Search results for "Key"

showing 10 items of 1962 documents

A group-based wireless body sensors network using energy harvesting for soccer team monitoring

2016

[EN] In team-based sports, it is difficult to monitor physical state of each athlete during the match. Wearable body sensors with wireless connections allow having low-power and low-size devices, that may use energy harvesting, but with low radio coverage area but the main issue comes from the mobility. This paper presents a wireless body sensors network for soccer team players' monitoring. Each player has a body sensor network that use energy harvesting and each player will be a node in the wireless sensor network. This proposal is based on the zone mobility of the players and their dynamism. It allows knowing the physical state of each player during the whole match. Having fast updates an…

Computer Networks and CommunicationsComputer scienceWearable computer02 engineering and technologyGroup-based wireless sensor networkTEORIA DE LA SEÑAL Y COMUNICACIONES0202 electrical engineering electronic engineering information engineeringWirelessDynamismElectrical and Electronic Engineeringbusiness.industryNode (networking)020206 networking & telecommunicationsINGENIERIA TELEMATICAWSNComputer Science ApplicationsKey distribution in wireless sensor networksControl and Systems EngineeringEmbedded system020201 artificial intelligence & image processingState (computer science)Wireless body sensor networkMobilitysoccerbusinessEnergy harvestingWireless sensor networkComputer network
researchProduct

SDN@home: A Method for Controlling Future Wireless Home Networks

2016

Recent advances in wireless networking technologies are leading toward the proliferation of novel home network applications. However, the landscape of emerging scenarios is fragmented due to their varying technological requirements and the heterogeneity of current wireless technologies. We argue that the development of flexible software-defined wireless architectures, including such efforts as the wireless MAC processor, coupled with SDN concepts, will enable the support of both emerging and future home applications. In this article, we first identify problems with managing current home networks composed of separate network segments governed by different technologies. Second, we point out t…

Computer Networks and CommunicationsWireless ad hoc networkComputer science02 engineering and technology03 medical and health sciences0302 clinical medicineHome automation0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic EngineeringNetwork architectureResidential gatewaySettore ING-INF/03 - TelecomunicazioniWireless networkbusiness.industryComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsWireless WANService providerNetworking hardwareComputer Science ApplicationsWireless site surveyKey distribution in wireless sensor networksComputer Networks and CommunicationSoftware-defined networkingbusinessTelecommunicationsHeterogeneous networkMunicipal wireless network030215 immunologyComputer network
researchProduct

An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility

2017

Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…

Computer Networks and Communicationsbusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyIntrusion detection systemIPv6Key distribution in wireless sensor networksClone (algebra)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessWireless sensor networkInformation SystemsComputer networkInternational Journal on Semantic Web and Information Systems
researchProduct

A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography

2015

International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless sensor networks WSNsSimple power analysisSecure data aggregationHomomorphic encryptionCryptographyEncryptionHomomorphic encryptionPublic-key cryptography[SPI]Engineering Sciences [physics]Key distribution in wireless sensor networksStateful firewallHardware and ArchitectureOverhead (computing)businessSecurity levelWireless sensor networkSoftwareComputer networkAd Hoc Networks
researchProduct

Enabling early sleeping and early data transmission in wake-up radio-enabled IoT networks

2019

Abstract Wireless sensor networks (WSNs) are one of the key enabling technologies for the Internet of things (IoT). In such networks, wake-up radio (WuR) is gaining its popularity thanks to its on-demand transmission feature and overwhelming energy consumption superiority. Despite this advantage, overhearing still occurs when a wake-up receiver decodes the address of a wake-up call (WuC) which is not intended to it, causing a certain amount of extra energy waste in the network. Moreover, long latency may occur due to WuC address decoding since WuCs are transmitted at a very low data rate. In this paper, we propose two schemes, i.e., early sleeping (ES) and early data transmission (EDT), to …

Computer Networks and Communicationsbusiness.industryNetwork packetComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedLatency (audio)020206 networking & telecommunications02 engineering and technologyEnergy consumptionTransmission (telecommunications)0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingbusinessWireless sensor networkVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Computer networkData transmission
researchProduct

Stackelberg-Cournot and Cournot equilibria in a mixed markets exchange economy

2012

In this note, we compare two strategic general equilibrium concepts: the Stackelberg-Cournot equilibrium and the Cournot equilibrium. We thus consider a market exchange economy including atoms and a continuum of traders, who behave strategically. We show that, when the preferences of the small traders are represented by Cobb-Douglas utility functions and the atoms have the same utility functions and endowments, the Stackelberg-Cournot and the Cournot equilibrium equilibria coincide if and only if the followers’ best responses functions have a zero slope at the SCE.

Computer Science::Computer Science and Game TheoryStackelberg-CournotGeneral equilibrium theoryContinuum (topology)05 social sciencesEconomyCournot competition[SHS.ECO]Humanities and Social Sciences/Economics and FinanceComputer Science::Multiagent SystemsNonlinear Sciences::Adaptation and Self-Organizing SystemsMarket exchange0502 economics and business[No keyword available]EconomicsStackelberg competitionExchange economy[ SHS.ECO ] Humanities and Social Sciences/Economies and finances050207 economics[SHS.ECO] Humanities and Social Sciences/Economics and FinanceMathematical economicsComputingMilieux_MISCELLANEOUS050205 econometrics
researchProduct

A Visual Simulation Framework For Simultaneous Multithreading Architectures

2011

The computing systems, and particularly microarchitectures, are in a continuous expansion reaching an unmanageable complexity by the human mind. In order to understand and control this expansion, researchers need to design and implement larger and more complex systems’ simulators. In the current paradigm the simulators play the key role in going further, by translating all complex processing mechanisms in relevant and easy to understand information. This paper aims to make a suggestive description of the concepts and principles implemented into a Simultaneous Multithreading Architecture. We introduce the SMTAHSim framework, an educational tool that simulates in an interactive manner the imp…

Computer architecturebusiness.industryComputer scienceMultithreadingControl (management)Key (cryptography)Complex systemArchitectureSimultaneous multithreadingSoftware engineeringbusinessTemporal multithreadingMicroarchitectureECMS 2011 Proceedings edited by: T. Burczynski, J. Kolodziej, A. Byrski, M. Carvalho
researchProduct

PyDSC: a simple tool to treat differential scanning calorimetry data

2020

AbstractHerein, we describe an open-source, Python-based, script to treat the output of differential scanning calorimetry (DSC) experiments, called pyDSC, available free of charge for download at https://github.com/leonardo-chiappisi/pyDSC under a GNU General Public License v3.0. The main aim of this program is to provide the community with a simple program to analyze raw DSC data. Key features include the correction from spurious signals, and, most importantly, the baseline is computed with a robust, physically consistent approach. We also show that the baseline correction routine implemented in the script is significantly more reproducible than different standard ones proposed by propriet…

Computer science030303 biophysicsDSC03 medical and health sciencesSoftwareDifferential scanning calorimetryprotein conformationPhysical and Theoretical ChemistrySpurious relationshipReliability (statistics)0303 health sciencesReproducibilityInstrument controlSIMPLE (military communications protocol)business.industry030302 biochemistry & molecular biologypolymer stabilityCondensed Matter PhysicsKey featuresbaseline correction540 Chemie und zugeordnete Wissenschaftenphase transitionddc:540businessAlgorithmPython
researchProduct

A method to estimate the path gains and propagation delays of underwater acoustic channels using the arrival phase information of the multipath compo…

2017

Abstract We propose a method for the estimation of the channel parameters of underwater acoustic channels (UACs) by using a pseudo-noise (PN) sequence. For the channel sounding, the PN sequence is coherently modulated on a carrier frequency by using a binary phase-shift keying (BPSK) modulation scheme. For the demodulation, the arrival phases of the received BPSK signals must be known at the receiver. In practice, however, the arrival phases of the received signal are unknown. We propose to demodulate the received BPSK signal by using an hypothetical arrival phase, which will be increased from 0 to 2 π . The demodulated signal obtained by using the hypothetical arrival phase is then correla…

Computer scienceAcousticsChannel sounding020206 networking & telecommunicationsKeying02 engineering and technology01 natural sciencesTransmission (telecommunications)Modulation0103 physical sciences0202 electrical engineering electronic engineering information engineeringElectronic engineeringDemodulationElectrical and Electronic Engineering010301 acousticsMultipath propagationComputer Science::Information TheoryCommunication channelPhase-shift keyingAEU - International Journal of Electronics and Communications
researchProduct

Encriptación óptica empleando llaves Weierstrass-Mandelbrot

2013

[EN] This paper presents the generation of encryption keys using the local oscillating properties of the partial sums of Weierstrass-Mandelbrot fractal function. In this way, the security key can be replicated if the parameters used to obtain it are known. Therefore, these parameters can be sent instead of sending the key. This procedure reduces the amount of information to be sent and prevents possible interception of the key. Moreover, the key can not be affected by data loss or pollution. The effectiveness of the Weierstrass-Mandelbrot keys were demonstrated by computer simulation in a 4f optical encryption system and the double random phase encoding technique. These keys allow us to enc…

Computer scienceCiencias FísicasÓptica y FotónicaData securityLlaveData lossEncryptionComputer securitycomputer.software_genrelcsh:Education (General)Doble máscaraDouble-masked//purl.org/becyt/ford/1 [https]FractalEncoding (memory)Encriptación ópticaOptical cryptographyCiencias ExactasÓpticaclaves o llavesbusiness.industryFunction (mathematics)//purl.org/becyt/ford/1.3 [https]encriptaciónOptical encryptionoptical cryptography fractal key double-maskedFractal keybusinesslcsh:L7-991FractalAlgorithmcomputerCIENCIAS NATURALES Y EXACTAScriptografíaencriptación óptica fractal llave doble máscara
researchProduct