Search results for "BERT"

showing 10 items of 1789 documents

Kyberturvallisuus esineiden internetissä

2017

Esineiden internetin laitteiden määrä on jatkuvasti kasvussa ja niiden hyödyt koskettavat kaikkia yhteiskuntamme jäseniä. Valitettavasti samanaikaisesti myös onnistuneiden kyberhyökkäysten määrä on kasvussa ja se uhkaa esineiden inter-netin luotettavuutta. Tämän takia onkin tärkeää tutkia, minkälaisia uhkia esinei-den internet kohtaa ja kuinka näiltä uhkilta voitaisiin suojautua. Tutkielmassa käsitellään esineiden internetin laitteita, mitä kyseiset laitteet ovat, kuinka ne toi-mivat ja miten ne ovat suojattu. Tutkielma toteutettiin kirjallisuuskatsauksena ja sen lähteinä on käytetty pääsääntöisesti akateemisten julkaisujen artikkeleita. Tutkielmassa selvisi esineiden internetin kyberturval…

Esineiden internettietoturvakyberturvallisuus
researchProduct

Libertà e destino dell'umano

2014

Esistenza libertà religioneSettore M-FIL/03 - Filosofia Morale
researchProduct

Aproximación al proceder hermenéutico del TJUE: libertad de empresa, libre competencia y Constitución del Trabajo

2017

La primacía de los derechos fundamentales constituye uno de los logros normativos de la postguerra. En contraste, la conquista jurídica del Derecho de la Unión ha consistido en someter a los parlamentos estatales a la primacía de las libertades de mercado, incluso en detrimento de los llamados derechos humanos ¿clásicos¿. Las libertades comunitarias efectúan una concreción de la libertad de empresa en sus respectivos ámbitos materiales. Sin embargo, éstas incorporan un contenido diferenciado del atribuido al contenido esencial de la libertad de empresa reconocido en el nivel nacional. El proceso de mutación constitucional en el ámbito europeo se dirige así hacia una confluencia con el model…

EstatEmpresesLibertad de empresalibre competenciaBarreras No Arancelarias (BNA)libertades comunitariasderechos fundamentalesConstitución del TrabajoConstitución socio-económicaEstado Sociallibre circulaciónderechos sociales
researchProduct

Alberto G. Cassani, L’Occhio alato. Migrazioni di un simbolo

2016

Con L’occhio alato. Migrazioni di un simbolo, Alberto Giorgio Cassani torna a interrogarsi sull’emblema albertiano, portando a maturo compimento una riflessione iniziata nel 1994. Sebbene i saggi che costituiscono i vari capitoli del libro siano apparsi nel corso di questo ventennio in altre sedi editoriali, la loro rielaborazione e convergenza in un unico volume consente un gioco di rimandi e una prospettiva di lettura a 360 gradi che pone tali studi sotto una luce nuova. Ne emerge da un lato una ricca messa a fuoco sul valore filosofico e simbolico dell’occhio alato, dall’altro un’interessante indagine sulla vitalità di questa immagine che, ancora oggi, riappare sorprendentemente in insol…

Estetica rinascimento Leon Battista Alberti occhio alatoSettore M-FIL/04 - Estetica
researchProduct

"Alberto Favara e l’indagine etnomusicologica moderna".

2016

Quanto attestato dal musicista Alberto Favara (1863-1923) rappresenta la fonte di maggiore rilievo per la conoscenza della musica popolare in Sicilia tra fine Ottocento e inizio Novecento, mostrando un’apertura nella considerazione del fare musicale per l’epoca davvero sorprendente. La documentazione relativa ai ritmi dei fabbri rappresenta un esempio antesignano di sensibilità antropologica per la relazione fra lavoro e musica. In altri casi (ritmi della pesca, grida di venditori, suoni di campane, richiami pastorali), alcune forme presenti nel Corpus non sono state più riscontrate nelle successive indagini. Di grande importanza sono poi le numerose osservazioni etnografiche, spesso condot…

EtnomusicologiaSettore L-ART/08 - EtnomusicologiaSiciliaAlberto Favara
researchProduct

Five Years of the Citizens Directive in the UK - Part 1

2011

This two-part article reviews how the UK authorities have fared in the practical application of Directive 2004/38/EC in the five years since it entered into force. It identifies and examines the most common problems faced by EU citizens when seeking to have their rights recognised by the UK authorities applying the Immigration (European Economic Area) Regulations 2006 by reference to questions and complaints received by Your Europe Advice. In examining the experience of EU citizens and their family members living in the UK, account is taken of a number of recent judgments of the European Court of Justice concerning EU citizenship, including Metock, Lassal, Eman & Sevinger and Ruiz Zambrano.…

European Union Union citizenship free movement of persons freedom of establishment freedom to provide services immigration United Kingdom Gibraltar Channel Islands Isle of Man Directive 2004/38/EC Immigration (European Economic Area) Regulations 2006Unione europea cittadinanza dell'Unione libera circolazione delle persone libertà di stabilimento libera prestazione dei servizi immigrazione Regno Unito direttiva 2004/38/CE
researchProduct

Pas de titre traduit

2011

This research work adresses the prediction of success after a training scheme (success in university examination, integration of job seekers after a training session) on the basis of 1/ subjective indicators at the end of training: satisfaction or subjective learning and 2/ individuals' variables (self-efficacy, locus of control, self-esteem, optimism and core self-evaluation). Our results show that, compared to training evaluation models, subjective indicators at the end of training do not appear to be good predictors of success. In addition, if individuals' variables are sometimes predictable of success, this seems to be related to the mere fact that they represent high values in students…

Evaluation de formationOptimismSatisfactionEstime de soi[SHS.PSY]Humanities and Social Sciences/PsychologyEngagement (déclaration de liberté)Training evaluationApprentissage[SHS.PSY] Humanities and Social Sciences/Psychology[ SHS.PSY ] Humanities and Social Sciences/PsychologyCore Self-EvaluationsCommitment (freedom of choice)Locus of controlSelf-esteemEvaluation centrale de soiOptimismeLearningLocus de contrôleSentiment d'efficacité personnelleSelf-efficacy
researchProduct

Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context

2021

Machine Learning (ML) has been taking significant evolutionary steps and provided sophisticated means in developing novel and smart, up-to-date applications. However, the development has also brought new types of hazards into the daylight that can have even destructive consequences required to be addressed. Evasion attacks are among the most utilized attacks that can be generated in adversarial settings during the system operation. In assumption, ML environment is benign, but in reality, perpetrators may exploit vulnerabilities to conduct these gradient-free or gradient-based malicious adversarial inference attacks towards cyber-physical systems (CPS), such as smart buildings. Evasion attac…

ExploitComputer sciencebusiness.industryCyber-physical systemevasion attacksEvasion (network security)Context (language use)Adversarial machine learningComputer securitycomputer.software_genreadversarial machine learningdefensive mechanismscyber-physical systemAdversarial systemSmart lockkoneoppiminenälytekniikkabusinesskyberturvallisuuscomputerverkkohyökkäyksetBuilding automation
researchProduct

One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer

2020

Computer vision and machine learning can be used to automate various tasks in cancer diagnostic and detection. If an attacker can manipulate the automated processing, the results can be devastating and in the worst case lead to wrong diagnosis and treatment. In this research, the goal is to demonstrate the use of one-pixel attacks in a real-life scenario with a real pathology dataset, TUPAC16, which consists of digitized whole-slide images. We attack against the IBM CODAIT's MAX breast cancer detector using adversarial images. These adversarial examples are found using differential evolution to perform the one-pixel modification to the images in the dataset. The results indicate that a mino…

FOS: Computer and information sciencesComputer Science - Machine LearningComputer Science - Cryptography and SecurityComputer scienceComputer Vision and Pattern Recognition (cs.CV)Computer Science - Computer Vision and Pattern RecognitionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONMachine Learning (cs.LG)Medical imagingComputer visionkonenäköIBMkyberturvallisuusPixelbusiness.industryPerspective (graphical)diagnostiikkakoneoppiminenDifferential evolutionWhole slide imageReversingsyöpätauditArtificial intelligencebusinessCryptography and Security (cs.CR)verkkohyökkäykset
researchProduct

Kernel Anomalous Change Detection for Remote Sensing Imagery

2020

Anomalous change detection (ACD) is an important problem in remote sensing image processing. Detecting not only pervasive but also anomalous or extreme changes has many applications for which methodologies are available. This paper introduces a nonlinear extension of a full family of anomalous change detectors. In particular, we focus on algorithms that utilize Gaussian and elliptically contoured (EC) distribution and extend them to their nonlinear counterparts based on the theory of reproducing kernels' Hilbert space. We illustrate the performance of the kernel methods introduced in both pervasive and ACD problems with real and simulated changes in multispectral and hyperspectral imagery w…

FOS: Computer and information sciencesComputer scienceGaussianComputer Vision and Pattern Recognition (cs.CV)Multispectral imageComputer Science - Computer Vision and Pattern Recognition0211 other engineering and technologiesMachine Learning (stat.ML)02 engineering and technologysymbols.namesakeStatistics - Machine LearningElectrical and Electronic Engineering021101 geological & geomatics engineeringbusiness.industryHilbert spaceHyperspectral imagingPattern recognitionNonlinear systemKernel methodKernel (image processing)13. Climate actionsymbolsGeneral Earth and Planetary SciencesArtificial intelligencebusinessChange detection
researchProduct