Due to its availability and low cost, the use of wireless communication technologies increases in domains beyond the originally intended usage areas, e.g. M2M communication in industrial applications. Such industrial ...
详细信息
ISBN:
(纸本)9781479948451
Due to its availability and low cost, the use of wireless communication technologies increases in domains beyond the originally intended usage areas, e.g. M2M communication in industrial applications. Such industrial applications often have specific security requirements. Hence, it is important to understand the characteristics of such applications and evaluate the vulnerabilities bearing the highest risk in this context. We present a comprehensive overview of security issues and features in existing WLAN, NFC and ZigBee standards, investigating the usage characteristics of these standards in industrial environments. We apply standard risk assessment methods to identify vulnerabilities with the highest risk across multiple technologies. We present a threat catalogue, conclude in which direction new mitigation methods should progress and how security analysis methods should be extended to meet requirements in the M2M domain.
We discuss the problem of symmetry, namely of the orientation of the logical consequence, represented by the sequent sign in sequent calculus. We show that the problem is surprisingly entangled with the problem of “b...
详细信息
We discuss the problem of symmetry, namely of the orientation of the logical consequence, represented by the sequent sign in sequent calculus. We show that the problem is surprisingly entangled with the problem of “being infinite”. We present a model based on quantum states and we show that the requirements of Matte Blanco's symmetric mode are satisfied. We briefly discuss the model for symmetry to include correlations, in order to obtain a possible approach to displacement. In this setting, we find a possible reading of the structural rules of sequent calculus, whose role in computation, on one side, and in the representation of human reasoning, on the other, has been debated for a long time.
This paper presents a new perception-based computing approach in a wall-following algorithm. The proposed perception-based computing uses a rough-fuzzy theory, which is an extension of the conventional fuzzy-based con...
详细信息
This paper presents a new perception-based computing approach in a wall-following algorithm. The proposed perception-based computing uses a rough-fuzzy theory, which is an extension of the conventional fuzzy-based control approach. In practice, an indoor robot follows a wall in a compacted and complex environment with limited acquired data. Furthermore, visual sensor measurements may contain errors in a number of situations. In order to improve uncertainty reasoning results, it is necessary to perceive the encountered environment and filter the measured data. Therefore, a rough set theory is integrated to extract essential features of data to regulate inputs before applying fuzzy inference rules. The proposed control algorithm demonstrates excellent results through simulation and implementation.
Private cloud storage solutions, such as Oxygen Cloud and COSA (Cloud Object Storage Appliance), which provide file synchronization and sharing with high performance and integral security for enterprises. Those soluti...
详细信息
We develop a novel consensus of hierarchical clusterings. We do this in order to have a framework (including visualization and supporting interpretation) for the parts of the data that are determined to be ultrametric...
详细信息
We develop a novel consensus of hierarchical clusterings. We do this in order to have a framework (including visualization and supporting interpretation) for the parts of the data that are determined to be ultrametric. Furthermore a major objective is to determine locally ultrametric relationships as opposed to non-local ultrametric relationships. This work aims at a major new application, namely quantifying and interpreting vestiges of the subconscious, or what could be arising from subconscious processes, in narrative, through finding emotional content, metaphor and other potential expressions of the subconscious, i.e. of symmetric logic as defined by the psychoanalyst, Matte Blanco.
This paper proposes a new framework for evaluation of cross-validation methods for rule induction based on statistical indices by using incremental sampling scheme. Although incremental sampling scheme is used for inc...
详细信息
This paper proposes a new framework for evaluation of cross-validation methods for rule induction based on statistical indices by using incremental sampling scheme. Although incremental sampling scheme is used for incremental rule induction, this paper shows that the same idea can be used for deletion of exampling, called decremental sampling scheme. Then, we applied this technique to the cross-validation method for rules define by the propositions whose constraints were define by inequalities of accuracy and coverage. The results show that the evaluation framework gives a powerful tool for evaluation of cross-validation.
We implement a learning algorithm for Nonlinear Dynamic State (NDS) Neurons in the framework of Nonlinear Transient Computation (NTC). The learning procedure is based on Spike-Timing Dependent Plasticity (STDP); which...
详细信息
We implement a learning algorithm for Nonlinear Dynamic State (NDS) Neurons in the framework of Nonlinear Transient Computation (NTC). The learning procedure is based on Spike-Timing Dependent Plasticity (STDP); which maintains the nonlinear dynamics of these neurons so they can perform classification of time varying signals. To expound the practicality of this approach, an example of forgery detection for Online Signature Verification is presented. Also, we speculate on the importance of the presented work in modelling basic cognitive processes (e.g. memory) and its relation to chaotic neurodynamics.
Summary form only given. Massive data sets produced by smart cities, science and health systems throw up challenges of storing, analyzing and visualizing data for the purposes of benefitting society. We look at how ad...
详细信息
Summary form only given. Massive data sets produced by smart cities, science and health systems throw up challenges of storing, analyzing and visualizing data for the purposes of benefitting society. We look at how advances in knowledge representation, brain information processing and knowledge manipulation can enable health professionals to organize, visualize and draw inferences from patient-specific data. Case examples from medical images from MRI and CT scans will be used to illustrate the challenges of detecting small pathological features. The presentation will also focus on data analysis, problem solving, decision making and the need for active engagement of health professionals in the analytical process.
This paper characterizes operational failures of a production Custom Package Good Software-as-a-Service (SaaS) platform. Events log collected over 283 days of in-field operation are used to characterize platform failu...
详细信息
ISBN:
(纸本)9781450327688
This paper characterizes operational failures of a production Custom Package Good Software-as-a-Service (SaaS) platform. Events log collected over 283 days of in-field operation are used to characterize platform failures. The characterization is performed by estimating (i) common failure types of the platform, (ii) key factors impacting platform failures, (iii) failure rate, and (iv) how user workload (files submitted for processing) impacts on the failure rate. The major findings are: (i) 34.1% of failures are caused by unexpected values in customers' data, (ii) nearly 33% of the failures are because of timeout, and (iii) the failure rate increases if the workload intensity (transactions/second) increases, while there is no statistical evidence of being influenced by the workload volume (size of users' data). Finally, the paper presents the lessons learned and how the findings and the implemented analysis tool allow platform developers to improve platform code, system settings and customer management.
The existing Peer link establishment protocol documented in ieee 802.11s standard is not secure and vulnerable against relay and wormhole attacks. To address this issue, an efficient technique using location informati...
详细信息
ISBN:
(纸本)9781479930814
The existing Peer link establishment protocol documented in ieee 802.11s standard is not secure and vulnerable against relay and wormhole attacks. To address this issue, an efficient technique using location information, is proposed in this work. Security of the proposed technique is analysed using Simulation Paradigm.
暂无评论