Search results for "Security."
showing 10 items of 1645 documents
Using ‘Ambient Intelligence’ for Compensating Intellectual Difficulties of People with Severe Learning Difficulties and/or Autistic Spectrum Disorders
2004
This paper describes a set of services and software created so that what is called ‘ambient intelligence’ would compensate for the ‘intellectual difficulties’ that people from this collective have. Existing concepts and standards of ambient intelligence are strongly reinforced through the use of the exact current user’s position as a key factor to calculate how the ‘digital home’ or any ‘digital environment’ behaves at every moment. This will be obtained using both Wi-Fi personal locators (embedded in necklaces or bracelets) and Wi-Fi communication from the PDA. This mix, together with individual capabilities and preferences, makes the development of a wide range of services possible when c…
Ancestral Reconstruction and Investigations of Genomic Recombination on some Pentapetalae Chloroplasts
2019
Abstract In this article, we propose a semi-automated method to rebuild genome ancestors of chloroplasts by taking into account gene duplication. Two methods have been used in order to achieve this work: a naked eye investigation using homemade scripts, whose results are considered as a basis of knowledge, and a dynamic programming based approach similar to Needleman-Wunsch. The latter fundamentally uses the Gestalt pattern matching method of sequence matcher to evaluate the occurrences probability of each gene in the last common ancestor of two given genomes. The two approaches have been applied on chloroplastic genomes from Apiales, Asterales, and Fabids orders, the latter belonging to Pe…
Exploiting historical rainfall and landslide data in a spatial database for the derivation of critical rainfall thresholds
2017
Critical rainfall thresholds for landslides are powerful tools for preventing landslide hazard. The thresholds are commonly estimated empirically starting from rainfall events that triggered landslides in the past. The creation of the appropriate rainfall–landslide database is one of the main efforts in this approach. In fact, an accurate agreement between the landslide and rainfall information, in terms of location and timing, is essential in order to correctly estimate the rainfall–landslide relationships. A further issue is taking into account the average moisture conditions prior the triggering event, which reasonably may be crucial in determining the sufficient amount of precipitation.…
Pedotechnique applications in large-scale farming: Economic value, soil ecosystems services and soil security
2019
Abstract Since ancient times Humans and Soil have experienced interwoven links. Nowadays soil scientists continue to stress such links highlighting the importance of soil in: i) satisfying the ever growing Human demand for food, water and energy, and ii) providing ecosystem services that mitigate climate changes, influence human health and improve biodiversity. Pedotechniques are recently used to generate soils suitable for table grape cultivation in order to increase productivity and grape quality, thus to get substantial financial returns. We show one emblematic study case of pedotechniques applied in Sicily (Italy). Aims of the investigation were: i) stressing threats to soil security de…
A Hardware and Secure Pseudorandom Generator for Constrained Devices
2018
Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…
The Studio: Reflections and Issues Arising
1999
An advanced Telematic Studio was built at the University of Jyvaskyla to combine the latest technologies for local and distributed work and/or meetings. The objectives were to combine leading edge technologies with ethnographic design principles derived from CSCW and HCI to support a broad range of activities. We informed the design by studies of similar facilities on other sites. The Studio is popular, and it is easy to give glowing accounts of its use. Nevertheless, over three years a significant number of problems have arisen with both technologies and uses. Some of these are local. Others may be generalisable to any ‘cooperative building’. For example: problems with videoconferencing; i…
AHBIM for Wooden Built Heritage Conservation
2019
The chapter investigates the potential offered by the Building Information Modeling for the conservation of the wooden architectural heritage. Based on the architectural survey, the BIM modeling of a South Tyrolean farm was carried out, with particular attention to the aspects related to its management and maintenance. Inside the database connected to the model, information about the building has been included, which can also be used on site through the use of mobile devices. The sharing of such information within a single platform avoids risks connected to the failure or incorrect transmission of data, allowing the optimization of the management, maintenance and conservation of the archite…
Chapter 1. Security Rights under Article 5 of the Insolvency Regulation and Article 8 of the ‘Recast’
2017
This chapter contains an overview of the issues put at stake. In particular, it deals, on the one hand, with the prescriptions on security rights in rem laid down by both EU Regulation 1346/2000 and EU Regulation 2015/848, and, on the on the other hand, with the misalignment that these prescriptions produce at national level.
Stochastic Vulnerability Assessment of Masonry Structures: Concepts, Modeling and Restoration Aspects
2019
A methodology aiming to predict the vulnerability of masonry structures under seismic action is presented herein. Masonry structures, among which many are cultural heritage assets, present high vulnerability under earthquake. Reliable simulations of their response to seismic stresses are exceedingly difficult because of the complexity of the structural system and the anisotropic and brittle behavior of the masonry materials. Furthermore, the majority of the parameters involved in the problem such as the masonry material mechanical characteristics and earthquake loading characteristics have a stochastic-probabilistic nature. Within this framework, a detailed analytical methodological approac…
Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature
2020
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…