Search results for "Computer Security"

showing 10 items of 433 documents

Communication Platform for Disaster Response

2016

The present research proposes an information platform for enhanced communication and information sharing in municipalities struck by disasters. Once a disaster happens, collecting and sharing information with and among citizens is the most important tasks for municipalities. However, empirical research of the Great East Japan Earthquake in 2011 revealed a marked lack of tools supporting municipal communication and data sharing activities at the initial stage. A smartphone and tablet based application was subsequently developed and evaluated in the field as a means of first response in future disasters. The application is based on the notion of frugality, which proved to be very useful in th…

Knowledge managementEmergency managementbusiness.industryInformation sharingDisaster responseComputer securitycomputer.software_genreField (computer science)Data sharingEmpirical researchGeographyFrugalitybusinesscomputer
researchProduct

Dimensions of Community Assets for Health. A Systematised Review and Meta-Synthesis

2021

Since Aaron Antonovsky’s salutogenesis theory and Morgan and Ziglio’s health assets model were first proposed, there has been a growing concern to define the resources available to the individual and the community to maintain or improve health and well-being. The aim of the present study was to identify the dimensions that characterise community assets for health. To this end, we conducted a systematised review with a meta-synthesis and content analysis of research or projects involving asset mapping in the community. Articles that met our eligibility criteria were: (1) based on the salutogenic approach and (2) described an assets mapping process and among their results, explained what, how…

Knowledge managementHealth Toxicology and MutagenesisScopusMEDLINEDimensionsCategorical analysisAsset (computer security)Article03 medical and health sciences0302 clinical medicineHealth assetshealth assets030212 general & internal medicineDimension (data warehouse)030505 public healthbusiness.industryRPublic Health Environmental and Occupational HealthGrey literaturecategorical analysisSalutogenesisContent analysisSustainabilityMedicineEnfermeríasalutogenesisdimensions0305 other medical sciencebusinessPsychologySalutogenesis
researchProduct

A Personal LPWAN Remote Monitoring System

2021

Firefighters are equipped with an immobility detector device also called the Personal Alert Safety System (PASS) that is integrated into the user's Self-Contained Breathing Apparatus (SCBA). If a firefighter remains motionless for a certain period of time, a loud audible alert is triggered to notify the Firefighter Assist and Search Team (FAST) deployed in the area of intervention that the wearer of the PASS device is in trouble and in need of rescue. However, this device is not reliable enough since it triggers frequently false positives which lead to developing a tolerance for sounding alarms among the crew. As a consequence, they do not seem to be concerned about it as they should and th…

LPWANEmergency responseComputer scienceCrewFalse positive paradoxLocation awarenessMonitoring systemcomputer.software_genreComputer securitySet (psychology)Wireless sensor networkcomputer2021 International Wireless Communications and Mobile Computing (IWCMC)
researchProduct

Leader election and local identifiers for three‐dimensional programmable matter

2020

International audience; In this paper, we present two deterministic leader election algorithms for programmable matter on the face-centered cubic grid. The face-centered cubic grid is a 3-dimensional 12-regular infinite grid that represents an optimal way to pack spheres (i.e., spherical particles or modules in the context of the programmable matter) in the 3-dimensional space. While the first leader election algorithm requires a strong hypothesis about the initial configuration of the particles and no hypothesis on the system configurations that the particles are forming, the second one requires fewer hypothesis about the initial configuration of the particles but does not work for all pos…

Leader electionComputer Networks and CommunicationsComputer science[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]0102 computer and information sciences02 engineering and technology[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM][INFO] Computer Science [cs]Computer securitycomputer.software_genre01 natural sciencesComputer Science ApplicationsTheoretical Computer ScienceIdentifierProgrammable matter[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Computational Theory and Mathematics010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingcomputerSoftware
researchProduct

A status report

1992

Abstract This article considers the financial and proprietary considerations applicable to computer crime, computer security and personal privacy. The failure to take proper precautions in these areas can lead to major operational problems and substantial loss of assets. Developments in the late 1980s, particulary the discovery by the public press of so-called ‘computer viruses’, indicates the need for counsel representing suppliers and users to understand the basic technology involved and the legal implications. Such a report by Robert Bigelow was first published in CLSR in March 1989. He has now updated and revised the text which will be featured in several parts. In the first parts the l…

Legal positionComputer Networks and Communicationsbusiness.industryInternet privacySociologyComputer securitycomputer.software_genreStatus reportbusinessLawGeneral Business Management and AccountingcomputerComputer virusComputer Law & Security Review
researchProduct

CSCL – a tool to motivate foreign language learners: The Finnish application

2003

This article discusses the applications of the theory of Computer Supported Collaborative Learning (CSCL) to teaching and learning a foreign language, in this case, one of the ‘Less Commonly Taught Languages’, Finnish. The ‘Virtually Finnish’ project was based on the idea of creating a larger, virtual Finnish learning community among the second-year Finnish language students in five US universities during the fall semester, 2001. CSCL was chosen as a base, as its principal goal is to aid the learners in sharing and distributing their knowledge to the whole learning community. In addition to discussing the set up and the content of the project, the students’ feedback about their language lea…

Linguistics and LanguageComputer scienceLearning communityForeign languagePrincipal (computer security)Language acquisitionLanguage and LinguisticsComputer Science ApplicationsEducationAnticipation (artificial intelligence)Computer-supported collaborative learningPedagogySet (psychology)Less Commonly Taught LanguagesReCALL
researchProduct

Translation and didactics in the language classroom: the preparation and dissemination of a dual-language critical edition of José Luis Alonso de San…

2015

We have clearly come a long way from the time when translation’s principal role in the classroom was as a tool for language acquisition. This has been a positive development in many respects but, as we hope to demonstrate, the insights gleaned from this specific case-study – viewed through the prism of a Foucauldian approach to the archaeology of the disciplines – illustrate the need for a more general reassessment of the educational and scholarly potential of the dual-language text, a once-popular and well-respected literary and pedagogical resource which was the collateral victim of the disciplinary warfare by which translation and language education were able to establish themselves as a…

Linguistics and LanguageResource (project management)CollateralLanguage classroomEducation theoryPrincipal (computer security)Language educationSociologyLanguage acquisitionDisciplineLanguage and LinguisticsLinguisticsEducationThe Interpreter and Translator Trainer
researchProduct

Carbon monoxide detection

2019

Carbon monoxide (CO) is a particularly toxic gas, and the CO poisoning is the leading cause of fatal poisoning in the world. One solution to deal with this dangerous gas is to exploit the advantages given to us by the applications and the technology advances in internet of things (IoT). In this context, we propose to integrate carbon monoxide detection objects to the internet, as part of civil protection intervention applications in case of detection of carbon monoxide to avoid poisoning. To do this, we propose a typical IoT architecture to manage the alerts sent to civil protection in the event of detection of carbon monoxide (CO). The architecture is based on the Message Queue Telemetry T…

MQTTExploitComputer scienceEvent (computing)business.industry020206 networking & telecommunicationsContext (language use)Cloud computing02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineeringThe InternetCommunications protocolbusinesscomputerMessage queueProceedings of the 3rd International Conference on Future Networks and Distributed Systems
researchProduct

Predictors of driving after alcohol and drug use among adolescents in Valencia (Spain).

2010

Producción Científica

MaleAdolescentSubstance-Related DisordersPoison controlHuman Factors and ErgonomicsMarijuana SmokingComputer securitycomputer.software_genreSuicide preventionOccupational safety and healthEnvironmental healthSurveys and QuestionnairesInjury preventionDangerous BehaviorMedicineHumansRisk factorSafety Risk Reliability and QualityDriving under the influencebusiness.industryIllicit DrugscelebritiesPublic Health Environmental and Occupational HealthAccidents TrafficHuman factors and ergonomicsAutomóviles - Conducción - Drogascelebrities.reason_for_arrestCross-Sectional StudiesStandard drinkSpainPopulation SurveillanceAutomóviles - Conducción en estado de embriaguezFemalebusinesscomputerAlcoholic Intoxication
researchProduct

Under-reporting bicycle accidents to police in the COST TU1101 international survey: Cross-country comparisons and associated factors

2018

Police crash reports are often the main source for official data in many countries. However, with the exception of fatal crashes, crashes are often underreported in a biased manner. Consequently, the countermeasures adopted according to them may be inefficient. In the case of bicycle crashes, this bias is most acute and it probably varies across countries, with some of them being more prone to reporting accidents to police than others. Assessing if this bias occurs and the size of it can be of great importance for evaluating the risks associated with bicycling.This study utilized data collected in the COST TU1101 action "Towards safer bicycling through optimization of bicycle helmets and us…

MaleCYCLING BEHAVIOUR[SPI.OTHER]Engineering Sciences [physics]/OtherEngineeringBICYCLETTEEconomicsCiencias de la SaludCrashSalud Pública y MedioambientalCYCLING ATTITUDEcomputer.software_genreUNDER-REPORTINGSociologyGermanySAFER11. SustainabilityIsraelSafety Risk Reliability and Quality050107 human factorsCommunication05 social sciencesAccidents TrafficPolicePeer reviewHospitalizationMarital statusFemaleHead Protective DevicesSafetyCyclingUnder-reportingAdultCross-Cultural ComparisonRiskCIENCIAS MÉDICAS Y DE LA SALUDCroatiaBicycle helmetsBicyclesHuman Factors and ErgonomicsSample (statistics)Computer securityBICYCLE CRASHBicycles ; Under-reporting ; International survey of cycling ; Cycling behaviour ; Cycling attitudes ; Bicycle helmets ; Bicycle crashesUnder-reportingEnvironmental healthCycling attitudesCycling behavior0502 economics and businessHumans0501 psychology and cognitive sciences050210 logistics & transportationbusiness.industryBicycle crashesPublic Health Environmental and Occupational HealthINTERNATIONAL SURVEY OF CYCLINGBicyclingSocioeconomic FactorsCASQUEInternational survey of cyclingSurvey data collectionHuman medicineSelf Reportbusinesscomputerhuman activities
researchProduct