Search results for "image processing"
showing 10 items of 3285 documents
A privacy enhanced device access protocol for an IoT context
2013
In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.
A decision support system to assure high-performance maintenance service
2020
PurposeThis study aims to propose a decision support system (DSS) for maintenance management of a service system, namely, a street cleaning service vehicle. Referring to the information flow management, the blockchain technology is integrated in the proposed DSS to assure data transparency and security.Design/methodology/approachThe DSS is designed to efficiently handle the data acquired by the network of sensors installed on selected system components and to support the maintenance management. The DSS supports the decision makers to select a subset of indicators (KPIs) by means of the DEcision-MAaking Trial and Evaluation Laboratory method and to monitor the efficiency of performed prevent…
A combined fuzzy-SEM evaluation approach to identify the key drivers of the academic library service quality in the digital technology era: An empiri…
2017
A conceptual model of the Academic Library (AL) service quality is hypothesized in the present article, and then validated and analyzed by a novel evaluation approach. Specifically, the conceptual model integrates the fundamental attributes of the canonical AL service together with those more relevant of the new and widely considered AL Electronic Service (e-services). As concerns the evaluation approach, it incorporates the Fuzzy Sets Theory (FST) so as to deal with the students' uncertainty over their own judgments on the AL service quality and a Structural Equation Model (SEM) to validate the conceptual model and to determine the key drivers of the AL service quality. The effectiveness o…
Design and optimisation of an innovative two-hub-and-spoke network for the Mediterranean short-sea-shipping market
2020
Abstract Short Sea Shipping (SSS) is generally considered as a privileged transport mode in terms of reducing road congestion and related external costs. In the last two decades, SSS has attracted a lot of attention in the European Union, where it is also regarded as a key factor for economic and social cohesion between countries. In this regard, the present study proposes a new network design that aims at improving and increasing freight traffic between the north-western and the south-eastern shores of the Mediterranean Basin. The proposed model, designed for Ro-Ro (Roll-on Roll-off) freight transport, tries to overcome the limits of the existing multi-port-calling services through an inno…
Towards Concrete Syntax Based Find for Graphical Domain Specific Languages
2019
One of the main reasons why Model-Driven Engineering (MDE) technologies including Domain-specific modelling languages (DSML) have not reached the expected acceptance in the industry is a poor tool support. One of the features with a limited support even in commercial modelling tools is search (find). Typically, MDE tools support only a simple keyword-based textual search functionality. The same is true for the tools built using Domain-specific language (DSL) tool definition frameworks. It is proposed to provide the concrete syntax-based find functionality as a service of a DSL tool definition framework. The find diagrams are defined in a concrete syntax of a DSL. A definition of a DSL is us…
Privacy-preserving data allocation in decentralized online social networks
2016
International audience; Distributed Online Social Networks (DOSNs) have been recently proposed as an alternative to centralized solutions to allow a major control of the users over their own data. Since there is no centralized service provider which decides the term of service, the DOSNs infrastructure exploits users’ devices to take on the online social network services. In this paper, we propose a data allocation strategy for DOSNs which exploits the privacy policies of the users to increase the availability of the users’ contents without diverging from their privacy preferences. A set of replicas of the profile’s content of a user U are stored on the devices of other users who are entitl…
Discovering web services in social web service repositories using deep variational autoencoders
2020
Abstract Web Service registries have progressively evolved to social networks-like software repositories. Users cooperate to produce an ever-growing, rich source of Web APIs upon which new value-added Web applications can be built. Such users often interact in order to follow, comment on, consume and compose services published by other users. In this context, Web Service discovery is a core functionality of modern registries as needed Web Services must be discovered before being consumed or composed. Many efforts to provide effective keyword-based service discovery mechanisms are based on Information Retrieval techniques as services are described using structured or unstructured textdocumen…
A service-based recommendation system to assist decision making in a small and medium company
2020
Collaboration and resource sharing have attracted a great interest among companies. Our contribution relates to this context, providing a decision-making support for companies. We propose a platform to facilitate resource sharing between collaborative companies, through a recommendation system. This system provides similar services that respond to a company’s needs. The approach presented in this paper includes the choice of a representation model for the services as well as the selection of an appropriate measure of similarity. This latter is mainly based on a comparative study of three measures of similarity using several performance evaluation measures. In order to evaluate our approach,…
A Data-Driven Architecture for Personalized QoE Management in 5G Wireless Networks
2017
With the emergence of a variety of new wireless network types, business types, and QoS in a more autonomic, diverse, and interactive manner, it is envisioned that a new era of personalized services has arrived, which emphasizes users' requirements and service experiences. As a result, users' QoE will become one of the key features in 5G/future networks. In this article, we first review the state of the art of QoE research from several perspectives, including definition, influencing factors, assessment methods, QoE models, and control methods. Then a data-driven architecture for enhancing personalized QoE is proposed for 5G networks. Under this architecture, we specifically propose a two-ste…
Electrical Safety of Resonant Grounding
2019
The resonant grounding is one of the possible methods of system neutral grounding for the medium-voltage distribution. IEEE standards do define this grounding configuration, but important advantages and drawbacks of the resonant grounding might not be fully known, due to its rather uncommon application in North America. On the other hand, resonant grounding in Europe is imposed by the increased requirements for power quality, especially for medium-voltage industrial users, and imposed to electric utilities by Regulatory Authorities, with the purpose to protect the interests of users and consumers. Level of the continuity of the service, magnitude and phase of ground-fault currents, magnitud…