800 resultados para BIOMETRIC AUTHENTICATION
Resumo:
Coastal ecosystems represent an inestimable source of biodiversity, being among the most productive areas on the planet. Despite the great ecological and economic value of those environments, many threats endanger the species living in this ecosystem, like the rapid warming and the sea acidification, among many other. Benthic calcifying organisms (e.g. mollusks, corals and echinoderms) in particular, are among the most exposed to those hazards. These organisms use calcium carbonate as a structural and protective material through the biomineralization process, biologically controlled by the organism, but nevertheless, strongly influenced by the environmental surroundings. Evaluating how a changing environment can influence the process of biomineralization is critical to understand how those species of great ecological and economic importance will face the ongoing climate change. This thesis investigates the mechanism of biomineralization in different mollusks’ species of the Adriatic Sea, providing detailed descriptions of shells skeletal, biometric and growth parameters. Applying a multidisciplinary and multi-scale research approach, the influence of external environmental factors on the process of shell formation has been investigated. To achieve this purpose analysis were conducted both on current populations and on fossil remain, which allows to investigate ecological responses to past climate transitions. Mollusks’ shells in fact are one of the best tools to understand climate change in the past, present and future, since they record the environmental conditions prevailed during their life, reflected on the geochemical properties, microstructure and growth of the shell. This approach allowed to overcome the time scale limit imposed by field and laboratory survey, and better understand species long term adaptive response to changing environment, a crucial issue to define proper conservation and management strategies. Furthermore, the investigation of fossil record of mollusks assemblages offered the opportunity to evaluate the long-term biotic response to anthropogenic stressors in the north Adriatic Sea.
Resumo:
Honey bees are considered keystone species in ecosystem, the effect of harmful pesticides for the honey bees, the action of extreme climatic waves and their consequence on honey bees health can cause the loss of many colonies which could contribute to the reduction of the effective population size and incentive the use of non-autochthonous queens to replace dead colonies. Over the last decades, the use of non-ligustica bee subspecies in Italy has increased and together with the mentioned phenomena exposed native honey bees to hybridization, laeding to a dramatic loss of genetic erosion and admixture. Healthy genetic diversity within honey bee populations is critical to provide tolerance and resistance to current and future threatening. Nowadays it is urgent to design strategies for the conservation of local subspecies and their valorisation on a productive scale. In this Thesis we applied genomics tool for the analysis of the genetic diversity and the genomic integrity of honey bee populations in Italy are described. In this work mtDNA based methods are presented using honey bee DNA or honey eDNA as source of information of the genetic diversity of A. mellifera at different level. Taken together, the results derived from these studies should enlarge the knowledge of the genetic diversity and integrity of the honey bee populations in Italy, filling the gap of information necessary to design efficient conservation programmes. Furthermore, the methods presented in these works will provide a tool for the honey authentication to sustain and valorise beekeeping products and sector against frauds.
Resumo:
LHC experiments produce an enormous amount of data, estimated of the order of a few PetaBytes per year. Data management takes place using the Worldwide LHC Computing Grid (WLCG) grid infrastructure, both for storage and processing operations. However, in recent years, many more resources are available on High Performance Computing (HPC) farms, which generally have many computing nodes with a high number of processors. Large collaborations are working to use these resources in the most efficient way, compatibly with the constraints imposed by computing models (data distributed on the Grid, authentication, software dependencies, etc.). The aim of this thesis project is to develop a software framework that allows users to process a typical data analysis workflow of the ATLAS experiment on HPC systems. The developed analysis framework shall be deployed on the computing resources of the Open Physics Hub project and on the CINECA Marconi100 cluster, in view of the switch-on of the Leonardo supercomputer, foreseen in 2023.
Resumo:
Today more than ever, with the recent war in Ukraine and the increasing number of attacks that affect systems of nations and companies every day, the world realizes that cybersecurity can no longer be considered just as a “cost”. It must become a pillar for our infrastructures that involve the security of our nations and the safety of people. Critical infrastructure, like energy, financial services, and healthcare, have become targets of many cyberattacks from several criminal groups, with an increasing number of resources and competencies, putting at risk the security and safety of companies and entire nations. This thesis aims to investigate the state-of-the-art regarding the best practice for securing Industrial control systems. We study the differences between two security frameworks. The first is Industrial Demilitarized Zone (I-DMZ), a perimeter-based security solution. The second one is the Zero Trust Architecture (ZTA) which removes the concept of perimeter to offer an entirely new approach to cybersecurity based on the slogan ‘Never Trust, always verify’. Starting from this premise, the Zero Trust model embeds strict Authentication, Authorization, and monitoring controls for any access to any resource. We have defined two architectures according to the State-of-the-art and the cybersecurity experts’ guidelines to compare I-DMZ, and Zero Trust approaches to ICS security. The goal is to demonstrate how a Zero Trust approach dramatically reduces the possibility of an attacker penetrating the network or moving laterally to compromise the entire infrastructure. A third architecture has been defined based on Cloud and fog/edge computing technology. It shows how Cloud solutions can improve the security and reliability of infrastructure and production processes that can benefit from a range of new functionalities, that the Cloud could offer as-a-Service.We have implemented and tested our Zero Trust solution and its ability to block intrusion or attempted attacks.
Resumo:
Nel mondo odierno la crescente richiesta di sicurezza ha evidenziato la necessità di sviluppare tecniche di identificazione degli individui che superino le problematiche delle metodologie tradizionali. Da qui nasce il concetto di identificazione basato sulla biometria. Spostando l’attenzione su ciò che un individuo è, cioè i suoi tratti biometrici, è possibile aumentare notevolmente la sicurezza. Le tecniche biometriche sono studiate per verificare l’identità di una persona, ossia comprovare che è chi dichiara di essere, o per identificare una persona, ossia scoprire la sua identità. Le caratteristiche fisiologiche o comportamentali di una persona che permettono di fare ciò sono dette dati biometrici. Tra questi si collocano la geometria del volto, le impronte digitali, la geometria della mano, la retina, l’iride, la voce, la firma, il DNA. I più recenti sviluppi in materia hanno permesso l’introduzione di tecniche chiamate Biometric Template Protection Schemes. Questi schemi sono nati proprio allo scopo di fornire un ulteriore strato di sicurezza per proteggere i dati biometrici degli individui. Questi schemi di protezione sono altamente innovativi e aprono la strada a numerose nuove implementazioni ancora in fase di sviluppo.