Search results for "platform"

showing 10 items of 488 documents

One My scale subsidence of carbonate sedimentary bodies and the viscosity of the lower crust

2004

Abstract The possibility of flow of the lower crust under the load produced by carbonate sedimentary accumulations is investigated through the example of the Paris basin during the Middle Jurassic (i.e. Bathonian). Depositional geometries, water depths and sedimentary environments have been estimated and correlated for 164 sites spread over a surface of 380 per 220 km for three successive periods lasting each less than 0.8 My. A signal of relative vertical displacement has been extracted from water-depth and sedimentary thickness. Data have then been interpolated to produce maps of velocity of vertical displacement, sedimentation rate, water depth, and water-depth variation between two peri…

Carbonate platformSubsidenceCrustSedimentationSedimentary depositional environmentchemistry.chemical_compoundGeophysicschemistryCarbonateSedimentary rockVertical displacementGeomorphologyGeologyEarth-Surface ProcessesJournal of Geodynamics
researchProduct

Carbonate platform-basin systems of Sicily through the Triassic/Jurassic Boundary: Stratigraphic constraints for the paleogeographic reconstructions.

2004

Carbonate platform-basin Sicily Triassic/Jurassic Boundary
researchProduct

Qualitative analysis on the driving force behind upcycling practices associated with mobile applications: Circular economy perspective

2022

Funding for open access charge: Universidad de Granada/CBUA

Circular economyStrategy and Managementcircular economyrural tourismUpcyclingRural tourismUNESCO::CIENCIAS ECONÓMICASManagement Science and Operations Researchmobile applicationsIndustrial and Manufacturing Engineeringpeer-to-peer platformsMobile applicationsManagement of Technology and InnovationPeer-to-peer platformsqualitative analysisupcyclingQualitative analysis
researchProduct

Integration of Metal Organic Chemical Vapour Deposition and Wet Chemical Techniques to Obtain Highly Ordered Porous ZnO Nanoplatforms

2011

Large-area, highly ordered ZnO micropores-arrays consisting of ZnO nanotubes delimited by ZnO nanorods have been successfully fabricated and tested for protein sensing applications. ZnO seed layers have been deposited by Metal Organic Chemical Vapour Deposition and readily patterned by Colloidal Lithography to attain ZnO nanorods growth at selective sites by Chemical Bath Deposition. The used synthetic approach has been proven effective for the easy assembly of ZnO nanoplatforms into high-density arrays. Both patterned and unpatterned ZnO nanorods have been morphologically and compositionally characterised and, thus, tested for model studies of protein mobility at the interface. The pattern…

Colloidal lithographyColloidal LithographyNanoplatformFabricationMaterials scienceBiosensingInorganic chemistryBiomedical EngineeringBioengineeringNanotechnologyGeneral ChemistryChemical vapor depositionCondensed Matter PhysicsMetalZnO; Nanoplatforms; Colloidal Lithography; Biosensing; FRAPAdsorptionvisual_artZnOFRAPvisual_art.visual_art_mediumGeneral Materials ScienceNanorodPorosityChemical bath depositionJournal of Nanoscience and Nanotechnology
researchProduct

Competition Logics during Digital Platform Evolution

2018

How are platforms built and how do they evolve? This is a salient question in digital ecosystems, where the competition has moved from traditional one-sided business logics to multi-sided platforms. In this paper, we explore how a digital platform evolves when the organization of the multilayered platform architecture, and related control points, is modified through competitive moves. We also examine how a firm may be able to manage the increased complexity of the platform. We show that when technical and strategic bottlenecks are solved, the platform owner can expand control to strategically important layers of the platform stack. The findings indicate that the complexity of the platform i…

Competition (economics)Design architecturebusiness.industryMultihomingComputer science0502 economics and business05 social sciences050211 marketingdigital platform evolutiondigital platformsTelecommunicationsbusiness050203 business & management
researchProduct

Hypervisor-based Protection of Code

2019

The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…

Computer Networks and CommunicationsComputer science0211 other engineering and technologiesCryptography02 engineering and technologysecurityComputer securitycomputer.software_genreEncryptionkryptografiaObfuscationCode (cryptography)tietoturvavirtual machine monitorsSafety Risk Reliability and QualitySystem bustrusted platform moduleta113021110 strategic defence & security studiescode protectioncryptographybusiness.industryHypervisorVirtualizationObfuscation (software)businesscomputerIEEE Transactions on Information Forensics and Security
researchProduct

Information Integration Platform for Patient-Centric Healthcare Services: Design, Prototype and Dependability Aspects

2014

Published version of an article in the journal: Future Internet. Also available from the publisher at: http://dx.doi.org/10.3390/fi6010126 Open Access Technology innovations have pushed today’s healthcare sector to an unprecedented new level. Various portable and wearable medical and fitness devices are being sold in the consumer market to provide the self-empowerment of a healthier lifestyle to society. Many vendors provide additional cloud-based services for devices they manufacture, enabling the users to visualize, store and share the gathered information through the Internet. However, most of these services are integrated with the devices in a closed “silo” manner, where the devices can…

Computer Networks and CommunicationsComputer scienceInternet of Thingsavailabilityintegration platformWearable computerCloud computingsecuritycomputer.software_genreWorld Wide WebmiddlewareDependabilityscalabilitylcsh:T58.5-58.64lcsh:Information technologybusiness.industryRESTIntegration platformInternet of Things; integration platform; middleware; REST; publish/subscribe; availability; scalability; security; healthcarehealthcareVDP::Technology: 500::Information and communication technology: 550Middleware (distributed applications)Scalabilitypublish/subscribeThe InternetbusinesscomputerInformation integrationFuture Internet
researchProduct

A Damage Identification Approach for Offshore Jacket Platforms Using Partial Modal Results and Artificial Neural Networks

2018

This paper presents a damage identification method for offshore jacket platforms using partially measured modal results and based on artificial intelligence neural networks. Damage identification indices are first proposed combining information of six modal results and natural frequencies. Then, finite element models are established, and damages in structural members are assumed by reducing the structural elastic modulus. From the finite element analysis for a training sample, both the damage identification indices and the damages are obtained, and neural networks are trained. These trained networks are further tested and used for damage prediction of structural members. The calculation res…

Computer science020101 civil engineering02 engineering and technologylcsh:Technology0201 civil engineeringWaterlinejacket platformlcsh:Chemistrysymbols.namesake0203 mechanical engineeringGeneral Materials Sciencenatural frequenciesInstrumentationlcsh:QH301-705.5Fluid Flow and Transfer Processesdamage identification indexfinite element modelArtificial neural networkbusiness.industrylcsh:TProcess Chemistry and Technologymodal shapesGeneral EngineeringStructural engineeringFinite element methodlcsh:QC1-999Computer Science ApplicationsIdentification (information)020303 mechanical engineering & transportsModallcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040symbolsSubmarine pipelinebusinesslcsh:Engineering (General). Civil engineering (General)artificial neural networkslcsh:Physics
researchProduct

2019

This paper describes a single body-mounted sensor that integrates accelerometers, gyroscopes, compasses, barometers, a GPS receiver, and a methodology to process the data for biomechanical studies. The sensor and its data processing system can accurately compute the speed, acceleration, angular velocity, and angular orientation at an output rate of 400 Hz and has the ability to collect large volumes of ecologically-valid data. The system also segments steps and computes metrics for each step. We analyzed the sensitivity of these metrics to changing the start time of the gait cycle. Along with traditional metrics, such as cadence, speed, step length, and vertical oscillation, this system est…

Computer scienceAngular velocity02 engineering and technologyAccelerometerBiochemistryAnalytical Chemistrylaw.invention03 medical and health sciencesAcceleration0302 clinical medicinelaw0202 electrical engineering electronic engineering information engineeringForce platformElectrical and Electronic EngineeringGround reaction forceInstrumentationSimulationbusiness.industryGyroscope030229 sport sciencesAtomic and Molecular Physics and OpticsAssisted GPSGait analysisGlobal Positioning System020201 artificial intelligence & image processingbusinessSensors
researchProduct

Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks

2020

Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…

Computer scienceDenial-of-service attackCloud computingComputerApplications_COMPUTERSINOTHERSYSTEMStekoälyComputer securitycomputer.software_genreInsiderpilvipalvelutälytalotComponent (UML)cloud servicetietoturvakyberturvallisuusBuilding automationbusiness.industryattack vectorsartificial intelligencePopularityartificial-intelligence-based applicationsHeating systemälytekniikkabusinessdata platformCloud storagecomputerverkkohyökkäykset
researchProduct