Search results for "Exploit"
showing 10 items of 284 documents
A case study of the coconut crab Birgus latro on Zanzibar highlights global threats and conservation solutions
2021
Abstract The coconut crab Birgus latro, the largest terrestrial decapod, is under threat in most parts of its geographical range. Its life cycle involves two biomes (restricted terrestrial habitats near the coast, and salt water currents of the tropical Indian and Pacific Oceans). Its dependence on coastal habitat means it is highly vulnerable to the habitat destruction that typically accompanies human population expansion along coastlines. Additionally, it has a slow reproductive rate and can reach large adult body sizes that, together with its slow movement when on land, make it highly susceptible to overharvesting. We studied the distribution and population changes of coconut crabs at 15…
Planting Systems for Modern Olive Growing: Strengths and Weaknesses
2021
The objective of fully mechanizing olive harvesting has been pursued since the 1970s to cope with labor shortages and increasing production costs. Only in the last twenty years, after adopting super-intensive planting systems and developing appropriate straddle machines, a solution seems to have been found. The spread of super-intensive plantings, however, raises serious environmental and social concerns, mainly because of the small number of cultivars that are currently used (basically 2), compared to over 100 cultivars today cultivated on a large scale across the world. Olive growing, indeed, insists on over 11 million hectares. Despite its being located mostly in the Mediterranean countr…
Security and Privacy in Wireless IoT
2018
The 13 articles in this special section focus on security and privacy in wireless Internet of Things (IoT). IoT is a paradigm that involves networked physical objects with embedded technologies to collect, communicate, sense, and interact with the external environment through wireless or wired connections. With rapid advancements in IoT technology, the number of IoT devices is expected to surpass 50 billion by 2020, which has also drawn the attention of attackers who seek to exploit the merits of this new technology for their own benefits. There are many potential security and privacy threats to IoT, such as attacks against IoT systems and unauthorized access to private information of end u…
Stopping injection attacks with code and structured data
2018
Injection attacks top the lists of the most harmful software vulnerabilities. Injection vulnerabilities are both commonplace and easy to exploit, which makes development of injection protection schemes important. In this article, we show how injection attacks can be practically eliminated through the use of structured data paired with cryptographic verification codes upon transmission. peerReviewed
Let the machine do the work: learning to reduce the energetic cost of walking on a split‐belt treadmill
2019
In everyday tasks such as walking and running, we often exploit the work performed by external sources to reduce effort. Recent research has focused on designing assistive devices capable of performing mechanical work to reduce the work performed by muscles and improve walking function. The success of these devices relies on the user learning to take advantage of this external assistance. Although adaptation is central to this process, the study of adaptation is often done using approaches that seem to have little in common with the use of external assistance. We show in 16 young, healthy participants that a common approach for studying adaptation, split-belt treadmill walking, can be under…
Coupling News Sentiment with Web Browsing Data Improves Prediction of Intra-Day Price Dynamics
2015
The new digital revolution of big data is deeply changing our capability of understanding society and forecasting the outcome of many social and economic systems. Unfortunately, information can be very heterogeneous in the importance, relevance, and surprise it conveys, affecting severely the predictive power of semantic and statistical methods. Here we show that the aggregation of web users' behavior can be elicited to overcome this problem in a hard to predict complex system, namely the financial market. Specifically, our in-sample analysis shows that the combined use of sentiment analysis of news and browsing activity of users of Yahoo! Finance greatly helps forecasting intra-day and dai…
“Minding the gap” in the research on human trafficking for sexual purposes
2017
Since the signature of the United Nations Trafficking Protocol in December 2000 that human trafficking has been labelled as a transnational, complex criminal phenomenon. However, despite the implementation of international soft law instruments to tackle the phenomenon, human trafficking is constantly evolving by the frequent changes of strategies, routes, types of exploitation and methodologies applied by the criminal networks. This flexibility of the phenomenon does not only difficult the implementation of effective tackling measures, but it also demonstrates to be an obstacle to produce accurate information on the subject (Cusick et al, 2009). Furthermore, due to the hidden nature of the …
Deep neural attention-based model for the evaluation of italian sentences complexity
2020
In this paper, the Automatic Text Complexity Evaluation problem is modeled as a binary classification task tackled by a Neural Network based system. It exploits Recurrent Neural Units and the Attention mechanism to measure the complexity of sentences written in the Italian language. An accurate test phase has been carried out, and the system has been compared with state-of-art tools that tackle the same problem. The computed performances proof the model suitability to evaluate sentence complexity improving the results achieved by other state-of-the-art systems.
Extending PluTo for Multiple Devices by Integrating OpenACC
2018
For many years now, processor vendors increased the performance of their devices by adding more cores and wider vectorization units to their CPUs instead of scaling up the processors' clock frequency. Moreover, GPUs became popular for solving problems with even more parallel compute power. To exploit the full potential of modern compute devices, specific codes are necessary which are often coded in a hardware-specific manner. Usually, the codes for CPUs are not usable for GPUs and vice versa. The programming API OpenACC tries to close this gap by enabling one code-base to be suitable and optimized for many devices. Nevertheless, OpenACC is rarely used by `standard programmers' and while dif…
Exotic Meats: An Alternative Food Source
2019
International audience; Exotic meats were a protein source for human diet for many years. However, the massive capture caused the overexploitation and placed many reptiles and amphibious on the verge of extinction. Therefore, the captive rearing, the control during slaughtering and processing has been proposed as an alternative to the capture of wild animals. The present chapter shows the nutritional composition of this kind of meat, characterized by low levels of fat, high contents of protein, essential amino acids, fatty acids (especially long-chain n-3) and minerals indicating that their consumption may be beneficial for human health. However, very little data is available on the nutriti…