Search results for "Tribute"

showing 10 items of 1455 documents

A Novel Deep Learning Stack for APT Detection

2019

We present a novel Deep Learning (DL) stack for detecting Advanced Persistent threat (APT) attacks. This model is based on a theoretical approach where an APT is observed as a multi-vector multi-stage attack with a continuous strategic campaign. To capture these attacks, the entire network flow and particularly raw data must be used as an input for the detection process. By combining different types of tailored DL-methods, it is possible to capture certain types of anomalies and behaviour. Our method essentially breaks down a bigger problem into smaller tasks, tries to solve these sequentially and finally returns a conclusive result. This concept paper outlines, for example, the problems an…

Advanced persistent threatProcess (engineering)Computer science020209 energyDistributed computing02 engineering and technologylcsh:Technologylcsh:ChemistryStack (abstract data type)020204 information systemsAdvanced Persistent Thread (APT)0202 electrical engineering electronic engineering information engineeringGeneral Materials Sciencetietoturvalcsh:QH301-705.5Instrumentationta113Fluid Flow and Transfer Processeslcsh:Tbusiness.industryProcess Chemistry and TechnologyDeep learningGeneral EngineeringFlow networklcsh:QC1-999Computer Science Applicationsnetwork anomaly detectionkoneoppiminenlcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040Deep Learning (DL)Artificial intelligencelcsh:Engineering (General). Civil engineering (General)Raw databusinessverkkohyökkäyksetlcsh:Physics
researchProduct

A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization

2017

Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…

Agent behaviorComputer scienceProcess (engineering)Functional featuresDistributed computingMetabolic network020206 networking & telecommunications02 engineering and technologyvehicular ad hoc networks (VANETs)Urban roadCognitive agentArtificial IntelligenceAutonomous urban vehicles routing optimization0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRouting (electronic design automation)cellular metabolismSoftwareSimulationCell survivalcognitive agentIEEE Transactions on Cognitive and Developmental Systems
researchProduct

SW—Soil and Water

2002

Abstract Recent research has directed attention to the size distribution of eroded material because of its influence on deposition mechanics and in carrying capacity of pollutant materials. At first, in this paper the relationship between aggregate breakdown mechanism and erosion processes is briefly reviewed. Then the link between the clay enrichment ratio and the sediment delivery ratio at morphological unit scale is investigated. For 129 soil samples well distributed over the Sicilian Sparacia basin, the values for the experimental clay enrichment ratio calculated by the measured ultimate grain-size distributions are compared with the theoretical clay enrichment ratio values obtained by …

Aggregate (composite)Soil testDistributed element modelSoil ScienceMineralogySedimentSedimentationDeposition (geology)Control and Systems EngineeringParticle-size distributionErosionAgronomy and Crop ScienceGeologyFood ScienceBiosystems Engineering
researchProduct

Ensuring High Performance of Consensus-Based Estimation by Lifetime Maximization in WSNs

2015

The estimation of a parameter corrupted by noise is a common tasks in wireless sensor networks, where the deployed nodes cooperate in order to improve their own inaccurate observations. This cooperation usually involves successive data exchanges and local information updates until a global consensus value is reached. The quality of the final estimator depends on the amount of collected observations, hence the number of active nodes. Moreover, the inherent iterative nature of the consensus process involves a certain energy consumption. Since the devices composing the network are usually battery powered, nodes becoming inactive due to battery depletion emerges as a serious problem. In this wo…

Algebraic connectivityComputer scienceDistributed computingTopology optimizationProcess (computing)EstimatorMaximizationEnergy consumptionNetwork topologyWireless sensor network2015 International Conference on Distributed Computing in Sensor Systems
researchProduct

Ancestral Reconstruction and Investigations of Genomic Recombination on some Pentapetalae Chloroplasts

2019

Abstract In this article, we propose a semi-automated method to rebuild genome ancestors of chloroplasts by taking into account gene duplication. Two methods have been used in order to achieve this work: a naked eye investigation using homemade scripts, whose results are considered as a basis of knowledge, and a dynamic programming based approach similar to Needleman-Wunsch. The latter fundamentally uses the Gestalt pattern matching method of sequence matcher to evaluate the occurrences probability of each gene in the last common ancestor of two given genomes. The two approaches have been applied on chloroplastic genomes from Apiales, Asterales, and Fabids orders, the latter belonging to Pe…

Ancestral reconstructionMost recent common ancestor0206 medical engineeringGenomic recombination02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Dynamic programmingGenome[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingEvolution Molecular[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]AsteralesGene duplication0202 electrical engineering electronic engineering information engineeringPattern matchingGenome ChloroplastRosaceaeResearch ArticlesPhylogenySequence (medicine)Recombination GeneticbiologyGeneral Medicinebiology.organism_classification[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationAncestral genome reconstructionApialesEvolutionary biology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Pentapetalae chloroplasts020602 bioinformaticsTP248.13-248.65BiotechnologyJournal of Integrative Bioinformatics
researchProduct

Uptake mechanism of ApoE-modified nanoparticles on brain capillary endothelial cells as a blood-brain barrier model.

2012

Background The blood-brain barrier (BBB) represents an insurmountable obstacle for most drugs thus obstructing an effective treatment of many brain diseases. One solution for overcoming this barrier is a transport by binding of these drugs to surface-modified nanoparticles. Especially apolipoprotein E (ApoE) appears to play a major role in the nanoparticle-mediated drug transport across the BBB. However, at present the underlying mechanism is incompletely understood. Methodology/Principal Findings In this study, the uptake of the ApoE-modified nanoparticles into the brain capillary endothelial cells was investigated to differentiate between active and passive uptake mechanism by flow cytome…

Apolipoprotein EDrugs and DevicesDrug Research and DevelopmentLipoproteinsMaterials Sciencelcsh:MedicinePlasma protein bindingBiologyBlood–brain barrierBiochemistryFlow cytometryApolipoproteins EMaterial by AttributeMiceApolipoproteins EDrug Delivery Systemsddc:570Cell Line TumormedicineAnimalsHumansNanotechnologyPharmacokineticsReceptorlcsh:ScienceBiologySerum AlbuminBrain DiseasesMultidisciplinaryMicroscopy Confocalmedicine.diagnostic_testlcsh:RBrainEndothelial CellsProteinsBiological TransportFlow CytometryCell biologymedicine.anatomical_structureBlood-Brain BarrierNanoparticles for drug delivery to the brainLDL receptorNanoparticlesMedicinelcsh:QProtein BindingResearch ArticleBiotechnologyPLoS ONE
researchProduct

Comparison and multiresolution analysis of irregular meshes with appearance attributes

2004

We present in this dissertation a method to compare and to analyse irregular meshes with appearance attributes. First, we propose a mesh comparison method using a new attribute deviation metric. Considered meshes contain geometric and appearance attributes (e.g. color, texture,temperature). The proposed deviation assessment allows the computation of local attribute differences between two meshes. We present an application of this method to mesh simplification algorithm quality assessment.Then we propose two multiresolution analysis schemes for irregular meshes with appearance attributes. First, a mesh is decomposed in a discret number of levels of detail. We introduce a surface geometry rel…

Appearance attributesIrregular meshes[INFO.INFO-GR] Computer Science [cs]/Graphics [cs.GR][INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]analyse multirésolutionattributs d’apparenceMesh comparisondébruitage adaptatif[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG][INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR][INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-CG] Computer Science [cs]/Computational Geometry [cs.CG]visualisation dépendante des détailscomparaison de maillagesMultiresolution analysismaillages irréguliers
researchProduct

Oscillation criteria for even-order neutral differential equations

2016

Abstract We study oscillatory behavior of solutions to a class of even-order neutral differential equations relating oscillation of higher-order equations to that of a pair of associated first-order delay differential equations. As illustrated with two examples in the final part of the paper, our criteria improve a number of related results reported in the literature.

Applied Mathematics010102 general mathematicsMathematical analysisDelay differential equation01 natural sciences010101 applied mathematicsExamples of differential equationsStochastic partial differential equationNonlinear systemDistributed parameter systemSimultaneous equationsCollocation method0101 mathematicsDifferential algebraic equationMathematics
researchProduct

A Hardware and Secure Pseudorandom Generator for Constrained Devices

2018

Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…

Applied cryptography; Chaotic circuits; Constrained devices; Discrete dynamical systems; FPGA; Lightweight Cryptography; Random number generators; Statistical tests; Control and Systems Engineering; Information Systems; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic EngineeringHardware security moduleComputer scienceRandom number generationCryptography[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyPseudorandom generatorConstrained devicesLightweight CryptographyChaotic circuits[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]PermutationRandom number generatorsStatistical tests0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringField-programmable gate arrayThroughput (business)FPGAPseudorandom number generatorGenerator (category theory)business.industry020208 electrical & electronic engineeringComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsDiscrete dynamical systems[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science ApplicationsApplied cryptography[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Control and Systems EngineeringKey (cryptography)[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessComputer hardwareInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

Precise chronology of Polynesian temple construction and use for southeastern Maui, Hawaiian Islands determined by 230Th dating of corals

2015

International audience; Emergent archaic states in pre-contact Hawai'i used a ritual control hierarchy implemented through a system of temples to manage production, extract tribute, and reinforce the legitimacy of the ruling elites. Based on a limited sample of precise 230Th dates from coral offerings on Maui Island temples it had been hypothesized that this temple system rapidly expanded during the period from A.D. 1580–1640. We tested this hypothesis by obtaining an expanded sample of 39 new 230Th coral dates from temples in Kahikinui District, and one sample from the summit of a cinder cone that likely had ritual significance. Combined with seven coral dates previously obtained, this yie…

ArcheologyCinder coneHistoryArchaic states[SHS.ARCHEO]Humanities and Social Sciences/Archaeology and PrehistoryCoralTributeRitual architecture[SHS.ANTHRO-SE]Humanities and Social Sciences/Social Anthropology and ethnologyArchaeologyPolynesiamedicine.anatomical_structureTempleMonumental architectureCoral datingmedicinePeriod (geology)PolityChronologyJournal of Archaeological Science
researchProduct