Search results for "cryptography"

showing 10 items of 657 documents

Optimizing PolyACO Training with GPU-Based Parallelization

2016

A central part of Ant Colony Optimisation (ACO) is the function calculating the quality and cost of solutions, such as the distance of a potential ant route. This cost function is used to deposit an opportune amount of pheromones to achieve an apt convergence, and in an active ACO implementation a significant part of the runtime is spent in this part of the code. In some cases, the cost function accumulates up towards 94 % in its run time making it a performance bottle neck.

Computer scienceMathematicsofComputing_NUMERICALANALYSISSignificant part02 engineering and technologyParallel computingFunction (mathematics)Ant colonyComputingMethodologies_ARTIFICIALINTELLIGENCEBottle neck030218 nuclear medicine & medical imaging03 medical and health sciencesAutomatic parallelization0302 clinical medicineConvergence (routing)0202 electrical engineering electronic engineering information engineeringCode (cryptography)020201 artificial intelligence & image processing
researchProduct

Nanosensors for intelligent packaging

2021

Abstract Intelligent packaging is an emerging area with a high potentials. Sensors and indicators are key elements, together with enabling technologies, for the development of a new generation of packaging able to interact with the sample and the user. Nanotechnology offers interesting opportunities for the development of active components, integration with the packaging, miniaturization, communication, and batteries. However, its use in intelligent packaging is still limited. We report herein a revision of recent examples of sensors including nanomaterials or nanostructures with potential application in packaging. The references include time temperature indicators, pH, moisture and pressur…

Computer scienceNanosensorMiniaturizationActive componentsSystems engineeringActive packagingKey (cryptography)
researchProduct

An asynchronous covert channel using spam

2012

AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…

Computer scienceRetransmissionCovert channelAsynchronous covert channelData lossComputer securitycomputer.software_genreSecure communicationModelling and SimulationCommunication sourceRaptor codeStegosystemSpam steganographybusiness.industryE-mail steganographyComputational MathematicsComputational Theory and MathematicsAsynchronous communicationRaptor codesSecure communicationModeling and SimulationKey (cryptography)businessAsynchronous covert channel; E-mail steganography; Raptor codes; Secure communication; Spam steganography; Stegosystem; Modeling and Simulation; Computational Theory and Mathematics; Computational MathematicscomputerComputer networkComputers & Mathematics with Applications
researchProduct

A risk evaluation framework for the best maintenance strategy: the case of a marine salt manufacture firm

2020

Highlights • This paper proposes a MCDM framework to support risk evaluation for maintenance activities. • The ANP is proposed to select the best maintenance strategy on the basis of real systems’ features. • The ELECTRE III is used to prioritise the main risks related to the interventions of the selected maintenance policy. • The proposed framework is applied to a core subsystem of a real-world marine salt manufacture firm.

Computer scienceSalt (cryptography)Analytic network processmedia_common.quotation_subject0211 other engineering and technologies09.- Desarrollar infraestructuras resilientes promover la industrialización inclusiva y sostenible y fomentar la innovación02 engineering and technologyArticleIndustrial and Manufacturing EngineeringSettore ING-IND/17 - Impianti Industriali MeccaniciELECTRESafety Risk Reliability and QualityMaintenance policy selection risk evaluation ANP ELECTRE IIImedia_commonELECTRE III021110 strategic defence & security studies021103 operations researchRisk evaluationMultiple-criteria decision analysisRisk evaluationInterdependenceCore (game theory)Intervention (law)Risk analysis (engineering)Maintenance policy selectionMATEMATICA APLICADAANP
researchProduct

Efficient anomaly detection on sampled data streams with contaminated phase I data

2020

International audience; Control chart algorithms aim to monitor a process over time. This process consists of two phases. Phase I, also called the learning phase, estimates the normal process parameters, then in Phase II, anomalies are detected. However, the learning phase itself can contain contaminated data such as outliers. If left undetected, they can jeopardize the accuracy of the whole chart by affecting the computed parameters, which leads to faulty classifications and defective data analysis results. This problem becomes more severe when the analysis is done on a sample of the data rather than the whole data. To avoid such a situation, Phase I quality must be guaranteed. The purpose…

Computer scienceSample (material)0211 other engineering and technologies02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing010104 statistics & probabilitysymbols.namesake[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]ChartControl chartEWMA chart0101 mathematics021103 operations researchData stream miningbusiness.industryPattern recognition[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]OutliersymbolsAnomaly detection[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Artificial intelligence[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessGibbs sampling
researchProduct

Incomplete 3D motion trajectory segmentation and 2D-to-3D label transfer for dynamic scene analysis

2017

International audience; The knowledge of the static scene parts and the moving objects in a dynamic scene plays a vital role for scene modelling, understanding, and landmark-based robot navigation. The key information for these tasks lies on semantic labels of the scene parts and the motion trajectories of the dynamic objects. In this work, we propose a method that segments the 3D feature trajectories based on their motion behaviours, and assigns them semantic labels using 2D-to-3D label transfer. These feature trajectories are constructed by using the proposed trajectory recovery algorithm which takes the loss of feature tracking into account. We introduce a complete framework for static-m…

Computer scienceScene UnderstandingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technology[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Motion (physics)[INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]0502 economics and business0202 electrical engineering electronic engineering information engineering[INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO]Computer visionSegmentationMotion Segmentation050210 logistics & transportationbusiness.industry[INFO.INFO-RB] Computer Science [cs]/Robotics [cs.RO][ INFO.INFO-RB ] Computer Science [cs]/Robotics [cs.RO]05 social sciences3D reconstruction[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]2D to 3D conversionFeature (computer vision)TrajectoryKey (cryptography)Robot020201 artificial intelligence & image processingArtificial intelligence3D Reconstructionbusiness2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)
researchProduct

The role of network connectivity on epileptiform activity.

2021

AbstractA number of potentially important mechanisms have been identified as key players to generate epileptiform activity, such as genetic mutations, activity-dependent alteration of synaptic functions, and functional network reorganization at the macroscopic level. Here we study how network connectivity at cellular level can affect the onset of epileptiform activity, using computational model networks with different wiring properties. The model suggests that networks connected as in real brain circuits are more resistant to generate seizure-like activity. The results suggest new experimentally testable predictions on the cellular network connectivity in epileptic individuals, and highligh…

Computer scienceScienceAction PotentialsCellular levelArticleFunctional networksComputational biophysicsSeizuresNeural Pathwayscomputational model networkHumansThe role of network connectivity on epileptiform activityComputational modelMultidisciplinaryNetwork modelsEpilepsycellular network connectivitySettore INF/01 - InformaticaQRBrainElectroencephalographyNetwork connectivityApplied mathematicsepileptiform activitywiring propertieCellular networkKey (cryptography)MedicineNerve NetNeuroscienceScientific reports
researchProduct

Smart Manufacturing Testbed for the Advancement of Wireless Adoption in the Factory

2020

Wireless communication is a key enabling technology central to the advancement of the goals of the Industry 4.0 smart manufacturing concept. Researchers at the National Institute of Standards and Technology are constructing a testbed to aid in the adoption of wireless technology within the factory workcell and other harsh industrial radio environments. In this paper the authors present a new industrial wireless testbed design that motivates academic research and is relevant to the needs of industry. The testbed is designed to serve as both a demonstration and research platform for the wireless workcell. The work leverages lessons learned from past testbed incarnations that included a dual r…

Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineeringTestbed02 engineering and technologyRadio propagation0202 electrical engineering electronic engineering information engineeringSystems engineeringKey (cryptography)Factory (object-oriented programming)RobotWireless020201 artificial intelligence & image processingWorkcellbusinessRobotic arm
researchProduct

Comparative Analysis of Different Types of Micro-grid Architectures and Controls

2018

An innovative and smart micro-grid model is an essentialfor the integration of distributed energy resources into the electrical power distribution network. There are various types of micro-grid architectures that have been designed and implemented in the last few years. These micro-grid architectures have their key advantages and limitations. This paper has been prepared with the objective to identify and address, key challenges and solutions for integration of micro-grid into the distribution network. It reviewsdifferent micro-grid architectures and control strategies which can help to address various challenges i.e. voltage imbalance, power quality, demand side management, smooth islandin…

Computer sciencebusiness.industryDistributed computingDistributed generationControl (management)Key (cryptography)IslandingMicro gridPower qualityElectric powerbusinessVoltage2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN)
researchProduct

Energy-Efficient M2M Communications in for Industrial Automation

2020

M2M communication with autonomous data acquisition and exchange plays a key role in realizing the “control”-oriented tactile Internet (TI) applications such as industrial automation. In this chapter, we develop a two-stage access control and resource allocation algorithm. In the first stage, we introduce a contract-based incentive mechanism to motivate some delay-tolerant machine-type communication (MTC) devices to postpone their access demands in exchange for higher access opportunities. In the second stage, a long-term cross-layer online resource allocation approach is based on Lyapunov optimization, which jointly optimizes rate control, power allocation, and channel selection without pri…

Computer sciencebusiness.industryDistributed computingKey (cryptography)Resource allocationAccess controlLyapunov optimizationThe InternetbusinessAutomationCommunication channelEfficient energy use
researchProduct