Search results for "Cryptography"
showing 10 items of 657 documents
Women as Key Agents in Sustainable Entrepreneurship: A Gender Multigroup Analysis of the SEO-Performance Relationship
2020
Literature points out that the effect of sustainable entrepreneurship on firm performance may be contingent on internal factors, such as top manager characteristics. This paper proposes that the gender of a firm&rsquo
An overview of ecopreneurship, eco-innovation, and the ecological sector
2019
Given the current trend toward a more sustainable and environmentally-friendly economy, the overlap between entrepreneurship and sustainability has become a key research area. Part of this trend is the emergence of ecopreneurial businesses. These businesses are pioneers in using innovation to achieve sustainable growth by exploiting market opportunities. This article presents an overview of the concepts of ecopreneurship, eco-innovation, and the ecological sector. A rigorous review of the literature in this area is presented. The results of this review show the key values and principles that are central to this new stream of research and shed light on opportunities for further research. The…
Standards not that standard
2015
There is a general assent on the key role of standards in Synthetic Biology. In two consecutive letters to this journal, suggestions on the assembly methods for the Registry of standard biological parts have been described. We fully agree with those authors on the need of a more flexible building strategy and we highlight in the present work two major functional challenges standardization efforts have to deal with: the need of both universal and orthogonal behaviors. We provide experimental data that clearly indicate that such engineering requirements should not be taken for granted in Synthetic Biology. Electronic supplementary material The online version of this article (doi:10.1186/s1303…
Back-Propagation Artificial Neural Network for ERP Adoption Cost Estimation
2011
Published version of a chapter in the book: Enterprise information systems, vol 220, part 2, 180-187. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-24355-4_19 Small and medium size enterprises (SMEs) are greatly affected by cost escalations and overruns Reliable cost factors estimation and management is a key for the success of Enterprise Resource Planning (ERP) systems adoptions in enterprises generally and SMEs specifically. This research area is still immature and needs a considerable amount of research to seek solid and realistic cost factors estimation. Majority of research in this area targets the enhancement of estimates calculated by COCOMO family models.…
Enhancing TIR Image Resolution via Bayesian Smoothing for IRRISAT Irrigation Management Project
2013
Accurate estimation of physical quantities depends on the availability of High Resolution (HR) observations of the Earth surface. However, due to the unavoidable tradeoff between spatial and time resolution, the acquisition instants of HR data hardly coincides with those required by the estimation algorithms. A possible solution consists in constructing a synthetic HR observation at a given time k by exploiting Low Resolution (LR) and HR data acquired at different instants. In this work we recast this issue as a smoothing problem, thus focusing on cases in which observations acquired both before and after time k are available. The proposed approach is validated on a region of interest for t…
smatr 3 - an R package for estimation and inference about allometric lines
2011
Summary 1. The Standardised Major Axis Tests and Routines (SMATR) software provides tools for estimation and inference about allometric lines, currently widely used in ecology and evolution. 2. This paper describes some significant improvements to the functionality of the package, now available on R in smatr version 3. 3. New inclusions in the package include sma and ma functions that accept formula input and perform the key inference tasks; multiple comparisons; graphical methods for visualising data and checking (S)MA assumptions; robust (S)MA estimation and inference tools.
A robust blind 3-D mesh watermarking based on wavelet transform for copyright protection
2019
Nowadays, three-dimensional meshes have been extensively used in several applications such as, industrial, medical, computer-aided design (CAD) and entertainment due to the processing capability improvement of computers and the development of the network infrastructure. Unfortunately, like digital images and videos, 3-D meshes can be easily modified, duplicated and redistributed by unauthorized users. Digital watermarking came up while trying to solve this problem. In this paper, we propose a blind robust watermarking scheme for three-dimensional semiregular meshes for Copyright protection. The watermark is embedded by modifying the norm of the wavelet coefficient vectors associated with th…
Finding optimal finite biological sequences over finite alphabets: the OptiFin toolbox
2017
International audience; In this paper, we present a toolbox for a specific optimization problem that frequently arises in bioinformatics or genomics. In this specific optimisation problem, the state space is a set of words of specified length over a finite alphabet. To each word is associated a score. The overall objective is to find the words which have the lowest possible score. This type of general optimization problem is encountered in e.g 3D conformation optimisation for protein structure prediction, or largest core genes subset discovery based on best supported phylogenetic tree for a set of species. In order to solve this problem, we propose a toolbox that can be easily launched usin…
On the Inner Product Predicate and a Generalization of Matching Vector Families
2018
Motivated by cryptographic applications such as predicate encryption, we consider the problem of representing an arbitrary predicate as the inner product predicate on two vectors. Concretely, fix a Boolean function $P$ and some modulus $q$. We are interested in encoding $x$ to $\vec x$ and $y$ to $\vec y$ so that $$P(x,y) = 1 \Longleftrightarrow \langle\vec x,\vec y\rangle= 0 \bmod q,$$ where the vectors should be as short as possible. This problem can also be viewed as a generalization of matching vector families, which corresponds to the equality predicate. Matching vector families have been used in the constructions of Ramsey graphs, private information retrieval (PIR) protocols, and mor…
Security Requirements, Counterattacks and Projects in Healthcare Applications Using WSNs - A Review
2014
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcar…