3,214 research outputs found

    A new class of multiscale lattice cell (MLC) models for spatio-temporal evolutionary image representation

    Get PDF
    Spatio-temporal evolutionary (STE) images are a class of complex dynamical systems that evolve over both space and time. With increased interest in the investigation of nonlinear complex phenomena, especially spatio-temporal behaviour governed by evolutionary laws that are dependent on both spatial and temporal dimensions, there has been an increased need to investigate model identification methods for this class of complex systems. Compared with pure temporal processes, the identification of spatio-temporal models from observed images is much more difficult and quite challenging. Starting with an assumption that there is no apriori information about the true model but only observed data are available, this study introduces a new class of multiscale lattice cell (MLC) models to represent the rules of the associated spatio-temporal evolutionary system. An application to a chemical reaction exhibiting a spatio-temporal evolutionary behaviour, is investigated to demonstrate the new modelling framework

    Deteksi Serangan Denial of Service pada Internet of Things Menggunakan Finite-State Automata

    Get PDF
    Internet of things memiliki kemampuan untuk menghubungkan obyek pintar dan memungkinkan mereka untuk berinteraksi dengan lingkungan dan peralatan komputasi cerdas lainnya melalui jaringan internet. Namun belakangan ini, keamanan jaringan internet of things mendapat ancaman akibat serangan cyber yang dapat menembus perangkat internet of things target dengan menggunakan berbagai serangan denial of service. Penelitian ini bertujuan untuk mendeteksi dan mencegah serangan denial of service berupa synchronize flooding dan ping flooding pada jaringan internet of things dengan pendekatan finite-state automata. Hasil pengujian menunjukkan bahwa pendekatan finite-state automata berhasil mendeteksi serangan synchronize flooding dan ping flooding pada jaringan internet of things, tetapi pencegahan serangan tidak secara signifikan mengurangi penggunaan prosesor dan memori. Serangan synchronize flooding menyebabkan delay saat mengaktifkan/menonaktifkan peralatan internet of things sedangkan serangan ping flooding menyebabkan error. Implementasi bash-iptables berhasil mengurangi serangan synchronize flooding dengan efisiensi waktu pencegahan sebesar 55,37% dan mengurangi serangan ping flooding sebesar 60% tetapi dengan waktu yang tidak signifikan

    Quantum automata, braid group and link polynomials

    Full text link
    The spin--network quantum simulator model, which essentially encodes the (quantum deformed) SU(2) Racah--Wigner tensor algebra, is particularly suitable to address problems arising in low dimensional topology and group theory. In this combinatorial framework we implement families of finite--states and discrete--time quantum automata capable of accepting the language generated by the braid group, and whose transition amplitudes are colored Jones polynomials. The automaton calculation of the polynomial of (the plat closure of) a link L on 2N strands at any fixed root of unity is shown to be bounded from above by a linear function of the number of crossings of the link, on the one hand, and polynomially bounded in terms of the braid index 2N, on the other. The growth rate of the time complexity function in terms of the integer k appearing in the root of unity q can be estimated to be (polynomially) bounded by resorting to the field theoretical background given by the Chern-Simons theory.Comment: Latex, 36 pages, 11 figure

    Image-based quantitative analysis of gold immunochromatographic strip via cellular neural network approach

    Get PDF
    "(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works."Gold immunochromatographic strip assay provides a rapid, simple, single-copy and on-site way to detect the presence or absence of the target analyte. This paper aims to develop a method for accurately segmenting the test line and control line of the gold immunochromatographic strip (GICS) image for quantitatively determining the trace concentrations in the specimen, which can lead to more functional information than the traditional qualitative or semi-quantitative strip assay. The canny operator as well as the mathematical morphology method is used to detect and extract the GICS reading-window. Then, the test line and control line of the GICS reading-window are segmented by the cellular neural network (CNN) algorithm, where the template parameters of the CNN are designed by the switching particle swarm optimization (SPSO) algorithm for improving the performance of the CNN. It is shown that the SPSO-based CNN offers a robust method for accurately segmenting the test and control lines, and therefore serves as a novel image methodology for the interpretation of GICS. Furthermore, quantitative comparison is carried out among four algorithms in terms of the peak signal-to-noise ratio. It is concluded that the proposed CNN algorithm gives higher accuracy and the CNN is capable of parallelism and analog very-large-scale integration implementation within a remarkably efficient time

    Review on DNA Cryptography

    Get PDF
    Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods. In the modern era of e-business and e-commerce the protection of confidentiality, integrity and availability (CIA triad) of stored information as well as of transmitted data is very crucial. DNA molecules, having the capacity to store, process and transmit information, inspires the idea of DNA cryptography. This combination of the chemical characteristics of biological DNA sequences and classical cryptography ensures the non-vulnerable transmission of data. In this paper we have reviewed the present state of art of DNA cryptography.Comment: 31 pages, 12 figures, 6 table
    • …
    corecore