Search results for "Internet."

showing 10 items of 2570 documents

Run-time scalable NoC for FPGA based virtualized IPs

2017

The integration of virtualized FPGA-based hardware accelerators in a cloud computing is progressing from time to time. As the FPGA has limited resources, the dynamic partial reconfiguration capability of the FPGA is considered to share resources among different virtualized IPs during runtime. On the other hand, the NoC is a promising solution for communication among virtualized FPGA-based IPs. However, not all the virtualized regions of the FPGA will be active all the time. When there is no demand for virtualized IPs, the virtualized regions are loaded with blank bitstreams to save power. However, keeping active the idle components of the NoC connecting with the idle virtualized regions is …

010302 applied physics[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Computer sciencebusiness.industry[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Control reconfigurationCloud computing02 engineering and technology01 natural sciences020202 computer hardware & architecturePower (physics)Idle[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]On demandEmbedded system0103 physical sciencesScalabilityHardware_INTEGRATEDCIRCUITS0202 electrical engineering electronic engineering information engineeringRouting (electronic design automation)Field-programmable gate arraybusinessComputingMilieux_MISCELLANEOUS
researchProduct

X!TandemPipeline: a tool to manage sequence redundancy for protein inference and phosphosite identification

2017

X!TandemPipeline is a software designed to perform protein inference and to manage redundancy in the results of phosphosite identification by database search. It provides the minimal list of proteins or phosphosites that are present in a set of samples using grouping algorithms based on the principle of parsimony. Regarding proteins, a two-level classification is performed, where groups gather proteins sharing at least one peptide and subgroups gather proteins that are not distinguishable according to the identified peptides. Regarding phosphosites, an innovative approach based on the concept of phosphoisland is used to gather overlapping phosphopeptides. The graphical interface of X!Tandem…

0106 biological sciences0301 basic medicinePhosphopeptidesProteomicsphosphopeptideComputer sciencecomputer.internet_protocolcomputer.software_genre01 natural sciencesBiochemistrydatabase search03 medical and health sciencesSearch engineUser-Computer InterfaceRedundancy (information theory)SoftwareTandem Mass Spectrometry[ INFO.INFO-BI ] Computer Science [cs]/Bioinformatics [q-bio.QM]HumansDatabase search engineAmino Acid SequenceDatabases ProteinGraphical user interfacemass spectrometrybusiness.industrysoftwareprotein inferenceProteinsGeneral ChemistrybioinformaticsSearch EngineBenchmarking030104 developmental biologyComputingMethodologies_PATTERNRECOGNITIONProtein inferenceData mining[INFO.INFO-BI]Computer Science [cs]/Bioinformatics [q-bio.QM]businesscomputerXMLAlgorithms010606 plant biology & botany
researchProduct

Conservation and people: Towards an ethical code of conduct for the use of camera traps in wildlife research

2020

International audience; Abstract 1. Camera trapping is a widely employed tool in wildlife research, used to estimate animal abundances, understand animal movement, assess species richness and understand animal behaviour. In addition to images of wild animals, research cameras often record human images, inadvertently capturing behaviours ranging from innocuous actions to potentially serious crimes. 2. With the increasing use of camera traps, there is an urgent need to reflect on how researchers should deal with human images caught on cameras. On the one hand, it is important to respect the privacy of individuals caught on cameras, while, on the other hand, there is a larger public duty to re…

0106 biological sciencesCode of conductmedia_common.quotation_subjectPARTNERS principles for community‐based conservationInternet privacyComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONWildlifeprivacyhuman rights010603 evolutionary biology01 natural sciencesEcology and Environment[SHS]Humanities and Social Sciencessnow leopardGE1-35014. Life underwaterlawQH540-549.5Ethical codemedia_commonEcologyHuman rightscamera trapcode of conductbusiness.industry010604 marine biology & hydrobiology15. Life on landethicsEnvironmental sciencesGeographySnow leopardCamera trapPARTNERS principles for community-based conservationbusinessEcological Solutions and Evidence
researchProduct

Studying illegal online trades in plants: market characteristics, organisational and behavioural aspects, and policing challenges

2020

AbstractIllegal commerce in plants and their derivatives threatens and destroys numerous species and important natural resources, and may cause phytosanitary and health problems. This illegal trade, which has been boosted by the commercialisation of the Internet, has been relatively overlooked in criminological research. Furthermore, the policing of illegal plant markets remains limited and poorly resourced, with law enforcement agencies lacking awareness and technical capacity in investigation and prosecution services. Based on semi-structured interviews with law enforcement officers and other relevant experts, this study, developed in the context of the ESRC-funded project “FloraGuard: Ta…

0106 biological sciencesInterdisciplinarityContext (language use)ComputingMilieux_LEGALASPECTSOFCOMPUTINGRecommendations010603 evolutionary biology01 natural sciencesHealth problemsWildlife trafficking0505 lawPolicingbusiness.industry05 social sciencesLaw enforcementOnline tradingEnvironmental crimePublic relationsNatural resourceIdentification (information)Settore BIO/03 - Botanica Ambientale E Applicata050501 criminologyThe Internetbusinesstraffico di specie protetteLawIllegal plant trade
researchProduct

Monitoring internet trade to inform species conservation actions

2017

Specimens, parts and products of threatened species are now commonly traded on the internet. This could threaten the survival of some wild populations if inadequately regulated. We outline two methods to monitor internet sales of threatened species in order to assess potential threats and inform conservation actions. Our first method combines systematic monitoring of online offers of plants for sale over the internet with consultation by experts experienced in identifying plants collected from the wild based on images of the specimens, species identity and details of the trade. Our second method utilises a computational model, trained using Bayesian techniques to records that have been clas…

0106 biological sciencesSettore BIO/07 - EcologiaEcologybusiness.industry010604 marine biology & hydrobiologyInternet privacyfood and beverages010603 evolutionary biology01 natural scienceslcsh:QK1-989Geographylcsh:Botanylcsh:ZoologySettore BIO/03 - Botanica Ambientale E ApplicataThe InternetAdenia Commiphora Operculicarya Uncarina Machine learning Infer.NET Naive Bayes classifierlcsh:QL1-991businessNature and Landscape Conservation
researchProduct

Security and Privacy in Wireless IoT

2018

The 13 articles in this special section focus on security and privacy in wireless Internet of Things (IoT). IoT is a paradigm that involves networked physical objects with embedded technologies to collect, communicate, sense, and interact with the external environment through wireless or wired connections. With rapid advancements in IoT technology, the number of IoT devices is expected to surpass 50 billion by 2020, which has also drawn the attention of attackers who seek to exploit the merits of this new technology for their own benefits. There are many potential security and privacy threats to IoT, such as attacks against IoT systems and unauthorized access to private information of end u…

020203 distributed computingExploitEnd userbusiness.industryWireless networkComputer scienceNetwork security020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreComputer Science Applications0202 electrical engineering electronic engineering information engineeringWirelessEnergy supplyElectrical and Electronic EngineeringInternet of ThingsbusinessPrivate information retrievalcomputerIEEE Wireless Communications
researchProduct

Experimental trade-offs between different strategies for multihop communications evaluated over real deployments of wireless sensor network for envir…

2018

Although much work has been done since wireless sensor networks appeared, there is not a great deal of information available on real deployments that incorporate basic features associated with these networks, in particular multihop routing and long lifetimes features. In this article, an environmental monitoring application (Internet of Things oriented) is described, where temperature and relative humidity samples are taken by each mote at a rate of 2 samples/min and sent to a sink using multihop routing. Our goal is to analyse the different strategies to gather the information from the different motes in this context. The trade-offs between ‘sending always’ and ‘buffering locally’ approac…

020203 distributed computingInternetComputer Networks and Communicationsbusiness.industryComputer scienceTrade offsGeneral Engineering020206 networking & telecommunications02 engineering and technologyXarxes locals sense fil Wi-Filcsh:QA75.5-76.95Environmental monitoring0202 electrical engineering electronic engineering information engineeringlcsh:Electronic computers. Computer scienceInternet of ThingsbusinessWireless sensor networkComputer network
researchProduct

5G IoT system for real-time psycho-acoustic soundscape monitoring in smart cities

2020

In Next-Generation Technologies, the monitoring of environmental noise nuisance in the Smart City should be as efficient as possible. 5G IoT systems offer a great opportunity to offload the node calculation, as they provide a number of new concepts for dynamic computing that previous technologies did not offer. In this case, a complete 5G IoT system for psycho-acoustic monitoring has been implemented using different options to offload the calculation of the parameters to different parts of the system. This offloading has been implemented by directly computing the metrics in the node (as a Raspberry Pi), and in a ESP32 device (FiPy) and by sampling the audio and sending it to the EDGE in the…

020203 distributed computingSoundscapeComputer sciencebusiness.industryNode (networking)Real-time computingSampling (statistics)02 engineering and technologySmart city0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingEnhanced Data Rates for GSM EvolutionEnvironmental noiseInternet of Thingsbusiness5GProceedings of the 10th Euro-American Conference on Telematics and Information Systems
researchProduct

A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing

2016

Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently share their private health data among a variety of users including healthcare professionals as well as family and friends. PHRs are usually outsourced and stored in third-party cloud platforms which relieves PHR owners from the burden of managing their PHR data while achieving better availability of health data. However, outsourcing private health data raises significant privacy concerns because there is a higher risk of leaking health information to unauthorized parties. To ensure PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mech…

020203 distributed computingbusiness.industryComputer scienceInternet privacy020206 networking & telecommunicationsAccess controlHealth information exchangeCloud computing02 engineering and technologyEncryptionComputer securitycomputer.software_genreOutsourcingResource (project management)Health care0202 electrical engineering electronic engineering information engineeringAttribute-based encryptionbusinesscomputer2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)
researchProduct

Catalogue of Interactive Learning Objectives to improve an Integrated Medical and Dental Curriculum.

2016

ABSTRACT Introduction Online learning media are increasingly being incorporated into medical and dental education. However, the coordination between obligatory and facultative teaching domains still remains unsatisfying. The Catalogue of Interactive Learning Objectives of the University Clinic of Mainz (ILKUM), aims to offer knowledge transfer for students while being mindful of their individual qualifications. Its hierarchical structure is designed according to the Association for Dental Education in Europe (ADEE) levels of competence. Materials and methods The ILKUM was designed to establish a stronger interconnection between already existing and prospective learning strategies. All conte…

020205 medical informatics02 engineering and technologyDental educationInteractive LearningEducation Distance03 medical and health sciences0302 clinical medicineGermany0202 electrical engineering electronic engineering information engineeringMedicineGeneral DentistryCompetence (human resources)Education DentalSimulation TrainingDental curriculumMedical educationbusiness.industryOnline learning030206 dentistryMobile ApplicationsComputers HandheldThe InternetClinical caseCurriculumbusinessKnowledge transferEducation Medical UndergraduateThe journal of contemporary dental practice
researchProduct