203,852 research outputs found
Bridges Structural Health Monitoring and Deterioration Detection Synthesis of Knowledge and Technology
INE/AUTC 10.0
Balancing Access to Data And Privacy. A review of the issues and approaches for the future
Access to sensitive micro data should be provided using remote access data enclaves. These enclaves should be built to facilitate the productive, high-quality usage of microdata. In other words, they should support a collaborative environment that facilitates the development and exchange of knowledge about data among data producers and consumers. The experience of the physical and life sciences has shown that it is possible to develop a research community and a knowledge infrastructure around both research questions and the different types of data necessary to answer policy questions. In sum, establishing a virtual organization approach would provided the research community with the ability to move away from individual, or artisan, science, towards the more generally accepted community based approach. Enclave should include a number of features: metadata documentation capacity so that knowledge about data can be shared; capacity to add data so that the data infrastructure can be augmented; communication capacity, such as wikis, blogs and discussion groups so that knowledge about the data can be deepened and incentives for information sharing so that a community of practice can be built. The opportunity to transform micro-data based research through such a organizational infrastructure could potentially be as far-reaching as the changes that have taken place in the biological and astronomical sciences. It is, however, an open research question how such an organization should be established: whether the approach should be centralized or decentralized. Similarly, it is an open research question as to the appropriate metrics of success, and the best incentives to put in place to achieve success.Methodology for Collecting, Estimating, Organizing Microeconomic Data
Training of Crisis Mappers and Map Production from Multi-sensor Data: Vernazza Case Study (Cinque Terre National Park, Italy)
This aim of paper is to presents the development of a multidisciplinary project carried out by the cooperation between Politecnico di Torino and ITHACA (Information Technology for Humanitarian Assistance, Cooperation and Action). The goal of the project was the training in geospatial data acquiring and processing for students attending Architecture and Engineering Courses, in order to start up a team of "volunteer mappers". Indeed, the project is aimed to document the environmental and built heritage subject to disaster; the purpose is to improve the capabilities of the actors involved in the activities connected in geospatial data collection, integration and sharing. The proposed area for testing the training activities is the Cinque Terre National Park, registered in the World Heritage List since 1997. The area was affected by flood on the 25th of October 2011. According to other international experiences, the group is expected to be active after emergencies in order to upgrade maps, using data acquired by typical geomatic methods and techniques such as terrestrial and aerial Lidar, close-range and aerial photogrammetry, topographic and GNSS instruments etc.; or by non conventional systems and instruments such us UAV, mobile mapping etc. The ultimate goal is to implement a WebGIS platform to share all the data collected with local authorities and the Civil Protectio
Recommended from our members
Marmots do not consistently use their left eye to respond to an approaching threat but those that did fled sooner.
In many vertebrates, the brain's right hemisphere which is connected to the left visual field specializes in the processing of information about threats while the left hemisphere which is connected to the right visual field specializes in the processing of information about conspecifics. This is referred to as hemispheric lateralization. But individuals that are too predictable in their response to predators could have reduced survival and we may expect selection for somewhat unpredictable responses. We studied hemispheric lateralization in yellow-bellied marmots Marmota flaviventer, a social rodent that falls prey to a variety of terrestrial and aerial predators. We first asked if they have lateralized responses to a predatory threat. We then asked if the eye that they used to assess risk influenced their perceptions of risk. We recorded the direction marmots were initially looking and then walked toward them until they fled. We recorded the distance that they responded to our experimental approach by looking, the eye with which they looked at us, and the distance at which they fled (i.e., flight initiation distance; FID). We found that marmots had no eye preference with which they looked at an approaching threat. Furthermore, the population was not comprised of individuals that responded in consistent ways. However, we found that marmots that looked at the approaching person with their left eye had larger FIDs suggesting that risk assessment was influenced by the eye used to monitor the threat. These findings are consistent with selection to make prey less predictable for their predators, despite underlying lateralization
From Social Data Mining to Forecasting Socio-Economic Crisis
Socio-economic data mining has a great potential in terms of gaining a better
understanding of problems that our economy and society are facing, such as
financial instability, shortages of resources, or conflicts. Without
large-scale data mining, progress in these areas seems hard or impossible.
Therefore, a suitable, distributed data mining infrastructure and research
centers should be built in Europe. It also appears appropriate to build a
network of Crisis Observatories. They can be imagined as laboratories devoted
to the gathering and processing of enormous volumes of data on both natural
systems such as the Earth and its ecosystem, as well as on human
techno-socio-economic systems, so as to gain early warnings of impending
events. Reality mining provides the chance to adapt more quickly and more
accurately to changing situations. Further opportunities arise by individually
customized services, which however should be provided in a privacy-respecting
way. This requires the development of novel ICT (such as a self- organizing
Web), but most likely new legal regulations and suitable institutions as well.
As long as such regulations are lacking on a world-wide scale, it is in the
public interest that scientists explore what can be done with the huge data
available. Big data do have the potential to change or even threaten democratic
societies. The same applies to sudden and large-scale failures of ICT systems.
Therefore, dealing with data must be done with a large degree of responsibility
and care. Self-interests of individuals, companies or institutions have limits,
where the public interest is affected, and public interest is not a sufficient
justification to violate human rights of individuals. Privacy is a high good,
as confidentiality is, and damaging it would have serious side effects for
society.Comment: 65 pages, 1 figure, Visioneer White Paper, see
http://www.visioneer.ethz.c
AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications
Security in Ambient Intelligence (AmI) poses too many challenges due to the inherently insecure nature of wireless sensor nodes. However, there are two characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in previous approaches, we assume an individual wireless node is vulnerable. We present an agent-based architecture with supporting services that is proven to be adequate to detect and confine common attacks. Decisions at different levels are supported by a trust-based framework with good and bad reputation feedback while maintaining resistance to bad-mouthing attacks. We also propose a set of services that can be used to handle identification, authentication, and authorization in intelligent ambients. The resulting approach takes into account practical issues, such as resource limitation, bandwidth optimization, and scalability
Assessment of culture and environment in the Adolescent Brain and Cognitive Development Study: Rationale, description of measures, and early data.
Neurodevelopmental maturation takes place in a social environment in addition to a neurobiological one. Characterization of social environmental factors that influence this process is therefore an essential component in developing an accurate model of adolescent brain and neurocognitive development, as well as susceptibility to change with the use of marijuana and other drugs. The creation of the Culture and Environment (CE) measurement component of the ABCD protocol was guided by this understanding. Three areas were identified by the CE Work Group as central to this process: influences relating to CE Group membership, influences created by the proximal social environment, influences stemming from social interactions. Eleven measures assess these influences, and by time of publication, will have been administered to well over 7,000 9-10 year-old children and one of their parents. Our report presents baseline data on psychometric characteristics (mean, standard deviation, range, skewness, coefficient alpha) of all measures within the battery. Effectiveness of the battery in differentiating 9-10 year olds who were classified as at higher and lower risk for marijuana use in adolescence was also evaluated. Psychometric characteristics on all measures were good to excellent; higher vs. lower risk contrasts were significant in areas where risk differentiation would be anticipated
The Economics of Water Resource Allocation: Valuation Methods and Policy Implications
In this chapter a ‘watershed economics approach’ that could be applied in Cyprus is proposed which is composed of two important stages. In Stage I economic valuation techniques are used to establish the economic value of the competing
demands for surface and groundwater, incorporating where necessary an analysis of water quality. The valuation exercise allows the objective balancing of demands based upon the equi-marginal principle to achieve economic efficiency. In Stage II a policy impact analysis is proposed which addresses issues of social equity and the value of water for environmental/ecological purposes. The analysis is undertaken within the confines of the watershed; the most natural unit for the analysis of water allocation and scarcity since it determines the hydrological links between competing users and thus the impacts of one user upon another. The methodology is encapsulated by a case study of the Kouris watershed in Cyprus
- …