Search results for "TELECOMMUNICATIONS"
showing 10 items of 1639 documents
State of the Art Literature Review on Network Anomaly Detection with Deep Learning
2018
As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…
A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization
2017
Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…
Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra
2019
AbstractWe propose three cryptographic key exchange protocols in the octonion algebra. Using the totient function, defined for integral octonions, we generalize the RSA public-key cryptosystem to the octonion arithmetics. The two proposed symmetric cryptographic key exchange protocols are based on the automorphism and the derivation of the octonion algebra.
Paths Coloring Algorithms in Mesh Networks
2003
In this paper, we will consider the problem of coloring directed paths on a mesh network. A natural application of this graph problem is WDM-routing in all-optical networks. Our main result is a simple 4-approximation algorithm for coloring line-column paths on a mesh. We also present sharper results when there is a restriction on the path lengths. Moreover, we show that these results can be extended to toroidal meshes and to line-column or column-line paths.
LTE-based passive radars and applications: a review
2021
This paper provides an overview of the most recent passive radars based on long-term evolution (LTE). To begin, this paper investigates the various characteristics and requirements of 4 G LTE signals for radar, taking performance aspects such as range, velocity, range resolution, and velocity resolution into account. An ambiguity function analysis is performed on a measured LTE signal using the synchronization and reference signal components to evaluate key performance parameters such as Doppler and range characteristics. We also discuss how LTE passive radar can be used in a variety of applications. The detailed analysis of the LTE downlink signal, its structural overview, and the effect o…
Complicaciones tras técnicas de anestesia regional
2008
In recent years, there has been a considerable increase in the number of procedures carried out under regional anesthesia. The techniques used can be associated with a number of complications, which should be understood so that they can be recognized and managed appropriately. The overall incidence of reported complications associated with these techniques is low and therefore, with currently available data, we can only have an approximate idea of their incidence. The objective of this study is to systematically describe the complications that may arise from the use of neuraxial and peripheral regional anesthesia techniques.
A Hardware and Secure Pseudorandom Generator for Constrained Devices
2018
Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…
Hop: Histogram of patterns for human action representation
2017
This paper presents a novel method for representing actions in terms of multinomial distributions of frequent sequential patterns of different length. Frequent sequential patterns are series of data descriptors that occur many times in the data. This paper proposes to learn a codebook of frequent sequential patterns by means of an apriori-like algorithm, and to represent an action with a Bag-of-Frequent-Sequential-Patterns approach. Preliminary experiments of the proposed method have been conducted for action classification on skeletal data. The method achieves state-of-the-art accuracy value in cross-subject validation.
AHBIM for Wooden Built Heritage Conservation
2019
The chapter investigates the potential offered by the Building Information Modeling for the conservation of the wooden architectural heritage. Based on the architectural survey, the BIM modeling of a South Tyrolean farm was carried out, with particular attention to the aspects related to its management and maintenance. Inside the database connected to the model, information about the building has been included, which can also be used on site through the use of mobile devices. The sharing of such information within a single platform avoids risks connected to the failure or incorrect transmission of data, allowing the optimization of the management, maintenance and conservation of the archite…
Modelling and Analysis of Nonstationary Vehicle-to-Infrastructure Channels with Time-Variant Angles of Arrival
2018
In mobile radio channel modelling, it is generally assumed that the angles of arrival (AOAs) are independent of time. This assumption does not in general agree with real-world channels in which the AOAs vary with the position of a moving receiver. In this paper, we first present a mathematical model for the time-variant AOAs. This model serves as the basis for the development of two nonstationary multipath fading channels models for vehicle-to-infrastructure communications. The statistical properties of both channel models are analysed with emphasis on the time-dependent autocorrelation function (ACF), time-dependent mean Doppler shift, time-dependent Doppler spread, and the Wigner-Ville sp…