Search results for "computer.software_genre"

showing 10 items of 3858 documents

Class Actions or Collective Redress: The Need for an Efficient European Tool

2014

Collective redress makes sense both in court-based litigation and in alternative dispute resolution (ADR). Yet while the courts generally have a good sense of collective redress (though arguably there is room for improvements), in the second framework, there are some contradictions from a dogmatic point of view. When collective interests come up in conflict, judicial coercion and a judicial structure are often needed to resolve the conflict. In addition, the absence of a voluntary agreement, especially from the abuser’s side, makes it more difficult to resolve conflicts using ADR. The future EU Directive in Consumer Collective Redress aims to bring a new era to the field. In this paper, I s…

Engineeringbusiness.industryField (Bourdieu)Punitive damagesCoercionConsumer protectionCivil procedureDirectiveComputer securitycomputer.software_genreAlternative dispute resolutionbusinessCollective redresscomputerLaw and economics
researchProduct

Development of an optical link card for the upgrade phase II of TileCal experiment

2010

This work presents the design of an optical link card developed in the frame of the R&D activities for the phase 2 upgrade of the TileCal experiment as part of the evaluation of different technologies for the final choice in the next two years. The board is designed as a mezzanine which can work independently or plugged in the Optical Multiplexer Board of the TileCal backend electronics. It includes two SNAP 12 optical connectors able to transmit and receive up to 75 Gbps and one SFP optical connector for lower speeds and compatibility with existing hardware as the Read Out Driver. All processing is done in a Stratix II GX FPGA. Details are given on the hardware design including signal and …

Engineeringbusiness.industryFirmwareOptical linkPower integritycomputer.software_genreMultiplexerUpgradeEmbedded systemStratixTransceiverbusinessField-programmable gate arraycomputerComputer hardware2010 17th IEEE-NPSS Real Time Conference
researchProduct

Global Understanding Environment

2009

Industry pushes a new type of Internet characterized as the Internet of Things, which represents a fusion of the physical and digital worlds. The technology of the Internet of Things opens new horizons for industrial automation, that is, automated monitoring, control, maintenance planning, and so forth, of industrial resources and processes. Internet of Things definitely needs explicit semantics, even more than the traditional Web—for automatic discovery and interoperability among heterogeneous devices and also to facilitate the behavioral coordination of the components of complex physical-digital systems. In this chapter, the authors describe their work towards the Global Understanding Env…

Engineeringbusiness.industryInteroperabilitySemantic data modelcomputer.software_genreAutomationDomain (software engineering)Software agentMiddleware (distributed applications)Systems engineeringSemantic technologyThe Internetbusinesscomputer
researchProduct

Adaptative Network Topology for Data Centers

2016

Data centers have an important role in supporting cloud computing services (such as email, social networking, web search, etc.) enterprise computing needs, and infrastructure-based services. Data center networking is a research topic that aims at improving the overall performances of the data centers. It is a topic of high interest and importance for both academia and industry. Several architectures such as FatTree, FiConn, DCel, BCube, and SprintNet have been proposed. However, these topologies try to improve the scalability without any concerns about energy that data centers use and the network infrastructure cost, which are critical parameters that impact the performances of data centers…

Engineeringbusiness.industryNetwork TopologyData center networksupporting cloud computing servicesComputer securitycomputer.software_genreNetwork topologyAverage path lengthBottleneckLow latency (capital markets)ServerScalabilityData centerInstalled basebusinesscomputerComputer networkQatar Foundation Annual Research Conference Proceedings Volume 2016 Issue 1
researchProduct

Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise

2015

Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. Especially requirement for organizing cyber security exercises has become more and more relevant for companies or government agencies. Cyber security research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes …

Engineeringbusiness.industryNetwork securityInternet trafficComputer securitycomputer.software_genreInternet Architecture BoardInternational securityUse caseThe InternetbusinessResilience (network)computerTraffic generation model
researchProduct

A new ifierarchical and intelligent control architecture based on distributed neural networks and expert systems applied to vehicle automation

2005

Engineeringbusiness.industryPressure controlIntelligent decision support systemControl engineeringIndustrial control systemcomputer.software_genreAutomationExpert systemReal-time Control SystemControl systemEmbedded systembusinessIntelligent controlcomputerThe 2002 International Conference on Control and Automation, 2002. ICCA. Final Program and Book of Abstracts.
researchProduct

Agile Deep Learning UAVs Operating in Smart Spaces: Collective Intelligence Versus “Mission-Impossible”

2017

The environments, in which we all live, are known to be complex and unpredictable. The complete discovery of these environments aiming to take full control over them is a “mission-impossible”, however, still in our common agenda. People intend to make their living spaces smarter utilizing innovations from the Internet of Things and Artificial Intelligence. Unmanned aerial vehicles (UAVs) as very dynamic, autonomous and intelligent things capable to discover and control large areas are becoming important “inhabitants” within existing and future smart cities. Our concern in this paper is to challenge the potential of UAVs in situations, which are evolving fast in a way unseen before, e.g., em…

Engineeringbusiness.industryProcess (engineering)media_common.quotation_subjectBig dataCollective intelligenceCloud computing02 engineering and technologyReuseComputer securitycomputer.software_genre020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingQuality (business)businesscomputerSemantic WebAgile software developmentmedia_common
researchProduct

Cyber Security for Wireless Semantic (SCADA/DCS) Systems

2016

International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …

Engineeringcomputer.internet_protocolSOAP0211 other engineering and technologies[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]02 engineering and technologyComputer securitycomputer.software_genre[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Supervisory controlSecure communicationSCADAWireless Application ProtocolSemantic Wireless (SCADA/DCS)Wireless Security ProtocolProtocol (object-oriented programming)Semantic Cyber Security[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]021110 strategic defence & security studiesbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS021001 nanoscience & nanotechnology(ZIGBEE/SOAP/SECURITY) ProtocolControl and Systems EngineeringKey (cryptography)0210 nano-technologyDistributed control systembusinessSmart Energetic PlatformcomputerComputer network
researchProduct

A Memetic Differential Evolution in Filter Design for Defect Detection in Paper Production

2007

This article proposes a Memetic Differential Evolution (MDE) for designing digital filters which aim at detecting defects of the paper produced during an industrial process. The MDE is an adaptive evolutionary algorithm which combines the powerful explorative features of Differential Evolution (DE) with the exploitative features of two local searchers. The local searchers are adaptively activated by means of a novel control parameter which measures fitness diversity within the population. Numerical results show that the DE framework is efficient for the class of problems under study and employment of exploitative local searchers is helpful in supporting the DE explorative mechanism in avoid…

Engineeringeducation.field_of_studyFinite impulse responsebusiness.industryProcess (engineering)PopulationEvolutionary algorithmMachine learningcomputer.software_genreFilter designDifferential evolutionMemetic algorithmArtificial intelligencebusinesseducationcomputerDigital filter
researchProduct

Warehouse threats and loss prevention management in case of fire

2016

Abstract Warehouses play an important role when it comes to the reception, delivery and storage of various types of goods. Due to the complex scenarios that may occur, as well as the heterogeneous nature of goods, warehouses bear a higher risk of accidents. Regardless if we’re taking about removing hassle or standardizing operations we speak the same language: insuring efficiency and increased efficiency leads to smart cost maintenances. In the article hear by we will observe the behavior of different warehouse materials in the case of trigger fired. Starting from the results obtained during the low scale tests and completing the premises with the large scale experiment (warehouse scale), w…

Engineeringflammable substances.business.industryScale (chemistry)010401 analytical chemistry0211 other engineering and technologieshealth and safety at work02 engineering and technologyComputer securitycomputer.software_genre01 natural sciences0104 chemical sciencesWarehouseRisk analysis (engineering)021105 building & constructionfire protectionGeneral Earth and Planetary Scienceswarehouseflammable substancesbusinessOSH culture fire fire protection warehousehealth and safety at work flammable substancescomputerfireGeneral Environmental ScienceOSH culture
researchProduct