Search results for "Process"

showing 10 items of 22310 documents

DESDEO : An Open Framework for Interactive Multiobjective Optimization

2018

We introduce a framework for interactive multiobjective optimization methods called DESDEO released under an open source license. With the framework, we want to make interactive methods easily accessible to be applied in solving real-world problems. The framework follows an object-oriented software design paradigm, where functionalities have been divided to modular, self-contained components. The framework contains implementations of some interactive methods, but also components which can be utilized to implement more interactive methods and, thus, increase the applicability of the framework. To demonstrate how the framework can be used, we consider an example problem where the pollution of…

021103 operations researchbusiness.industryComputer scienceDistributed computing0211 other engineering and technologies02 engineering and technologyModular designOpen frameworkMulti-objective optimizationmonitavoiteoptimointiOpen source licenseavoin lähdekoodioptimointiDESDEO0202 electrical engineering electronic engineering information engineeringSoftware design020201 artificial intelligence & image processingmultiobjective optimizationongelmanratkaisubusinessImplementationoptimization
researchProduct

Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot

2020

Memory acquisition is a tool used in advanced forensics and malware analysis. Various methods of memory acquisition exist. Such solutions are ranging from tools based on dedicated hardware to software-only solutions. We proposed a hypervisor based memory acquisition tool. [22]. Our method supports ASLR and Modern operating systems which is an innovation compared to past methods [27, 36]. We extend the hypervisor assisted memory acquisition by adding mass storage device honeypots for the malware to cross and propose hiding the hypervisor using bluepill technology.

021110 strategic defence & security studiesAtomicitySoftware_OPERATINGSYSTEMSHoneypotComputer science0211 other engineering and technologiesHypervisor02 engineering and technologycomputer.software_genreVirtualizationMemory forensicsMass storage0202 electrical engineering electronic engineering information engineeringOperating systemMalware020201 artificial intelligence & image processingMalware analysiscomputer
researchProduct

On the Influence of Affect in EEG-Based Subject Identification

2021

Biometric signals have been extensively used for user identification and authentication due to their inherent characteristics that are unique to each person. The variation exhibited between the brain signals (EEG) of different people makes such signals especially suitable for biometric user identification. However, the characteristics of these signals are also influenced by the user’s current condition, including his/her affective state. In this paper, we analyze the significance of the affect-related component of brain signals within the subject identification context. Consistent results are obtained across three different public datasets, suggesting that the dominant component of the sign…

021110 strategic defence & security studiesAuthenticationBiometricsmedicine.diagnostic_testbusiness.industryComputer science0211 other engineering and technologiesContext (language use)Pattern recognition02 engineering and technologyElectroencephalographyHuman-Computer InteractionIdentification (information)Component (UML)0202 electrical engineering electronic engineering information engineeringTask analysismedicine020201 artificial intelligence & image processingArtificial intelligencebusinessAffective computingSoftwareIEEE Transactions on Affective Computing
researchProduct

Efficient Protection for VDI Workstations

2019

Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…

021110 strategic defence & security studiesCPU power dissipationWorkstationComputer sciencebusiness.industry0211 other engineering and technologiesControl softwareSingle serverCloud computing02 engineering and technologycomputer.software_genreVirtualizationlaw.inventionlawControl system0202 electrical engineering electronic engineering information engineeringOperating system020201 artificial intelligence & image processingSingle-corebusinesscomputer2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
researchProduct

The Challenge of Coexistence in Socially Vulnerable Schools

2017

Abstract Society in general and schools in particular continue to express their concerns with regard to the many challenges posed nowadays by living in a globalized world, where learning to coexist involves knowing oneself and those around us. Therefore, the professionals from the education sector and specially from the most vulnerable contexts demand the necessity to know strategies and initiatives which enable them to build a democratic school, where learning to coexist is the key to educate engaged citizens living in an increasingly intercultural, changing world. The study presented here has been conducted in two differentiated, but complementary, phases. During the first phase a documen…

021110 strategic defence & security studiesClass (computer programming)business.industrymedia_common.quotation_subject05 social sciences0211 other engineering and technologies050301 education02 engineering and technologyPublic relationsPeer supportPhase (combat)DemocracyConvivència escolarReading (process)General Materials ScienceQuality (business)SociologyMarketingbusiness0503 educationmedia_commonProcedia - Social and Behavioral Sciences
researchProduct

Strategies of Identification of a Base-Isolated Hospital Building by Coupled Quasi-Static and Snap-Back Tests

2020

In this paper, the description of a series of quasi-static pushing tests and dynamic snap-back tests is proposed, involving the base-isolated emergency building of the Palermo university hospital. The base isolation system is characterized by a set of double-curved friction pendulum isolators placed on the top of the columns of the underground level, characteristics that cannot be found in the experimental studies available in the literature. The aim of the work was to investigate the static and dynamic properties of the building in question and comparing the in-situ results with the characteristics assigned during the design process and to assess the level of agreement. Static lateral push…

021110 strategic defence & security studiesComputer sciencebusiness.industry0211 other engineering and technologies020101 civil engineering02 engineering and technologyBuilding and ConstructionStructural engineeringGeotechnical Engineering and Engineering GeologyUniversity hospitalBase (topology)0201 civil engineeringSettore ICAR/09 - Tecnica Delle CostruzioniSettore ING-IND/31 - ElettrotecnicaSnap backIdentification (information)friction friction pendulum bearing full-scale experimental tests in-situ testing seismic isolation snap-back testSeismic isolationbusinessQuasistatic processCivil and Structural EngineeringJournal of Earthquake Engineering
researchProduct

The Impact of Regionalism on Democracy Building: An Examination of the Southern African Development Community (SADC)

2017

Since the early 1990s, the world has witnessed a new wave of regionalism and a mushrooming of regional integration organizations, particularly in the global South. Focusing on Africa, the Southern African Development Community (SADC) ranks among the most promising examples of regionalism on the continent. The SADC explicitly aims at building and advancing democracy in the region and its member states as part of its broader agenda on regional development. From a political science perspective, there is general agreement that regional integration and parallel institution building can be useful measures to promote and strengthen democratic rule, since an appropriate institutional “lock-in” impl…

021110 strategic defence & security studiesCorporate governancemedia_common.quotation_subject05 social sciences0211 other engineering and technologiesGlobal South02 engineering and technologyInstitution buildingDemocracy0506 political sciencePolitical scienceProcess tracingDevelopment economicsRegionalism (international relations)Regional integration050602 political science & public administrationmedia_common.cataloged_instanceEuropean unionmedia_common
researchProduct

Two novel subjective logic-based in-network data processing schemes in wireless sensor networks

2016

Wireless sensor networks (WSNs) consist of connected low-cost and small-size sensor nodes. The sensor nodes are characterized by various limitations, such as energy availability, processing power, and storage capacity. Typically, nodes collect data from an environment and transmit the raw or processed data to a sink. However, the collected data contains often redundant information. An in-network processing scheme attempts to eliminate or reduce such redundancy in sensed data. In this paper, we propose two in-network data processing schemes for WSNs, which are built based on a lightweight algebra for data processing. The schemes bring also benefits like decreased network traffic load and inc…

021110 strategic defence & security studiesData processingbusiness.industryComputer scienceVisual sensor networkReal-time computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologySynthetic dataKey distribution in wireless sensor networks0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkWirelessbusinessSubjective logicWireless sensor network2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

The organization of the defense support system: an economic geography perspective

2017

In the context of restricted budgetary resources and the growing cost of maintenance, repair, and overhaul (MRO) activities, a major issue for modern armed forces is to sustain defense platforms. A possible method consists of realizing economies of scale through the concentration of maintenance activities, which involves the spatial reorganization of existing industrial sites dedicated to MRO. This article provides a formalized framework to discuss the optimal organization for the MRO of defense platforms in space. The public planner organizes the maintenance of defense platforms with only two possible spatial configurations. In the dispersed configuration, two industrial production units i…

021110 strategic defence & security studiesEconomics and EconometricsProcess management[QFIN]Quantitative Finance [q-fin]Industrial productionSocial cost05 social sciences0211 other engineering and technologiesContext (language use)02 engineering and technologySpace (commercial competition)Tipping point (climatology)Planner[QFIN] Quantitative Finance [q-fin]Economies of scaleUnit (housing)0502 economics and businessBusiness050207 economicscomputerSocial Sciences (miscellaneous)ComputingMilieux_MISCELLANEOUScomputer.programming_language
researchProduct

The influence of oversizing on maintenance cost in wastewater treatment plants

2021

Abstract Management of Wastewater Treatment Plants (WWTPs) is a complex process, not only from a technical point of view but also from an economic point of view. There are several factors that influence the wastewater treatment process and can cause an increase in management costs. One of these factors is the treatment capacity, in particular the WWTPs’ oversizing problem. The difference between the design population equivalent (p.e.) and the actual p.e. treated generates imbalances in the wastewater treatment process costs. This paper analyses the influence that oversizing has on the maintenance costs for WWTPs in the Valencia region (Spain). Through an econometric approach, the behaviour …

021110 strategic defence & security studiesEnvironmental EngineeringProcess (engineering)General Chemical Engineering0211 other engineering and technologies02 engineering and technology010501 environmental sciencesEnvironmental economics01 natural sciencesWork (electrical)Environmental ChemistryEnvironmental scienceSewage treatmentPopulation equivalentSafety Risk Reliability and Quality0105 earth and related environmental sciencesProcess Safety and Environmental Protection
researchProduct