Search results for "ENCR"

showing 10 items of 121 documents

PROLISEAN: A New Security Protocol for Programmable Matter

2021

The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…

Self-reconfiguring modular robot0209 industrial biotechnologySecurity AlgorithmsComputer Networks and CommunicationsComputer scienceDistributed computingHash functionSecurity Protocol02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]EncryptionLightweight Cryptography[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automationComponent (UML)0202 electrical engineering electronic engineering information engineeringModular RobotsProgrammable MatterProtocol (object-oriented programming)IOTbusiness.industry020206 networking & telecommunicationsCryptographic protocolSupercomputer[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationProgrammable matter[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Amoebots[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessDistributed Computing
researchProduct

Drawing the Line at Neglected Marine Ecosystems: Ecology of Vermetid Reefs in a Changing Ocean

2016

Vermetid mollusks form reefs that protect coasts from erosion, regulate sediment transport, serve as carbon sinks, and provide habitat for many fish and invertebrates. This biogenic habitat is found in tropical, sub-tropical, and warmtemperate coastal areas, such as Bermuda, oceanic islands in Brazil, and Hawaii, several locations within the Caribbean and the Mediterranean. These reefs are functionally similar to tropical coral fringing reefs but are built by gregarious vermetid gastropods cemented by a crustose coralline algal species, which probably triggers their settlement. Some descriptive studies in different regions worldwide and comparisons among tropical and Mediterranean reefs con…

Settore BIO/07 - Ecologia0301 basic medicine010504 meteorology & atmospheric sciencesEcology (disciplines)Animal forestDendropoma anguliferumDendropoma irregulareDendropoma lebeche01 natural sciences03 medical and health sciencesMarine ecosystemReef0105 earth and related environmental sciencesgeographygeography.geographical_feature_categoryEcologyBiodiversity hotspotTemperate reefDendropoma cristatum030104 developmental biologyOceanographyEnvironmental scienceBiogenic reefEncrusting coralline algaeLine (text file)Dendropoma petraeum
researchProduct

Modeling the past and future dynamic of the vegetation patterns at catchment scale using an ecohydrological Cellular Automata model

2014

Settore ICAR/02 - Costruzioni Idrauliche E Marittime E IdrologiaCellular Automata ecohydrology topography encroachment climate change
researchProduct

Modeling the shrub and juniper encroachment in the western north America grasslands with a Cellular Automata model

2013

Settore ICAR/02 - Costruzioni Idrauliche E Marittime E Idrologiaencroachment cellular automata
researchProduct

Fingerprint Traits and RSA Algorithm Fusion Technique

2012

The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smart card to overcome the security problems of centralized databases. Biometric information is then used f…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationBiometricsbusiness.industryComputer scienceData_MISCELLANEOUSPublic key infrastructureFingerprint recognitionComputer securitycomputer.software_genreEncryptionPublic-key cryptographyIdentifierFingerprint biometric and encryption algorithm fusion asymetric encryption tecniqueSmart cardbusinessAlgorithmcomputer
researchProduct

Homomorphic Approach to RF-Inhomogeneity Removal Based on Gabor Filter

2007

In this paper a bias correction algorithm for magnetic resonance imaging (MRI) is presented. The magnetic resonance (MR) images affected by this artifact, also called RF-inhomogeneity, exhibit irregular spatial brightness variations caused by magnetic field inhomogeneity. Here we present an original algorithm based on E2D - HUM, already proposed by some of the authors, where a modified Gabor filter is introduced in the elaboration chain to provide directional capabilities to suppress the artifact. The process of restoration doesn't care about the structure of the image and it has been applied to MR images of different parts of body like knee, abdomen, pelvis and brain. A comparison with oth…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniBrightnessArtifact (error)medicine.diagnostic_testbusiness.industryComputer scienceProcess (computing)Homomorphic encryptionBias artifactGabor filterMagnetic resonance imagingMagnetic fieldIntensity correctionRF inhomogeneityGabor filtermedicineComputer visionArtificial intelligencebusinessImage restorationIllumination correction
researchProduct

SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications

2020

Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniModularity (networks)General Computer ScienceExploitEdge devicebusiness.industryComputer scienceDistributed computingHuman Activity RecognitionCyber SecurityCloud computingCryptographic protocolEncryptionlcsh:Q350-390lcsh:QA75.5-76.95Artificial Intelligencelcsh:Information theoryMobile Crowdsensinglcsh:Electronic computers. Computer scienceEnhanced Data Rates for GSM EvolutionbusinessProtocol (object-oriented programming)
researchProduct

Bayesian System for Differential Cryptanalysis of DES

2014

AbstractThis paper proposes a new formalization for the differential cryptanalysis of DES (Data Encryption Standard) based on Bayesian Networks (BN), an artificial intelligence framework used for reasoning on data affected by uncertainty. Through the proposed approach it is possible to analyze DES from a novel point of view, thus paving the way for the development of a new class of cryptanalysis methods.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNeural cryptographyTheoretical computer scienceDifferential cryptanalysisbusiness.industryBayesian probabilityBayesian networkCryptographyData_CODINGANDINFORMATIONTHEORYEncryptionDESlaw.inventionBayesian Networks;lawCryptographyBayesian NetworksPoint (geometry)Cryptanalysisbusinessdifferential cryptanalysiMathematicsdifferential cryptanalysisIERI Procedia
researchProduct

Cloud Computing e protezione dei dati nel web 3.0

2014

Il cloud computing è un ritrovato deputato all'archiviazione, elaborazione e uso di dati su computer remoti, grazie al quale gli utenti hanno a disposizione una potenza di elaborazione quasi illimitata, non sono tenuti ad investire grandi capitali per soddisfare le proprie esigenze e possono accedere ai loro dati ovunque sia disponibile una connessione Internet. Il presente scritto si propone di contribuire ad una migliore comprensione della nuova tecnologia e alla ricostruzione dell'attuale (invero scarno) quadro giuridico, ciò che può aiutare a superare i principali problemi posti dalla nuvola al diritto dei privati e riconducibili, primariamente, alla protezione dei dati, al diritto dei …

Settore IUS/14 - Diritto Dell'Unione EuropeaSettore IUS/01 - Diritto Privatocloud cloud computing data data protection privacy security encryption EU law european private law italian law comparative law cyberlaw ICT law technology information and communications technology law & technology
researchProduct

MODELING THE SHRUB ENCROACHMENT IN THE NORTHERN CHIHUAHUAN DESERT GRASSLANDS WITH A CELLULAR AUTOMATA MODEL

2014

Shrub encroachment cellular automata ecohydrology
researchProduct