Search results for "Computer network"
showing 10 items of 1634 documents
Security framework for dynamic service-oriented IT systems
2018
The paper proposes a framework for dynamic service-oriented IT systems security. We review the context of service-oriented architecture (SOA), which constitutes a paradigm of dynamic system configuration including security constraints at the system module development stage, supporting with the domain-driven resources, carrying out routine SOA maintenance and implementing XML-compatible parsing technologies in order to improve the system performance. Likewise, we discuss the fundamental differences between security management systems with traditional centralized and monolithic architecture and service-oriented IT systems from the perspective of security-related issues. Web services security …
Executives' Commitment to Information Security
2020
Two aspects of decision-making on information security spending, executives' varying preferences for how proposals should be presented and the framing of the proposals, are developed. The proposed model of executives' commitment to information security is an interaction model (in addition to the cost of a security solution, and the risk and the potential loss of a security threat) consisting of the interaction between an executive's preferred subordinate influence approach (PSIA), rational or inspirational, and the framing, positive or negative, of a security proposal. The interaction of these two constructs affects the executive's commitment to an information security proposal. The model i…
Modeling Transit Flow Through Port Gates and Connecting Channel in Baltic Sea—Liepaja Port—Liepaja Lake System
2021
This study investigates a water transport features by extending Copernicus Marine Environment Service (CMEMS) to the Liepaja coast-port-channel-lake system with a two-way nested model. The Liepaja lake and Liepaja port are connected by Trade channel. The Liepaja port has three gates—the openings in wave breakers connecting the port aquatory with the Baltic sea. Each of gates has a corresponding dredged channel for securing the navigation. A hydrodynamic model is set up to study the flow and water level in this system. The area of the port gates, port and Trade channel are resolved by 33 m grid. The model results are verified against currents and sea level observations inside/outside port, T…
A Geographical Self-Organizing Approach for Vehicular Networks
2012
Cooperative vehicular networks have always been considered as the perfect way to bring more comfort to the passengers and more safety to the human life. Thus, research community and governmental organizations are interested to study and deploy these networks. The vehicular networks principle is connecting vehicles to each other and to existing infrastructure. However, their industrialization faces some challenges: (i) high mobility, (ii) frequently partitioned network, (iii) geographically constrained topology, and (iv) scalability. Therefore, in contrast to traditional networks, vehicular network protocols focus on both achieving adequate QoS level and reducing overhead. Achieving these tw…
A Comparison between Habituation and Conscience mechanism in Self–Organizing Maps
2006
In this letter, a preliminary study of habituation in self-organizing networks is reported. The habituation model implemented allows us to obtain a faster learning process and better clustering performances. The liabituable neuron is a generalization of the typical neuron and can be used in many self-organizing network models. The habituation mechanism is implemented in a SOM and the clustering performances of the network are compared to the conscience learning mechanism that follows roughly the same principle but is less sophisticated.
A multiscale approach to automatic and unsupervised retinal vessel segmentation using Self-Organizing Maps
2016
In this paper an automatic unsupervised method for retinal vessel segmentation is described. Self-Organizing Map, modified Fuzzy C-Means, STAPLE algorithms and majority voting strategy were adopted to identify a segmentation of the retinal vessels. The performance of the proposed method was evaluated on the DRIVE database.
PROLISEAN: A New Security Protocol for Programmable Matter
2021
The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…
The Effects of the Use of Serious Game in Eco-Driving Training
2016
International audience; Serious games present a promising approach to training and learning. The player is engaged in a virtual environment for a purpose beyond pure entertainment, all while having fun. In this paper, we investigate the effects of the use of serious game in eco-driving training. An approach has been developed in order to improve players’ practical skills in terms of eco-driving. This approach is based on the development of a driving simulation based on a serious game, integrating a multisensorial guidance system with metaphors including visual messages (information on fuel consumption, ideal speed area, gearbox management, etc.) and sounds (spatialized sounds, voice message…
Multi-Connectivity Management for 5G V2X Communication
2019
With the advent of automated driving functions the need for cooperation among vehicles becomes increasingly necessary. The availability of high quality connectivity is an important factor for successful and uninterrupted cooperative and autonomous services. Flexible selection of available connectivity options, increases the probabilities to achieve and maintain the required Quality of Service (QoS). Future vehicles will support multiple 5G communication interfaces e.g., cellular (Uu), sidelink (PC5). A 5G RAN-based solution is proposed in this paper to dynamically select and change the communication interface that is suitable for a V2X service, considering radio and road conditions. The com…
A privacy enhanced device access protocol for an IoT context
2013
In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.