Search results for "Security"

showing 10 items of 1693 documents

Q-Chem 2.0: a high-performanceab initio electronic structure program package

2000

ABSTRACT: Q-Chem 2.0 is a new release of an electronic structure programpackage, capable of performing first principles calculations on the ground andexcited states of molecules using both density functional theory and wavefunction-based methods. A review of the technical features contained withinQ-Chem 2.0 is presented. This article contains brief descriptive discussions of thekey physical features of all new algorithms and theoretical models, together withsample calculations that illustrate their performance. c 2000 John Wiley S electronic structure; density functional theory;computer program; computational chemistry Introduction A reader glancing casually at this article mightsuspect on t…

Basis (linear algebra)Computer programProgramming languageComputer sciencePrincipal (computer security)Theoretical modelsAb initioGeneral ChemistryElectronic structurecomputer.software_genreComputational scienceComputational MathematicsKey (cryptography)Density functional theorycomputerJournal of Computational Chemistry
researchProduct

Tracing battery usage for second life market with a blockchain-based framework

2021

This work describes the design of a platform based on a permissioned blockchain for sharing relevant information among the actors involved in grid service provision programs. The information collected by a proprietary monitoring on-board system accessing the central unit of the Electric Vehicle, EV, is then sent to a dropbox folder owned by the car owner and then written on a blockchain platform. The platform could be supplied from similar data from the grid operator collected on the grid during the provision of services. In this way data can be validated and used for tracing the health status of the EV's battery. The design of customized smart contract allows to acquire the profiles of bat…

Battery (electricity)business.product_categorySmart contractComputer scienceVehicle-to-gridTracingComputer securitycomputer.software_genreGridWork (electrical)Electric vehiclebusinesscomputerCommunication channel2021 IEEE International Conference on Environment and Electrical Engineering and 2021 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe)
researchProduct

A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security

2019

Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and sch…

BeamformingComputer scienceJammingCryptography5G-tekniikka02 engineering and technologylangaton tiedonsiirto0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic Engineeringtietoturvabusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layer020206 networking & telecommunications020302 automobile design & engineeringEavesdropping5G communicationsphysical layer security (PLS)jamming techniquesrelaying protocolsKey (cryptography)business5Glangattomat verkotComputer network
researchProduct

Kryzys parlamentaryzmu a majowy zamach stanu w aspekcie bezpieczeństwa narodowego

2017

Demokracja parlamentarna nie jest typem ustroju, który może sprawnie i stabilnie funkcjonować bez solidnych podstaw ekonomicznych i społecznych, ugruntowanej i opartej na kompromisie tradycji uprawiania polityki oraz postaw obywatelskich pośród polityków i społeczeństwa. Porzucenie demokracji czyjej częściowe ograniczenie, aczkolwiek usprawiedliwione ideą racji stanu w celu wzmocnienia szeroko pojętego bezpieczeństwa narodowego, nie musi okazać się właściwym lekarstwem na problemy, z jakimi boryka się państwo. Kryzys parlamentaryzmu i przewrót majowy, zamykają okres, w którym sejm stanowił organ ostatecznie decydujący o składzie i istnieniu kolejnych rządów. Formalną zmianę we wzajemnym usy…

Bezpieczeństwo narodoweNowela sierpniowaparliamentary crisisMay coup - coupe d'etatprzewrót majowy - zamach stanuNational securityMarch Constitutionkryzys parlamentarnyAugust NovelizationKonstytucja Marcowa
researchProduct

Bio-inspired security analysis for IoT scenarios

2020

Computer security has recently become more and more important as the world economy dependency from data has kept growing. The complexity of the systems that need to be kept secure calls for new models capable of abstracting the interdependencies among heterogeneous components that cooperate at providing the desired service. A promising approach is attack graph analysis, however, the manual analysis of attack graphs is tedious and error prone. In this paper we propose to apply the metabolic network model to attack graph analysis, using three interacting bio-inspired algorithms: topological analysis, flux balance analysis, and extreme pathway analysis. A developed framework for graph building…

Bio-inspired techniqueService (systems architecture)Security analysisIoTDependency (UML)Computer scienceNetwork securityDistributed computingmedia_common.quotation_subject0211 other engineering and technologies02 engineering and technologyMetabolic networksAttack graphs; Bio-inspired algorithms; Bio-inspired techniques; IoT; Metabolic networks; Network security; Security analysis; System securityAttack graph03 medical and health sciences0302 clinical medicineUse casemedia_common021110 strategic defence & security studiesSecurity analysisbusiness.industryMetabolic network030208 emergency & critical care medicineBio-inspired techniquesNetwork securitySystem securityFlux balance analysisInterdependenceHardware and ArchitectureBio-inspired algorithmGraph (abstract data type)businessSoftwareAttack graphsBio-inspired algorithms
researchProduct

A bio-inspired approach to attack graphs analysis

2018

Computer security has recently become more and more important as the world economy dependency from data has kept growing. The complexity of the systems that need to be kept secure calls for new models capable of abstracting the interdependencies among heterogeneous components that cooperate at providing the desired service. A promising approach is attack graph analysis, however the manual analysis of attack graphs is tedious and error prone. In this paper we propose to apply the metabolic network model to attack graphs analysis, using three interacting bio-inspired algorithms: topological analysis, flux balance analysis, and extreme pathway analysis. A developed framework for graph building…

Bio-inspired techniqueTheoretical computer scienceComputer scienceNetwork securitybusiness.industrymedia_common.quotation_subjectComputer Science (all)Bio-inspired techniquesNetwork securityAttack graphPathway analysisFlux balance analysisTheoretical Computer ScienceInterdependenceAttack graphMetabolic network modelAttack graphs; Bio-inspired techniques; Network securityGraph (abstract data type)businessAttack graphsmedia_common
researchProduct

Novel Iris Biometric Watermarking Based on Singular Value Decomposition and Discrete Cosine Transform

2014

Published version of an article in the journal: Mathematical Problems in Engineering. Also available from the publisher at: http://dx.doi.org/10.1155/2014/926170 A novel iris biometric watermarking scheme is proposed focusing on iris recognition instead of the traditional watermark for increasing the security of the digital products. The preprocess of iris image is to be done firstly, which generates the iris biometric template from person's eye images. And then the templates are to be on discrete cosine transform; the value of the discrete cosine is encoded to BCH error control coding. The host image is divided into four areas equally correspondingly. The BCH codes are embedded in the sing…

BiometricsArticle SubjectGeneral MathematicsIris recognitionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONEngineering (all)Robustness (computer science)Computer Science::MultimediaDiscrete cosine transformMathematics (all)Computer visionDigital watermarkingTransform codingMathematicsComputer Science::Cryptography and Securitybusiness.industrylcsh:MathematicsVDP::Technology: 500::Mechanical engineering: 570General EngineeringWatermarkVDP::Technology: 500::Information and communication technology: 550lcsh:QA1-939ComputingMethodologies_PATTERNRECOGNITIONlcsh:TA1-2040Computer Science::Computer Vision and Pattern RecognitionArtificial intelligencebusinesslcsh:Engineering (General). Civil engineering (General)BCH codeMathematics (all); Engineering (all)Mathematical Problems in Engineering
researchProduct

Multiculturalism, Immigration, Borders, and Security in Contemporary English-Speaking Societies: Representations, Essays, Poltical Discourses

2016

BordersSecurityImmigrationSécurité[SHS] Humanities and Social SciencesMulticulturalisme[SHS]Humanities and Social SciencesMulticulturalismFrontières
researchProduct

Offshore Assets in the Transition from ‘Traditional Business Practice’ to ‘Connected Business Eco-systems’

2020

In many industrial sectors we have already begun to see how new business ecosystems gradually emerge turning the traditional business practices upside down. Particularly within relatively conventional sectors, such as upstream oil and gas (O&G) and land-based process industry, we expect to see substantial changes in the years to come. In this paper, we elaborate on principal challenges related to major structural changes and core technology platforms for the oil industry identifying critical features and elaborating on emerging operational principles. This is based on a critical review of latest industry conditions and practices that are targeted towards the creation of new business models …

Business practicePetroleum industrybusiness.industryTransition (fiction)Principal (computer security)Submarine pipelineBusinessBusiness modelIntegrated operationsBusiness ecosystemIndustrial organization
researchProduct

It's up to all of us: social identity in the language of public warnings

2010

the paper investigates the features of the language used by the Bitish and Italian publica warning which aim to protect and advise citizens. It mainly relies on critical discourse analysis and cultural studies (Hofstede's cultural dimensions).

CDApublic warningculture securitySettore L-LIN/12 - Lingua E Traduzione - Lingua Inglese
researchProduct