Search results for "Computer network"
showing 10 items of 1634 documents
CORMORANT
2019
People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid
2011
In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this p…
A secure architecture for P2PSIP-based communication systems
2009
Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Desti…
Hereditariness of Aortic Tissue: In-Vitro Time-Dependent Failure of Human and Porcine Specimens
2018
This study aims to investigate the time dependent failure of aortic tissues for pathological and healthy samples by biomechanical testing. The experimental campaign has involved human pathological tissue and healthy swine tissue as preliminary study towards the development of novel failure criteria.
Spanning Trees and bootstrap reliability estimation in correlation based networks
2007
We introduce a new technique to associate a spanning tree to the average linkage cluster analysis. We term this tree as the Average Linkage Minimum Spanning Tree. We also introduce a technique to associate a value of reliability to links of correlation based graphs by using bootstrap replicas of data. Both techniques are applied to the portfolio of the 300 most capitalized stocks traded at New York Stock Exchange during the time period 2001-2003. We show that the Average Linkage Minimum Spanning Tree recognizes economic sectors and sub-sectors as communities in the network slightly better than the Minimum Spanning Tree does. We also show that the average reliability of links in the Minimum …
Geometry-Based Statistical Modeling of Non-WSSUS Mobile-to-Mobile Rayleigh Fading Channels
2017
In this paper, we present a novel geometry-based statistical model for small-scale non-wide-sense stationary uncorrelated scattering (non-WSSUS) mobile-to-mobile (M2M) Rayleigh fading channels. The proposed model builds on the principles of plane wave propagation to capture the temporal evolution of the propagation delay and Doppler shift of the received multipath signal. This is different from existing non-WSSUS geometry-based statistical channel models, which are based on a spherical wave propagation approach, that in spite of being more realistic is more mathematically intricate. By considering an arbitrary geometrical configuration of the propagation area, we derive general expressions …
A Unified Disk Scattering Model and Its Angle-of-Departure and Time-of-Arrival Statistics
2013
This paper proposes a novel probability density function (PDF) for the distribution of local scatterers inside a disk centered on the mobile station (MS). The new scattering model is introduced as the unified disk scattering model (UDSM), as it unifies a variety of typical circularly symmetric scattering models into one simple model. By adjusting a designated shape factor controlling the distribution of the scatterers, both the uniform circular and uniform ring scattering models can be obtained as special cases. Furthermore, the original Gaussian and uniform hollow-disk scattering models can be approximated with a high level of accuracy. In addition to these established scattering models, a…
Optimization of Gyrotron Resonator’s Dimensions
2021
This paper explains the procedure of determining the initial dimensions of a gyrotron resonator. In particular, the paper discusses which geometrical parameters impact the wave properties of the resonator. The solution is implemented using Matlab software and estimations are performed with the use of the SMath Studio spreadsheet. © 2021 National Institute of Telecommunications. All rights reserved.
Rigorous analysis of three-dimensional beam transmission through a dielectric slab
1997
The plane-wave-spectrum technique is applied to study the transmission of a three-dimensional beam through a dielectric slab. The electromagnetic beam radiated from an aperture antenna is represented by an angular spectrum of plane waves. The use of three different co-ordinate systems using rectangular co-ordinates allows a rigorous formulation to be obtained. The near field transmitted through a dielectric slab is obtained and compared with measurements.
Effect of Acoustic Wave Reflections on Space Charge Measurements with PEA Method
2018
The Pulsed Electro-Acoustic (PEA) method is the most used technique for space charge detection in solid dielectrics. The methodology is largely employed in the field of High Voltage Direct Current (HVDC) transmission and is based on the detection of acoustic waves generated by charges vibration. One of the most common problems arising during the detection is the presence of multiple reflections taking place due to the presence of means discontinuity in the different PEA cell components. This reflection phenomenon, if not well taken into account, could cause incorrect interpretation of the PEA output signal. It is easy to understand that a simulation model is a basic tool to understand the w…