Search results for "Cryptography"

showing 10 items of 657 documents

Women as Key Agents in Sustainable Entrepreneurship: A Gender Multigroup Analysis of the SEO-Performance Relationship

2020

Literature points out that the effect of sustainable entrepreneurship on firm performance may be contingent on internal factors, such as top manager characteristics. This paper proposes that the gender of a firm&rsquo

Entrepreneurial orientationlcsh:TJ807-830Geography Planning and Developmentlcsh:Renewable energy sourcesDonesManagement Monitoring Policy and LawEmpirical research0502 economics and businessGender analysisMarketingChief executive officerlcsh:Environmental scienceslcsh:GE1-350Economia Aspectes sociològicsgender analysisRenewable Energy Sustainability and the Environmentlcsh:Environmental effects of industries and plantssustainable entrepreneurial orientation05 social sciencesModerationfirm performanceStratified samplinglcsh:TD194-195Key (cryptography)050211 marketingSustainable entrepreneurshipBusinesssustainable entrepreneurship050203 business & management
researchProduct

An overview of ecopreneurship, eco-innovation, and the ecological sector

2019

Given the current trend toward a more sustainable and environmentally-friendly economy, the overlap between entrepreneurship and sustainability has become a key research area. Part of this trend is the emergence of ecopreneurial businesses. These businesses are pioneers in using innovation to achieve sustainable growth by exploiting market opportunities. This article presents an overview of the concepts of ecopreneurship, eco-innovation, and the ecological sector. A rigorous review of the literature in this area is presented. The results of this review show the key values and principles that are central to this new stream of research and shed light on opportunities for further research. The…

EntrepreneurshipGeography Planning and DevelopmentTJ807-830Medi ambient Proteccióecopreneurship010501 environmental sciencesManagement Monitoring Policy and LawTD194-19501 natural sciencesRenewable energy sources0502 economics and businesseco-innovationGE1-350Eco-innovation0105 earth and related environmental sciencesEnvironmental effects of industries and plantsRenewable Energy Sustainability and the EnvironmentEcology05 social sciencesBuilding and ConstructionsustainabilityEnvironmental sciencesNegocisSustainabilityKey (cryptography)ecological sectorBusinessSustainable growth rateenvironment050203 business & management
researchProduct

Standards not that standard

2015

There is a general assent on the key role of standards in Synthetic Biology. In two consecutive letters to this journal, suggestions on the assembly methods for the Registry of standard biological parts have been described. We fully agree with those authors on the need of a more flexible building strategy and we highlight in the present work two major functional challenges standardization efforts have to deal with: the need of both universal and orthogonal behaviors. We provide experimental data that clearly indicate that such engineering requirements should not be taken for granted in Synthetic Biology. Electronic supplementary material The online version of this article (doi:10.1186/s1303…

Environmental EngineeringStandardizationOrthogonality (programming)Requirements engineeringComputer scienceBiomedical EngineeringExperimental dataCell BiologyData scienceStandardizationSynthetic biologyWork (electrical)Key (cryptography)Registry of Standard Biological PartsBiobrick partsOrthogonalityLetters to the EditorMolecular BiologySynthetic biologyJournal of Biological Engineering
researchProduct

Back-Propagation Artificial Neural Network for ERP Adoption Cost Estimation

2011

Published version of a chapter in the book: Enterprise information systems, vol 220, part 2, 180-187. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-24355-4_19 Small and medium size enterprises (SMEs) are greatly affected by cost escalations and overruns Reliable cost factors estimation and management is a key for the success of Enterprise Resource Planning (ERP) systems adoptions in enterprises generally and SMEs specifically. This research area is still immature and needs a considerable amount of research to seek solid and realistic cost factors estimation. Majority of research in this area targets the enhancement of estimates calculated by COCOMO family models.…

EstimationERP cost estimation neural networks SMEsCost estimateArtificial neural networkFactor costbusiness.industryCOCOMOComputer scienceMachine learningcomputer.software_genreRisk analysis (engineering)Key (cryptography)Information systemVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321Artificial intelligencebusinesscomputerEnterprise resource planning
researchProduct

Enhancing TIR Image Resolution via Bayesian Smoothing for IRRISAT Irrigation Management Project

2013

Accurate estimation of physical quantities depends on the availability of High Resolution (HR) observations of the Earth surface. However, due to the unavoidable tradeoff between spatial and time resolution, the acquisition instants of HR data hardly coincides with those required by the estimation algorithms. A possible solution consists in constructing a synthetic HR observation at a given time k by exploiting Low Resolution (LR) and HR data acquired at different instants. In this work we recast this issue as a smoothing problem, thus focusing on cases in which observations acquired both before and after time k are available. The proposed approach is validated on a region of interest for t…

EstimationIrrigation Managementbusiness.industrySettore ICAR/02 - Costruzioni Idrauliche E Marittime E IdrologiaBrightness TemperatureBayesian SmoothingThermal SharpeningBayesian smoothingGeographyRegion of interestMultitemporal AnalysiKey (cryptography)thermal infraredComputer visionArtificial intelligencebusinessIrrigation managementImage resolutionAlgorithmMultisensor Data FusionSmoothingSettore ICAR/06 - Topografia E CartografiaPhysical quantity
researchProduct

smatr 3 - an R package for estimation and inference about allometric lines

2011

Summary 1. The Standardised Major Axis Tests and Routines (SMATR) software provides tools for estimation and inference about allometric lines, currently widely used in ecology and evolution. 2. This paper describes some significant improvements to the functionality of the package, now available on R in smatr version 3. 3. New inclusions in the package include sma and ma functions that accept formula input and perform the key inference tasks; multiple comparisons; graphical methods for visualising data and checking (S)MA assumptions; robust (S)MA estimation and inference tools.

Estimationbusiness.industryComputer scienceEcological ModelingInferencecomputer.software_genreR packageSoftwareMultiple comparisons problemPrincipal component analysisKey (cryptography)Data miningAllometrybusinesscomputerEcology Evolution Behavior and SystematicsMethods in Ecology and Evolution
researchProduct

A robust blind 3-D mesh watermarking based on wavelet transform for copyright protection

2019

Nowadays, three-dimensional meshes have been extensively used in several applications such as, industrial, medical, computer-aided design (CAD) and entertainment due to the processing capability improvement of computers and the development of the network infrastructure. Unfortunately, like digital images and videos, 3-D meshes can be easily modified, duplicated and redistributed by unauthorized users. Digital watermarking came up while trying to solve this problem. In this paper, we propose a blind robust watermarking scheme for three-dimensional semiregular meshes for Copyright protection. The watermark is embedded by modifying the norm of the wavelet coefficient vectors associated with th…

FOS: Computer and information sciences0209 industrial biotechnologyComputer sciencevideo watermarking02 engineering and technologyWatermarkingimage watermarking020901 industrial engineering & automationWaveletcopy protectionvectorsRobustness (computer science)Computer Science::Multimedia0202 electrical engineering electronic engineering information engineeringwavelet coefficient vectorsControlled IndexingComputer visionPolygon meshQuantization (image processing)RobustnessDigital watermarkingComputingMilieux_MISCELLANEOUSComputer Science::Cryptography and SecurityQuantization (signal)digital watermarkingbusiness.industrycopyrightedge normal normsWavelet transformunauthorized usersWatermarkThree-dimensional meshesMultimedia (cs.MM)mesh generationwavelet transformssynchronizing primitives3D semiregular meshesSolid modelingrobust blind 3D mesh watermarking020201 artificial intelligence & image processingArtificial intelligenceLaplacian smoothingbusinessCopyright protection[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingComputer Science - Multimediaimage resolutionDigital images
researchProduct

Finding optimal finite biological sequences over finite alphabets: the OptiFin toolbox

2017

International audience; In this paper, we present a toolbox for a specific optimization problem that frequently arises in bioinformatics or genomics. In this specific optimisation problem, the state space is a set of words of specified length over a finite alphabet. To each word is associated a score. The overall objective is to find the words which have the lowest possible score. This type of general optimization problem is encountered in e.g 3D conformation optimisation for protein structure prediction, or largest core genes subset discovery based on best supported phylogenetic tree for a set of species. In order to solve this problem, we propose a toolbox that can be easily launched usin…

FOS: Computer and information sciences0301 basic medicineTheoretical computer scienceOptimization problemComputer Science - Artificial IntelligenceComputer science[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Quantitative Biology - Quantitative MethodsSet (abstract data type)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing03 medical and health sciences[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]State spaceMetaheuristicQuantitative Methods (q-bio.QM)Protein structure prediction[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationToolboxCore (game theory)Artificial Intelligence (cs.AI)030104 developmental biology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]FOS: Biological sciences[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Word (computer architecture)
researchProduct

On the Inner Product Predicate and a Generalization of Matching Vector Families

2018

Motivated by cryptographic applications such as predicate encryption, we consider the problem of representing an arbitrary predicate as the inner product predicate on two vectors. Concretely, fix a Boolean function $P$ and some modulus $q$. We are interested in encoding $x$ to $\vec x$ and $y$ to $\vec y$ so that $$P(x,y) = 1 \Longleftrightarrow \langle\vec x,\vec y\rangle= 0 \bmod q,$$ where the vectors should be as short as possible. This problem can also be viewed as a generalization of matching vector families, which corresponds to the equality predicate. Matching vector families have been used in the constructions of Ramsey graphs, private information retrieval (PIR) protocols, and mor…

FOS: Computer and information sciences060201 languages & linguistics000 Computer science knowledge general worksComputer Science - Cryptography and Security06 humanities and the arts02 engineering and technologyComputational Complexity (cs.CC)Computer Science - Computational Complexity0602 languages and literatureComputer ScienceFOS: Mathematics0202 electrical engineering electronic engineering information engineeringMathematics - Combinatorics020201 artificial intelligence & image processingCombinatorics (math.CO)Cryptography and Security (cs.CR)
researchProduct

Security Requirements, Counterattacks and Projects in Healthcare Applications Using WSNs - A Review

2014

Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcar…

FOS: Computer and information sciencesComputer Science - Computers and SocietyComputer Science - Cryptography and SecurityComputers and Society (cs.CY)Cryptography and Security (cs.CR)
researchProduct