Search results for "computer.software_genre"
showing 10 items of 3858 documents
Ancel Keys (1904-2004)
2005
Development of the optical multiplexer board prototype for data acquisition in TileCal experiment
2005
The optical multiplexer board is one of the elements present in the read out chain of the tile calorimeter in ATLAS experiment. Due to radiation effects, two optical fibers with the same data come out from the front end boards to this board, which has to decide in real time which one carries good data and pass them to the read out driver motherboard for processing. This paper describes the design and tests of the first prototype, implemented as a 6U VME64x slave module, including both hardware and firmware aspects. In this last, algorithms for cyclic redundancy code checking are used to make the decision. Besides, the board may be used as a data injector for testing purposes of the read out…
Perspectives and challenges of small scale plant microalgae cultivation. Evidences from Southern Italy
2020
Abstract In recent years, the cultivation of algae has achieved attention of scientists and practicioniers due to the great variety of products that can be obtained, among which biofuels. The aim of this work is twofold. The first is to perform a profitability analysis of food and biofuel production from microalgae, in a small-scale setting. The second is to assess the economic impact of algae production systems on the dairy farms potentially interested in Southern Italy. The analysis was performed using financial and economic indicators and considering two system management scenarios, namely single and collective. Our results confirm that current microalgae production technology favors bio…
Trust-based framework for security enhancement of P2PSIP communication systems
2009
Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g. privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a subjective based trust model that offers trust services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, data confidentiality and integrity, message rou…
Website quality and internal business factors: An empirical investigation in the Italian wine industry
2016
Purpose The purpose of this paper is dual. The first is to assess the quality of websites of Italian wineries, using the Web Assessment Index (WAI), and compare e-commerce and e-marketing websites. The second is to verify the existence of a relationship between the website quality and business revenue, on one hand, and the characteristics of managers, on the other. Design/methodology/approach A two-step survey was carried out to respond to the aims of the study. First, a sample of wineries was contacted to capture information on both the wineries and managerial characteristics. On the basis of the observed data, a second step of the analysis was performed taking into consideration 84 winer…
Combining similarity measures in content-based image retrieval
2008
The purpose of content based image retrieval (CBIR) systems is to allow users to retrieve pictures from large image repositories. In a CBIR system, an image is usually represented as a set of low level descriptors from which a series of underlying similarity or distance functions are used to conveniently drive the different types of queries. Recent work deals with combination of distances or scores from different and usually independent representations in an attempt to induce high level semantics from the low level descriptors of the images. Choosing the best method to combine these results requires a careful analysis and, in most cases, the use of ad-hoc strategies. Combination based on or…
Semi-Supervised Remote Sensing Image Classification based on Clustering and the Mean Map Kernel
2008
This paper presents a semi-supervised classifier based on the combination of the expectation-maximization (EM) algorithm for Gaussian mixture models (GMM) and the mean map kernel. The proposed method uses the most reliable samples in terms of maximum likelihood to compute a kernel function that accurately reflects the similarity between clusters in the kernel space. The proposed method improves classification accuracy in situations where the available labeled information does not properly describe the classes in the test image.
Restricted Neighborhood Search Clustering Revisited: An Evolutionary Computation Perspective
2013
Protein-protein interaction networks have been broadly studied in the last few years, in order to understand the behavior of proteins inside the cell. Proteins interacting with each other often share common biological functions or they participate in the same biological process. Thus, discovering protein complexes made of groups of proteins strictly related, can be useful to predict protein functions. Clustering techniques have been widely employed to detect significative biological complexes. In this paper, we integrate one of the most popular network clustering techniques, namely the Restricted Neighborhood Search Clustering (RNSC), with evolutionary computation. The two cost functions in…
Cyber Security Strategy Implementation Architecture in a Value System
2018
In this chapter, we introduce an approach toward enhancing the quality of strategy implementation. As a framework, we use cybersecurity strategy implementation planning and execution. Justification for this work is the observed need to be able to perform strategy readjustment processes quickly and in an agile way, when needed. This requires processes and practices that are simple enough and executable with small resources in a relatively short timeframe. The problem statement can be formulated as follows: “We need to determine an utterly simplified, noncomplicated model to help us to tackle the complex problem of implementing a cybersecurity strategy of adequate efficiency in a changing ope…
Key drivers of internet banking services use
2009
PurposeThe purpose of this paper is to analyse the determinants of internet banking use, paying special attention to the role of product involvement, perceived risk and trust.Design/methodology/approachThe impact of trust, perceived risks, product involvement and TAM beliefs (ease of use and usefulness) on internet banking adoption is tested through structural equation modelling techniques. The sample consists of 511 Spanish internet banking services users and the data are collected through an internet survey. Risk is measured as a formative construct.FindingsData analysis shows that TAM beliefs and perceived risks (security, privacy, performance and social) have a direct influence on e‐ban…