Search results for "Crypt"

showing 10 items of 1111 documents

Applying Dynamic Performance Management to Public Emergency Management: An Analysis of the Wenchuan Earthquake

2020

Previous studies in public emergency management confirm that collaboration assumes a relevant role in strengthening society’s capacity to cope with complex phenomena, such as disasters. However, empirical researches on emergency management show problems in performance measurement, mainly in employing narrow measures focusing on the results of single organisations rather than the entire system. Starting from a Chinese earthquake (Wenchuan) case, as an example, we use the dynamic performance management approach to develop a performance framework. This framework aims at investigating the interrelationships of different actors involved in emergency management and designing appropriate public em…

Process managementDynamic performance managementPerformance managementEmergency managementComputer sciencebusiness.industryFrame (networking)Outcome measuresDisaster managementEmergency managementOutcome measureSettore SECS-P/07 - Economia AziendaleKey (cryptography)Network governancePerformance measurementbusinessNetwork governance
researchProduct

Holonic Handling the Unexpected in Project Management

2017

Abstract Risk assessment is one the key activities of any project. The unexpected situations can have catastrophic consequences. Risk assessment tries to estimate to potential known unknowns, but there is no guarantee to foresee all circumstances around a project. In this situation the project team must be adaptive and find solutions by cooperation, creativity and abductive reasoning. In the paper we tried to analyse on what extent a project and a project team can be handled as a complex adaptive system. More precisely, how the scientific and practical achievements of the theory of complex adaptive systems (CAS) can be used in project management. More exactly, we analyse the applicability o…

Process managementbusiness.industryComputer scienceComplex systemKey (cryptography)Project managementbusinessRisk assessmentComplex adaptive systemProject teamAbductive reasoningRisk managementBalkan Region Conference on Engineering and Business Education
researchProduct

Adaptation of Risk Sharing Partnerships (RSP) to New Industries

2020

The aerospace industry has since the 1990s used a partnership model called Risk Sharing Partnerships (RSP) to handle certain challenges faced in the development of new aircrafts. The RSP model allows the client to include key suppliers in the development of a new product, and hence sharing the burden of investment, risk mitigation, as well as the future sales income. This makes it easier to acquire funding for the development of new products and technologies, in addition to accelerating the development process by including key competencies earlier (Buzacott and Peng in Eur J Oper Res 218:656–666, 2012). RSP have raised interest in other industries, which calls for increased knowledge of con…

Process managementbusiness.industryProcess (engineering)New product developmentKey (cryptography)Investment (macroeconomics)businessAdaptation (computer science)AerospaceContingencyRisk management
researchProduct

Sustainability Theory: A Review of Key Ideas for Sustainability and green procurement context

2020

Sustainability and sustainable development have become important concepts and goals across science and society. Sustainability, connected to desirable long-term conditions, is an inherently applied in public sector, public procurements. Every year the European Union (EU) Member States collectively spend around 14% of Gross Domestic Product (GDP) on public procurement. In Latvia, public procurement accounts for 17% of GDP. The review of the new public procurement directives and their transposition process in Latvia plans to show new opportunities for green public procurement (GPP) application: the contracting authority will be able to reject, for example, an abnormally low bid, include envir…

ProcurementProcess managementSustainabilityKey (cryptography)Context (language use)Business11th GLOBAL CONFERENCE ON BUSINESS AND SOCIAL SCIENCES
researchProduct

Caspase-dependent apoptosis during infection with Cryptosporidium parvum

1999

The protozoan parasite Cryptosporidium parvum causes persistent diarrhea and malnutrition in children and the diarrhea-wasting syndrome in AIDS. No therapy exists for eliminating the parasite in the absence of a healthy immune response. Although it had been reported that infection of intestinal cell lines with C. parvum leads to host cell death, the mechanisms of cytolysis have not been characterized. We show here that infection with C. parvum leads to typical apoptotic nuclear condensation and DNA fragmentation in host cells. Both nuclear condensation and DNA fragmentation are inhibited by a caspase inhibitor, showing that caspases are involved in this type of apoptosis. Finally, blocking …

Programmed cell deathImmunologyCryptosporidiosisApoptosisDNA FragmentationCysteine Proteinase InhibitorsMicrobiologyCaspase-Dependent ApoptosisAmino Acid Chloromethyl KetonesCell LineImmune systemparasitic diseasesAnimalsHumansComputingMilieux_MISCELLANEOUSCaspaseCryptosporidium parvumbiologybiology.organism_classificationCaspase InhibitorsVirologyCytolysisPOUVOIR PATHOGENE[SDV.MP]Life Sciences [q-bio]/Microbiology and ParasitologyInfectious DiseasesCryptosporidium parvumMicroscopy FluorescenceApoptosisCaspasesbiology.proteinDNA fragmentationHeLa CellsMicrobes and Infection
researchProduct

From Requirements to Code in a Model Driven Way

2010

Though there is a lot of support for model driven development the support for complete model driven path from requirements to code is limited. The approach proposed in this paper offers such a path which is fully supported by model transformations. The starting point is semiformal requirements containing behaviour description in a controlled natural language. A chain of models is proposed including analysis, platform independent and platform specific models. A particular architecture style is chosen by means of selecting a set of appropriate design patterns for these models. It is shown how to define informally and then implement in model transformation language MOLA the required transforma…

Programming languageComputer sciencecomputer.software_genrelanguage.human_languageSet (abstract data type)Controlled natural languageUnified Modeling LanguagePath (graph theory)Software design patternCode (cryptography)languagePoint (geometry)computerAlgorithmModel transformation languagecomputer.programming_language
researchProduct

Statechart-based design controllers for FPGA partial reconfiguration

2015

Statechart diagram and UML technique can be a vital part of early conceptual modeling. At the present time there is no much support in hardware design methodologies for reconfiguration features of reprogrammable devices. Authors try to bridge the gap between imprecise UML model and formal HDL description. The key concept in author's proposal is to describe the behavior of the digital controller by statechart diagrams and to map some parts of the behavior into reprogrammable logic by means of group of states which forms sequential automaton. The whole process is illustrated by the example with experimental results.

Programming languageProcess (engineering)Computer scienceControl reconfigurationcomputer.software_genreAutomatonLogic synthesisUnified Modeling LanguageComputer architectureKey (cryptography)Digital controlField-programmable gate arraycomputercomputer.programming_languagePhotonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2015
researchProduct

Speculation on whether a vaccine against cryptosporidiosis is a reality or fantasy

1999

In this paper the authors question whether the development of a vaccine against cryptosporidiosis could be taken into consideration. The necessity and feasibility of such a vaccine for human and veterinary application is discussed. Developmental stages within the life cycle of the parasite that might act as possible targets for vaccine development are summarised, as well as the target antigens offered by molecular biology and immunology studies. Vaccination trials against cryptosporidiosis carried out so far, including the active and passive immunisation approach, are also overviewed. It seems that with respect to a Cryptosporidium vaccine two target groups can be considered: children of th…

Protozoan VaccinesRuminantCloneProtozoan ProteinsTarget groupsCryptosporidiosisRuminant animalArticleImmunityAnimalsHumansImmune responseSpeculationCryptosporidium parvumbiologyCryptosporidiumbiology.organism_classificationVaccinationInfectious DiseasesCryptosporidium parvumAntigenApical organellesPassive immunisationImmunologyParasitologyVaccineHumanInternational Journal for Parasitology
researchProduct

Quantum Security Proofs Using Semi-classical Oracles

2019

We present an improved version of the one-way to hiding (O2H) Theorem by Unruh, J ACM 2015. Our new O2H Theorem gives higher flexibility (arbitrary joint distributions of oracles and inputs, multiple reprogrammed points) as well as tighter bounds (removing square-root factors, taking parallelism into account). The improved O2H Theorem makes use of a new variant of quantum oracles, semi-classical oracles, where queries are partially measured. The new O2H Theorem allows us to get better security bounds in several public-key encryption schemes.

Provable securityFlexibility (engineering)Post-quantum cryptographyTheoretical computer scienceComputer sciencebusiness.industry0102 computer and information sciences02 engineering and technologyMathematical proofEncryption01 natural sciencesPublic-key cryptographyUnruh effect010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringParallelism (grammar)020201 artificial intelligence & image processingbusiness
researchProduct

On the collision property of chaotic iterations based post-treatments over cryptographic pseudorandom number generators

2018

International audience; There is not a proper mathematical definition of chaos, we have instead a quite big amount of definitions, each of one describes chaos in a more or less general context. Taking in account this, it is clear why it is hard to design an algorithm that produce random numbers, a kind of algorithm that could have plenty of concrete appliceautifat (anul)d bions. However we must use a finite state machine (e.g. a laptop) to produce such a sequence of random numbers, thus it is convenient, for obvious reasons, to redefine those aimed sequences as pseudorandom; also problems arise with floating point arithmetic if one wants to recover some real chaotic property (i.e. propertie…

Pseudorandom number generator020203 distributed computingSequenceFinite-state machineDynamical systems theoryComputer science010102 general mathematicsChaotic[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation01 natural sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]0101 mathematicsBoolean functionAlgorithmRandomnessGenerator (mathematics)2018 IEEE Middle East and North Africa Communications Conference (MENACOMM)
researchProduct