Search results for "Device"

showing 10 items of 1286 documents

Coinage and images of the imperial family: local identity and Roman rule

2013

In his speech “About harmony between the cities”, Publius Aelius Aristides, the famous orator of the mid-2nd c. A.D., admonishes the three most eminent cities of Asia — Pergamum, Ephesus and Smyrna — to put an end to their rivalries. He regards as useless their envy and struggle to be first among the cities in the province of Asia. He cautions against such rivalries, which could lead to an unwanted intervention by Roman authorities. He continues (Or. 23 [Keil = 42 Dindorf] 62): Is there a child or an old man so much out of mind that he would ignore that this is our present situation and that this is thank heaven the ruling law: one city, the first and greatest, has the whole world under one…

ArcheologyHarmony (color)HistoryVisual Arts and Performing Artsbiologymedia_common.quotation_subjectbiology.organism_classificationSmyrnaEliteRhetorical deviceRhetoricEmperorHeavenClassicsGovernorClassicsmedia_commonJournal of Roman Archaeology
researchProduct

AHBIM for Wooden Built Heritage Conservation

2019

The chapter investigates the potential offered by the Building Information Modeling for the conservation of the wooden architectural heritage. Based on the architectural survey, the BIM modeling of a South Tyrolean farm was carried out, with particular attention to the aspects related to its management and maintenance. Inside the database connected to the model, information about the building has been included, which can also be used on site through the use of mobile devices. The sharing of such information within a single platform avoids risks connected to the failure or incorrect transmission of data, allowing the optimization of the management, maintenance and conservation of the archite…

Architectural engineeringbusiness.industryComputer scienceConservationAsset (computer security)Built heritageParametric designParametric designBIM Built heritage Parametric design Conservation Facility managementFacility managementBuilding information modelingArchitectural heritageTransmission (telecommunications)BIMSettore ICAR/17 - DisegnoBuilt heritageFacility managementbusinessMobile device
researchProduct

Computing methods for resilience: evaluating new building components in the frame of SECAPs

2019

Resilience represents a new important feature that the anthropic systems, and cities among them, are called to cope with. In fact, the increasing negative stresses to which urban contexts are exposed, and mainly the climatic pressures, call for the capability of adapting to these modifications and, possibly, to restore the ex-ante situations. The role of the buildings and their envelope components is of crucial importance to this aim. This paper analyses the features of resilience of the roofs of buildings by means of proper quantitative indexes. On purpose, the performances of green and cool roofs are compared. The possibility of adopting nonstructural solutions, like the windows shading d…

Architectural engineeringgreen roofComputer science020209 energycool roof0211 other engineering and technologies02 engineering and technologygreen roofsenergy consumption021105 building & constructionbuilding0202 electrical engineering electronic engineering information engineeringFeature (machine learning)shading devicesResilience (network)resilienceshading devices.Settore ING-IND/11 - Fisica Tecnica AmbientaleFrame (networking)Energy consumptionbuildingsbuildings energy consumption resilience green roofs cool roofs shading devicescool roofsbuildings; cool roofs; energy consumption; green roofs; resilience; shading devicesReflective surfacesEnvelope (motion)
researchProduct

The security of mobile business applications based on mCRM

2020

A development of mobile technologies, and their common use in business, creates new challenges for people dealing with data security in the organization. This paper explores the types and nature of threats to the enterprise that result from the widespread use of business applications on smartphones (e.g. mobile CRM). The analysis has been focused on smartphones and tablets running on the Android operating system. We used STRIDE - a threat modeling technique commonly used to detect vulnerabilities in software security. We propose its modification to better design and implement solutions for the security of mobile devices. We also used the Data Flow Diagram and the Attack Tree concept to anal…

Attack treesInformation securityComputer science05 social sciencesAttack treeData securityMobile application02 engineering and technologyInformation securityComputer securitycomputer.software_genreSoftware security assurance020204 information systems0502 economics and businessThreat model0202 electrical engineering electronic engineering information engineeringSecurityData Protection Act 1998050211 marketingMobile technologyThreat modelingMobile devicecomputermCRM
researchProduct

Graphene as a tunable resistor

2014

We present the design of a graphene-based electronically tuneable microstrip attenuator operating at a frequency of 5 GHz. The use of graphene as a variable resistor is discussed and the modelling of its electromagnetic properties at microwave frequencies is fully addressed. The design of the graphene-based attenuator is described. The structure integrates a patch of graphene, whose characteristics can range from being a fairly good conductor to a highly lossy material, depending on the applied voltage. By applying the proper voltage through two high-impedance bias lines, the surface resistivity of graphene can be modified, thereby changing the insertion loss of the microstrip attenuator.

Attenuator (electronics)Settore FIS/02 - Fisica Teorica Modelli E Metodi MatematiciMaterials sciencebusiness.industryGraphenegrapheneElectrical engineeringMicrostriplaw.inventionConductorSettore ING-IND/22 - Scienza E Tecnologia Dei MaterialilawOptoelectronicsInsertion lossResistormicrostripbusinessnanoelectronicMicrowavetuneable microwave devicesSettore CHIM/02 - Chimica FisicaVoltage2014 International Semiconductor Conference (CAS)
researchProduct

Fingerprint Quality Evaluation in a Novel Embedded Authentication System for Mobile Users

2015

The way people access resources, data and services, is radically changing using modern mobile technologies. In this scenario, biometry is a good solution for security issues even if its performance is influenced by the acquired data quality. In this paper, a novel embedded automatic fingerprint authentication system (AFAS) for mobile users is described. The goal of the proposed system is to improve the performance of a standard embedded AFAS in order to enable its employment in mobile devices architectures. The system is focused on the quality evaluation of the raw acquired fingerprint, identifying areas of poor quality. Using this approach, no image enhancement process is needed after the …

AuthenticationArticle SubjectComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subjectFingerprint (computing)Real-time computingFingerprint Verification CompetitionComputer Science Applications1707 Computer Vision and Pattern RecognitionTK5101-6720Fingerprint recognitionComputer Science ApplicationsComputer Networks and CommunicationEmbedded systemData qualityTelecommunicationMobile technologyQuality (business)businessMobile devicemedia_commonMobile Information Systems
researchProduct

A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users

2003

Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.

AuthenticationUser authenticationResource (project management)BiometricsHuman–computer interactionComputer scienceIdentity (object-oriented programming)Security levelComputer securitycomputer.software_genreMobile devicecomputer
researchProduct

Sguardo autobiografico e dispositivi iconotestuali in Michele Mari

2020

Oggetto del contributo è la questione dell’autorialità in tre composizioni iconotestuali e autobiografiche di Michele Mari: Filologia dell’anfibio. Diario militare (1995), Asterusher. Autobiografia per feticci (2015) e Leggenda privata (2017). Nel diario, Filologia dell’anfibio, Mari racconta nella forma di uno pseudo-trattato il periodo trascorso presso il Centro Addestramento Reclute di Como. Il testo è illustrato da disegni tratti dai propri diari dell’epoca. In Asterusher. Autobiografia per feticci, ricalcando la forma tripartita dell’emblematica, Mari ha giustapposto le fotografie di oggetti familiari e alcune citazioni tratte dalle sue opere precedenti. Leggenda privata è un’autoficti…

Autobiographical GazeIconotextual DeviceSettore L-FIL-LET/14 - Critica Letteraria E Letterature ComparateMichele MariDispositivi iconotestualiSguardo autobiografico
researchProduct

Batteries for Aerospace: A Brief Review

2018

This paper presents a brief overview on batteries for aerospace application. In particular, More Electric Aircraft (MEA) and All Electric Aircraft (AEA) concepts are introduced at first, together with their main advantages and drawbacks. Subsequently, opportunities and issues related to the employment of batteries on aircrafts are presented and briefly discussed. Reference is then made to aircraft power system architectures and battery technologies, as well as on the state-of-the-art of battery management systems, state-of-charge and state-of-health estimations, and thermal management.

Battery (electricity)All electric aircraftEngineeringControl and Optimization020209 energyEnergy Engineering and Power TechnologyComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyThermal management of electronic devices and systemsSettore ING-IND/32 - Convertitori Macchine E Azionamenti ElettriciAutomotive engineeringBatterieBattery management systemsElectric power systemHardware_GENERALAdaptive system0202 electrical engineering electronic engineering information engineeringState-of-charge estimationState-of-health estimationAerospaceAerospaceBattery management systembusiness.industry021001 nanoscience & nanotechnologyMore electric aircraftComputer Networks and CommunicationAerospace electronicsElectric aircraft0210 nano-technologybusiness
researchProduct

On-board Energy Consumption Assessment for Symbolic Execution Models on Embedded Devices

2020

Internet of Things (IoT) applications operate in several domains while requiring seamless integration among heterogeneous objects. Regardless of the specific platform and context, IoT applications demand high energy efficiency. Adopting resource-constrained embedded devices for IoT applications means ensuring low power consumption, low maintenance costs and possibly longer battery life. Meeting these requirements is particularly arduous as programmers are not able to monitor the energy consumption of their own software during development or when applications are finally deployed. In this paper, we discuss on-board real-time energy evaluation of both hardware and software during the developm…

Battery (electricity)Computer sciencebusiness.industry020206 networking & telecommunicationsContext (language use)02 engineering and technologyEnergy consumptionSymbolic executionEmbedded deviceSoftware testing020202 computer hardware & architectureInternet of Things (IoT)Energy UtilizationOn boardSoftwarePower ManagementEmbedded systemEnergy Assessment0202 electrical engineering electronic engineering information engineeringResource-constrained DeviceBaseline (configuration management)businessEnergy (signal processing)
researchProduct