Search results for "Key"

showing 10 items of 1962 documents

A self-adaptable distributed CBR version of the EquiVox system

2016

Three dimensional (3D) voxel phantoms are numerical representations of human bodies, used by physicians in very different contexts. In the controlled context of hospitals, where from 2 to 10 subjects may arrive per day, phantoms are used to verify computations before therapeutic exposure to radiation of cancerous tumors. In addition, 3D phantoms are used to diagnose the gravity of accidental exposure to radiation. In such cases, there may be from 10 to more than 1000 subjects to be diagnosed simultaneously. In all of these cases, computation accuracy depends on a single such representation. In this paper, we present EquiVox which is a tool composed of several distributed functions and enab…

Computer scienceComputation0206 medical engineeringBiomedical EngineeringBiophysicsTherapeutic exposureBioengineeringContext (language use)02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]computer.software_genreMachine learning[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Voxel0202 electrical engineering electronic engineering information engineeringComputer visionRepresentation (mathematics)Adaptation (computer science)business.industryMulti-agent system020601 biomedical engineering[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Key (cryptography)020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Artificial intelligence[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputer
researchProduct

Logical Key Hierarchy for Group Management in Distributed Online Social Networks

2016

Distributed Online Social Networks (DOSNs) have recently been proposed to shift the control over user data from a unique entity to the users of the DOSN themselves. In this paper, we focus our attention on the problem of privacy preserving content sharing to a large group of users of the DOSNs. Several solutions, based on cryptographic techniques, have been recently proposed. The main challenge here is the definition of a scalable and decentralized approach that: i) minimizes the re-encryption of the contents published in a group when the composition of the group changes and ii) enables a fast distribution of the cryptographic keys to all the members (n) of a group, each time a new user is …

Computer scienceComputer Networks and CommunicationsCryptography02 engineering and technologyEncryptionSet (abstract data type)Public-key cryptography0202 electrical engineering electronic engineering information engineeringMathematics (all)Distributed Online Social Network; Privacy; Secure Group communicationFocus (computing)Social networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)020206 networking & telecommunicationsComputer Science Applications1707 Computer Vision and Pattern RecognitionSecure Group communicationDistributed Online Social NetworkPrivacyScalabilitySignal ProcessingKey (cryptography)020201 artificial intelligence & image processingbusinessSoftwareComputer network
researchProduct

Fake Nodes approximation for Magnetic Particle Imaging

2020

Accurately reconstructing functions with discontinuities is the key tool in many bio-imaging applications as, for instance, in Magnetic Particle Imaging (MPI). In this paper, we apply a method for scattered data interpolation, named mapped bases or Fake Nodes approach, which incorporates discontinuities via a suitable mapping function. This technique naturally mitigates the Gibbs phenomenon, as numerical evidence for reconstructing MPI images confirms.

Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONradial basis functionsFunction (mathematics)Magnetic Particle ImagingClassification of discontinuitieskernelsinterpolationGibbs phenomenonSettore MAT/08 - Analisi Numericasymbols.namesakeMagnetic particle imagingsymbolsKey (cryptography)Radial basis functioninterpolation; kernels; Magnetic Particle Imaging; radial basis functionsGFadial basis functionAlgorithmComputingMethodologies_COMPUTERGRAPHICSInterpolation2020 IEEE 20th Mediterranean Electrotechnical Conference ( MELECON)
researchProduct

Fuzzy Logic Based Security Trust Evaluation for IoT Environments

2019

In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…

Computer scienceContext (language use)02 engineering and technology[INFO] Computer Science [cs]TrustComputer securitycomputer.software_genreFuzzy logicFuzzy LogicFactor (programming language)Node (computer science)0202 electrical engineering electronic engineering information engineeringcomputer.programming_languagePrivacy.[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industry020206 networking & telecommunicationsInternet of Things (IoT)SecurityKey (cryptography)020201 artificial intelligence & image processingThe InternetbusinessPersonally identifiable informationcomputerPhysical security2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)
researchProduct

Response Determination Criteria for ELISPOT: Toward a Standard that Can Be Applied Across Laboratories

2011

ELISPOT assay readout is often dichomized as positive or negative responses according to prespecified criteria. However, these criteria can vary widely across institutions. The adoption of a common response criterion is a key step toward cross-laboratory comparability. This chapter describes the two main approaches to response determination, identifying the strengths and limitations of each. Nonparametric statistical tests and consideration of data quality are recommended and instructions provided for their ready implementation by nonstatisticians and statisticians alike.

Computer scienceELISPOTData qualityImmunologyMEDLINEKey (cryptography)EconometricsNonparametric statistics
researchProduct

Computational Intelligence and Citizen Communication in the Smart City

2016

Information and communication are at the core of the intelligent city of tomorrow, and the key components of a smart city cannot prescind from data exchanges and interconnectedness. Citizen communication is an integral part of the smart city’s development plans: freedom of information and involvement in collective decisions, e-democracy and decision-making feedback can be greatly enhanced in an intelligent city, and, among other smart city components, foster a new era of participation and wise decisions. In this contribution we describe the methodologies that can be implemented in order to correctly develop automatic recognition systems for citizen communication, paying special attention to…

Computer scienceFreedom of informationComputational intelligence02 engineering and technologyInformation SystemSettore M-FIL/02 - Logica E Filosofia Della ScienzaInterconnectednessTask (project management)Argumentation theoryWorld Wide WebOrder (exchange)020204 information systemsSmart city0202 electrical engineering electronic engineering information engineeringSettore INF/01 - InformaticaComputer Science Applications1707 Computer Vision and Pattern RecognitionComputational Intelligence Citizen Communication Smart CityData scienceComputer Science ApplicationsCitizen CommunicationComputerSystemsOrganization_MISCELLANEOUSComputational IntelligenceSmart CityKey (cryptography)020201 artificial intelligence & image processingInformation Systems
researchProduct

A Study Regarding the Use of Expert Systems in Economics Field

2013

Abstract Expert systems simulate the formal reasoning of human expert in a narrow field like stock trading. The traditional method is using IF-THEN rules. Nowadays, Belief Rule Base (BRB) expert systems are capable to perform reasoning based both qualitative and quantitative information. The paper presents a SWOT analysis of expert systems, emphasizing the opportunities the use of expert systems offers to economics field. Using expert systems in economics field provides strategic benefits like: competitive financial advantages, investment advisory, better organisation of workflow, back-up for key experts, training tool for new employees, diagnosis of critical aspects, prognosis of economic …

Computer scienceManagement scienceGeneral EngineeringEnergy Engineering and Power Technologyexpert systemsSWOT analysisLegal expert systemcomputer.software_genreInvestment (macroeconomics)economics.Expert systemField (computer science)Subject-matter expertWorkflowKey (cryptography)strategic benefitsMarketingcomputerSWOT analysisProcedia Economics and Finance
researchProduct

The Implications of Fuzzy Logic in Qualitative Mathematical Modeling of Some Key Aspects Related to the Sustainability Issues around “Roşia Montană P…

2013

Abstract This paper aims to address in terms of fuzzy logic the qualitative mathematical modeling of some key aspects that implies ensuring of sustainability within “Rosia Montana mining Project”, both from the business itself perspective, as well as from the community and ecological ones. The proposed fuzzy methodology is also very useful and can be successfully applied for any company that evolves in uncertainty and ambiguity conditions and within which the decisional factor reasoning is subjective, due to itself abstract thinking of human being in this kind of situations, which often manifests itself through qualitative linguistic values. In this context, the development of a fuzzy metho…

Computer scienceManagement sciencemedia_common.quotation_subjectPerspective (graphical)General EngineeringEnergy Engineering and Power TechnologyContext (language use)Ambiguitymulticriteria decision.sustainabilityFuzzy logicFactor (programming language)SustainabilityKey (cryptography)fuzzy logiccomputerJava Programming Languagecomputer.programming_languagemedia_commonProcedia Economics and Finance
researchProduct

Perfomance of Ultra-Wideband OFDM Systems Using Adaptive MPSK Modulation over Nakagami-m Channels

2006

The physical layer proposal of the Multiband OFDM (MB-OFDM) Alliance to the TG3a Working Group of IEEE802.15 for ultra wideband (UWB) systems defines the use of a fixed QPSK modulation scheme in all subcarriers corresponding to 14 subbands of this proposal. In this paper, an adaptive MPSK digital modulation scheme has been proposed to improve the average capacity expressed in bits/symbol for the MB-OFDM. The channel fading has been modeled Nakagami-m distributed and the power delay profile (PDP) is assumed exponential. This average capacity has been evaluated for many channel conditions as a function of the average signal-to-noise ratio (SNR) and the fading parameter of the Nakagami-m distr…

Computer scienceModulationbusiness.industryOrthogonal frequency-division multiplexingElectronic engineeringFadingLink adaptationNakagami distributionbusinessPower delay profileCommunication channelPhase-shift keyingComputer network2006 3rd International Symposium on Wireless Communication Systems
researchProduct

Nanosensors for intelligent packaging

2021

Abstract Intelligent packaging is an emerging area with a high potentials. Sensors and indicators are key elements, together with enabling technologies, for the development of a new generation of packaging able to interact with the sample and the user. Nanotechnology offers interesting opportunities for the development of active components, integration with the packaging, miniaturization, communication, and batteries. However, its use in intelligent packaging is still limited. We report herein a revision of recent examples of sensors including nanomaterials or nanostructures with potential application in packaging. The references include time temperature indicators, pH, moisture and pressur…

Computer scienceNanosensorMiniaturizationActive componentsSystems engineeringActive packagingKey (cryptography)
researchProduct