Search results for "Exploit"

showing 10 items of 284 documents

A case study of the coconut crab Birgus latro on Zanzibar highlights global threats and conservation solutions

2021

Abstract The coconut crab Birgus latro, the largest terrestrial decapod, is under threat in most parts of its geographical range. Its life cycle involves two biomes (restricted terrestrial habitats near the coast, and salt water currents of the tropical Indian and Pacific Oceans). Its dependence on coastal habitat means it is highly vulnerable to the habitat destruction that typically accompanies human population expansion along coastlines. Additionally, it has a slow reproductive rate and can reach large adult body sizes that, together with its slow movement when on land, make it highly susceptible to overharvesting. We studied the distribution and population changes of coconut crabs at 15…

0106 biological sciencespopulation sizeRange (biology)Life on Landcoconut crabEnvironmental Science and ManagementBirgus latroPopulationPemba010603 evolutionary biology01 natural sciencesTanzaniaCoconut crabtaskuravutpopulaatiotIUCNuhanalaiset eläimetIUCN Red ListeducationEcology Evolution Behavior and SystematicsNature and Landscape ConservationData deficienteducation.field_of_studybiologylajiensuojeluEcology010604 marine biology & hydrobiologybiology.organism_classificationFisheryClimate ActionOverexploitationHabitat destructionGeographyHabitatconservation recommendationsZoology
researchProduct

Planting Systems for Modern Olive Growing: Strengths and Weaknesses

2021

The objective of fully mechanizing olive harvesting has been pursued since the 1970s to cope with labor shortages and increasing production costs. Only in the last twenty years, after adopting super-intensive planting systems and developing appropriate straddle machines, a solution seems to have been found. The spread of super-intensive plantings, however, raises serious environmental and social concerns, mainly because of the small number of cultivars that are currently used (basically 2), compared to over 100 cultivars today cultivated on a large scale across the world. Olive growing, indeed, insists on over 11 million hectares. Despite its being located mostly in the Mediterranean countr…

0106 biological sciencessuper-intensive planting systemExploitEmerging technologiesAgriculture (General)pedestrian orchardtraining formEconomic shortagePlant Science01 natural scienceslight interceptionS1-972StraddleCultivarOlea europaeaAgroforestrySowing04 agricultural and veterinary sciencesSettore AGR/03 - Arboricoltura Generale E Coltivazioni ArboreeGeography040103 agronomy & agriculture0401 agriculture forestry and fisheries<i>Olea europaea</i>Agronomy and Crop SciencePruningStrengths and weaknesses010606 plant biology & botanyFood Science
researchProduct

Security and Privacy in Wireless IoT

2018

The 13 articles in this special section focus on security and privacy in wireless Internet of Things (IoT). IoT is a paradigm that involves networked physical objects with embedded technologies to collect, communicate, sense, and interact with the external environment through wireless or wired connections. With rapid advancements in IoT technology, the number of IoT devices is expected to surpass 50 billion by 2020, which has also drawn the attention of attackers who seek to exploit the merits of this new technology for their own benefits. There are many potential security and privacy threats to IoT, such as attacks against IoT systems and unauthorized access to private information of end u…

020203 distributed computingExploitEnd userbusiness.industryWireless networkComputer scienceNetwork security020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreComputer Science Applications0202 electrical engineering electronic engineering information engineeringWirelessEnergy supplyElectrical and Electronic EngineeringInternet of ThingsbusinessPrivate information retrievalcomputerIEEE Wireless Communications
researchProduct

Stopping injection attacks with code and structured data

2018

Injection attacks top the lists of the most harmful software vulnerabilities. Injection vulnerabilities are both commonplace and easy to exploit, which makes development of injection protection schemes important. In this article, we show how injection attacks can be practically eliminated through the use of structured data paired with cryptographic verification codes upon transmission. peerReviewed

0301 basic medicineExploitComputer scienceCross-site scriptingCryptographyComputer securitycomputer.software_genreSQL injection03 medical and health sciences0302 clinical medicineSoftwareSQL injectionCode (cryptography)Cryptographic hash functionProof-carrying codeproof-carrying codetietoturvaSQLbusiness.industryXSS030104 developmental biologyinjection030220 oncology & carcinogenesiscryptographic hashbusinesscomputer
researchProduct

Let the machine do the work: learning to reduce the energetic cost of walking on a split‐belt treadmill

2019

In everyday tasks such as walking and running, we often exploit the work performed by external sources to reduce effort. Recent research has focused on designing assistive devices capable of performing mechanical work to reduce the work performed by muscles and improve walking function. The success of these devices relies on the user learning to take advantage of this external assistance. Although adaptation is central to this process, the study of adaptation is often done using approaches that seem to have little in common with the use of external assistance. We show in 16 young, healthy participants that a common approach for studying adaptation, split-belt treadmill walking, can be under…

0301 basic medicineExploitGV557_SportsPhysiologybusiness.industryComputer scienceWork (physics)QP301.H75_Physiology._Sport.Energetic costWalkingMetabolic costArticleExoskeleton03 medical and health sciences030104 developmental biology0302 clinical medicineHuman–computer interactionExercise TestEnergy costSplit belt treadmillLearningbusiness030217 neurology & neurosurgeryWearable technology
researchProduct

Coupling News Sentiment with Web Browsing Data Improves Prediction of Intra-Day Price Dynamics

2015

The new digital revolution of big data is deeply changing our capability of understanding society and forecasting the outcome of many social and economic systems. Unfortunately, information can be very heterogeneous in the importance, relevance, and surprise it conveys, affecting severely the predictive power of semantic and statistical methods. Here we show that the aggregation of web users' behavior can be elicited to overcome this problem in a hard to predict complex system, namely the financial market. Specifically, our in-sample analysis shows that the combined use of sentiment analysis of news and browsing activity of users of Yahoo! Finance greatly helps forecasting intra-day and dai…

0301 basic medicineINFORMATIONEconomicsComputer scienceBig datalcsh:MedicineSocial SciencesQuantitative Finance - Computational Financesocial and economic systemsMathematical and Statistical TechniquesSociologybig dataEconometrics050207 economicsComputer NetworksCapital Marketslcsh:ScienceFinancial Marketsmedia_common050208 financeMultidisciplinary05 social sciencesCommerceSocial CommunicationSettore FIS/02 - Fisica Teorica Modelli e Metodi MatematiciSurpriseModels EconomicSocial NetworksPhysical SciencesSocial SystemsEngineering and TechnologyComputational sociologyBEHAVIORStatistics (Mathematics)Network AnalysisResearch ArticleComputer and Information SciencesExploitmedia_common.quotation_subjectTwitterComputational Finance (q-fin.CP)Research and Analysis MethodsFOS: Economics and business03 medical and health sciencesSEARCH0502 economics and businessHumansRelevance (information retrieval)Web navigationInvestmentsStatistical MethodsInternetStatistical Finance (q-fin.ST)STOCK-MARKETbusiness.industrylcsh:RSentiment analysisFinancial marketATTENTIONQuantitative Finance - Statistical FinanceCommunicationsNoise ReductionFinancial Firms030104 developmental biologySignal ProcessingPredictive powerlcsh:QStock marketbusinessSocial MediaFinanceMathematicsForecastingPLOS ONE
researchProduct

“Minding the gap” in the research on human trafficking for sexual purposes

2017

Since the signature of the United Nations Trafficking Protocol in December 2000 that human trafficking has been labelled as a transnational, complex criminal phenomenon. However, despite the implementation of international soft law instruments to tackle the phenomenon, human trafficking is constantly evolving by the frequent changes of strategies, routes, types of exploitation and methodologies applied by the criminal networks. This flexibility of the phenomenon does not only difficult the implementation of effective tackling measures, but it also demonstrates to be an obstacle to produce accurate information on the subject (Cusick et al, 2009). Furthermore, due to the hidden nature of the …

05 social sciences0507 social and economic geographyGender studiesCriminologyethical issues sexual exploitation0506 political scienceHuman TraffickingParticipant Observation050602 political science & public administrationSettore SPS/12 - Sociologia Giuridica Della Devianza E Mutamento SocialeHuman traffickingSettore SPS/07 - Sociologia GeneraleSociology050703 geographyQualitative Research
researchProduct

Deep neural attention-based model for the evaluation of italian sentences complexity

2020

In this paper, the Automatic Text Complexity Evaluation problem is modeled as a binary classification task tackled by a Neural Network based system. It exploits Recurrent Neural Units and the Attention mechanism to measure the complexity of sentences written in the Italian language. An accurate test phase has been carried out, and the system has been compared with state-of-art tools that tackle the same problem. The computed performances proof the model suitability to evaluate sentence complexity improving the results achieved by other state-of-the-art systems.

050101 languages & linguisticsExploitComputer science02 engineering and technologyText complexity evaluationMachine learningcomputer.software_genreTask (project management)Text Simplification0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMeasure (data warehouse)Deep Neural NetworksArtificial neural networkSettore INF/01 - Informaticabusiness.industryItalian languageNatural language processing05 social sciencesComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)Deep learningText ComplexityBinary classification020201 artificial intelligence & image processingArtificial intelligenceTest phasebusinesscomputerSentence
researchProduct

Extending PluTo for Multiple Devices by Integrating OpenACC

2018

For many years now, processor vendors increased the performance of their devices by adding more cores and wider vectorization units to their CPUs instead of scaling up the processors' clock frequency. Moreover, GPUs became popular for solving problems with even more parallel compute power. To exploit the full potential of modern compute devices, specific codes are necessary which are often coded in a hardware-specific manner. Usually, the codes for CPUs are not usable for GPUs and vice versa. The programming API OpenACC tries to close this gap by enabling one code-base to be suitable and optimized for many devices. Nevertheless, OpenACC is rarely used by `standard programmers' and while dif…

060201 languages & linguisticsMulti-core processorExploitComputer scienceClock rate06 humanities and the arts02 engineering and technologyParallel computingUSablecomputer.software_genrePluto0602 languages and literature0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingCompilercomputer2018 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP)
researchProduct

Exotic Meats: An Alternative Food Source

2019

International audience; Exotic meats were a protein source for human diet for many years. However, the massive capture caused the overexploitation and placed many reptiles and amphibious on the verge of extinction. Therefore, the captive rearing, the control during slaughtering and processing has been proposed as an alternative to the capture of wild animals. The present chapter shows the nutritional composition of this kind of meat, characterized by low levels of fat, high contents of protein, essential amino acids, fatty acids (especially long-chain n-3) and minerals indicating that their consumption may be beneficial for human health. However, very little data is available on the nutriti…

2. Zero hunger0303 health sciencessnakebusiness.industryNutritional composition[SDV]Life Sciences [q-bio]0402 animal and dairy scienceA proteinIntroduced species04 agricultural and veterinary sciencesturtleBiology040201 dairy & animal sciencefrog[SHS]Humanities and Social Scienceslizards03 medical and health sciencesOverexploitationHuman healthAgriculture[INFO]Computer Science [cs]Food sciencebusinesscrocodile030304 developmental biology
researchProduct