Search results for "processi"

showing 10 items of 9638 documents

Two novel subjective logic-based in-network data processing schemes in wireless sensor networks

2016

Wireless sensor networks (WSNs) consist of connected low-cost and small-size sensor nodes. The sensor nodes are characterized by various limitations, such as energy availability, processing power, and storage capacity. Typically, nodes collect data from an environment and transmit the raw or processed data to a sink. However, the collected data contains often redundant information. An in-network processing scheme attempts to eliminate or reduce such redundancy in sensed data. In this paper, we propose two in-network data processing schemes for WSNs, which are built based on a lightweight algebra for data processing. The schemes bring also benefits like decreased network traffic load and inc…

021110 strategic defence & security studiesData processingbusiness.industryComputer scienceVisual sensor networkReal-time computing0211 other engineering and technologies020206 networking & telecommunications02 engineering and technologySynthetic dataKey distribution in wireless sensor networks0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkWirelessbusinessSubjective logicWireless sensor network2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

Serious Game Design for Flooding Triggered by Extreme Weather

2017

Managing crises with limited resources through a serious game is deemed as one of the ways of training and can be regarded as an alternative to a table-top exercise. This article presents the so-called “Operasjon Tyrsdal” serious game, inspired by a real case of extreme weather that hit the west coast of Norway. This reference case is used to add realism to the game. The game is designed for a single player, while the mechanics are framed in such a way that the player will have limited resources, and elevated event pressure over time. Beside applying an iterative Scrum method with seven Sprint cycles, we combined the development work with desk research and used the involvement of testers, i…

021110 strategic defence & security studiesExtreme weatherComputer scienceComputingMilieux_PERSONALCOMPUTING0211 other engineering and technologies0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing02 engineering and technologySerious gameWater resource managementFlooding (computer networking)International Journal of Information Systems for Crisis Response and Management
researchProduct

A Novel Intelligent Technique for Product Acceptance Process Optimization on the Basis of Misclassification Probability in the Case of Log-Location-S…

2019

In this paper, to determine the optimal parameters of the product acceptance process under parametric uncertainty of underlying models, a new intelligent technique for optimization of product acceptance process on the basis of misclassification probability is proposed. It allows one to take into account all possible situations that may occur when it is necessary to optimize the product acceptance process. The technique is based on the pivotal quantity averaging approach (PQAA) which allows one to eliminate the unknown parameters from the problem and to use available statistical information as completely as possible. It is conceptually simple and easy to use. One of the most important featur…

021110 strategic defence & security studiesGeneralityMathematical optimizationBasis (linear algebra)Computer scienceScale (chemistry)0211 other engineering and technologiesProcess (computing)02 engineering and technologyPivotal quantityProduct (mathematics)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingProcess optimizationParametric statistics
researchProduct

Proper Incentives for Proper IT Security Management _ A System Dynamics Approach

2017

021110 strategic defence & security studiesIncentive0211 other engineering and technologies0202 electrical engineering electronic engineering information engineeringEconomics020201 artificial intelligence & image processing02 engineering and technologyIndustrial organizationSystem dynamicsProceedings of the 50th Hawaii International Conference on System Sciences (2017)
researchProduct

Automated Dental Identification with Lowest Cost Path-Based Teeth and Jaw Separation

2016

Abstract Teeth are some of the most resilient tissues of the human body. Because of their placement, teeth often yield intact indicators even when other metrics, such as finger prints and DNA, are missing. Forensics on dental identification is now mostly manual work which is time and resource intensive. Systems for automated human identification from dental X-ray images have the potential to greatly reduce the necessary efforts spent on dental identification, but it requires a system with high stability and accuracy so that the results can be trusted. This paper proposes a new system for automated dental X-ray identification. The scheme extracts tooth and dental work contours from the X-ray…

021110 strategic defence & security studiesK5000-5582business.industrySeparation (aeronautics)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION0211 other engineering and technologies02 engineering and technologyAnatomyDental identificationpath-findinghuman dental identificationCriminal law and procedurestomatognathic diseasesstomatognathic systemSocial pathology. Social and public welfare. CriminologyPath (graph theory)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessHV1-9960Scandinavian Journal of Forensic Science
researchProduct

Intelligent Constructing Exact Tolerance Limits for Prediction of Future Outcomes Under Parametric Uncertainty

2021

The problem of constructing one-sided exact statistical tolerance limits on the kth order statistic in a future sample of m observations from a distribution of log-location-scale family on the basis of an observed sample from the same distribution is considered. The new technique proposed here emphasizes pivotal quantities relevant for obtaining tolerance factors and is applicable whenever the statistical problem is invariant under a group of transformations that acts transitively on the parameter space. The exact tolerance limits on order statistics associated with sampling from underlying distributions can be found easily and quickly making tables, simulation, Monte Carlo estimated percen…

021110 strategic defence & security studiesMathematical optimizationComputer science0211 other engineering and technologies0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing02 engineering and technologyParametric statistics
researchProduct

A New Intelligent Technique of Constructing Optimal Airline Seat Protection Levels for Multiple Nested Fare Classes of Single-Leg Flights

2019

A new, rigorous formulation of the optimization problem of airline seat protection levels for multiple nested fare classes is presented. A number of results useful for practical application are obtained. A numerical example is given.

021110 strategic defence & security studiesMathematical optimizationOptimization problemComputer science0211 other engineering and technologies0202 electrical engineering electronic engineering information engineeringComputerApplications_COMPUTERSINOTHERSYSTEMS020201 artificial intelligence & image processingComputer Science::Social and Information Networks02 engineering and technologyComputer Science::Computers and Society2019 6th International Conference on Control, Decision and Information Technologies (CoDIT)
researchProduct

Data Sources Handling for Emergency Management: Supporting Information Availability and Accessibility for Emergency Responders

2017

Information is an essential component for better emergency response. Although a lot of information being available at various places during any kind of emergency, many emergency responders (ERs) use only a limited amount of the available information. The reason for this is that the available information heterogeneously distributed, in different formats, and ERs are unable to get access to the relevant information. Moreover, without having access to the needed information, many emergency responders are not able to obtain a sufficient understanding of the emergency situation. Consequently, a lot of time is being used to search for the needed information and poor decisions may be made. Therefo…

021110 strategic defence & security studiesSituation awarenessEmergency managementcomputer.internet_protocolComputer sciencebusiness.industry0211 other engineering and technologies02 engineering and technologyService-oriented architectureComputer securitycomputer.software_genreData scienceInformation model0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingWeb servicebusinesscomputerSemantic WebInformation exchangeData integration
researchProduct

The Camorra and protection rackets: the cost to business

2016

Based on the observations from the judicial and investigative evidence provided by prosecutors in Camorra areas in Italy, this investigation provides an estimate of the economic impact of extortion racket to businesses. In particular, the estimates refer to the total and average withdrawal of monetary amounts from the businesses victimised by Camorra clans. Further insights are provided in terms of economic activities mostly victimised, and specifically the construction sector, which is subject to a different type of extortion racket.

021110 strategic defence & security studiesSociology and Political ScienceSettore SPS/08 - Sociologia Dei Processi Culturali E Comunicativi05 social sciences0211 other engineering and technologiesSubject (philosophy)02 engineering and technologyExtortionLawPolitical Science and International RelationsRacket050501 criminologyExtortion racket Camorra Mafia Impact.Settore SPS/07 - Sociologia GeneraleBusinessClanEconomic impact analysisextortion racket Camorra mafia impactLawcomputer0505 lawcomputer.programming_languageLaw and economics
researchProduct

HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication

2020

Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…

021110 strategic defence & security studiesSoftware_OPERATINGSYSTEMSNetwork securitybusiness.industryComputer scienceNetwork packet0211 other engineering and technologiesHypervisor02 engineering and technologyAttack surfaceComputer securitycomputer.software_genreOperator (computer programming)Trusted computing baseDisk encryptionKernel (image processing)020204 information systems0202 electrical engineering electronic engineering information engineeringbusinesscomputer
researchProduct