Center for Technology Transfer and Commercialization of Novosibirsk State University posted this:Post-quantum cryptosystem with public keyA post-quantum public-key cryptographic system has been developed in the cryptography laboratory of the university (Novosibirsk). It is used in the Internet of things, blockchain technology, cryptocurrency, key exchange, for example, in instant messengers, or as an independent mean of protection. The cryptosystem is resistant to hacking, including a quantum computer through the use of NP-hard in a quantum sense problem. The university is looking for partners for furtherance on the Russian and international markets.
Center for Technology Transfer and Commercialization of Novosibirsk State University posted this:Resistant to hacking by a quantum computer electronic digital signatureResearchers of Novosibirsk State University have developed a revolutionary algorithm for quantum-stable digital signature based on results of fundamental research in mathematics. Moreover, they implemented the algorithm as a software prototype. The cryptographic stability of the digital signature guarantees information security when using it in e-economics, the Internet of things and other areas in the post-quantum era. The stability of the algorithm is ensured by solving the problem that is an NP-hard (non-polinomial intractable) in the quantum sense. The university is looking for partners to commercialize the technology in international markets.
Gunter Fischer posted this:
CEO at Brainalyzed Finance GmbH
IVAN RODRIGUEZ ROSELLO posted this:
Licensing Manager at UNIVERSIDAD DE ALICANTE
Small and Medium Enterprise
Benemérita Universidad Autónoma de Puebla posted this:PROCESS FOR DETECTING NUDITY IN DIGITAL IMAGES.The present invention provides a process for detecting nudity in digital images, applied to the filtration of digital images with pornographic content in the Internet and digital images with pornographic content in standard computer equipments. This process applies techniques of the digital image processing such as pixel segmentation, recognition and selection of regions, as well as operations in the regions found within digital images with the purpose of detecting nudity. The segmentation under the colour HSV model is used for locating and separating the pixels corresponding to human skin, as well as the algorithm RSOR for recognising and separating the region with the highest number of skin pixels within the segmented image (highest region) and evaluating the digital images.
Ranganath Kulkarni posted this:
Universidad de Alcalá-OTRI posted this:CATCHAPs/HIPS to test and improve the securityA research group from the Computer Engineering Department of the University of Alcalá proposes a security analysis expertise to those individuals and companies that are developing their own CAPTCHA/HIP proposals or want to test the security of their current proposals. The group can also work towards the improvement of the security of current CAPTCHA/HIP proposals whenever that target is attainable. Moreover, the group has a few CAPTCHA proposals that could be implemented at a grand scale level. These proposals though, need to undergo a security analysis previous to being put into production. It could be possible to share part of the IP with the companies wanting to implement these proposals if they assist the group economically in their initial implementation and security analysis. The group is seeking for individual clients and companies to achieve collaboration and commercial agreements with technical assistance.
Fundació URV posted this:Team Analytics (TA): a web application that can predict potential future conflict within a teamTA is an innovative and user friendly tool that provide clients three main combined characteristics for the first time: 1) Predicting conflict 2) A very fast diagnosis of teams 3) Accurate results with non-invasive tests
Research & Technology Organization
UNIVERSIDAD DE ALICANTE posted this:Machine-to-Cloud Management System of Distributed Heterogeneous DevicesThe Specialized Processors Architecture Laboratory (SPA-Lab group) research group from University of Alicante has developed a system which improves remote control systems processes of different kind of devices geographically spread, through the Cloud. This suggested system provides independence between application layer and remote-controlled devices. Its main advantage is the homogeneity of mechanisms and functions for their interaction with the devices no matter their nature and the scope of the application. The supplied technology may be used in sectors needing monitoring and controlling a wide range of devices. The research team supplies the companies both the “know-how” for the necessary adaptation and implementation of the system and the possibility of licensing this technology.
DIT Hothouse posted this:SmartSeg: A Smart Customer Segmentation ToolWith the rise of service customisation, data analytics is becoming increasingly important so as to understand the needs of a company's customers. In order for the potential of data analytics to be fully realised, analytics tools must be developed for use by the widest user-base possible. Under the CeADAR Intelligent Analytic Interfaces: Ease of Interaction theme, smart analytics tools are being developed to aid non-analytics specialist users in exploring datasets and performing analytics tasks. The first task selected for focus under this theme is customer segmentation, an especially common data analytics task and one that organisations tend to perform when they first start to use data analytics. Presenting segmentation results to the user in a way that is interpretable is the key to the success of SmartSeg. To understand customer segmentations analytics practitioners compare the distributions of features within a segment to the distributions of the same features in the underlying full population. While major existing analytics tools have enabled widespread adoption of data analytics, they remain mostly targeted at expert analytics users. At CeADAR we are developing smart analytics tools for non-analytics experts - the so called next billion users.
Fundació URV posted this:Integral management of all kinds of user information using a single computer application and a single object-oriented databaseThe innovative aspect of the proposed technology is to allow the users to focus on their data objects, not on the specific workflows of the applications: this is known as the document-centered approach, in contrast with the application-centered approach. Other technologies addressed the document-centered approach in the past, such as the Carnegie Mellon University's Andrew toolkit (1985), the Dr. Ken Sakamura's BTRON system (1985), the Hewlett-Packard's NewWave framework (1987), the Microsoft's OLE and ActiveX technologies (1992) and the Apple and IBM's OpenDoc architecture (1994). However, all of them are based on file systems to store the information, and some of them still use classical computer applications as the native user interface for its document-oriented workflow (i.e. OLE/ActiveX). The main new aspects of the proposed technology are the integration of all information into a single object-oriented database, the object hierarchy management to build more complex objects, the zoomable user interface to edit/view each object in a hierarchical fashion, and the organization of the information objects into projects, sets and subsets (see the specifications for more details).
Universidad de Alcalá-OTRI posted this:Assessment model for the portfolio of clients and loyalty methodology (CUSTOMERING)New forms of segmentation of clients data bases that allow to optimize the commercial activities, equipping them with a balance between the short term (profitability) and the long term (value) We can highlight as advantages all those derived from:- Quantitative and qualitative identification of the value inducers of the clients’ portfolio.- Establishment of benchmarking possibilities among companies of a same sector- Improving of the results of the company, increasing sales and profits.
Universidad de Alcalá-OTRI posted this:Analysis and heuristic optimization software system for wind farm design.The utilization of technologies of soft computing has been vaguely applied to the optimization of the design of wind farms, and only with a limited set of parameters. Gheode group has developed a series of algorithms that consider in a much more realistic way the designing of parks, having in addition a great versatility to incorporate improvements or made-to-measure expansions for every client in particular.
Technology Transfer Office
RAMOT at Tel Aviv University Ltd. posted this:Delayed Dictionary CompressionData compression is a preferred solution, since there is no need to dig in the ground for many kilometers in order to build new high bandwidth links. The Delayed Dictionary Compression (DDC) family of algorithms was invented by Prof. Yossi Matias and Mr. Raanan Refua. The motivation was to release the bottleneck of low level infrastructures - data transfer links. Current data compression techniques for packet networks allow a good compression and a poor latency, or poor compression ratio and a good latency. Project ID : 4-2012-319