Search results for "Hardware"

showing 10 items of 1372 documents

Electromagnetic Full-Wave Simulation of Partial Discharge Detection in High Voltage AC Cables

2019

Partial discharge (PD) activity in the insulation system of an electrical equipment can determine the failure of the whole apparatus. PD sensors are widely used in high-voltage electrical systems as the main elements of a detecting system oriented to real time monitoring. Recently, non-invasive sensors have been proposed in industrial applications for cable and other sensitive electrical parts: they are based both on capacitive and on the electromagnetic radiating coupling. In order to assess the real performance of a new sensor produced by a high voltage AC cables manufacturer, the paper proposes electromagnetic fullwave simulation results.

CouplingMaterials sciencebusiness.industryCapacitive sensingElectrical engineeringHigh voltageHardware_PERFORMANCEANDRELIABILITYelectric field distributionFinite element methodpartial dischargeSettore ING-IND/31 - ElettrotecnicaFinite Element AnalysiHardware_GENERALElectrical equipmentInsulation systemPartial dischargeHardware_INTEGRATEDCIRCUITSbusinessXLPE cableVoltage
researchProduct

Tracing the Cultural Background of Lone-Wolf Terrorism

2021

The end of the Cold War, as well as the collapse of the Soviet Union, posed new greater challenges and risks for the “Global North.” Terrorism—doubtless—seems to be one of them. Over the recent years, and particularly after 9/11, terrorists changed the focus of their attacks. While classic terrorism targeted important persons such as politicians, chief police officers, or celebrities, modern terrorism planned attacks on leisure-spots spaces, tourist destinations, and lay-persons. This is particularly troublesome for policymakers (who are in charge of orchestrating all-pervading models to preserve homeland security) and for field-workers who are seriously punished when they are in contact wi…

Cultural backgroundInformation Systems and ManagementComputer Networks and CommunicationsHardware and ArchitecturePolitical scienceLone wolfTerrorismCriminologySafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks

2015

Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…

Cyber defenseComputer Networks and CommunicationsHardware and Architecturebusiness.industryComputer scienceInternet privacyCyber-attackInternet of ThingsbusinessComputer securitycomputer.software_genrecomputerJournal of Cyber Security and Mobility
researchProduct

A Note on Keys and Keystreams of Chacha20 for Multi-key Channels

2018

In this paper we analyze the keystreams generated by the Chacha20 stream cipher. We also compare these to the ones generated by its predecessor, the RC4 stream cipher. Due to the proposed multi-key channels in the upcoming TLS 1.3 standard we analyze the behavior of the keystream in the boundary case where there is a single bit difference between two keys used for the initiation of the stream cipher algorithms. The goal is to check whether a single bit change in the key has any predictable influence on the bits of the keystream output.

Cybersecuritybusiness.industryComputer scienceKeystreamBoundary (topology)Stream cipher020206 networking & telecommunications02 engineering and technologyRC4Symmetric-key algorithmChacha200202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingHardware_ARITHMETICANDLOGICSTRUCTURESbusinessSymmetric encryptionStream cipherAlgorithm
researchProduct

Versatile Direct and Transpose Matrix Multiplication with Chained Operations: An Optimized Architecture Using Circulant Matrices

2016

With growing demands in real-time control, classification or prediction, algorithms become more complex while low power and small size devices are required. Matrix multiplication (direct or transpose) is common for such computation algorithms. In numerous algorithms, it is also required to perform matrix multiplication repeatedly, where the result of a multiplication is further multiplied again. This work describes a versatile computation procedure and architecture: one of the matrices is stored in internal memory in its circulant form, then, a sequence of direct or transpose multiplications can be performed without timing penalty. The architecture proposes a RAM-ALU block for each matrix c…

Cycles per instructionBlock matrix020206 networking & telecommunications02 engineering and technologyParallel computingMatrix chain multiplicationMatrix multiplication020202 computer hardware & architectureTheoretical Computer ScienceMatrix (mathematics)Computational Theory and MathematicsHardware and ArchitectureTranspose0202 electrical engineering electronic engineering information engineeringMultiplicationHardware_ARITHMETICANDLOGICSTRUCTURESArithmeticCirculant matrixSoftwareMathematicsIEEE Transactions on Computers
researchProduct

A DC and small signal AC model for organic thin film transistors including contact effects and non quasi static regime

2017

Abstract We present a compact model for the DC and small signal AC analysis of Organic Thin Film Transistors (OTFTs). The DC part of the model assumes that the electrical current injected in the OTFT is limited by the presence of a metal/organic semiconductor junction that, at source, acts as a reverse biased Schottky junction. By including this junction, modeled as a reverse biased gated diode at source, the DC model is able to reproduce the scaling of the electrical characteristics even for short channel devices. The small signal AC part of the model uses a transmission line approach in order to compute the impedances of the channel and parasitic regions of the device. The overlap capacit…

DC modelMaterials scienceContact effectsparasitic capacitanceSchottky barrierOrganic thin film transistors02 engineering and technologyHybrid-pi model01 natural sciencesSignalNon-quasi static small signal modelBiomaterialsOrganic thin film transistors; DC model; AC model; Contact effects; parasitic capacitance; Non-quasi static small signal modelParasitic capacitanceTransmission line0103 physical sciencesHardware_INTEGRATEDCIRCUITSMaterials ChemistryAC modelElectrical and Electronic EngineeringElectrical impedance010302 applied physicsbusiness.industryGeneral Chemistry021001 nanoscience & nanotechnologyCondensed Matter PhysicsElectronic Optical and Magnetic MaterialsOrganic semiconductorThin-film transistorOptoelectronics0210 nano-technologybusinessOrganic Electronics
researchProduct

HPG-HMapper: A DNA hydroxymethylation analysis tool

2019

DNA methylation (mC) and hydroxymethylation (hmC) can significantly affect the normal human development, as well as health and disease status. hmC studies require not only specific treatment of DNA, but also software tools for their analysis. However, there are no software tools capable of analyzing DNA hmC currently. In this article, we propose HPG-HMapper, a parallel software tool for analyzing the DNA hmC data obtained by ten-eleven translocation–assisted bisulfite sequencing. This tool takes as input data the output files of mC aligner tools, and it yields mC maps and the accounting of methylated and hydroxymethylated bases on each chromosome. The design of this tool includes the consi…

DNA Hydroxymethylation0303 health sciencesDisease statusComputer scienceParallel pipelineComputational biologyTheoretical Computer Science03 medical and health scienceschemistry.chemical_compound0302 clinical medicinechemistryHardware and ArchitectureDNA methylationA-DNA030217 neurology & neurosurgerySoftwareDNA030304 developmental biologyThe International Journal of High Performance Computing Applications
researchProduct

FRIPON: a worldwide network to track incoming meteoroids

2020

Context. Until recently, camera networks designed for monitoring fireballs worldwide were not fully automated, implying that in case of a meteorite fall, the recovery campaign was rarely immediate. This was an important limiting factor as the most fragile - hence precious - meteorites must be recovered rapidly to avoid their alteration. Aims. The Fireball Recovery and InterPlanetary Observation Network (FRIPON) scientific project was designed to overcome this limitation. This network comprises a fully automated camera and radio network deployed over a significant fraction of western Europe and a small fraction of Canada. As of today, it consists of 150 cameras and 25 European radio receiver…

DYNAMICS[INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR]MeteorsComputer scienceRadio receiver[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM]Surveys010502 geochemistry & geophysicsTrack (rail transport)01 natural sciencesMeteorites meteors meteoroidslaw.inventionPlanets and planetary system[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingMethods: observationallaw[INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO]meteoroids010303 astronomy & astrophysicsComputingMilieux_MISCELLANEOUSObservational methodsEarth and Planetary Astrophysics (astro-ph.EP)meteoroids -surveys -methods: observational -interplanetary medium[SDU.ASTR]Sciences of the Universe [physics]/Astrophysics [astro-ph]ORIGIN[INFO.INFO-AO]Computer Science [cs]/Computer Arithmeticmeteorites meteors meteoroids – surveys – methods: observational – interplanetary mediumMeteoroidsRECOVERYORBITMeteoriteFully automatedInterplanetary medium; Meteorites meteors meteoroids; Methods: observational; Surveys[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Astrophysics - Instrumentation and Methods for Astrophysics[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingFLUXReal-time computingfripon[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]FOS: Physical sciencesContext (language use)CAMERA[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][SPI.AUTO]Engineering Sciences [physics]/Automatic[SDU.STU.PL]Sciences of the Universe [physics]/Earth Sciences/Planetology0103 physical sciencesFIREBALL NETWORKobservational [Methods]meteorsInstrumentation and Methods for Astrophysics (astro-ph.IM)0105 earth and related environmental sciencesMeteoroidINNISFREE METEORITE[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Astronomy and AstrophysicsMETEORITE FALLMeteorites meteors meteoroidCamera networkSpace and Planetary Science[SDU]Sciences of the Universe [physics]Interplanetary spaceflightmeteroids trackingmeteoroids - surveys - methods: observationalSYSTEMInterplanetary mediumAstrophysics - Earth and Planetary AstrophysicsMeteorites
researchProduct

Industrial Environment Mapping Using Distributed Static 3D Sensor Nodes

2018

This paper presents a system architecture for mapping and real-time monitoring of a relatively large industrial robotic environment of size 10 m × 15 m × 5 m. Six sensor nodes with embedded computing power and local processing of the 3D point clouds are placed close to the ceiling. The system architecture and data processing is based on the Robot Operating System (ROS) and the Point Cloud Library (PCL). The 3D sensors used are the Microsoft Kinect for Xbox One and point cloud data is collected at 20 Hz. A new manual calibration procedure is developed using reflective planes. The specified range of the used sensor is 0.8 m to 4.2 m, while depth data up to 9 m is used in this paper. Despite t…

Data processingComputer scienceReal-time computingPoint cloud0102 computer and information sciences02 engineering and technologyCeiling (cloud)01 natural sciences020202 computer hardware & architecture010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Systems architectureCalibrationMetreReflection mapping2018 14th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications (MESA)
researchProduct

Design of the online PC farm for the high level trigger of the NA62 experiment at CERN

2012

We present a highly efficient data processing framework optimized for software based triggers of fixed-target HEP experiments with continuous data collection during burst time alternating with longer out-of-burst periods.

Data processingEngineeringLarge Hadron ColliderHigh level triggerSoftwarebusiness.industryAstrophysics::High Energy Astrophysical PhenomenabusinessNA62 experimentComputer hardwareContinuous data
researchProduct