Search results for "Cryptography"
showing 10 items of 657 documents
ARTIFICIAL INTELLIGENCE VS DESIGNER: THE IMPACT OF ARTIFICIAL INTELLIGENCE ON DESIGN PRACTICE
2021
Technological advances, including the use of possibilities offered by artificial intelligence (AI), have become an area of strategic importance and a key driver of economic development. AI today has been integrated into a variety of economies, the design industry is no exception: AI is being increasingly applied in the development of design products and services. However, as technological breakthroughs rapidly shift the borders between the work tasks performed by humans and those performed by machines and algorithms, global labor markets are undergoing major transformations. This raises the question: how are these changes affecting and will continue to affect designers’ work in the future? …
Critical Influence of Dielectric Sensitive Material and Manufactured Process in Microwave Gas-Sensing: Application of Ammonia Detection with an Inter…
2020
In this paper, authors propose a study on microwave gas sensors and the influence of critical key parameters such as the sensitive material and the circuit conception process. This work aims to determine the influence of these parameters on the quality of the final response of the microwave gas sensor. The fixed geometry of the sensor is a microstrip interdigital capacitor coated with a sensitive layer excited with two 50 Ω SMA ports. The sensitive material has been chosen in order to interact with the target gas: ammonia. Indeed, this gas interacts with phthalocyanine and metal oxides like hematite, TiO2. To explore the effect of the circuit manufacturing process, three series of samples a…
Swoop: A Web Ontology Editing Browser
2006
In this paper, we describe Swoop, a hypermedia inspired Ontology Browser and Editor based on OWL, the recently standardized Web-oriented ontology language. After discussing the design rationale and architecture of Swoop, we focus mainly on its features, using illustrative examples to highlight its use. We demonstrate that with its web-metaphor, adherence to OWL recommendations and key unique features such as Collaborative Annotation using Annotea, Swoop acts as a useful and efficient web ontology development tool. We conclude with a list of future plans for Swoop, that should further increase its overall appeal and accessibility.
Internet – Technical Development and Applications
2009
Internet technologies and systems are nowadays the key enablers of digital economy and modern world-wide connected society. This contributed book is a collection of cautiously chosen articles delivered by specialists with significant level of expertise in the domain of Internet technical foundations and its applications. The content of the book is divided into three parts: Internet - technical fundamentals and applications Information management systems Information security in distributed computer systems This book is a reference tool prepared for scientists and other persons involved in designing, implementation and evaluation of internet technologies. Its readers can be found among resear…
The Many Faces of Interactivity in Convergent Media Environments. Assessing Uses and Effects of Interactivity from a User and Management Perspective
2013
Digitization has blurred the distinctions between producers and audiences. Thus, research on interactivity as a key element of convergent media environments has grown dramatically over the past three decades. However, despite this strong research interest there is currently no consensus about the multi-faced and hard-to-grasp concept. Obviously, interactivity is used to describe numerous processes in convergent media environments that are related to communication in general, and online communication and practices like online journalism in particular. This article highlights the main strands in the conceptual development of interactivity and explores some of the effects of interactivity by s…
A mobile agent tool for resource discovery
2004
Publisher Summary This chapter discusses a mobile agent based tool for arranging communities whose members want to share computing resources. Such a tool enables community members to arrange their own parallel virtual machine, using resources available within the community. Mobile agents are used to search among available addresses inside the community, and are instructed to select the ones which correspond to the users' requirements. The agent is the key component of the system, because it takes care of the server availability test and of the decision on whether to include them into the virtual machine, according to the user's requirements. The database acts as an intermediary between the …
Context-aware summary generation for Web pages
2009
General purpose search engines provide users with lists of retrieved documents in response to their queries. The common structure of list elements includes the title of a document, its URL, and small snippet from the text. Snippets are evidence of occurrences of query's keywords in the document. The length of each snippet is just a couple of lines. They cannot play a role of summaries of retrieved documents: In many cases, they are not indicative and users cannot judge on the relevancy of documents. In our approach we use ontology as context description and that ontology will be used to describe user's main interest with respect to wanted summary and help to select weighting of key words an…
Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127
2014
International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…
Semantic-based Merging of RSS Items
2009
Merging XML documents can be of key importance in several applications. For instance, merging the RSS news from same or different sources and providers can be beneficial for end-users in various scenarios. In this paper, we address this issue and explore the relatedness measure between RSS elements. We show here how to define and compute exclusive relations between any two elements and provide several predefined merging operators that can be extended and adapted to human needs. We also provide a set of experiments conducted to validate our approach. © Springer Science+Business Media, LLC 2009.
Detecting Inference Channels in Private Multimedia Data via Social Networks
2009
International audience; Indirect access to protected information has been one of the key challenges facing the international community for the last decade. Providing techniques to control direct access to sensitive information remain insufficient against inference channels established when legitimate data reveal classified facts hidden from unauthorized users. Several techniques have been proposed in the literature to meet indirect access prevention. However, those addressing the inference problem when involving multimedia objects (images, audio, video, etc.) remain few and hold several drawbacks. In essence, the complex structure of multimedia objects makes the fact of detecting indirect a…