Search results for "Security"

showing 10 items of 1693 documents

Combining Haar Wavelet and Karhunen Loeve Transforms for Medical Images Watermarking

2014

This paper presents a novel watermarking method, applied to the medical imaging domain, used to embed the patient’s data into the corresponding image or set of images used for the diagnosis. The main objective behind the proposed technique is to perform the watermarking of the medical images in such a way that the three main attributes of the hidden information (i.e., imperceptibility, robustness, and integration rate) can be jointly ameliorated as much as possible. These attributes determine the effectiveness of the watermark, resistance to external attacks, and increase the integration rate. In order to improve the robustness, a combination of the characteristics of Discrete Wavelet and K…

Diagnostic ImagingArticle SubjectComputer scienceWavelet Analysislcsh:Medicine02 engineering and technologyGeneral Biochemistry Genetics and Molecular BiologyWaveletRobustness (computer science)[ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineeringDigital watermarkingComputer SecurityBlock (data storage)Karhunen–Loève theoremGeneral Immunology and Microbiologybusiness.industryVisibility (geometry)lcsh:RReproducibility of Results020207 software engineeringPattern recognitionWatermarkGeneral MedicineHaar wavelet[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV][INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]020201 artificial intelligence & image processingArtificial intelligencebusinessAlgorithmsResearch Article
researchProduct

Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective

2019

Practice-/policy-oriented abstract: Understanding why employees do or do not comply with information systems security (ISS) procedures is an imperative in today’s organizations whose futures often depend on how well they protect and harness information assets. We use a predominantly inductive approach to develop a theoretical understanding of how employees’ reasons for engaging to ISS behaviors (ISSBs) change over time, using ideas from dialectics as our scaffolding. Our dialectical view of this process suggests that explanations for engaging in different ISSBs change over time as individuals seek to balance contradictory demands. Furthermore, our view suggests that new experiences and ext…

DialecticInformation Systems and ManagementKnowledge managementComputer Networks and Communicationsbusiness.industry05 social sciencesPerspective (graphical)Information systems security02 engineering and technologyLibrary and Information SciencesManagement Information Systems020204 information systemsProcess theory0502 economics and business0202 electrical engineering electronic engineering information engineering050211 marketingSociologybusinessFutures contractInformation SystemsInformation Systems Research
researchProduct

Institutional Dynamics in International Organizations: Lessons from the Recruitment Procedures of the European External Action Service

2014

Author's version of an article in the journal: Organization Studies. Also available from the publisher at: http://dx.doi.org/10.1177/0170840614544558 This article examines how organizational designs develop by proposing a novel theoretical framework that views organizational change as resulting from a dialectic process between interpretive agents. The key claim is that existing formal procedures (such as recruitment processes, our empirical focal point) are subject to involved actors’ interpretive efforts. This results in a bargaining situation based on the interpretations of the principal actors, which may induce a feedback loop whereby the original procedures are amended. The empirical re…

DialecticOrganizational Behavior and Human Resource ManagementProcess managementbusiness.industryStrategy and Managementmedia_common.quotation_subjectPrincipal (computer security)Subject (philosophy)translationbargainingPublic relationsAction (philosophy)ArgumentDynamics (music)Management of Technology and InnovationService (economics)institutional entrepreneurshipRelevance (law)VDP::Social science: 200::Political science and organizational theory: 240SociologybusinessEuropean External Action ServiceEuropean diplomacymedia_common
researchProduct

Associations of nutrition and body composition with cardiovascular disease risk factors in soldiers during a 6-month deployment

2020

Objectives This observational follow-up study investigated the associations of nutrition and body composition with cardiovascular disease (CVD) risk factors, including pro-inflammatory biomarkers, in soldiers during a 6-month deployment. Material and Methods Thirty-five male soldiers were assessed at months 0, 3 and 6, and their parameters, i.e., M±SD, were as follows: age 30.0±8.7 years, height 179±6 cm, and BMI 24.2±2.5 kg/m 2 . Three-day food diaries were used for monitoring macronutrient intake. Body composition was estimated using bioimpedance. Fasting blood samples for lipids and pro-inflammatory biomarkers were collected, and blood pressure measurements were performed. Results Carboh…

Dietary FiberMaleSYMPTOMSkolesteroliPhysical fitness0211 other engineering and technologieslcsh:MedicinePROTEINBlood lipidsPhysiologyBLOOD-PRESSURE02 engineering and technologyruokavaliotBody fat percentagesoldierchemistry.chemical_compoundFiber intakeRisk FactorsMedicinesotilaatLebanonFinland05 social sciencesblood pressureGeneral MedicinerauhanturvaoperaatiotDiet Records3142 Public health care science environmental and occupational health0506 political sciencebody fatMilitary PersonnelAdipose TissueCardiovascular DiseasesLow-density lipoproteinBody CompositionSERUM-LIPIDSComposition (visual arts)3143 NutritionAdultPHYSICAL-FITNESS050601 international relationsINFLAMMATIONterveysvaikutuksetHumanscrisis managementkehonkoostumus021110 strategic defence & security studiesCholesterolbusiness.industryterveydentilalcsh:RPublic Health Environmental and Occupational HealthcholesterolCholesterol LDLfiber intakeDietverenpaineBlood pressurechemistryFATravintokuitubusinessInternational Journal of Occupational Medicine and Environmental Health
researchProduct

Nonmalleable encryption of quantum information

2008

We introduce the notion of "non-malleability" of a quantum state encryption scheme (in dimension d): in addition to the requirement that an adversary cannot learn information about the state, here we demand that no controlled modification of the encrypted state can be effected. We show that such a scheme is equivalent to a "unitary 2-design" [Dankert et al.], as opposed to normal encryption which is a unitary 1-design. Our other main results include a new proof of the lower bound of (d^2-1)^2+1 on the number of unitaries in a 2-design [Gross et al.], which lends itself to a generalization to approximate 2-design. Furthermore, while in prime power dimension there is a unitary 2-design with =…

Discrete mathematicsQuantum Physicsbusiness.industryDimension (graph theory)FOS: Physical sciencesStatistical and Nonlinear PhysicsState (functional analysis)Encryption01 natural sciencesUnitary stateUpper and lower bounds010305 fluids & plasmasQuantum state0103 physical sciencesQuantum informationQuantum Physics (quant-ph)010306 general physicsbusinessPrime powerMathematical PhysicsComputer Science::Cryptography and SecurityMathematicsJournal of Mathematical Physics
researchProduct

A resilient distributed measurement system for smart grid application

2020

Since the production of energy from renewable energy sources is strongly increasing, the migration from the classical electric grid toward the smart grid is becoming a reality. Distribution System Operators, along with the control of the entire network and its stability, need to address the security and the reliability of the communication channels and the data itself. In this paper a solution is proposed to address these issues. It is based on a distributed measurement system that relies on a wireless network as well as a redundant Power Line communication system in order to transfer the electrical measures to a centralized SCADA server. The collected data are used to run a power flow algo…

Distributed measurement systemsWireless networkbusiness.industryComputer scienceReliability (computer networking)Distributed computingSmart gridGridelectric load flowHuman-machine interfaceslaw.inventionPower-line communicationSmart gridSCADAlawElectrical networknetwork securityElectricitySCADAbusinesscarrier transmission on power linesSettore ING-INF/07 - Misure Elettriche E Elettroniche
researchProduct

A future European FDI screening system: solution or problem?

2019

The establishment of a mechanism at the European level for screening FDI, on the grounds of national security and public order, constitutes a major step in implementing the EU investment policy. To create an effective system, it must be based on clear common rules, provide certainty and ensure judicial redress.

Dret internacionalddc:330Investments ForeignNational securityNational security--Economic aspectsInternational economic relationsConsolidation and merger of corporations
researchProduct

La sécurité, la fondation de l'Etat centrafricain : contribution à la recherche de l'Etat de droit

2012

“Ensuring order and security” is a deep-seated desire shared by the whole of humanity. It is therefore reasonable to devote this thesis to the place occupied by insecurity in public debate in the Central African Republic, a state covering roughly the same surface area as France. Security implies that the weight of fear or terror is removed. If order and security are to be genuinely ensured in the Central African Republic, more is required than the absence of bloodshed and the protection of each citizen’s physical integrity. It is also essential that the rights of all be respected and that all citizens should be entitled to the protection of their rights as well as their possessions. Legal s…

Démocratie et Droits de l’homme[SHS.DROIT]Humanities and Social Sciences/LawDemocray and Human Rights[SHS.DROIT] Humanities and Social Sciences/LawEtat de droitDefenseSecurityRule of lawSécurité[ SHS.DROIT ] Humanities and Social Sciences/Law
researchProduct

"Table 1" of "Study of $e^+e^- \rightarrow p\bar{p}$ in the vicinity of $\psi(3770)$"

2014

Summary of results at center-of-mass energies from 3.65 to 3.90 GeV. N(SIG) is the number of E+ E- --> P P events; EPSILON is the detection efficiency; L is the integrated luminosity; (1 + DELTA)(DRESSED) is the initial state radiation correction factor without the vacuum polarization correction; and SIG(OBS), SIG(DRESSED) and SIG(BORN) are the observed cross section, the dressed cross section and the Born cross section, respectively.

E+ E- --> P PBARE+ E- Scattering3.65-3.9Integrated Cross SectionExclusivePsiCross SectionSIGComputer Science::Cryptography and Security
researchProduct

"Table 1" of "Search for single top production in e+ e- collisions at s**(1/2) = 189-GeV - 202-GeV."

2000

SIG(C=LEPT) and SIG(C=HADR) are the cross sections upper limits evaluated for leptonic and hadronic decay modes of the W-boson, while SIG(C=COMB) are the values obtained by combining the leptonic and hadronic W-boson decay channels. All cross sections values are obtained under assumption of BR(TQ --> W+ BQ) = 100 %.

E+ E- --> TQ UQBARHigh Energy Physics::PhenomenologyIntegrated Cross SectionE+ E- --> TQBAR UQTopCross SectionSIG188.6-201.6E+ E- ScatteringExclusiveHigh Energy Physics::ExperimentE+ E- --> TQBAR CQE+ E- --> TQ CQBARComputer Science::Cryptography and Security
researchProduct