Search results for "TELECOMMUNICATION"
showing 10 items of 1769 documents
Clinical evaluation of a wireless ECG sensor system for arrhythmia diagnostic purposes
2013
Accepted version of an article in the journal: Medical Engineering and Physics. Also available from the publisher at: http://dx.doi.org/10.1016/j.medengphy.2013.03.002 In a clinical study, a novel wireless electrocardiogram (ECG) recorder has been evaluated with regard to its ability to perform arrhythmia diagnostics. As the ECG recorder will detect a "non-standard" ECG signal, it has been necessary to compare those signals to "standard" ECG recording signals in order to evaluate the arrhythmia detection ability of the new system. Simultaneous recording of ECG signals from both the new wireless ECG recorder and a conventional Holter recorder was compared by two independent cardiology specia…
Health-Promoting Effects of Serial vs. Integrated Combined Strength and Aerobic Training
2016
Combined strength and aerobic training programs are widely used for improving markers of physical fitness and health. We compared the efficiency of a serial and an integrated combined training program on health and overall fitness in middle-aged females. 54 females (46.7±4.5yrs) were assigned to a serial (SCG) or an integrated (ICG) combined training group or to a control group (CG). The SCG and ICG performed a 3-month training combining aerobic dance and calisthenics. The 2 training programs differ in the sequence of aerobic and strength exercises. SCG performed the strength exercises prior to aerobic; in ICG, the aerobic and strength exercises were altered in a predetermined order. Body c…
A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory
2018
Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…
State of the Art Literature Review on Network Anomaly Detection with Deep Learning
2018
As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…
Climatology of the aerosol extinction-to-backscatter ratio from sun-photometric measurements
2010
The elastic lidar equation contains two unknown atmospheric parameters, namely, the particulate optical extinction and backscatter coefficients, which are related through the lidar ratio (i.e., the particulate-extinction-to-backscatter ratio). So far, independent inversion of the lidar signal has been carried out by means of Raman lidars (usually limited to nighttime measurements), high-spectral-resolution lidars, or scanning elastic lidars under the assumption of a homogeneously vertically stratified atmosphere. In this paper, we present a procedure to obtain the lidar ratio at 532 nm by a combined Sunphotometer– aerosol-model inversion, where the viability of the solution is largely reinf…
Aerosol Lidar Intercomparison in the Framework of SPALINET—The Spanish Lidar Network: Methodology and Results
2009
Abstract—A group of eight Spanish lidars was formed in order to extend the European Aerosol Research Lidar Network–Advanced Sustainable Observation System (EARLINET-ASOS)project. This study presents intercomparisons at the hardware and software levels. Results of the system intercomparisons are based on range-square-corrected signals in cases where the lidars viewed the same atmospheres. Comparisons were also made for aeros backscatter coefficients at 1064 nm (2 systems) and 532 nm (all systems), and for extinction coefficients at 532 nm (2 systems). In total, three field campaigns were carried out between 2006 and 2007. Comparisons were limited to the highest layer found before the free tr…
A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization
2017
Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…
Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra
2019
AbstractWe propose three cryptographic key exchange protocols in the octonion algebra. Using the totient function, defined for integral octonions, we generalize the RSA public-key cryptosystem to the octonion arithmetics. The two proposed symmetric cryptographic key exchange protocols are based on the automorphism and the derivation of the octonion algebra.
Paths Coloring Algorithms in Mesh Networks
2003
In this paper, we will consider the problem of coloring directed paths on a mesh network. A natural application of this graph problem is WDM-routing in all-optical networks. Our main result is a simple 4-approximation algorithm for coloring line-column paths on a mesh. We also present sharper results when there is a restriction on the path lengths. Moreover, we show that these results can be extended to toroidal meshes and to line-column or column-line paths.
An AmI-Based Software Architecture Enabling Evolutionary Computation in Blended Commerce: The Shopping Plan Application
2015
This work describes an approach to synergistically exploit ambient intelligence technologies, mobile devices, and evolutionary computation in order to support blended commerce or ubiquitous commerce scenarios. The work proposes a software architecture consisting of three main components: linked data for e-commerce, cloud-based services, and mobile apps. The three components implement a scenario where a shopping mall is presented as an intelligent environment in which customers use NFC capabilities of their smartphones in order to handle e-coupons produced, suggested, and consumed by the abovesaid environment. The main function of the intelligent environment is to help customers define shopp…