Search results for "Access"

showing 10 items of 1232 documents

Multitemporal Mosaicing for Sentinel-3/FLEX Derived Level-2 Product Composites

2020

The increasing availability of remote sensing data raises important challenges in terms of operational data provision and spatial coverage for conducting global studies and analyses. In this regard, existing multitemporal mosaicing techniques are generally limited to producing spectral image composites without considering the particular features of higher-level biophysical and other derived products, such as those provided by the Sentinel-3 (S3) and Fluorescence Explorer (FLEX) tandem missions. To relieve these limitations, this article proposes a novel multitemporal mosaicing algorithm specially designed for operational S3-derived products and also studies its applicability within the FLEX…

Atmospheric ScienceSource code010504 meteorology & atmospheric sciencesComputer scienceproduct compositesmedia_common.quotation_subjectGeophysics. Cosmic physics0211 other engineering and technologiesContext (language use)Automatic processing02 engineering and technology01 natural sciencesmosaicingConsistency (database systems)Data acquisitionFLEXProduct (category theory)sentinel-3 (S3Computers in Earth SciencesComposite materialFluorescence explorer (FLEX)fluorescence explorer (FLEX)TC1501-1800Sentinel-3 (S3)021101 geological & geomatics engineering0105 earth and related environmental sciencesmedia_commonQC801-809openaccess dataOcean engineeringCompositingtime seriesopen-access dataIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
researchProduct

A reliable CSMA protocol for high performance broadcast communications in a WSN

2014

Wireless Sensor Networks have been identified as a promising technology to efficiently perform distributed monitoring, tracking and control tasks. In order to accomplish them, since fast decisions are generally required, high values of throughput must be obtained. Additionally, a high packet reception rate is important to avoid wasting energy due to unsuccessful transmissions. These communication requirements are more easily satisfied by exploiting the broadcast nature of the wireless medium, which allows several simultaneous receptions through a unique node transmission. We propose a Medium Access Control protocol that ensures, simultaneously, high values of throughput and a high packet re…

Atomic broadcastKey distribution in wireless sensor networksbusiness.industryComputer scienceNode (networking)Media access controlWirelessThroughputBroadcastingbusinessBroadcast radiationWireless sensor networkComputer network2014 IEEE Global Communications Conference
researchProduct

Variété des usages et inégalités d'accès à la formation continue

2005

La formation professionnelle continue est rarement abordée du point de vue de la personne qui se forme. C'est cette approche originale que propose l'enquête Formation continue 2000. Son intérêt est d'observer l'attitude des individus face à la formation continue, leurs contraintes et leurs pratiques. Plus que l'envie personnelle, les propositions et les critères de sélection de l'entreprise ont une réelle influence sur l'accès à la formation des salarié-es. De plus, cette enquête permet d'éclairer les raisons et les circonstances, racontées par les personnes elles-mêmes, qui ont conduit à une absence de formation.

Attitude des employésLifelong learningEntrepriseAttitudeAccess to lifelong learning[SHS.EDU] Humanities and Social Sciences/EducationAccès à la formation continueFranceFormation continueEnterprise
researchProduct

Eye tracking analysis of minor details in films for audio description

2012

This article focuses on the many instances when minute details found in feature films may have direct implications upon the development of both the visual and plot narratives. The main question we would like to ask examines whether very subtle details which may easily go unnoticed by the viewer should be audio described. To assess the visual consciousness of such minute details, a perception experiment was conducted using eye-tracking technology and questionnaires. Though the result is not conclusive, it shows a clear methodological approach in the field of the audio description of visual details, and does give some indication as to what should be taken into consideration in future studies …

AudiodescripciónLinguistics and LanguageAudio description; Eye tracking; Media accessibility; Audiovisual translationComputer sciencemedia_common.quotation_subjectÀudiodescripcióMinor (academic)Traducció audiovisualAudio descriptioncomputer.software_genreMedia accessibilityLanguage and LinguisticsPlot (graphics)Field (computer science)EducationHuman–computer interactionAudiodescripción; Accesibilidad a los medios; Traducción audiovisualPerceptionNarrativemedia_commonUNESCO::CIENCIAS DE LAS ARTES Y LAS LETRASEye trackingMultimediaAccessibilidad a los mediosAudio descriptionTranslation and InterpretingTraducción e InterpretaciónTraducció--RevistesTraducción audiovisualFeature (computer vision)Accesibilidad a los medios:CIENCIAS DE LAS ARTES Y LAS LETRAS [UNESCO]Eye trackingAccessibilitat als mitjanscomputerAudiovisual translation
researchProduct

Multi-sensory approaches to (audio) describing the visual arts

2012

Making art accessible to blind patrons requires the ability to convey explicit and implicit visual messages through non-visual forms. Audio description is often seen as the best way to offer visual texts to blind people; however, one may query whether words alone are sufficient to convey the subtleties of art and to transport the emotional charge such works offer. It is a fact that the dialogue between words and touch may allow these particular “readers” to “see” art in its tangible forms, but perhaps more is needed if one is to give them the opportunity to live the art experience to the full. This article discusses different multi-sensory approaches to making art available to visually impa…

AudiodescripciónLinguistics and LanguageComputer scienceVisually impairedTraducció audiovisualAudio descriptionSoundpaintingcomputer.software_genreAccesibilidadLanguage and LinguisticsVisual artsMuseoEducationMulti sensoryArtes visualesAudio description; Audio guides; Soundpainting; Museum; Visual arts; AccessibilityMuseumAudioguíasUNESCO::CIENCIAS DE LAS ARTES Y LAS LETRASMultimediaTranslation and InterpretingAudio descriptionTraducción e InterpretaciónAudio guidesTraducció--RevistesAccessibilityTraducción audiovisual:CIENCIAS DE LAS ARTES Y LAS LETRAS [UNESCO]Audiodescripción; Audioguías; Museo; Artes visuales; AccesibilidadTranscreationAudiovisual translationcomputer
researchProduct

Analyzing the security of Windows 7 and Linux for cloud computing

2013

We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.

AuthenticationCloud computing securityGeneral Computer ScienceComputer sciencebusiness.industryAuthorizationData securityAccess controlCloud computingInformation securityComputer security modelAsset (computer security)EncryptionInternet securityComputer securitycomputer.software_genreSecurity and safety features new to Windows VistaSecurity information and event managementSecurity serviceNetwork Access ControlSecurity through obscuritybusinessLawcomputerComputers & Security
researchProduct

Machine Learning VS Transfer Learning - Smart Camera Implementation for Face Authentication

2018

The aim of this paper is to highlight differences between classical machine learning and transfer learning applied to low cost real-time face authentication. Furthermore, in an access control context, the size of biometric data should be minimized so it can be stored on a remote personal media. These constraints have led us to compare only lightest versions of these algorithms. Transfer learning applied on Mobilenet v1 raises to 85% of accuracy, for a 457Ko model, with 3680s and 1.43s for training and prediction tasks. In comparison, the fastest integrated method (Random Forest) shows accuracy up to 90% for a 7,9Ko model, with a fifth of a second to be trained and a hundred of microseconds …

AuthenticationComputer sciencebusiness.industry05 social sciencesContext (language use)Access controlMachine learningcomputer.software_genre050105 experimental psychologyRandom forest03 medical and health sciences0302 clinical medicineFace (geometry)0501 psychology and cognitive sciencesArtificial intelligenceBiometric dataSmart camerabusinessTransfer of learningcomputer[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing030217 neurology & neurosurgeryComputingMilieux_MISCELLANEOUS[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing
researchProduct

An improvement of the batch-authentication and key agreement framework for P2P-based online social networks

2014

Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.

Authenticationbusiness.industryComputer scienceAuthentication protocolNetwork Access ControlData_MISCELLANEOUSChallenge–response authenticationEncryptionbusinessAKAComputer network2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

The One Savior Paradigm

2009

The one savior paradigm is discussed not only as doctrinal aspect of religious teachings but as one of mostly manifested aspect of our psychic, that should be adequately investigated. We suggest simple idea that could serve as starting cognitive model for the one savior paradigm, that might give effect in considering global aspects of humanity, e.g., such as global economy and exact sciences in more friendly connection with religious thinking.

BT Doctrinal Theologyjel:Z12jel:L86BF PsychologyQ Science (General)jel:A1religion theology science art cognition society global economy noosphere accessibility to information
researchProduct

Financial Intermediation in Modern Europe Time: Evidence from Romania

2018

In a world governed by complex financial and economic systems, knowing the process of financial intermediation becomes a must. We face times when the process of financial intermediation seems to change nearly as a natural phenomenon. Financial intermediation stakeholders find constantly new ways to interact on behalf of obtaining funds they need and returns they expect and manage risks they try to avoid. The article’s aim is to take a snapshot of a financial intermediation process that manifests in Europe Modern Era, specifically in one EU member like Romania, in contrast with other two EU member – Bulgaria and Croatia. In the same time, we also outline the relation between financial develo…

Bank creditCurrencyFinancial intermediarymedia_common.cataloged_instanceFinancial systemNatural phenomenonBusinessEuropean unionFinancial developmentBanking sectorAccessionmedia_common
researchProduct