8,665 research outputs found

    Non-Invasive Measurement of Frog Skin Reflectivity in High Spatial Resolution Using a Dual Hyperspectral Approach

    Get PDF
    Background:Most spectral data for the amphibian integument are limited to the visible spectrum of light and have been collected using point measurements with low spatial resolution. In the present study a dual camera setup consisting of two push broom hyperspectral imaging systems was employed, which produces reflectance images between 400 and 2500 nm with high spectral and spatial resolution and a high dynamic range.Methodology/Principal Findings:We briefly introduce the system and document the high efficiency of this technique analyzing exemplarily the spectral reflectivity of the integument of three arboreal anuran species (Litoria caerulea, Agalychnis callidryas and Hyla arborea), all of which appear green to the human eye. The imaging setup generates a high number of spectral bands within seconds and allows non-invasive characterization of spectral characteristics with relatively high working distance. Despite the comparatively uniform coloration, spectral reflectivity between 700 and 1100 nm differed markedly among the species. In contrast to H. arborea, L. caerulea and A. callidryas showed reflection in this range. For all three species, reflectivity above 1100 nm is primarily defined by water absorption. Furthermore, the high resolution allowed examining even small structures such as fingers and toes, which in A. callidryas showed an increased reflectivity in the near infrared part of the spectrum.Conclusion/Significance:Hyperspectral imaging was found to be a very useful alternative technique combining the spectral resolution of spectrometric measurements with a higher spatial resolution. In addition, we used Digital Infrared/Red-Edge Photography as new simple method to roughly determine the near infrared reflectivity of frog specimens in field, where hyperspectral imaging is typically difficult. © 2013 Pinto et al

    Sifu - a cybersecurity awareness platform with challenge assessment and intelligent coach

    Get PDF
    Software vulnerabilities, when actively exploited by malicious parties, can lead to catastrophic consequences. Proper handling of software vulnerabilities is essential in the industrial context, particularly when the software is deployed in critical infrastructures. Therefore, several industrial standards mandate secure coding guidelines and industrial software developers’ training, as software quality is a significant contributor to secure software. CyberSecurity Challenges (CSC) form a method that combines serious game techniques with cybersecurity and secure coding guidelines to raise secure coding awareness of software developers in the industry. These cybersecurity awareness events have been used with success in industrial environments. However, until now, these coached events took place on-site. In the present work, we briefly introduce cybersecurity challenges and propose a novel platform that allows these events to take place online. The introduced cybersecurity awareness platform, which the authors call Sifu, performs automatic assessment of challenges in compliance to secure coding guidelines, and uses an artificial intelligence method to provide players with solution-guiding hints. Furthermore, due to its characteristics, the Sifu platform allows for remote (online) learning, in times of social distancing. The CyberSecurity Challenges events based on the Sifu platform were evaluated during four online real-life CSC events. We report on three surveys showing that the Sifu platform’s CSC events are adequate to raise industry software developers awareness on secure coding.info:eu-repo/semantics/publishedVersio

    Thermessaite-(NH4), (NH4)2AlF3(SO4), a new fumarole mineral from la Fossa crater at Vulcano, Aeolian Islands, Italy

    Get PDF
    Thermessaite-(NH4), ideally (NH4)2AlF3(SO4), is a new mineral found as a medium- to high-temperature (about 250-300°C) fumarole encrustation at the rim of La Fossa crater, Vulcano, Aeolian Islands, Italy. The mineral deposited as aggregates of micrometer-sized sharp prismatic crystals on the surface of a pyroclastic breccia in association with thermessaite, sulfur, arcanite, mascagnite, and intermediate members of the arcanite-mascagnite series. The new mineral is colorless to white, transparent, non-fluorescent, has a vitreous luster, and a white streak. The calculated density is 2.185 g/cm3. Thermessaite-(NH4) is orthorhombic, space group Pbcn, with a = 11.3005(3) Å, b = 8.6125(3) Å, c = 6.8501(2) Å, V = 666.69(4) Å3, Z = 4. The eight strongest reflections in the X-ray powder-diffraction data [d in Å (I) (hkl)] are: 5.65 (100) (200), 4.84 (89) (111), 6.85 (74) (110), 3.06 (56) (112), 3.06 (53) (221), 3.08 (47) (311), 2.68 (28) (022), 2.78 (26) (130). The average chemical composition, determined by quantitative SEM-EDS (N by difference), is (wt%): K2O 3.38, Al2O325.35, SO336.58, F 26.12, (NH4)2O 22.47, O = F -11.00, total 102.90. The empirical chemical formula, calculated on the basis of 7 anions pfu, is [(NH4)1.85K0.15]Σ2.00Al106F2.94-S0.98O3.06. The crystal structure, determined from single-crystal X-ray diffraction data [R(F) = 0.0367], is characterized by corner-sharing AlF4O2octahedra which form [001] octahedral chains by sharing two trans fluoride atoms [Al-F2 = 1.8394(6) Å]. Non-bridging Al-F1 distances are shorter [1.756(1) Å]. The two trans oxygen atoms [Al-O = 1.920(2) Å] are from SO4tetrahedra. NH4+ions occur in layers parallel to (100) which alternate regularly with (100) layers containing ribbons of corner-sharing AlF4O2octahedra and associated SO4 groups. The NH4+ions are surrounded by five oxygen atoms and by four fluorine atoms. The mineral is named as the (NH4)-analogue of thermessaite, K2AlF3(SO4), and corresponds to an anthropogenic phase found in the burning Anna I coal dump of the Anna mine, Aachen, Germany. Both mineral and mineral name have been approved by the IMA-CNMNC commission (IMA 2011-077)

    Cybersecurity challenges: Serious games for awareness training in industrial environments

    Get PDF
    Awareness of cybersecurity topics, e.g., related to secure coding guidelines, enables software developers to write secure code. This awareness is vital in industrial environments for the products and services in critical infrastructures. In this work, we introduce and discuss a new serious game designed for software developers in the industry. This game addresses software developers’ needs and is shown to be well suited for raising secure coding awareness of software developers in the industry. Our work results from the experience of the authors gained in conducting more than ten CyberSecurity Challenges in the industry. The presented game design, which is shown to be well accepted by software developers, is a novel alternative to traditional classroom training. We hope to make a positive impact in the industry by improving the cybersecurity of products at their early production stages.info:eu-repo/semantics/acceptedVersio

    Experiments on computer assisted optimization of the escherichia coli fermentation process using Optferm

    Get PDF
    We used the software Optferm to model and optimize the bioprocess of escherichia coli fermentation, simulating the conditions of a fed-batch bioreactor. The results, obtained by employing different AI approaches, provided useful orientation for nutrient feed strategies for increased productivity. In conclusion, we believe in silico tools can perform a rapid and valid optimization of bioprocesses avoiding expensive experiments

    Raising awareness about cloud security in industry through a board game

    Get PDF
    Today, many products and solutions are provided on the cloud; however, the amount and financial losses due to cloud security incidents illustrate the critical need to do more to protect cloud assets adequately. A gap lies in transferring what cloud and security standards recommend and require to industry practitioners working in the front line. It is of paramount importance to raise awareness about cloud security of these industrial practitioners. Under the guidance of design science paradigm, we introduce a serious game to help participants understand the inherent risks, understand the different roles, and encourage proactive defensive thinking in defending cloud assets. In our game, we designed and implemented an automated evaluator as a novel element. We invite the players to build defense plans and attack plans for which the evaluator calculates success likelihoods. The primary target group is industry practitioners, whereas people with limited background knowledge about cloud security can also participate in and benefit from the game. We design the game and organize several trial runs in an industrial setting. Observations of the trial runs and collected feedback indicate that the game ideas and logic are useful and provide help in raising awareness of cloud security in industry. Our preliminary results share insight into the design of the serious game and are discussed in this paper.info:eu-repo/semantics/publishedVersio

    Changing European storm loss potentials under modified climate conditions according to ensemble simulations of the ECHAM5/MPI-OM1 GCM

    No full text
    International audienceA simple storm loss model is applied to an ensemble of ECHAM5/MPI-OM1 GCM simulations in order to estimate changes of insured loss potentials over Europe in the 21st century. Losses are computed based on the daily maximum wind speed for each grid point. The calibration of the loss model is performed using wind data from the ERA40-Reanalysis and German loss data. The obtained annual losses for the present climate conditions (20C, three realisations) reproduce the statistical features of the historical insurance loss data for Germany. The climate change experiments correspond to the SRES-Scenarios A1B and A2, and for each of them three realisations are considered. On average, insured loss potentials increase for all analysed European regions at the end of the 21st century. Changes are largest for Germany and France, and lowest for Portugal/Spain. Additionally, the spread between the single realisations is large, ranging e.g. for Germany from ?4% to +43% in terms of mean annual loss. Moreover, almost all simulations show an increasing interannual variability of storm damage. This assessment is even more pronounced if no adaptation of building structure to climate change is considered. The increased loss potentials are linked with enhanced values for the high percentiles of surface wind maxima over Western and Central Europe, which in turn are associated with an enhanced number and increased intensity of extreme cyclones over the British Isles and the North Sea

    Raising security awareness using cybersecurity challenges in embedded programming courses

    Get PDF
    Security bugs are errors in code that, when exploited, can lead to serious software vulnerabilities. These bugs could allow an attacker to take over an application and steal information. One of the ways to address this issue is by means of awareness training. The Sifu platform was developed in the industry, for the industry, with the aim to raise software developers' awareness of secure coding. This paper extends the Sifu platform with three challenges that specifically address embedded programming courses, and describes how to implement these challenges, while also evaluating the usefulness of these challenges to raise security awareness in an academic setting. Our work presents technical details on the detection mechanisms for software vulnerabilities and gives practical advice on how to implement them. The evaluation of the challenges is performed through two trial runs with a total of 16 participants. Our preliminary results show that the challenges are suitable for academia, and can even potentially be included in official teaching curricula. One major finding is an indicator of the lack of awareness of secure coding by undergraduates. Finally, we compare our results with previous work done in the industry and extract advice for practitioners.info:eu-repo/semantics/acceptedVersio
    • …
    corecore