Search results for "Computer security"

showing 10 items of 433 documents

Designing a Specialized Devices for Correction of the Axis Deviation at the Human Leg

2013

The presented article is an original contribution which implies the design of a specialized device for high tybial osteotomy (HTO) optimization. In the papers are presented the sources that imply HTO, the axial deviations of the human lower member from the correct position. This sources are the gonarthosys owed to the usage of the knees cartilages or owed to some diseases (such as the Blount disease) and the vicious consolidated fractures. After presenting the needs to realize such a specialized device for HTO, the principal requests the device shall fulfill are underlined. Starting from these , two sub ensembles were projected, one for the tibial positioning and for the execution of the ho…

Engineering drawingEngineeringHigh tibial osteotomyPosition (vector)business.industryPrincipal (computer security)Blount diseaseGeneral MedicineHuman legbusinessRealization (systems)Instant centre of rotationSimulationApplied Mechanics and Materials
researchProduct

Safety and Efficacy for New Techniques and Imaging using New Equipment to Support European Legislation (SENTINEL) — Education and Training Aspects

2007

SENTINEL is a Coordinated Action funded by the European Commission under the specific program (EURATOM) for research and training in the nuclear energy field as part of the 6th Framework Program.

Engineering managementPatient safetyEngineeringbusiness.industryEuropean commissionLegislationTraining aspectsComputer securitycomputer.software_genrebusinesscomputer
researchProduct

Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology

2017

International audience; Advances in wireless communications and microelectronics have spearheaded the development of unmanned aerial vehicles (UAVs), which can be used to augment a ground network composed of sensors and/or vehicles in order to increase coverage, enhance the end-to-end delay, and improve data processing. While UAV-aided networks can potentially find applications in many areas, a number of issues, particularly security, have not been readily addressed. The intrusion detection system is the most commonly used technique to detect attackers. In this paper, we focus on addressing two main issues within the context of intrusion detection and attacker ejection in UAV-aided networks…

EngineeringAnomaly-based intrusion detection systemintrusion detection system (IDS)Context (language use)02 engineering and technologyIntrusion detection systemComputer securitycomputer.software_genreBayesian game[ SPI.GCIV.IT ] Engineering Sciences [physics]/Civil Engineering/Infrastructures de transportUtility[ SPI.NRJ ] Engineering Sciences [physics]/Electric power0202 electrical engineering electronic engineering information engineering[ SPI.GCIV ] Engineering Sciences [physics]/Civil Engineering[ SPI ] Engineering Sciences [physics]Overhead (computing)Network performanceunmanned aerial vehicles (UAVs)Ad HocBayesian gameVehicular ad hoc networkbusiness.industryMechanical EngineeringNode (networking)020206 networking & telecommunicationsComputer Science Applications[ SPI.TRON ] Engineering Sciences [physics]/ElectronicsEfficientAutomotive Engineeringintrusion ejection system (IES)020201 artificial intelligence & image processingVehicular NetworksWireless Sensor NetworksbusinesscomputerComputer network
researchProduct

Comparing Different Crowd Emergency Evacuation Models Based on Human Centered Sensing Criteria

2014

Emergency evacuation of crowds is a fascinating phenomenon that has attracted researchers from various fields. Better understanding of this class of crowd behavior opens up for improving evacuation policies and smarter design of buildings, increasing safety. Recently, a new class of disruptive technology has appeared: Human-centered sensing which allows crowd behavior to be monitored in real-time, and provides the basis for real-time crowd control. The question then becomes: to what degree can previous crowd models incorporate this development, and what areas need further research? In this paper, the authors provide a survey that describes some widely used crowd models and discuss the advan…

EngineeringClass (computer programming)Emergency managementbusiness.industryEconomic shortageComputer securitycomputer.software_genreData scienceImportant researchCrowdsCrowd controlEmergency evacuationCrowd psychologybusinesscomputerInternational Journal of Information Systems for Crisis Response and Management
researchProduct

User Activity Recognition for Energy Saving in Smart Homes

2015

Abstract Energy demand in typical home environments accounts for a significant fraction of the overall consumption in industrialized countries. In such context, the heterogeneity of the involved devices, and the non negligible influence of the human factor make the optimization of energy use a challenging task; effective automated approaches must take into account basic information about users, such as the prediction of their course of actions. Our proposal consists in learning customized structural models for common user activities for predicting the trend of energy consumption; the approach aims to lower energy demand in the proximity of predicted peak loads so as to keep the overall cons…

EngineeringComputer Networks and CommunicationsComputer scienceEnergy managementContext (language use)Information theoryComputer securitycomputer.software_genreTask (project management)Activity recognitionUser Profiling Energy saving Pattern RecognitionHome automationActivity discoveryStructural modelingBuilding management systemConsumption (economics)Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniEnd userbusiness.industryPeak load avoidanceEnergy consumptionIndustrial engineeringComputer Science ApplicationsEnergy conservationRisk analysis (engineering)Hardware and ArchitectureData miningbusinessRaw datacomputerSoftwareEnergy (signal processing)Information Systems
researchProduct

Erfahrungen bei der verkehrsmedizinischen Oberbegutachtung der Fahrt�chtigkeit

1966

Es wird uber Erfahrungen bei der verkehrsmedizinischen Oberbegutachtung berichtet und als Ergebnis herausgestellt, das die Untersuchung unter der Leitung eines verantwortlichen entsprechend vorgebildeten Arztes erfolgen musse, der Neben-bzw. Erganzungsgutachten uber spezielle von ihm nicht beantwortbare Fragen beiziehen soll. Ein sogenanntes Kommissionsgutachten mit Beteiligung mehrerer Begutachter wird als unzweckmasig bezeichnet.

EngineeringInjury controlAccident preventionbusiness.industryPoison controlComputer securitycomputer.software_genreAutomobile drivingbusinesscomputerHumanitiesPathology and Forensic MedicineDeutsche Zeitschrift f�r die Gesamte Gerichtliche Medizin
researchProduct

The predictability of international terrorism: A time‐series analysis

1988

Abstract The study examines the predictability of international terrorism in terms of the existence of trends, seasonality, and periodicity of terrorist events. The data base used was the RAND Corporation's Chronology of International Terrorism. It contains the attributes of every case of international terrorism from 1968 to 1986 (n = 5,589). The authors applied Box‐Jenkins models for a time‐series analysis of the occurrence of terrorist events as well as their victimization rates. The analysis revealed that occurrence of terrorist events is far from being random: There is a clear trend and an almost constant periodicity of one month that can be best described by a first‐order moving averag…

EngineeringRand corporationbusiness.industryHuman factors and ergonomicsPoison controlSeasonalitymedicine.diseaseComputer securitycomputer.software_genreMoving-average modelTerrorismmedicineEconometricsTime seriesPredictabilitybusinesscomputerTerrorism
researchProduct

Identifying First Responders Information Needs

2016

At the onset of an indoor fire emergency, the availability of the information becomes critical due to the chaotic situation at the emergency site. Moreover, if information is lacking, not shared, or responders are too overloaded to acknowledge it, lives can be lost and property can be harmed. Therefore, the goal of this paper is to identify information items that are needed for first responders during search and rescue operations. The authors use an educational building fire emergency as a case and show how first responders can be supported by getting access to information that are stored in different information systems. The research methodology used was a combination of literature review,…

EngineeringSituation awarenessbusiness.industryResearch methodology05 social sciences0211 other engineering and technologiesInformation needs02 engineering and technologyComputer securitycomputer.software_genremedicine.diseaseAccess to informationEmergency responseInformation model021105 building & construction0502 economics and businessmedicineInformation systemMedical emergencybusinesscomputer050203 business & managementSearch and rescueInternational Journal of Information Systems for Crisis Response and Management
researchProduct

Sustainability issues in sheet metal forming processes: an overview

2011

Abstract Environmental sustainability in manufacturing is nowadays an urgent and remarkable issue and the main concerns are related to more efficient use of materials and energy. In sheet metal forming processes there is still a lack of knowledge in this field mainly due to the need of a proper modelling of sustainability issues and factors to be taken into account. The aim of this paper is mainly to underline the state of the art from a forming point of view about the sustainability contributions offered in any phase of a product life cycle. Actually, a lack in terms of comprehensive contributions is present in the technical literature, thus, the authors try to give a sort of holistic visi…

EngineeringUnderlineRenewable Energy Sustainability and the EnvironmentManagement sciencebusiness.industryStrategy and ManagementLife cyclePrincipal (computer security)Resource efficiencyForming processesSheet metal formingIndustrial and Manufacturing EngineeringResource efficiencyProduct lifecycleRisk analysis (engineering)SustainabilityOrder (exchange)SustainabilitySustainability organizationsbusinessSettore ING-IND/16 - Tecnologie E Sistemi Di LavorazioneGeneral Environmental Science
researchProduct

Ubiquitous Co-Driver System and Its Effects on the Situation Awareness of the Driver

2008

The aim of this paper is to explore the effects of ubiquitous computing in cars on the situation awareness and expectations of the driver. In a driving simulation environment with participants using a co-driver system, we investigated how people took and recovered from misinformation provided by the system. The system presented safety-critical information about the upcoming curves on the road, but in the experiment part of the messages contained false information. The effects of this information on participants’ behavior were investigated. On the grounds of the experiment, we discuss two approaches for investigating drivers’ situational awareness, which are based on either mental workload o…

EngineeringajoneuvotietojärjestelmätUbiquitous computingSituation awarenessbusiness.industryApplied psychologyWorkloadkapasiteettiComputer securitycomputer.software_genretilannetietoisuusInformation systemDriving simulationMisinformationbusinesscomputermielensisällöt
researchProduct