33 Hits in 7.4 sec

Industry Trends to 2040

Claudia Eckert, Ola Isaksson, Sophie Hallstedt, Johan Malmqvist, Anna Öhrwall Rönnbäck, Massimo Panarotto
2019 Proceedings of the International Conference on Engineering Design  
While many forecasts exist for technological and societal changes, this paper reports on the findings of a workshop, which addressed trends in engineering design to 2040.  ...  AbstractThe engineering design community needs to development tools and methods now to support emerging technological and societal trends.  ...  ACKNOWLEDGMENTS GoCo and Chalmers for hosting the workshop, Open University ESTEEM for funding the interviews.  ... 
doi:10.1017/dsi.2019.218 fatcat:oz7gfz7wfzf2nbvin6d5nmnqpm

Safe-by-Design in Engineering: An Overview and Comparative Analysis of Engineering Disciplines

Pieter van Gelder, Pim Klaassen, Behnam Taebi, Bart Walhout, Ruud van Ommen, Ibo van de Poel, Zoe Robaey, Lotte Asveld, Ruud Balkenende, Frank Hollmann, Erik Jan van Kampen, Nima Khakzad (+7 others)
2021 International Journal of Environmental Research and Public Health  
, bio-engineering, nano-engineering, and finally cyber space engineering.  ...  Within each discipline the risk management strategies, the design principles promoting safety or safety awareness, and associated methods or tools are discussed.  ...  "; • "Cyber space" OR cyber-physical.  ... 
doi:10.3390/ijerph18126329 pmid:34208018 fatcat:tdhni2tkhfdjzevyhfnkczzvhm

Challenges to the deployment of autonomous weapons

Paddy Walker, Lloyd Clark
2019 Zenodo  
This requires material step-change in both hardware and software and, once deployed, posits a significant change in how humans wage war.  ...  There are several drivers to a move from merely automatic weapons to fully autonomous weapons which are able to engage a target based solely upon algorithm-based decision-making.  ...  [21] [22] [23] [24] [25] [26] [27] [28] [29] . 147 See again: Chapters 6 (Wetware), 7 (Firmware) and 8 (Software). 148 For a broad discussion on current global autonomous developments (Antarctica  ... 
doi:10.5281/zenodo.3689445 fatcat:suxmfofsozfeheeyjm4bo237j4

Processpatching, Defining New Methods in aRtD

Anne Nigten
2009 Leonardo: Journal of the International Society for the Arts, Sciences and Technology  
In the second phase, a project manager with a physics background brought in the research component, and in the last phase, the technical reporting was 175 done in close collaboration with a project manager  ...  The aRt&D Matrix below shows the difficulties experienced when the software, hardware and the physical vocabularies were developed in parallel.  ...  It examines what emotions are being experienced when people are emotionally close while physically distant. This implies that the project seeks to gain access to subjective and private experiences.  ... 
doi:10.1162/leon.2009.42.5.478 fatcat:kjfy6uktcfaabamfkrovvyczbe

Quantification of environmental and economic impacts for main categories of building labeling schemes

Erkki Seinre, Jarek Kurnitski, Hendrik Voll
2014 Energy and Buildings  
FaculTy oF civil enGineerinG chair oF heaTinG and venTilaTion chair of heating and ventilation mainly focuses on the research in hvac systems, indoor climate of the buildings, energy efficient and sustainable  ...  buildings, passive cooling systems and heat supply systems (heat pumps).  ...  disorders and the effect of external physical stressor.  ... 
doi:10.1016/j.enbuild.2013.11.048 fatcat:ckgxbn7mtrh47gf4xsdaaio5jm

Social Implications of Technology: The Past, the Present, and the Future

K. D. Stephan, K. Michael, M. G. Michael, L. Jacob, E. P. Anesta
2012 Proceedings of the IEEE  
Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences.  ...  The possibility that the human mind may be simulated in and transferred to hardware may lead to a transhumanist future in which humanity redesigns itself: technology would become society.  ...  Retina implants have brought together medical researchers, electronic specialists and software designers to develop a system that can be implanted inside the eye [90] .  ... 
doi:10.1109/jproc.2012.2189919 fatcat:ipnfoyj4dnddvmfvgjuoymoiai

From Research to Innovation: Exploring the Translation Journey with OpenInnoTrain [article]

Anne-Laure Mention, Massimo Menichinelli
2021 Zenodo  
Identifying, developing and scaling-up breakthrough technologies, and converting them into incremental, radical or disruptive innovations that are widely accepted by, and available to beneficiaries, users  ...  Numerous mechanisms – such as stakeholder engagement and co-creation processes – can assist in creating framework conditions to foster the development and adoption of novelties that address current and  ...  That software allowed the researchers to conduct a quantitative analysis of a large volume of literature for mapping knowledge, new research areas and hotspots, future trends and emerging research paths  ... 
doi:10.5281/zenodo.5536932 fatcat:7pfwvjaznfagjgcapb2bm2zkuu

Anais do XIV Workshop-Escola de SistemasAgentes, seus Ambientes e apliCações de Agentes, seus Ambientes e apliCações [article]

Several Authors
2020 Zenodo  
Proceedings of the 14th Workshop-School on Agents, Environments, and Applications (WESAAC 2020) website  ...  Acknowledgments This study was financed in part by the Coordenação de Aperfeiçoameto de Pessoal de Nível Superior (CAPES/Brasil) and Agência Nacional deÁguas (ANA/Brasil) -Edital N • 16/2017.  ...  ) autonomous management of software artefacts is a key concern.  ... 
doi:10.5281/zenodo.4037412 fatcat:mc3eafwnhbd5ppxoh4bn54zs3e

A Scientific or Regimental Staff: The Reform of Staff College Selection in the British Army, 1927-31

Iain Farquharson
2018 MCU Journal  
ARTICLE SUBMISSIONS The editors are looking for academic articles in the areas of international relations, geopolitical issues, national security and policy, and cyber security.  ...  To that end, MCUP launched the Marine Corps University Journal (MCU Journal) in 2010 to provide a forum for interdisciplinary discussion of national security and international relations issues and how  ...  There are other physical, mental, and training standards that are necessary for a traditional kinetic force that may be counterproductive to developing and maintaining a cyber-specific force.  ... 
doi:10.21140/mcuj.2018090101 fatcat:brgsh5ihczdahkitqqyg6alvze

Machine Learning-Based Routing and Wavelength Assignment in Software-Defined Optical Networks

Ignacio Martin, Sebastian Troia, Jose Alberto Hernandez, Alberto Rodriguez, Francesco Musumeci, Guido Maier, Rodolfo Alvizu, Oscar Gonzalez de Dios
2019 IEEE Transactions on Network and Service Management  
Together with the development of much more efficient software and distributed computation models, DL can bring several breakthroughs and advancements in many fields, like autonomous vehicles or realtime  ...  Autonomous Networking Lately, research has aimed at the development of the autonomous network paradigm, where networks are composed by intelligent components prepared for self-adaptive and self-managed  ... 
doi:10.1109/tnsm.2019.2927867 fatcat:or3lhqdqbnas3cztwkqr5ykhhq

Vol. 2 n. 1 | 2017 | FULL ISSUE

Luisa Bravo
2017 The Journal of Public Space  
Acknowledgements The authors gratefully acknowledge the support of Fundação para a Ciência e a Tecnologia (FCT) under the PhD grant SFRH/BD/69911/2010 and the research project PTDC/ECM-URB/2162/2014.  ...  Acknowledgments The authors would like to thank the School of Architecture at Politecnico di Milano, the Municipality of Mantova, the UNESCO Mantova and Sabbioneta Office, the University Foundation of  ...  While I wanted an insider's perspective my experiences as a traceur are not the only source of report or analysis.  ... 
doi:10.5204/jps.v2i1.63 fatcat:26usfb2zbfdptdjhccmvoorxvq

Navigating Jus Ad Bellum in the Age of Cyber Warfare

Reese Nguyen
This Comment departs from the traditional and accepted models of inquiry, drawing on cyber security research to propose a framework centered on cyber-physical systems that addresses cyber attacks under  ...  It then discusses the governing jus ad bellum standards and critiques the leading approaches to assessing cyber attacks under these standards.  ...  and change its behavior autonomously.  ... 
doi:10.15779/z38qz4j fatcat:zfz2yimwxvhh5jj6tlauawzdym

Cascading Network Failure in Power Grid Blackouts [chapter]

Dr.Ian Dobson
2014 Encyclopedia of Systems and Control  
The emerging risk analysis, simulation, and modeling of cascading blackouts are briefly surveyed, and key references are suggested.  ...  Cascading failure consists of complicated sequences of dependent failures and can cause large blackouts.  ...  The events and their dependencies are very varied and include outages or failures of many different parts of the power system and a whole range of possible physical, cyber, and human interactions.  ... 
doi:10.1007/978-1-4471-5102-9_264-1 fatcat:slhzrvsilfephprfzlkkccbyma

Cooperative Manipulators [chapter]

Fabrizio Caccavale
2015 Encyclopedia of Systems and Control  
The emerging risk analysis, simulation, and modeling of cascading blackouts are briefly surveyed, and key references are suggested.  ...  Cascading failure consists of complicated sequences of dependent failures and can cause large blackouts.  ...  The events and their dependencies are very varied and include outages or failures of many different parts of the power system and a whole range of possible physical, cyber, and human interactions.  ... 
doi:10.1007/978-1-4471-5058-9_175 fatcat:gzo7xen4ynezhesyrpsldzj5bi

The role of Social Engineering in evolution of attacks

E Frumento, R Puricelli, F Freschi, D Ariu, N Weiss, C Dambra, I Cotoi, P Roccetti, M Rodriguez, L Adrei, G Marinelli, G Kandela (+1 others)
The social engineers of the future will have to cope with the consequences of this new legislation and adapt their techniques to this new reality. 8.  ...  The description of the metric reports: "A software feature is a functional capability provided by software.  ...  Reports to security team or by physical asset audits. Monthly Security team or asset management Employees should be trained in maintaining physical security of their devices.  ... 
« Previous Showing results 1 — 15 out of 33 results