Search results for "Cryptography"

showing 10 items of 657 documents

Lifelong Guidance in Finland : Key Policies and Practices

2020

Finland has a long history of good collaboration between the educational and employment sector regarding lifelong guidance, specifically career guidance. Today, this manifests as having a national strategy for lifelong guidance, good access to high quality services and innovative pilots such as the One-Stop Guidance Centres for youth. The new government led by Prime Minister Sanna Marin has decided to put even more efforts into lifelong guidance. This chapter describes what has been done and what future challenges lie ahead. peerReviewed

ammatinvalintabusiness.industrytyövoimapalvelutPolitical scienceelinikäinen oppiminenKey (cryptography)ammatinvalinnanohjausuranvalintaComparative educationPublic relationsbusinessnuorisotakuuurasuunnittelu
researchProduct

Blockchain Disrupting Fintech and the Banking System

2021

Nowadays society is profoundly changed by technology, velocity and productivity. While individuals are not yet prepared for holographic connection with banks or financial institutions, other innovative technologies have been adopted. Lately, a new world has been launched, personalized and adapted to reality. It has emerged and started to govern almost all daily activities due to the five key elements that are foundations of the technology: machine to machine (M2M), internet of things (IoT), big data, machine learning and artificial intelligence (AI). Competitive innovations are now on the market, helping with the connection between investors and borrowers—notably crowdfunding and peer-to-pe…

blockchainBlockchainbusiness.industryfintechBig datalcsh:APopularityMachine to machineCommerceKey (cryptography)Relevance (information retrieval)Businesslcsh:General Worksbanking systemInternet of ThingsProductivityElrondThe 7th International Management Information Systems Conference
researchProduct

Media’s portrayal of CAM: Exploring 40 years of narratives and meanings in public discourse

2021

The media are a key element in being able to assess how the climate of public opinion regarding Complementary and Alternative Medicines (CAM) has evolved over the years. The aim of this study is to explore the variation of the media representations along 40 years (1979–2018) in Spanish newspapers to assess if the press has contributed to legitimise, delegitimise or maintain the status quo of these therapies. From quantitative and qualitative approaches, we evaluate the media attention, the narratives, linguistic terms and tone used, and the relations between them. Results indicate the media reporting on CAM has remained relatively stable during the first 37 years (1979–2015) of the study, …

business.industryCommunication05 social sciencesMedia studies050801 communication & media studies050905 science studiesPublic opinionScientific journalism0508 media and communicationsArts and Humanities (miscellaneous)Public discourseKey (cryptography)NarrativeSociology0509 other social sciencesElement (criminal law)businessHealth communicationJournalism
researchProduct

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

2021

International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…

business.industryComputer scienceAnomaly (natural sciences)020206 networking & telecommunications02 engineering and technologyIntrusion detection system[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Computer securitycomputer.software_genre[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe Internet[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputer
researchProduct

Current characterisation for ultra low power wireless body area networks

2010

The emerging area of body area networks (BAN) imposes challenging requirements on hardware and software to achieve the desired lifetimes for certain devices such as long term medical implants. In this paper, we propose a novel approach to the measurement and characterisation of the energy consumption of BAN devices. The approach uses a low cost energy auditing circuit and addresses the problem of accurately measuring low-level current consumption. This new technique will allow precise and analytical measurements of systems and components in terms of energy. This will help circuit designers minimise power consumption in BAN devices. Software engineers might use this approach to validate and …

business.industryComputer scienceBody area networks Body sensor networks Circuits Costs Current measurement Energy consumption Energy measurement Hardware Implants Power engineering and energy Body Area Networks Current characterization Embedded system design Energy efficiency Power Consumption Wireless Network softwareEnergy consumptionPower (physics)SoftwareEmbedded systemCode (cryptography)Electronic engineeringWirelessbusinessEnergy (signal processing)Electronic circuitEfficient energy use2010 8th Workshop on Intelligent Solutions in Embedded Systems
researchProduct

Benchmarking non-photorealistic rendering of portraits

2017

We present a set of images for helping NPR practitioners evaluate their image-based portrait stylisation algorithms. Using a standard set both facilitates comparisons with other methods and helps ensure that presented results are representative. We give two levels of difficulty, each consisting of 20 images selected systematically so as to provide good coverage of several possible portrait characteristics. We applied three existing portrait-specific stylisation algorithms, two general-purpose stylisation algorithms, and one general learning based stylisation algorithm to the first level of the benchmark, corresponding to the type of constrained images that have often been used in portrait-s…

business.industryComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineeringImage processing02 engineering and technologyBenchmarkingMachine learningcomputer.software_genreNon-photorealistic renderingImage (mathematics)Set (abstract data type)0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Key (cryptography)020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerAbstraction (linguistics)
researchProduct

Learning Flow-Based Feature Warping for Face Frontalization with Illumination Inconsistent Supervision

2020

Despite recent advances in deep learning-based face frontalization methods, photo-realistic and illumination preserving frontal face synthesis is still challenging due to large pose and illumination discrepancy during training. We propose a novel Flow-based Feature Warping Model (FFWM) which can learn to synthesize photo-realistic and illumination preserving frontal images with illumination inconsistent supervision. Specifically, an Illumination Preserving Module (IPM) is proposed to learn illumination preserving image synthesis from illumination inconsistent image pairs. IPM includes two pathways which collaborate to ensure the synthesized frontal images are illumination preserving and wit…

business.industryComputer scienceDeep learningComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONOptical flow02 engineering and technology010501 environmental sciences01 natural sciencesImage (mathematics)Flow (mathematics)Feature (computer vision)Face (geometry)0202 electrical engineering electronic engineering information engineeringCode (cryptography)020201 artificial intelligence & image processingComputer visionArtificial intelligenceImage warpingbusinessComputingMethodologies_COMPUTERGRAPHICS0105 earth and related environmental sciences
researchProduct

Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes

2018

By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.

business.industryComputer scienceDetector020206 networking & telecommunications020207 software engineering02 engineering and technologyAdversaryRobustness (computer science)Injection attacks0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkSubspace topologyComputer Science::Cryptography and SecurityComputer network
researchProduct

LifeRescue: A web based application for emergency responders during fire emergency response

2016

In order to respond to any kind of building fire emergencies, first-responders have to use lot of time to get access to the emergency data such as location of the victims who are still inside the building, location of the hazardous material, location of the resources and location of the exits in order to perform search and rescue. However, search is possibly one of the most dangerous activities on the fire ground. Sometimes the visibility is zero and the environment is really hot. Because of the limited operating time in the building, the key to successful search is how quickly emergency responders can get access to the emergency related information in order to save victims and the property…

business.industryComputer scienceInformation sharing020206 networking & telecommunications020207 software engineering02 engineering and technologyComputer securitycomputer.software_genreEmergency responseOrder (business)0202 electrical engineering electronic engineering information engineeringKey (cryptography)Operating timeWeb applicationbusinessVisibilitycomputerSearch and rescue2016 3rd International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)
researchProduct

Improving the multiple errors detection coverage in distributed embedded systems

2004

Currently, a lot of critical applications in automobile and aircraft avionics are built on fault-tolerant real-time distributed embedded systems. Fault injection techniques have been used extensively in the experimental validation of these systems and it is a challenge to adapt them to the demands of new technologies. This paper deals with the effect of physical faults at pin level on the Communication Network Interface in a prototype based on time-triggered architecture. Due to the essential necessity of observing system behavior during injection experiments, a suitable monitor for distributed embedded systems is proposed. The monitor is used to detect failures in the value domain that cou…

business.industryComputer scienceInterface (computing)Distributed computingControl (management)Real-time computingFault injectionAvionicsSystem monitoringTelecommunications networkDomain (software engineering)Embedded systemCode (cryptography)business22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings.
researchProduct