Search results for "SOFC"
showing 10 items of 660 documents
An interactive surrogate-based method for computationally expensive multiobjective optimisation
2019
Many disciplines involve computationally expensive multiobjective optimisation problems. Surrogate-based methods are commonly used in the literature to alleviate the computational cost. In this paper, we develop an interactive surrogate-based method called SURROGATE-ASF to solve computationally expensive multiobjective optimisation problems. This method employs preference information of a decision-maker. Numerical results demonstrate that SURROGATE-ASF efficiently provides preferred solutions for a decision-maker. It can handle different types of problems involving for example multimodal objective functions and nonconvex and/or disconnected Pareto frontiers. peerReviewed
Blockchain and Smart Contracts: New Perspectives on Copyright Protection in the Digital Single Market
2022
New technologies making use of blockchains and smart contracts have been considered an efficient and innovative way to achieve the goal of effective copyright protection in the digital market. It is impossible to deny, however, that these innovative technologies raise serious questions about their compatibility with international, European, and national legislative frameworks, at least if we compare them with the original and most widely-used blockchain model (i.e., the so-called permissionless blockchain). Indeed, permissionless blockchains create a “law-free zone” resistant to any subsequent modification and judicial intervention. In this general context, this chapter aims to analyse the …
WiHAR : From Wi-Fi Channel State Information to Unobtrusive Human Activity Recognition
2020
A robust and unobtrusive human activity recognition system is essential to a multitude of applications, such as health care, active assisted living, robotics, sports, and tele-immersion. Existing well-performing activity recognition methods are either vision- or wearable sensor-based. However, they are not fully passive. In this paper, we develop WiHAR—an unobtrusive Wi-Fi-based activity recognition system. WiHAR uses the Wi-Fi network interface card to capture the channel state information (CSI) data. These CSI data are effectively processed, and then amplitude and phase information is used to obtain the spectrogram. In the subsequent step, the time-variant mean Doppler shift (MDS) caused …
A Hybrid Algorithm Based on WiFi for Robust and Effective Indoor Positioning
2019
Indoor positioning based on the Wireless Fidelity (WiFi) protocol and the Pedestrian Dead Reckoning (PDR) approach is widely exploited because of the existing WiFi infrastructure in buildings and the advancement of built-in smartphone sensors. In this work, a hybrid algorithm that combines WiFi fingerprinting and PDR to both exploit their advantages as well as limiting the impact of their disadvantages is proposed. Specifically, to build a probability map from noisy Received Signal Strength (RSS), a Gaussian Process (GP) regression is deployed to estimate and construct the RSS fingerprints with incomplete data. Mean and variance of generated points are used to estimate WiFi fingerprinting p…
From the Blogosphere into Real Politics: The Use of ICT by the Five Star Movement
2014
Research on ICT and the public discourse often focuses on how ICT can be used to increase citizen participation in political decision-making processes. The Italian Five Star Movement (5SM) represents a novel approach to using ICT to include citizens, and a big challenge for the traditional political actors. The 5SM was initiated outside the established political systems, with the use of Internet tools as cornerstones to promote political actions based on the directly expressed will of citizens. In this paper, based on an exploratory case study approach and informed by the introduction of E-Democracy models, we investigate the role of ICT in various phases of the 5SM, from its birth through …
Using crowdsourcing for a safer society: When the crowd rules
2020
Neighbours sharing information about robberies in their district through social networking platforms, citizens and volunteers posting about the irregularities of political elections on the Internet, and internauts trying to identify a suspect of a crime: in all these situations, people who share different degrees of relationship collaborate through the Internet and other technologies to try to help with or solve an offence. The crowd, which is sometimes seen as a threat, in these cases becomes an invaluable resource that can complement law enforcement through collective intelligence. Owing to the increasing growth of such initiatives, this article conducts a systematic review of the litera…
Contract Law Solutions for Digitalized Cross-Company Value Networks in Industry 4.0: Part 2: Contract Law
2021
The original German version of this text is available at http://ssrn.com/abstract=3767069 This series of papers deals with issues of contract law in Industrie 4.0. It is based on the law of the Federal Republic of Germany. Part 1 introduces the topic and explains the legal problems that arise in Industrie 4.0. Part 2 deals with issues of contract law: How are contracts concluded among autonomous software agents, what types of contracts come into question, and how must general terms and conditions be structured. Part 3 looks at issues of licensing law and intellectual property in data. Part 4 looks at the liability of autonomous systems in Industry and provides an outlook on possible future …
Corporate Governance and Company Law Reform: a German perspective
2005
Corporate crises and international trends in corporate governance have revealed the need for reform, and resulted in a great number of changes in corporate law. In spite of this, the existing legal framework for corporate governance in Germany presents itself reluctant to major changes. The German approach to reform has focused on the improvement of corporate monitoring by the supervisory board. It neither questions the two-tier structure, nor does it reconsider the existing representation of shareholders or other stakeholders under the current form of co-determination. The German Corporate Governance Code represents a new instrument of soft law and its recommendations are likely argued to …
New client puzzle approach for DoS resistance in ad hoc Networks
2010
In this paper we propose a new client puzzle approach to prevent Denial of Service (DoS) attacks in ad hoc networks. Each node in the network first solves a computational problem and with the solution has to create and solve a client puzzle. By combining computational problems with puzzles, we improve the efficiency and latency of the communicating nodes and resistance in DoS attacks. Experimental results show the effectiveness of our approach.
Corporate Governance Mechanisms for Monitoring or Empowering CEOS? A Study of Chinese Listed Firms
2008
This study examines the impact of governance mechanisms in monitoring or empowering top executives on firm performance. We distinguish between two competing theories, namely agency theory and stewardship theory, which hold conflicting assumptions about CEOs behaviour and hence offer different recommendations concerning corporate governance structure. We conduct an empirical study based on 837 publicly listed companies in China over the period of 2005-2007, the findings of this study provide strong support for stewardship theory. The results suggest that governance mechanisms that can empower CEOs work better in the Chinese context, specifically, a longer CEO tenure and lower board independe…