Search results for "ATTAC"

showing 10 items of 610 documents

How do early family systems predict emotion recognition in middle childhood?

2021

Facial emotion recognition (FER) is a fundamental element in human interaction. It begins to develop soon after birth and is important in achieving developmental tasks of middle childhood, such as developing mutual friendships and acquiring social rules of peer groups. Despite its importance, FER research during middle childhood continues to be rather limited. Moreover, research is ambiguous on how the quality of one's early social-emotional environment shapes FER development, and longitudinal studies spanning from infancy to later development are scarce. In this study, we examine how the cohesive, authoritarian, disengaged and enmeshed family system types, assessed during pregnancy and inf…

EXPRESSIONSociology and Political Science515 Psychologylapset (ikäryhmät)sosiaalinen vuorovaikutusMiddle childhoodkehityspsykologia050105 experimental psychologymiddle childhoodDevelopmental psychologyCompetence (law)Person orientedkouluikäisettunteet3123 Gynaecology and paediatricsemotion recognitionDevelopmental and Educational Psychologyearly social-emotional environment0501 psychology and cognitive sciencesFamily systemsKNOWLEDGEEmotion recognitionsosiaalinen kehitysSocial informationlapsen kehitysperson-orientedCONFLICT05 social sciencesSOCIAL INFORMATIONCHILDRENS RECOGNITIONCOMPETENCEperhetaustaATTACHMENTMODELfamily systemExpression (architecture)perhesuhteetADOLESCENCEPsychologySocial Sciences (miscellaneous)BEHAVIOR050104 developmental & child psychologykasvontunnistus (kognitio)
researchProduct

Place Attachment and Its Consequence for Landscape-Scale Management and Readiness to Participate: Social Network Complexity in the Post-Soviet Rural …

2019

This paper uses the tripartite place attachment framework to examine six rural parishes across Estonia and Latvia. Existing analyses/frameworks on participatory processes often neglect the complexity of relationships that rural residents have to their local environments. From a qualitative analysis of face-to-face, semi-structured interviews with case study area inhabitants (23 interviews in Estonia and 27 in Latvia), we depict varying degrees of attachment of individuals to each other and to the place in which they live and their readiness to participate in terms of willingness and ability to participate in a landscape-scale management process. Attachment to the local area was strongest wh…

Economic growthmedia_common.quotation_subjecttripartite frameworkContext (language use)Place attachmentNeglectlcsh:Agriculturesocial tiesSociologyqualitative social network analysisManagement processNature and Landscape Conservationmedia_commonparticipatory landscape processesGlobal and Planetary ChangeEcologySocial networkbusiness.industrylcsh:SCitizen journalismInterpersonal tiesScale (social sciences)barriers to engagementqualitative social network analysis;businessparticipatory landscape processes;Land
researchProduct

Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study

2022

In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solutio…

Electrical and Electronic EngineeringAPI; REST; spring-boot; Keycloak; authentication; authorization; encryption; external attacksVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550BiochemistryInstrumentationComputer SecuritySoftwareAtomic and Molecular Physics and OpticsAnalytical ChemistrySensors
researchProduct

Detection of behavioural patterns in Olympic male taekwondo athletes

2017

The relationship between athletes’ behaviours is relevant for developing defensive and offensive strategies. Traditionally, sequential analysis has been conducted to assess relationships between two behaviours (one considered as focal and the other as conditioned). The aim of the study was to examine Olympic taekwondo athletes’ behavioural patterns by conducting sequential analyses of tactical actions in bouts. Seventy-five male matches of the London Olympic Games in 2012 were studied to analyse tactical actions: attack (direct and indirect), counterattack (anticipatory, simultaneous and posterior), defensive (cuts, blocks and dodges), and opening actions. A sequential analysis of 2 lags (i…

Empirical dataTaekwondoOlympic athletesPhysical Therapy Sports Therapy and RehabilitationSequences050105 experimental psychology03 medical and health sciences0302 clinical medicineEducación Física y Deportiva0501 psychology and cognitive scienceslcsh:Sports medicinebiologyAthletes05 social sciencesOffensiveStrategy trainingbiology.organism_classificationCounterattackEducació InvestigacióAction (philosophy)Educació físicalcsh:RC1200-1245PsychologySocial psychology030217 neurology & neurosurgeryTactics
researchProduct

Different Wings Flowfields Interaction on the Wing-Propeller Coupling

1997

A high-portability numerical technique based on the method of free wake analysis (FWA) is described that analyzes the interference between an aircraft propeller and a wing having different planforms and computes the influence of the wing aerodynamic field on the propeller performance. For an isolated propeller and wing, the models employed are based on the FWA and Prandtl theory, respectively. The performance of the propeller in the presence of the wing is related to the wing angle of attack and to the variation of wing circulation and the corresponding induced velocity at the propeller disk. A numerical model, previously and successfully used, was implemented to account for the effects of …

Engineeringanimal structuresbusiness.product_categoryAngle of attackbusiness.industrymusculoskeletal neural and ocular physiologyPropeller (aeronautics)Blade pitchtechnology industry and agricultureAerospace EngineeringWing configurationmacromolecular substancesMechanicsAirplanebody regionsWashout (aeronautics)Wing twistPropulsorbusinessMarine engineeringJournal of Aircraft
researchProduct

Guanxi, performance and innovation in entrepreneurial service projects

2013

PurposeThis paper aims to analyze the role played by two dimensions of entrepreneurs' private social capital in the survival, growth and innovativeness of entrepreneurial service ventures: local size and preferential attachment degree.Design/methodology/approachData were collected by a questionnaire, the unit of investigation being the private entrepreneur in the service sector in the city of Shanghai. The questionnaire allows the authors to identify the social network of the entrepreneurs, estimate the empirical degree distribution for the entire sample, and estimate local size and preferential attachment degree.FindingsThere is empirical evidence that entrepreneurs do not create social ne…

EntrepreneurshipSocial networkbusiness.industrymedia_common.quotation_subjectNew VenturesManagement Science and Operations ResearchPreferential attachmentGeneral Business Management and AccountingService (economics)MarketingbusinessTertiary sector of the economyGuanxiSocial capitalmedia_commonManagement Decision
researchProduct

Socioemotional characteristics of minors in foster care: A comparison between the estimation of parents, teachers and children

2013

Abstract During the child's first few years, it's of fundamental importance the presence of a strong emotional base as long as it creates the possibility to open themselves to physical and social world with confidence, and as it acts as a facilitator of cognitive development. For this reason, if the family cannot ensure such base, social services are forced to resort to foster care, a resource that has a lot of difficulties, leading to different implications in the development of the child and of the foster family. It is therefore important to analyze in depth the socio-emotional variables that characterize children who are in a situation of foster care in order to provide adequate assistan…

EstimationSociology and Political ScienceSocioemotional selectivity theoryeducationAttachmentSocial WelfareTeachersEmotional developmentEducationDevelopmental psychologyFoster careResource (project management)FacilitatorDevelopmental and Educational PsychologyCognitive developmentPsychologySocial psychologyFoster carePsychopathologySelf-reports
researchProduct

Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context

2021

Machine Learning (ML) has been taking significant evolutionary steps and provided sophisticated means in developing novel and smart, up-to-date applications. However, the development has also brought new types of hazards into the daylight that can have even destructive consequences required to be addressed. Evasion attacks are among the most utilized attacks that can be generated in adversarial settings during the system operation. In assumption, ML environment is benign, but in reality, perpetrators may exploit vulnerabilities to conduct these gradient-free or gradient-based malicious adversarial inference attacks towards cyber-physical systems (CPS), such as smart buildings. Evasion attac…

ExploitComputer sciencebusiness.industryCyber-physical systemevasion attacksEvasion (network security)Context (language use)Adversarial machine learningComputer securitycomputer.software_genreadversarial machine learningdefensive mechanismscyber-physical systemAdversarial systemSmart lockkoneoppiminenälytekniikkabusinesskyberturvallisuuscomputerverkkohyökkäyksetBuilding automation
researchProduct

Eliciting Information on the Vulnerability Black Market from Interviews

2010

Threats to computing prompted by software vulnerabilities are abundant and costly for those affected. Adding to this problem is the emerging vulnerability black markets (VBMs), since they become places to trade malware and exploits. VBMs are discussed based on information derived from interviews with security researchers. The effort is enriched by further examination of documents surrounding the disclosure of four selected vulnerabilities cases. The result suggests that the VBMs is bifurcated into two distinct parts; the skilled-hacker and the script-kiddie VBMs with a possible link between them, where the latter become places to sell malware or exploit kits after the zero day vulnerability…

ExploitComputer sciencebusiness.industryInternet privacycomputer.software_genreComputer securitySoftware qualityElectronic mailComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSMalwareBlack marketbusinesscomputerZero-day attackVulnerability (computing)2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
researchProduct

A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments

2007

A man-in-the-middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing or data manipulation, without the end hosts being aware of it. Usually these attacks exploit security flaws in the implementation of the ARP protocol at hosts. Up to now, detecting such attacks required setting up a machine with special-purpose software for this task. As an additional problem, few intrusion detection systems (IDS) are able to prevent MitM attacks. In this work we present a low-cost embedded IDS which, when plugged into a switch or hub, is able to detect and/or prevent MitM attacks automatically and …

Exploitbusiness.industryComputer scienceLocal area networkNetwork interfaceIntrusion detection systemMan-in-the-middle attackComputer securitycomputer.software_genreTask (computing)Packet analyzerAddress Resolution ProtocolbusinesscomputerComputer networkThe International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)
researchProduct