Search results for "ENCR"
showing 10 items of 121 documents
Requirements for Energy Efficient Edge Computing: A Survey
2018
Internet of Things is evolving heavily in these times. One of the major obstacle is energy consumption in the IoT devices (sensor nodes and wireless gateways). The IoT devices are often battery powered wireless devices and thus reducing the energy consumption in these devices is essential to lengthen the lifetime of the device without battery change. It is possible to lengthen battery lifetime by efficient but lightweight sensor data analysis in close proximity of the sensor. Performing part of the sensor data analysis in the end device can reduce the amount of data needed to transmit wirelessly. Transmitting data wirelessly is very energy consuming task. At the same time, the privacy and s…
Correlazione tra indici di freschezza e tecniche di pesca artigianali (“a cianciolo”) di specie di pesce azzurro (E. Encrasicolus, S. Pilchardus)
2012
Modeling the juniper encroachment in the western north America grasslands with a Cellular Automata model
2014
Modelling the shrub encroachment in a grassland with a Cellular Automata Model
2018
Abstract. Arid and semi-arid grasslands of southwestern North America have changed dramatically over the last 150 years as a result of shrub encroachment, i.e. the increase in density, cover and biomass of indigenous shrubby plants in grasslands. Numerous studies have documented the expansion of shrublands in the southwestern American grasslands; in particular shrub encroachment has occurred strongly in part of the northern Chihuahuan desert since 1860. This encroachment has been simulated using an ecohydrological Cellular Automata model, CATGraSS. It is a spatially distributed model driven by spatially explicit irradiance and runs on a fine-resolution gridded domain. Plant competition is m…
System for Executing Encrypted Java Programs
2017
AI-based quantum-safe cybersecurity automation and orchestration for edge intelligence in future networks
2023
The AIQUSEC (AI-based quantum secure cyber security automation and orchestration in the edge intelligence of future networks) brings measurable advances to the cyber security of access and edge networks and their services, as well as Operational Service Technologies (OT). The research aims for significant cybersecurity scalability, efficiency, and effectiveness of operations through improved and enhanced device and sensor securities, security assurance, quantum security, and Artificial Intelligence (AI) based automation solutions. The new application scenarios of near future, the multiple stakeholders within each scenario, and the higher data volumes raise the need for novel cybersecurity s…
Evolution des paysages Sahélines au cours des six dernières décennies dans la région de Niamey : de la disparition de la brousse tigrée à l'encroutem…
2010
In the Sahel, the rapid increase of the population during the last decades and the climate variation lead to an important environmental degradation. This work aims to measure the impacts of the human pressure on ecosystem during the six last decades. A diachronic cartography of a 100 km² area close to Niamey was done with aerial photographs (1950 and 1975) and GPS measurements (2009). Results showed that the tiger bush vegetation was completely cleared between 1950 and 2009 while the fallow decreases from 7 % to 1 %. In the sandy valley, the increase of cultivated fields from 20,7 % (1950) to 69,4 % (1975) favoured wind and water erosions which allowed surface soil crusting. Between 1975 an…
Compact Quantum Circuit Design of PUFFIN and PRINT Lightweight Ciphers for Quantum Key Recovery Attack
2023
Quantum computing plays a vital role in the next generation computing platforms as researchers have achieved quantum supremacy by proving that quantum computers can outperform classical computers. These high performance computers will pose a serious threat to the security of the conventional cryptographic algorithms. The secret key of the conventional cryptographic algorithms when implemented by quantum circuits can easily be recovered with the help of Grover key search algorithm. The Grover’s algorithm requires low cost quantum implementation of cryptographic algorithms in order to mount the quantum key recovery attack successfully. Hence the low cost quantum implementation of conventional…
Modeling the shrub encroachment in the Northern Chihuahuan desert Grasslands using a Cellular Automata model
2014
Ureteral stent encrustation: evaluation of available scores as predictors of a complex surgery
2022
Background: Stent Encrustation is an uncommon event (13%) with a significant impact in patients' management. Aim of our study was to evaluate the available grading systems for encrusted stents. Methods: A retrospective analysis of encrusted stents was performed in four Italian centers between 2006 and 2020. Encrusted stents were classified according to four classifications: the Forgotten Encrusted Calcificated (FECal) score, the Kidney Ureter Bladder (KUB) score, the Visual Grading for Ureteral Encrusted Stent Classification and the Encrustation Burden Score (EBS). Classifications were evaluated to predict complex surgery defined as: long operative time (>60min); need of more than one su…