scholarly journals 3D Surveying of Underground Built Heritage: Opportunities and Challenges of Mobile Technologies

2021 ◽  
Vol 13 (23) ◽  
pp. 13289
Author(s):  
Francesco Di Stefano ◽  
Alessandro Torresani ◽  
Elisa M. Farella ◽  
Roberto Pierdicca ◽  
Fabio Menna ◽  
...  

Among the existing Cultural Heritage settings, Underground Built Heritage (UBH) represents a peculiar case. The scarce or lack of knowledge and documentation of these spaces frequently limits their proper management, exploitation, and valorization. When mapping these environments for documentation purposes, the primary need is to achieve a complete, reliable, and adequate representation of the built spaces and their geometry. Terrestrial laser scanners were widely employed for this task, although the procedure is generally time-consuming and often lacks color information. Mobile Mapping Systems (MMSs) are nowadays fascinating and promising technologies for mapping underground structures, speeding up acquisition times. In this paper, mapping experiences (with two commercial tools and an in-house prototype) in UBH settings are presented, testing the different handheld mobile solutions to guarantee an accurate and reliable 3D digitization. Tests were performed in the selected case study of Camerano Caves (Italy), characterized by volumetric complexity, poor lighting conditions, and difficult accessibility. The aim of this research activity is not only to show the differences in the technological instruments used for 3D surveying, but rather to argue over the pros and cons of the systems, providing the community with best practices and rules for 3D data collection with handheld mobile systems. The experiments deliver promising results when compared with TLS data.

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ramaraj Palanisamy ◽  
Yang Wu

Purpose This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility? Design/methodology/approach These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables. Findings The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues. Research limitations/implications The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems. Practical implications The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES. Social implications Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES. Originality/value This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.


2013 ◽  
pp. 201-206
Author(s):  
Claudio Puoti ◽  
Lia Bellis

Portal hypertension is a progressive complication of cirrhosis. Therefore, the management of a patient with cirrhosis and gastrointestinal bleeding depends largely on the stage of the portal hypertension. The patient may be in the pre-variceal stage or present with acute variceal bleeding, in which case the objectives are to control the current hemorrhage and prevent recurrence. In clinical practice, the severity of portal hypertension can be estimated, reliably and safely, by transjugular measurement of the hepatic venous pressure gradient (HVPG). After a brief review of the pathophysiology of portal hypertension in cirrhosis, the authors describe the technique used to measure transjugular HVPG, its prognostic value in patients with cirrhosis, the pros and cons of including this procedure in routine work-ups of these patients, and its potential roles in monitoring responses to treatment and in the preoperative assessment of cirrhotic patients undergoing hepatic resection.


2020 ◽  
Vol 9 (10) ◽  
pp. 604
Author(s):  
Lukáš Brůha ◽  
Josef Laštovička ◽  
Tomáš Palatý ◽  
Eva Štefanová ◽  
Přemysl Štych

Diachronic studies play a key role in the research and documentation of cultural heritage and its changes, ranging from architectural fragments to landscape. Regarding the reconstructions of lost cultural heritage sites, the determination of landscape conditions in the reconstructed era goes frequently unheeded. Often, only ruins and detached archeological artefacts remain of the built heritage. Placing them correctly within the reconstructed building complex is of similar importance as placing the lost monument in the context of the landscape at that time. The proposed method harmonizes highly heterogeneous sources to provide such a context. The solution includes the fusion of referential terrain models of different levels of detail (LODs) as well as the fusion of diverse 3D data sources for the reconstruction of the built heritage. Although the combined modeling of large landscapes and small 3D objects of a high detail results in very large datasets, we present a feasible solution, whose data structure is suitable for Geographic Information Systems (GIS) analyses of landscapes and also provides a smooth and clear 3D visualization and inspection of detailed features. The results are demonstrated in the case study of the island monastery, the vanished medieval town of Sekanka, and the surrounding landscape, which is located in Czechia and was the subject of intensive changes over time.


2021 ◽  
Vol 5 (1) ◽  
pp. 62-74
Author(s):  
Martina Attenni ◽  
Marika Griffo ◽  
Carlo Inglese ◽  
Alfonso Ippolito ◽  
Eric Lo ◽  
...  

The knowledge and study of built heritage is now deeply connected to methodologies associated with the capture of surface details via the production of point-data. These methodologies enable researchers to gather a wider range of information, which is increasingly more connected to technological advances. Such approaches influence the management of data, and these data are often redundant due to the ways in which they are captured. Massive data capture does not include preliminary selection based on metric, geometric, and material features of the object. A multi-scalar approach, in which the criteria for data capture depends on the goals of the survey, is needed to optimize the relationship between information and the scale of the models to be built. This case study involving a selection of fountains in Rome aims to apply these principles to urban contexts defined by a strong spatial connection between architectural and sculptural elements. Survey can express this distinctiveness through complex, dynamic, and effective digital models.


Author(s):  
Владимир Павлович Гулов ◽  
Виктор Анатольевич Хвостов ◽  
Владимир Петрович Косолапов ◽  
Галина Владимировна Сыч

Проведен анализ особенностей применения медицинских технологий, использующих мобильные приложения для повышения эффективности оказания медицинских услуг пациентам (мобильная медицина). На основе анализа уязвимостей характерных для мобильных систем и уязвимости медицинских информационных систем с мобильным доступом пациентов и сотрудников медицинской организации, новых атак, направленных на уязвимости мобильных технологий и протоколов сотовой связи и беспроводного доступа скорректированы цели безопасности и контекст безопасности организации. Для решения задач безопасности, возникающих при использовании технологий мобильной медицины, предложены типовая архитектура безопасности, способы защиты информации и проведен анализ возможных технических средств защиты. Целью архитектуры безопасности мобильной медицины является обеспечение конфиденциальности, целостности и доступности информационных ресурсов медицинской организации при доступе к ней с мобильных станций (смартфонов, планшетов, смарт устройств и т.п.). Основой архитектуры безопасности мобильной медицины могут являться средства обеспечения безопасности, такие как виртуальные частные сети, системы обнаружения вторжений, системы слежения за действиями пользователя, а также такие средства защиты информации как менеджер мобильных устройств и менеджер мобильных приложений The analysis of the features of the application of medical technologies using mobile applications to improve the efficiency of the provision of medical services to patients (mobile medicine) is carried out. Based on the analysis of vulnerabilities characteristic of mobile systems and the vulnerability of medical information systems with mobile access for patients and employees of a medical organization, new attacks aimed at vulnerabilities of mobile technologies and protocols of mobile communications and wireless access, the security objectives and the security context of the organization are adjusted. To solve the security problems arising from the use of mobile medicine technologies, a typical security architecture, methods for protecting information, and an analysis of possible technical means of protection are proposed. The purpose of the security architecture of mobile medicine is to ensure the confidentiality, integrity and accessibility of information resources of a medical organization when accessing it from mobile stations (Smartphone's, tablets, smart devices, etc.). The basis of the mobile medicine security architecture can be security tools such as virtual private networks, intrusion detection systems, user activity tracking systems, and information security tools such as a mobile device manager and mobile application manager


Author(s):  
Владимир Павлович Гулов ◽  
Виктор Анатольевич Хвостов ◽  
Алексей Васильевич Скрыпников ◽  
Владимир Петрович Косолапов ◽  
Галина Владимировна Сыч

Проведен анализ технологий мобильной медицины, используемых для повышения качества оказания медицинской помощи. На основе анализа уязвимостей мобильных станций (смартфонов, планшетов, смарт устройств, различных периферийных устройств смартфонов и т.п.), технологий предоставления доступа к интернет для мобильных систем (используемые в сетях сотовой связи, беспроводного доступа), а также мобильных сервисов медицинских информационных систем предложена классификация угроз мобильной медицины и проведен анализ возможностей по реализации этих угроз. Целью работы является разработка актуальной модели угроз безопасности мобильной медицины, проведение исследований по оценке полноты и непротиворечивости применяемых в настоящее время средств защиты мобильных систем, таких как менеджер мобильных устройств, менеджер мобильных приложений, магазин доверенных мобильных приложений, шлюз безопасности мобильных приложений и др. В статье рассматриваются источники угроз, уязвимости технологий мобильной медицины, каналы воздействия угроз, объекты воздействия и возникающие ущербы от реализации угроз, характерные для мобильных технологий и имеющие отличные от традиционных точки приложения реализаций угроз и векторы. Проведен анализ контекста применения мобильной медицины и влияния на процессы предоставления медицинских услуг The analysis of mobile medicine technologies used to improve the quality of medical care. Based on the analysis of vulnerabilities of mobile stations (Smartphone's, tablets, smart devices, various peripheral devices of Smartphone's, etc.), technologies for providing Internet access for mobile systems (used in cellular networks, wireless access), as well as mobile medical information services systems, the classification of threats to mobile medicine is proposed, and an analysis of the possibilities for implementing these threats is carried out. The aim of the work is to develop an up-to-date model of threats to the security of mobile medicine, to conduct studies to assess the completeness and consistency of currently used protection systems for mobile systems, such as a mobile device manager, mobile application manager, trusted mobile application store, mobile application security gateway, etc. The article discusses the sources of threats, vulnerabilities of technologies of mobile medicine, the channels of exposure to threats, the objects of exposure and the resulting damage from the implementation of threats that are characteristic of mobile technologies and have different applications of threat implementations and vectors. The analysis of the context of the use of mobile medicine and the impact on the processes of providing medical services is carried out


2021 ◽  
Vol 14 (1) ◽  
pp. 73-79
Author(s):  
E. Rogozin ◽  
Viktor Khvostov ◽  
Valeriy Suhanov ◽  
D. Korobkin ◽  
D. Mochalov

The analysis of access control models currently used in information security systems (SPI) is carried out. Based on the analysis of the advantages and disadvantages of discretionary, authoritative and role models in the implementation of access of mobile systems of subjects with different needs and roles to hierarchically organized information objects of medical information systems (MIS), it is proposed to use access control based on a thematic - hierarchical policy. The methods of forming thematic grids that provide security control of information flows are proposed. The article offers methods for setting the reachability matrix for reading, writing, and executing different access subjects to access objects with monorubricated and multi-rubricated hierarchical thematic classification.


1986 ◽  
Vol 30 (3) ◽  
pp. 205-205 ◽  
Author(s):  
Kathleen M. Robinette ◽  
Harry G. Armstrong

New hardware technological developments have broadened the scope of anthropometric research by allowing easier, more precise and more comprehensive collection of quantitative information in three–dimensional (3D) form. This information will provide better design and evaluation information for protective equipment and clothing, better modelling information for workspace design, and more accurate information for the biomechanical evaluation of designs. In addition, the ability to identify the surface more precisely allows for the investigation of relationships, in numerical form, between surface and subsurface anatomy on living people. This could have clinical as well as research application. The goal of this session is to provide a forum for exchange of information on the new developments, research and application in the area of 3D anthropometry. One paper presented here discusses devices available for 3D data collection, and their pros and cons for various applications. Also discussed is the new statistical and graphical technology needed for understanding and use of the huge collections of information which result with 3D data collection, as well as methods used in 3D modelling and examples of current 3D research efforts.


2017 ◽  
Vol 51 (1) ◽  
pp. 39-51
Author(s):  
Kamil Żyła

Abstract Reporting systems based on mobile technologies and feedback from regular citizens are becoming increasingly popular, especially as far as protection of environmental and cultural heritage is concerned. Reporting life-threatening situations, such as sudden natural disasters or traffic accidents, belongs to the same class of problems and could be aided by IT systems of a similar architecture. Designing and developing systems for reporting life-threatening situations is not a trivial task, requiring close cooperation between software developers and experts in different domains, who could possibly find industrially recognized languages and notations difficult. Thus, the question is whether using simplified graphical domain-specific languages (SGDSLs) could help in creating a common communication platform. It has been revealed that domain experts have a preference for such languages as they offer good learnability, readability and ability to focus on the idea of application. The perspective of developers (technical persons) is introduced on the basis of feedback obtained from 84 students of Computer Science at the Lublin University of Technology, who attended comprehensive workshops followed by an anonymous survey. All participants received theoretical and practical training in modeling mobile software using the same set of languages as domain experts. An analysis of the results revealed that opinions expressed by technical and nontechnical persons concerning SGDSLs oriented on defining a flow of actions is consistent. Most respondents claimed that such languages might be valuable as tools for creating a common communication platform.


Author(s):  
P. Jouan ◽  
P. Sadzot ◽  
D. Laboury ◽  
P. Hallot

Abstract. The digital documentation of heritage places produces accurate 3D restitution of their geometry in a virtual environment and can be related to multiple semantic layers to archive, represent, preserve and transmit the knowledge gathered along their lifecycle. The combination of high-density point clouds with other sources of information advises virtual reconstitutions of historical states of a place’s physical realm. The cultural significance of the built heritage lies in the values associated with its tangible and intangible dimensions. Apart from aspects of values related to historical sites’ physical attributes, 3D models can support the representation of intangible elements influencing visitors’ perception of their Genius Loci and supporting new interpretations about their cultural significance. In this framework, 3D animation, rendering, and simulation technologies allow recreating aspects of a place’s atmosphere, like the simulation of lighting conditions and the user’s immersive experience of a heritage site into a virtual environment. This paper focuses on the light perception recreated in a funeral chapel of the Theban Tomb environment by considering the strong spiritual dimension in the conception of funeral sites in ancient Egypt during the New Kingdom period (1550–1069 BC). We investigate the potential of 3D simulation and animation technologies to represent hypotheses about original lighting conditions in such sites. The proposed research is based on the case study of Sennefer’s tomb chapel, also referred to as TT96A, located on the western bank of the Nile, opposite modern Luxor.


Sign in / Sign up

Export Citation Format

Share Document