High biodiversity arises from the analyses of morphometric, biochemical and genetic data in ancient olive trees of South of Italy

Morphometric, biochemical and genetic analyses were conducted on Olea europaea L. of Campania, an area of Southern Italy highly suited to the cultivation of olive trees and the production of extra virgin olive oil (EVOO). We aimed to characterize the distribution of morphological, biochemical and genetic diversity in this area and to develop a practical tool to aid traceability of oils.

A mathematical, experimental study on iron rings formation in porous stones

In this interdisciplinary paper, we study the formation of iron precipitates - the so-called Liesegang rings - in Lecce stones in contact with iron source. These phenomena are responsible of exterior damages of lapideous artifacts, but also in the weakening of their structure. They originate in presence of water, determining the flow of carbonate compounds mixing with the iron ions and then, after a sequence of reactions and precipitation, leading to the formation of Liesegang rings.

An optimal interpolation scheme for surface and atmospheric parameters: applications to SEVIRI and IASI

In this paper, we present a 2-Dimensional (2D) Optimal Interpolation (OI) technique for spatially scattered infrared satellite observations, from which level 2 products have been obtained, in order to yield level 3, regularly gridded, data. The scheme derives from a Bayesian predictor-corrector scheme used in data assimilation and is based on the Kalman Filter estimation.

Model checking based approach for compliance checking

Process mining is the set of techniques to retrieve a process model starting from available logging data. The discovered process model has to be analyzed to verify whether it respects the defined properties, i.e., the so-called compliance checking. Our aim is to use a model checking based approach to verify compliance. First, we propose an integrated-tool approach using existing tools as ProM (a framework supporting process mining techniques) and CADP (a formal verification environment). More precisely, the execution traces from a software system are extracted.

Who's Driving My Car? A Machine Learning based Approach to Driver Identification

Despite the development of new technologies, in order to prevent the stealing of cars, the number of car thefts is sharply increasing. With the advent of electronics, new ways to steal cars were found. To avoid auto-theft attacks, in this paper we propose a machine leaning based method to silently e continuously profile the driver by analyzing built-in vehicle sensors. We evaluate the efficiency of the proposed method in driver identification using 10 different drivers.

Quantile based risk measures in cyber security

Measures and methods used in financial sector to quantify risk, have been recently applied to cyber world. The aim is to help organizations to improve risk management strategies and to wisely plan investments in cyber security. On the other hand, they are useful instruments for insurance companies in pricing cyber insurance contracts and setting the minimum capital requirements defined by the regulators. In this paper we propose an estimation of Value at Risk (VaR), referred to as Cyber Value at Risk in cyber security domain, and Tail Value at risk (TVaR).

Cyber Risk management: an actuarial point of view

In the last decades companies worldwide are facing a new kind of risk, namely cyber risk, that has emerged as one of the top challenges in risk management. Insurance was only recently applied to cyber world and it is increasingly becoming part of the risk management process, posing many challenges to actuaries. One of the main issues is the lack of data, in particular nancial ones.

Assessment of cumulative discriminant analysis for cloud detection in the ESA PROBA-V Round Robin exercise

Cloud detection is a critical issue for satellite optical remote sensing, since potential errors in cloud masking can be translated directly into significant uncertainty in the retrieved downstream geophysical products. The problem is particularly challenging when only of a limited number of spectral bands is available, and thermal infrared bands are lacking.