Search results for "Security"

showing 10 items of 1693 documents

How to prevent cyber-attacks in inter-vehicle communication network?

2015

In this work, we aim to secure communication in a vehicular network by providing a proactive mechanism that can detect and predict with a high accuracy the future behavior of malicious attacker. In fact, the mechanisms proposed in the literature consider only detection mechanisms and do not prevent attacks that may arise in the network. Simulation results show that our mechanism has a high detection rate, low false positive rate while generating a low communication overhead.

Vehicular ad hoc networkNetwork securitybusiness.industryComputer scienceMechanism (biology)Computer securitycomputer.software_genreTelecommunications networkSecure communicationOverhead (computing)False positive ratebusinesscomputerGame theoryComputer network2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS)
researchProduct

A Crisis Management Serious Game for Responding Extreme Weather Event

2017

Managing crisis with limited resources through a serious game is deemed as one of the ways of training and can be regarded as an alternative to the table-top exercise. This paper presents the so-called “Operasjon Tyrsdal” serious game, inspired by a real case of extreme weather that hit the west coast of Norway. This reference case is used to add realism to the game. The game is designed for a single player, while the mechanics are framed in such way that the player should deal with limited resources, and elevated event pressure over time to manage. Beside applying an iterative Scrum method with seven Sprint cycles, we combined the development work with desk research and involvement of test…

Video game developmentComputer sciencebusiness.industryEvent (computing)05 social sciencesEnvironmental resource managementComputingMilieux_PERSONALCOMPUTING02 engineering and technologyCrisis managementComputer securitycomputer.software_genreScrumExtreme weatherWork (electrical)Action (philosophy)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing0501 psychology and cognitive sciencesbusinesscomputer050107 human factorsDesk
researchProduct

Identifying critical incidents in naturalistic driving data: experiences from a promoting real life observation for gaining understanding of road use…

2013

The methodology of naturalistic driving observation aspires to observe the driver and his environment while driving in natural driving settings. It is of great importance in research on road safety as this method of observing road users eliminates the disadvantages of traditional methods like simulator studies or interviews. However, it produces vast such amounts of data and challenges data reduction and data analysis. Therefore automatic methods for filtering critical incidents based on thresholds for numerical data are often applied to select the data to be analysed. This study reports a small-scale field trial in Valencia, Spain, which was conducted within the promoting real life observa…

Video recordingEngineeringbusiness.industryMechanical EngineeringContrast (statistics)TransportationComputer securitycomputer.software_genreData scienceData qualityField trialScale (social sciences)Naturalistic drivingbusinessLawcomputerGeneral Environmental ScienceData reductionRoad userIET Intelligent Transport Systems
researchProduct

Security, QoS and self-management within an end-to-end Cloud Computing environment

2015

Today, Cloud Networking is one of the recent research areas within the Cloud Computing research communities. The main challenges of Cloud Networking concern Quality of Service (QoS) and security guarantee as well as its management in conformance with a corresponding Service Level Agreement (SLA). In this thesis, we propose a framework for resource allocation according to an end-to-end SLA established between a Cloud Service User (CSU) and several Cloud Service Providers (CSPs) within a Cloud Networking environment (Inter-Cloud Broker and Federation architectures). We focus on NaaS and IaaS Cloud services. Then, we propose the self-establishing of several kinds of SLAs and the self-managemen…

Videoconférence[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Cloud NetworkingCalcul IntensifQuality of ServiceSécuritéCloud ComputingGestion AutonomeInter-CloudSecuritySelf-managementVideoconferencingService Level AgreementQualité de ServiceIntensive Computing
researchProduct

Who can go back to work when the COVID-19 pandemic remits?

2020

AbstractThis paper seeks to determine which workers affected by lockdown measures can return to work when a government decides to apply lockdown exit strategies. This system, which we call Sequential Selective Multidimensional Decision (SSMD), involves deciding sequentially, by geographical areas, sectors of activity, age groups and immunity, which workers can return to work at a given time according to the epidemiological criteria of the country as well as that of a group of reference countries, used as a benchmark, that have suffered a lower level of lockdown de-escalation strategies. We apply SSMD to Spain, based on affiliation to the Social Security system prior to the COVID-19 pandemic…

Viral DiseasesEpidemiologyPathology and Laboratory MedicineGeographical locations0302 clinical medicineReturn to WorkMedical ConditionsPandemicMedicine and Health Sciences030212 general & internal medicineChildEpidemiology ; COVID-19 ; Virus testing ; Serotology ; Age groups ; Spain ; Death rates ; PandemicsVirus TestingAged 80 and overeducation.field_of_studyMultidisciplinaryExit strategyQRMiddle AgedEuropeInfectious DiseasesSerologyWork (electrical)Child PreschoolMedicineCoronavirus InfectionsResearch ArticleAdultCoronavirus disease 2019 (COVID-19)AdolescentDeath RatesScience030231 tropical medicinePopulationDecision MakingPneumonia ViralDecision tree03 medical and health sciencesBetacoronavirusYoung AdultPopulation MetricsDiagnostic MedicineBenchmark (surveying)HumansEuropean UnioneducationPandemicsAgedGovernmentActuarial sciencePopulation BiologySARS-CoV-2Decision TreesInfant NewbornCOVID-19InfantBiology and Life SciencesCovid 19Replication (computing)Social securitySpainAge GroupsPeople and PlacesPopulation GroupingsBusiness
researchProduct

Human Trafficking: The Viscous Link Between Vulnerability and Proximity Violence

2020

The definition of “human trafficking”, adopted by the United Nations Protocol, clearly describes how the international community has outlined the concepts of victim and perpetrator. Despite the definitive effort made by this Protocol, the present chapter seeks to throw light on the fuzzy area existing within the rapport between vulnerability and proximity violence which makes the consensual exploitation of the victim by the trafficker possible as well as making it difficult to outline its contours in the courtrooms.

VulnerabilityInternational communityHuman traffickingContext (language use)SociologyLink (knot theory)Computer securitycomputer.software_genreProtocol (object-oriented programming)computer
researchProduct

Silent say, saying effective and discourse mask

2021

In communication, every speaker must choose meticulously the aptness in the word, the gesture, the smile, the look or even the silence. The being-speaker hides and beyond protects himself behind his discursive mask which provides him with a linguistic security. While many disciplines - social psychology, psychoanalysis and philosophy – have seized the notion of the mask in their frame of reference, this concept still remains absent today in the language sciences. However, the game of masks substitution is fundamental in language activity. This game is so usual that we do not even notice it anymore, except in situations where we are explicitly asked to make an effort to adapt to the rule of …

Vulnérabilité linguistiqueL'être-LocuteurIdentityLinguistic silenceLinguistic securityIdentitéSilence linguistiqueLinguistic vulnerabilityThe being-SpeakerMasque discursifDiscursive maskSécurité linguistique[SHS.LANGUE] Humanities and Social Sciences/Linguistics
researchProduct

The powers of masculinization in humanitarian storytelling: the case of the surgeon María Gómez Álvarez in the Varsovia Hospital (Toulouse, 1944–1950)

2020

This contribution is focused on analysing the power of 'masculinization' through which traditional humanitarian storytelling has been shaped. Strongly marked by a patriarchal vision, humanitarian accounts have traditionally hidden the work of women while stressing that performed by men, who appeared represented as true protagonists and, even, as heroes. In particular, this article analyses the professional career of a Spanish female surgeon named Maria Gomez (1914-1975) between 1944 and 1950, when she worked in a small charitable hospital based in Toulouse (France) for improving the health-care conditions of Spanish Republican refugees. Known as Hospital Varsovia or as Walter B. Cannon Memo…

WarfareWorld War IIRefugee0211 other engineering and technologies02 engineering and technologyFeminismPathology and Forensic MedicinePower (social and political)Physicians Women03 medical and health sciences0302 clinical medicinePolitical scienceHumans030212 general & internal medicineMilitary MedicineOrder (virtue)Surgeons021110 strategic defence & security studiesProfessional careerWorld War IIGender studiesHistory 20th CenturyAltruismSpanish Civil WarSpainFemaleFrancePeriod (music)StorytellingMedicine, Conflict and Survival
researchProduct

The significance of soils and soil science towards realization of the United Nations Sustainable Development Goals

2016

Abstract. In this forum paper we discuss how soil scientists can help to reach the recently adopted UN Sustainable Development Goals (SDGs) in the most effective manner. Soil science, as a land-related discipline, has important links to several of the SDGs, which are demonstrated through the functions of soils and the ecosystem services that are linked to those functions (see graphical abstract in the Supplement). We explore and discuss how soil scientists can rise to the challenge both internally, in terms of our procedures and practices, and externally, in terms of our relations with colleague scientists in other disciplines, diverse groups of stakeholders and the policy arena. To meet th…

Water en Landgebruik010504 meteorology & atmospheric sciencesRaad van BestuurSoil ScienceSoil science01 natural sciencesEcosystem servicesWater scarcitySoilBodemSoil Water and Land UseSoil functionsSoil governanceLife ScienceLand use land-use change and forestryExecutive BoardLaboratorium voor Nematologielcsh:Environmental sciences0105 earth and related environmental scienceslcsh:GE1-350Sustainable developmentFood securityWater and Land UseSoil organic matterlcsh:QE1-996.5Farm Systems Ecology Group04 agricultural and veterinary sciencesBodemfysica en LandbeheerPE&RCBodem Water en LandgebruikSoil Physics and Land Managementlcsh:GeologyBodemgeografie en LandschapSoil Geography and Landscape040103 agronomy & agriculture0401 agriculture forestry and fisheriesEnvironmental scienceEPSLaboratory of Nematology
researchProduct

Adding the Mureş River Basin (Transylvania, Romania) to the List of Hotspots with High Contamination with Pharmaceuticals

2020

Background: The Mureș River Basin is a long-term heavily polluted watershed, in a situation of climate changes with increasing water flow and related decreasing dilution capacity. Here, a mixture of emerging pollutants such as pharmaceuticals were targeted to reveal potential risks regarding the natural lotic ecosystems. Due to the continuous discharge into the environment, pharmaceuticals are gaining persistent organic pollutant characteristics and are considered emerging pollutants. Based on the hazard quotient, this research highlights the dangerous concentrations of carbamazepine, ibuprofen, furosemide, and enalapril in river water. Results: High levels of four pharmaceutical compounds …

Water flowGeography Planning and Development0211 other engineering and technologiesDrainage basinTJ807-83002 engineering and technology010501 environmental sciencesManagement Monitoring Policy and LawTD194-19501 natural sciencesenalaprilRenewable energy sourcesliquid chromatographyGE1-350furosemideWater pollutionEffluenthazard quotient0105 earth and related environmental sciencesibuprofenPollutant021110 strategic defence & security studiesPersistent organic pollutantgeographygeography.geographical_feature_categoryEnvironmental effects of industries and plantstriple quadrupole mass spectrometryRenewable Energy Sustainability and the Environmentwastewater treatment plantsHazard quotientemerging pollutants water contaminationEnvironmental sciencesEnvironmental chemistrycarbamazepineEnvironmental scienceSewage treatmentSustainability
researchProduct