A standards-compliant, terminal-based solution to relay attacks on NFC. Prevent contactless card fraud from the growing threat of this attack vector.
Near Field Communication (NFC), the technology behind contactless debit/credit cards and some access control card systems, has long been known to be vulnerable to relay attacks. Until recently, this attack vector posed minimal threat as only a handful of experts in the field had the necessary resources and knowledge to undertake this attack. Now, anyone with an NFC-enabled Android smartphone can download an app that enables them to carry out a relay attack – with limited-to-no expert knowledge required by the attacker. Combined with the rapid roll-out of contactless cards by financial institutions, the risk this attack presents is substantial and can no longer be ignored. Indeed, news reports of this vulnerability being exploited have started to become more frequent. It is imperative that this security flaw is patched to protect cardholders, retailers, and financial institutions from becoming victims of contactless payment fraud.
Simultaneous Clustering Technology
Time Series Clustering (TSC) from CeADAR provides a general time series data clustering system that allows the user to explore different approaches for clustering single variable time series data. This software system assists the user in determining which clustering approach (algorithm and data representation) is most useful for their objectives by allowing them to browse and inspect the different clustering output of various clustering approaches simultaneously. Moreover, this system defines a general approach applicable on real world data across different industries.
Ease of Interaction
Many businesses store pools of information-rich text in their systems - such as reports, customer reviews, user comments and general word processing documents. Insights can be uncovered by analysing these text sources to discover underlying hidden topics or trends, such as unexpected clusters of words across documents. In reality, however, it can be difficult to manually examine all this of information to discover such hidden trends or topics.
A comparative evaluation of Tendermint, IBM’s Hyperledger/Fabric, and Ethereum
This 35 page report provides an in-depth review of blockchain technology: its origins, technical operation, attributes, current state and areas of application. It also presents the results of a comparative empirical evaluation of three popular blockchains; Tendermint, IBM’s Hyperledger/Fabric, and Ethereum. This report provides an Introduction chapter that outlines Bitcoin, its legacy, opportunities beyond Cryptocurrencies, and many of the characteristics of blockchain technology. In chapter two, a range of applications for blockchain are presented including; Smart Contracts, Record Management, Identity Management, Internet of Things, and Analytics. Chapter three details various aspects of blockchain technology such as consensus models, as well as a reviewing a number of public and private blockchain platforms. Chapter four provides a comparative evaluation of blockchain implementations including the experimental process, parameter, results, and a discussion. Finally, the report provides Conclusions and is prefaced with an Executive Summary.
Holistic Evaluation Framework Digital and Connected Health Technologies
This framework provides a flexible tool to help academic and/or industry personnel to evaluate if a device is fit-for-purpose based on their particular application requirements including but not limited to, clinical trials, provider services, and pilot studies proposing to use connected health, home-monitoring or wearable technology.
Avoid Malfunctions & Reduced Reliability. Increase Accuracy & Resolution.
The accumulation of charge in the dielectric of a MEMS (Micro Electro Mechanical Systems) device results in a parasitic source of electrostatic force which, if uncontrolled, can lead to device malfunction and permanent stiction that negatively impacts on reliability. This dielectric charge accounts for a number of reliability issues in electrostatically actuated MEMS and hence is a major barrier to the commercialisation of many such devices; as in the case of RF switches. Researchers from UCD and UPC have developed this novel control method that improves the accuracy and resolution of all devices that use electrostatic actuation.
Analysis of the Connected Health market in the UK
This ARCH report provides an overview of the Connected Health market in the UK – with a particular focus on England as the largest market within the UK region. The report gives an overview of the healthcare financing and payment structures; the potential sales channels and routes to market for Connected Health providers. The report provides information and suggested strategies for selling into statutory commissioners such as NHS England and Clinical Commissioning Groups (CCGs). It gives an overview of the Connected Health market landscape – including competition, size and value, reimbursement landscape and overall SWOT analysis. This report also looks at one condition, Dementia, in more detail. This provides an exemplar of how Connected Health technologies are being used in the care pathway of one of the most costly conditions for the UK healthcare system.
Similarity with Diversity for Better Recommendations
Searching online holidays websites can return hotels or villas that are very similar in location, function, and quality. Similarity is important but introducing diversity in information retrieval can significantly improve the accuracy, relevance, efficiency and effectiveness of these searches, particularly when queries are vague. Search result diversity is important as well as query similarity. When queries are vague, results should be similar to the query while at the same time being different from one another. Result diversity can provide the user with a representative sample of relevant items, rather than an incorrectly biased set of mutually similar results.
Query with Confidence
Verify and optimised business processes
Business process modelling is a technique for representing existing or future processes within an organisation, particularly with a view to documenting and improving them. Many business processes manipulate sophisticated data sources to generate a data set that will be subject to subsequent data analytics tasks, and their study falls within the general field of data management. User-friendly editors are available which allow business users to define business processes as a structured collection of tasks towards a specific goal. What they do not provide, however, is the ability to verify and optimise those processes or the data that they produce.
Use these powerful search and filter tools to discover the licensing opportunities you are looking for.
Keep an eye here for the number of returned opportunities
The best matching results of your search and filters are displayed here. For further details on opportunity, click on the opportunity name!
Click here to view a summary of this opportunity.View Topics Back To Start