To see the other types of publications on this topic, follow the link: Zero latence.

Journal articles on the topic 'Zero latence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Zero latence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dwivedi, Dwivedi, MB Rao, Sada Nand Dwivedi, S. V. S. Deo, and Rakesh Shukla. "On Classifying At Risk Latent Zeros Using Zero Inflated Models." Journal of Data Science 12, no. 2 (2021): 307–23. http://dx.doi.org/10.6339/jds.201404_12(2).0006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Oostvogels, Jonathan, Fan Yang, Sam Michiels, Wouter Joosen, and Danny Hughes. "Zero-Wire." GetMobile: Mobile Computing and Communications 25, no. 1 (2021): 34–38. http://dx.doi.org/10.1145/3471440.3471450.

Full text
Abstract:
Latency-sensitive applications for the Internet of Things (IoT) often require performance guarantees that contemporary wireless networks fail to offer. Application scenarios involving real-time control of industrial machinery, robotics, or delay-sensitive actuation therefore typically still rely on cables: today's wireless networks cannot deliver messages in a sufficiently small and predictable amount of time. Drop-in wireless replacements for these cabled systems would nevertheless provide great benefit by eliminating the high cost and complexity associated with running cables in harsh industrial environments [1]. The symbolsynchronous bus, introduced in this article and embodied in a platform called Zero-Wire, is a novel wireless networking paradigm that addresses this gap. Using concurrent optical transmissions, it strives to bring low-latency deterministic networking to the wireless IoT.
APA, Harvard, Vancouver, ISO, and other styles
3

Bell, Simon, and Steve Walker. "Futurescaping Infinite Bandwidth, Zero Latency." Futures 43, no. 5 (2011): 525–39. http://dx.doi.org/10.1016/j.futures.2011.01.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nikitha, Nikitha Nikitha. "Future Tech 5g Virtual Zero Latency." International Journal of Informatics and Communication Technology (IJ-ICT) 5, no. 3 (2016): 106. http://dx.doi.org/10.11591/ijict.v5i3.pp106-110.

Full text
Abstract:
<p>With the point of conveying any data in whenever and anyplace, the people to come (5G) remote communication systems turn into a style theme in the remote examination territories and new waveform, as one of the key empowering advances in 5G physical layer, pulls in developing exploration considerations lately. Be that as it may, the current method for waveform examination or investigation depends on the change of range productivity or use, while the majority of them neglects to research the vitality proficiency conduct, which is appeared to be the key execution metric of 5G frameworks. In this paper, the most part is concentrated on looking over the waveforms from the vitality proficiency perspective. Two classifications of waveforms, specifically channel based waveform and spreading-based waveform, are broke down and the related execution issues are talked about. Besides, we actualize the above waveforms utilizing programming characterized radio based model stage and produce the estimation results for the vitality productivity correlation.</p>
APA, Harvard, Vancouver, ISO, and other styles
5

Rolf, Sheri L., Stephen M. Reed, William Melnick, and Frank M. Andrews. "Auditory brain stem response testing in anesthetized horses." American Journal of Veterinary Research 48, no. 6 (1987): 910–14. https://doi.org/10.2460/ajvr.1987.48.06.910.

Full text
Abstract:
SUMMARY Auditory brain stem response testing, using insert earphones, was performed in 10 healthy horses given general anesthesia. The procedure involved clicks of alternating polarity delivered at a rate of 25 clicks/s. Wave forms, including five peaks, were commonly identified. Latencies were measured in milliseconds for waves I through V for all intensities. Latencies of all waves decreased as stimulus intensity increased. For waves I through V, a least-squares regression line was determined for each horse, using all responses between 87-dB sound pressure level (spl) and 136-dB spl, inclusive. Slopes were significantly (P < 0.05) less than zero for waves I through IV, but not for wave V. Peak latencies of each wave averaged at 87-dB spl for waves I through V were 1.73, 2.6, 3.82, 4.80, and 5.71 ms, respectively; latencies of these five waves at 136-dB spl were 1.36, 2.2, 3.06, 3.92, and 4.71 ms, respectively. The decrease in latency among the five waves ranged from 0.13 to 0.004 ms/dB. When peak values were below 87-dB spl, waves became essentially unrecognizable.
APA, Harvard, Vancouver, ISO, and other styles
6

Wu, Bo-Sheng, Chen-Chiung Hsieh, and Yu-Wei Chen. "Zero-latency scheduling scheme for broadcasting popular movies." IEEE Transactions on Consumer Electronics 56, no. 4 (2010): 2317–23. http://dx.doi.org/10.1109/tce.2010.5681106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jack, Robert H., Adib Mehrabi, Tony Stockman, and Andrew McPherson. "Action-sound Latency and the Perceived Quality of Digital Musical Instruments." Music Perception 36, no. 1 (2018): 109–28. http://dx.doi.org/10.1525/mp.2018.36.1.109.

Full text
Abstract:
Asynchrony between tactile and auditory feedback (action-sound latency) when playing a musical instrument is widely recognized as disruptive to musical performance. In this paper we present a study that assesses the effects of delayed auditory feedback on the timing accuracy and judgments of instrument quality for two groups of participants: professional percussionists and non-percussionist amateur musicians. The amounts of delay tested in this study are relatively small in comparison to similar studies of auditory delays in a musical context (0 ms, 10 ms, 10 ms ± 3 ms, 20 ms). We found that both groups rated the zero latency condition as higher quality for a series of quality measures in comparison to 10 ms ± 3 ms and 20 ms latency, but did not show a significant difference in rating between 10 ms latency and zero latency. Professional percussionists were more aware of the latency conditions and showed less variation of timing under the latency conditions, although this ability decreased as the temporal demands of the task increased. We compare our findings from each group and discuss them in relation to latency in interactive digital systems more generally and experimentally similar work on sensorimotor control and rhythmic performance.
APA, Harvard, Vancouver, ISO, and other styles
8

Lisberger, S. G. "Visual tracking in monkeys: evidence for short-latency suppression of the vestibuloocular reflex." Journal of Neurophysiology 63, no. 4 (1990): 676–88. http://dx.doi.org/10.1152/jn.1990.63.4.676.

Full text
Abstract:
1. Monkeys normally use a combination of smooth head and eye movements to keep the eyes pointed at a slowly moving object. The visual inputs from target motion evoke smooth pursuit eye movements, whereas the vestibular inputs from head motion evoke a vestibuloocular reflex (VOR). Our study asks how the eye movements of pursuit and the VOR interact. Is there a linear addition of independent commands for pursuit and the VOR? Or does the interaction of visual and vestibular stimuli cause momentary, "parametric" modulation of transmission through VOR pathways? 2. We probed for the state of the VOR and pursuit by presenting transient perturbations of target and/or head motion under different steady-state tracking conditions. Tracking conditions included fixation at straight-ahead gaze, in which both the head and the target were stationary; "times-zero (X0) tracking," in which the target and head moved in the same direction at the same speed; and "times-two (X2) tracking," in which the target and head moved in opposite directions at the same speed. 3. Comparison of the eye velocities evoked by changes in the direction of X0 versus X2 tracking revealed two components of the tracking response. The earliest component, which we attribute to the VOR, had a latency of 14 ms and a trajectory that did not depend on initial tracking conditions. The later component had a latency of 70 ms or less and a trajectory that did depend on tracking conditions. 4. To probe the latency of pursuit eye movements, we imposed perturbations of target velocity imposed during X0 and X2 tracking. The resulting changes in eye velocity had latencies of at least 100 ms. We conclude that the effects of initial tracking conditions on eye velocity at latencies of less than 70 ms cannot be caused by visual feedback through the smooth-pursuit system. Instead, there must be another mechanism for short-latency control over the VOR; we call this component of the response "short-latency tracking." 5. Perturbations of head velocity or head and target velocity during X0 and X2 tracking showed that short-latency tracking depended only on the tracking conditions at the time the perturbation was imposed. The VOR appeared to be suppressed when the initial conditions were X0 tracking. 6. The magnitude of short-latency tracking depended on the speed of initial head and target movement. During X0 tracking at 15 deg/s, short-latency tracking was modest. When the initial speed of head and target motion was 60 deg/s, the amplitude of short-latency tracking was quite large and its latency became as short as 36 ms.(ABSTRACT TRUNCATED AT 400 WORDS)
APA, Harvard, Vancouver, ISO, and other styles
9

Saad-Roy, Chadi M., Ned S. Wingreen, Simon A. Levin, and Bryan T. Grenfell. "Dynamics in a simple evolutionary-epidemiological model for the evolution of an initial asymptomatic infection stage." Proceedings of the National Academy of Sciences 117, no. 21 (2020): 11541–50. http://dx.doi.org/10.1073/pnas.1920761117.

Full text
Abstract:
Pathogens exhibit a rich variety of life history strategies, shaped by natural selection. An important pathogen life history characteristic is the propensity to induce an asymptomatic yet productive (transmissive) stage at the beginning of an infection. This characteristic is subject to complex trade-offs, ranging from immunological considerations to population-level social processes. We aim to classify the evolutionary dynamics of such asymptomatic behavior of pathogens (hereafter “latency”) in order to unify epidemiology and evolution for this life history strategy. We focus on a simple epidemiological model with two infectious stages, where hosts in the first stage can be partially or fully asymptomatic. Immunologically, there is a trade-off between transmission and progression in this first stage. For arbitrary trade-offs, we derive different conditions that guarantee either at least one evolutionarily stable strategy (ESS) at zero, some, or maximal latency of the first stage or, perhaps surprisingly, at least one unstable evolutionarily singular strategy. In this latter case, there is bistability between zero and nonzero (possibly maximal) latency. We then prove the uniqueness of interior evolutionarily singular strategies for power-law and exponential trade-offs: Thus, bistability is always between zero and maximal latency. Overall, previous multistage infection models can be summarized with a single model that includes evolutionary processes acting on latency. Since small changes in parameter values can lead to abrupt transitions in evolutionary dynamics, appropriate disease control strategies could have a substantial impact on the evolution of first-stage latency.
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Sunghwan, Gyusun Lee, Jiwon Woo, and Jinkyu Jeong. "Zero-Copying I/O Stack for Low-Latency SSDs." IEEE Computer Architecture Letters 20, no. 1 (2021): 50–53. http://dx.doi.org/10.1109/lca.2021.3064876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Cai, Songfu, and Vincent K. N. Lau. "Zero MAC Latency Sensor Networking for Cyber-Physical Systems." IEEE Transactions on Signal Processing 66, no. 14 (2018): 3814–23. http://dx.doi.org/10.1109/tsp.2018.2831623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Chakraborty, Mrityunjoy, and Suraiya Pervin. "Pipelining the adaptive decision feedback equalizer with zero latency." Signal Processing 83, no. 12 (2003): 2675–81. http://dx.doi.org/10.1016/j.sigpro.2003.07.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Greer, Trey, Josef Spjut, David Luebke, and Turner Whitted. "8-3: Hybrid Modulation for Near Zero Display Latency." SID Symposium Digest of Technical Papers 47, no. 1 (2016): 76–78. http://dx.doi.org/10.1002/sdtp.10614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Madarbux, Muhammad Ridwan, Anouk Van Laer, Philip M. Watts, and Timothy M. Jones. "Towards zero latency photonic switching in shared memory networks." Concurrency and Computation: Practice and Experience 26, no. 15 (2014): 2551–66. http://dx.doi.org/10.1002/cpe.3334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kavanagh, Kevin T., and Renaee Franks. "Analog and Digital Filtering of the Brain Stem Auditory Evoked Response." Annals of Otology, Rhinology & Laryngology 98, no. 7 (1989): 508–14. http://dx.doi.org/10.1177/000348948909800704.

Full text
Abstract:
This study compared the filtering effects on the auditory evoked potential of zero and standard phase shift digital filters (the former was a mathematical approximation of a standard Butterworth filter). Conventional filters were found to decrease the height of the evoked response in the majority of waveforms compared to zero phase shift filters. a 36-dB/octave zero phase shift high pass filter with a cutoff frequency of 100 Hz produced a 16% reduction in wave amplitude compared to the unfiltered control. a 36-dB/octave, 100-Hz standard phase shift high pass filter produced a 41% reduction, and a 12-dB/octave, 150-Hz standard phase shift high pass filter produced a 38% reduction in wave amplitude compared to the unfiltered control. a decrease in the mean along with an increase in the variability of wave IV/V latency was also noted with conventional compared to zero phase shift filters. The increase in the variability of the latency measurement was due to the difficulty in waveform identification caused by the phase shift distortion of the conventional filter along with the variable decrease in wave latency caused by phase shifting responses with different spectral content. Our results indicated that a zero phase shift high pass filter of 100 Hz was the most desirable filter studied for the mitigation of spontaneous brain activity and random muscle artifact.
APA, Harvard, Vancouver, ISO, and other styles
16

Wu, Ben, Yang Qi, Chenxi Qiu, and Ying Tang. "Wideband Anti-Jamming Based on Free Space Optical Communication and Photonic Signal Processing." Sensors 21, no. 4 (2021): 1136. http://dx.doi.org/10.3390/s21041136.

Full text
Abstract:
We propose and demonstrate an anti-jamming system to defend against wideband jamming attack. Free space optical communication is deployed to provide a reference for jamming cancellation. The mixed signal is processed and separated with photonic signal processing method to achieve large bandwidth. As an analog signal processing method, the cancellation system introduces zero latency. The radio frequency signals are modulated on optical carriers to achieve wideband and unanimous frequency response. With wideband and zero latency, the system meets the key requirements of high speed and real-time communications in transportation systems.
APA, Harvard, Vancouver, ISO, and other styles
17

Vinod, Veeramachaneni. "Emerging Authentication Technologies for Zero Trust in IoT Systems." Journal of Advance Research in Mobile Computing 7, no. 1 (2024): 7–21. https://doi.org/10.5281/zenodo.14166892.

Full text
Abstract:
<em>This paper investigates the integration of advanced authentication technologies to establish Zero Trust security frameworks within Internet of Things (IoT) ecosystems. Due to IoT's distributed and resource-constrained nature, traditional security mechanisms prove insufficient, necessitating more robust, adaptive solutions. Our study addresses this gap by implementing a Zero Trust model through lightweight cryptographic techniques suited to IoT devices, mutual authentication protocols to ensure reciprocal identity verification between devices and networks, and blockchain technology for decentralized, tamper-proof identity management. Using a simulated IoT environment, we assessed key performance metrics, such as security enhancement, latency reduction, and energy efficiency. Results indicate that mutual authentication and blockchain, when combined, significantly improve overall security while minimizing latency and computational load, making the framework viable for real-time, resource-limited IoT applications. The findings support that these Zero Trust authentication technologies provide a scalable and resilient approach, effectively mitigating the security vulnerabilities inherent in IoT networks and promising wide-scale applicability in critical IoT-dependent sectors.</em>
APA, Harvard, Vancouver, ISO, and other styles
18

Zhang, Y. X. Q., Y. D. Peng, J. D. Li, et al. "Latent factor model based zero-shot learning." Journal of Physics: Conference Series 1914, no. 1 (2021): 012003. http://dx.doi.org/10.1088/1742-6596/1914/1/012003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Yu, Yunlong, Zhong Ji, Jichang Guo, and Zhongfei Zhang. "Zero-Shot Learning via Latent Space Encoding." IEEE Transactions on Cybernetics 49, no. 10 (2019): 3755–66. http://dx.doi.org/10.1109/tcyb.2018.2850750.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ranjan, Rajesh, Jayashree S. Bhat, and Mohan Kumar Kalaiah. "Effect of auditory memory load on speech-evoked P300 in healthy adolescents." Hearing Balance and Communication 22, no. 1 (2024): 8–14. http://dx.doi.org/10.4103/hbc.hbc_3_24.

Full text
Abstract:
Abstract Background: The P300 is a late cortical neurophysiological response that can be elicited with auditory and visual stimulation, by presenting the stimuli in an odd-ball paradigm. When deviant stimuli are elicited using auditory stimuli, the P300 is recorded as a large positive peak approximately 300 ms after the stimulus onset in the waveform. Adolescent brain development is heavily influenced by hormonal and physical transitions. Most of the investigations have been done in children and adults, with a limited focus on adolescents. Hence, there is a need to understand the characteristics of P300 in this group. Objective: The current research was planned to measure the effect of auditory memory load on speech-evoked P300 in healthy adolescents. Methods: A total of 14 late adolescents aged between 18.1 and 24 years participated in the study. The P300 was used to record speech stimuli in N-back (zero-back, one-back, and two-back) tasks using 64 channels. Results: There was a significant difference in the latency and amplitude of P300 across the N-back tasks. The mean amplitude of P300 was the highest in a zero-back task and the lowest in a one-back task, and the mean latency of P300 was the lowest in a zero-back task and the highest in a one-back task. Conclusion: Prolonged latency and smaller amplitude of the P300 as the N-back difficulty level increased from zero-back to one-back and then two-back tasks in healthy adolescents.
APA, Harvard, Vancouver, ISO, and other styles
21

Kaklamani, Dimitra I., Athanasios D. Panagopoulos, and Panagiotis K. Gkonis. "Antennas and Propagation Aspects for Emerging Wireless Communication Technologies." Electronics 10, no. 8 (2021): 964. http://dx.doi.org/10.3390/electronics10080964.

Full text
Abstract:
The increasing demand for high data rate applications and the delivery of zero-latency multimedia content drives technological evolutions towards the design and implementation of next-generation broadband wireless networks [...]
APA, Harvard, Vancouver, ISO, and other styles
22

Sengupta, Binanda, and Anantharaman Lakshminarayanan. "DistriTrust: Distributed and low-latency access validation in zero-trust architecture." Journal of Information Security and Applications 63 (December 2021): 103023. http://dx.doi.org/10.1016/j.jisa.2021.103023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Green, Joseph B., Arden V. Nelson, and Dellita Michael. "Digital zero-phase-shift filtering of short-latency somatosensory evoked potentials." Electroencephalography and Clinical Neurophysiology 63, no. 4 (1986): 384–88. http://dx.doi.org/10.1016/0013-4694(86)90024-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Xie, Yurui, Xiaohai He, Jing Zhang, and Xiaodong Luo. "Zero-shot recognition with latent visual attributes learning." Multimedia Tools and Applications 79, no. 37-38 (2020): 27321–35. http://dx.doi.org/10.1007/s11042-020-09316-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Qian, and Ke Chen. "Zero-Shot Visual Recognition via Bidirectional Latent Embedding." International Journal of Computer Vision 124, no. 3 (2017): 356–83. http://dx.doi.org/10.1007/s11263-017-1027-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kiangala, Kahiomba Sonia, and Zenghui Wang. "An Effective Communication Prototype for Time-Critical IIoT Manufacturing Factories Using Zero-Loss Redundancy Protocols, Time-Sensitive Networking, and Edge-Computing in an Industry 4.0 Environment." Processes 9, no. 11 (2021): 2084. http://dx.doi.org/10.3390/pr9112084.

Full text
Abstract:
The Industrial Internet of things (IIoT), the implementation of IoT in the industrial sector, requires a deterministic, real-time, and low-latency communication response for its time-critical applications. A delayed response in such applications could be life-threatening or result in significant losses for manufacturing plants. Although several measures in the likes of predictive maintenance are being put in place to prevent errors and guarantee high network availability, unforeseen failures of physical components are almost inevitable. Our research contribution is to design an efficient communication prototype, entirely based on internet protocol (IP) that combines state-of-the-art communication computing technologies principles to deliver a more stable industrial communication network. We use time-sensitive networking (TSN) and edge computing to increase the determinism of IIoT networks, and we reduce latency with zero-loss redundancy protocols that ensure the sustainability of IIoT networks with smooth recovery in case of unplanned outages. Combining these technologies altogether brings more effectiveness to communication networks than implementing standalone systems. Our study results develop two experimental IP-based industrial network communication prototypes in an intra-domain transmission scenario: the first one is based on the parallel zero-loss redundancy protocol (PRP) and the second one using the high-availability seamless zero-loss redundancy protocol (HSR). We also highlight the benefits of utilizing our communication prototypes to build robust industrial IP communication networks with high network availability and low latency as opposed to conventional communication networks running on seldom redundancy protocols such as Media Redundancy Protocol (MRP) or Rapid Spanning Tree Protocol (RSTP) with single-point of failure and delayed recovery time. While our two network communication prototypes—HSR and PRP—offer zero-loss recovery time in case of a single network failure, our PRP communication prototype goes a step further by providing an effective redundancy scheme against multiple link failures.
APA, Harvard, Vancouver, ISO, and other styles
27

Alnaim, Abdulrahman K., and Ahmed M. Alwakeel. "Zero Trust Strategies for Cyber-Physical Systems in 6G Networks." Mathematics 13, no. 7 (2025): 1108. https://doi.org/10.3390/math13071108.

Full text
Abstract:
This study proposes a Zero Trust security framework for 6G-enabled Cyber-Physical Systems (CPS), integrating Adaptive Access Control (AAC), end-to-end encryption, and blockchain to enhance security, scalability, and real-time threat detection. As 6G networks facilitate massive device connectivity and low-latency communication, traditional perimeter-based security models are inadequate against evolving cyber threats such as Man-in-the-Middle (MITM) attacks, Distributed Denial-of-Service (DDoS), and data breaches. Zero Trust security eliminates implicit trust by enforcing continuous authentication, strict access control, and real-time anomaly detection to mitigate potential threats dynamically. The proposed framework leverages blockchain technology to ensure tamper-proof data integrity and decentralized authentication, preventing unauthorized modifications to CPS data. Additionally, AI-driven anomaly detection identifies suspicious behavior in real time, optimizing security response mechanisms and reducing false positives. Experimental evaluations demonstrate a 40% reduction in MITM attack success rates, 5.8% improvement in authentication efficiency, and 63.5% lower latency compared to traditional security methods. The framework also achieves high scalability and energy efficiency, maintaining consistent throughput and response times across large-scale CPS deployments. These findings underscore the transformative potential of Zero Trust security in 6G-enabled CPS, particularly in mission-critical applications such as healthcare, smart infrastructure, and industrial automation. By integrating blockchain-based authentication, AI-powered threat detection, and adaptive access control, this research presents a scalable and resource-efficient solution for securing next-generation CPS architectures. Future work will explore quantum-safe cryptography and federated learning to further enhance security, ensuring long-term resilience in highly dynamic network environments.
APA, Harvard, Vancouver, ISO, and other styles
28

Meier, Peter, Ching-Yu Chiu, and Meinard Müller. "A Real-Time Beat Tracking System with Zero Latency and Enhanced Controllability." Transactions of the International Society for Music Information Retrieval 7, no. 1 (2024): 213–27. http://dx.doi.org/10.5334/tismir.189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Zhang, Xuebin, Jiangpeng Li, Hao Wang, et al. "Realizing Transparent OS/Apps Compression in Mobile Devices at Zero Latency Overhead." IEEE Transactions on Computers 66, no. 7 (2017): 1188–99. http://dx.doi.org/10.1109/tc.2017.2664838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Madni, Azad M., Carla C. Madni, and John Salasin. "5.4.1 ProACT™: Process-aware Zero Latency System for Distributed, Collaborative Enterprises." INCOSE International Symposium 12, no. 1 (2002): 783–90. http://dx.doi.org/10.1002/j.2334-5837.2002.tb02539.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Veluru, Sai Prasad. "Zero-Interpolation Models: Bridging Modes with Nonlinear Latent Spaces." International Journal of AI, BigData, Computational and Management Studies 5 (2024): 60–68. https://doi.org/10.63282/3050-9416.ijaibdcms-v5i1p107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Guo, Xiaotao, Ying Zhang, Yu Jiang, Shenggang Wu, and Hengnian Li. "A Novel Decomposed Optical Architecture for Satellite Terrestrial Network Edge Computing." Mathematics 10, no. 14 (2022): 2515. http://dx.doi.org/10.3390/math10142515.

Full text
Abstract:
Aiming at providing a high-performance terrestrial network for edge computing in satellite networks, we experimentally demonstrate a high bandwidth and low latency decomposed optical computing architecture based on distributed Nanoseconds Optical Switches (NOS). Experimental validation of the decomposed computing network prototype employs a four-port NOS to interconnect four processor/memory cubes. The SOA-based optical gates provide an ON/OFF ratio greater than 60 dB, enabling none-error transmission at a Bit Error Rate (BER) of 1 × 10−9. An end-to-end access latency of 122.3 ns and zero packet loss are obtained in the experimental assessment. Scalability and physical performance considering signal impairments when increasing the NOS port count are also investigated. An output OSNR of up to 30.5 dB and an none-error transmission with 1.5 dB penalty is obtained when scaling the NOS port count to 64. Moreover, exploiting the experimentally measured parameters, the network performance of NOS-based decomposed computing architecture is numerically assessed under larger network scales. The results indicate that, under a 4096-cube network scale, the NOS-based decomposed computing architecture achieves 148.5 ns end-to-end latency inside the same rack and zero packet loss at a link bandwidth of 40 Gb/s.
APA, Harvard, Vancouver, ISO, and other styles
33

Alnaim, Abdulrahman K. "Adaptive Zero Trust Policy Management Framework in 5G Networks." Mathematics 13, no. 9 (2025): 1501. https://doi.org/10.3390/math13091501.

Full text
Abstract:
The rapid evolution and deployment of 5G networks have introduced complex security challenges due to their reliance on dynamic network slicing, ultra-low latency communication, decentralized architectures, and highly diverse use cases. Traditional perimeter-based security models are no longer sufficient in these highly fluid and distributed environments. In response to these limitations, this study introduces SecureChain-ZT, a novel Adaptive Zero Trust Policy Framework (AZTPF) that addresses emerging threats by integrating intelligent access control, real-time monitoring, and decentralized authentication mechanisms. SecureChain-ZT advances conventional Zero Trust Architecture (ZTA) by leveraging machine learning, reinforcement learning, and blockchain technologies to achieve autonomous policy enforcement and threat mitigation. Unlike static ZT models that depend on predefined rule sets, AZTPF continuously evaluates user and device behavior in real time, detects anomalies through AI-powered traffic analysis, and dynamically updates access policies based on contextual risk assessments. Comprehensive simulations and experiments demonstrate the robustness of the framework. SecureChain-ZT achieves an authentication accuracy of 97.8% and reduces unauthorized access attempts from 17.5% to just 2.2%. Its advanced detection capabilities achieve a threat detection accuracy of 99.3% and block 95.6% of attempted cyber intrusions. The implementation of blockchain-based identity verification reduces spoofing incidents by 97%, while microsegmentation limits lateral movement attacks by 75%. The proposed SecureChain-ZT model achieved an authentication accuracy of 98.6%, reduced false acceptance and rejection rates to 1.2% and 0.2% respectively, and improved policy update time to 180 ms. Compared to traditional models, the overall latency was reduced by 62.6%, and threat detection accuracy increased to 99.3%. These results highlight the model’s effectiveness in both cybersecurity enhancement and real-time service responsiveness. This research contributes to the advancement of Zero Trust security models by presenting a scalable, resilient, and adaptive policy enforcement framework that aligns with the demands of next-generation 5G infrastructures. The proposed SecureChain-ZT model not only enhances cybersecurity but also ensures service reliability and responsiveness in complex and mission-critical environments.
APA, Harvard, Vancouver, ISO, and other styles
34

Chen, Shiyan, and Dagang Li. "Efficient zero-copy mechanism for intelligent video surveillance networks." MATEC Web of Conferences 189 (2018): 03021. http://dx.doi.org/10.1051/matecconf/201818903021.

Full text
Abstract:
Most of today’s intelligent video surveillance systems are based on Linux core and rely on the kernel’s socket mechanism for data transportation. In this paper, we propose APRO, a novel framework with optimized zero-copy capability customized for video surveillance networks. Without the help of special hardware support such as RNIC or NetFPGA, the software-based APRO can effectively reduce the CPU overhead and decrease the transmission latency, both of which are much appreciated for resource-limited video surveillance networks. Furthermore, unlike other software-based zero-copy mechanisms, in APRO zero-copied data from network packets are already reassembled and page aligned for user-spac applications to utilize, which makes it a ‘true’ zero-copy solution for localhost applications. The proposed mechanism is compared with standard TCP and netmap, a typical zero-copy framework. Simulation results show that APRO outperforms both TCP and localhost optimized netmap implementation with the smallest transmission delay and lowest CPU consumption.
APA, Harvard, Vancouver, ISO, and other styles
35

Chauhan, Satyam. "Zero ETL for Cloud-Native Applications on AWS: A Paradigm Shift in Data Processing and Quality Assurance." International Scientific Journal of Engineering and Management 04, no. 02 (2025): 1–6. https://doi.org/10.55041/isjem02262.

Full text
Abstract:
Abstract—the advent of cloud-native applications has revolutionized the way data is processed, stored, and analyzed. Traditional Extract, Transform, Load (ETL) processes, while effective, often introduce latency, complexity, and scalability challenges. This paper explores the concept of Zero ETL, a paradigm shift in data processing that leverages the inherent capabilities of cloud-native platforms like Amazon Web Services (AWS) to eliminate the need for traditional ETL pipelines. We delve into the architectural principles, benefits, and challenges of Zero ETL, with a focus on its implications for data quality assurance. Through a combination of theoretical analysis, case studies, and empirical data, we demonstrate how Zero ETL can enhance data processing efficiency, reduce operational overhead, and improve data quality in cloud-native environments. The paper concludes with a discussion on future research directions and practical considerations for adopting Zero ETL in enterprise settings. Keywords—AWS, Cloud-Native Applications, Cost Efficiency, Data Governance, Data Processing, Quality Assurance, Real- Time Analytics, Scalability, Server less Computing, Zero ETL.
APA, Harvard, Vancouver, ISO, and other styles
36

Yang, Hongbiao, Rapinder Sawhney, Shuguang Ji, and Eric R. Wade. "Development of Walking in Place System based on Zero Crossing Algorithm." International Journal of Virtual Reality 15, no. 2 (2016): 30–43. http://dx.doi.org/10.20870/ijvr.2016.15.2.2872.

Full text
Abstract:
Walking in Place (WIP) is a way to facilitate locomotion tasks in the virtual environment while keeping the subject relatively static in the physical environment. This technique enables subjects to walk in a virtual space with limited physical space requirements. This paper introduces a burden-free and error-tolerant system to track the subjects' walking and turning motions, and to translate these motions to the virtual environment using the Microsoft Kinect. In addition, we introduce a zero crossing based algorithm that analyzes joint position data, detects the knee coordinates exchange pattern, and produces locomotion with low latency and jerkiness.
APA, Harvard, Vancouver, ISO, and other styles
37

Umeda, Kenichi, Chihiro Okamoto, Masahiro Shimizu, Shinji Watanabe, Toshio Ando, and Noriyuki Kodera. "Architecture of zero-latency ultrafast amplitude detector for high-speed atomic force microscopy." Applied Physics Letters 119, no. 18 (2021): 181602. http://dx.doi.org/10.1063/5.0067224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Shin, Kyubo, Seokwoo Choi, and Hyoil Kim. "Flit Scheduling for Cut-Through Switching: Towards Near-Zero End-to-End Latency." IEEE Access 7 (2019): 66369–83. http://dx.doi.org/10.1109/access.2019.2916651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Khan, Urooj Yousuf, Tariq Rahim Soomro, and Zheng Kougen. "FedFog - A federated learning based resource management framework in fog computing for zero touch networks." Mehran University Research Journal of Engineering and Technology 42, no. 3 (2023): 67. http://dx.doi.org/10.22581/muet1982.2303.08.

Full text
Abstract:
Fog computing offers an optimal answer to the expansion challenge of today’s networks. It boasts scaling and reduced latency. Since the concept is still nascent, many research questions remain unanswered. One of these is the challenge of Resource Management. There is a pressing need for a reliable and scalable architecture that meets the Resource Management challenge without compromising the Quality of Service. Among the proposed solutions, Artificial Intelligence based path selection techniques and automated link detection methods can provide lasting and reliable answer. An optimal approach for introducing intelligence in the networks is the infusion of Machine learning methods. Such futuristic, intelligent networks form the backbone of the next generation of Internet. These self-learning and self-healing networks are termed as the Zero-Touch networks. This paper proposes FedFog, a Federated Learning based optimal, automated Resource Management framework in Fog Computing for Zero-touch Networks. The paper describes a series of experiments focusing on Quality of Service parameters such as Network latency, Resources processed, Energy consumption and Network usage. The simulation results from these experiments depict superiority of the proposed architecture over traditional, existing architecture.
APA, Harvard, Vancouver, ISO, and other styles
40

Pottier, Xander, Thomas De Ruijter, Jonas Bertels, Wouter Legiest, Michiel Van Beirendonck, and Ingrid Verbauwhede. "OPTIMSM: FPGA hardware accelerator for Zero-Knowledge MSM." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 2 (2025): 489–510. https://doi.org/10.46586/tches.v2025.i2.489-510.

Full text
Abstract:
The Multi-Scalar Multiplication (MSM) is the main barrier to accelerating Zero-Knowledge applications. In recent years, hardware acceleration of this algorithm on both FPGA and GPU has become a popular research topic and the subject of a multi-million dollar prize competition (ZPrize). This work presents OPTIMSM: Optimized Processing Through Iterative Multi-Scalar Multiplication. This novel accelerator focuses on the acceleration of the MSM algorithm for any Elliptic Curve (EC) by improving upon the Pippenger algorithm. A new iteration technique is introduced to decouple the required buckets from the window size, resulting in fewer EC computations for the same on-chip memory resources. Furthermore, we combine known optimizations from the literature for the first time to achieve additional latency improvements. Our enhanced MSM implementation significantly reduces computation time, achieving a speedup of up to x12.77 compared to recent FPGA implementations. Specifically, for the BLS12-381 curve, we reduce the computation time for an MSM of size 224 to 914 ms using a single compute unit on the U55C FPGA or to 231 ms using four U55C devices. These results indicate a substantial improvement in efficiency, paving the way for more scalable and efficient Zero-Knowledge proof systems.
APA, Harvard, Vancouver, ISO, and other styles
41

Meng, Min, and Jun Yu. "Zero-Shot Learning via Robust Latent Representation and Manifold Regularization." IEEE Transactions on Image Processing 28, no. 4 (2019): 1824–36. http://dx.doi.org/10.1109/tip.2018.2881926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Fox, Jean-Paul. "Multivariate zero-inflated modeling with latent predictors: Modeling feedback behavior." Computational Statistics & Data Analysis 68 (December 2013): 361–74. http://dx.doi.org/10.1016/j.csda.2013.07.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Irvine, Kathryn M., T. J. Rodhouse, and Ilai N. Keren. "Extending Ordinal Regression with a Latent Zero-Augmented Beta Distribution." Journal of Agricultural, Biological and Environmental Statistics 21, no. 4 (2016): 619–40. http://dx.doi.org/10.1007/s13253-016-0265-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Huang, Yan, Xiaoshan Liao, Jinxiu Liang, Yuhui Quan, Boxin Shi, and Yong Xu. "Zero-Shot Low-Light Image Enhancement via Latent Diffusion Models." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 4 (2025): 3815–23. https://doi.org/10.1609/aaai.v39i4.32398.

Full text
Abstract:
Low-light image enhancement (LLIE) aims to improve visibility and signal-to-noise ratio in images captured under poor lighting conditions. While deep learning has shown promise in this domain, current approaches require extensive paired training data, limiting their practical utility. We present a novel framework that reformulates low-light image enhancement as a zero-shot inference problem using pre-trained latent diffusion models (LDMs), eliminating the need for task-specific training data. Our key insight is that the rich natural image priors encoded in LDMs can be leveraged to recover well-lit images through a carefully designed optimization process. To address the ill-posed nature of low-light degradation and the complexity of latent space optimization, our framework introduces an exposure-aware degradation module that adaptively models illumination variations and a principled latent regularization scheme with adaptive guidance that ensures both enhancement quality and natural image statistics. Experimental results demonstrate that our framework outperforms existing zero-shot methods across diverse real-world scenarios.
APA, Harvard, Vancouver, ISO, and other styles
45

Alnaim, Abdulrahman K., and Ahmed M. Alwakeel. "Zero-Trust Mechanisms for Securing Distributed Edge and Fog Computing in 6G Networks." Mathematics 13, no. 8 (2025): 1239. https://doi.org/10.3390/math13081239.

Full text
Abstract:
The rapid advancement in 6G networks, driven by the proliferation of distributed edge and fog computing, has introduced unprecedented challenges in securing these decentralized architectures. Traditional security paradigms are inadequate for protecting the dynamic and heterogeneous environments of 6G-enabled systems. In this context, we propose ZTF-6G (Zero-Trust Framework for 6G Networks), a novel model that integrates Zero-Trust principles to secure distributed edge and fog computing environments. Robust security is ensured by ZTF-6G by adopting a “never trust, always verify” approach, which comprises adaptive authentication, continuous verification, and fine-grained access control against all entities within the network. Within this context, our proposed framework makes use of Zero-Trust-based multi-layering that extends to AI-driven anomaly detection and blockchain-based identity management for the authentication and real-time monitoring of network interactions. Simulation results indicate that ZTF-6G is able to reduce latency by 77.6% (up to 2.8 ms, compared to the standard models’ 12.5 ms), improve throughput by 70%, and improve resource utilization by 41.5% (90% of utilization). Additionally, the trust score accuracy increased from 95% to 98%, energy efficiency improved by 22.2% (from 88% to 110% efficiency), and threat detection accuracy increased to 98%. Finally, the framework perfectly mitigated the insider threats by 85% and enforced a dynamic policy within 1.8 ms. ZTF-6G maintained a low latency while providing more resilience to insider threats, unauthorized access, and data breaches, which is a requirement of 6G networks. This research aims to lay a foundation for deploying Zero-Trust as an integral part of the next-generation networks which will face the security challenges of the distributed systems driven by 6G networks.
APA, Harvard, Vancouver, ISO, and other styles
46

Aenugu, Sneha, and David E. Huber. "Asymmetric Weights and Retrieval Practice in an Autoassociative Neural Network Model of Paired-Associate Learning." Neural Computation 33, no. 12 (2021): 3351–60. http://dx.doi.org/10.1162/neco_a_01444.

Full text
Abstract:
Abstract Rizzuto and Kahana (2001) applied an autoassociative Hopfield network to a paired-associate word learning experiment in which (1) participants studied word pairs (e.g., ABSENCE-HOLLOW), (2) were tested in one direction (ABSENCE-?) on a first test, and (3) were tested in the same direction again or in the reverse direction (?-HOLLOW) on a second test. The model contained a correlation parameter to capture the dependence between forward versus backward learning between the two words of a word pair, revealing correlation values close to 1.0 for all participants, consistent with neural network models that use the same weight for communication in both directions between nodes. We addressed several limitations of the model simulations and proposed two new models incorporating retrieval practice learning (e.g., the effect of the first test on the second) that fit the accuracy data more effectively, revealing substantially lower correlation values (average of .45 across participants, with zero correlation for some participants). In addition, we analyzed recall latencies, finding that second test recall was faster in the same direction after a correct first test. Only a model with stochastic retrieval practice learning predicted this effect. In conclusion, recall accuracy and recall latency suggest asymmetric learning, particularly in light of retrieval practice effects.
APA, Harvard, Vancouver, ISO, and other styles
47

Shahzad, Ali, Wenyu Chen, Yin Zhang, and Rajesh Kumar. "Zero-Trust Medical Image Sharing: A Secure and Decentralized Approach Using Blockchain and the IPFS." Symmetry 17, no. 4 (2025): 551. https://doi.org/10.3390/sym17040551.

Full text
Abstract:
The secure and efficient storage and sharing of medical images have become increasingly important due to rising security threats and performance limitations in existing healthcare systems. Centralized systems struggle to provide adequate privacy, rapid access, and reliable storage for sensitive medical images. This paper proposes a decentralized medical image-sharing framework to address these issues by integrating blockchain technology, the InterPlanetary File System (IPFS), and edge computing. Blockchain technology enforces secure patient-centric access control through smart contracts that enable patients to directly manage their data-sharing permissions. The IPFS provides decentralized and scalable storage for medical images and effectively resolves the storage limitations associated with blockchain. Edge computing enhances system responsiveness by significantly reducing latency through local data processing to ensure timely medical image access. Robust security is ensured by using elliptic curve cryptography (ECC) for secure key management and the Advanced Encryption Standard (AES) for encrypting medical images to protect against unauthorized access and data breaches. Additionally, the system includes real-time monitoring to promptly detect and respond to unauthorized access attempts to ensure continuous protection against potential security threats. System results demonstrate that the proposed framework achieves lower latency, higher throughput, and improved security compared to traditional centralized storage solutions, which makes our system suitable for practical deployment in modern healthcare settings.
APA, Harvard, Vancouver, ISO, and other styles
48

Zohaib, Syed Muhammad, Syed Muhammad Sajjad, Zafar Iqbal, Muhammad Yousaf, Muhammad Haseeb, and Zia Muhammad. "Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work." Information 15, no. 11 (2024): 734. http://dx.doi.org/10.3390/info15110734.

Full text
Abstract:
Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit remote employees to access corporate offices effectively. However, the technology raises concerns, including security threats, latency, throughput, and scalability, among others. These newer-generation threats are more complex and frequent, which makes the legacy approach to security ineffective. This research paper gives an overview of contemporary technologies used across enterprises, including the VPNs, Zero Trust Network Access (ZTNA), proxy servers, Secure Shell (SSH) tunnels, the software-defined wide area network (SD-WAN), and Secure Access Service Edge (SASE). This paper also presents a comprehensive cybersecurity framework named Zero Trust VPN (ZT-VPN), which is a VPN solution based on Zero Trust principles. The proposed framework aims to enhance IT security and privacy for modern enterprises in remote work environments and address concerns of latency, throughput, scalability, and security. Finally, this paper demonstrates the effectiveness of the proposed framework in various enterprise scenarios, highlighting its ability to prevent data leaks, manage access permissions, and provide seamless security transitions. The findings underscore the importance of adopting ZT-VPN to fortify cybersecurity frameworks, offering an effective protection tool against contemporary cyber threats. This research serves as a valuable reference for organizations aiming to enhance their security posture in an increasingly hostile threat landscape.
APA, Harvard, Vancouver, ISO, and other styles
49

Morozova, O. I., and O. S. Zeniakin. "DEGREES OF LATENCY OF ECOLOGICAL DISCOURSE AGENT (A CASE STUDY OF BRITISH ONLINE NEWSPAPERS)." Opera in linguistica ukrainiana, no. 28 (September 28, 2021): 291–98. http://dx.doi.org/10.18524/2414-0627.2021.28.235560.

Full text
Abstract:
This article proposes a study of degrees of latency of the agent, which is a semantic role performed by a participant of the communicative situation described in a sentence; this role correlates with the instigator of the action. The agent can be expressed explicitly, so that everybody understands who the action is performed by, or in a hidden, latent way. Drawing on Goatly’s (2018) research which demonstrates that degrees of agent’s latency can vary, we modify his scale of latency by taking into consideration non-verbal (visual) means. A great societal concern for environmental issues around the globe nowadays, together with the ecolinguistic vector of this research account for its timeliness. The purpose of this research is to identify the degrees of latency of the agent of environmental discourse. Syntactic constructions, lexical units, and visual images that render the agent were chosen as the object-matter of analysis, while the degrees of latency – as its subject-matter. The methods comprise general scientific methods, such as induction and deduction, synthesis and analysis, observation and contrast, as well as linguistic methods proper: critical discourse analysis, semantic analysis, and multimodal analysis. The sample is selected from online versions of most widely read British newspapers, both broadsheets and tabloids, The Guardian and Metro respectively. A modified scale of degrees of agent’s latency is suggested, where six categories of linguistic means are differentiated according to the degree of their latency. Explicit predication is characterized by a zero degree of latency; its measure increases in grammatical constructions, tropes, nominalizations, ellipsis, and indefinite agent respectively. The prospects of this research lie in comparison and quantitative counts of the agent’s latency in different types of British media.
APA, Harvard, Vancouver, ISO, and other styles
50

Saad-Roy, Chadi M., Bryan T. Grenfell, Simon A. Levin, P. van den Driessche, and Ned S. Wingreen. "Evolution of an asymptomatic first stage of infection in a heterogeneous population." Journal of The Royal Society Interface 18, no. 179 (2021): 20210175. http://dx.doi.org/10.1098/rsif.2021.0175.

Full text
Abstract:
Pathogens evolve different life-history strategies, which depend in part on differences in their host populations. A central feature of hosts is their population structure (e.g. spatial). Additionally, hosts themselves can exhibit different degrees of symptoms when newly infected; this latency is a key life-history property of pathogens. With an evolutionary-epidemiological model, we examine the role of population structure on the evolutionary dynamics of latency. We focus on specific power-law-like formulations for transmission and progression from the first infectious stage as a function of latency, assuming that the across-group to within-group transmission ratio increases if hosts are less symptomatic. We find that simple population heterogeneity can lead to local evolutionarily stable strategies (ESSs) at zero and infinite latency in situations where a unique ESS exists in the corresponding homogeneous case. Furthermore, there can exist more than one interior evolutionarily singular strategy. We find that this diversity of outcomes is due to the (possibly slight) advantage of across-group transmission for pathogens that produce fewer symptoms in a first infectious stage. Thus, our work reveals that allowing individuals without symptoms to travel can have important unintended evolutionary effects and is thus fundamentally problematic in view of the evolutionary dynamics of latency.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!