Search results for "Cryptography"

showing 10 items of 657 documents

ARTIFICIAL INTELLIGENCE VS DESIGNER: THE IMPACT OF ARTIFICIAL INTELLIGENCE ON DESIGN PRACTICE

2021

Technological advances, including the use of possibilities offered by artificial intelligence (AI), have become an area of strategic importance and a key driver of economic development. AI today has been integrated into a variety of economies, the design industry is no exception: AI is being increasingly applied in the development of design products and services. However, as technological breakthroughs rapidly shift the borders between the work tasks performed by humans and those performed by machines and algorithms, global labor markets are undergoing major transformations. This raises the question: how are these changes affecting and will continue to affect designers’ work in the future? …

Work (electrical)business.industryComputer scienceInternet resourcesartificial intelligence designer future case studyKey (cryptography)Artificial intelligencebusinessProfessional activityVariety (cybernetics)Skill setsTest (assessment)SOCIETY. INTEGRATION. EDUCATION. Proceedings of the International Scientific Conference
researchProduct

Critical Influence of Dielectric Sensitive Material and Manufactured Process in Microwave Gas-Sensing: Application of Ammonia Detection with an Inter…

2020

In this paper, authors propose a study on microwave gas sensors and the influence of critical key parameters such as the sensitive material and the circuit conception process. This work aims to determine the influence of these parameters on the quality of the final response of the microwave gas sensor. The fixed geometry of the sensor is a microstrip interdigital capacitor coated with a sensitive layer excited with two 50 Ω SMA ports. The sensitive material has been chosen in order to interact with the target gas: ammonia. Indeed, this gas interacts with phthalocyanine and metal oxides like hematite, TiO2. To explore the effect of the circuit manufacturing process, three series of samples a…

Work (thermodynamics)Materials sciencebusiness.industryGeneral Chemical EngineeringProcess (computing)General ChemistryDielectricArticleChemistryAmmoniachemistry.chemical_compoundchemistryHardware_INTEGRATEDCIRCUITSKey (cryptography)Process engineeringbusinessQD1-999MicrowaveACS Omega
researchProduct

Swoop: A Web Ontology Editing Browser

2006

In this paper, we describe Swoop, a hypermedia inspired Ontology Browser and Editor based on OWL, the recently standardized Web-oriented ontology language. After discussing the design rationale and architecture of Swoop, we focus mainly on its features, using illustrative examples to highlight its use. We demonstrate that with its web-metaphor, adherence to OWL recommendations and key unique features such as Collaborative Annotation using Annotea, Swoop acts as a useful and efficient web ontology development tool. We conclude with a list of future plans for Swoop, that should further increase its overall appeal and accessibility.

World Wide WebAnnotationDesign rationaleComputer sciencelawKey (cryptography)AnnoteaHypermediaArchitectureOntology (information science)Ontology languagelaw.inventionSSRN Electronic Journal
researchProduct

Internet – Technical Development and Applications

2009

Internet technologies and systems are nowadays the key enablers of digital economy and modern world-wide connected society. This contributed book is a collection of cautiously chosen articles delivered by specialists with significant level of expertise in the domain of Internet technical foundations and its applications. The content of the book is divided into three parts: Internet - technical fundamentals and applications Information management systems Information security in distributed computer systems This book is a reference tool prepared for scientists and other persons involved in designing, implementation and evaluation of internet technologies. Its readers can be found among resear…

World Wide WebEngineeringManagement information systemsbusiness.industryKey (cryptography)The InternetDigital economyInformation securitybusinessDomain (software engineering)
researchProduct

The Many Faces of Interactivity in Convergent Media Environments. Assessing Uses and Effects of Interactivity from a User and Management Perspective

2013

Digitization has blurred the distinctions between producers and audiences. Thus, research on interactivity as a key element of convergent media environments has grown dramatically over the past three decades. However, despite this strong research interest there is currently no consensus about the multi-faced and hard-to-grasp concept. Obviously, interactivity is used to describe numerous processes in convergent media environments that are related to communication in general, and online communication and practices like online journalism in particular. This article highlights the main strands in the conceptual development of interactivity and explores some of the effects of interactivity by s…

World Wide WebInteractivityComputer sciencePerspective (graphical)Key (cryptography)Business valueElement (criminal law)DigitizationNewspaperBrand loyalty
researchProduct

A mobile agent tool for resource discovery

2004

Publisher Summary This chapter discusses a mobile agent based tool for arranging communities whose members want to share computing resources. Such a tool enables community members to arrange their own parallel virtual machine, using resources available within the community. Mobile agents are used to search among available addresses inside the community, and are instructed to select the ones which correspond to the users' requirements. The agent is the key component of the system, because it takes care of the server availability test and of the decision on whether to include them into the virtual machine, according to the user's requirements. The database acts as an intermediary between the …

World Wide WebResource (project management)Point (typography)Virtual machineComputer scienceServerComponent (UML)Key (cryptography)Window (computing)Mobile agentcomputer.software_genrecomputer
researchProduct

Context-aware summary generation for Web pages

2009

General purpose search engines provide users with lists of retrieved documents in response to their queries. The common structure of list elements includes the title of a document, its URL, and small snippet from the text. Snippets are evidence of occurrences of query's keywords in the document. The length of each snippet is just a couple of lines. They cannot play a role of summaries of retrieved documents: In many cases, they are not indicative and users cannot judge on the relevancy of documents. In our approach we use ontology as context description and that ontology will be used to describe user's main interest with respect to wanted summary and help to select weighting of key words an…

World Wide WebStructure (mathematical logic)Information retrievalComputer scienceInformationSystems_INFORMATIONSTORAGEANDRETRIEVALWeb pageComputingMethodologies_DOCUMENTANDTEXTPROCESSINGKey (cryptography)Context (language use)ThesaurusDocument retrievalSnippetOntology (information science)2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

Semantic-based Merging of RSS Items

2009

Merging XML documents can be of key importance in several applications. For instance, merging the RSS news from same or different sources and providers can be beneficial for end-users in various scenarios. In this paper, we address this issue and explore the relatedness measure between RSS elements. We show here how to define and compute exclusive relations between any two elements and provide several predefined merging operators that can be extended and adapted to human needs. We also provide a set of experiments conducted to validate our approach. © Springer Science+Business Media, LLC 2009.

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer Networks and CommunicationsComputer sciencecomputer.internet_protocolRSS[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer science02 engineering and technologycomputer.software_genreClusteringMergingSet (abstract data type)[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Cluster analysisComputingMilieux_MISCELLANEOUS[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM]Measure (data warehouse)[INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Document relatedne[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]computer.file_formatRSSMerging operator[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Hardware and Architecture[ SCCO.COMP ] Cognitive science/Computer science[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR]Key (cryptography)020201 artificial intelligence & image processingData mining[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]computerSoftwareXML
researchProduct

Detecting Inference Channels in Private Multimedia Data via Social Networks

2009

International audience; Indirect access to protected information has been one of the key challenges facing the international community for the last decade. Providing techniques to control direct access to sensitive information remain insufficient against inference channels established when legitimate data reveal classified facts hidden from unauthorized users. Several techniques have been proposed in the literature to meet indirect access prevention. However, those addressing the inference problem when involving multimedia objects (images, audio, video, etc.) remain few and hold several drawbacks. In essence, the complex structure of multimedia objects makes the fact of detecting indirect a…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer sciencemedia_common.quotation_subject[ INFO.INFO-WB ] Computer Science [cs]/WebInference[SCCO.COMP]Cognitive science/Computer scienceAccess control02 engineering and technologycomputer.software_genre01 natural sciences010104 statistics & probability[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]0101 mathematicsSet (psychology)Function (engineering)media_common[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM]Structure (mathematical logic)[INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Social networkMultimediabusiness.industry[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]Information sensitivity[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer scienceKey (cryptography)[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]businesscomputer
researchProduct