Search results for "SOAP"
showing 10 items of 11 documents
Cyber Security for Wireless Semantic (SCADA/DCS) Systems
2016
International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …
Ontology and protocol secure for SCADA
2014
In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…
Interoperability between Distributed Systems and Web-Services Composition
2009
An information system is a multi-axis system characterized by a “data” axis, a “behavioral” axis, and a “communication” axis. The data axis corresponds to the structural and schematic technologies used to store data into the system. The behavioral axis represents management and production processes carried out by the system and corresponding technologies. The processes can interact with the data to extract, generate, and store data. The communication axis relates to the network used to exchange data and activate processes between geographically distant users or machines. Nowadays, technologies required for interoperability are extended to deal with the semantic aspect of the information sys…
The Pratz le Curtillet settlement
2016
Among the earliest habitats of the early Middle Ages studied in Franche-Comté, the Pratz le Curtillet a settlement sets itself apart by its location in the Jura highlands, renowned for its remoteness and inhospitable landscapes. On the Lizon plateau, the scope of the archaeological work explored on the 16 hectares and the quality of the remains still constitute an exceptional complex today. An imposing 16m by 13m stone building flanked by an annex forms the residential part of the estate, while sheltering fodder and livestock, while the second building houses a forge. Domestic and artisanal equipment provide ample documentation on the living conditions of this small community of high status…
Servisu orientētas arhitektūras veiktspēja
2017
Mūsdienās, veidojot informācijas sistēmas, nepieciešams tās veidot elastīgas un daudzfunkcionālas, lai varētu nodrošināt klientu vēlmes un spēt sekot līdzi strauji mainīgajai pasaulei. Lai to nodrošinātu, informācijas sistēmas bieži tiek veidotas balstoties uz Servisu orientētu arhitektūru, kurā sistēmas funkcionālā daļa tiek veidota atsevišķi un smalki sadalīta. Darbā apskatītas servisu orientētas arhitektūras, to realizācija un pielietojumi, veiktspējas problēmas, un risinājumi, kā tās samazināt. Izmantojot iegūto informāciju, veikts šo risinājumu salīdzinājums, kurš izmantots lēmumu koka izveidē. Balstoties uz iegūto lēmumu koku, izvēlēts viens no risinājumiem, kas izmantots informācijas…
Electrochemical identification of painters/workshops: The case of Valencian Renaissance-Baroque painters (ca. 1550- ca. 1670)
2019
[EN] The voltammetry of immobilized particles (VIMP) methodology was applied to discriminate the oil painting production of a series of seven painters/workshops that worked in Valencia (Spain) between ca. 1530 and ca. 1650. When submicrosamples used for cross-section FESEM/EDX analysis were attached to graphite electrodes in contact with aqueous acetate buffer, well-defined responses were obtained. The reductive processes of lead pigments (lead white and lead-tin yellow) overlapped those associated to the lead soaps and other species resulting from the pigment-oil binder interaction in the sample. Such responses, which are theoretically modeled, were sensitive to changes in paint type and d…
Biodegradation of Synthetic Organic Compounds by Methanogenic Microbiome as an Alternative Approach for Wastewater Purification and Energy Production
2022
The use of fossil fuels (methane, oil, etc.) is undergoing an unprecedented crisis now. There is the urgent need to search for alternative energy sources. A wide range of degraded organic materials can be effectively used to provide energy together with environmental protection. Soapstock is a hazardous waste containing a high concentration of toxic organic compounds of man-made origin (fatty acids, surfactants, dyes, etc.). To prevent environmental contamination such substances require an effective treatment approach. The goal of the study was to isolate the adapted-to-fatty-acids methanogenic microbiome and investigate the patterns of sodium acetate and soapstock degradation with simultan…
Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127
2014
International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…
A sharp quantitative version of Alexandrov's theorem via the method of moving planes
2015
We prove the following quantitative version of the celebrated Soap Bubble Theorem of Alexandrov. Let $S$ be a $C^2$ closed embedded hypersurface of $\mathbb{R}^{n+1}$, $n\geq1$, and denote by $osc(H)$ the oscillation of its mean curvature. We prove that there exists a positive $\varepsilon$, depending on $n$ and upper bounds on the area and the $C^2$-regularity of $S$, such that if $osc(H) \leq \varepsilon$ then there exist two concentric balls $B_{r_i}$ and $B_{r_e}$ such that $S \subset \overline{B}_{r_e} \setminus B_{r_i}$ and $r_e -r_i \leq C \, osc(H)$, with $C$ depending only on $n$ and upper bounds on the surface area of $S$ and the $C^2$ regularity of $S$. Our approach is based on a…
The method of moving planes: a quantitative approach
2018
We review classical results where the method of the moving planes has been used to prove symmetry properties for overdetermined PDE's boundary value problems (such as Serrin's overdetermined problem) and for rigidity problems in geometric analysis (like Alexandrov soap bubble Theorem), and we give an overview of some recent results related to quantitative studies of the method of moving planes, where quantitative approximate symmetry results are obtained.