Search results for "Cryptography"
showing 10 items of 657 documents
INNOVATIVE PERFORMANCE AND INNOVATION SYSTEM OF LATVIA
2021
The research andanalysis of strengths and weaknesses of national innovation system is extremelyimportant to successful and efficient innovation support policymaking.Innovation support policies should take into consideration all specifies ofnational innovation system in the country, not being one-size-fits-all. Untilnow, little analysis on the Latvian innovation system was made. The paper aimsto show Latvian innovative performance and to propose factors forwell-functioning innovation system of Latvia. This research gives apossibility to researchers and policy-makers to investigate the mismatchbetween policies and problems and identify policy gaps. KEY WORDS: innovativeperformance, innovation…
Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies
2009
The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many u…
A New Genetic Approach for the Partitioning Problem in Distributed Virtual Environment Systems
2004
The Partitioning problem is a key issue in the design of Distributed Virtual Environment (DVE) systems based on a server-network architecture. This problem consist of efficiently assigning the clients of the simulation (avatars) to the system servers. Despite the existing literature proposes different evolutive approaches for solving this NP-hard problem, an approach based on genetic algorithms is considered as the current best partitioning mechanism.
Non-linear neuro-inspired circuits and systems: Processing and learning issues
2018
In this chapter the main elements useful for the design and realization of the neural architectures reported in the following chapters will be presented. Considering spiking and non-spiking neurons, the models used for implementing each of them, the synaptic models, the basic learning and plasticity algorithms and the network architectures will be introduced and analysed. The key elements that led to their selection and application in the developed neuro-inspired systems will be discussed briefly.
Internet of Autonomous Vehicles: Architecture, Features, and Socio-Technological Challenges
2019
Mobility is the backbone of urban life and a vital economic factor in the development of the world. Rapid urbanization and the growth of mega-cities is bringing dramatic changes in the capabilities of vehicles. Innovative solutions like autonomy, electrification, and connectivity are on the horizon. How, then, we can provide ubiquitous connectivity to the legacy and autonomous vehicles? This paper seeks to answer this question by combining recent leaps of innovation in network virtualization with remarkable feats of wireless communications. To do so, this paper proposes a novel paradigm called the Internet of autonomous vehicles (IoAV). We begin painting the picture of IoAV by discussing th…
A code to calculate (high order) Bessel functions based on the continued fractions method
1993
Abstract We have developed a fast code to calculate Bessel functions of integer and fractional order based on the continued fractions method. This algorithm is specially useful in the case of Bessel functions of high order because it does not require any recalculation using normalization relations.
A Novel Technique for Fingerprint Classification based on Fuzzy C-Means and Naive Bayes Classifier
2014
Fingerprint classification is a key issue in automatic fingerprint identification systems. One of the main goals is to reduce the item search time within the fingerprint database without affecting the accuracy rate. In this paper, a novel technique, based on topological information, for efficient fingerprint classification is described. The proposed system is composed of two independent modules: the former module, based on Fuzzy C-Means, extracts the best set of training images, the latter module, based on Fuzzy C-Means and Naive Bayes classifier, assigns a class to each processed fingerprint using only directional image information. The proposed approach does not require any image enhancem…
Analyses of single- and two-phase flow pressure drops in helical pipes using a modified RELAP5 code
2012
Abstract Thermal fluid dynamics analyses on single- and two-phase flows in helical pipes of steam generators to be used in Generation III and IV nuclear reactors have been performed. The study concerned with experimental activities as well code simulations carried out in the framework of a collaboration between the Department of Energetics of the Polytechnic of Torino and the Department of Energy of the University of Palermo. The goal was the validation of models implemented in Relap5/Mod3.2β thermal–hydraulic advanced code to simulate the hydrodynamic behaviour of helical pipe components in spite of the one-dimensional nature of the code. It is shown that much of the experimental data obta…
From the Reference SEU Monitor to the Technology Demonstration Module On-Board PROBA-II
2008
The reference SEU Monitor system designed and presented in 2005 (R. H. SOslashrensen, F.-X. Guerre, and A. Roseng ldquoDesign, testing and calibration of a reference SEU monitor system,rdquo in Proc. RADECS, 2005, pp. B3-1-B3-7) has now been used by many researchers at many radiation test sites and has provided valuable calibration data in support of numerous projects. As some of these findings and results give new insight into improved inter-facility calibrations and provide additional inputs into ongoing SEE research, a few of the more interesting cases are presented. Furthermore the dasiadetector elementpsila, the Atmel AT60142F SRAM, now in a hybrid configuration, will form the key dete…
Transient analysis of "2 inch Direct Vessel Injection line break" in SPES-2 facility by using TRACE code
2015
In the past few decades a lot of theoretical and experimental researches have been done to understand the physical phenomena characterizing nuclear accidents. In particular, after the Three Miles Island accident, several reactors have been designed to handle successfully LOCA events. This paper presents a comparison between experimental and numerical results obtained for the “2 inch Direct Vessel Injection line break” in SPES-2. This facility is an integral test facility built in Piacenza at the SIET laboratories and simulating the primary circuit, the relevant parts of the secondary circuits and the passive safety systems typical of the AP600 nuclear power plant. The numerical analysis her…