Search results for "Protocol"
showing 10 items of 1808 documents
Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature
2020
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…
An ontology for cognitive mimetics
2018
AI and autonomous systems are intended to replace people in several jobs. People have worked in these jobs being able to execute the required information processing. This implies that new technical artefacts must be able to perform equitably effective information processing. Thus, it makes sense to develop the analysis of human information processing in designing intelligent systems. This approach has been termed cognitive mimetics. This paper studies how it would be practical to gain knowledge about human information processing and organize this knowledge using ontologies.
Distributed Consensus in Networks of Dynamic Agents
2006
Stationary and distributed consensus protocols for a network of n dynamic agents under local information is considered. Consensus must be reached on a group decision value returned by a function of the agents' initial state values. As a main contribution we show that the agents can reach consensus if the value of such a function computed over the agents' state trajectories is time invariant. We use this basic result to introduce a protocol design rule allowing consensus on a quite general set of values. Such a set includes, e.g., any generalized mean of order p of the agents' initial states. We demonstrate that the asymptotical consensus is reached via a Lyapunov approach. Finally we perfor…
Potential feasibility of atezolizumab-bevacizumab therapy in patients with hepatocellular carcinoma treated with tyrosine-kinase inhibitors
2022
Background: The combination of atezolizumab-bevacizumab has been proven to be superior to sorafenib for the treatment of unresectable hepatocellular carcinoma not amenable to locoregional treatments, be-coming the standard of care of systemic therapy.Aim: This study aimed at assessing real-world feasibility of atezolizumab-bevacizumab in patients treated with tyrosine-kinase inhibitors.Methods: Among 1447 patients treated with tyrosine-kinase inhibitors from January 2010 to December 2020, we assessed the percentage of those potentially eligible to atezolizumab-bevacizumab (according to IMbrave-150 trial criteria), and the overall survival of eligible and non-eligible patients.Results: 422 (…
Analysis and Optimization Technique of Secure Smart Grid Communication Network for Sustainable Development
2019
The smart network includes many sub-frameworks, for example, the Home Area Network (HAN), which are at risk and prone to be attacked remotely. A smart grid communication is meant to design a mutual authentication scheme and a key management protocol. This study is aimed with an efficient arrangement for HAN that analyzes a framework set-up for HAN. In this paper, we have analyzed three cases: First, we show the normal execution then execution along with attackers. Using mutual authentication, we overcome attacks. It has introduced a number of routing schemes for grid networks in recent years, and they provide different level of privacy protection at different cost. First, an unspecified key…
Attacks Against the WAP WTLS Protocol
1999
The WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. The protocol is currently being fielded, and it is expected that the protocol will be contained in millions of devices in a few years.
An improvement of the batch-authentication and key agreement framework for P2P-based online social networks
2014
Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.
Automatic cell nuclei counting: a protocol to acquire images and to compare results between color and multispectral images
2013
International audience; High-throughput screening in histology and analysis need a necessary automatic cell or nucleus counting. Current methods and systems based on grayscale or color images give results with counting errors. We suggest to use multispectral imaging (with more than three bands) rather than color one for nucleus counting. A traditional acquisition chains uses a source of white light and a CCD camera in addition to the optical microscope. To pass to a multispectral acquisition, we use a Programmable Light Source (PLS) in the place of the white light source. This PLS is capable of generating different wavelengths in the visible spectrum. So, one color image and four multispect…
Protocol for developing a mental imagery intervention: a randomised controlled trial testing a novel implementation imagery e-health intervention to …
2019
IntroductionDrowning due to driving into floodwater accounts for a significant proportion of all deaths by drowning. Despite awareness campaigns such as ‘If it’s flooded, forget it’, people continue to drive into floodwater. This causes loss of life, risk to rescuers and damage to vehicles. The aim of this study was to develop and evaluate an online e-health intervention to promote safe driving behaviour during flood events.Methods and analysisThe study will use a 2×3 randomised controlled trial in which participants are randomised into one of two conditions: (1) education about the risks of driving into floodwater or (2) education about the risks of driving into floodwater plus a theory-ba…
Cold recycling of reclaimed asphalt pavements
2018
Pavement engineers have in front of them multiple challenges linked to addressing issues related to social development and society’s expanding needs. One of the most substantial of these issues is perhaps how to effectively rehabilitate and/ or maintain the existing road network while preserving and sustaining limited natural resources. The re-usage of existing pavement materials to reconstruct/ rehabilitate our future pavements is the solution that is now more and more selected by the different road administrations around the world. However, upon closer inspection, one can find many areas and details, not negligible issues, that are simply extensions of HMA technology (i.e. mix design proc…