Search results for "Cryptography"

showing 10 items of 657 documents

INNOVATIVE PERFORMANCE AND INNOVATION SYSTEM OF LATVIA

2021

The research andanalysis of strengths and weaknesses of national innovation system is extremelyimportant to successful and efficient innovation support policymaking.Innovation support policies should take into consideration all specifies ofnational innovation system in the country, not being one-size-fits-all. Untilnow, little analysis on the Latvian innovation system was made. The paper aimsto show Latvian innovative performance and to propose factors forwell-functioning innovation system of Latvia. This research gives apossibility to researchers and policy-makers to investigate the mismatchbetween policies and problems and identify policy gaps. KEY WORDS: innovativeperformance, innovation…

National innovation systemProcess managementKey (cryptography)languageGeneral Earth and Planetary SciencesLatvianOperations managementBusinessInnovation systemStrengths and weaknesseslanguage.human_languageGeneral Environmental ScienceRegional Formation and Development Studies
researchProduct

Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies

2009

The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many u…

National securityDatabases FactualMedical Records Systems ComputerizedComputer scienceOpen grid services architecture (OGSA)Information Storage and RetrievalData securityCryptographycomputer.software_genreEncryptionComputer securityAccess to InformationOntologiesCIENCIAS DE LA COMPUTACION E INTELIGENCIA ARTIFICIALHumansElectrical and Electronic EngineeringGridComputer SecurityInternetbusiness.industryAuthorizationGeneral MedicineInformation securityGridComputer Science ApplicationsGrid computingPrivacyScalabilityKey (cryptography)SecurityDatabase Management SystemsbusinessWeb service resource framework (WSRF)computerLENGUAJES Y SISTEMAS INFORMATICOSConfidentialityBiotechnology
researchProduct

A New Genetic Approach for the Partitioning Problem in Distributed Virtual Environment Systems

2004

The Partitioning problem is a key issue in the design of Distributed Virtual Environment (DVE) systems based on a server-network architecture. This problem consist of efficiently assigning the clients of the simulation (avatars) to the system servers. Despite the existing literature proposes different evolutive approaches for solving this NP-hard problem, an approach based on genetic algorithms is considered as the current best partitioning mechanism.

Network architectureComputer scienceVirtual machinebusiness.industryServerDistributed computingGenetic algorithmKey (cryptography)Artificial intelligenceVirtual realitycomputer.software_genrebusinesscomputer
researchProduct

Non-linear neuro-inspired circuits and systems: Processing and learning issues

2018

In this chapter the main elements useful for the design and realization of the neural architectures reported in the following chapters will be presented. Considering spiking and non-spiking neurons, the models used for implementing each of them, the synaptic models, the basic learning and plasticity algorithms and the network architectures will be introduced and analysed. The key elements that led to their selection and application in the developed neuro-inspired systems will be discussed briefly.

Network architectureQuantitative Biology::Neurons and Cognitionbusiness.industryComputer scienceReservoir computingEnergy Engineering and Power TechnologyNonlinear systemBasic learningEngineering (all)Key (cryptography)Selection (linguistics)Mathematics (all)Biotechnology; Chemical Engineering (all); Mathematics (all); Materials Science (all); Energy Engineering and Power Technology; Engineering (all)Chemical Engineering (all)Artificial intelligenceMaterials Science (all)businessRealization (systems)Electronic circuitBiotechnology
researchProduct

Internet of Autonomous Vehicles: Architecture, Features, and Socio-Technological Challenges

2019

Mobility is the backbone of urban life and a vital economic factor in the development of the world. Rapid urbanization and the growth of mega-cities is bringing dramatic changes in the capabilities of vehicles. Innovative solutions like autonomy, electrification, and connectivity are on the horizon. How, then, we can provide ubiquitous connectivity to the legacy and autonomous vehicles? This paper seeks to answer this question by combining recent leaps of innovation in network virtualization with remarkable feats of wireless communications. To do so, this paper proposes a novel paradigm called the Internet of autonomous vehicles (IoAV). We begin painting the picture of IoAV by discussing th…

Networking and Internet Architecture (cs.NI)Signal Processing (eess.SP)FOS: Computer and information sciencesbusiness.industryComputer scienceMultitier architectureNetwork virtualization020206 networking & telecommunications02 engineering and technologyEnergy consumptionData scienceComputer Science ApplicationsComputer Science - Networking and Internet ArchitectureComputer Science - Computers and SocietySalientComputers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringKey (cryptography)FOS: Electrical engineering electronic engineering information engineeringThe InternetElectrical and Electronic EngineeringArchitectureElectrical Engineering and Systems Science - Signal ProcessingbusinessLEAPS
researchProduct

A code to calculate (high order) Bessel functions based on the continued fractions method

1993

Abstract We have developed a fast code to calculate Bessel functions of integer and fractional order based on the continued fractions method. This algorithm is specially useful in the case of Bessel functions of high order because it does not require any recalculation using normalization relations.

Normalization (statistics)symbols.namesakeComputer programHardware and ArchitectureComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATIONMathematical analysissymbolsCode (cryptography)General Physics and AstronomyHigh orderBessel functionMathematicsComputer Physics Communications
researchProduct

A Novel Technique for Fingerprint Classification based on Fuzzy C-Means and Naive Bayes Classifier

2014

Fingerprint classification is a key issue in automatic fingerprint identification systems. One of the main goals is to reduce the item search time within the fingerprint database without affecting the accuracy rate. In this paper, a novel technique, based on topological information, for efficient fingerprint classification is described. The proposed system is composed of two independent modules: the former module, based on Fuzzy C-Means, extracts the best set of training images, the latter module, based on Fuzzy C-Means and Naive Bayes classifier, assigns a class to each processed fingerprint using only directional image information. The proposed approach does not require any image enhancem…

Novel techniqueSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer sciencebusiness.industryPattern recognitioncomputer.software_genreClass (biology)Fuzzy logicImage (mathematics)Set (abstract data type)Naive Bayes classifierFingerprintKey (cryptography)Artificial intelligenceData miningbusinessFingerprint Classification Directional Images Fuzzy C-Means Naive Bayes Classifiercomputer
researchProduct

Analyses of single- and two-phase flow pressure drops in helical pipes using a modified RELAP5 code

2012

Abstract Thermal fluid dynamics analyses on single- and two-phase flows in helical pipes of steam generators to be used in Generation III and IV nuclear reactors have been performed. The study concerned with experimental activities as well code simulations carried out in the framework of a collaboration between the Department of Energetics of the Polytechnic of Torino and the Department of Energy of the University of Palermo. The goal was the validation of models implemented in Relap5/Mod3.2β thermal–hydraulic advanced code to simulate the hydrodynamic behaviour of helical pipe components in spite of the one-dimensional nature of the code. It is shown that much of the experimental data obta…

Nuclear and High Energy PhysicsEngineeringHydraulicsNuclear engineeringMechanical engineeringReattori nucleari innovativiGeneratori di vapore elicoidalilaw.inventionThermal hydraulicsTUBESlawThermalFluid dynamicsCode (cryptography)General Materials ScienceSafety Risk Reliability and QualityWaste Management and DisposalSettore ING-IND/19 - Impianti NucleariTWO PHASEPressure dropbusiness.industryMechanical EngineeringRELAP5/MOD3.2Fluid mechanicsGeneratori di vapore elicoidali; Reattori nucleari innovativiNuclear Energy and EngineeringHELICOIDAL PIPESTwo-phase flowbusiness
researchProduct

From the Reference SEU Monitor to the Technology Demonstration Module On-Board PROBA-II

2008

The reference SEU Monitor system designed and presented in 2005 (R. H. SOslashrensen, F.-X. Guerre, and A. Roseng ldquoDesign, testing and calibration of a reference SEU monitor system,rdquo in Proc. RADECS, 2005, pp. B3-1-B3-7) has now been used by many researchers at many radiation test sites and has provided valuable calibration data in support of numerous projects. As some of these findings and results give new insight into improved inter-facility calibrations and provide additional inputs into ongoing SEE research, a few of the more interesting cases are presented. Furthermore the dasiadetector elementpsila, the Atmel AT60142F SRAM, now in a hybrid configuration, will form the key dete…

Nuclear and High Energy PhysicsEngineeringbusiness.industryDetectorOn boardRadiation testingNuclear Energy and EngineeringSingle event upsetCalibrationKey (cryptography)Electronic engineeringSatelliteStatic random-access memoryElectrical and Electronic EngineeringbusinessComputer hardwareIEEE Transactions on Nuclear Science
researchProduct

Transient analysis of "2 inch Direct Vessel Injection line break" in SPES-2 facility by using TRACE code

2015

In the past few decades a lot of theoretical and experimental researches have been done to understand the physical phenomena characterizing nuclear accidents. In particular, after the Three Miles Island accident, several reactors have been designed to handle successfully LOCA events. This paper presents a comparison between experimental and numerical results obtained for the “2 inch Direct Vessel Injection line break” in SPES-2. This facility is an integral test facility built in Piacenza at the SIET laboratories and simulating the primary circuit, the relevant parts of the secondary circuits and the passive safety systems typical of the AP600 nuclear power plant. The numerical analysis her…

Nuclear power plants -- Design and constructionHistoryEngineeringMathematical modelsbusiness.industryNumerical analysisNuclear engineeringSystem safetyComputer Science ApplicationsEducationlaw.inventionlawNuclear power plantCode (cryptography)Nuclear power plants -- Safety measuresTransient (oscillation)businessSimulationElectronic circuitTRACE (psycholinguistics)Line BreakNumerical analysis
researchProduct