Search results for "Cryptography"

showing 10 items of 657 documents

On the Optimization of Self-Organizing Maps by Genetic Algorithms

1999

Publisher Summary This chapter reviews the research on the genetic optimization of self-organizing maps (SOMs). The optimization of learning rule parameters and of initial weights is able to improve network performance. The latter, however, requires chromosome sizes proportional to the size of the SOM and becomes unwieldy for large networks. The optimization of learning rule structures leads to self-organization processes of character similar to the standard learning rule. A particularly strong potential lies in the optimization of SOM topologies, which allows the study of global dynamical properties of SOMs and related models, as well as to develop tools for their analysis. Hierarchies of …

Self-organizing mapbusiness.industryComputer scienceProcess (engineering)Machine learningcomputer.software_genreNetwork topologyChromosome (genetic algorithm)Learning ruleCode (cryptography)Network performanceArtificial intelligenceData pre-processingbusinesscomputer
researchProduct

PROLISEAN: A New Security Protocol for Programmable Matter

2021

The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…

Self-reconfiguring modular robot0209 industrial biotechnologySecurity AlgorithmsComputer Networks and CommunicationsComputer scienceDistributed computingHash functionSecurity Protocol02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]EncryptionLightweight Cryptography[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automationComponent (UML)0202 electrical engineering electronic engineering information engineeringModular RobotsProgrammable MatterProtocol (object-oriented programming)IOTbusiness.industry020206 networking & telecommunicationsCryptographic protocolSupercomputer[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationProgrammable matter[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Amoebots[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessDistributed Computing
researchProduct

Vertical integration and exclusivities in maritime freight transport

2011

A key recent theme in maritime freight transport is the involvement of shipping lines in terminal management. Such investments are costly but allow liners to provide better service. Most of these new terminals are dedicated terminals but some are non-exclusive and let rivals access them for a fee. In this paper, we show that a shipping line that builds its own terminal finds it strategically profitable (i) to continue routing part of its cargo through the open port facilities, and (ii) to keep its terminal non-exclusive. In this way, the liner investor pushes part of the rival's freight from the open to the new terminal. Besides, under non-exclusivities, the shipping lines offer a wider var…

Service (business)Engineeringbusiness.industryOpen portjel:L91TransportationShipping lineVertical integrationVariety (cybernetics)Transport engineeringfreight transport shipping lines vertical integrationTerminal (electronics)jel:L13Key (cryptography)jel:R40Profitability indexBusiness and International ManagementbusinessTelecommunicationsCivil and Structural Engineering
researchProduct

A combined fuzzy-SEM evaluation approach to identify the key drivers of the academic library service quality in the digital technology era: An empiri…

2017

A conceptual model of the Academic Library (AL) service quality is hypothesized in the present article, and then validated and analyzed by a novel evaluation approach. Specifically, the conceptual model integrates the fundamental attributes of the canonical AL service together with those more relevant of the new and widely considered AL Electronic Service (e-services). As concerns the evaluation approach, it incorporates the Fuzzy Sets Theory (FST) so as to deal with the students' uncertainty over their own judgments on the AL service quality and a Structural Equation Model (SEM) to validate the conceptual model and to determine the key drivers of the AL service quality. The effectiveness o…

Service (business)Service qualityInformation Systems and ManagementKnowledge managementOperations researchComputer Networks and Communicationsbusiness.industryComputer science05 social sciencesConceptual model (computer science)02 engineering and technologyLibrary and Information SciencesFuzzy logicEmpirical research0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processing0509 other social sciences050904 information & library sciencesbusinessInformation SystemsJournal of the Association for Information Science and Technology
researchProduct

GPCALMA: A Grid-based tool for mammographic screening

2005

The next generation of High Energy Physics (HEP) experiments requires a GRID approach to a distributed computing system and the associated data management: the key concept is the Virtual Organisation (VO), a group of distributed users with a common goal and the will to share their resources. A similar approach is being applied to a group of Hospitals which joined the GPCALMA project (Grid Platform for Computer Assisted Library for MAmmography), which will allow common screening programs for early diagnosis of breast and, in the future, lung cancer. HEP techniques come into play in writing the application code, which makes use of neural networks for the image analysis and proved to be useful…

Service (systems architecture)InternationalityDatabases FactualMedical Records Systems ComputerizedTeleradiologyVirtual organizationComputer scienceGrid; Mammogram; Screening; Virtual organizationFOS: Physical sciencesBreast NeoplasmsHealth InformaticsTeleradiologycomputer.software_genregridSet (abstract data type)User-Computer InterfaceHealth Information ManagementmammogramHumansDiagnosis Computer-AssistedProgram DevelopmentAdvanced and Specialized NursingInternetbusiness.industryscreeningGridPhysics - Medical PhysicsEuropeSystems IntegrationRadiology Information SystemsItalyKey (cryptography)Database Management SystemsSystem integrationFemaleThe InternetMedical Physics (physics.med-ph)Data miningvirtual organizationbusinesscomputerAlgorithmsMammography
researchProduct

Identification of Key miRNAs in Regulation of PPI Networks

2020

In this paper, we explore the interaction between miRNA and deregulated proteins in some pathologies. Assuming that miRNA can influence mRNA and consequently the proteins regulation, we explore this connection by using an interaction matrix derived from miRNA-target data and PPI network interactions. From this interaction matrix and the set of deregulated proteins, we search for the miRNA subset that influences the deregulated proteins with a minimum impact on the not deregulated ones. This regulation problem can be formulated as a complex optimization problem. In this paper, we have tried to solve it by using the Genetic Algorithm Heuristic. As the main result, we have found a set of miRNA…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazioni0301 basic medicineOptimization problemSettore INF/01 - InformaticaHeuristic (computer science)Computer sciencemiRNA expression profiles Protein-protein interaction networks Genetic algorithmsComputational biologyGenetic algorithmsmiRNA expression profilesProtein-protein interaction networks03 medical and health sciencesIdentification (information)030104 developmental biologyPpi networkGenetic algorithmmicroRNAKey (cryptography)Set (psychology)
researchProduct

A Network Tomography Approach for Traffic Monitoring in Smart Cities

2018

Traffic monitoring is a key enabler for several planning and management activities of a Smart City. However, traditional techniques are often not cost efficient, flexible, and scalable. This paper proposes an approach to traffic monitoring that does not rely on probe vehicles, nor requires vehicle localization through GPS. Conversely, it exploits just a limited number of cameras placed at road intersections to measure car end-to-end traveling times. We model the problem within the theoretical framework of network tomography, in order to infer the traveling times of all individual road segments in the road network. We specifically deal with the potential presence of noisy measurements, and t…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazioni050210 logistics & transportationCost efficiencyExploitbusiness.industryComputer scienceMechanical Engineering05 social sciencesReal-time computingNetwork tomography smart cities Traffic monitoring020206 networking & telecommunicationsTopology (electrical circuits)02 engineering and technologyNetwork tomographyComputer Science ApplicationsSmart city0502 economics and businessAutomotive EngineeringScalability0202 electrical engineering electronic engineering information engineeringGlobal Positioning SystemKey (cryptography)businessIEEE Transactions on Intelligent Transportation Systems
researchProduct

Short-Term Sensory Data Prediction in Ambient Intelligence Scenarios

2014

Predicting data is a crucial ability for resource-constrained devices like the nodes of a Wireless Sensor Network. In the context of Ambient Intelligence scenarios, in particular, short-term sensory data prediction becomes a key enabler for more difficult tasks such as prolonging network lifetime, reducing the amount of communication required and improving user-environment interaction. In this chapter we propose a software module designed for clustered wireless sensor networks, able to predict various environmental quantities, namely temperature, humidity and light. The software module is supported by an ontology that describes the topology of the AmI scenario and the effects of the actuato…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAmbient intelligenceAmbient Intelligencebusiness.industryComputer scienceReal-time computingHumidityTopology (electrical circuits)Context (language use)Ontology (information science)Machine learningcomputer.software_genreTerm (time)Sensor nodeKey (cryptography)Artificial intelligencebusinessWireless sensor networkcomputer
researchProduct

SmartBuildings: An AmI system for energy efficiency

2015

Nowadays, the increasing global awareness of the importance of energy saving in everyday life acts as a stimulus to provide innovative ICT solutions for sustainability. In this scenario, the growing interest in smart homes has been driven both by socioeconomic and technological expectations. One of the key aspects of being smart is the efficiency of the urban apparatus, which includes, among others, energy, transportation and buildings. The present work describes SmartBuildings, a novel Ambient Intelligence system, which aims at reducing the energy consumption of "legacy" buildings by means of artificial intelligence techniques applied on heterogeneous sensor networks. A prototype has been …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniArchitectural engineeringEngineeringAmbient intelligenceAmbient Intelligencebusiness.industryEnergy consumptionWork (electrical)Information and Communications TechnologySustainabilityKey (cryptography)businessWireless sensor networkSimulationEfficient energy use
researchProduct

A Reconfigurable Neural Environment on Active Networks

2000

This paper proposes the deployment of a neural network computing environment on Active Networks. Active Networks are packet-switched computer networks in which packets can contain code fragments that are executed on the intermediate nodes. This feature allows the injection of small pieces of codes to deal with computer network problems directly into the network core, and the adoption of new computing techniques to solve networking problems. The goal of our project is the adoption of a distributed neural network for approaching tasks which are specific of the computer network environment. Dynamically reconfigurable neural networks are spread on an experimental wide area backbone of active no…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniArtificial neural networkNetwork packetbusiness.industryComputer scienceTime delay neural networkDistributed computingActive Networks Neural NetworksComputer network programmingIntelligent computer networkCellular neural networkCode (cryptography)businessComputer networkActive networking
researchProduct