Search results for "Cryptography"

showing 10 items of 657 documents

Exploiting Data Analytics and Deep Learning Systems to Support Pavement Maintenance Decisions

2021

Road networks are critical infrastructures within any region and it is imperative to maintain their conditions for safe and effective movement of goods and services. Road Management, therefore, plays a key role to ensure consistent efficient operation. However, significant resources are required to perform necessary maintenance activities to achieve and maintain high levels of service. Pavement maintenance can typically be very expensive and decisions are needed concerning planning and prioritizing interventions. Data are key towards enabling adequate maintenance planning but in many instances, there is limited available information especially in small or under-resourced urban road authorit…

feature importancepavement management systemComputer science0211 other engineering and technologiespavement maintenance decision02 engineering and technologypavement management systemslcsh:Technologylcsh:ChemistryGoods and services021105 building & construction0502 economics and business11. SustainabilitySettore ICAR/04 - Strade Ferrovie Ed AeroportiGeneral Materials Scienceroad asset databasesInstrumentationlcsh:QH301-705.5Fluid Flow and Transfer Processes050210 logistics & transportationbusiness.industryLevel of servicelcsh:TProcess Chemistry and TechnologyDeep learning05 social sciencesGeneral EngineeringPavement managementdeep learningTimelinedata mininglcsh:QC1-999Computer Science Applicationsroad asset databaseWorkflowRisk analysis (engineering)lcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040Key (cryptography)Settore ICAR/17 - DisegnoArtificial intelligencepavement maintenance decisionsbusinesslcsh:Engineering (General). Civil engineering (General)Predictive modellinglcsh:PhysicsApplied Sciences
researchProduct

A general framework for group authentication and key exchange protocols

2014

Published version of a chapter in the book: Foundations and Practice of Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-05302-8_3 In this paper, we propose a novel framework for group authentication and key exchange protocols. There are three main advantages of our framework. First, it is a general one, where different cryptographic primitives can be used for different applications. Second, it works in a one-to-multiple mode, where a party can authenticate several parties mutually. Last, it can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward securi…

group authenticationAuthenticationPost-quantum cryptographyelliptic curve discrete logarithm problemCryptographic primitivediscrete logarithm problembusiness.industryVDP::Technology: 500::Information and communication technology: 550Computer securitycomputer.software_genreKey authenticationDiffie–Hellman key exchangePublic-key cryptographyDiffie-Hellman key exchangebusinesscomputerKey exchangeElGamal encryptionMathematics
researchProduct

Migrating from a Centralized Data Warehouse to a Decentralized Data Platform Architecture

2021

To an increasing degree, data is a driving force for digitization, and hence also a key asset for numerous companies. In many businesses, various sources of data exist, which are isolated from one another in different domains, across a heterogeneous application landscape. Well-known centralized solution technologies, such as data warehouses and data lakes, exist to integrate data into one system, but they do not always scale well. Therefore, robust and decentralized ways to manage data can provide the companies with better value give companies a competitive edge over a single central repository. In this paper, we address why and when a monolithic data storage should be decentralized for imp…

hajautetut järjestelmätComputer scienceDistributed computingtietovarastotData platform architectureDistributed data management02 engineering and technologydata warehousingAsset (computer security)Competitive advantageDecentralizationdistributed data managementkeskittäminen020204 information systems0202 electrical engineering electronic engineering information engineeringDigitizationtietojärjestelmäthajautusbusiness.industrytiedonhallinta020207 software engineeringData decentralizationtiedonhallintajärjestelmät113 Computer and information sciencesData warehousedata decentralizationyrityksetData warehousingdatadata platform architectureComputer data storageScalabilitytietohallintoKey (cryptography)business
researchProduct

Hard Competencies Satisfaction Levels for Software Engineers: A Unified Framework

2019

Software engineer’s/developer’s competency has long been established as a key pillar for the development of software. Nevertheless, the satisfaction levels derived from using a competency needs more investigation. The aim of this paper is to propose a framework for identifying hard competencies and their satisfaction levels. The paper contributes to the software engineering competency research by highlighting the satisfaction levels of hard competence for the benefit of the educators (academia), software engineers and users of software competence (practitioner). peerReviewed

hard competencyohjelmistokehittäjättechnical competencyComputer sciencebusiness.industrysoftware engineers’ competencies05 social sciencesPillar020207 software engineering02 engineering and technologyEngineering managementSoftwareosaaminentyytyväisyys0502 economics and businesskompetenssi0202 electrical engineering electronic engineering information engineeringKey (cryptography)businesscompetence satisfaction levelsCompetence (human resources)050203 business & management
researchProduct

Mining Customer Requirement from Helpful Online Reviews

2014

Today there are a huge quantity of online reviews available across different categories of products. The key question is how to select helpful online reviews and what can we learn from the abundant reviews. In this paper, we first conclude five categories of features to predict reviews' helpfulness from the perspective of a product designer and then present an approach based on conjoint analysis to measure customer requirement. The suggested approach are demonstrated using product data from a popular Chinese mobile phone market.

helpfulneEngineeringMeasure (data warehouse)Product designbusiness.industryPerspective (graphical)product designData scienceOnline reviewConjoint analysisKano modelMobile phoneHelpfulnessbrandKey (cryptography)Kano modelMarketingbusinessconjoint analysi2014 Enterprise Systems Conference
researchProduct

Collaboration for Inclusive Practices : Teaching Staff Perspectives from Finland

2021

accepted in publication Collaboration between educators is considered to be the key issue when implementing inclusive practices within schools. An open-ended questionnaire and semi-structured interviews were used to extend the current understanding of collaboration between teaching staff. The questionnaire was administrated to 167 classroom teachers, subject teachers, special education teachers and teaching assistants in primary, secondary and special education public schools in Finland. Also, semi-structured interviews with 20 participants were used to deepen the understanding of the elements included in the teaching activity in diverse classrooms. The results indicate coordination, cooper…

inclusive education515 PsychologyTeaching staffteaching assistantsSpecial educationyhteistyöEducationerityisopetusPedagogyComputingMilieux_COMPUTERSANDEDUCATION0501 psychology and cognitive sciencesSociologyactivity theoryspecial educationteachers4. Education05 social scienceskoulunkäyntiavustajat050301 educationinclusive practicesActivity theory16. Peace & justiceopettajatCollaborationcollaborationtoiminnan teoriaKey (cryptography)516 Educational sciences0503 educationinkluusio050104 developmental & child psychology
researchProduct

Intellectual Capital – The Key for Sustainable Competitive Advantage for the SME's Sector

2015

Abstract With the adoption of the Lisbon Agenda and its major objective, namely that the EU would become the most dynamic and competitive knowledge based economy in the world, it became clear the Small and Medium Enterprises (SME's) are the especially affected by these plans, because they represent the driving force for the European economy. In this context of creating and maintaining a competitive advantage for the SME's, it is crucial for them to make good use of the intellectual capital of their employees, in an efficient and proficient manner, in order to increase their potential for innovation. The aim of this article is to show, through an original argumentation, based on the analysis…

intangible assetsbusiness.industryKnowledge economyGeneral EngineeringEnergy Engineering and Power TechnologyContext (language use)International tradeCompetitive advantageArgumentation theoryIntellectual capitalintellectual capitalOrder (exchange)SME's ;Key (cryptography)competitive advantageSmall and medium-sized enterprisesBusinessIndustrial organizationProcedia Economics and Finance
researchProduct

Self-enforcing international environmental agreements revisited

2004

In Barrett's (1994) paper on transboundary pollution abatement is shown that if the signatories of an international environmental agreement act in a Stackelberg fashion, then, depending on parameter values, a self-enforcing IEA can have any number of signatories between two and the grand coalition. Barrett obtains this result using numerical simulations and also ignoring the fact that emissions must be non-negative. Recent attempts to use analytical approaches and to explicitly recognize the non-negativity constraints have suggested that the number of signatories of a stable IEA may be very small. The way such papers have dealt with non-negativity constraints is to restrict parameter values…

international externalities self-enforcing environmental agreements Stackelberg equilibrium non-negative emissions constraintsEconomics and EconometricsPublic economicsjel:D62jel:C72Transboundary pollutionjel:F02Grand coalitionMicroeconomicsrestrictjel:Q20Key (cryptography)EconomicsStackelberg competitionOxford Economic Papers
researchProduct

More is not always better—non-linear effects in crowdfunding

2019

Abstract This research focuses on crowdfunding project features and its relation with the success of this project. The main purpose is to improve probability of success of crowdfunding projects. One can argue that “more is always better” resulting in attempts of daily updates. Contrarily, backers may be weary of numerous updates to work through, indicating a possible wear-out effect, implying the existence of an optimal level of updates. Our preliminary results show that previous research, built upon linear modeling, widely ignores important aspects of the relationship between key variables. We therefore picked six key variables that were previously marked as success drivers in crowdfunding…

lcsh:Management. Industrial managementRelation (database)Non-linear modelComputer scienceNon-linear modeLinear model05 social sciencesLinear modelNon linear modelNon-linear effectsProbability of successWork (electrical)lcsh:HD28-70ddc:6500502 economics and businessKey (cryptography)Econometrics050211 marketingCrowdfunding050203 business & managementInternational Journal of Quality Innovation
researchProduct

OBTAINING POSITIONS OF ASTEROIDS FROM DIGITIZED PROCESSING OF PHOTOGRAPHIC OBSERVATIONS IN BALDONE OBSERVATORY (CODE 069)

2016

Digital processing of photographic plates of star fields allows to determine with high accuracy the coordinates and stellar magnitudes for all registered objects on these plates. The processing results can be used for a broad search for images of small bodies of the Solar system and determination of their coordinates. From the observations of earlier epoch, we can extract information about the locations of these bodies well before discovering them. Modern approach to processing early photographic observations with new technologies can be an effective instrument for rediscovery of asteroids and correction their orbits. We analyzed the results of digital processing of observations of clusters…

lcsh:QB1-991Physicslcsh:AstronomyAsteroidObservatoryCode (cryptography)AstronomyRemote sensingOdessa Astronomical Publications
researchProduct