Search results for "Computer Networks"
showing 10 items of 860 documents
Automated Synthesis of Application-layer Connectors from Automata-based Specifications
2019
Abstract Ubiquitous and Pervasive Computing, and the Internet of Things, promote dynamic interaction among heterogeneous systems. To achieve this vision, interoperability among heterogeneous systems represents a key enabler, and mediators are often built to solve protocol mismatches. Many approaches propose the synthesis of mediators. Unfortunately, a rigorous characterization of the concept of interoperability is still lacking, hence making hard to assess their applicability and soundness. In this paper, we provide a framework for the synthesis of mediators that allows us to: (i) characterize the conditions for the mediator existence and correctness; and (ii) establish the applicability bo…
High performance hardware correlation coefficient assessment using programmable logic for ECG signals
2003
Abstract Correlation coefficient is frequently used to obtain cardiac rhythm by peak estimation and appreciate differences in the signal compared to a pattern. This work focuses on the description of a real-time correlation assessment procedure. Applied to electrocardiogram (ECG) signals, a new correlation value is obtained every new sample and pulse detection information is provided. The ECG pattern is internally stored and can be changed when desired. This procedure is useful in Systems on Chip implementation and can be applied to design compact ECG monitoring systems consisting on a system on chip where programmable logic offloads the main processor. A Xilinx FPGA device has been used fo…
Tracing the Cultural Background of Lone-Wolf Terrorism
2021
The end of the Cold War, as well as the collapse of the Soviet Union, posed new greater challenges and risks for the “Global North.” Terrorism—doubtless—seems to be one of them. Over the recent years, and particularly after 9/11, terrorists changed the focus of their attacks. While classic terrorism targeted important persons such as politicians, chief police officers, or celebrities, modern terrorism planned attacks on leisure-spots spaces, tourist destinations, and lay-persons. This is particularly troublesome for policymakers (who are in charge of orchestrating all-pervading models to preserve homeland security) and for field-workers who are seriously punished when they are in contact wi…
2020
Abstract Information technology (IT) engagement is defined as a need to spend more time using IT. Practice-based examples show that IT engagement can have adverse effects in organizations. Although users can potentially get more work done through IT engagement, observations show that the users might jeopardize their well-being and hamper their work performance. We aimed to investigate this complexity in the research on IT engagement by examining its potential antecedents and outcomes in organizations. Considering the potentially mixed outcomes, we developed a model to examine the effects of IT engagement on personal productivity and strain. We also aimed to explain the antecedents of IT eng…
Consumers' perceptions of mobile banking continuous usage in Finland and South Africa
2015
This study examines continuous usage behaviour related to mobile banking (m-banking) among consumers living in Finland (FI) and South Africa (ZA). The study investigates three post-adoption behavioural consequences - namely, trust, satisfaction and word of mouth. Using purposeful sampling techniques, we found that trust plays a significant role in promoting continuous usage of m-banking. In general, the respondents reported high levels of trust in m-banking technology and were satisfied with the m-banking application and services. In addition, convenience, user friendliness and speed emerged as the main sub-topics related to satisfaction. In most cases, the convenience of using m-banking do…
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks
2015
Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…
Criminal networks analysis in missing data scenarios through graph distances.
2021
Data collected in criminal investigations may suffer from: (i) incompleteness, due to the covert nature of criminal organisations; (ii) incorrectness, caused by either unintentional data collection errors and intentional deception by criminals; (iii) inconsistency, when the same information is collected into law enforcement databases multiple times, or in different formats. In this paper we analyse nine real criminal networks of different nature (i.e., Mafia networks, criminal street gangs and terrorist organizations) in order to quantify the impact of incomplete data and to determine which network type is most affected by it. The networks are firstly pruned following two specific methods: …
Effectively and efficiently supporting crowd-enabled databases via NoSQL paradigms
2013
In this paper we provide an overview of the Hints From the Crowd (HFC) project, whose main goal is to build a NoSQL database system for large collections of product reviews; the database is queried by expressing a natural language sentence; the result is a list of products ranked based on the relevance of reviews w.r.t. the natural language sentence. The best ranked products in the result list can be seen as the best hints for the user based on crowd opinions (the reviews). The HFC prototype has been developed as a web application, independent of the particular application domain of the collected product reviews. Queries are performed by evaluating a text-based ranking metric for sets of re…
LC3: A spatio-temporal and semantic model for knowledge discovery from geospatial datasets
2015
International audience; There is a need for decision-makers to be provided with both an overview of existing knowledge, and information which is as complete and up-to-date as possible on changes in certain features of the biosphere. Another objective is to bring together all the many attempts which have been made over the years at various levels (international, Community, national and regional) to obtain more information on the environment and the way it is changing. As a result, remote sensing tools monitor large amount of land cover informations enabling study of dynamic processes. However the size of the dataset require new tools to identify pattern and extract knowledge. We propose a mo…
A Conceptual Architecture of Ontology Based KM System for Failure Mode and Effects Analysis
2014
Failure Mode and Effects Analysis (FMEA) is a systematic method for procedure analyses and risk assessment. It is a structured way to identify potential failure modes of a product or process, probability of their occurrence, and their overall effects. The basic purpose of this analysis is to mitigate the risk and the impact associated to a failure by planning and prioritizing actions to make a product or a process robust to failure. Effective manufacturing and improved quality products are the fruits of successful implementation of FMEA. During this activity valuable knowledge is generated which turns into product or process quality and efficiency. If this knowledge can be shared and reused…