Search results for "SOFC"

showing 10 items of 660 documents

An interactive surrogate-based method for computationally expensive multiobjective optimisation

2019

Many disciplines involve computationally expensive multiobjective optimisation problems. Surrogate-based methods are commonly used in the literature to alleviate the computational cost. In this paper, we develop an interactive surrogate-based method called SURROGATE-ASF to solve computationally expensive multiobjective optimisation problems. This method employs preference information of a decision-maker. Numerical results demonstrate that SURROGATE-ASF efficiently provides preferred solutions for a decision-maker. It can handle different types of problems involving for example multimodal objective functions and nonconvex and/or disconnected Pareto frontiers. peerReviewed

black-box functionsMathematicsofComputing_NUMERICALANALYSISmetamodeling techniquesachievement scalarising functioninteractive methodsmatemaattinen optimointimultiple criteria decision-making (MCDM)computational costmonitavoiteoptimointi
researchProduct

Blockchain and Smart Contracts: New Perspectives on Copyright Protection in the Digital Single Market

2022

New technologies making use of blockchains and smart contracts have been considered an efficient and innovative way to achieve the goal of effective copyright protection in the digital market. It is impossible to deny, however, that these innovative technologies raise serious questions about their compatibility with international, European, and national legislative frameworks, at least if we compare them with the original and most widely-used blockchain model (i.e., the so-called permissionless blockchain). Indeed, permissionless blockchains create a “law-free zone” resistant to any subsequent modification and judicial intervention. In this general context, this chapter aims to analyse the …

blockchainDigital Single Market DirectivecopyrightComputingMilieux_LEGALASPECTSOFCOMPUTINGSettore IUS/04 - Diritto Commercialesmart contract
researchProduct

WiHAR : From Wi-Fi Channel State Information to Unobtrusive Human Activity Recognition

2020

A robust and unobtrusive human activity recognition system is essential to a multitude of applications, such as health care, active assisted living, robotics, sports, and tele-immersion. Existing well-performing activity recognition methods are either vision- or wearable sensor-based. However, they are not fully passive. In this paper, we develop WiHAR—an unobtrusive Wi-Fi-based activity recognition system. WiHAR uses the Wi-Fi network interface card to capture the channel state information (CSI) data. These CSI data are effectively processed, and then amplitude and phase information is used to obtain the spectrogram. In the subsequent step, the time-variant mean Doppler shift (MDS) caused …

business.industryComputer science05 social sciencesDecision treeWearable computer050801 communication & media studies020206 networking & telecommunicationsComputingMilieux_LEGALASPECTSOFCOMPUTING02 engineering and technologyLinear discriminant analysisActivity recognitionSupport vector machine0508 media and communicationsChannel state information0202 electrical engineering electronic engineering information engineeringSpectrogramComputer visionArtificial intelligencebusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

A Hybrid Algorithm Based on WiFi for Robust and Effective Indoor Positioning

2019

Indoor positioning based on the Wireless Fidelity (WiFi) protocol and the Pedestrian Dead Reckoning (PDR) approach is widely exploited because of the existing WiFi infrastructure in buildings and the advancement of built-in smartphone sensors. In this work, a hybrid algorithm that combines WiFi fingerprinting and PDR to both exploit their advantages as well as limiting the impact of their disadvantages is proposed. Specifically, to build a probability map from noisy Received Signal Strength (RSS), a Gaussian Process (GP) regression is deployed to estimate and construct the RSS fingerprints with incomplete data. Mean and variance of generated points are used to estimate WiFi fingerprinting p…

business.industryComputer scienceRSSReal-time computingComputingMilieux_LEGALASPECTSOFCOMPUTING020206 networking & telecommunications02 engineering and technologycomputer.file_formatHybrid algorithmData setsymbols.namesakeInertial measurement unitDead reckoning0202 electrical engineering electronic engineering information engineeringsymbolsWireless020201 artificial intelligence & image processingbusinessParticle filterVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Gaussian processcomputer2019 19th International Symposium on Communications and Information Technologies (ISCIT)
researchProduct

From the Blogosphere into Real Politics: The Use of ICT by the Five Star Movement

2014

Research on ICT and the public discourse often focuses on how ICT can be used to increase citizen participation in political decision-making processes. The Italian Five Star Movement (5SM) represents a novel approach to using ICT to include citizens, and a big challenge for the traditional political actors. The 5SM was initiated outside the established political systems, with the use of Internet tools as cornerstones to promote political actions based on the directly expressed will of citizens. In this paper, based on an exploratory case study approach and informed by the introduction of E-Democracy models, we investigate the role of ICT in various phases of the 5SM, from its birth through …

business.industryParliamentMovement (music)media_common.quotation_subjectStar (game theory)BlogosphereDirect democracyComputingMilieux_LEGALASPECTSOFCOMPUTINGE - participationPublic relationsTransparencyE - DemocracyPoliticsInformation and Communications TechnologyPolitical scienceThe InternetOnline Communitiesbusinessmedia_common
researchProduct

Using crowdsourcing for a safer society: When the crowd rules

2020

Neighbours sharing information about robberies in their district through social networking platforms, citizens and volunteers posting about the irregularities of political elections on the Internet, and internauts trying to identify a suspect of a crime: in all these situations, people who share different degrees of relationship collaborate through the Internet and other technologies to try to help with or solve an offence. The crowd, which is sometimes seen as a threat, in these cases becomes an invaluable resource that can complement law enforcement through collective intelligence. Owing to the increasing growth of such initiatives, this article conducts a systematic review of the litera…

business.industryPolitical Elections05 social sciencesInternet privacyCollective intelligenceComputingMilieux_LEGALASPECTSOFCOMPUTING02 engineering and technologyCrowdsourcing020204 information systemsSAFER0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesThe InternetbusinessLaw050107 human factorsEuropean Journal of Criminology
researchProduct

Contract Law Solutions for Digitalized Cross-Company Value Networks in Industry 4.0: Part 2: Contract Law

2021

The original German version of this text is available at http://ssrn.com/abstract=3767069 This series of papers deals with issues of contract law in Industrie 4.0. It is based on the law of the Federal Republic of Germany. Part 1 introduces the topic and explains the legal problems that arise in Industrie 4.0. Part 2 deals with issues of contract law: How are contracts concluded among autonomous software agents, what types of contracts come into question, and how must general terms and conditions be structured. Part 3 looks at issues of licensing law and intellectual property in data. Part 4 looks at the liability of autonomous systems in Industry and provides an outlook on possible future …

business.industryPresumptionLawCommon lawLiabilityTechnical standardInformation technologyComputingMilieux_LEGALASPECTSOFCOMPUTINGLegislationIntellectual propertybusinessDue diligenceSSRN Electronic Journal
researchProduct

Corporate Governance and Company Law Reform: a German perspective

2005

Corporate crises and international trends in corporate governance have revealed the need for reform, and resulted in a great number of changes in corporate law. In spite of this, the existing legal framework for corporate governance in Germany presents itself reluctant to major changes. The German approach to reform has focused on the improvement of corporate monitoring by the supervisory board. It neither questions the two-tier structure, nor does it reconsider the existing representation of shareholders or other stakeholders under the current form of co-determination. The German Corporate Governance Code represents a new instrument of soft law and its recommendations are likely argued to …

business.industryStrategy and ManagementCorporate governanceStakeholderComputingMilieux_LEGALASPECTSOFCOMPUTINGAccountingCorporate Real EstateGeneral Business Management and AccountingCorporate groupManagement of Technology and InnovationCorporate lawBusinessCorporate communicationSoft lawCorporate securityCorporate Governance: An International Review
researchProduct

New client puzzle approach for DoS resistance in ad hoc Networks

2010

In this paper we propose a new client puzzle approach to prevent Denial of Service (DoS) attacks in ad hoc networks. Each node in the network first solves a computational problem and with the solution has to create and solve a client puzzle. By combining computational problems with puzzles, we improve the efficiency and latency of the communicating nodes and resistance in DoS attacks. Experimental results show the effectiveness of our approach.

business.industryWireless ad hoc networkComputer scienceServerMathematicsofComputing_GENERALCryptographyDenial-of-service attackComputational problemLatency (engineering)businessQA76Computer network2010 IEEE International Conference on Information Theory and Information Security
researchProduct

Corporate Governance Mechanisms for Monitoring or Empowering CEOS? A Study of Chinese Listed Firms

2008

This study examines the impact of governance mechanisms in monitoring or empowering top executives on firm performance. We distinguish between two competing theories, namely agency theory and stewardship theory, which hold conflicting assumptions about CEOs behaviour and hence offer different recommendations concerning corporate governance structure. We conduct an empirical study based on 837 publicly listed companies in China over the period of 2005-2007, the findings of this study provide strong support for stewardship theory. The results suggest that governance mechanisms that can empower CEOs work better in the Chinese context, specifically, a longer CEO tenure and lower board independe…

business.industrymedia_common.quotation_subjectCorporate governancePrincipal–agent problemStewardship theoryComputingMilieux_LEGALASPECTSOFCOMPUTINGAccountingContext (language use)Public relationsIndependenceEmpirical researchWork (electrical)businessChinamedia_commonSSRN Electronic Journal
researchProduct