Search results for "Oriente"

showing 10 items of 684 documents

'Love comes first, and it is ahead of any different political partisanism': How political polarizations compare to other forms of discrimination in B…

2021

Background: Affective polarization and stigma toward individuals with schizophrenia and toward immigrants in Argentina are not new despite its importance and dissemination. However, no research has been conducted taking into consideration political partisanship and attitudes toward these groups. Aims: Political polarization and attitudes toward socialization across party lines are studied in conjunction with attitudes toward immigrants and toward individuals with schizophrenia. Method: Individuals from Buenos Aires ( n = 712) were surveyed for their political partisanship and their attitudes toward Peruvian and Bolivian immigrants, people with schizophrenia and partisans from the opposing p…

Schizophrenia (object-oriented programming)media_common.quotation_subject05 social sciencesPolarization (politics)ImmigrationSocial StigmaArgentinaStigma (botany)030227 psychiatry0506 political science03 medical and health sciencesPsychiatry and Mental healthPolitics0302 clinical medicineAttitude050602 political science & public administrationSchizophreniaHumansPsychologyChildSocial psychologymedia_commonThe International journal of social psychiatry
researchProduct

Analysis of dynamic service oriented systems for security related problems detection

2017

The paper presents an approach to solve some problems arising in the management process of IT security. Our motivation of this research is to study in every detail the context of service oriented systems, which can be defined as considerable heterogeneous, dynamic and flexible configuration of the hardware and software system resources. The fundamental difference between security management systems with traditional centralized and monolithic architecture and service oriented systems is discussed. We propose a multilayered-reference model for service-oriented systems aimed predominantly at principal objectives related to IT based systems security working in dynamic environments. Likewise, co…

Security engineeringCloud computing securitysecurity incidentsSecurity serviceSoftware security assuranceComputer scienceDistributed computingSherwood Applied Business Security Architecturesecurity levelSecurity managementservice oriented systemsComputer security modelSecurity information and event management
researchProduct

Security framework for dynamic service-oriented IT systems

2018

The paper proposes a framework for dynamic service-oriented IT systems security. We review the context of service-oriented architecture (SOA), which constitutes a paradigm of dynamic system configuration including security constraints at the system module development stage, supporting with the domain-driven resources, carrying out routine SOA maintenance and implementing XML-compatible parsing technologies in order to improve the system performance. Likewise, we discuss the fundamental differences between security management systems with traditional centralized and monolithic architecture and service-oriented IT systems from the perspective of security-related issues. Web services security …

Security frameworkProcess managementService oriented systemsComputer Networks and CommunicationsComputer science0211 other engineering and technologiesContext (language use)02 engineering and technologylcsh:Telecommunicationlcsh:TK5101-6720security level0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)Electrical and Electronic EngineeringArchitectureService orientedSecurity levelService-oriented systems021110 strategic defence & security studieslcsh:T58.5-58.64lcsh:Information technologybusiness.industryInformation technologyComputer Science Applicationssecurity incidents020201 artificial intelligence & image processingbusinessJournal of Information and Telecommunication
researchProduct

Marginal contribution, reciprocity and equity in segregated groups: Bounded rationality and selforganization in social networks

2007

We study the formation of social networks that are based on local interaction and simple rule following. Agents evaluate the profitability of link formation on the basis of the Myerson-Shapley principle that payoffs come from the marginal contribution they make to coalitions. The NP-hard problem associated with the Myerson-Shapley value is replaced by a boundedly rational 'spatially' myopic process. Agents consider payoffs from direct links with their neighbours (level 1), which can include indirect payoffs from neighbours' neighbours (level 2) and up to M-levels that are far from global. Agents dynamically break away from the neighbour to whom they make the least marginal contribution. Com…

Self-organizationSelf-organizationEconomics and EconometricsControl and OptimizationEquity (economics)Applied MathematicsNetwork structureRule followingEfficiencyBounded rationalitySocial networksNETWORKSMicroeconomicsMarket orientedMyerson-Shapley valueEconomicsProfitability indexMathematical economicsStabilityValuation (finance)
researchProduct

A Geographical Self-Organizing Approach for Vehicular Networks

2012

Cooperative vehicular networks have always been considered as the perfect way to bring more comfort to the passengers and more safety to the human life. Thus, research community and governmental organizations are interested to study and deploy these networks. The vehicular networks principle is connecting vehicles to each other and to existing infrastructure. However, their industrialization faces some challenges: (i) high mobility, (ii) frequently partitioned network, (iii) geographically constrained topology, and (iv) scalability. Therefore, in contrast to traditional networks, vehicular network protocols focus on both achieving adequate QoS level and reducing overhead. Achieving these tw…

Self-organizationVehicular ad hoc network[SPI] Engineering Sciences [physics]Computer sciencebusiness.industryQuality of serviceself-organizationvirtual backboneperformance evaluationScalabilityKey (cryptography)Overhead (computing)vehicular networksElectrical and Electronic EngineeringCommunications protocolbusinessProtocol (object-oriented programming)analytical study.clusteringComputer networkJournal of Communications
researchProduct

Automatic Detection of Hemangioma through a Cascade of Self-organizing Map Clustering and Morphological Operators

2016

Abstract In this paper we propose a method for the automatic detection of hemangioma regions, consisting of a cascade of algorithms: a Self Organizing Map (SOM) for clustering the image pixels in 25 classes (using a 5x5 output layer) followed by a morphological method of reducing the number of classes (MMRNC) to only two classes: hemangioma and non-hemangioma. We named this method SOM-MMRNC. To evaluate the performance of the proposed method we have used Fuzzy C-means (FCM) for comparison. The algorithms were tested on 33 images; for most images, the proposed method and FCM obtain similar overall scores, within one percent of each other. However, in about 18% of the cases, there is a signif…

Self-organizing mapComputer science050801 communication & media studies02 engineering and technologycomputer.software_genreFuzzy logicImage (mathematics)Hemangioma0508 media and communications0202 electrical engineering electronic engineering information engineeringmedicineLayer (object-oriented design)Cluster analysisFuzzy C-meansGeneral Environmental SciencePixelbusiness.industry05 social sciencesPattern recognitionmedicine.diseasehemangiomaCascadeGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingArtificial intelligenceData miningbusinesscomputerSelf Organizing MapclusteringProcedia Computer Science
researchProduct

Hierarchies of Self-Organizing Maps for action recognition

2016

We propose a hierarchical neural architecture able to recognise observed human actions. Each layer in the architecture represents increasingly complex human activity features. The first layer consists of a SOM which performs dimensionality reduction and clustering of the feature space. It represents the dynamics of the stream of posture frames in action sequences as activity trajectories over time. The second layer in the hierarchy consists of another SOM which clusters the activity trajectories of the first-layer SOM and learns to represent action prototypes. The third - and last - layer of the hierarchy consists of a neural network that learns to label action prototypes of the second-laye…

Self-organizing mapComputer scienceIntention understandingCognitive NeuroscienceFeature vectorExperimental and Cognitive PsychologySelf-Organizing Map02 engineering and technologyAction recognition03 medical and health sciences0302 clinical medicineArtificial Intelligence0202 electrical engineering electronic engineering information engineeringLayer (object-oriented design)Cluster analysisSet (psychology)Artificial neural networkbusiness.industryDimensionality reductionNeural networkAction (philosophy)020201 artificial intelligence & image processingArtificial intelligencebusinessHierarchical model030217 neurology & neurosurgerySoftwareCognitive Systems Research
researchProduct

PROLISEAN: A New Security Protocol for Programmable Matter

2021

The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…

Self-reconfiguring modular robot0209 industrial biotechnologySecurity AlgorithmsComputer Networks and CommunicationsComputer scienceDistributed computingHash functionSecurity Protocol02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]EncryptionLightweight Cryptography[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automationComponent (UML)0202 electrical engineering electronic engineering information engineeringModular RobotsProgrammable MatterProtocol (object-oriented programming)IOTbusiness.industry020206 networking & telecommunicationsCryptographic protocolSupercomputer[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationProgrammable matter[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Amoebots[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessDistributed Computing
researchProduct

Privacy Enhanced Device Access

2012

In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy.

Service (business)AuthenticationIntegrated access deviceComputer scienceAuthentication protocolNetwork Access DeviceNetwork block deviceCryptographic protocolComputer securitycomputer.software_genreProtocol (object-oriented programming)computer
researchProduct

A privacy enhanced device access protocol for an IoT context

2013

In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.

Service (business)Challenge-Handshake Authentication ProtocolAuthenticationComputer Networks and CommunicationsComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer securitycomputer.software_genreAuthentication protocol0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)020201 artificial intelligence & image processingKey derivation functionProtocol (object-oriented programming)computerInformation SystemsSecurity and Communication Networks
researchProduct