The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The European Test Symposium 2017 (ETS’17) was held at Amathus Beach Hotel, Limassol, Cyprus, 22–26 May 2017. ETS has been established as one of the main international forums and the larger forum in Europe that brings together the academic and industrial test community to discuss emerging ideas, views, and trends in the area of electronic-based circuits and system testing. ETS’17 was organized by the...
Biometric R&D has to deal with personal data. From the Universal Declaration of Human Rights, privacy of a human being shall be protected, and this is addressed in different forms in each region of the world. In the case of the European Union, Data Protection Directives, Laws and Regulation have been established, and interpreted in different ways by each European Member State. Such a diversity...
Nowadays, based on international relations and cooperation we do not discuss about a national energetic market, without connections with the rest of Europe. The economic, energetic cross-border exchanges, specialists educated in different universities from the entire world, represent a reality for the international scientific world. Only intense and permanent international exchanges can ensure development...
This paper deals with the “Clean Energy for All Europeans” proposals presented by the European Commission on Wednesday, 30th November 2016 in its constant endeavor to mobilize efforts of the innovation community and lead the transition toward a more decentralized, decarbonized, democratized, diversified, digitalized and disruptive model.
A telecommunication equipment and information technical equipment usually produce unintentional electromagnetic fields. Information from a video display unit could be reconstructed by intercepting such emissions at a distance. The testing methods and countermeasure methods have been discussed and those standardizations have been published at ITU-T SG5 WP2, and ITU-T K.115: Mitigation methods against...
Millennials, Digital Natives, the ‘we want it now’ Generation-Y. Many names have been used to describe the new generation of college students referring to their technological abilities, teamwork skills, speed and openness. Everyday technology and the students of this generations change brought new standards to the world of education. They move global education ‘marketplace’ and its competition to...
In this talk, I'll argue that we need to change our way of thinking drastically and Europe needs to catch up urgently those in the world who have already started to do their homework outside Europe in order to preserve employment and the standard of living in Europe. We have already missed the absolute leadership in the nano-electronics world. It is in the hands of US and Far East owned/based companies...
This extended abstract discusses the application of ICT and data-management for dependability of electricity distribution grids. Focus of the contribution are the opportunities and barriers for small and medium-sized Distribution System Operators serving up to few hundred thousand customers.
We present vepRisk (Vulnerabilities, Exploits and Patches Risk analysis tool): a web-based tool for analyzing publically available security data. The tool has a backend modules that mine, extract, parse and store data from public repositories of vulnerabilities, exploits and patches; and a frontend web-based application that provides functionality for analyzing the data. The frontend uses shinyR,...
In recent years, there has been a growing interest in the modelling of crime commission processes, in particular crime scripting, in physical and cyber spaces. This article aims to demonstrate the limits of unstructured scripting approaches, and advocates the development of more systematic techniques. For this, we examined he differences and similarities between various scripts. Twenty-one participants...
The increasing share of renewable fleet is creating havoc in wholesale electricity markets, putting generation adequacy1 at a stress level likely to jeopardize the security of supply over a wide — even pan-EU — area. And this will only get worse as, in line with the Paris agreement's decarbonisation path until 2030, 2040 or 2050, we want to move away from the traditional centralized fossil fuel system...
Terrorists communicate and disseminate their activitiesusing social media, such as Twitter, where complex networksof user accounts are formed and need to be effectively analysedby Law Enforcement Agencies (LEAs). To this end, we proposea novel visualisation tool that assists intelligence analysts andinvestigators through the presentation of the network formation,components, key-players, key-communities...
Freedom of movement in the European Union (EU) requires the possibility to exchange healthcare - related information across borders. Such an interchange must face legal, technical and security issues. In this work, we provide a technical analysis of the state - of - the - art software for cross - border eHealth data exchange in the EU, namely OpenNCP, from the security point of view. Moreover, we...
Monitoring food security requires near real time information on crop growing conditions for early detection of possible production deficits. Anomaly maps and time profiles of remote sensing derived indicators related to crop and vegetation conditions can be accessed online thanks to a rapidly growing number of web based portals. However, timely and systematic global analysis and coherent interpretation...
One of the main priorities for an effective and sustainable Security Union refers to the improvement of information exchange, strengthening information systems and enhancing security at the external borders of the European Union (EU). Recent research projects financed at EU level under Security theme calls are approaching the development of modern technologies and concepts, either for border surveillance...
In the past twenty years the energy consumption of the world has grown significantly. There are many countries for which it is a huge challenge to ensure energy reliability and security. This situation is even getting more intense with the upcoming spread of renewable energy sources and the continuous need of lowering CO2 emission. Nuclear energy which is a possible solution for both difficulties...
The main goal of electricity markets has always been to create perfect competition markets. To facilitate this competition, the European target model of electricity markets is the energy-only market. The main target of the three Energy Packages is to reap the benefits of free markets with competitive prices and energy efficiency, and to ensure increased transparency in retail markets to benefit consumers...
In the paper the system concept of critical infrastructure protection is presented. The described system is developed within the framework of FP7 European Union project on Multitech SeCurity system for intercOnnected space control groUnd staTions (SCOUT). The goal of the SCOUT project is to study, design and analyze a risk-based approach of a security system relying on multiple technologies. The noise...
The Transmission System Operators (TSOs) in Europe are facing increasing challenges in both planning and operating their transmission systems. More integration of renewables increased the need for congestion management frequently. The highly variable energy output of renewables demands the expansion of existing network to accommodate them and managing power flows that are no longer centrally dispatchable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.