care and are envisaged as the natural choice to provide detailed and updated information on health status to prevent health risks and diseases. However if, on the one hand, a large research effort has been devoted so far to the investigation of BAN communications on and around the body, on the other hand intra-BAN communications are still a scarcely explored area because of the difficulties and risks in successfully propagating signals inside …
Blind Robust 3-D Mesh Watermarking Based on Mesh Saliency and QIM Quantization for Copyright Protection
2019
International audience; Due to the recent demand of 3-D models in several applications like medical imaging, video games, among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased considerably. The majority of robust 3-D watermark-ing techniques have essentially focused on the robustness against attacks while the imperceptibility of these techniques is still a real issue. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and Quantization Index Modulation (QIM) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex norms of the 3-D mesh using QIM scheme since it offe…
Tasks and Digital Tools
2016
International audience; This chapter considers scholastic tasks with digital tools. The first two sections consider tasks in ‘ordinary’ classrooms (tasks for learning) and issues relating to tasks using mathematical software. The first section presents examples of tasks with digital tools to highlight potential problems and opportunities for learning. The second section considers issues arising from the literature on tasks design with and without digital tools. The final section looks at task-tool issues in larger-than-the-individual classroom research and in assessment; it also comments of avenues for further development
Plenoptic image watermarking to preserve copyright
2017
Common camera loses a huge amount of information obtainable from scene as it does not record the value of individual rays passing a point and it merely keeps the summation of intensities of all the rays passing a point. Plenoptic images can be exploited to provide a 3D representation of the scene and watermarking such images can be helpful to protect the ownership of these images. In this paper we propose a method for watermarking the plenoptic images to achieve this aim. The performance of the proposed method is validated by experimental results and a compromise is held between imperceptibility and robustness.
An empirical study of performance using Clone & Own and Software Product Lines in an industrial context
2021
Abstract Context: Clone and Own (CaO) is a widespread approach to generate new software products from existing software products by adding small changes. The Software Product Line (SPL) approach addresses the development of families of products with similar features, moving away from the production of isolated products. Despite the popularity of both approaches, no experiment has yet compared them directly. Objective: The goal of this paper is to know the different performances of software engineers in the software products development process using two different approaches (SPL and CaO). Method: We conducted an experiment in the induction hobs software environment with software engineers. …
Cyber Security Strategy Implementation Architecture in a Value System
2018
In this chapter, we introduce an approach toward enhancing the quality of strategy implementation. As a framework, we use cybersecurity strategy implementation planning and execution. Justification for this work is the observed need to be able to perform strategy readjustment processes quickly and in an agile way, when needed. This requires processes and practices that are simple enough and executable with small resources in a relatively short timeframe. The problem statement can be formulated as follows: “We need to determine an utterly simplified, noncomplicated model to help us to tackle the complex problem of implementing a cybersecurity strategy of adequate efficiency in a changing ope…
Benefits of Software Renting in Cloud Business
2012
In the new era of computing, software can be sold and delivered as a cloud service, and software renting has become a strategic tool to compete in the market. In this multi-case study, software renting was found to help the case firms to (i) differentiate themselves from competitors; (ii) increase their competitive advantage by making the software available for a larger customer group, and (iii) decrease the price of software by using centralized software delivery and maintenance. peerReviewed
Progressive Web Apps for the Unified Development of Mobile Applications
2018
Progressive Web Apps (PWAs) allow for web applications to be developed in an offline-first approach. While Web apps traditionally did not properly function without an Internet connection, PWAs enable them to be downloaded, installed and used offline on various systems, including mobile devices and personal computers. We present an introduction to the state-of-art in research and practice. Based on this, we discuss various underlying concepts and technologies. Then, we scrutinize and compare PWAs against cross-platform app development approaches on both technical and overarching aspects. A list of suggestions for future research is also presented. We urge academia to keep up with the latest …
Una questione di software
2012
A gearbox model for processing large volumes of data by using pipeline systems encapsulated into virtual containers
2020
Software pipelines enable organizations to chain applications for adding value to contents (e.g., confidentially, reliability, and integrity) before either sharing them with partners or sending them to the cloud. However, the pipeline components add overhead when processing large volumes of data, which can become critical in real-world scenarios. This paper presents a gearbox model for processing large volumes of data by using pipeline systems encapsulated into virtual containers. In this model, the gears represent applications, whereas gearboxes represent software pipelines. This model was implemented as a collaborative system that automatically performs Gear up (by using parallel patterns…