Search results for "Crypt"

showing 10 items of 1111 documents

M-Centrality: identifying key nodes based on global position and local degree variation

2023

Identifying influential nodes in a network is a major issue due to the great deal of applications concerned, such as disease spreading and rumor dynamics. That is why, a plethora of centrality measures has emerged over the years in order to rank nodes according to their topological importance in the network. Local metrics such as degree centrality make use of a very limited information and are easy to compute. Global metrics such as betweenness centrality exploit the information of the whole network structure at the cost of a very high computational complexity. Recent works have shown that combining multiple metrics is a promising strategy to quantify the node's influential ability. Our wor…

Statistics and ProbabilitySocial and Information Networks (cs.SI)FOS: Computer and information sciencesComputer scienceStatistical and Nonlinear PhysicsComputer Science - Social and Information Networks01 natural sciencesDegree (music)010305 fluids & plasmasVariation (linguistics)Position (vector)0103 physical sciencesStatisticsKey (cryptography)Statistics Probability and Uncertainty010306 general physicsCentrality
researchProduct

New adaptive synchronization algorithm for a general class of complex hyperchaotic systems with unknown parameters and its application to secure comm…

2022

Abstract The aim of this report is to investigate an adaptive synchronization (AS) for the general class of complex hyperchaotic models with unknown parameters and a new algorithm to achieve this type of synchronization is proposed. Owing to the intricacy behavior of hyperchaotic models that could be effective in secure communications, the special control based on adaptive laws of parameters is constructed analytically, and the corresponding simulated results are performed to validate the algorithm’s accuracy. The complex Rabinovich model is utilized as an enticing example to examine the proposed synchronization technique. A strategy for secure communication improving the overall cryptosyst…

Statistics and Probabilitybusiness.industryComputer scienceTransmitterStability (learning theory)Statistical and Nonlinear Physicssymbols.namesakeAdditive white Gaussian noiseSecure communicationRobustness (computer science)Gaussian noiseSynchronization (computer science)symbolsCryptosystembusinessAlgorithmPhysica A: Statistical Mechanics and its Applications
researchProduct

The in, out Asymmetric Pseudo-Triple Helical Form of a D3h Diaza-Macropentacycle

2007

A sterically encumbered [N(2)S(6)] macropentacycle (5) related to diazamacrobicycles and cryptands has been synthesized in 53% yield by the [1+1] condensation reaction between functionalized macrocyclic and macrotricyclic precursors. A macrononacycle (18) resulting from the corresponding [2+2] condensation was isolated in 7% yield from the reaction mixture. Both compounds showed broad features in their room-temperature (1)H NMR spectra, but their maximal average symmetry (D(3h) and D(2h), respectively) was achieved at high temperature (380 K). At low temperature (200 K, CD(2)Cl(2) solution), the macropentacycle is "frozen" to a single asymmetric (C1) conformation on the (1)H NMR time scale,…

Steric effects[CHIM.ORGA]Chemical Sciences/Organic chemistry010405 organic chemistryStereochemistryOrganic ChemistryCryptandEnantioselective synthesisCrystal structure010402 general chemistryCondensation reaction01 natural sciences0104 chemical scienceschemistry.chemical_compoundTosylchemistry[ CHIM.ORGA ] Chemical Sciences/Organic chemistryNitrogen inversionComputingMilieux_MISCELLANEOUSTriple helixThe Journal of Organic Chemistry
researchProduct

THE KEY ROLE OF LIQUIDITY FLUCTUATIONS IN DETERMINING LARGE PRICE CHANGES

2005

Recent empirical analyses have shown that liquidity fluctuations are important for understanding large price changes of financial assets. These liquidity fluctuations are quantified by gaps in the order book, corresponding to blocks of adjacent price levels containing no quotes. Here we study the statistical properties of the state of the limit order book for 16 stocks traded at the London Stock Exchange (LSE). We show that the time series of the first three gaps are characterized by fat tails in the probability distribution and are described by long memory processes.

Stock exchangeGeneral MathematicsFinancial marketEconometricsOrder bookKey (cryptography)EconomicsGeneral Physics and AstronomyProbability distributionLiquidity crisisPrice levelMarket liquidityFluctuation and Noise Letters
researchProduct

Talking Blockchains: The Perspective of a Database Researcher

2021

There are few topics out there, that seem to create as much confusion and discussion as blockchains. This has a multitude of reasons: (1) A large number of drastically different concepts and systems are unified under the very broad term "blockchain". (2) The topic touches a variety of different fields, including databases, distributed processing, networks, cryptography, and even economics. (3) There exists a large number of different applications of the technology.The goal of this paper is to simplify and structure the discussion of blockchain technology. We first introduce a simple formalization of the basic components, that appear again and again in a variety of blockchain systems. Second…

Structure (mathematical logic)BlockchainDatabaseDistributed databaseTransaction processingComputer sciencebusiness.industryExistential quantification010102 general mathematicsCryptography0102 computer and information sciencescomputer.software_genre01 natural sciencesVariety (cybernetics)Workflow010201 computation theory & mathematics0101 mathematicsbusinesscomputer2021 IEEE 37th International Conference on Data Engineering Workshops (ICDEW)
researchProduct

Traceable hierarchical attribute-based authentication for the cloud

2015

When data owners store their data on cloud servers, they may want to define the access requirements themselves, where attribute-based authentication (ABA) can be a good choice for the solution. In this paper, we propose a traceable hierarchical ABA (HABA) solution which fits two situations in the cloud. The first situation is when cloud users are organized in groups of a hierarchical structure and the access allowance can only be granted to users in a specific group. The second situation is that attributes are organized in a hierarchical structure with different priorities, such that only users who own the required attributes of a specific priority can be authenticated and access the data. …

Structure (mathematical logic)HierarchyAuthenticationDatabasebusiness.industryComputer scienceAllowance (money)Cloud computingComputer securitycomputer.software_genreEncryptionbusinessCloud servercomputer2015 IEEE Conference on Communications and Network Security (CNS)
researchProduct

2015

Abstract. The coupling of Earth system model components, which work on different grids, into an Earth System Model (ESM) provokes the necessity to transfer data from one grid to another. Additionally, each of these model components might require data import onto its specific grid. Usually, one of two approaches is used: Either all input data is preprocessed to the employed grid, or the imported data is interpolated on-line, i.e. during model integration to the required grid. For the former, each change in the model resolution requires the re-preprocessing of all data. The latter option implies that in each model integration computing time is required for the grid mapping. If all components …

Structure (mathematical logic)Interface (Java)business.industryComputer scienceDistributed computingModular designcomputer.software_genreGridSoftwareCode (cryptography)Data miningTime seriesbusinesscomputerInterpolationGeoscientific Model Development Discussions
researchProduct

Optimal Adaptive Inspection Planning Process in Service of Fatigued Aircraft Structures

2009

In this paper, a control theory is used for planning inspections in service of fatigue-sensitive aircraft structure components under crack propagation. One of the most important features of control theory is its great generality, enabling one to analyze diverse systems within one unified framework. A key idea, which has emerged from this study, is the necessity of viewing the process of planning in-service inspections as an adaptive control process. Adaptation means the ability of self-modification and self-adjustment in accordance with varying conditions of environment. The adaptive control of inspection planning process in service of fatigued aircraft structures differs from ordinary stoc…

Structure (mathematical logic)Stochastic controlService (systems architecture)Adaptive controlControl theoryComputer scienceProcess (engineering)Key (cryptography)Adaptation (computer science)Industrial engineeringSimulation
researchProduct

Applying Finite State Process Algebra to Formally Specify a Computational Model of Security Requirements in the Key2phone-Mobile Access Solution

2015

Key2phone is a mobile access solution which turns mobile phone into a key for electronic locks, doors and gates. In this paper, we elicit and analyse the essential and necessary safety and security requirements that need to be considered for the Key2phone interaction system. The paper elaborates on suggestions/solutions for the realisation of safety and security concerns considering the Internet of Things (IoT) infrastructure. The authors structure these requirements and illustrate particular computational solutions by deploying the Labelled Transition System Analyser (LTSA), a modelling tool that supports a process algebra notation called Finite State Process (FSP). While determining an in…

Structure (mathematical logic)Theoretical computer scienceFinite-state machineComputer sciencebusiness.industryMobile phoneRealisationProcess calculusTransition systemKey (cryptography)Software engineeringbusinessNotation
researchProduct

ASR in Classroom Today : Automatic Visualization of Conceptual Network in Science Classrooms

2017

Automatic Speech Recognition (ASR) field has improved substantially in the last years. We are in a point never saw before, where we can apply such algorithms in non-ideal conditions such as real classrooms. In these scenarios it is still not possible to reach perfect recognition rates, however we can already take advantage of these improvements. This paper shows preliminary results using ASR in Chilean and Finnish middle and high school to automatically provide teachers a visualization of the structure of concepts present in their discourse in science classrooms. These visualizations are conceptual networks that relate key concepts used by the teacher. This is an interesting tool that gives…

Structure (mathematical logic)puheentunnistusPoint (typography)MultimediaComputer sciencekoulut (oppilaitokset)05 social sciencesautomatic speech recognition050301 education02 engineering and technologyconceptual networkcomputer.software_genreopetusField (computer science)VisualizationConceptual network020204 information systemsSimilarity (psychology)0202 electrical engineering electronic engineering information engineeringKey (cryptography)ComputingMilieux_COMPUTERSANDEDUCATIONteacher discourseclassroom dialogue0503 educationcomputer
researchProduct