Search results for "Hardware"
showing 10 items of 1372 documents
Electromagnetic Full-Wave Simulation of Partial Discharge Detection in High Voltage AC Cables
2019
Partial discharge (PD) activity in the insulation system of an electrical equipment can determine the failure of the whole apparatus. PD sensors are widely used in high-voltage electrical systems as the main elements of a detecting system oriented to real time monitoring. Recently, non-invasive sensors have been proposed in industrial applications for cable and other sensitive electrical parts: they are based both on capacitive and on the electromagnetic radiating coupling. In order to assess the real performance of a new sensor produced by a high voltage AC cables manufacturer, the paper proposes electromagnetic fullwave simulation results.
Tracing the Cultural Background of Lone-Wolf Terrorism
2021
The end of the Cold War, as well as the collapse of the Soviet Union, posed new greater challenges and risks for the “Global North.” Terrorism—doubtless—seems to be one of them. Over the recent years, and particularly after 9/11, terrorists changed the focus of their attacks. While classic terrorism targeted important persons such as politicians, chief police officers, or celebrities, modern terrorism planned attacks on leisure-spots spaces, tourist destinations, and lay-persons. This is particularly troublesome for policymakers (who are in charge of orchestrating all-pervading models to preserve homeland security) and for field-workers who are seriously punished when they are in contact wi…
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks
2015
Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…
A Note on Keys and Keystreams of Chacha20 for Multi-key Channels
2018
In this paper we analyze the keystreams generated by the Chacha20 stream cipher. We also compare these to the ones generated by its predecessor, the RC4 stream cipher. Due to the proposed multi-key channels in the upcoming TLS 1.3 standard we analyze the behavior of the keystream in the boundary case where there is a single bit difference between two keys used for the initiation of the stream cipher algorithms. The goal is to check whether a single bit change in the key has any predictable influence on the bits of the keystream output.
Versatile Direct and Transpose Matrix Multiplication with Chained Operations: An Optimized Architecture Using Circulant Matrices
2016
With growing demands in real-time control, classification or prediction, algorithms become more complex while low power and small size devices are required. Matrix multiplication (direct or transpose) is common for such computation algorithms. In numerous algorithms, it is also required to perform matrix multiplication repeatedly, where the result of a multiplication is further multiplied again. This work describes a versatile computation procedure and architecture: one of the matrices is stored in internal memory in its circulant form, then, a sequence of direct or transpose multiplications can be performed without timing penalty. The architecture proposes a RAM-ALU block for each matrix c…
A DC and small signal AC model for organic thin film transistors including contact effects and non quasi static regime
2017
Abstract We present a compact model for the DC and small signal AC analysis of Organic Thin Film Transistors (OTFTs). The DC part of the model assumes that the electrical current injected in the OTFT is limited by the presence of a metal/organic semiconductor junction that, at source, acts as a reverse biased Schottky junction. By including this junction, modeled as a reverse biased gated diode at source, the DC model is able to reproduce the scaling of the electrical characteristics even for short channel devices. The small signal AC part of the model uses a transmission line approach in order to compute the impedances of the channel and parasitic regions of the device. The overlap capacit…
HPG-HMapper: A DNA hydroxymethylation analysis tool
2019
DNA methylation (mC) and hydroxymethylation (hmC) can significantly affect the normal human development, as well as health and disease status. hmC studies require not only specific treatment of DNA, but also software tools for their analysis. However, there are no software tools capable of analyzing DNA hmC currently. In this article, we propose HPG-HMapper, a parallel software tool for analyzing the DNA hmC data obtained by ten-eleven translocation–assisted bisulfite sequencing. This tool takes as input data the output files of mC aligner tools, and it yields mC maps and the accounting of methylated and hydroxymethylated bases on each chromosome. The design of this tool includes the consi…
FRIPON: a worldwide network to track incoming meteoroids
2020
Context. Until recently, camera networks designed for monitoring fireballs worldwide were not fully automated, implying that in case of a meteorite fall, the recovery campaign was rarely immediate. This was an important limiting factor as the most fragile - hence precious - meteorites must be recovered rapidly to avoid their alteration. Aims. The Fireball Recovery and InterPlanetary Observation Network (FRIPON) scientific project was designed to overcome this limitation. This network comprises a fully automated camera and radio network deployed over a significant fraction of western Europe and a small fraction of Canada. As of today, it consists of 150 cameras and 25 European radio receiver…
Industrial Environment Mapping Using Distributed Static 3D Sensor Nodes
2018
This paper presents a system architecture for mapping and real-time monitoring of a relatively large industrial robotic environment of size 10 m × 15 m × 5 m. Six sensor nodes with embedded computing power and local processing of the 3D point clouds are placed close to the ceiling. The system architecture and data processing is based on the Robot Operating System (ROS) and the Point Cloud Library (PCL). The 3D sensors used are the Microsoft Kinect for Xbox One and point cloud data is collected at 20 Hz. A new manual calibration procedure is developed using reflective planes. The specified range of the used sensor is 0.8 m to 4.2 m, while depth data up to 9 m is used in this paper. Despite t…
Design of the online PC farm for the high level trigger of the NA62 experiment at CERN
2012
We present a highly efficient data processing framework optimized for software based triggers of fixed-target HEP experiments with continuous data collection during burst time alternating with longer out-of-burst periods.