Search results for " programmi"
showing 10 items of 1629 documents
Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi–Agent Systems
2007
This paper focuses on the detection of misbehav- ing agents within a group of mobile robots. A novel approach to automatically synthesize a decentralized Intrusion Detection System (IDS) as well as an efficient implementation of local monitors are presented. In our scenario, agents perform possi- bly different independent tasks, but cooperate to guarantee the entire system’s safety. Indeed, agents plan their next actions by following a set of logic rules which is shared among them. Such rules are decentralized, i.e. they depend only on configurations of neighboring agents. However, some agents may not be acting according to this cooperation protocol, due to spontaneous failure or tampering.…
TRACE and RELAP5 Codes for Beyond Design Accident Condition Simulation in the SPES3 Facility
2012
Code validation on qualified experimental data is a fundamental issue in the design and safety analyses of nuclear power plants. The SPES3 facility is being built at the SIET laboratories for an integral type SMR simulation, in the frame of an R&D program on nuclear fission, funded by the Italian Ministry of Economic Development and led by ENEA. The facility, based on the IRIS reactor design, reproduces the primary, secondary and containment systems with 1:100 volume scale, full elevation and prototypical fluid and thermal-hydraulic conditions. It is suitable to test the plant response to design and beyond design accidents in order to verify the effectiveness of the primary and containm…
Cyber Security for Wireless Semantic (SCADA/DCS) Systems
2016
International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …
In Search of Evidence for Model-Driven Development Claims: An Experiment on Quality, Effort, Productivity and Satisfaction
2015
Context: Model-Driven Development (MDD) is a paradigm that prescribes building conceptual models that abstractly represent the system and generating code from these models through transformation rules. The literature is rife with claims about the benefits of MDD, but they are hardly supported by evidences. Objective: This experimental investigation aims to verify some of the most cited benefits of MDD. Method: We run an experiment on a small set of classes using student subjects to compare the quality, effort, productivity and satisfaction of traditional development and MDD. The experiment participants built two web applications from scratch, one where the developers implement the code by h…
An Approach to Rank Noise Pollution in Workplaces
2013
In this paper, we describe a method for classifying the workplaces as regards the noise risk. This method provides an univocal classification of work area and allows to correctly implement the control measures in accordance with a suitable priority scale. Finally, this method can be easily adjusted to respect various national standards.
Ambizioni e insuccessi di alcune politiche di sviluppo locale per il Mezzogiorno. Patti territoriali e Programmi integrati territoriali (Pit)
2008
In 1997 a “new programming” was launched in Italy by the Department of development and cohesion policies in Rome. One of the key features of this new phase was the emphasis on “endogenous” local development, i.e. a development which is mainly based on local actors and productive specializations. The new programming strikingly failed to deliver its expected results. Some wrong expectations were fostered with regard to local political elites (§§ 1). A certain concept of local development is inherently flawed (§§ 2). The first failure was that of “territorial agreements” (patti territoriali), but there is a remarkable reluctancy to admit it (§§ 3). Another experience of “local” development who…
Fifth Generation Networking Principles for a Service Driven Future Internet Architecture
2010
Published version of an article published in Wireless Personal Communications, vol. 57:393-411. Also available from the publisher at: http://dx.doi.org/10.1007/s11277-010-0076-7 The vision of all-IP networks where IP forms the simple common layer understandable across the whole network has undeniable advantages. However, such simplicity comes as a major hurdle to flexibility and functionality to the architecture. This is evident from the increasingly numerous and complex engineering solutions and optimizations required to accommodate essential qualities like mobility, security, realtime communication support etc or to mitigate the shortcomings inherent in the 'traditional Internet' architec…
Facilitating Elements for the Transmission of the Entrepreneurial Spirit in the Classroom
2014
There have been countless tests made to confirm that creativity is a critical skill for entrepreneurs and their entrepreneurial training (Schmidt, J. et al. 2012), even more, practices on divergent thinking increases the entrepreneurial skills of students to generate a greater number and range of ideas, but not, their approaches to solve problems in a creative way. This situation raises a number of questions that should be analyzed before adding creativity and techniques to improve the training of creative thinking to studies (classes), about and in entrepreneurship, as a training channel, improvement or even to the generation of entrepreneurs. Our goal is to show that entrepreneurship is a…
Family and non-family businesses in iran:Coupling among innovation, internationalization and growth-expectation
2021
Gallo and Sveen, in 1991, specified problems of whether family businesses can take advantage of factors facilitating internationalization. We compare family and non-family businesses in innovation, export, and growth-expectation, and consider how outcomes are aligned, with a coupling that may be loose, with a synergy that benefits the business. This raises a further issue, is governance of a business affecting not only each of the outcomes but also their coupling. A representative sample of 530 Iranian businesses was surveyed in 2018 for Global Entrepreneurship Monitor. Innovation, export, and growth-expectation are found to be lower in family businesses. Coupling between innovation and exp…
Are Problems with Violence and the Lack of Public Safety a Barrier to Entrepreneurship?
2015
Scholars cite violence as a potential barrier to entrepreneurial activity in El Salvador. Using AHP, this research aims to rank the socioeconomic and political barriers to entrepreneurship in El Salvador. The analysis stresses the importance of citizen security as a barrier to entrepreneurial activity.