Search results for " networking"
showing 10 items of 1264 documents
Health-Promoting Effects of Serial vs. Integrated Combined Strength and Aerobic Training
2016
Combined strength and aerobic training programs are widely used for improving markers of physical fitness and health. We compared the efficiency of a serial and an integrated combined training program on health and overall fitness in middle-aged females. 54 females (46.7±4.5yrs) were assigned to a serial (SCG) or an integrated (ICG) combined training group or to a control group (CG). The SCG and ICG performed a 3-month training combining aerobic dance and calisthenics. The 2 training programs differ in the sequence of aerobic and strength exercises. SCG performed the strength exercises prior to aerobic; in ICG, the aerobic and strength exercises were altered in a predetermined order. Body c…
A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory
2018
Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…
State of the Art Literature Review on Network Anomaly Detection with Deep Learning
2018
As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…
A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization
2017
Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…
Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra
2019
AbstractWe propose three cryptographic key exchange protocols in the octonion algebra. Using the totient function, defined for integral octonions, we generalize the RSA public-key cryptosystem to the octonion arithmetics. The two proposed symmetric cryptographic key exchange protocols are based on the automorphism and the derivation of the octonion algebra.
Paths Coloring Algorithms in Mesh Networks
2003
In this paper, we will consider the problem of coloring directed paths on a mesh network. A natural application of this graph problem is WDM-routing in all-optical networks. Our main result is a simple 4-approximation algorithm for coloring line-column paths on a mesh. We also present sharper results when there is a restriction on the path lengths. Moreover, we show that these results can be extended to toroidal meshes and to line-column or column-line paths.
Italian Amateur Pop-Rock Musicians on Facebook: Mixed Methods and New Findings in Music Making Research
2017
This chapter investigates how and why amateur musicians use social networking sites, employing a mixed-methods approach. Attention is focused on four big Italian Facebook communities of pop-rock musicians: drums, bass, guitar, and keyboard players (overall, 2,101 active users), analyzing the relational and textual data extracted from the web. The chapter analyzes the network structures emerging from the interactions among the users. It also identifies and maps the main areas of discussion (sound shaping, studio recording, marketplace, musical references, computer production, and relations) and the latent semantic dimension characterizing Facebook users’ activities, through social network an…
A Hardware and Secure Pseudorandom Generator for Constrained Devices
2018
Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…
Investigating the Impact of Radiation-Induced Soft Errors on the Reliability of Approximate Computing Systems
2020
International audience; Approximate Computing (AxC) is a well-known paradigm able to reduce the computational and power overheads of a multitude of applications, at the cost of a decreased accuracy. Convolutional Neural Networks (CNNs) have proven to be particularly suited for AxC because of their inherent resilience to errors. However, the implementation of AxC techniques may affect the intrinsic resilience of the application to errors induced by Single Events in a harsh environment. This work introduces an experimental study of the impact of neutron irradiation on approximate computing techniques applied on the data representation of a CNN.
A Late Roman industrial complex with glass furnaces in the northern area of Valencia
2008
Abstract Information from excavations in Conde de Trenor street (1997) and Cisneros square (1986 and 1998) has confirmed that this area situated in the north of Valencia was a river port district dedicated to commercial activities and storing goods during the Roman Imperial period and maybe also in the Republican period. At the end of the third century A.D. the function of these port buildings changed and the evidence suggests that they became industrial workshops. The bases of three circular furnaces were found with fragments of glass containers, bottles, glasses, window panes and some slag. The recent excavation which took place in 2004–2006 in the Palau Cervero , 4 Cisneros square also s…