24,633 research outputs found

    IEEE Access special section editorial: Artificial intelligence enabled networking

    Get PDF
    With today’s computer networks becoming increasingly dynamic, heterogeneous, and complex, there is great interest in deploying artificial intelligence (AI) based techniques for optimization and management of computer networks. AI techniques—that subsume multidisciplinary techniques from machine learning, optimization theory, game theory, control theory, and meta-heuristics—have long been applied to optimize computer networks in many diverse settings. Such an approach is gaining increased traction with the emergence of novel networking paradigms that promise to simplify network management (e.g., cloud computing, network functions virtualization, and software-defined networking) and provide intelligent services (e.g., future 5G mobile networks). Looking ahead, greater integration of AI into networking architectures can help develop a future vision of cognitive networks that will show network-wide intelligent behavior to solve problems of network heterogeneity, performance, and quality of service (QoS)

    Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems

    Get PDF
    Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security assurance are currently two major challenges of Cloud-based systems. GDPR compliance implies both privacy and security mechanisms definition, enforcement and control, including evidence collection. This paper presents a novel DevOps framework aimed at supporting Cloud consumers in designing, deploying and operating (multi)Cloud systems that include the necessary privacy and security controls for ensuring transparency to end-users, third parties in service provision (if any) and law enforcement authorities. The framework relies on the risk-driven specification at design time of privacy and security level objectives in the system Service Level Agreement (SLA) and in their continuous monitoring and enforcement at runtime.The research leading to these results has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 644429 and No 780351, MUSA project and ENACT project, respectively. We would also like to acknowledge all the members of the MUSA Consortium and ENACT Consortium for their valuable help

    Introduction to Nuclear Propulsion: Lecture 15 - Nuclear Test Operations

    Get PDF
    The test operation of nuclear power plants, specifically nuclear rockets, bears some interesting similarities to the operation of chemical rocket tests as well as, of course, many differences. A significant feature common to both nuclear and chemical rocket tests is that all the fuel for the entire operation is loaded at the start of the test. As a direct consequence of this fact, the operation of nuclear power plants must be surrounded with adequate safety precautions, as is indeed the case in the operation of chemical rockets, A second direct consequence is that in both types of testing a very thorough and complete checkout is made before starting the test

    High Accuracy Phishing Detection Based on Convolutional Neural Networks

    Get PDF
    The persistent growth in phishing and the rising volume of phishing websites has led to individuals and organizations worldwide becoming increasingly exposed to various cyber-attacks. Consequently, more effective phishing detection is required for improved cyber defence. Hence, in this paper we present a deep learning-based approach to enable high accuracy detection of phishing sites. The proposed approach utilizes convolutional neural networks (CNN) for high accuracy classification to distinguish genuine sites from phishing sites. We evaluate the models using a dataset obtained from 6,157 genuine and 4,898 phishing websites. Based on the results of extensive experiments, our CNN based models proved to be highly effective in detecting unknown phishing sites. Furthermore, the CNN based approach performed better than traditional machine learning classifiers evaluated on the same dataset, reaching 98.2% phishing detection rate with an F1-score of 0.976. The method presented in this pa-per compares favourably to the state-of-the art in deep learning based phishing website detection

    Price dynamics and trading volume: A semiparametric approach

    Get PDF
    In this paper we investigate the relation between price impact and trading volume for a sample of stocks listed on the New York Stock Exchange. The parametric VAR-models that have been used in the literature impose strong proportionality and symmetry restrictions on the price impact of trades, although market microstructure theory provides many reasons why these restrictions would not hold. We analyze a more flexible semiparametric partially linear specification and establish significant evidence for a nonlinear, asymmetric, increasing, and concave relation between trading volume and both immediate and persistent price impact. Moreover, we compare the price-impact functions obtained in the partially linear model to the ones generated by the parametric models and show that there are considerable differences. We test the parametric specifications against the partially linear model and show that the parametric models are rejected in favor of the semiparametric model. We also test the partially linear model against a more flexible fully nonparametric specification and show that this test does not reject the partially linear model

    Technologies and solutions for location-based services in smart cities: past, present, and future

    Get PDF
    Location-based services (LBS) in smart cities have drastically altered the way cities operate, giving a new dimension to the life of citizens. LBS rely on location of a device, where proximity estimation remains at its core. The applications of LBS range from social networking and marketing to vehicle-toeverything communications. In many of these applications, there is an increasing need and trend to learn the physical distance between nearby devices. This paper elaborates upon the current needs of proximity estimation in LBS and compares them against the available Localization and Proximity (LP) finding technologies (LP technologies in short). These technologies are compared for their accuracies and performance based on various different parameters, including latency, energy consumption, security, complexity, and throughput. Hereafter, a classification of these technologies, based on various different smart city applications, is presented. Finally, we discuss some emerging LP technologies that enable proximity estimation in LBS and present some future research areas
    • …
    corecore