85 research outputs found

    Selected Papers from the 5th International Electronic Conference on Sensors and Applications

    Get PDF
    This Special Issue comprises selected papers from the proceedings of the 5th International Electronic Conference on Sensors and Applications, held on 15–30 November 2018, on sciforum.net, an online platform for hosting scholarly e-conferences and discussion groups. In this 5th edition of the electronic conference, contributors were invited to provide papers and presentations from the field of sensors and applications at large, resulting in a wide variety of excellent submissions and topic areas. Papers which attracted the most interest on the web or that provided a particularly innovative contribution were selected for publication in this collection. These peer-reviewed papers are published with the aim of rapid and wide dissemination of research results, developments, and applications. We hope this conference series will grow rapidly in the future and become recognized as a new way and venue by which to (electronically) present new developments related to the field of sensors and their applications

    2020 Media Futures

    Get PDF
    What will our media and entertainment be like in 2020

    Modeling driving experience in smart traffic routing scenarios: application to traffic multi-map routing

    Get PDF
    The effectiveness of user-oriented traffic routing applications to mitigate traffic congestion in Intelligent Transportation Systems depends on their degree of adoption, which usually evolves depending on subjective and exogenous factors. This paper proposes a user experience and social dynamics model to analyze and evaluate traffic routing methods, based on fuzzy rules and discrete choice theory. The model has been applied to the optimal Traffic-Weighted Multi-Maps (TWM) routing method to evaluate the adoption dynamics and analyze convergence towards the system optimum. Route unfairness and resistance to change are also considered in the model. Experimental results are obtained simulating the evolution of the drivers' population behavior. Simulation is carried over synthetic and real networks, using optimized TWM maps. The experimental results show how the TWM system evolves to a stationary System Optimum, improving overall traffic congestion and showing how User Equilibrium variability is bounded as it depends on user routing choices influenced by behavioral patterns

    Rethinking marginality, beyond traditional spatial imaginaries

    Get PDF

    Next Generation Supply Chains

    Get PDF
    This open access book explores supply chains strategies to help companies face challenges such as societal emergency, digitalization, climate changes and scarcity of resources. The book identifies industrial scenarios for the next decade based on the analysis of trends at social, economic, environmental technological and political level, and examines how they may impact on supply chain processes and how to design next generation supply chains to answer these challenges. By mapping enabling technologies for supply chain innovation, the book proposes a roadmap for the full implementation of the supply chain strategies based on the integration of production and logistics processes. Case studies from process industry, discrete manufacturing, distribution and logistics, as well as ICT providers are provided, and policy recommendations are put forward to support companies in this transformative process

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI). This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors. Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well

    13th SC@RUG 2016 proceedings 2015-2016

    Get PDF

    13th SC@RUG 2016 proceedings 2015-2016

    Get PDF
    corecore