This talk addresses the changing world of security systems, and a possible approach to their improvement. Since the scientific, technical, industrial, business, and social worlds have changed from physically isolated ...
详细信息
This talk addresses the changing world of security systems, and a possible approach to their improvement. Since the scientific, technical, industrial, business, and social worlds have changed from physically isolated systems to electronically interconnected system-of-systems (SoS), the functioning of such a SoS depends critically on its operational robustness and security. In the previous physically-isolated world, robust static security for selected matched problems was often sufficient. Today, we need a new approach to providing security, because even adaptive security is insufficient. This new approach is termed here a cognitive security system. The talk will cover three major issues. First, the talk starts from a review of the existing security systems, with their problems and required solutions, as well as their vulnerabilities, attacks, and defences. Second, it provides a review of decision-making systems, including dynamic and dynamical systems, complex systems, adaptive systems, autonomic systems and their attributes, symbiotic systems, and finally special attention is given to cognitive dynamic systems as defined by Wang's cognitive informatics [1-4], Kinsner cognitive machines, [5], Haikonen conscious machines [6], and Haykin cognitive dynamic systems [7]. This review ends with a model of cognitive security system. This model has a feature based on polyscale analysis and synthesis never reported before. Finally, examples of security-related cognitive static and dynamic systems developed in our research group are presented, including wavelet-packet fingerprint compression for data mining, watermarking and steganography, a new chaotic cryptography system, and new polyscale analysis for SmartGrid2.
Fuzzy cognitive Maps (FCMs) is an abstract soft computing modeling methodology that has been applied in many areas quite successfully. In this paper we discuss its modeling applicability to complex logistics systems i...
详细信息
This paper presents a new cryptosystem based on chaotic continuous cellular automata (CCA) to increase data protection as demonstrated by their flexibility to encrypt and decrypt information from distinct sources. Enh...
详细信息
Fuzzy cognitive Maps (FCMs) is an abstract soft computing modeling methodology that has been applied in many areas quite successfully. In this paper we discuss its modeling applicability to complex logistics systems i...
详细信息
Fuzzy cognitive Maps (FCMs) is an abstract soft computing modeling methodology that has been applied in many areas quite successfully. In this paper we discuss its modeling applicability to complex logistics systems involved in an intermodal container terminal and the way it could represent and handle the vast amount of information by an abstract point of view based on a decentralized approach, where the supervisor of the system is modeled as an FCM. We also investigate its applicability as a metamodel of the intermodal terminal in a simulation-optimization framework. Experts have a key role in developing the FCM as they describe a general operational and behavioral model of the system using concepts for the main aspects of the system, and weighted directed edges to represent causality. On the other hand, when data is available, data driven approaches have also been proposed for the development of FCM models. The FCM representation and implementation is discussed to develop a behavioral model of any complex system mainly based on a hierarchical structure, as well as its use as a metamodel of the system.
This paper presents a new cryptosystem based on chaotic continuous cellular automata (CCA) to increase data protection as demonstrated by their flexibility to encrypt and decrypt information from distinct sources. Enh...
详细信息
This paper presents a new cryptosystem based on chaotic continuous cellular automata (CCA) to increase data protection as demonstrated by their flexibility to encrypt and decrypt information from distinct sources. Enhancements in cryptosystems are also presented including (i) the model based on a new chaotic CCA attractor, (ii) the dynamical integration of modules containing dynamical systems to have more complex sequences, and (iii) an enhancement for symmetric cryptosystems by allowing them to generate an infinite number of keys. This paper also presents a process of mixing chaotic sequences obtained from cellular automata, instead of using differential equations, as a basis to achieve higher security and high speed for the encryption and decryption processes using dynamical modular cryptosystems than other recent approaches. The complexity of the mixed sequences is measured using the variance fractal dimension trajectory to compare them with the realization of an unmixed chaotic sequence to verify that the former are more complex. This type of multiscale measure and evaluation never has been done in the past outside this research group.
Internet of Things applications using RFID sensors are a challenging task due to the limited capacity of ***,energy efficient control has become more critical design with RFID sensor integrating complex tag identifica...
详细信息
Internet of Things applications using RFID sensors are a challenging task due to the limited capacity of ***,energy efficient control has become more critical design with RFID sensor integrating complex tag identification processing *** works on power efficient control in multiple RFID tags identification systems often design tag anti-collision protocols in identification process,and seldom consider the features of tags are able to detect energy within its radio rang among each *** paper is dedicated to developing a share energy provisioning(SEP) strategy for energy-limited multiple RFID tag identification ***,SEP can dynamically adapt the variable energy resources due to the cognitive radio ***,SEP combines the energy control with tags groups in wait time T,through classifying the tag into different groups according to its ***,it introduces the optimization theoretical analysis energy for multiple RFID tags identification system,so as to minimize the time and energy of it takes to send tags data to ***,it shares the energy resource as different energy harvest under energylimited RFID *** results demonstrate the energy efficiency of the proposed approach.
Statistics cognitive diagnostic methods were complex and could not judge cognitive bugs very well. To solve this problem, a hybrid method combining principal component analysis, self-organizing feather map and probabi...
详细信息
Fast Fourier Transform (FFT) is an efficient algorithm to compute the Discrete Fourier Transform (DFT). In many applications the input data are purely real-time, and efficient FFT can satisfy the situation. FFT algori...
详细信息
This paper focuses on a novel methodological framework for converting a Fuzzy cognitive Map into a network of rule-based Fuzzy Inference Systems. Furthermore, it allows to obtain a crisp value representing an arbitrar...
详细信息
ISBN:
(纸本)9783642132070
This paper focuses on a novel methodological framework for converting a Fuzzy cognitive Map into a network of rule-based Fuzzy Inference Systems. Furthermore, it allows to obtain a crisp value representing an arbitrary parameter of the complex system's model. This way the system provides a quantitative answer without employing an exact mathematical model. This paper also outlines a first possible application area: the valuation of investments in high-technology ventures. A field in which usually conventional quantitative and retrospective measures usually do not deliver satisfying results due to the complexity of future-oriented risk prognosis and the lack of quantitative data.
In a clinical context, dementia refers to a syndrome of acquired cognitive deterioration that can be associated with various potential stages of the disease. The two most common variations of this disease are Alzheime...
详细信息
暂无评论