2,235,237 Hits in 4.7 sec

Key to Network Controllability [article]

Soumya Jyoti Banerjee, Soumen Roy
2012 arXiv   pre-print
Liu et al recently proposed a minimum number of driver nodes needed to obtain full structural controllability over a directed network.  ...  Their most important assertion is that a system's controllability is to a great extent encoded by the underlying network's degree distribution, P(k_in, k_out).  ...  Liu et. al. recently proposed a minimum number of driver nodes, N D , needed to obtain full structural controllability over a directed network [1] .  ... 
arXiv:1209.3737v1 fatcat:rh2kd2d2c5e4fi2gohpw3jzomy

Transitional Behavior of q-Composite Random Key Graphs with Applications to Networked Control [article]

Jun Zhao
2017 arXiv   pre-print
Our studies of these four properties are motivated by a detailed discussion of their applications to networked control.  ...  These results provide fundamental guidelines to design secure sensor networks for different control-related applications: distributed in-network parameter estimation, fault-tolerant consensus, and resilient  ...  APPLYING THE STUDIED PROPERTIES OF RANDOM KEY GRAPHS TO NETWORKED CONTROL Below we discuss the applications of the studied properties in random key graphs to networked control. A.  ... 
arXiv:1708.08313v1 fatcat:5hxmiewadzeafia4vna7mpwkay

Comparative Research on Key Technologies from IPv4, IPv6 to IPV9

Sun Huai, Liu Zhang
2019 International Journal of Advanced Network, Monitoring, and Controls  
IPV9 masters "the right to control the use of the Internet, the allocation of IP addresses, the initiative of information monitoring, the right to use routing protocols, and the ownership of technology  ...  Later, DDNS was introduced and gradually developed into an IPV9 decimal network with a 256-bit address.  ...  Because with the development of security technology, the security method and key length will continue to change, so the development of security technology will eventually lead to the redesign of IP addresses  ... 
doi:10.21307/ijanmc-2019-062 fatcat:cdt3v63qlrbojl322axhcf7usi

Transcriptome and metabolome analysis reveals regulatory networks and key genes controlling barley malting quality in responses to drought stress

Ye Hong, Sheng-Jing Ni, Guo-Ping Zhang
2020 Plant physiology and biochemistry (Paris)  
Transcriptome comparisons and weighted correlation network analysis (WGCNA) identified some key genes regulating the responses of malting quality traits to drought stress, such as RLK-LRR, β-glucosidase  ...  We made transcriptome and metabolome analysis on the developing grains of two barley genotypes differing in the responses to drought stress.  ...  WGCNA analysis and identification of key genes For completely understanding the expression of the genes responding to drought stress during grain filling, weighted correlation network analysis (WGCNA)  ... 
doi:10.1016/j.plaphy.2020.04.029 pmid:32361397 fatcat:sjjyrge33jbxlc5rmk7xhbdtv4

M Channel KCNQ2 Subunits Are Localized to Key Sites for Control of Neuronal Network Oscillations and Synchronization in Mouse Brain

Edward C. Cooper, Emily Harrington, Yuh Nung Jan, Lily Y. Jan
2001 Journal of Neuroscience  
We show that KCNQ2N immunoreactivity, although widespread, is particularly concentrated at key sites for control of rhythmic neuronal activity and synchronization.  ...  We found that KCNQ2 immunoreactivity, although widespread, is concentrated at key locations for control of brain rhythmic activity and neuronal synchronization. MATERIALS AND METHODS Materials.  ... 
doi:10.1523/jneurosci.21-24-09529.2001 pmid:11739564 fatcat:ho4mar3novfwdi356fq6y737s4

Ensemble artificial neural networks applied to predict the key risk factors of hip bone fracture for elders

Quan Liu, Xingran Cui, Yuan-Chao Chou, Maysam F. Abbod, Jinn Lin, Jiann-Shing Shieh
2015 Biomedical Signal Processing and Control  
Three-layer back-propagation Artificial Neural Networks (ANN) models were applied for females and males separately in this study to predict the risk of hip bone fracture for elders.  ...  Three-layer back-propagation Artificial Neural Networks (ANN) models were applied for females and males separately in this study to predict the risk of hip bone fracture for elders.  ...  ., 2004) , which is simple and effective in identifying key variables.  ... 
doi:10.1016/j.bspc.2015.06.002 fatcat:q6vegvbounhovcyn37auhskkcq

Secure key distribution with salr using wireless sensor network The major factors that lift the competence of Service Oriented Wireless Sensor Networks are Congestion control and transferring data securely. It is desirable to alter the routing and security outlines adaptively in order to retort effectually to the swiftly fluctuating Network State. Adding complexities to the routing and security schemes increases end to end delay which is not acceptable in service oriented wireless sensor networks. In this p ...

2017 International Journal of Latest Trends in Engineering and Technology  
The more modern networks are bi-directional, also enabling control of sensor activity.  ...  Abstract-The major factors that lift the competence of Service Oriented Wireless Sensor Networks are Congestion control and transferring data securely.  ...  CONCLUSION This paper successfully incorporate all the features mentioned, to a prototype model "secure key distribution with SALR using wireless sensor network".  ... 
doi:10.21172/1.91.07 fatcat:szmsib4mfvh7booqhk53vqwkhy

Combined Keys Control Methods to Extrapolate the Duration of Wireless Sensor Networks

K Vimal, Kumar Stephen
2017 Mathivanan V International Journal of Innovations & Advancement in Computer Science   unpublished
Wireless senor networks are widely applied in many fields such as disaster management, habitat monitoring and Traffic Control.  ...  Key management is one of the fundamental protocols to build a secure WSN. In this paper, we propose a lightweight key management scheme for combined WSN. A WSN typically has no infrastructure.  ...  to network partition.  ... 

An Improvement on the Self-Verification Authentication Mechanism for A Mobile Satellite Communication System

Chin-Ling Chen, Kai-Wen Cheng, Young-Long Chen, Ing-Chau Chang, Cheng-Chi Lee
2014 Applied Mathematics & Information Sciences  
Hence, we propose a novel scheme to improve the mobile user's communication protocol to enhance security.  ...  In 2009, Chen et al. proposed a satellite communication system for mobile devices to achieve wide communication.  ...  s scheme, the network control center stores the mobile user's identity, U ID that the attacker can utilize to construct a master key, key = h(w, r) and a session key, sk = h(key, T ID )to impersonate  ... 
doi:10.12785/amis/081l13 fatcat:3sozq67vnffbvcgedndowx5h5i

Quantum-Key-Distribution (QKD) Networks Enabled by Software-Defined Networks (SDN)

Hua Wang, Yongli Zhao, Avishek Nag
2019 Applied Sciences  
Thus, QKD networks need an effective management plane to control and coordinate with the QKD resources.  ...  As a promising technology, software defined networking (SDN) can separate the control and management of QKD networks from the actual forwarding of the quantum keys.  ...  This layer may include one controller or multiple controllers to implement network management over QKD layer and open network capabilities for various applications.  ... 
doi:10.3390/app9102081 fatcat:iaxgrmny3bf3dhxjpijujjhmny

On-demand Key Distribution for Cloud Networks

Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh, Martin Hell
2021 2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)  
In this demo, we present a novel key provisioning mechanism for cloud networks that unlocks scalable use of symmetric keys and significantly reduces the related computational load on network endpoints.  ...  Operators can use novel virtual execution environments with ever lower overhead: from virtual machines to containers, to unikernels and serverless functions.  ...  The rationale for shifting the task of key generation from endpoints to a dedicated component integrated in the network control is as follows.  ... 
doi:10.1109/icin51074.2021.9385528 fatcat:5k4k6lg4gjgxbjzi3adn5tyy6e

Cluster based Key Management in Wireless Sensor Networks [article]

Anvesh Aileni
2010 arXiv   pre-print
In addition, efficient ways of key distribution among the nodes within the cluster and among controllers of each cluster are discussed.  ...  The security of the entire network through efficient key management by taking into consideration the network's power capabilities is discussed.  ...  Also, main controller will do the work similar to that of sub controller in distributing the keys among sub controllers.  ... 
arXiv:1010.4816v1 fatcat:fbcr2mcccbh3hphcq5brftzwty

A Design of Secure Communication Architecture Applying Quantum Cryptography

Kyu-Seok Shim, Yong-Hwan Kim, Wonhyuk Lee
2022 Journal of Information Science Theory and Practice  
key management system (QKMS) and a Q-controller to efficiently operate the network.  ...  This paper presents the functional requirements of QKMS and Q-Controller, which can be utilized to perform efficient network resource management.  ...  To overcome these drawbacks, we propose a QKD network structure that uses a quantum key management system (QKMS) and a Q-controller system.  ... 
doi:10.1633/jistap.2022.10.s.12 doaj:c4c98b36f0464196a55cf7ca82ac6b01 fatcat:aecmx3yptjd5zb6aokjqur6vay

Securing network access in wireless sensor networks

Kun Sun, An Liu, Roger Xu, Peng Ning, Douglas Maughan
2009 Proceedings of the second ACM conference on Wireless network security - WiSec '09  
This paper makes three contributions: First, it develops a network admission control subsystem using Elliptic Curve public key cryptosystem to add new sensor nodes into a sensor network.  ...  The third contribution is an implementation of a stateless group key update scheme to update a network-wide secret key in a sensor network.  ...  Then we use this pairwise key to distribute the current group key used in the network from the controller node to the new node.  ... 
doi:10.1145/1514274.1514310 dblp:conf/wisec/SunLXNM09 fatcat:evvhhufp3zfzthdi57k3z6xkfy

A Hybrid Cryptography and Authentication based Security Model for Clustered WBAN

Aarti Sangwan, Partha Pratim Bhattacharya
The RSA is here applied for node to controller for identification and verification whereas SHA is applied for reliable symmetric message encoding for node-to-controller and controller-to-controller communication  ...  The proposed security model is applied in an integrated form to the clustered WBAN network to improve communication reliability.  ...  The private key is stored in the controller itself and the public key is assigned to the WBAN node.  ... 
doi:10.26782/jmcms.2018.04.00003 fatcat:ivq5k5uo2ne47oje35jjikyahu
« Previous Showing results 1 — 15 out of 2,235,237 results