Search results for "TELECOMMUNICATIONS"

showing 10 items of 1639 documents

State of the Art Literature Review on Network Anomaly Detection with Deep Learning

2018

As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…

Advanced persistent threatbusiness.industryComputer scienceDeep learningdeep learning020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genrenetwork anomaly detectionkoneoppiminen0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAnomaly detectionState (computer science)Artificial intelligencetietoturvabusinessverkkohyökkäyksetcomputer
researchProduct

A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization

2017

Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…

Agent behaviorComputer scienceProcess (engineering)Functional featuresDistributed computingMetabolic network020206 networking & telecommunications02 engineering and technologyvehicular ad hoc networks (VANETs)Urban roadCognitive agentArtificial IntelligenceAutonomous urban vehicles routing optimization0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRouting (electronic design automation)cellular metabolismSoftwareSimulationCell survivalcognitive agentIEEE Transactions on Cognitive and Developmental Systems
researchProduct

Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra

2019

AbstractWe propose three cryptographic key exchange protocols in the octonion algebra. Using the totient function, defined for integral octonions, we generalize the RSA public-key cryptosystem to the octonion arithmetics. The two proposed symmetric cryptographic key exchange protocols are based on the automorphism and the derivation of the octonion algebra.

Algebra and Number TheoryApplied Mathematics020206 networking & telecommunicationsEuler's totient function0102 computer and information sciences02 engineering and technologyAutomorphism01 natural sciencesOctonionOctavian totient functionQuaternion cryptographyAlgebraOctonion cryptographysymbols.namesakeOctonion RSA algorithm010201 computation theory & mathematicsTheory of computation0202 electrical engineering electronic engineering information engineeringsymbolsCryptosystemNon-associative cryptographyOctonion algebraMathematicsApplicable Algebra in Engineering, Communication and Computing
researchProduct

Paths Coloring Algorithms in Mesh Networks

2003

In this paper, we will consider the problem of coloring directed paths on a mesh network. A natural application of this graph problem is WDM-routing in all-optical networks. Our main result is a simple 4-approximation algorithm for coloring line-column paths on a mesh. We also present sharper results when there is a restriction on the path lengths. Moreover, we show that these results can be extended to toroidal meshes and to line-column or column-line paths.

AlgorithmicsMesh networkingPath (graph theory)Approximation algorithmPolygon meshFractional coloringTelecommunications networkAlgorithmTime complexityMathematics
researchProduct

LTE-based passive radars and applications: a review

2021

This paper provides an overview of the most recent passive radars based on long-term evolution (LTE). To begin, this paper investigates the various characteristics and requirements of 4 G LTE signals for radar, taking performance aspects such as range, velocity, range resolution, and velocity resolution into account. An ambiguity function analysis is performed on a measured LTE signal using the synchronization and reference signal components to evaluate key performance parameters such as Doppler and range characteristics. We also discuss how LTE passive radar can be used in a variety of applications. The detailed analysis of the LTE downlink signal, its structural overview, and the effect o…

Ambiguity functionbusiness.industryComputer scienceSignalSynchronizationPassive radarlaw.inventionsymbols.namesakelawTelecommunications linksymbolsElectronic engineeringGeneral Earth and Planetary SciencesWirelessRadarbusinessDoppler effectVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Complicaciones tras técnicas de anestesia regional

2008

In recent years, there has been a considerable increase in the number of procedures carried out under regional anesthesia. The techniques used can be associated with a number of complications, which should be understood so that they can be recognized and managed appropriately. The overall incidence of reported complications associated with these techniques is low and therefore, with currently available data, we can only have an approximate idea of their incidence. The objective of this study is to systematically describe the complications that may arise from the use of neuraxial and peripheral regional anesthesia techniques.

Anesthesiology and Pain Medicinebusiness.industryRegional anesthesiaAnesthesiaBlock (telecommunications)Incidence (epidemiology)fungiMEDLINEfood and beveragesMedicineCritical Care and Intensive Care MedicinebusinessRevista Española de Anestesiología y Reanimación
researchProduct

A Hardware and Secure Pseudorandom Generator for Constrained Devices

2018

Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…

Applied cryptography; Chaotic circuits; Constrained devices; Discrete dynamical systems; FPGA; Lightweight Cryptography; Random number generators; Statistical tests; Control and Systems Engineering; Information Systems; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic EngineeringHardware security moduleComputer scienceRandom number generationCryptography[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyPseudorandom generatorConstrained devicesLightweight CryptographyChaotic circuits[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]PermutationRandom number generatorsStatistical tests0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringField-programmable gate arrayThroughput (business)FPGAPseudorandom number generatorGenerator (category theory)business.industry020208 electrical & electronic engineeringComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsDiscrete dynamical systems[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science ApplicationsApplied cryptography[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Control and Systems EngineeringKey (cryptography)[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessComputer hardwareInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

Hop: Histogram of patterns for human action representation

2017

This paper presents a novel method for representing actions in terms of multinomial distributions of frequent sequential patterns of different length. Frequent sequential patterns are series of data descriptors that occur many times in the data. This paper proposes to learn a codebook of frequent sequential patterns by means of an apriori-like algorithm, and to represent an action with a Bag-of-Frequent-Sequential-Patterns approach. Preliminary experiments of the proposed method have been conducted for action classification on skeletal data. The method achieves state-of-the-art accuracy value in cross-subject validation.

Apriori algorithmSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSeries (mathematics)Computer sciencebusiness.industryComputer Science (all)CodebookValue (computer science)Pattern recognition02 engineering and technologyAction classificationTheoretical Computer ScienceComputingMethodologies_PATTERNRECOGNITIONAction (philosophy)020204 information systemsHistogram0202 electrical engineering electronic engineering information engineeringFrequent pattern020201 artificial intelligence & image processingMultinomial distributionArtificial intelligenceHop (telecommunications)Representation (mathematics)business
researchProduct

AHBIM for Wooden Built Heritage Conservation

2019

The chapter investigates the potential offered by the Building Information Modeling for the conservation of the wooden architectural heritage. Based on the architectural survey, the BIM modeling of a South Tyrolean farm was carried out, with particular attention to the aspects related to its management and maintenance. Inside the database connected to the model, information about the building has been included, which can also be used on site through the use of mobile devices. The sharing of such information within a single platform avoids risks connected to the failure or incorrect transmission of data, allowing the optimization of the management, maintenance and conservation of the archite…

Architectural engineeringbusiness.industryComputer scienceConservationAsset (computer security)Built heritageParametric designParametric designBIM Built heritage Parametric design Conservation Facility managementFacility managementBuilding information modelingArchitectural heritageTransmission (telecommunications)BIMSettore ICAR/17 - DisegnoBuilt heritageFacility managementbusinessMobile device
researchProduct

Modelling and Analysis of Nonstationary Vehicle-to-Infrastructure Channels with Time-Variant Angles of Arrival

2018

In mobile radio channel modelling, it is generally assumed that the angles of arrival (AOAs) are independent of time. This assumption does not in general agree with real-world channels in which the AOAs vary with the position of a moving receiver. In this paper, we first present a mathematical model for the time-variant AOAs. This model serves as the basis for the development of two nonstationary multipath fading channels models for vehicle-to-infrastructure communications. The statistical properties of both channel models are analysed with emphasis on the time-dependent autocorrelation function (ACF), time-dependent mean Doppler shift, time-dependent Doppler spread, and the Wigner-Ville sp…

Article SubjectComputer Networks and CommunicationsComputer science02 engineering and technologylcsh:Technologylcsh:Telecommunicationsymbols.namesake0203 mechanical engineeringPosition (vector)lcsh:TK5101-67200202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringComputer Science::Information TheoryBasis (linear algebra)lcsh:TAutocorrelationEmphasis (telecommunications)020302 automobile design & engineering020206 networking & telecommunicationsVehicle to infrastructuresymbolsDoppler effectAlgorithmMultipath propagationInformation SystemsCommunication channelWireless Communications and Mobile Computing
researchProduct