Search results for "DATA"

showing 10 items of 12992 documents

Watermarking for ontologies

2011

In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.

021110 strategic defence & security studiesInformation retrievalOpen worldComputer scienceOntology-based data integrationProcess ontologyData_MISCELLANEOUS0211 other engineering and technologiesWatermark02 engineering and technologyOntology (information science)computer.software_genre020204 information systems0202 electrical engineering electronic engineering information engineeringData miningDigital watermarkingSecurity parametercomputerISWC 2011: Proceedings of the 10th International Semantic Web Conference
researchProduct

Selection of time windows in the horizontal-to-vertical noise spectral ratio by means of cluster analysis

2016

The selection of the elementary analysis windows in continuous noise recordings for optimal estimation of the mean horizontal‐to‐vertical spectral ratio (HVSR) curve is generally performed by visual inspection of HVSR curves considered as functions of time. Starting from full‐length records, HVSR curves are determined in consecutive time windows of appropriate lengths. Time windows with HVSR curves that are anomalous on the basis of a simple visual inspection are generally ignored in the computation of the average HVSR curve. It is often very difficult to optimize the selection of time windows to be used for the calculation of the HVSR curve representative of a site. The use of nonobjective…

021110 strategic defence & security studiesOptimal estimationComputationVisual comparison0211 other engineering and technologies02 engineering and technologySeismic noise010502 geochemistry & geophysicscomputer.software_genre01 natural sciencesNoiseSeismic hazardGeophysicsGeochemistry and PetrologySettore GEO/11 - Geofisica ApplicataData miningCluster analysisAlgorithmcomputerReliability (statistics)0105 earth and related environmental sciencesMathematics
researchProduct

On the reactivation of a large landslide induced by rainfall in highly fissured clays

2018

Abstract The paper discusses the field investigations, geotechnical characterization and time evolution of horizontal displacements in a wide landslide. The latter, triggered by an earthquake occurring in September 2002, is located in Sicily and involves a thick body of stiff and highly fissured clays belonging to a Varicoloured Clay formation. In order to characterise the reactivation of landslide mechanisms induced by rainfall, a three-year monitoring programme (2008–2011) was implemented to measure rain, pore water pressures, and deep and superficial displacements. The monitoring data made it possible to recognize three distinct landslides, which evolve at variable rates in different dir…

021110 strategic defence & security studiesSettore ICAR/07 - Geotecnica0211 other engineering and technologiesGeologyLandslide02 engineering and technologyGeotechnical Engineering and Engineering GeologyHighly fissured clay Reactivated landslide Monitoring Displacement rate ModellingPore water pressureMonitoring dataResidual shear strengthGeotechnical engineeringDisplacement (fluid)Geology021101 geological & geomatics engineeringEngineering Geology
researchProduct

Data Sources Handling for Emergency Management: Supporting Information Availability and Accessibility for Emergency Responders

2017

Information is an essential component for better emergency response. Although a lot of information being available at various places during any kind of emergency, many emergency responders (ERs) use only a limited amount of the available information. The reason for this is that the available information heterogeneously distributed, in different formats, and ERs are unable to get access to the relevant information. Moreover, without having access to the needed information, many emergency responders are not able to obtain a sufficient understanding of the emergency situation. Consequently, a lot of time is being used to search for the needed information and poor decisions may be made. Therefo…

021110 strategic defence & security studiesSituation awarenessEmergency managementcomputer.internet_protocolComputer sciencebusiness.industry0211 other engineering and technologies02 engineering and technologyService-oriented architectureComputer securitycomputer.software_genreData scienceInformation model0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingWeb servicebusinesscomputerSemantic WebInformation exchangeData integration
researchProduct

Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage

2019

Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.

021110 strategic defence & security studiesTheoretical computer scienceComputer sciencebusiness.industry0211 other engineering and technologiesCloud computing02 engineering and technologyString searching algorithmData structureEncryptionSimple (abstract algebra)Computer data storagePattern matchingbusinessBlossom algorithm2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

Automatic Integration of Spatial Data into the Semantic Web

2017

International audience

021110 strategic defence & security studies[ INFO ] Computer Science [cs]Information retrieval[INFO.INFO-WB] Computer Science [cs]/Webbusiness.industryComputer scienceOntology-based data integration05 social sciences[INFO.INFO-WB]Computer Science [cs]/Web[ INFO.INFO-WB ] Computer Science [cs]/Web0211 other engineering and technologies050801 communication & media studies02 engineering and technology[INFO] Computer Science [cs]Social Semantic Web0508 media and communicationsSemantic computingSemantic analyticsSemantic integration[INFO]Computer Science [cs]Semantic Web StackbusinessSemantic WebData WebComputingMilieux_MISCELLANEOUS
researchProduct

Self-validating bundles for flexible data access control

2016

Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…

021110 strategic defence & security studiesbundle information-centric security access policy bytecodeComputer sciencebusiness.industrySettore ING-INF/03 - Telecomunicazioni0211 other engineering and technologies020207 software engineeringAccess controlCloud computing02 engineering and technologyClient-sideComputer securitycomputer.software_genreMetadataData access0202 electrical engineering electronic engineering information engineeringData Protection Act 1998businesscomputerAccess structure
researchProduct

Essais cliniques institutionnels : quel monitoring ?

2013

Resume Objectif Les promoteurs assument la responsabilite de la qualite des essais cliniques. Ces methodes d’assurance qualite doivent etre les plus efficaces possible, et avoir un cout maitrise. Nous voulions decrire les erreurs les plus frequentes, a partir de la litterature, leur impact sur les resultats, et proposer les strategies de monitoring les plus efficientes. Resultats Les defauts rencontres concernent la conception, les procedures, la gestion des donnees et l’analyse. L’impact sur les resultats est presque toujours une surestimation de l’effet traitement. Aucune methode de monitoring n’ayant ete demontree superieure, un monitoring econome, cible sur les risques d’erreurs, avec d…

03 medical and health sciences0302 clinical medicineAssurance qualitePolitical science[SDV]Life Sciences [q-bio]Data interpretationPharmacology (medical)030212 general & internal medicine030226 pharmacology & pharmacyHumanitiesComputingMilieux_MISCELLANEOUS
researchProduct

Methodological Aspects of Infrared Thermography in Human Assessment

2016

Infrared thermography presents some important advantages in the determination of skin temperature, as it is a safe, non-invasive and non-contact technique with wide applications in the field of sports sciences. Like many others techniques, valid measurement in thermography requires following strict methodological steps from data acquisition to analyses and interpretation. In this chapter, we discuss the methodological aspects that must be taken into account when acquiring thermic images, along with some practical examples and recommendations based on the current literature.

03 medical and health sciences0302 clinical medicineData acquisitionComputer scienceThermographySystems engineeringSkin temperature030204 cardiovascular system & hematology030217 neurology & neurosurgeryField (computer science)Human assessment
researchProduct

2019

Objective The aim of this study was to investigate participation and effectiveness of a multiyear comprehensive workplace health promotion (WHP) program. Methods Participation and effectiveness data came from employer and vendor systems. Health data came from health risk assessments (HRA) and biometric screenings. Participation and effectiveness were analyzed using descriptive analyses, t tests, and Mann-Whitney U tests where appropriate. Overall impact was assessed using the PIPE Impact Metric. Results Eighty-six percent of employees completed the HRA and 80% the biometrical screenings. Annual participation rate was 24%, and total reach was 58%. The portion of successful participants was 2…

03 medical and health sciences0302 clinical medicineWorkplace health promotionVendorEnvironmental healthPublic Health Environmental and Occupational HealthMEDLINEMetric (unit)Health riskPsychology030210 environmental & occupational healthHealth dataJournal of Occupational and Environmental Medicine
researchProduct