Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "network key" wg kryterium: Temat


Wyświetlanie 1-5 z 5
Tytuł:
Safety mechanisms of ZigBee technology for safety-related industrial applications
Autorzy:
Ondrasina, T.
Franekova, M.
Powiązania:
https://bibliotekanauki.pl/articles/393880.pdf
Data publikacji:
2011
Wydawca:
Polskie Stowarzyszenie Telematyki Transportu
Tematy:
kryptoanaliza
ZigBee
klucz sieciowy
bezpieczeństwo sieci
technologia bezprzewodowa
Bluetooth
cryptoanalysis
network key
network safety
wireless technology
Opis:
Authors describe the possibilities of a wireless technology used within safety-critical applications with orientation to selection the computationally safety cryptography techniques. Undetected corruption of data transmission can cause substantially considerable damages within equipments, environments or demands on human health and this is reason why systems have to be designed so that guarantee required Safety Integrity Level. For this reason the safety-related wire or wireless machines must have implemented a number of safety mechanisms located into special safety or security profiles. Nowadays, after acceptation of the new standard ISA 100.11a the barrier was broken towards the use of wireless machine-to-machine communications in standard and safety-related communication, too. ZigBee technology is very accepted standard which fulfils the requirements to the wireless industrial communication system. The main part of the paper describes the possible attacks to ZigBee communications based on cryptography mechanisms with orientation to Denial-of-Service attack. The practical part contains the results of ZigBee sensor network testing in laboratory conditions with demonstration of error-control mechanisms of MESH topology and cryptoanalytic’s attacks based on monitoring of traffic are mentioned as well.
Źródło:
Archives of Transport System Telematics; 2011, 4, 2; 43-47
1899-8208
Pojawia się w:
Archives of Transport System Telematics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Value For Clients Resulting From Rail Transport Market Regulation In Poland
Autorzy:
Antonowicz, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/417376.pdf
Data publikacji:
2014-12-15
Wydawca:
Akademia Leona Koźmińskiego w Warszawie
Tematy:
market
market regulation
key facilities
value
network
Opis:
Purpose: The aim of this study was to elucidate the role of regulation as a tool to create values for both business entities and individual clients due to competition development in the Polish market of rail transport services. Methodology: This study was of a conceptual character. It was based on the analysis of the notion of the rail transport services regulation and the main regulation problems that have appeared in the rail transport regulation practice so far. The analysis of literary sources as well as practice enabled the author to highlight the circumstances when the regulation becomes a necessity and to discuss the conditions for its introduction. Findings: Reviewing the regulation on Polish railway transportation market, the author presents a fundamental conclusion - despite all the changes on the market, regulation does not produce assumed results perceived as an increase of transportation role in economy. According to author, major improvement of institutional and marketing efficiency of regulation entity is essential, as it is relevant for producing favorable results concerning the way the market operates, behavior of the market players as well as building customer value. Originality: Market regulation is a new phenomenon in Polish rail transport. The study discussed the notion of regulatory service. A value-for-clients model was also offered, i.e. the clients of regulatory activities in the course of the competition development in the rail transport services.
Źródło:
Management and Business Administration. Central Europe; 2014, 22, 4; 168-178
2084-3356
Pojawia się w:
Management and Business Administration. Central Europe
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A single upper limb pose estimation method based on the improved stacked hourglass network
Autorzy:
Peng, Gang
Zheng, Yuezhi
Li, Jianfeng
Yang, Jin
Powiązania:
https://bibliotekanauki.pl/articles/1838179.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
convolutional neural network
stacked hourglass network
skeleton key point
single upper limb pose estimation
human machine coordination
Opis:
At present, most high-accuracy single-person pose estimation methods have high computational complexity and insufficient real-time performance due to the complex structure of the network model. However, a single-person pose estimation method with high real-time performance also needs to improve its accuracy due to the simple structure of the network model. It is currently difficult to achieve both high accuracy and real-time performance in single-person pose estimation. For use in human–machine cooperative operations, this paper proposes a single-person upper limb pose estimation method based on an end-to-end approach for accurate and real-time limb pose estimation. Using the stacked hourglass network model, a single-person upper limb skeleton key point detection model is designed. A deconvolution layer is employed to replace the up-sampling operation of the hourglass module in the original model, solving the problem of rough feature maps. Integral regression is used to calculate the position coordinates of key points of the skeleton, reducing quantization errors and calculations. Experiments show that the developed single-person upper limb skeleton key point detection model achieves high accuracy and that the pose estimation method based on the end-to-end approach provides high accuracy and real-time performance.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2021, 31, 1; 123-133
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An identity-based broadcast encryption scheme for mobile ad hoc networks
Autorzy:
Ng, C. Y.
Mu, Y.
Susilo, W.
Powiązania:
https://bibliotekanauki.pl/articles/309104.pdf
Data publikacji:
2006
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
dynamic mobile ad hoc network
identity-based
non-interactive
secure communication protocol
group key management
Opis:
Dynamic ad hoc networks facilitate interconnections between mobile devices without the support of any network infrastructure. In this paper, we propose a secure identity-based ad hoc protocol for mobile devices to construct a group key for a setup of a secure communication network in an efficient way and support dynamic changing of network topology. Unlike group key management protocols proposed previously in the literature, mobile devices can use our protocol to construct the group key by observing the others' identity, like the MAC address, which distinguishes the device from the others. In contrast to other interactive protocols, we only need one broadcast to setup the group key and member removal is also highly efficient. Finally, we discuss the security issues and provide security proofs for our protocol.
Źródło:
Journal of Telecommunications and Information Technology; 2006, 1; 24-29
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Practical Approach to IP Scheduled Throughput Measurements in Dual Connectivity Systems
Autorzy:
Zięba, Arkadiusz
Kollar, Martin
Tatarczyk, Krzysztof
Sadowski, Jarosław
Powiązania:
https://bibliotekanauki.pl/articles/27311949.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
IP Scheduled Throughput
distributed system
Edge computing
cloud
Long Term Evolution (LTE)
Evolved Universal Terrestrial Radio Access Network (E-UTRAN)
Carrier aggregation (CA)
UE Throughput
Key Performance Indicator (KPI)
Quality of Experience (QoE)
quality of service (QoS)
Opis:
IP scheduled throughput defined according to 3GPP TS 36.314 reflects user throughput regardless of traffic characteristics, and therefore has become one of the most important indicators for monitoring Quality of Service (QoS) of the end user in Evolved Universal Terrestrial Radio Access Network (E-UTRAN). However, networks built on a distributed architecture make the above definition impossible to be applied directly due to the implementation challenges. This paper gives an overview of the classical Long Term Evolution (LTE) architecture as opposed to Dual Connectivity (DC) topology and focuses on a novel method of solving the calculation issue with the IP scheduled throughput measurement in edge computing environment. Experimental results show a good agreement with the real end user perception.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 4; 645--654
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-5 z 5

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies