Search results for "Protocol"

showing 10 items of 1808 documents

Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature

2020

Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…

Artificial intelligence and cybersecuritycybersecurityGeneral Computer ScienceComputer scienceinformation securitysystematic reviewsprotocols02 engineering and technologyIntrusion detection systemtekoälyComputer securitycomputer.software_genre01 natural sciencesDomain (software engineering)systematic reviewGeneral Materials Sciencekirjallisuuskatsauksettietoturvakyberturvallisuussystemaattiset kirjallisuuskatsauksettietoverkkorikoksetkyberrikollisuusbusiness.industry010401 analytical chemistryGeneral Engineeringartificial intelligence021001 nanoscience & nanotechnology0104 chemical sciencesSupport vector machinekoneoppiminenmachine learningcomputer crimeArtificial intelligencelcsh:Electrical engineering. Electronics. Nuclear engineeringSystematic mappingIntrusion prevention system0210 nano-technologybusinesscomputerlcsh:TK1-9971Qualitative researchIEEE Access
researchProduct

An ontology for cognitive mimetics

2018

AI and autonomous systems are intended to replace people in several jobs. People have worked in these jobs being able to execute the required information processing. This implies that new technical artefacts must be able to perform equitably effective information processing. Thus, it makes sense to develop the analysis of human information processing in designing intelligent systems. This approach has been termed cognitive mimetics. This paper studies how it would be practical to gain knowledge about human information processing and organize this knowledge using ontologies.

Artificial intelligenceComputer science05 social sciencesIntelligent decision support systemInformation processingExpert studiesCognitionCognitive mimetics02 engineering and technologyOntology (information science)Design methodsHuman–computer interactionAI0202 electrical engineering electronic engineering information engineeringOntology020201 artificial intelligence & image processing0501 psychology and cognitive sciencesProtocol analysis050107 human factors
researchProduct

Distributed Consensus in Networks of Dynamic Agents

2006

Stationary and distributed consensus protocols for a network of n dynamic agents under local information is considered. Consensus must be reached on a group decision value returned by a function of the agents' initial state values. As a main contribution we show that the agents can reach consensus if the value of such a function computed over the agents' state trajectories is time invariant. We use this basic result to introduce a protocol design rule allowing consensus on a quite general set of values. Such a set includes, e.g., any generalized mean of order p of the agents' initial states. We demonstrate that the asymptotical consensus is reached via a Lyapunov approach. Finally we perfor…

Asymptotic stability; Distributed consensus protocolsEngineeringMathematical optimizationAsymptotic stabilitybusiness.industryFunction (mathematics)Network topologyUniform consensusComputer Science::Multiagent SystemsLTI system theorySet (abstract data type)Distributed consensus protocolsConsensusExponential stabilityComputer Science::Systems and ControlControl theoryexperimental mechanics Fourier transform load stepping photoelasticityGeneralized meanbusinessProceedings of the 44th IEEE Conference on Decision and Control
researchProduct

Potential feasibility of atezolizumab-bevacizumab therapy in patients with hepatocellular carcinoma treated with tyrosine-kinase inhibitors

2022

Background: The combination of atezolizumab-bevacizumab has been proven to be superior to sorafenib for the treatment of unresectable hepatocellular carcinoma not amenable to locoregional treatments, be-coming the standard of care of systemic therapy.Aim: This study aimed at assessing real-world feasibility of atezolizumab-bevacizumab in patients treated with tyrosine-kinase inhibitors.Methods: Among 1447 patients treated with tyrosine-kinase inhibitors from January 2010 to December 2020, we assessed the percentage of those potentially eligible to atezolizumab-bevacizumab (according to IMbrave-150 trial criteria), and the overall survival of eligible and non-eligible patients.Results: 422 (…

Atezolizumab-bevacizumabClinical Trials as TopicAntineoplastic Combined Chemotherapy ProtocolCarcinoma HepatocellularSystemic therapyHepatologyHepatocellular carcinomaTirosin-kinase inhibitorLiver NeoplasmsGastroenterologyTirosin-kinase inhibitor.Atezolizumab-bevacizumab; Hepatocellular carcinoma; Systemic therapy; Tirosin-kinase inhibitorBevacizumabFeasibility StudieTyrosineHumanDigestive and Liver Disease
researchProduct

Analysis and Optimization Technique of Secure Smart Grid Communication Network for Sustainable Development

2019

The smart network includes many sub-frameworks, for example, the Home Area Network (HAN), which are at risk and prone to be attacked remotely. A smart grid communication is meant to design a mutual authentication scheme and a key management protocol. This study is aimed with an efficient arrangement for HAN that analyzes a framework set-up for HAN. In this paper, we have analyzed three cases: First, we show the normal execution then execution along with attackers. Using mutual authentication, we overcome attacks. It has introduced a number of routing schemes for grid networks in recent years, and they provide different level of privacy protection at different cost. First, an unspecified key…

AuthenticationSmart gridComputer sciencebusiness.industryMutual authenticationSession (computer science)Routing (electronic design automation)GridKey managementbusinessProtocol (object-oriented programming)Computer network
researchProduct

Attacks Against the WAP WTLS Protocol

1999

The WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. The protocol is currently being fielded, and it is expected that the protocol will be contained in millions of devices in a few years.

AuthenticationWireless Transport Layer SecurityTransport Layer Securitybusiness.industryComputer scienceData integrityComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWirelessbusinessProtocol (object-oriented programming)Stream cipherBlock cipherComputer network
researchProduct

An improvement of the batch-authentication and key agreement framework for P2P-based online social networks

2014

Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.

Authenticationbusiness.industryComputer scienceAuthentication protocolNetwork Access ControlData_MISCELLANEOUSChallenge–response authenticationEncryptionbusinessAKAComputer network2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

Automatic cell nuclei counting: a protocol to acquire images and to compare results between color and multispectral images

2013

International audience; High-throughput screening in histology and analysis need a necessary automatic cell or nucleus counting. Current methods and systems based on grayscale or color images give results with counting errors. We suggest to use multispectral imaging (with more than three bands) rather than color one for nucleus counting. A traditional acquisition chains uses a source of white light and a CCD camera in addition to the optical microscope. To pass to a multispectral acquisition, we use a Programmable Light Source (PLS) in the place of the white light source. This PLS is capable of generating different wavelengths in the visible spectrum. So, one color image and four multispect…

Automatic cell nuclei detection[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image Processing[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing[INFO.INFO-TS] Computer Science [cs]/Signal and Image Processingacquisition protocolmultispectral imagingimage calibration[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingcolor imaging[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing
researchProduct

Protocol for developing a mental imagery intervention: a randomised controlled trial testing a novel implementation imagery e-health intervention to …

2019

IntroductionDrowning due to driving into floodwater accounts for a significant proportion of all deaths by drowning. Despite awareness campaigns such as ‘If it’s flooded, forget it’, people continue to drive into floodwater. This causes loss of life, risk to rescuers and damage to vehicles. The aim of this study was to develop and evaluate an online e-health intervention to promote safe driving behaviour during flood events.Methods and analysisThe study will use a 2×3 randomised controlled trial in which participants are randomised into one of two conditions: (1) education about the risks of driving into floodwater or (2) education about the risks of driving into floodwater plus a theory-ba…

Automobile DrivingImagery Psychotherapysocial-cognitive theoriesflooded waterwaysIntentionHealth interventionlaw.invention03 medical and health sciences0302 clinical medicineRisk-TakingRandomized controlled triallawInformed consentIntervention (counseling)drivingProtocolMedicineHumans1724030212 general & internal medicine1506Randomized Controlled Trials as TopicProtocol (science)water safetymental imagerybusiness.industrydrowning1359General Medicinemedicine.diseaseFloodsTelemedicineMedical emergencyHuman researchPublic Healthbusiness030217 neurology & neurosurgerySocial cognitive theoryMental imageBMJ open
researchProduct

Cold recycling of reclaimed asphalt pavements

2018

Pavement engineers have in front of them multiple challenges linked to addressing issues related to social development and society’s expanding needs. One of the most substantial of these issues is perhaps how to effectively rehabilitate and/ or maintain the existing road network while preserving and sustaining limited natural resources. The re-usage of existing pavement materials to reconstruct/ rehabilitate our future pavements is the solution that is now more and more selected by the different road administrations around the world. However, upon closer inspection, one can find many areas and details, not negligible issues, that are simply extensions of HMA technology (i.e. mix design proc…

BSM – bitumen stabilized materialsRecycling Reclaimedasphalt Foambitumen Bituminous emulsion Cohesion test Fragmentation test BSM – bitumen stabilized materialsComputer scienceProcess (engineering)Materials Science (miscellaneous)Cohesion test0211 other engineering and technologies020101 civil engineering02 engineering and technologyBuilding and ConstructionFragmentation testMix designNatural resourceConstruction engineering0201 civil engineeringBituminous emulsionAsphalt021105 building & constructionBituminous emulsion; BSM – bitumen stabilized materials; Cohesion test; Foam bitumen; Fragmentation test; Reclaimed asphalt; Recycling; Civil and Structural Engineering; Building and Construction; Materials Science (miscellaneous)Foam bitumenRecyclingProtocol (object-oriented programming)Reclaimed asphaltCivil and Structural Engineering
researchProduct