Search results for "550"
showing 10 items of 1192 documents
Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study
2022
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solutio…
Design and Fabrication of Liquid Pressure Sensor Using FBG Sensor Through Seesaw Hinge Mechanism
2022
Pressure sensors are used in various industrial applications assisting in preventing unintended disasters. This paper presents the design and fabrication of a novel Seesaw device incorporating a diaphragm and Fiber Bragg Grating (FBG) sensor to measure the pressure of liquids. The designed sensor has been tested in a static water column. The proposed design enables the user to easily make and modify the diaphragm based on the required pressure range without interfering with the FBG sensor. The developed pressure sensor produces improved accuracy and sensitivity to applied liquid pressure in both low and high-pressure ranges without requiring sophisticated sensor construction. A finite eleme…
Elektronisk meldingsutveksling- et bidrag til å oppfylle Samhandlingsreformens intensjoner om helhetlige, sømløse, koordinerte og trygge tjenester? :…
2014
Masteroppgave i helse- og sosialinformatikk HSI 500 Universitetet i Agder 2014 Project background: Patient information is exchanged between different governmental levels of health care to provide new health level with correct/adequate information. The information exchanged is important in securing a seamless and continuous care. Purpose/problem: This projects objective is to assess the information quality of electronic messages, in particular if the content received meets the recipient’s need of information to customize patient treatment/care. Selection/method: The project made requests to a coordination manager and interaction coordinators in a region, who communicated the projects request…
Declaracion magistral sobre las [sic] Emblemas de Andres Alciato : con todas las historias, antiguedades, moralidad, y doctrina tocante a las buenas …
1615
Escut calc. de D. Diego Hurtado de Mendoza, a qui es dedica l'obra, a la port. Grav. calc. Sign.: œ8, A-Nnn8, Ooo4 Errates de fol.: repeteix 182, 183, 381, 454, de 438 passa a 446
Ant colony optimisation for planning safe escape routes
2013
Published version of a chapter from the volume: Recent Trends in Applied Artificial Intelligence. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-38577-3_6 An emergency requiring evacuation is a chaotic event filled with uncertainties both for the people affected and rescuers. The evacuees are often left to themselves for navigation to the escape area. The chaotic situation increases when a predefined escape route is blocked by a hazard, and there is a need to re-think which escape route is safest. This paper addresses automatically finding the safest escape route in emergency situations in large buildings or ships with imperfect knowledge of the hazards. The proposed so…
Antecedents and consequences of problematic smartphone use: A systematic literature review of an emerging research area
2021
Abstract This article provides a systematic review of existing research on problematic smartphone use (PSU) to guide other researchers in search of relevant studies, and to propose areas for future research. In total, 293 studies were analyzed leading to the development of an overview model in the field of PSU, presenting findings on demographic factors, explanations for smartphone use and why this use becomes problematic, consequences of PSU, and how such use can be corrected. In addition, we considered in which contexts, with which methods, and with which theoretical lenses this stream of research has been studied to date. Smartphone use is most often explained by the smartphone design, a…
Exploring the role of the sharing economy in disasters management
2020
Abstract Improvements in information and communications technologies (ICTs) have facilitated the inclusion of the sharing economy (SE) in societies more than ever. In the aftermath of recent disasters, the SE played significant roles to help the affected people and support official responders. However, the literature has not effectively explored these roles, and thus, no framework can support the systematic inclusion of the SE in disasters management. This paper aims to address the gap through a two-stage exploratory research approach. First, we conduct a systematic literature review to identify the extent to which the SE is taken into consideration in disasters. After that, we investigate …
Comparison Between Fractional Vegetation Cover Retrievals from Vegetation Indices and Spectral Mixture Analysis: Case Study of PROBA/CHRIS Data Over …
2009
Abstract: In this paper we compare two different methodologies for Fractional Vegetation Cover (FVC) retrieval from Compact High Resolution Imaging Spectrometer (CHRIS) data onboard the European Space Agency (ESA) Project for On-Board Autonomy (PROBA) platform. The first methodology is based on empirical approaches using Vegetation Indices (VIs), in particular the Normalized Difference Vegetation Index (NDVI) and the Variable Atmospherically Resistant Index (VARI). The second methodology is based on the Spectral Mixture Analysis (SMA) technique, in which a Linear Spectral Unmixing model has been considered in order to retrieve the abundance of the different constituent materials within pixe…
Packet Aggregation in TelosB WSNs: Design, Implementation and Experiments
2016
Master's thesis in Information- and communication technology IKT590 - University of Agder 2016 WSN is an extensive field of research and a core technology which is adopted for monitoring and data assembling, used in various applications. Traditionally in a WSN, communication is performed in the fashion of single packet per transmission which produces high energy consumption and longer delay. Therefore, we introduce a novel approach by designing a system which applies packet aggregation in TelosB sensor motes using Contiki platform. In this approach, we assemble multiple packets together and send them in an aggregated frame towards the sink which can reduce the number of transmissions, energ…
ERCP : Energy-Efficient and Reliable-Aware Clustering Protocol for Wireless Sensor Networks
2022
Wireless Sensor Networks (WSNs) have been around for over a decade and have been used in many important applications. Energy and reliability are two of the major problems with these kinds of applications. Reliable data delivery is an important issue in WSNs because it is a key part of how well data are sent. At the same time, energy consumption in battery-based sensors is another challenge. Therefore, efficient clustering and routing are techniques that can be used to save sensors energy and guarantee reliable message delivery. With this in mind, this paper develops an energy-efficient and reliable clustering protocol (ERCP) for WSNs. First, an efficient clustering technique is proposed for…