Search results for "archi"

showing 10 items of 9402 documents

VV. AA. (Obra coordinada por Tito Llopis / VTiM) L' escultor Josep Ginés i Marín (1768-1823). A propòsit de "La matança dels innocents" : Catálogo de…

2020

0211-5808 9678 Archivo de arte valenciano 564145 2020 101 7708003 VV. AA. (Obra coordinada por Tito Llopis / VTiM) L' escultor Josep Ginés i Marín (1768-1823). A propòsit de ?La matança dels innocents" Catálogo de la exposición de escultura celebrada en la Sala Ribalta del Museo de Bellas Artes de ValenciaUNESCO::CIENCIAS DE LAS ARTES Y LAS LETRAS:CIENCIAS DE LAS ARTES Y LAS LETRAS [UNESCO]de febrero a septiembre de 2020conmemorativa del 250 aniversario de la fundación de la Real Academia de Bellas Artes de San Carlos. Delicado Martínez0211-5808 9678 Archivo de arte valenciano 564145 2020 101 7708003 VV. AA. (Obra coordinada por Tito Llopis / VTiM) L' escultor Josep Ginés i Marín (1768-1823). A propòsit de "La matança dels innocents" Catálogo de la exposición de escultura celebrada en la Sala Ribalta del Museo de Bellas Artes de ValenciaFrancisco Javier 436 440
researchProduct

Aesthetic considerations for the min-max K-Windy Rural Postman Problem

2017

[EN] The aesthetic quality of routes is a feature of route planning that is of practical importance, but receives relatively little attention in the literature. Several practitioners have pointed out that the visual appeal of a proposed set of routes can have a strong influence on the willingness of a client to accept or reject a specific routing plan. While some work has analyzed algorithmic performance relative to traditional min-sum or min-max objective functions and aesthetic objective functions, we are not aware of any work that has considered a multi-objective approach. This work considers a multi-objective variant of the Min-Max K-Vehicles Windy Rural Postman Problem, discusses sever…

021103 operations researchComputer Networks and Communications0211 other engineering and technologiesMin-Max objective02 engineering and technologyMulti-Objective problemsCombinatoricsArc routing problemsAesthetic objectiveHardware and Architecture0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingMATEMATICA APLICADAHumanitiesSoftwareInformation SystemsMathematicsNetworks
researchProduct

Ensuring the Reliability of an Autonomous Vehicle

2017

International audience; In automotive applications, several components, offering different services, can be composed in order to handle one specific task (autonomous driving for example). Nevertheless, component composition is not straightforward and is subject to the occurrence ofbugs resulting from components or services incompatibilities for instance. Hence, bugs detection in component-based systems at thedesign level is very important, particularly, when the developed system concerns automotive applications supporting critical services.In this paper, we propose a formal approach for modeling and verifying the reliability of an autonomous vehicle system, communicatingcontinuously with of…

021110 strategic defence & security studiesFocus (computing)021103 operations researchComputer sciencebusiness.industryDistributed computingReliability (computer networking)0211 other engineering and technologiesAutomotive industry[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationTask (project management)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Systems Modeling LanguageComponent (UML)Systems architectureTime constraint[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessProceedings of the 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems
researchProduct

Helices of disaster memory: How forgetting and remembering influence tropical cyclone response in Mauritius

2020

Abstract Tropical cyclones have had a considerable impact on Mauritius. Large cyclones are relatively rare, and in popular imagination are thought to hit Mauritius every 15 years. Yet it has been over 25 years since the last cyclone widely considered as ‘significant’. Critically, there is little known about the role of memory in responses to cyclones and details regarding responses to past cyclones in Mauritian history are scant. This article examines past experiences and impacts of cyclones in Mauritius, as well as contemporary perceptions of cyclone vulnerability and memories of historical cyclones. The analysis draws on both community interviews and archival research conducted in Mauriti…

021110 strategic defence & security studiesHistoryForgetting010504 meteorology & atmospheric sciencesDisaster risk reductionmedia_common.quotation_subject0211 other engineering and technologiesVulnerabilityGeology02 engineering and technologyBuilding and ConstructionGeotechnical Engineering and Engineering Geology01 natural sciencesArchival researchPerceptionCycloneEconomic geographyClimate change adaptationTropical cycloneSafety Research0105 earth and related environmental sciencesmedia_commonInternational Journal of Disaster Risk Reduction
researchProduct

Terrorism in the Website

2020

Without any doubt, terrorism causes higher levels of anxiety and very well enhances our fears as never before. The post 9/11 context witnesses the multiplication of xenophobic expressions, such as Islamophobia or tourist-phobia, only to name a few. These expressions result from a culture of intolerance, which not only was enrooted in the ideological core of western capitalism but was accelerated just after 9/11. Some voices emphasize the needs of employing technology to make this world a safer place. This chapter goes in a contradictory direction. The authors focus on the ethical limitations of technologies when they are subordinated to the ideals of zero-risk society. Echoing Sunstein and …

021110 strategic defence & security studiesInformation Systems and ManagementScrutinyComputer Networks and Communications05 social sciences0211 other engineering and technologiesContext (language use)02 engineering and technologyCriminology0506 political scienceHardware and ArchitecturePolitical scienceFundamentalismTerrorism050602 political science & public administrationmedicineAnxietyMultiplicationmedicine.symptomSafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

A risk assessment proposal for underground cavities in Hard Soils-Soft Rocks

2018

Abstract Underground calcarenite quarries in Marsala (Sicily) have been involved in a number of collapses that have, seriously damaged numerous buildings. The stability conditions were therefore examined in order to assess risk conditions within the historical centre of the town and the surrounding areas, which are subject to urban expansion. Starting with an extensive collection of historical information, the research was carried out through surveys of the cavities, systematic sampling of material, petrographic analysis and geotechnical testing. The results of laboratory tests and in situ investigations provided a geotechnical characterization of both the intact material and the rock mass.…

021110 strategic defence & security studiesRisk chartSafety factorSettore ICAR/07 - Geotecnica0211 other engineering and technologiesUnderground quarries Hard-soil/soft rocks Stability factor Risk charts02 engineering and technologyHard-soil/soft rockGeotechnical EngineeringGeotechnical Engineering and Engineering GeologyStability factorUnderground quarrieFinite element methodCalcarenitePetrographyAbacus (architecture)Geotechnical engineeringRock mass classificationShear strength (discontinuity)SubsoilGeology021101 geological & geomatics engineeringInternational Journal of Rock Mechanics and Mining Sciences
researchProduct

Data Sources Handling for Emergency Management: Supporting Information Availability and Accessibility for Emergency Responders

2017

Information is an essential component for better emergency response. Although a lot of information being available at various places during any kind of emergency, many emergency responders (ERs) use only a limited amount of the available information. The reason for this is that the available information heterogeneously distributed, in different formats, and ERs are unable to get access to the relevant information. Moreover, without having access to the needed information, many emergency responders are not able to obtain a sufficient understanding of the emergency situation. Consequently, a lot of time is being used to search for the needed information and poor decisions may be made. Therefo…

021110 strategic defence & security studiesSituation awarenessEmergency managementcomputer.internet_protocolComputer sciencebusiness.industry0211 other engineering and technologies02 engineering and technologyService-oriented architectureComputer securitycomputer.software_genreData scienceInformation model0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingWeb servicebusinesscomputerSemantic WebInformation exchangeData integration
researchProduct

Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage

2019

Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.

021110 strategic defence & security studiesTheoretical computer scienceComputer sciencebusiness.industry0211 other engineering and technologiesCloud computing02 engineering and technologyString searching algorithmData structureEncryptionSimple (abstract algebra)Computer data storagePattern matchingbusinessBlossom algorithm2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

BDI Modelling and Simulation of Human Behaviours in Bushfires

2016

Each summer in Australia, bushfires burn many hectares of forest, causing deaths, injuries, and destruction of property. Emergency management strategies rely on expected citizens’ behaviour which differs from reality. In order to raise their awareness about the real population behaviour, we want to provide them with a realistic agent-based simulation. The philosophically-grounded BDI architecture provides a very suitable approach but is little used due to the lack of adapted tools. This paper uses this case study to illustrate two new tools to fill this gap: the Tactics Development Framework (TDF) and GAMA BDI architecture.

021110 strategic defence & security studieseducation.field_of_studyProperty (philosophy)Emergency managementComputer sciencebusiness.industry05 social sciencesPopulation0211 other engineering and technologies02 engineering and technologyRisk analysis (engineering)Order (business)0502 economics and businessArchitectureeducationbusiness050203 business & managementSimulation
researchProduct

Towards a Bangsamoro in Mindanao?

2017

Mindanao was already settled by Muslims when the Spanish colonization began. Today, the western part of the island and the Sulu archipelago are territories with a majority Muslim population, whereas the rest of the Philippines is predominantly Christian. Since the sixteenth century, the “Moros” of Mindanao have fought outsiders, Spaniards first, then the Americans, and throughout history the other Filipinos. The settlement migration policy of the Philippine government in the middle of the twentieth century has transformed the human landscape of the central and eastern parts of Mindanao, now predominantly Christian, and created a major area of commercial plantations. Political opposition to …

021110 strategic defence & security studiesgeographygeography.geographical_feature_categorymedia_common.quotation_subject05 social sciences0211 other engineering and technologiesOpposition (politics)Islam02 engineering and technologyAncient history050601 international relations0506 political sciencePoliticsPolitical scienceArchipelagoTerrorismNational identityAutonomyFront (military)media_common
researchProduct