75 resultados para Network-based positioning
Resumo:
A neural network based tool has been developed to assist in the process of code transformation. The tool offers advice on appropriate transformations within a knowledge-driven, semi-automatic parallelisation environment. We have identified the essential characteristics of codes relevant to loop transformations. A Kohonen network is used to discover structure in the characterised codes thus revealing new knowledge that may be brought to bear on the mapping between codes and transformations or transformation sequences. A transform selector based on this process has been developed and successfully applied to the parallelisation of sequential codes.
Resumo:
In this paper, a Radial Basis Function neural network based AVR is proposed. A control strategy which generates local linear models from a global neural model on-line is used to derive controller feedback gains based on the Generalised Minimum Variance technique. Testing is carried out on a micromachine system which enables evaluation of practical implementation of the scheme. Constraints imposed by gathering training data, computational load, and memory requirements for the training algorithm are addressed.
Resumo:
The purpose of this study is to compare the inferability of various synthetic as well as real biological regulatory networks. In order to assess differences we apply local network-based measures. That means, instead of applying global measures, we investigate and assess an inference algorithm locally, on the level of individual edges and subnetworks. We demonstrate the behaviour of our local network-based measures with respect to different regulatory networks by conducting large-scale simulations. As inference algorithm we use exemplarily ARACNE. The results from our exploratory analysis allow us not only to gain new insights into the strength and weakness of an inference algorithm with respect to characteristics of different regulatory networks, but also to obtain information that could be used to design novel problem-specific statistical estimators.
Resumo:
The purpose of this article is twofold. First, we introduce a novel definition of financial networks obtained from time series data from the stock market. Second, we demonstrate that these networks can be used as an index with the property to reflect critical states of the market, respectively, crashes sufficiently. Our work aims to advocate a network-based analysis in the context of the stock market, because such a collective phenomenon can not only be economically described by networks but also analyzed as demonstrated in this article. (C) 2010 Wiley Periodicals, Inc. Complexity 16: 24-33, 2010
Resumo:
A hydrolyzable model network comprising interconnected star polymers was prepared by the sequential group transfer polymerization of methyl methacrylate and the acid-labile diacetal-based dimethacrylate crosslinker bis[(2-methacryloyloxy)ethoxymethyl] ether. in contrast to other polymer networks previously synthesized by our group, all the branching points of this polymer network were found to hydrolyze under mildly acidic conditions, giving a linear copolymer with the theoretically expected molecular weight and composition. The ease of hydrolysis of this polymer network renders it a good candidate for use in the biomedical field. The characterization of the synthesized network, its linear and star polymer precursors and the hydrolysis products of the network and its precursors, by a variety of techniques, established the successful synthesis and hydrolysis of this well-defined polymer nanostructure.
Resumo:
While virtualisation can provide many benefits to a networks infrastructure, securing the virtualised environment is a big challenge. The security of a fully virtualised solution is dependent on the security of each of its underlying components, such as the hypervisor, guest operating systems and storage.
This paper presents a single security service running on the hypervisor that could potentially work to provide security service to all virtual machines running on the system. This paper presents a hypervisor hosted framework which performs specialised security tasks for all underlying virtual machines to protect against any malicious attacks by passively analysing the network traffic of VMs. This framework has been implemented using Xen Server and has been evaluated by detecting a Zeus Server setup and infected clients, distributed over a number of virtual machines. This framework is capable of detecting and identifying all infected VMs with no false positive or false negative detection.
Resumo:
Masked implementations of cryptographic algorithms are often used in commercial embedded cryptographic devices to increase their resistance to side channel attacks. In this work we show how neural networks can be used to both identify the mask value, and to subsequently identify the secret key value with a single attack trace with high probability. We propose the use of a pre-processing step using principal component analysis (PCA) to significantly increase the success of the attack. We have developed a classifier that can correctly identify the mask for each trace, hence removing the security provided by that mask and reducing the attack to being equivalent to an attack against an unprotected implementation. The attack is performed on the freely available differential power analysis (DPA) contest data set to allow our work to be easily reproducible. We show that neural networks allow for a robust and efficient classification in the context of side-channel attacks.