Search results for "Computer network"

showing 10 items of 1634 documents

Security framework for dynamic service-oriented IT systems

2018

The paper proposes a framework for dynamic service-oriented IT systems security. We review the context of service-oriented architecture (SOA), which constitutes a paradigm of dynamic system configuration including security constraints at the system module development stage, supporting with the domain-driven resources, carrying out routine SOA maintenance and implementing XML-compatible parsing technologies in order to improve the system performance. Likewise, we discuss the fundamental differences between security management systems with traditional centralized and monolithic architecture and service-oriented IT systems from the perspective of security-related issues. Web services security …

Security frameworkProcess managementService oriented systemsComputer Networks and CommunicationsComputer science0211 other engineering and technologiesContext (language use)02 engineering and technologylcsh:Telecommunicationlcsh:TK5101-6720security level0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)Electrical and Electronic EngineeringArchitectureService orientedSecurity levelService-oriented systems021110 strategic defence & security studieslcsh:T58.5-58.64lcsh:Information technologybusiness.industryInformation technologyComputer Science Applicationssecurity incidents020201 artificial intelligence & image processingbusinessJournal of Information and Telecommunication
researchProduct

Executives' Commitment to Information Security

2020

Two aspects of decision-making on information security spending, executives' varying preferences for how proposals should be presented and the framing of the proposals, are developed. The proposed model of executives' commitment to information security is an interaction model (in addition to the cost of a security solution, and the risk and the potential loss of a security threat) consisting of the interaction between an executive's preferred subordinate influence approach (PSIA), rational or inspirational, and the framing, positive or negative, of a security proposal. The interaction of these two constructs affects the executive's commitment to an information security proposal. The model i…

Security solutionComputer Networks and Communications05 social sciencesInformation securityCognitive biasManagement Information SystemsProspect theoryFraming (construction)0502 economics and businessResource allocationNormative050211 marketingBusinessMarketing050203 business & managementACM SIGMIS Database: the DATABASE for Advances in Information Systems
researchProduct

Modeling Transit Flow Through Port Gates and Connecting Channel in Baltic Sea—Liepaja Port—Liepaja Lake System

2021

This study investigates a water transport features by extending Copernicus Marine Environment Service (CMEMS) to the Liepaja coast-port-channel-lake system with a two-way nested model. The Liepaja lake and Liepaja port are connected by Trade channel. The Liepaja port has three gates—the openings in wave breakers connecting the port aquatory with the Baltic sea. Each of gates has a corresponding dredged channel for securing the navigation. A hydrodynamic model is set up to study the flow and water level in this system. The area of the port gates, port and Trade channel are resolved by 33 m grid. The model results are verified against currents and sea level observations inside/outside port, T…

Seiche010504 meteorology & atmospheric sciencesScienceOcean EngineeringQH1-199.5Aquatic ScienceOceanography01 natural sciencestransit currents in portsport hydrodynamicsport seichesUnderwatertwo-way nesting0105 earth and related environmental sciencesWater Science and TechnologygeographyGlobal and Planetary ChangeWater transportgeography.geographical_feature_category010505 oceanographyQFetchOcean currentGeneral. Including nature conservation geographical distributionPort (computer networking)Water levelOceanographycoastal modelingGeologyChannel (geography)Frontiers in Marine Science
researchProduct

A Geographical Self-Organizing Approach for Vehicular Networks

2012

Cooperative vehicular networks have always been considered as the perfect way to bring more comfort to the passengers and more safety to the human life. Thus, research community and governmental organizations are interested to study and deploy these networks. The vehicular networks principle is connecting vehicles to each other and to existing infrastructure. However, their industrialization faces some challenges: (i) high mobility, (ii) frequently partitioned network, (iii) geographically constrained topology, and (iv) scalability. Therefore, in contrast to traditional networks, vehicular network protocols focus on both achieving adequate QoS level and reducing overhead. Achieving these tw…

Self-organizationVehicular ad hoc network[SPI] Engineering Sciences [physics]Computer sciencebusiness.industryQuality of serviceself-organizationvirtual backboneperformance evaluationScalabilityKey (cryptography)Overhead (computing)vehicular networksElectrical and Electronic EngineeringCommunications protocolbusinessProtocol (object-oriented programming)analytical study.clusteringComputer networkJournal of Communications
researchProduct

A Comparison between Habituation and Conscience mechanism in Self–Organizing Maps

2006

In this letter, a preliminary study of habituation in self-organizing networks is reported. The habituation model implemented allows us to obtain a faster learning process and better clustering performances. The liabituable neuron is a generalization of the typical neuron and can be used in many self-organizing network models. The habituation mechanism is implemented in a SOM and the clustering performances of the network are compared to the conscience learning mechanism that follows roughly the same principle but is less sophisticated.

Self-organizing mapComputer Networks and CommunicationsGeneralizationComputer scienceconscienceunsupervised learningMachine learningcomputer.software_genreself-organizing mapself-organizing featureArtificial IntelligencemedicineHabituationCluster analysisArtificial neural networkbusiness.industrymapsGeneral MedicinehabituationComputer Science ApplicationsConscience learningmedicine.anatomical_structureUnsupervised learningNeuronArtificial intelligencebusinesscomputerSoftware
researchProduct

A multiscale approach to automatic and unsupervised retinal vessel segmentation using Self-Organizing Maps

2016

In this paper an automatic unsupervised method for retinal vessel segmentation is described. Self-Organizing Map, modified Fuzzy C-Means, STAPLE algorithms and majority voting strategy were adopted to identify a segmentation of the retinal vessels. The performance of the proposed method was evaluated on the DRIVE database.

Self-organizing mapMajority ruleComputer science0206 medical engineeringComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technologySelf-organizing mapFuzzy logicCLAHE030218 nuclear medicine & medical imagingRetinal vessel03 medical and health scienceschemistry.chemical_compound0302 clinical medicineMajority votingSegmentationComputer visionComputingMethodologies_COMPUTERGRAPHICSFuzzy C-Mean1707Settore INF/01 - Informaticabusiness.industrySTAPLERetinal020601 biomedical engineeringRetinal vesselHuman-Computer InteractionComputer Networks and CommunicationchemistryAdaptive histogram equalizationArtificial intelligencebusinessSoftware
researchProduct

PROLISEAN: A New Security Protocol for Programmable Matter

2021

The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…

Self-reconfiguring modular robot0209 industrial biotechnologySecurity AlgorithmsComputer Networks and CommunicationsComputer scienceDistributed computingHash functionSecurity Protocol02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]EncryptionLightweight Cryptography[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automationComponent (UML)0202 electrical engineering electronic engineering information engineeringModular RobotsProgrammable MatterProtocol (object-oriented programming)IOTbusiness.industry020206 networking & telecommunicationsCryptographic protocolSupercomputer[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationProgrammable matter[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Amoebots[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessDistributed Computing
researchProduct

The Effects of the Use of Serious Game in Eco-Driving Training

2016

International audience; Serious games present a promising approach to training and learning. The player is engaged in a virtual environment for a purpose beyond pure entertainment, all while having fun. In this paper, we investigate the effects of the use of serious game in eco-driving training. An approach has been developed in order to improve players’ practical skills in terms of eco-driving. This approach is based on the development of a driving simulation based on a serious game, integrating a multisensorial guidance system with metaphors including visual messages (information on fuel consumption, ideal speed area, gearbox management, etc.) and sounds (spatialized sounds, voice message…

Serious gamesSynthèse d'image et réalité virtuelle [Informatique]Computer Networks and CommunicationsComputer scienceDriving simulation020209 energy02 engineering and technologycomputer.software_genre7. Clean energylcsh:QA75.5-76.95eco drivingEntertainment[ INFO.INFO-HC ] Computer Science [cs]/Human-Computer Interaction [cs.HC]Artificial IntelligenceHuman–computer interactionOrder (exchange)0202 electrical engineering electronic engineering information engineering[INFO.INFO-HC]Computer Science [cs]/Human-Computer Interaction [cs.HC]MultimediaComputingMilieux_PERSONALCOMPUTING[ INFO.INFO-GR ] Computer Science [cs]/Graphics [cs.GR][INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR]Term (time)Interface homme-machine [Informatique]Work (electrical)Hardware and ArchitectureVirtual machineICTinteractive guidance metaphors.Fuel efficiencylcsh:Electronic computers. Computer scienceEco-drivingvirtual environmentGuidance systemEngineering design processcomputerInteractive guidance metaphorsSoftwareInformation SystemsFrontiers in ICT
researchProduct

Multi-Connectivity Management for 5G V2X Communication

2019

With the advent of automated driving functions the need for cooperation among vehicles becomes increasingly necessary. The availability of high quality connectivity is an important factor for successful and uninterrupted cooperative and autonomous services. Flexible selection of available connectivity options, increases the probabilities to achieve and maintain the required Quality of Service (QoS). Future vehicles will support multiple 5G communication interfaces e.g., cellular (Uu), sidelink (PC5). A 5G RAN-based solution is proposed in this paper to dynamically select and change the communication interface that is suitable for a V2X service, considering radio and road conditions. The com…

Service (business)050210 logistics & transportationbusiness.industryNetwork packetComputer scienceQuality of servicemedia_common.quotation_subject05 social sciences020206 networking & telecommunications02 engineering and technologyFactor (programming language)0502 economics and business0202 electrical engineering electronic engineering information engineeringQuality (business)businesscomputer5GComputer networkmedia_commoncomputer.programming_language2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
researchProduct

A privacy enhanced device access protocol for an IoT context

2013

In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.

Service (business)Challenge-Handshake Authentication ProtocolAuthenticationComputer Networks and CommunicationsComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer securitycomputer.software_genreAuthentication protocol0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)020201 artificial intelligence & image processingKey derivation functionProtocol (object-oriented programming)computerInformation SystemsSecurity and Communication Networks
researchProduct