The insertion of executable programs within QR codes is a new enabling technology for many application contexts in everyday life. Every time Internet access is unavailable, QR code usage is limited to reading the data it contains without any possibility of interaction.
Technologies
In this section it is possible to view, also through targeted research, the technologies inserted in the PROMO-TT Database. For further information on the technologies and to contact the CNR Research Teams who developed them, it is necessary to contact the Project Manager (see the references at the bottom of each record card).
Displaying results 1 - 5 of 5
In the last years, genetics played a strategic role in the identification of therapeutic targets for complex diseases. Genetic studies identified thousands of variants contributing to disease onset and/or to the influence of measurable features (phenotypes) impacting health. The mechanism of action by which they modulate diseases and phenotypes is still unknown for the vast majority.
We offer integrated tools for the acquisition, analysis, modelling and optimization of visitor flows in museums characterized by frequent congestion and/or complex geometries. Our intervention is divided into 4 phases:
1) Data acquisition related to the paths followed by visitors in the museum, number of visitors in the rooms, time of permanence, ... The acquisition is performed via a specific IoT system, smartphone app or manual counting.
An interoperable and modular Digital Geospatial Ecosystem (DGE) is proposed, designed, implemented and tested in order to: collect in real time, manage and share geographic data; make usable tools and functionalities to support actions to prevent, monitor and mitigate impacts from extreme events as well as to prepare for and respond to emergency situations. The DGE is composed of the following modules:
Network structures that require the use of a common database are affected by the risk of processing identification data that are necessary for sharing information and updating and processing data with equal access level between the network nodes. However, this sharing could lead risks of vulnerability when identification data are exchanged between the nodes of the network. The proposed information system involves the exchange of information by encrypting the identification data with an MD5 Hashing procedure (RFC1321).