229 research outputs found

    "Positive" and "Negative" Rights: Shortcomings of the Church's Social Teaching

    Get PDF
    After taking a somewhat biased and rather paternalistic approach towards human rights, the official teaching of the Catholic Church hurriedly converted to proclaiming such rights with great conviction, although in a much broader but less precise way. Nevertheless, there was a risk of adding error to error: the past "error" which did not consider the metaphysical reach of individuals' natural rights (especially in terms of the duty to resist growing political power) and the present "error" which is broadly based on a way of thinking that tries to match needs with rights (very broad legitimization of the authority of the State but seriously compromising individual liberties). Unfortunately, the Social Doctrine of the Church, according to Popes, demonstrates the lack of the realism and the doctrine of natural law that the libertarian tradition has expressed to guarantee individual natural rights and freedoms

    Semantic Techniques for Multi-Cloud Applications Portability and Interoperability

    Get PDF
    The composition of Cloud Services to satisfy customer requirements is a complex task, owing to the huge number of services that arecurrentlyavailable. TheadventofBigDataandInternetofThings(IoT),whichrelyonCloudresourcesforbetterperformances and scalability, is pushing researchers to ïŹnd new solutions to the Cloud Services composition problem. In this paper a semanticbased representation of Application Patterns and Cloud Services is presented, with an example of its use in a typical distributed application, which shows how the proposed approach can be successfully employed for the discovery and composition of Cloud Services.

    Semantic Brokering of Multimedia Contents for Smart Delivery of Ubiquitous Services in Pervasive Environments

    Get PDF
    With the proliferation of modern mobile devices having the capability to interact each other and with the environment in a transparent manner, there is an increase in the development of those applications that are specifically designed for pervasive and ubiquitous environments. Those applications are able to provide a service of interest for the user that depends on context information, such as the user's position, his preferences, the capability of the device and its available resources. Services have to respond in a rational way in many different situations choosing the actions with the best expected result by the user, so making environment not only more connected and efficient, but smarter. Here we present a semantic framework that provides the technology for the development of intelligent, context aware services and their delivery in pervasive and ubiquitous environments

    An architecture for using commodity devices and smart phones in health systems

    Get PDF
    The potential of patient-centred care and a connected eHealth ecosystem can be developed through socially responsible innovative architectures. The purpose of this paper is to define key innovation needs. This is achieved through conceptual development of an architecture for common information spaces with emergent end-user applications by supporting intelligent processing of measurements, data and services at the Internet of Things (IoT) integration level. The scope is conceptual definition, and results include descriptions of social, legal and ethical requirements, an architecture, services and connectivity infrastructures for consumer-oriented healthcare systems linking co-existing healthcare systems and consumer devices. We conclude with recommendations based on an analysis of research challenges related to how to process the data securely and anonymously and how to interconnect participants and services with different standards and interaction protocols, and devices with heterogeneous hardware and software configurations

    Low in‑hospital mortality rate in patients with COVID‑19 receiving thromboprophylaxis: data from the multicentre observational START‑COVID Register

    Get PDF
    Abstract COVID-19 infection causes respiratory pathology with severe interstitial pneumonia and extra-pulmonary complications; in particular, it may predispose to thromboembolic disease. The current guidelines recommend the use of thromboprophylaxis in patients with COVID-19, however, the optimal heparin dosage treatment is not well-established. We conducted a multicentre, Italian, retrospective, observational study on COVID-19 patients admitted to ordinary wards, to describe clinical characteristic of patients at admission, bleeding and thrombotic events occurring during hospital stay. The strategies used for thromboprophylaxis and its role on patient outcome were, also, described. 1091 patients hospitalized were included in the START-COVID-19 Register. During hospital stay, 769 (70.7%) patients were treated with antithrombotic drugs: low molecular weight heparin (the great majority enoxaparin), fondaparinux, or unfractioned heparin. These patients were more frequently affected by comorbidities, such as hypertension, atrial fibrillation, previous thromboembolism, neurological disease,and cancer with respect to patients who did not receive thromboprophylaxis. During hospital stay, 1.2% patients had a major bleeding event. All patients were treated with antithrombotic drugs; 5.4%, had venous thromboembolism [30.5% deep vein thrombosis (DVT), 66.1% pulmonary embolism (PE), and 3.4% patients had DVT + PE]. In our cohort the mortality rate was 18.3%. Heparin use was independently associated with survival in patients aged ≄ 59 years at multivariable analysis. We confirmed the high mortality rate of COVID-19 in hospitalized patients in ordinary wards. Treatment with antithrombotic drugs is significantly associated with a reduction of mortality rates especially in patients older than 59 years

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF

    Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici

    Get PDF

    Il Futuro della Cybersecurity in Italia: Ambiti Progettuali Strategici

    Get PDF
    Il presente volume nasce come continuazione del precedente, con l’obiettivo di delineare un insieme di ambiti progettuali e di azioni che la comunità nazionale della ricerca ritiene essenziali a complemento e a supporto di quelli previsti nel DPCM Gentiloni in materia di sicurezza cibernetica, pubblicato nel febbraio del 2017. La lettura non richiede particolari conoscenze tecniche; il testo ù fruibile da chiunque utilizzi strumenti informatici o navighi in rete. Nel volume vengono considerati molteplici aspetti della cybersecurity, che vanno dalla definizione di infrastrutture e centri necessari a organizzare la difesa alle azioni e alle tecnologie da sviluppare per essere protetti al meglio, dall’individuazione delle principali tecnologie da difendere alla proposta di un insieme di azioni orizzontali per la formazione, la sensibilizzazione e la gestione dei rischi. Gli ambiti progettuali e le azioni, che noi speriamo possano svilupparsi nei prossimi anni in Italia, sono poi accompagnate da una serie di raccomandazioni agli organi preposti per affrontare al meglio, e da Paese consapevole, la sfida della trasformazione digitale. Le raccomandazioni non intendono essere esaustive, ma vanno a toccare dei punti che riteniamo essenziali per una corretta implementazione di una politica di sicurezza cibernetica a livello nazionale. Politica che, per sua natura, dovrà necessariamente essere dinamica e in continua evoluzione in base ai cambiamenti tecnologici, normativi, sociali e geopolitici. All’interno del volume, sono riportati dei riquadri con sfondo violetto o grigio; i primi sono usati nel capitolo introduttivo e nelle conclusioni per mettere in evidenza alcuni concetti ritenuti importanti, i secondi sono usati negli altri capitoli per spiegare il significato di alcuni termini tecnici comunemente utilizzati dagli addetti ai lavori. In conclusione, ringraziamo tutti i colleghi che hanno contribuito a questo volume: un gruppo di oltre 120 ricercatori, provenienti da circa 40 tra Enti di Ricerca e Università, unico per numerosità ed eccellenza, che rappresenta il meglio della ricerca in Italia nel settore della cybersecurity. Un grazie speciale va a Gabriella Caramagno e ad Angela Miola che hanno contribuito a tutte le fasi di produzione del libro. Tra i ringraziamenti ci fa piacere aggiungere il supporto ottenuto dai partecipanti al progetto FILIERASICURA

    Sviluppo di tecniche di riconoscimento automatico di algoritmi nel codice per il supporto alla compilazione parallelizzante

    No full text
    Dottorato di ricerca in ingegneria elettronica e informatica. 8. ciclo. Tutore G. Iannello. Coordinatore L. CordellaConsiglio Nazionale delle Ricerche - Biblioteca Centrale - P.le Aldo Moro, 7, Rome; Biblioteca Nazionale Centrale - P.za Cavalleggeri, 1, Florence / CNR - Consiglio Nazionale delle RichercheSIGLEITItal
    • 

    corecore