Search results for "Security."

showing 10 items of 1645 documents

Using ‘Ambient Intelligence’ for Compensating Intellectual Difficulties of People with Severe Learning Difficulties and/or Autistic Spectrum Disorders

2004

This paper describes a set of services and software created so that what is called ‘ambient intelligence’ would compensate for the ‘intellectual difficulties’ that people from this collective have. Existing concepts and standards of ambient intelligence are strongly reinforced through the use of the exact current user’s position as a key factor to calculate how the ‘digital home’ or any ‘digital environment’ behaves at every moment. This will be obtained using both Wi-Fi personal locators (embedded in necklaces or bracelets) and Wi-Fi communication from the PDA. This mix, together with individual capabilities and preferences, makes the development of a wide range of services possible when c…

Ambient intelligenceComputer sciencebusiness.industrymedicine.diseaseComputer securitycomputer.software_genreHigh-functioning autismUser assistanceSoftwareHuman–computer interactionFactor (programming language)medicineKey (cryptography)User interfaceSet (psychology)businesscomputercomputer.programming_language
researchProduct

Ancestral Reconstruction and Investigations of Genomic Recombination on some Pentapetalae Chloroplasts

2019

Abstract In this article, we propose a semi-automated method to rebuild genome ancestors of chloroplasts by taking into account gene duplication. Two methods have been used in order to achieve this work: a naked eye investigation using homemade scripts, whose results are considered as a basis of knowledge, and a dynamic programming based approach similar to Needleman-Wunsch. The latter fundamentally uses the Gestalt pattern matching method of sequence matcher to evaluate the occurrences probability of each gene in the last common ancestor of two given genomes. The two approaches have been applied on chloroplastic genomes from Apiales, Asterales, and Fabids orders, the latter belonging to Pe…

Ancestral reconstructionMost recent common ancestor0206 medical engineeringGenomic recombination02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Dynamic programmingGenome[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingEvolution Molecular[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]AsteralesGene duplication0202 electrical engineering electronic engineering information engineeringPattern matchingGenome ChloroplastRosaceaeResearch ArticlesPhylogenySequence (medicine)Recombination GeneticbiologyGeneral Medicinebiology.organism_classification[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationAncestral genome reconstructionApialesEvolutionary biology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Pentapetalae chloroplasts020602 bioinformaticsTP248.13-248.65BiotechnologyJournal of Integrative Bioinformatics
researchProduct

Exploiting historical rainfall and landslide data in a spatial database for the derivation of critical rainfall thresholds

2017

Critical rainfall thresholds for landslides are powerful tools for preventing landslide hazard. The thresholds are commonly estimated empirically starting from rainfall events that triggered landslides in the past. The creation of the appropriate rainfall–landslide database is one of the main efforts in this approach. In fact, an accurate agreement between the landslide and rainfall information, in terms of location and timing, is essential in order to correctly estimate the rainfall–landslide relationships. A further issue is taking into account the average moisture conditions prior the triggering event, which reasonably may be crucial in determining the sufficient amount of precipitation.…

Antecedent rainfall condition010504 meteorology & atmospheric sciencesMeteorology0211 other engineering and technologiesSoil ScienceContext (language use)02 engineering and technologyRainfall–landslide database01 natural sciencesImage analysisEnvironmental ChemistryRainfall thresholds; Rainfall–landslide database; Image analysis; Antecedent rainfall conditions; Sicily; LithologyPrecipitationSicily0105 earth and related environmental sciencesEarth-Surface ProcessesWater Science and TechnologyEvent (probability theory)021110 strategic defence & security studiesGlobal and Planetary ChangeRainfall thresholdsSpatial databaseSettore ICAR/02 - Costruzioni Idrauliche E Marittime E IdrologiaAntecedent rainfall conditionsGeologyLandslideRainfall thresholdPollutionHazardRunoff modelLithologyHyetographImage analysiGeologyEnvironmental Earth Sciences
researchProduct

Pedotechnique applications in large-scale farming: Economic value, soil ecosystems services and soil security

2019

Abstract Since ancient times Humans and Soil have experienced interwoven links. Nowadays soil scientists continue to stress such links highlighting the importance of soil in: i) satisfying the ever growing Human demand for food, water and energy, and ii) providing ecosystem services that mitigate climate changes, influence human health and improve biodiversity. Pedotechniques are recently used to generate soils suitable for table grape cultivation in order to increase productivity and grape quality, thus to get substantial financial returns. We show one emblematic study case of pedotechniques applied in Sicily (Italy). Aims of the investigation were: i) stressing threats to soil security de…

Anthropogenic soil010504 meteorology & atmospheric sciencesNatural resource economicsbusiness.industrySocial sustainabilityBiodiversityPedotechniqueSoil ecosystems service04 agricultural and veterinary sciences01 natural sciencesEcosystem servicesSoil securitySettore AGR/14 - PedologiaAgricultureSettore AGR/01 - Economia Ed Estimo RuraleSoil water040103 agronomy & agriculture0401 agriculture forestry and fisheriesProfitability indexbusinessProductivityEnvironmental quality0105 earth and related environmental sciencesEarth-Surface ProcessesCATENA
researchProduct

A Hardware and Secure Pseudorandom Generator for Constrained Devices

2018

Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…

Applied cryptography; Chaotic circuits; Constrained devices; Discrete dynamical systems; FPGA; Lightweight Cryptography; Random number generators; Statistical tests; Control and Systems Engineering; Information Systems; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic EngineeringHardware security moduleComputer scienceRandom number generationCryptography[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyPseudorandom generatorConstrained devicesLightweight CryptographyChaotic circuits[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]PermutationRandom number generatorsStatistical tests0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringField-programmable gate arrayThroughput (business)FPGAPseudorandom number generatorGenerator (category theory)business.industry020208 electrical & electronic engineeringComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsDiscrete dynamical systems[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science ApplicationsApplied cryptography[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Control and Systems EngineeringKey (cryptography)[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessComputer hardwareInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

The Studio: Reflections and Issues Arising

1999

An advanced Telematic Studio was built at the University of Jyvaskyla to combine the latest technologies for local and distributed work and/or meetings. The objectives were to combine leading edge technologies with ethnographic design principles derived from CSCW and HCI to support a broad range of activities. We informed the design by studies of similar facilities on other sites. The Studio is popular, and it is easy to give glowing accounts of its use. Nevertheless, over three years a significant number of problems have arisen with both technologies and uses. Some of these are local. Others may be generalisable to any ‘cooperative building’. For example: problems with videoconferencing; i…

Architectural engineeringWorkstationbusiness.industryComputer scienceDesign elements and principlescomputer.software_genreComputer securitylaw.inventionVideoconferencingWork (electrical)lawComputer-supported cooperative workEthnographySystems designTelematicsbusinesscomputerStudio
researchProduct

AHBIM for Wooden Built Heritage Conservation

2019

The chapter investigates the potential offered by the Building Information Modeling for the conservation of the wooden architectural heritage. Based on the architectural survey, the BIM modeling of a South Tyrolean farm was carried out, with particular attention to the aspects related to its management and maintenance. Inside the database connected to the model, information about the building has been included, which can also be used on site through the use of mobile devices. The sharing of such information within a single platform avoids risks connected to the failure or incorrect transmission of data, allowing the optimization of the management, maintenance and conservation of the archite…

Architectural engineeringbusiness.industryComputer scienceConservationAsset (computer security)Built heritageParametric designParametric designBIM Built heritage Parametric design Conservation Facility managementFacility managementBuilding information modelingArchitectural heritageTransmission (telecommunications)BIMSettore ICAR/17 - DisegnoBuilt heritageFacility managementbusinessMobile device
researchProduct

Chapter 1. Security Rights under Article 5 of the Insolvency Regulation and Article 8 of the ‘Recast’

2017

This chapter contains an overview of the issues put at stake. In particular, it deals, on the one hand, with the prescriptions on security rights in rem laid down by both EU Regulation 1346/2000 and EU Regulation 2015/848, and, on the on the other hand, with the misalignment that these prescriptions produce at national level.

Art. 8Security Rights in RemArt. 5(EU) Regulation on Insolvency proceedings No 2015/848 (Recast)Settore IUS/04 - Diritto Commerciale(EC) Regulation on Insolvency Proceedings No 1346/2000
researchProduct

Stochastic Vulnerability Assessment of Masonry Structures: Concepts, Modeling and Restoration Aspects

2019

A methodology aiming to predict the vulnerability of masonry structures under seismic action is presented herein. Masonry structures, among which many are cultural heritage assets, present high vulnerability under earthquake. Reliable simulations of their response to seismic stresses are exceedingly difficult because of the complexity of the structural system and the anisotropic and brittle behavior of the masonry materials. Furthermore, the majority of the parameters involved in the problem such as the masonry material mechanical characteristics and earthquake loading characteristics have a stochastic-probabilistic nature. Within this framework, a detailed analytical methodological approac…

Artificial Neural Networkfailure criteriaComputer scienceRestoration mortarStructural system0211 other engineering and technologiesVulnerability020101 civil engineering02 engineering and technologylcsh:Technology0201 civil engineeringlcsh:Chemistryfragility analysisFragilitySeismic assessmentVulnerability assessmentForensic engineeringGeneral Materials ScienceMasonry structurelcsh:QH301-705.5InstrumentationArtificial Neural NetworksmonumentsFluid Flow and Transfer Processes021110 strategic defence & security studieslcsh:Tbusiness.industryProcess Chemistry and TechnologyGeneral EngineeringProbabilistic logicMonumentMasonrylcsh:QC1-999Computer Science ApplicationsCultural heritageSettore ICAR/09 - Tecnica Delle Costruzionilcsh:Biology (General)lcsh:QD1-999restoration mortarslcsh:TA1-2040Fragility analysiseismic assessmentlcsh:Engineering (General). Civil engineering (General)businessdamage indexlcsh:Physicsmasonry structuresstochastic modelingApplied Sciences
researchProduct

Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature

2020

Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…

Artificial intelligence and cybersecuritycybersecurityGeneral Computer ScienceComputer scienceinformation securitysystematic reviewsprotocols02 engineering and technologyIntrusion detection systemtekoälyComputer securitycomputer.software_genre01 natural sciencesDomain (software engineering)systematic reviewGeneral Materials Sciencekirjallisuuskatsauksettietoturvakyberturvallisuussystemaattiset kirjallisuuskatsauksettietoverkkorikoksetkyberrikollisuusbusiness.industry010401 analytical chemistryGeneral Engineeringartificial intelligence021001 nanoscience & nanotechnology0104 chemical sciencesSupport vector machinekoneoppiminenmachine learningcomputer crimeArtificial intelligencelcsh:Electrical engineering. Electronics. Nuclear engineeringSystematic mappingIntrusion prevention system0210 nano-technologybusinesscomputerlcsh:TK1-9971Qualitative researchIEEE Access
researchProduct