Search results for "Computer network"

showing 10 items of 1634 documents

CORMORANT

2019

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…

PasswordAuthenticationBiometricsComputer Networks and CommunicationsEvent (computing)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreHuman-Computer InteractionInformation sensitivityKeystroke dynamicsHardware and Architecture0202 electrical engineering electronic engineering information engineeringStrong authentication020201 artificial intelligence & image processingcomputerMobile deviceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
researchProduct

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

2011

In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this p…

PasswordSecurity analysisArticle SubjectComputer sciencebusiness.industryCommunicationHash functionComputerApplications_COMPUTERSINOTHERSYSTEMSCryptographic protocolComputational resourcelcsh:TelecommunicationPublic-key cryptographySmart gridSCADAlcsh:TK5101-6720Media TechnologyElectrical and Electronic EngineeringbusinessComputer networkInternational Journal of Digital Multimedia Broadcasting
researchProduct

A secure architecture for P2PSIP-based communication systems

2009

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Desti…

PastryComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer securitycomputer.software_genreCommunications systemEncryptionDistributed hash tableContent addressable networkDistributed System Security ArchitectureSystems architecturebusinessChord (peer-to-peer)computerComputer networkProceedings of the 2nd international conference on Security of information and networks - SIN '09
researchProduct

Hereditariness of Aortic Tissue: In-Vitro Time-Dependent Failure of Human and Porcine Specimens

2018

This study aims to investigate the time dependent failure of aortic tissues for pathological and healthy samples by biomechanical testing. The experimental campaign has involved human pathological tissue and healthy swine tissue as preliminary study towards the development of novel failure criteria.

Pathologymedicine.medical_specialtySettore MED/09 - Medicina Internabusiness.industryRenewable Energy Sustainability and the EnvironmentEnergy Engineering and Power TechnologyComputer Science Applications1707 Computer Vision and Pattern RecognitionBiomechanical testingmedicine.diseaseATAAAneurysmIn vitrocreep failureIndustrial and Manufacturing Engineeringaortic tissue biomechanicAneurysmComputer Networks and CommunicationArtificial IntelligenceAortic tissuehereditarineMedicinebusinessSettore ICAR/08 - Scienza Delle CostruzioniPathologicalInstrumentation
researchProduct

Spanning Trees and bootstrap reliability estimation in correlation based networks

2007

We introduce a new technique to associate a spanning tree to the average linkage cluster analysis. We term this tree as the Average Linkage Minimum Spanning Tree. We also introduce a technique to associate a value of reliability to links of correlation based graphs by using bootstrap replicas of data. Both techniques are applied to the portfolio of the 300 most capitalized stocks traded at New York Stock Exchange during the time period 2001-2003. We show that the Average Linkage Minimum Spanning Tree recognizes economic sectors and sub-sectors as communities in the network slightly better than the Minimum Spanning Tree does. We also show that the average reliability of links in the Minimum …

Physics - Physics and SocietySpanning treecorrelation analysiApplied MathematicsReliability (computer networking)FOS: Physical sciencesPhysics and Society (physics.soc-ph)Minimum spanning treeTerm (time)CorrelationTree (data structure)complex networkStock exchangeModeling and SimulationPhysics - Data Analysis Statistics and ProbabilityStatisticsAverage Linkage Cluster AnalysisbootstrapEngineering (miscellaneous)Data Analysis Statistics and Probability (physics.data-an)Mathematicscluster analysis
researchProduct

Geometry-Based Statistical Modeling of Non-WSSUS Mobile-to-Mobile Rayleigh Fading Channels

2017

In this paper, we present a novel geometry-based statistical model for small-scale non-wide-sense stationary uncorrelated scattering (non-WSSUS) mobile-to-mobile (M2M) Rayleigh fading channels. The proposed model builds on the principles of plane wave propagation to capture the temporal evolution of the propagation delay and Doppler shift of the received multipath signal. This is different from existing non-WSSUS geometry-based statistical channel models, which are based on a spherical wave propagation approach, that in spite of being more realistic is more mathematically intricate. By considering an arbitrary geometrical configuration of the propagation area, we derive general expressions …

PhysicsComputer Networks and CommunicationsAerospace Engineering020206 networking & telecommunications020302 automobile design & engineeringStatistical modelGeometry02 engineering and technologyCorrelation function (statistical mechanics)Fading distribution0203 mechanical engineeringChannel state informationRician fadingAutomotive Engineering0202 electrical engineering electronic engineering information engineeringFadingElectrical and Electronic EngineeringMultipath propagationComputer Science::Information TheoryRayleigh fading
researchProduct

A Unified Disk Scattering Model and Its Angle-of-Departure and Time-of-Arrival Statistics

2013

This paper proposes a novel probability density function (PDF) for the distribution of local scatterers inside a disk centered on the mobile station (MS). The new scattering model is introduced as the unified disk scattering model (UDSM), as it unifies a variety of typical circularly symmetric scattering models into one simple model. By adjusting a designated shape factor controlling the distribution of the scatterers, both the uniform circular and uniform ring scattering models can be obtained as special cases. Furthermore, the original Gaussian and uniform hollow-disk scattering models can be approximated with a high level of accuracy. In addition to these established scattering models, a…

PhysicsComputer Networks and CommunicationsScatteringGaussianMathematical analysisAerospace EngineeringProbability density functionsymbols.namesakeTime of arrivalDistribution (mathematics)Joint probability distributionAutomotive EngineeringsymbolsElectronic engineeringScattering theoryElectrical and Electronic EngineeringShape factorIEEE Transactions on Vehicular Technology
researchProduct

Optimization of Gyrotron Resonator’s Dimensions

2021

This paper explains the procedure of determining the initial dimensions of a gyrotron resonator. In particular, the paper discusses which geometrical parameters impact the wave properties of the resonator. The solution is implemented using Matlab software and estimations are performed with the use of the SMath Studio spreadsheet. © 2021 National Institute of Telecommunications. All rights reserved.

PhysicsComputer Networks and Communicationsbusiness.industry020208 electrical & electronic engineeringMatlab code02 engineering and technologyCold cavity01 natural sciences010305 fluids & plasmaslaw.inventionResonatorOpticslawGyrotrongyrotron design0103 physical sciences:NATURAL SCIENCES [Research Subject Categories]0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringbusinessJournal of Telecommunications and Information Technology
researchProduct

Rigorous analysis of three-dimensional beam transmission through a dielectric slab

1997

The plane-wave-spectrum technique is applied to study the transmission of a three-dimensional beam through a dielectric slab. The electromagnetic beam radiated from an aperture antenna is represented by an angular spectrum of plane waves. The use of three different co-ordinate systems using rectangular co-ordinates allows a rigorous formulation to be obtained. The near field transmitted through a dielectric slab is obtained and compared with measurements.

PhysicsComputer Networks and Communicationsbusiness.industryAntenna aperturePlane wavePhysics::OpticsNear and far fieldDielectricAngular spectrum methodOpticsSlabElectrical and Electronic EngineeringbusinessBeam (structure)Beam divergenceIEE Proceedings - Microwaves, Antennas and Propagation
researchProduct

Effect of Acoustic Wave Reflections on Space Charge Measurements with PEA Method

2018

The Pulsed Electro-Acoustic (PEA) method is the most used technique for space charge detection in solid dielectrics. The methodology is largely employed in the field of High Voltage Direct Current (HVDC) transmission and is based on the detection of acoustic waves generated by charges vibration. One of the most common problems arising during the detection is the presence of multiple reflections taking place due to the presence of means discontinuity in the different PEA cell components. This reflection phenomenon, if not well taken into account, could cause incorrect interpretation of the PEA output signal. It is easy to understand that a simulation model is a basic tool to understand the w…

PhysicsPEA methodRenewable Energy Sustainability and the EnvironmentNumerical analysisAcousticsPEA modelEnergy Engineering and Power TechnologyComputer Science Applications1707 Computer Vision and Pattern RecognitionAcoustic waveDielectricsimulationSpace chargeIndustrial and Manufacturing EngineeringVibrationSettore ING-IND/31 - ElettrotecnicaComputer Networks and CommunicationTransduceracosutic waveArtificial IntelligenceHigh-voltage direct currentMATLABInstrumentationcomputercomputer.programming_language2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI)
researchProduct