2,848 research outputs found
Existence of solutions of some quadratic integral equations
In this paper we study the existence of continuous solutions of quadratic integral equations. The theory of quadratic integral equations has many useful applications in mathematical physics, economics, biology, as well as in describing real world problems. The main tool used in our investigations is a fixed point result for the multivalued solution's map with acyclic values
The insider on the outside: a novel system for the detection of information leakers in social networks
Confidential information is all too easily leaked by naive users posting comments. In this paper we introduce DUIL, a system for Detecting Unintentional Information Leakers. The value of DUIL is in its ability to detect those responsible for information leakage that occurs through comments posted on news articles in a public environment, when those articles have withheld material non-public information. DUIL is comprised of several artefacts, each designed to analyse a different aspect of this challenge: the information, the user(s) who posted the information, and the user(s) who may be involved in the dissemination of information. We present a design science analysis of DUIL as an information system artefact comprised of social, information, and technology artefacts. We demonstrate the performance of DUIL on real data crawled from several Facebook news pages spanning two years of news articles
A Semantic-Based Information Management System to Support Innovative Product Design
International competition and the rapidly global economy, unified by improved communication and transportation, offer to the consumers an enormous choice of goods and services. The result is that companies now require quality, value, time to market and innovation to be successful in order to win the increasing competition. In the engineering sector this is traduced in need of optimization of the design process and in maximization of re-use of data and knowledge already existing in the company. The “SIMI-Pro” (Semantic Information Management system for Innovative Product design) system addresses specific deficiencies in the conceptual phase of product design when knowledge management, if applied, is often sectorial. Its main contribution is in allowing easy, fast and centralized collection of data from multiple sources and in supporting the retrieval and re-use of a wide range of data that will help stylists and engineers shortening the production cycle. SIMI-Pro will be one of the first prototypes to base its information management and its knowledge sharing system on process ontology and it will demonstrate how the use of centralized network systems, coupled with Semantic Web technologies, can improve inter-working activities and interdisciplinary knowledge sharing
Technology Transfer Offices (TTO) in Italian universities: what they do and how they do it
The contribution of the knowledge producing sector to the innovative activity of firms, and to economic development in general is widely recognised. Nevertheless, several new important subtopics have emerged during the last two decades, which represent increasingly important research issues for academics and policy makers.
Detecting ADS-B Spoofing Attacks using Deep Neural Networks
The Automatic Dependent Surveillance-Broadcast (ADS-B) system is a key
component of the Next Generation Air Transportation System (NextGen) that
manages the increasingly congested airspace. It provides accurate aircraft
localization and efficient air traffic management and also improves the safety
of billions of current and future passengers. While the benefits of ADS-B are
well known, the lack of basic security measures like encryption and
authentication introduces various exploitable security vulnerabilities. One
practical threat is the ADS-B spoofing attack that targets the ADS-B ground
station, in which the ground-based or aircraft-based attacker manipulates the
International Civil Aviation Organization (ICAO) address (a unique identifier
for each aircraft) in the ADS-B messages to fake the appearance of non-existent
aircraft or masquerade as a trusted aircraft. As a result, this attack can
confuse the pilots or the air traffic control personnel and cause dangerous
maneuvers. In this paper, we introduce SODA - a two-stage Deep Neural Network
(DNN)-based spoofing detector for ADS-B that consists of a message classifier
and an aircraft classifier. It allows a ground station to examine each incoming
message based on the PHY-layer features (e.g., IQ samples and phases) and flag
suspicious messages. Our experimental results show that SODA detects
ground-based spoofing attacks with a probability of 99.34%, while having a very
small false alarm rate (i.e., 0.43%). It outperforms other machine learning
techniques such as XGBoost, Logistic Regression, and Support Vector Machine. It
further identifies individual aircraft with an average F-score of 96.68% and an
accuracy of 96.66%, with a significant improvement over the state-of-the-art
detector.Comment: Accepted to IEEE CNS 201
Identifying Emotions in Social Media: Comparison of Word-emotion lexica
In recent years, emotions expressed in social media messages have become a vivid research topic due to their influence on the spread of misinformation and online radicalization over online social networks. Thus, it is important to correctly identify emotions in order to make inferences from social media messages. In this paper, we report on the performance of three publicly available word-emotion lexicons (NRC, DepecheMood, EmoSenticNet) over a set of Facebook and Twitter messages. To this end, we designed and implemented an algorithm that applies natural language processing (NLP) techniques along with a number of heuristics that reflect the way humans naturally assess emotions in written texts. In order to evaluate the appropriateness of the obtained emotion scores, we conducted a questionnaire-based survey with human raters. Our results show that there are noticeable differences between the performance of the lexicons as well as with respect to emotion scores the human raters provided in our surve
An Advanced Technique for User Identification Using Partial Fingerprint
User identification is a very interesting and
complex task. Invasive biometrics is based on traits
uniqueness and immutability over time. In forensic field,
fingerprints have always been considered an essential
element for personal recognition. The traditional issue is
focused on full fingerprint images matching. In this paper an
advanced technique for personal recognition based on
partial fingerprint is proposed. This system is based on
fingerprint local analysis and micro-features, endpoints and
bifurcations, extraction. The proposed approach starts from
minutiae extraction from a partial fingerprint image and
ends with the final matching score between fingerprint pairs.
The computation of likelihood ratios in fingerprint
identification is computed by trying every possible
overlapping of the partial image with complete image. The
first experimental results conducted on the PolyU (Hong
Kong Polytechnic University) free database show an
encouraging performance in terms of identification
accuracy
An Embedded Biometric Sensor for Ubiquitous Authentication
Communication networks and distributed technologies
move people towards the era of ubiquitous computing. An
ubiquitous environment needs many authentication sensors for
users recognition, in order to provide a secure infrastructure for
both user access to resources and services and information
management. Today the security requirements must ensure
secure and trusted user information to protect sensitive data
resource access and they could be used for user traceability inside
the platform. Conventional authentication systems, based on
username and password, are in crisis since they are not able to
guarantee a suitable security level for several applications.
Biometric authentication systems represent a valid alternative to
the conventional authentication systems providing a flexible einfrastructure
towards an integrated solution supporting the
requirement for improved inter-organizational functionality. In
this work the study and the implementation of a fingerprintsbased
embedded biometric system is proposed. Typical strategies
implemented in Identity Management Systems could be useful to
protect biometric information. The proposed sensor can be seen
as a self-contained sensor: it performs the all elaboration steps on
board, a necessary requisite to strengthen security, so that
sensible data are securely managed and stored inside the sensor,
without any data leaking out. The sensor has been prototyped via
an FPGA-based platform achieving fast execution time and a
good final throughput. Resources used, elaboration times of the
sensor are reported. Finally, recognition rates of the proposed
embedded biometric sensor have been evaluated considering
three different databases: the FVC2002 reference database, the
CSAI/Biometrika proprietary database, and the CSAI/Secugen
proprietary database. The best achieved FAR and FRR indexes
are respectively 1.07% and 8.33%, with an elaboration time of
183.32 ms and a working frequency of 22.5 MHz
- …
