Search results for " networking"

showing 10 items of 1264 documents

Health-Promoting Effects of Serial vs. Integrated Combined Strength and Aerobic Training

2016

Combined strength and aerobic training programs are widely used for improving markers of physical fitness and health. We compared the efficiency of a serial and an integrated combined training program on health and overall fitness in middle-aged females. 54 females (46.7±4.5yrs) were assigned to a serial (SCG) or an integrated (ICG) combined training group or to a control group (CG). The SCG and ICG performed a 3-month training combining aerobic dance and calisthenics. The 2 training programs differ in the sequence of aerobic and strength exercises. SCG performed the strength exercises prior to aerobic; in ICG, the aerobic and strength exercises were altered in a predetermined order. Body c…

Adultmedicine.medical_specialtyPhysical fitnessPhysical Therapy Sports Therapy and RehabilitationHealth Promotion02 engineering and technology03 medical and health sciencesOxygen Consumption0302 clinical medicinePhysical medicine and rehabilitationHeart RateHeart rate0202 electrical engineering electronic engineering information engineeringmedicineHumansAerobic exerciseOrthopedics and Sports MedicineRespiratory functionMuscle Strength030212 general & internal medicineDancingAerobic capacityBalance (ability)Exercise Tolerancebusiness.industryResistance Training020206 networking & telecommunicationsCardiorespiratory fitnessMiddle AgedCardiorespiratory FitnessPhysical FitnessBody CompositionPhysical EndurancePhysical therapyFemaleCalisthenicsbusinessInternational Journal of Sports Medicine
researchProduct

A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory

2018

Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…

Advanced persistent threatNoticeComputer science05 social sciences020206 networking & telecommunicationsOODA loop02 engineering and technologyBlack Swan theoryComputer securitycomputer.software_genreFlow networkBlack swan theorynetwork anomaly detectionLong periodAdvanced Persistent Thread (APT)0502 economics and businessOODA loop0202 electrical engineering electronic engineering information engineeringcomputer050203 business & management
researchProduct

State of the Art Literature Review on Network Anomaly Detection with Deep Learning

2018

As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…

Advanced persistent threatbusiness.industryComputer scienceDeep learningdeep learning020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genrenetwork anomaly detectionkoneoppiminen0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAnomaly detectionState (computer science)Artificial intelligencetietoturvabusinessverkkohyökkäyksetcomputer
researchProduct

A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization

2017

Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…

Agent behaviorComputer scienceProcess (engineering)Functional featuresDistributed computingMetabolic network020206 networking & telecommunications02 engineering and technologyvehicular ad hoc networks (VANETs)Urban roadCognitive agentArtificial IntelligenceAutonomous urban vehicles routing optimization0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRouting (electronic design automation)cellular metabolismSoftwareSimulationCell survivalcognitive agentIEEE Transactions on Cognitive and Developmental Systems
researchProduct

Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra

2019

AbstractWe propose three cryptographic key exchange protocols in the octonion algebra. Using the totient function, defined for integral octonions, we generalize the RSA public-key cryptosystem to the octonion arithmetics. The two proposed symmetric cryptographic key exchange protocols are based on the automorphism and the derivation of the octonion algebra.

Algebra and Number TheoryApplied Mathematics020206 networking & telecommunicationsEuler's totient function0102 computer and information sciences02 engineering and technologyAutomorphism01 natural sciencesOctonionOctavian totient functionQuaternion cryptographyAlgebraOctonion cryptographysymbols.namesakeOctonion RSA algorithm010201 computation theory & mathematicsTheory of computation0202 electrical engineering electronic engineering information engineeringsymbolsCryptosystemNon-associative cryptographyOctonion algebraMathematicsApplicable Algebra in Engineering, Communication and Computing
researchProduct

Paths Coloring Algorithms in Mesh Networks

2003

In this paper, we will consider the problem of coloring directed paths on a mesh network. A natural application of this graph problem is WDM-routing in all-optical networks. Our main result is a simple 4-approximation algorithm for coloring line-column paths on a mesh. We also present sharper results when there is a restriction on the path lengths. Moreover, we show that these results can be extended to toroidal meshes and to line-column or column-line paths.

AlgorithmicsMesh networkingPath (graph theory)Approximation algorithmPolygon meshFractional coloringTelecommunications networkAlgorithmTime complexityMathematics
researchProduct

Italian Amateur Pop-Rock Musicians on Facebook: Mixed Methods and New Findings in Music Making Research

2017

This chapter investigates how and why amateur musicians use social networking sites, employing a mixed-methods approach. Attention is focused on four big Italian Facebook communities of pop-rock musicians: drums, bass, guitar, and keyboard players (overall, 2,101 active users), analyzing the relational and textual data extracted from the web. The chapter analyzes the network structures emerging from the interactions among the users. It also identifies and maps the main areas of discussion (sound shaping, studio recording, marketplace, musical references, computer production, and relations) and the latent semantic dimension characterizing Facebook users’ activities, through social network an…

Amateur musicians music-making Italy Facebook social networking sites social network analysis lexical correspondence analysis mixed-methodsSettore SPS/07 - Sociologia Generale
researchProduct

A Hardware and Secure Pseudorandom Generator for Constrained Devices

2018

Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…

Applied cryptography; Chaotic circuits; Constrained devices; Discrete dynamical systems; FPGA; Lightweight Cryptography; Random number generators; Statistical tests; Control and Systems Engineering; Information Systems; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic EngineeringHardware security moduleComputer scienceRandom number generationCryptography[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyPseudorandom generatorConstrained devicesLightweight CryptographyChaotic circuits[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]PermutationRandom number generatorsStatistical tests0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringField-programmable gate arrayThroughput (business)FPGAPseudorandom number generatorGenerator (category theory)business.industry020208 electrical & electronic engineeringComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsDiscrete dynamical systems[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science ApplicationsApplied cryptography[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Control and Systems EngineeringKey (cryptography)[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessComputer hardwareInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

Investigating the Impact of Radiation-Induced Soft Errors on the Reliability of Approximate Computing Systems

2020

International audience; Approximate Computing (AxC) is a well-known paradigm able to reduce the computational and power overheads of a multitude of applications, at the cost of a decreased accuracy. Convolutional Neural Networks (CNNs) have proven to be particularly suited for AxC because of their inherent resilience to errors. However, the implementation of AxC techniques may affect the intrinsic resilience of the application to errors induced by Single Events in a harsh environment. This work introduces an experimental study of the impact of neutron irradiation on approximate computing techniques applied on the data representation of a CNN.

Approximate computingComputer scienceReliability (computer networking)Radiation effectsRadiation induced02 engineering and technologyneuroverkotExternal Data Representation01 natural sciencesConvolutional neural networkSoftwareHardware020204 information systems0103 physical sciences0202 electrical engineering electronic engineering information engineering[SPI.NANO]Engineering Sciences [physics]/Micro and nanotechnologies/MicroelectronicsResilience (network)mikroprosessoritNeutronsResilience010308 nuclear & particles physicsbusiness.industryReliabilityApproximate computingPower (physics)[SPI.TRON]Engineering Sciences [physics]/ElectronicsComputer engineeringsäteilyfysiikka[INFO.INFO-ES]Computer Science [cs]/Embedded SystemsbusinessSoftware
researchProduct

A Late Roman industrial complex with glass furnaces in the northern area of Valencia

2008

Abstract Information from excavations in Conde de Trenor street (1997) and Cisneros square (1986 and 1998) has confirmed that this area situated in the north of Valencia was a river port district dedicated to commercial activities and storing goods during the Roman Imperial period and maybe also in the Republican period. At the end of the third century A.D. the function of these port buildings changed and the evidence suggests that they became industrial workshops. The bases of three circular furnaces were found with fragments of glass containers, bottles, glasses, window panes and some slag. The recent excavation which took place in 2004–2006 in the Palau Cervero , 4 Cisneros square also s…

ArcheologyHistorybiologyMaterials Science (miscellaneous)ExcavationConservationProcesses of changeAncient historybiology.organism_classificationArchaeologyPort (computer networking)Chemistry (miscellaneous)Period (geology)Square (unit)General Economics Econometrics and FinanceShut downValenciaSpectroscopyJournal of Cultural Heritage
researchProduct