Search results for "TELECOMMUNICATION"

showing 10 items of 1769 documents

Clinical evaluation of a wireless ECG sensor system for arrhythmia diagnostic purposes

2013

Accepted version of an article in the journal: Medical Engineering and Physics. Also available from the publisher at: http://dx.doi.org/10.1016/j.medengphy.2013.03.002 In a clinical study, a novel wireless electrocardiogram (ECG) recorder has been evaluated with regard to its ability to perform arrhythmia diagnostics. As the ECG recorder will detect a "non-standard" ECG signal, it has been necessary to compare those signals to "standard" ECG recording signals in order to evaluate the arrhythmia detection ability of the new system. Simultaneous recording of ECG signals from both the new wireless ECG recorder and a conventional Holter recorder was compared by two independent cardiology specia…

AdultMalemedicine.medical_specialtyambulatory electrocardiographyBiomedical EngineeringBiophysicsElectrocardiographyYoung Adultevaluation studiesmedicineHumansWirelessMedical physicscardiovascular diseasesChildReference standardsAgedAmbulatory electrocardiographySensor systemclinical trialsbusiness.industryReproducibility of ResultsArrhythmias CardiacSignal Processing Computer-AssistedVDP::Technology: 500::Information and communication technology: 550Middle AgedReference StandardsHolter monitoringClinical trialVDP::Medical disciplines: 700wireless ECG sensorFemalebusinessTelecommunicationsWireless TechnologyClinical evaluationHolter monitoring
researchProduct

Health-Promoting Effects of Serial vs. Integrated Combined Strength and Aerobic Training

2016

Combined strength and aerobic training programs are widely used for improving markers of physical fitness and health. We compared the efficiency of a serial and an integrated combined training program on health and overall fitness in middle-aged females. 54 females (46.7±4.5yrs) were assigned to a serial (SCG) or an integrated (ICG) combined training group or to a control group (CG). The SCG and ICG performed a 3-month training combining aerobic dance and calisthenics. The 2 training programs differ in the sequence of aerobic and strength exercises. SCG performed the strength exercises prior to aerobic; in ICG, the aerobic and strength exercises were altered in a predetermined order. Body c…

Adultmedicine.medical_specialtyPhysical fitnessPhysical Therapy Sports Therapy and RehabilitationHealth Promotion02 engineering and technology03 medical and health sciencesOxygen Consumption0302 clinical medicinePhysical medicine and rehabilitationHeart RateHeart rate0202 electrical engineering electronic engineering information engineeringmedicineHumansAerobic exerciseOrthopedics and Sports MedicineRespiratory functionMuscle Strength030212 general & internal medicineDancingAerobic capacityBalance (ability)Exercise Tolerancebusiness.industryResistance Training020206 networking & telecommunicationsCardiorespiratory fitnessMiddle AgedCardiorespiratory FitnessPhysical FitnessBody CompositionPhysical EndurancePhysical therapyFemaleCalisthenicsbusinessInternational Journal of Sports Medicine
researchProduct

A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory

2018

Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…

Advanced persistent threatNoticeComputer science05 social sciences020206 networking & telecommunicationsOODA loop02 engineering and technologyBlack Swan theoryComputer securitycomputer.software_genreFlow networkBlack swan theorynetwork anomaly detectionLong periodAdvanced Persistent Thread (APT)0502 economics and businessOODA loop0202 electrical engineering electronic engineering information engineeringcomputer050203 business & management
researchProduct

State of the Art Literature Review on Network Anomaly Detection with Deep Learning

2018

As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…

Advanced persistent threatbusiness.industryComputer scienceDeep learningdeep learning020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genrenetwork anomaly detectionkoneoppiminen0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAnomaly detectionState (computer science)Artificial intelligencetietoturvabusinessverkkohyökkäyksetcomputer
researchProduct

Climatology of the aerosol extinction-to-backscatter ratio from sun-photometric measurements

2010

The elastic lidar equation contains two unknown atmospheric parameters, namely, the particulate optical extinction and backscatter coefficients, which are related through the lidar ratio (i.e., the particulate-extinction-to-backscatter ratio). So far, independent inversion of the lidar signal has been carried out by means of Raman lidars (usually limited to nighttime measurements), high-spectral-resolution lidars, or scanning elastic lidars under the assumption of a homogeneously vertically stratified atmosphere. In this paper, we present a procedure to obtain the lidar ratio at 532 nm by a combined Sunphotometer– aerosol-model inversion, where the viability of the solution is largely reinf…

AerosolsBackscatterSignal theory (Telecommunication)Optical radar:Enginyeria de la telecomunicació [Àrees temàtiques de la UPC]Sun-PhotometricSolar irradianceAERONETAerosolSun photometerSenyal Teoria del (Telecomunicació)LidarRadianceGeneral Earth and Planetary SciencesEnvironmental scienceback trajectoriesElectrical and Electronic Engineeringextinction-tobackscatterAtmospheric opticsPhysics::Atmospheric and Oceanic PhysicsSun photometer.Remote sensing
researchProduct

Aerosol Lidar Intercomparison in the Framework of SPALINET—The Spanish Lidar Network: Methodology and Results

2009

Abstract—A group of eight Spanish lidars was formed in order to extend the European Aerosol Research Lidar Network–Advanced Sustainable Observation System (EARLINET-ASOS)project. This study presents intercomparisons at the hardware and software levels. Results of the system intercomparisons are based on range-square-corrected signals in cases where the lidars viewed the same atmospheres. Comparisons were also made for aeros backscatter coefficients at 1064 nm (2 systems) and 532 nm (all systems), and for extinction coefficients at 532 nm (2 systems). In total, three field campaigns were carried out between 2006 and 2007. Comparisons were limited to the highest layer found before the free tr…

AerosolsLidarXarxes de telecomunicacionsTeledetecció:Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors [Àrees temàtiques de la UPC]BackscatterMeteorologyPlanetary boundary layerSignal theory (Telecommunication)Inversion (meteorology)Atmospheric modelGeofísicaAerosolTroposphereSenyal Teoria del (Telecomunicació)Boundary layerNetwork performance (Telecomunication)LidarGeneral Earth and Planetary SciencesEnvironmental scienceElectrical and Electronic Engineering:Enginyeria de la telecomunicació::Processament del senyal::Processament del senyal en les telecomunicacions [Àrees temàtiques de la UPC]Remote sensingIEEE Transactions on Geoscience and Remote Sensing
researchProduct

A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization

2017

Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…

Agent behaviorComputer scienceProcess (engineering)Functional featuresDistributed computingMetabolic network020206 networking & telecommunications02 engineering and technologyvehicular ad hoc networks (VANETs)Urban roadCognitive agentArtificial IntelligenceAutonomous urban vehicles routing optimization0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRouting (electronic design automation)cellular metabolismSoftwareSimulationCell survivalcognitive agentIEEE Transactions on Cognitive and Developmental Systems
researchProduct

Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra

2019

AbstractWe propose three cryptographic key exchange protocols in the octonion algebra. Using the totient function, defined for integral octonions, we generalize the RSA public-key cryptosystem to the octonion arithmetics. The two proposed symmetric cryptographic key exchange protocols are based on the automorphism and the derivation of the octonion algebra.

Algebra and Number TheoryApplied Mathematics020206 networking & telecommunicationsEuler's totient function0102 computer and information sciences02 engineering and technologyAutomorphism01 natural sciencesOctonionOctavian totient functionQuaternion cryptographyAlgebraOctonion cryptographysymbols.namesakeOctonion RSA algorithm010201 computation theory & mathematicsTheory of computation0202 electrical engineering electronic engineering information engineeringsymbolsCryptosystemNon-associative cryptographyOctonion algebraMathematicsApplicable Algebra in Engineering, Communication and Computing
researchProduct

Paths Coloring Algorithms in Mesh Networks

2003

In this paper, we will consider the problem of coloring directed paths on a mesh network. A natural application of this graph problem is WDM-routing in all-optical networks. Our main result is a simple 4-approximation algorithm for coloring line-column paths on a mesh. We also present sharper results when there is a restriction on the path lengths. Moreover, we show that these results can be extended to toroidal meshes and to line-column or column-line paths.

AlgorithmicsMesh networkingPath (graph theory)Approximation algorithmPolygon meshFractional coloringTelecommunications networkAlgorithmTime complexityMathematics
researchProduct

An AmI-Based Software Architecture Enabling Evolutionary Computation in Blended Commerce: The Shopping Plan Application

2015

This work describes an approach to synergistically exploit ambient intelligence technologies, mobile devices, and evolutionary computation in order to support blended commerce or ubiquitous commerce scenarios. The work proposes a software architecture consisting of three main components: linked data for e-commerce, cloud-based services, and mobile apps. The three components implement a scenario where a shopping mall is presented as an intelligent environment in which customers use NFC capabilities of their smartphones in order to handle e-coupons produced, suggested, and consumed by the abovesaid environment. The main function of the intelligent environment is to help customers define shopp…

Ambient intelligenceArticle SubjectExploitDatabaseComputer Networks and CommunicationsComputer sciencebusiness.industryShopping mallCloud computingTK5101-6720computer.software_genreComputer Science ApplicationsTelecommunicationIntelligent environmentUbiquitous commerceSoftware architecturebusinessMobile devicecomputerMobile Information Systems
researchProduct