Search results for "Internet."
showing 10 items of 2570 documents
Run-time scalable NoC for FPGA based virtualized IPs
2017
The integration of virtualized FPGA-based hardware accelerators in a cloud computing is progressing from time to time. As the FPGA has limited resources, the dynamic partial reconfiguration capability of the FPGA is considered to share resources among different virtualized IPs during runtime. On the other hand, the NoC is a promising solution for communication among virtualized FPGA-based IPs. However, not all the virtualized regions of the FPGA will be active all the time. When there is no demand for virtualized IPs, the virtualized regions are loaded with blank bitstreams to save power. However, keeping active the idle components of the NoC connecting with the idle virtualized regions is …
X!TandemPipeline: a tool to manage sequence redundancy for protein inference and phosphosite identification
2017
X!TandemPipeline is a software designed to perform protein inference and to manage redundancy in the results of phosphosite identification by database search. It provides the minimal list of proteins or phosphosites that are present in a set of samples using grouping algorithms based on the principle of parsimony. Regarding proteins, a two-level classification is performed, where groups gather proteins sharing at least one peptide and subgroups gather proteins that are not distinguishable according to the identified peptides. Regarding phosphosites, an innovative approach based on the concept of phosphoisland is used to gather overlapping phosphopeptides. The graphical interface of X!Tandem…
Conservation and people: Towards an ethical code of conduct for the use of camera traps in wildlife research
2020
International audience; Abstract 1. Camera trapping is a widely employed tool in wildlife research, used to estimate animal abundances, understand animal movement, assess species richness and understand animal behaviour. In addition to images of wild animals, research cameras often record human images, inadvertently capturing behaviours ranging from innocuous actions to potentially serious crimes. 2. With the increasing use of camera traps, there is an urgent need to reflect on how researchers should deal with human images caught on cameras. On the one hand, it is important to respect the privacy of individuals caught on cameras, while, on the other hand, there is a larger public duty to re…
Studying illegal online trades in plants: market characteristics, organisational and behavioural aspects, and policing challenges
2020
AbstractIllegal commerce in plants and their derivatives threatens and destroys numerous species and important natural resources, and may cause phytosanitary and health problems. This illegal trade, which has been boosted by the commercialisation of the Internet, has been relatively overlooked in criminological research. Furthermore, the policing of illegal plant markets remains limited and poorly resourced, with law enforcement agencies lacking awareness and technical capacity in investigation and prosecution services. Based on semi-structured interviews with law enforcement officers and other relevant experts, this study, developed in the context of the ESRC-funded project “FloraGuard: Ta…
Monitoring internet trade to inform species conservation actions
2017
Specimens, parts and products of threatened species are now commonly traded on the internet. This could threaten the survival of some wild populations if inadequately regulated. We outline two methods to monitor internet sales of threatened species in order to assess potential threats and inform conservation actions. Our first method combines systematic monitoring of online offers of plants for sale over the internet with consultation by experts experienced in identifying plants collected from the wild based on images of the specimens, species identity and details of the trade. Our second method utilises a computational model, trained using Bayesian techniques to records that have been clas…
Security and Privacy in Wireless IoT
2018
The 13 articles in this special section focus on security and privacy in wireless Internet of Things (IoT). IoT is a paradigm that involves networked physical objects with embedded technologies to collect, communicate, sense, and interact with the external environment through wireless or wired connections. With rapid advancements in IoT technology, the number of IoT devices is expected to surpass 50 billion by 2020, which has also drawn the attention of attackers who seek to exploit the merits of this new technology for their own benefits. There are many potential security and privacy threats to IoT, such as attacks against IoT systems and unauthorized access to private information of end u…
Experimental trade-offs between different strategies for multihop communications evaluated over real deployments of wireless sensor network for envir…
2018
Although much work has been done since wireless sensor networks appeared, there is not a great deal of information available on real deployments that incorporate basic features associated with these networks, in particular multihop routing and long lifetimes features. In this article, an environmental monitoring application (Internet of Things oriented) is described, where temperature and relative humidity samples are taken by each mote at a rate of 2 samples/min and sent to a sink using multihop routing. Our goal is to analyse the different strategies to gather the information from the different motes in this context. The trade-offs between ‘sending always’ and ‘buffering locally’ approac…
5G IoT system for real-time psycho-acoustic soundscape monitoring in smart cities
2020
In Next-Generation Technologies, the monitoring of environmental noise nuisance in the Smart City should be as efficient as possible. 5G IoT systems offer a great opportunity to offload the node calculation, as they provide a number of new concepts for dynamic computing that previous technologies did not offer. In this case, a complete 5G IoT system for psycho-acoustic monitoring has been implemented using different options to offload the calculation of the parameters to different parts of the system. This offloading has been implemented by directly computing the metrics in the node (as a Raspberry Pi), and in a ESP32 device (FiPy) and by sampling the audio and sending it to the EDGE in the…
A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing
2016
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently share their private health data among a variety of users including healthcare professionals as well as family and friends. PHRs are usually outsourced and stored in third-party cloud platforms which relieves PHR owners from the burden of managing their PHR data while achieving better availability of health data. However, outsourcing private health data raises significant privacy concerns because there is a higher risk of leaking health information to unauthorized parties. To ensure PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mech…
Catalogue of Interactive Learning Objectives to improve an Integrated Medical and Dental Curriculum.
2016
ABSTRACT Introduction Online learning media are increasingly being incorporated into medical and dental education. However, the coordination between obligatory and facultative teaching domains still remains unsatisfying. The Catalogue of Interactive Learning Objectives of the University Clinic of Mainz (ILKUM), aims to offer knowledge transfer for students while being mindful of their individual qualifications. Its hierarchical structure is designed according to the Association for Dental Education in Europe (ADEE) levels of competence. Materials and methods The ILKUM was designed to establish a stronger interconnection between already existing and prospective learning strategies. All conte…