Search results for "ENCR"

showing 10 items of 121 documents

Requirements for Energy Efficient Edge Computing: A Survey

2018

Internet of Things is evolving heavily in these times. One of the major obstacle is energy consumption in the IoT devices (sensor nodes and wireless gateways). The IoT devices are often battery powered wireless devices and thus reducing the energy consumption in these devices is essential to lengthen the lifetime of the device without battery change. It is possible to lengthen battery lifetime by efficient but lightweight sensor data analysis in close proximity of the sensor. Performing part of the sensor data analysis in the end device can reduce the amount of data needed to transmit wirelessly. Transmitting data wirelessly is very energy consuming task. At the same time, the privacy and s…

hajautetut järjestelmätBattery (electricity)energiatehokkuusbusiness.industryComputer science020206 networking & telecommunications020207 software engineering02 engineering and technologyEnergy consumptionEncryptionedge computing0202 electrical engineering electronic engineering information engineeringWirelessEnhanced Data Rates for GSM EvolutionbusinessEnergy (signal processing)Edge computingComputer networkEfficient energy use
researchProduct

Correlazione tra indici di freschezza e tecniche di pesca artigianali (“a cianciolo”) di specie di pesce azzurro (E. Encrasicolus, S. Pilchardus)

2012

indici di freschezza tecniche di pesca artigianali (“a cianciolo”) pesce azzurro E. Encrasicolus S. PilchardusSettore AGR/15 - Scienze E Tecnologie Alimentari
researchProduct

Modeling the juniper encroachment in the western north America grasslands with a Cellular Automata model

2014

juniper encroachment
researchProduct

Modelling the shrub encroachment in a grassland with a Cellular Automata Model

2018

Abstract. Arid and semi-arid grasslands of southwestern North America have changed dramatically over the last 150 years as a result of shrub encroachment, i.e. the increase in density, cover and biomass of indigenous shrubby plants in grasslands. Numerous studies have documented the expansion of shrublands in the southwestern American grasslands; in particular shrub encroachment has occurred strongly in part of the northern Chihuahuan desert since 1860. This encroachment has been simulated using an ecohydrological Cellular Automata model, CATGraSS. It is a spatially distributed model driven by spatially explicit irradiance and runs on a fine-resolution gridded domain. Plant competition is m…

lcsh:GE1-350geographyBiomass (ecology)geography.geographical_feature_categoryEcologyved/biologySeed dispersalcellular automataved/biology.organism_classification_rank.specieslcsh:QE1-996.5Settore ICAR/02 - Costruzioni Idrauliche E Marittime E IdrologiaGeneral Medicineshrub encroachmentShrubAridGrasslandecohydrologyShrublandPlant ecologylcsh:GeologyGrazinglcsh:Environmental sciences
researchProduct

System for Executing Encrypted Java Programs

2017

pääsynvalvontavirtualisointiJavaComputer sciencetrusted computing02 engineering and technologycomputer.software_genreEncryptionReal time Java020204 information systems0202 electrical engineering electronic engineering information engineeringtietoturvahypervisorJava appletcomputer.programming_languageta113Programming languagebusiness.industrystrictfp020207 software engineeringvirtualizationJava concurrencyremote attestationbusinesscomputerJava annotationJavaProceedings of the 3rd International Conference on Information Systems Security and Privacy
researchProduct

AI-based quantum-safe cybersecurity automation and orchestration for edge intelligence in future networks

2023

The AIQUSEC (AI-based quantum secure cyber security automation and orchestration in the edge intelligence of future networks) brings measurable advances to the cyber security of access and edge networks and their services, as well as Operational Service Technologies (OT). The research aims for significant cybersecurity scalability, efficiency, and effectiveness of operations through improved and enhanced device and sensor securities, security assurance, quantum security, and Artificial Intelligence (AI) based automation solutions. The new application scenarios of near future, the multiple stakeholders within each scenario, and the higher data volumes raise the need for novel cybersecurity s…

quantum encryptioncyber threatedge-intelligence systemscyber-attacksAI-based analysingtekoälykyberturvallisuusverkkohyökkäykset
researchProduct

Evolution des paysages Sahélines au cours des six dernières décennies dans la région de Niamey : de la disparition de la brousse tigrée à l'encroutem…

2010

In the Sahel, the rapid increase of the population during the last decades and the climate variation lead to an important environmental degradation. This work aims to measure the impacts of the human pressure on ecosystem during the six last decades. A diachronic cartography of a 100 km² area close to Niamey was done with aerial photographs (1950 and 1975) and GPS measurements (2009). Results showed that the tiger bush vegetation was completely cleared between 1950 and 2009 while the fallow decreases from 7 % to 1 %. In the sandy valley, the increase of cultivated fields from 20,7 % (1950) to 69,4 % (1975) favoured wind and water erosions which allowed surface soil crusting. Between 1975 an…

région de Niameyhuman pressureaerial photographsphotos aériennesSahel[SDU.STU] Sciences of the Universe [physics]/Earth Sciencessoil crustingsoils degradation[SDU.STU]Sciences of the Universe [physics]/Earth Sciencesdégradation des solspression anthropiqueencroûtement SahelNiame
researchProduct

Compact Quantum Circuit Design of PUFFIN and PRINT Lightweight Ciphers for Quantum Key Recovery Attack

2023

Quantum computing plays a vital role in the next generation computing platforms as researchers have achieved quantum supremacy by proving that quantum computers can outperform classical computers. These high performance computers will pose a serious threat to the security of the conventional cryptographic algorithms. The secret key of the conventional cryptographic algorithms when implemented by quantum circuits can easily be recovered with the help of Grover key search algorithm. The Grover’s algorithm requires low cost quantum implementation of cryptographic algorithms in order to mount the quantum key recovery attack successfully. Hence the low cost quantum implementation of conventional…

salauslogic gatesalgoritmitcostskvanttilaskentatietoturvaquantum circuitciphersqubitquantum computingencryption
researchProduct

Modeling the shrub encroachment in the Northern Chihuahuan desert Grasslands using a Cellular Automata model

2014

shrub encroachment
researchProduct

Ureteral stent encrustation: evaluation of available scores as predictors of a complex surgery

2022

Background: Stent Encrustation is an uncommon event (13%) with a significant impact in patients' management. Aim of our study was to evaluate the available grading systems for encrusted stents. Methods: A retrospective analysis of encrusted stents was performed in four Italian centers between 2006 and 2020. Encrusted stents were classified according to four classifications: the Forgotten Encrusted Calcificated (FECal) score, the Kidney Ureter Bladder (KUB) score, the Visual Grading for Ureteral Encrusted Stent Classification and the Encrustation Burden Score (EBS). Classifications were evaluated to predict complex surgery defined as: long operative time (>60min); need of more than one su…

ureteral; stent; encrustationureteralencrustationUrolithiasisNephrologyUrologyUreteral stentstentEBSKUBFECalComplex surgery
researchProduct