98 research outputs found
Signalling Storms in 3G Mobile Networks
We review the characteristics of signalling storms that have been caused by
certain common apps and recently observed in cellular networks, leading to
system outages. We then develop a mathematical model of a mobile user's
signalling behaviour which focuses on the potential of causing such storms, and
represent it by a large Markov chain. The analysis of this model allows us to
determine the key parameters of mobile user device behaviour that can lead to
signalling storms. We then identify the parameter values that will lead to
worst case load for the network itself in the presence of such storms. This
leads to explicit results regarding the manner in which individual mobile
behaviour can cause overload conditions on the network and its signalling
servers, and provides insight into how this may be avoided.Comment: IEEE ICC 2014 - Communications and Information Systems Security
Symposiu
Semantic Sentiment Analysis of Twitter Data
Internet and the proliferation of smart mobile devices have changed the way
information is created, shared, and spreads, e.g., microblogs such as Twitter,
weblogs such as LiveJournal, social networks such as Facebook, and instant
messengers such as Skype and WhatsApp are now commonly used to share thoughts
and opinions about anything in the surrounding world. This has resulted in the
proliferation of social media content, thus creating new opportunities to study
public opinion at a scale that was never possible before. Naturally, this
abundance of data has quickly attracted business and research interest from
various fields including marketing, political science, and social studies,
among many others, which are interested in questions like these: Do people like
the new Apple Watch? Do Americans support ObamaCare? How do Scottish feel about
the Brexit? Answering these questions requires studying the sentiment of
opinions people express in social media, which has given rise to the fast
growth of the field of sentiment analysis in social media, with Twitter being
especially popular for research due to its scale, representativeness, variety
of topics discussed, as well as ease of public access to its messages. Here we
present an overview of work on sentiment analysis on Twitter.Comment: Microblog sentiment analysis; Twitter opinion mining; In the
Encyclopedia on Social Network Analysis and Mining (ESNAM), Second edition.
201
Security in Computer and Information Sciences
This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021. The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, software systems, Internet of Things, health informatics systems, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures. This is an open access book
A statistical model for brain networks inferred from large-scale electrophysiological signals
Network science has been extensively developed to characterize structural
properties of complex systems, including brain networks inferred from
neuroimaging data. As a result of the inference process, networks estimated
from experimentally obtained biological data, represent one instance of a
larger number of realizations with similar intrinsic topology. A modeling
approach is therefore needed to support statistical inference on the bottom-up
local connectivity mechanisms influencing the formation of the estimated brain
networks. We adopted a statistical model based on exponential random graphs
(ERGM) to reproduce brain networks, or connectomes, estimated by spectral
coherence between high-density electroencephalographic (EEG) signals. We
validated this approach in a dataset of 108 healthy subjects during eyes-open
(EO) and eyes-closed (EC) resting-state conditions. Results showed that the
tendency to form triangles and stars, reflecting clustering and node
centrality, better explained the global properties of the EEG connectomes as
compared to other combinations of graph metrics. Synthetic networks generated
by this model configuration replicated the characteristic differences found in
brain networks, with EO eliciting significantly higher segregation in the alpha
frequency band (8-13 Hz) as compared to EC. Furthermore, the fitted ERGM
parameter values provided complementary information showing that clustering
connections are significantly more represented from EC to EO in the alpha
range, but also in the beta band (14-29 Hz), which is known to play a crucial
role in cortical processing of visual input and externally oriented attention.
These findings support the current view of the brain functional segregation and
integration in terms of modules and hubs, and provide a statistical approach to
extract new information on the (re)organizational mechanisms in healthy and
diseased brains.Comment: Due to the limitation "The abstract field cannot be longer than 1,920
characters", the abstract appearing here is slightly shorter than that in the
PDF fil
A guided tour of asynchronous cellular automata
Research on asynchronous cellular automata has received a great amount of
attention these last years and has turned to a thriving field. We survey the
recent research that has been carried out on this topic and present a wide
state of the art where computing and modelling issues are both represented.Comment: To appear in the Journal of Cellular Automat
Strengthening the security of cognitive packet networks
Route selection in cognitive packet networks (CPNs) occurs continuously for active flows and is driven by the users' choice of a quality of service (QoS) goal. Because routing occurs concurrently to packet forwarding, CPN flows are able to better deal with unexpected variations in network status, while still achieving the desired QoS. Random neural networks (RNNs) play a key role in CPN routing and are responsible to the next-hop decision making of CPN packets. By using reinforcement learning, RNNs' weights are continuously updated based on expected QoS goals and information that is collected by packets as they travel on the network experiencing the current network conditions. CPN's QoS performance had been extensively investigated for a variety of operating conditions. Its dynamic and self-adaptive properties make them suitable for withstanding availability attacks, such as those caused by worm propagation and denial-of-service attacks. However, security weaknesses related to confidentiality and integrity attacks have not been previously examined. Here, we look at related network security threats and propose mechanisms that could enhance the resilience of CPN to confidentiality, integrity and availability attacks
Performance optimization with energy packets
We investigate how the flow of energy and the flow of jobs in a service system can be used to minimize the average response time to jobs that arrive according to random arrival processes at the servers. An interconnected system of workstations and energy storage units that are fed with randomly arriving harvested energy is analyzed by means of the Energy Packet Network (EPN) model. The system state is discretized, and uses discrete units to represent the backlog of jobs at the workstations, and the amount of energy that is available at the energy storage units. An Energy Packet (EP) which is the unit of energy, can be used to process one or more jobs at a workstation, and an EP can also be expended to move a job from one workstation to another one. The system is modeled as a probabilistic network that has a product-form solution for the equilibrium probability distribution of system state. The EPN model is used to solve two problems related to using the flow of energy and jobs in a multi-server system, so as to minimize the average response time experienced by the jobs that arrive at the system
- …