Search results for "Cryptography"

showing 10 items of 657 documents

Remarks on (Q, P, Y)-Summing Operators

2003

Abstract unavailable at this time... Mathematics Subject Classification (1991): 47B10. Key words: Summing operators; injective tensor product. Quaestiones Mathematicae 26(2003), 97-103

AlgebraPure mathematicsMathematics (miscellaneous)Tensor productMathematics Subject ClassificationKey (cryptography)Injective functionMathematicsQuaestiones Mathematicae
researchProduct

Material Substitution for Automotive Applications: A Comparative Life Cycle Analysis

2012

Lightweight materials have become an important strategy in the automotive industry to enable vehicle weight reduction and reduce fuel consumption. However, when developing specific strategies, the overall benefits of any material should be analyzed throughout its life cycle to comprehend energy/environmental differences that arise during its processing and its final use. A key example is aluminum which despite having great potential in the use phase requires large amounts of energy to process. This paper provides a comparison between aluminum and steel utilizing a life-cycle approach. This approach reveals the importance of incorporating a recycling strategy to leverage aluminum’s low-weigh…

Aluminum alloybusiness.industryComputer scienceProcess (engineering)Substitution (logic)Automotive industryrecyclingautomotive life cycleFuel efficiencyKey (cryptography)Leverage (statistics)steelProcess engineeringbusinessSettore ING-IND/16 - Tecnologie E Sistemi Di Lavorazione
researchProduct

Using ‘Ambient Intelligence’ for Compensating Intellectual Difficulties of People with Severe Learning Difficulties and/or Autistic Spectrum Disorders

2004

This paper describes a set of services and software created so that what is called ‘ambient intelligence’ would compensate for the ‘intellectual difficulties’ that people from this collective have. Existing concepts and standards of ambient intelligence are strongly reinforced through the use of the exact current user’s position as a key factor to calculate how the ‘digital home’ or any ‘digital environment’ behaves at every moment. This will be obtained using both Wi-Fi personal locators (embedded in necklaces or bracelets) and Wi-Fi communication from the PDA. This mix, together with individual capabilities and preferences, makes the development of a wide range of services possible when c…

Ambient intelligenceComputer sciencebusiness.industrymedicine.diseaseComputer securitycomputer.software_genreHigh-functioning autismUser assistanceSoftwareHuman–computer interactionFactor (programming language)medicineKey (cryptography)User interfaceSet (psychology)businesscomputercomputer.programming_language
researchProduct

Ancestral Reconstruction and Investigations of Genomic Recombination on some Pentapetalae Chloroplasts

2019

Abstract In this article, we propose a semi-automated method to rebuild genome ancestors of chloroplasts by taking into account gene duplication. Two methods have been used in order to achieve this work: a naked eye investigation using homemade scripts, whose results are considered as a basis of knowledge, and a dynamic programming based approach similar to Needleman-Wunsch. The latter fundamentally uses the Gestalt pattern matching method of sequence matcher to evaluate the occurrences probability of each gene in the last common ancestor of two given genomes. The two approaches have been applied on chloroplastic genomes from Apiales, Asterales, and Fabids orders, the latter belonging to Pe…

Ancestral reconstructionMost recent common ancestor0206 medical engineeringGenomic recombination02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Dynamic programmingGenome[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingEvolution Molecular[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]AsteralesGene duplication0202 electrical engineering electronic engineering information engineeringPattern matchingGenome ChloroplastRosaceaeResearch ArticlesPhylogenySequence (medicine)Recombination GeneticbiologyGeneral Medicinebiology.organism_classification[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationAncestral genome reconstructionApialesEvolutionary biology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Pentapetalae chloroplasts020602 bioinformaticsTP248.13-248.65BiotechnologyJournal of Integrative Bioinformatics
researchProduct

A Hardware and Secure Pseudorandom Generator for Constrained Devices

2018

Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…

Applied cryptography; Chaotic circuits; Constrained devices; Discrete dynamical systems; FPGA; Lightweight Cryptography; Random number generators; Statistical tests; Control and Systems Engineering; Information Systems; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic EngineeringHardware security moduleComputer scienceRandom number generationCryptography[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyPseudorandom generatorConstrained devicesLightweight CryptographyChaotic circuits[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]PermutationRandom number generatorsStatistical tests0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringField-programmable gate arrayThroughput (business)FPGAPseudorandom number generatorGenerator (category theory)business.industry020208 electrical & electronic engineeringComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsDiscrete dynamical systems[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science ApplicationsApplied cryptography[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Control and Systems EngineeringKey (cryptography)[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessComputer hardwareInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

Teaching Archaeological Heritage Management: Towards a Change in Paradigms

2018

The concept of archaeological heritage management (AHM) has been key to wider archaeological research and preservation agendas for some decades. Many universities and other education providers now offer what is best termed heritage management education (HME) in various forms. The emphasis is commonly on archaeological aspects of heritage in a broad sense and different terms are often interchangeable in practice. In an innovative working-conference held in Tampere, Finland, we initiated a debate on what the components of AHM as a course or curriculum should include. We brought together international specialists and discussed connected questions around policy, practice, research and teaching/…

ArcheologyHistoryarchaeological heritage managementConservationInnovación educacional615 History and ArchaeologyArqueologíaArchaeological research11. Sustainabilityta616harjoittelu0601 history and archaeologyta615training060101 anthropology060102 archaeologymuinaisjäännöksetEnvironmental ethicsarkeologia06 humanities and the artsMétodo de aprendizajeteachingkulttuuriperintöheritage management educationKey (cryptography)Archaeological heritageConservation and Management of Archaeological Sites
researchProduct

Location and orientation technologies based on Wi-Fi systems for people with disabilities in indoor environment

2016

In this chapter we review the developments made in the technology of location and positioning inside buildings and pilot tests that have been carried. First, as a general framework we will begin by reviewing the key elements that influence in technological development (the activity, the operator, the environment, and the technology). In the next section, we describe the most important advances and development carried out on people with different disabilities. Finally, in the concluding section we try to draw the lines that we believe should continue future development.

Architectural engineeringGeographyOrientation (computer vision)Section (archaeology)Key (cryptography)Simulation
researchProduct

RTS2 - the Remote Telescope System

2010

RTS2 is an open source observatory manager. It was written from scratch in the C++ language, with portability and modularity in mind. Its driving requirements originated from quick follow-ups of Gamma Ray Bursts. After some years of development it is now used to carry tasks it was originally not intended to carry. This article presents the current development status of the RTS2 code. It focuses on describing strategies which worked as well as things which failed to deliver expected results. Copyright © 2010 Petr Kubánek.

Article Subjectbusiness.industryComputer sciencelcsh:AstronomyCarry (arithmetic)FOS: Physical sciencesAstronomy and Astrophysicslaw.inventionTelescopelcsh:QB1-991Software portabilitySpace and Planetary SciencelawObservatoryCode (cryptography)Gamma-ray burstSoftware engineeringbusinessAstrophysics - Instrumentation and Methods for AstrophysicsInstrumentation and Methods for Astrophysics (astro-ph.IM)
researchProduct

Human capital and life satisfaction among circular migrants: an analysis of extended mobility in Europe

2019

This article extends understandings of circular migration among young migrants (aged 16–35) by focusing on the two key concepts of human capital and life satisfaction. Drawing on a large-scale quan...

Arts and Humanities (miscellaneous)Circular migration05 social sciences050602 political science & public administration0507 social and economic geographyKey (cryptography)Life satisfactionDemographic economicsSociology050703 geographyHuman capital0506 political scienceDemographyJournal of Ethnic and Migration Studies
researchProduct

Implementation of the Community Earth System Model (CESM) version 1.2.1 as a new base model into version 2.50 of the MESSy framework

2016

Abstract. The Community Earth System Model (CESM1), maintained by the United States National Centre for Atmospheric Research (NCAR) is connected with the Modular Earth Submodel System (MESSy). For the MESSy user community, this offers many new possibilities. The option to use the Community Atmosphere Model (CAM) atmospheric dynamical cores, especially the state-of-the-art spectral element (SE) core, as an alternative to the ECHAM5 spectral transform dynamical core will provide scientific and computational advances for atmospheric chemistry and climate modelling with MESSy. The well-established finite volume core from CESM1(CAM) is also made available. This offers the possibility to compare …

Atmospheric physics010504 meteorology & atmospheric sciencesMeteorologyProcess (engineering)Computer scienceEarth System ModellingAtmospheric model01 natural sciencesModular Earth Submodel System (MESSy)Component (UML)Erdsystem-ModellierungCode (cryptography)0101 mathematics0105 earth and related environmental sciencesStructure (mathematical logic)EMACbusiness.industrylcsh:QE1-996.5Modular designlcsh:Geology010101 applied mathematicsCESM1Atmospheric chemistrySystems engineeringAir Chemistrybusiness
researchProduct