55 research outputs found

    Analysis of accounting data from the explanatory notes to the financial statements for the estimation of the enterprises investments

    Get PDF
    The Italian national institute of statistics (Istat) produces estimates on the main economic variables of enterprises, both from a Structural Business Statistics (SBS) and a National Accounts (NA) perspective. The two production processes present similarities and discrepancies. As far the production process of estimates on “acquisitions of fixed assets” during the year, also known as “enterprise investments”, both SBS and NA processes use survey data, but only NA process also uses administrative information. The aim of the present work is to evaluate the content of the information on Investments, at the level of the legal unit, from the administrative source of the Explanatory Notes, beside the administrative sources already used in Istat processes. This work represents an exploratory and study phase to evaluate the usability of this source in the production processes of Investments of both SBS and NA

    Data set and machine learning models for the classification of network traffic originators

    Get PDF
    The widespread adoption of encryption in computer network traffic is increasing the difficulty of analyzing such traffic for security purposes. The data set presented in this data article is composed of network statistics computed on captures of TCP flows, originated by executing various network stress and web crawling tools, along with statistics of benign web browsing traffic. Furthermore, this data article describes a set of Machine Learning models, trained using the described data set, which can classify network traffic by the tool category (network stress tool, web crawler, web browser), the specific tool (e.g., Firefox), and also the tool version (e.g., Firefox 68) used to generate it. These models are compatible with the analysis of traffic with encrypted payload since statistics are evaluated only on the TCP headers of the packets. The data presented in this article can be useful to train and assess the performance of new Machine Learning models for tool classification

    What are the nursing competencies related to antimicrobial stewardship and how they have been assessed? Results from an integrative rapid review

    Get PDF
    Background: Antimicrobial resistance issues, and the consequent demand for antimicrobial stewardship (AMS) programs, need to be investigated urgently and clearly. Considering the large amount of time nurses spend at patients’ bedside, the aim of the present study was to examine recent literature on nursing competency in AMS. Methods: Drawing from Tricco and colleagues’ seven-stage process, a rapid review was performed. MEDLINE, CINAHL and EMBASE databased were searched from December 1st, 2019 until December 31st, 2021. Article screening and study selection were conducted independently by three reviewers. Data were analyzed narratively and categorized adopting an inductive thematic coding. Results: Sixteen studies met the inclusion criteria and were included. Publications were mainly authored in USA (n = 4), Australia and New Zealand (n = 4) and Asia (n = 4), followed by Europe (n = 2) and Africa (n = 2). Ten studies were quantitative in design, followed by qualitative (n = 4) and mixed-methods studies (n = 2). Nursing competency in AMS seems to be influenced by a two-dimensional model: on the one hand, internal factors which consisted in knowledge, attitudes and practices and, on the other hand, external aspects which are at environmental level in terms of structures and processes. Conclusion: This study provided a map of dimensions for researchers and practitioners to consider when planning clinical governance, educational activities, and research programs. Significant opportunities exist for nurses to contribute to practice, education, research, and policy efforts aimed at reducing antimicrobial resistance

    Empirical assessment of the effort needed to attack programs protected with client/server code splitting

    Get PDF
    Context. Code hardening is meant to fight malicious tampering with sensitive code executed on client hosts. Code splitting is a hardening technique that moves selected chunks of code from client to server. Although widely adopted, the effective benefits of code splitting are not fully understood and thoroughly assessed. Objective. The objective of this work is to compare non protected code vs. code splitting protected code, considering two levels of the chunk size parameter, in order to assess the effectiveness of the protection - in terms of both attack time and success rate - and to understand the attack strategy and process used to overcome the protection. Method. We conducted an experiment with master students performing attack tasks on a small application hardened with different levels of protection. Students carried out their task working at the source code level. Results. We observed a statistically significant effect of code splitting on the attack success rate that, on the average, was reduced from 89% with unprotected clear code to 52% with the most effective protection. The protection variant that moved some small-sized code chunks turned out to be more effective than the alternative moving fewer but larger chunks. Different strategies were identified yielding different success rates. Moreover, we discovered that successful attacks exhibited different process w.r.t. failed ones.Conclusions We found empirical evidence of the effect of code splitting, assessed the relative magnitude, and evaluated the influence of the chunk size parameter. Moreover, we extracted the process used to overcome such obfuscation technique

    Alla base dell'incontro interetnico: contatto, visibilitĂ  e interesse

    No full text
    Sulla base delle interviste realizzate su un camipione di studenti romani, sono indagate tematiche relative alla visibilitĂ  del fenomeno migratorio, ai tratti di riconoscimento dello straniero, alle dimensioni del contatto e dell'interesse a comunicare con gli stranieri, oltre che alla percezione dell'andamento migratorio e delle modalitĂ  di comportamento relazionale dello straniero. Viene presentata una tipologia degli intervistati in base a queste dimensioni, e si propone una ipotesi di relazione tra le varie componenti dell'atteggiamento di pregiudizio. Infine, vengono proposte alcune considerazioni sul ruolo della scuola come luogo fisico dell'incontro, ambito dell'interazione e del'lacquisizione di nuove informazioni funzionali all'integrazione sociale

    Monitoring CMS tracker construction and data quality using a Grid/Web service based on a visualization tool

    No full text
    The complexity of the CMS tracker (more than 50 million channels to monitor) now in construction in ten laboratories worldwide with hundreds of interested people, will require new tools for monitoring both the hardware and the software. In our approach we use both visualization tools and Grid services to make this monitoring possible. The use of visualization enables us to represent in a single computer screen all those million channels at once. The Grid will make it possible to get enough data and computing power in order to check every channel and also to reach the experts everywhere in the world allowing the early discovery of problems. We report here on a first prototype developed using the Grid environment already available now in CMS i.e. LCG2. This prototype consists on a Java client which implements the GUI for tracker visualization and two data servers connected to the tracker construction database and to Grid catalogs of event datasets. All the communication between client and servers is done using data encoded in XML and standard Internet protocols

    CMS Tracker Visualisation

    No full text
    To provide improvements in the performance of existing tracker data visualization tools in IGUANA, a 2D visualisation software has been developed, using the object oriented paradigm and software engineering techniques. We have designed 2D graphics objects and some of them have been implemented. The access to the new objects is made in ORCA plugin of IGUANA CMS. A new tracker object oriented model has been designed for developing these 2D graphics objects. The model consists of new classes which represent all its components (layers, modules, rings, petals, rods).The new classes are described here. The last part of this document contains a user manual of the software and will be updated with new releases

    CMS tracker visualization tools

    No full text
    This document will review the design considerations, implementations and performance of the CMS Tracker Visualization tools. In view of the great complexity of this sub-detector (more than 50 millions channels organized in 16540 modules each one of these being a complete detector), the standard CMS visualization tools (IGUANA and IGUANACMS) that provide basic 3D capabilities and integration within CMS framework, respectively, have been complemented with additional 2D graphics objects. Based on the experience acquired using this software to debug and understand both hardware and software during the construction phase, we propose possible future improvements to cope with online monitoring and event analysis during data taking
    • …
    corecore