Research on Authentication-Based Security Technology for Complex Networks

2012 ◽  
Vol 232 ◽  
pp. 701-705
Author(s):  
Yi Li ◽  
Dong Liu ◽  
Bo Wang ◽  
Xin Ming Li

The concept of authentication network is proposed to solve the security problems of complex network. The basic idea of authentication network is to ensure that everything of network must be authenticated. The technologies about authentication node, including the trusted root and trusted chain are studied. The security technologies about authentication networks, including trusted transmission, distributed and tree authentication management, multistage and multilayer access control strategy are also researched. At last, the security abilities of authentication network are analyzed.

2019 ◽  
Vol 33 (27) ◽  
pp. 1950331
Author(s):  
Shiguo Deng ◽  
Henggang Ren ◽  
Tongfeng Weng ◽  
Changgui Gu ◽  
Huijie Yang

Evolutionary processes of many complex networks in reality are dominated by duplication and divergence. This mechanism leads to redundant structures, i.e. some nodes share most of their neighbors and some local patterns are similar, called redundancy of network. An interesting reverse problem is to discover evolutionary information from the present topological structure. We propose a quantitative measure of redundancy of network from the perspective of principal component analysis. The redundancy of a community in the empirical human metabolic network is negatively and closely related with its evolutionary age, which is consistent with that for the communities in the modeling protein–protein network. This behavior can be used to find the evolutionary difference stored in cellular networks.


2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Sima Ranjbari ◽  
Toktam Khatibi ◽  
Ahmad Vosough Dizaji ◽  
Hesamoddin Sajadi ◽  
Mehdi Totonchi ◽  
...  

Abstract Background Intrauterine Insemination (IUI) outcome prediction is a challenging issue which the assisted reproductive technology (ART) practitioners are dealing with. Predicting the success or failure of IUI based on the couples' features can assist the physicians to make the appropriate decision for suggesting IUI to the couples or not and/or continuing the treatment or not for them. Many previous studies have been focused on predicting the in vitro fertilization (IVF) and intracytoplasmic sperm injection (ICSI) outcome using machine learning algorithms. But, to the best of our knowledge, a few studies have been focused on predicting the outcome of IUI. The main aim of this study is to propose an automatic classification and feature scoring method to predict intrauterine insemination (IUI) outcome and ranking the most significant features. Methods For this purpose, a novel approach combining complex network-based feature engineering and stacked ensemble (CNFE-SE) is proposed. Three complex networks are extracted considering the patients' data similarities. The feature engineering step is performed on the complex networks. The original feature set and/or the features engineered are fed to the proposed stacked ensemble to classify and predict IUI outcome for couples per IUI treatment cycle. Our study is a retrospective study of a 5-year couples' data undergoing IUI. Data is collected from Reproductive Biomedicine Research Center, Royan Institute describing 11,255 IUI treatment cycles for 8,360 couples. Our dataset includes the couples' demographic characteristics, historical data about the patients' diseases, the clinical diagnosis, the treatment plans and the prescribed drugs during the cycles, semen quality, laboratory tests and the clinical pregnancy outcome. Results Experimental results show that the proposed method outperforms the compared methods with Area under receiver operating characteristics curve (AUC) of 0.84 ± 0.01, sensitivity of 0.79 ± 0.01, specificity of 0.91 ± 0.01, and accuracy of 0.85 ± 0.01 for the prediction of IUI outcome. Conclusions The most important predictors for predicting IUI outcome are semen parameters (sperm motility and concentration) as well as female body mass index (BMI).


2013 ◽  
Vol 2013 ◽  
pp. 1-5 ◽  
Author(s):  
Haipeng Peng ◽  
Lixiang Li ◽  
Jürgen Kurths ◽  
Shudong Li ◽  
Yixian Yang

Nowadays, the topology of complex networks is essential in various fields as engineering, biology, physics, and other scientific fields. We know in some general cases that there may be some unknown structure parameters in a complex network. In order to identify those unknown structure parameters, a topology identification method is proposed based on a chaotic ant swarm algorithm in this paper. The problem of topology identification is converted into that of parameter optimization which can be solved by a chaotic ant algorithm. The proposed method enables us to identify the topology of the synchronization network effectively. Numerical simulations are also provided to show the effectiveness and feasibility of the proposed method.


2013 ◽  
Vol 12 (1) ◽  
pp. 73-88 ◽  
Author(s):  
Timothy Mitchener-Nissen

When assessing any security technology which impacts upon privacy, whether this constitutes a new technology or the novel application of existing technologies, we should do so by examining the combined effect of all security interventions currently employed within a society. This contrasts with the prevailing system whereby the impact of a new security technology is predominantly assessed on an individual basis by a subjective balancing of the security benefits of that technology against any reductions in concomitant rights, such as privacy and liberty. I contend that by continuing to focus on the individual effect, as opposed to the combined effects, of security technologies within a society the likelihood of sleep-walking into (or indeed waking-up in) an absolute surveillance society moves from a possible future to the logically inevitable future. This conclusion is based on two underlying assertions. Firstly that assessing a technology often entails a judgement of whether any loss in privacy is legitimised by a justifiable increase in security; however one fundamental difference between these two rights is that privacy is a finite resource with identifiable end-states (i.e. absolute privacy through to the absolute absence of privacy) whereas security does not have two finite end-states (while there exists the absolute absence of security, absolute security is an unobtainable yet desired goal). The second assertion, which relies upon the validity of the first, holds that one consequence of absolute security being unobtainable yet desirable is that new security interventions will continuously be developed, each potentially trading a small measure of privacy for a small rise in security. Examined individually each intervention may constitute a justifiable trade-off. However this approach of combining interventions in the search for ever greater security will ultimately reduce privacy to zero.


2012 ◽  
Vol 263-266 ◽  
pp. 1461-1466
Author(s):  
Xiao Ming Meng ◽  
Jian Hua Zhang

Focus on the problem of dynamic authorization access control of Distributed Multi-Organization Management Information System (DMOMIS), the system resources are divided into two kinds: relatively independent resources and shared resources. These two kinds of resources were used different authorization system to authorize. The relatively independent resources were authorized by using distributed authorization system (DA), and the similar and shared resources were authorized by using authorized system (A). According to the key terms definition, the system hypothesis and the idea of dynamic programming, then the dynamic authorization access control process of DMOMIS was abstracted as a multi stage users authorization process based on resources, and put out the dynamic authorization access control strategy model of DMOMIS, at last, depicted its execution process.


Author(s):  
Lenka Skanderova ◽  
Ivan Zelinka

In this work, we investigate the dynamics of Differential Evolution (DE) using complex networks. In this pursuit, we would like to clarify the term complex network and analyze its properties briefly. This chapter presents a novel method for analysis of the dynamics of evolutionary algorithms in the form of complex networks. We discuss the analogy between individuals in populations in an arbitrary evolutionary algorithm and vertices of a complex network as well as between edges in a complex network and communication between individuals in a population. We also discuss the dynamics of the analysis.


Author(s):  
Atsushi Tanaka

In this chapter, some important matters of complex networks and their models are reviewed shortly, and then the modern diffusion of products under the information propagation using multiagent simulation is discussed. The remarkable phenomena like “Winner-Takes-All” and “Chasm” can be observed, and one product marketing strategy is also proposed.


2019 ◽  
pp. 1-17 ◽  
Author(s):  
Megan E. Graham

AbstractNearly 50 million people around the world live with dementia, with statistics predicting a steady increase in prevalence for the foreseeable future. There is a need for comprehensive and compassionate dementia care. Long-term care homes have built special care units for people living with middle- to late-stage dementia. Among other services, these care units often use innovative security technologies that monitor and curtail movement beyond unit exit doors. As care-givers and technology developers grapple with the ethical dilemma of autonomy and risk management, researchers are beginning to investigate the social impact of these security technologies. The present research contributes to this line of inquiry. Fieldwork was carried out on two secure long-term care units for people living with dementia. Ethnographic accounts will illustrate how security technology creates socialities of securitisation on a secure dementia unit. Using securitisation theory, I will argue that dementia has been redefined, shifting it from a health issue to a security issue. The discursive construction of dementia as a security issue will be considered in terms of the co-constructed notions of vulnerability, risk, security threat and security challenge with respect to people living with dementia. The paper investigates how securitisation influences the ethics of dementia care.


Sign in / Sign up

Export Citation Format

Share Document