Search results for "cryptography"
showing 10 items of 657 documents
Optimizing PolyACO Training with GPU-Based Parallelization
2016
A central part of Ant Colony Optimisation (ACO) is the function calculating the quality and cost of solutions, such as the distance of a potential ant route. This cost function is used to deposit an opportune amount of pheromones to achieve an apt convergence, and in an active ACO implementation a significant part of the runtime is spent in this part of the code. In some cases, the cost function accumulates up towards 94 % in its run time making it a performance bottle neck.
Nanosensors for intelligent packaging
2021
Abstract Intelligent packaging is an emerging area with a high potentials. Sensors and indicators are key elements, together with enabling technologies, for the development of a new generation of packaging able to interact with the sample and the user. Nanotechnology offers interesting opportunities for the development of active components, integration with the packaging, miniaturization, communication, and batteries. However, its use in intelligent packaging is still limited. We report herein a revision of recent examples of sensors including nanomaterials or nanostructures with potential application in packaging. The references include time temperature indicators, pH, moisture and pressur…
An asynchronous covert channel using spam
2012
AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…
A risk evaluation framework for the best maintenance strategy: the case of a marine salt manufacture firm
2020
Highlights • This paper proposes a MCDM framework to support risk evaluation for maintenance activities. • The ANP is proposed to select the best maintenance strategy on the basis of real systems’ features. • The ELECTRE III is used to prioritise the main risks related to the interventions of the selected maintenance policy. • The proposed framework is applied to a core subsystem of a real-world marine salt manufacture firm.
Efficient anomaly detection on sampled data streams with contaminated phase I data
2020
International audience; Control chart algorithms aim to monitor a process over time. This process consists of two phases. Phase I, also called the learning phase, estimates the normal process parameters, then in Phase II, anomalies are detected. However, the learning phase itself can contain contaminated data such as outliers. If left undetected, they can jeopardize the accuracy of the whole chart by affecting the computed parameters, which leads to faulty classifications and defective data analysis results. This problem becomes more severe when the analysis is done on a sample of the data rather than the whole data. To avoid such a situation, Phase I quality must be guaranteed. The purpose…
Incomplete 3D motion trajectory segmentation and 2D-to-3D label transfer for dynamic scene analysis
2017
International audience; The knowledge of the static scene parts and the moving objects in a dynamic scene plays a vital role for scene modelling, understanding, and landmark-based robot navigation. The key information for these tasks lies on semantic labels of the scene parts and the motion trajectories of the dynamic objects. In this work, we propose a method that segments the 3D feature trajectories based on their motion behaviours, and assigns them semantic labels using 2D-to-3D label transfer. These feature trajectories are constructed by using the proposed trajectory recovery algorithm which takes the loss of feature tracking into account. We introduce a complete framework for static-m…
The role of network connectivity on epileptiform activity.
2021
AbstractA number of potentially important mechanisms have been identified as key players to generate epileptiform activity, such as genetic mutations, activity-dependent alteration of synaptic functions, and functional network reorganization at the macroscopic level. Here we study how network connectivity at cellular level can affect the onset of epileptiform activity, using computational model networks with different wiring properties. The model suggests that networks connected as in real brain circuits are more resistant to generate seizure-like activity. The results suggest new experimentally testable predictions on the cellular network connectivity in epileptic individuals, and highligh…
Smart Manufacturing Testbed for the Advancement of Wireless Adoption in the Factory
2020
Wireless communication is a key enabling technology central to the advancement of the goals of the Industry 4.0 smart manufacturing concept. Researchers at the National Institute of Standards and Technology are constructing a testbed to aid in the adoption of wireless technology within the factory workcell and other harsh industrial radio environments. In this paper the authors present a new industrial wireless testbed design that motivates academic research and is relevant to the needs of industry. The testbed is designed to serve as both a demonstration and research platform for the wireless workcell. The work leverages lessons learned from past testbed incarnations that included a dual r…
Comparative Analysis of Different Types of Micro-grid Architectures and Controls
2018
An innovative and smart micro-grid model is an essentialfor the integration of distributed energy resources into the electrical power distribution network. There are various types of micro-grid architectures that have been designed and implemented in the last few years. These micro-grid architectures have their key advantages and limitations. This paper has been prepared with the objective to identify and address, key challenges and solutions for integration of micro-grid into the distribution network. It reviewsdifferent micro-grid architectures and control strategies which can help to address various challenges i.e. voltage imbalance, power quality, demand side management, smooth islandin…
Energy-Efficient M2M Communications in for Industrial Automation
2020
M2M communication with autonomous data acquisition and exchange plays a key role in realizing the “control”-oriented tactile Internet (TI) applications such as industrial automation. In this chapter, we develop a two-stage access control and resource allocation algorithm. In the first stage, we introduce a contract-based incentive mechanism to motivate some delay-tolerant machine-type communication (MTC) devices to postpone their access demands in exchange for higher access opportunities. In the second stage, a long-term cross-layer online resource allocation approach is based on Lyapunov optimization, which jointly optimizes rate control, power allocation, and channel selection without pri…