Search results for "Security"
showing 10 items of 1693 documents
Q-Chem 2.0: a high-performanceab initio electronic structure program package
2000
ABSTRACT: Q-Chem 2.0 is a new release of an electronic structure programpackage, capable of performing first principles calculations on the ground andexcited states of molecules using both density functional theory and wavefunction-based methods. A review of the technical features contained withinQ-Chem 2.0 is presented. This article contains brief descriptive discussions of thekey physical features of all new algorithms and theoretical models, together withsample calculations that illustrate their performance. c 2000 John Wiley S electronic structure; density functional theory;computer program; computational chemistry Introduction A reader glancing casually at this article mightsuspect on t…
Tracing battery usage for second life market with a blockchain-based framework
2021
This work describes the design of a platform based on a permissioned blockchain for sharing relevant information among the actors involved in grid service provision programs. The information collected by a proprietary monitoring on-board system accessing the central unit of the Electric Vehicle, EV, is then sent to a dropbox folder owned by the car owner and then written on a blockchain platform. The platform could be supplied from similar data from the grid operator collected on the grid during the provision of services. In this way data can be validated and used for tracing the health status of the EV's battery. The design of customized smart contract allows to acquire the profiles of bat…
A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security
2019
Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and sch…
Kryzys parlamentaryzmu a majowy zamach stanu w aspekcie bezpieczeństwa narodowego
2017
Demokracja parlamentarna nie jest typem ustroju, który może sprawnie i stabilnie funkcjonować bez solidnych podstaw ekonomicznych i społecznych, ugruntowanej i opartej na kompromisie tradycji uprawiania polityki oraz postaw obywatelskich pośród polityków i społeczeństwa. Porzucenie demokracji czyjej częściowe ograniczenie, aczkolwiek usprawiedliwione ideą racji stanu w celu wzmocnienia szeroko pojętego bezpieczeństwa narodowego, nie musi okazać się właściwym lekarstwem na problemy, z jakimi boryka się państwo. Kryzys parlamentaryzmu i przewrót majowy, zamykają okres, w którym sejm stanowił organ ostatecznie decydujący o składzie i istnieniu kolejnych rządów. Formalną zmianę we wzajemnym usy…
Bio-inspired security analysis for IoT scenarios
2020
Computer security has recently become more and more important as the world economy dependency from data has kept growing. The complexity of the systems that need to be kept secure calls for new models capable of abstracting the interdependencies among heterogeneous components that cooperate at providing the desired service. A promising approach is attack graph analysis, however, the manual analysis of attack graphs is tedious and error prone. In this paper we propose to apply the metabolic network model to attack graph analysis, using three interacting bio-inspired algorithms: topological analysis, flux balance analysis, and extreme pathway analysis. A developed framework for graph building…
A bio-inspired approach to attack graphs analysis
2018
Computer security has recently become more and more important as the world economy dependency from data has kept growing. The complexity of the systems that need to be kept secure calls for new models capable of abstracting the interdependencies among heterogeneous components that cooperate at providing the desired service. A promising approach is attack graph analysis, however the manual analysis of attack graphs is tedious and error prone. In this paper we propose to apply the metabolic network model to attack graphs analysis, using three interacting bio-inspired algorithms: topological analysis, flux balance analysis, and extreme pathway analysis. A developed framework for graph building…
Novel Iris Biometric Watermarking Based on Singular Value Decomposition and Discrete Cosine Transform
2014
Published version of an article in the journal: Mathematical Problems in Engineering. Also available from the publisher at: http://dx.doi.org/10.1155/2014/926170 A novel iris biometric watermarking scheme is proposed focusing on iris recognition instead of the traditional watermark for increasing the security of the digital products. The preprocess of iris image is to be done firstly, which generates the iris biometric template from person's eye images. And then the templates are to be on discrete cosine transform; the value of the discrete cosine is encoded to BCH error control coding. The host image is divided into four areas equally correspondingly. The BCH codes are embedded in the sing…
Multiculturalism, Immigration, Borders, and Security in Contemporary English-Speaking Societies: Representations, Essays, Poltical Discourses
2016
Offshore Assets in the Transition from ‘Traditional Business Practice’ to ‘Connected Business Eco-systems’
2020
In many industrial sectors we have already begun to see how new business ecosystems gradually emerge turning the traditional business practices upside down. Particularly within relatively conventional sectors, such as upstream oil and gas (O&G) and land-based process industry, we expect to see substantial changes in the years to come. In this paper, we elaborate on principal challenges related to major structural changes and core technology platforms for the oil industry identifying critical features and elaborating on emerging operational principles. This is based on a critical review of latest industry conditions and practices that are targeted towards the creation of new business models …
It's up to all of us: social identity in the language of public warnings
2010
the paper investigates the features of the language used by the Bitish and Italian publica warning which aim to protect and advise citizens. It mainly relies on critical discourse analysis and cultural studies (Hofstede's cultural dimensions).