76 resultados para Wireless security
em Consorci de Serveis Universitaris de Catalunya (CSUC), Spain
Resumo:
Wireless Sensor Networks (WSN) are formed by nodes with limited computational and power resources. WSNs are finding an increasing number of applications, both civilian and military, most of which require security for the sensed data being collected by the base station from remote sensor nodes. In addition, when many sensor nodes transmit to the base station, the implosion problem arises. Providing security measures and implosion-resistance in a resource-limited environment is a real challenge. This article reviews the aggregation strategies proposed in the literature to handle the bandwidth and security problems related to many-to-one transmission in WSNs. Recent contributions to secure lossless many-to-one communication developed by the authors in the context of several Spanish-funded projects are surveyed. Ongoing work on the secure lossy many-to-one communication is also sketched.
Resumo:
This paper analyzes the role of traders' priors (proper versus improper) on the implications of market transparency by comparing a pre-trade transparent market with an opaque market in a set-up based on Madhavan (1996). We show that prices may be more informative in the opaque market, regardless of how priors are modelled. In contrast, the comparison of market liquidity and volatility in the two market structures are affected by prior specification. Key words: Market microstructure, Transparency, Prior information
Resumo:
Report for the scientific sojourn at the Multimedia Communications Laboratory, University of Texas at Dallas, USA, from September to December 2005. The cooperative transmission has been analyzed taking a broadcast relay channel which assumes a scenario with one source and multiple destinations. Moreover, in order to improve the performance in terms of mutual information, it has been considered that for each destination there is another nearby terminal (called relay) which will help to improve the performance of the destination. This scheme combines different types of channels considered in the information theory, such as the relay channel, broadcast channel and interference channel (if the relays transmit information intended only to its associated destination). In this work, the author has studied the optimal way to encode the signals for the different users, known as capacity region (i.e. related to radio resources management ), of the broadcast relay channel.
Resumo:
As a consequence of the terrorist attacks of 9/11 and the US-led war against Iraq, WMD and their proliferation have become a central element of the EU security agenda. In December 2003, the European Council adopted even a EU Strategy against Proliferation of WMD. The approach adopted in this Strategy can be largely described as a ‘cooperative security provider’ approach and is based on effective multilateralism, the promotion of a stable international and regional environment and the cooperation with key partners. The principal objective of this paper is to examine in how far the EU has actually implemented the ‘cooperative security provider’ approach in the area which the Non-proliferation Strategy identifies as one of its priorities – the Mediterranean. Focusing on the concept of security interdependence, the paper analyses first the various WMD dangers with which the EU is confronted in the Mediterranean area. Afterwards, it examines how the EU has responded to these hazards in the framework of the Barcelona process and, in particular, the new European Neighbourhood Policy. It is argued that despite its relatively powerful rhetoric, the EU has largely failed, for a wide range of reasons, to apply effectively its non-proliferation approach in the Mediterranean area and, thus, to become a successful security provider.
Resumo:
The European Neighbourhood Policy’s birth has taken place in parallel with the renewed momentum of the European Security and Defence Policy, which has launched 14 operations since 2003. Both policies’ instruments have converged in the neighbouring area covered by ENP: Georgia, in the East and the Palestinian Territories in the South. In both cases, the Security Sector Reform strategies have been the main focus for ESDP and an important objective for ENP. In this paper, two objectives are pursued: first, to assess the EU’s involvement in both cases in SSR terms; and second, to analyse whether the convergence of ESDP operations with a broader EU neighbourhood policy implies that the former has become an instrument for the a EU external action.
Resumo:
Aquest projecte es basa en l'estudi de l'oferiment de qualitat de servei en xarxes wireless i satel·litals. Per això l'estudi de les tècniques de cross-layer i del IEEE 802.11e ha sigut el punt clau per al desenvolupament teòric d’aquest estudi. Usant el simulador de xarxes network simulator, a la part de simulacions es plantegen tres situacions: l'estudi de la xarxa satel·lital, l'estudi del mètode d'accés HCCA i la interconnexió de la xarxa satel·lital amb la wireless. Encara que aquest últim punt, incomplet en aquest projecte, ha de ser la continuació per a futures investigacions.
Resumo:
El primer objectiu del projecte és l’estudi i disseny d’un desfassador bi – banda reconfigurable per integrar en sistemes d’antenes intel·ligents i amb aplicació a sistemes dual band WLAN operant en els marges freqüencials 2.4 - 2.5 GHz i 5.15 – 5.35GHz. El desfassador que es proposa realitzar està basat en un acoblador híbrid multibanda, diplexors i circuits reconfigurables commutats amb díodes PIN. El segon objectiu del projecte és l’aprenentatge de la metodologia de disseny de circuits d’RF i més concretament les següents etapes: estudi i disseny teòric (analític), simulació circuital (ADS), simulació electromagnètica (Momentum), cosimulació circuital-electromagnètica i fabricació, així com les diferents interacions i mecanismes d’optimització entre aquestes etapes.
Resumo:
The following paper presents an overview of the Ph.D Thesis1 presented in [1], which compiles all the research done during the period of time between 2004-2007. In that dissertation the relay-assisted transmission with half-duplex relays is analyzed from different points of view. This study is motivated by the necessity of finding innovative solutions to cope with the requirements of next generation wireless services, and with current radio technology. The use of relayed communications represents a change of paradigm of conventional communications, and requires the definition and evaluation of protocols to be applied to single or multiple-user relay communication. With the two fold goal of enhancing spectral efficiency and homogenize service in cellular communications, system design is investigated at physical (type of transmissions of the relay, decoding mode, ..) and upper layers (resource allocation, dynamic link control).
Resumo:
El treball presentat suposa una visió general de l'"Endoscopia amb Càpsula de Vídeo Wireless" i la inspecció de sequències de contraccions intestinals amb les últimes tecnologies de visió per computador. Després de la observació preliminar dels fonaments mèdics requerits, la aplicació de visió per computador es presenta en aquestos termes. En essència, aquest treball proveïx una exhaustiva selecció, descripció i avaluació de cert conjunt de mètodes de processament d'imatges respecte a l'anàlisi de moviment, en el entorn de seqüències d'imatges preses amb una càpsula endoscòpica. Finalment, es presenta una aplicació de software per configurar i emprar de forma ràpida i fàcil un entorn experimental.
Resumo:
El treball realitzat en aquest projecte es basa en l'implementació d'un demostrador wireless, i més específicament, en l'estudi de les tècniques network coding i virtualització. Network coding és un nou mètode de transmissió de dades que es basa en la codificació de paquets per incrementar el rendiment fins ara obtingut als mètodes de transmissió convencionals. La virtualització és una tècnica que consisteix en compartir de forma més eficient els recursos d'un sistema. En el nostre cas s'utilitzarà la virtualització per dividir una interfície sense fils en diferents usuaris virtuals transmetent i rebent dades simultàniament. L'objectiu del projecte és realitzar un seguit de proves i estudis per veure els avantatges d'aquestes dues tècniques.
Resumo:
This article addresses the normative dilemma located within the application of `securitization,’ as a method of understanding the social construction of threats and security policies. Securitization as a theoretical and practical undertaking is being increasingly used by scholars and practitioners. This scholarly endeavour wishes to provide those wishing to engage with securitization with an alternative application of this theory; one which is sensitive to and self-reflective of the possible normative consequences of its employment. This article argues that discussing and analyzing securitization processes have normative implications, which is understood here to be the negative securitization of a referent. The negative securitization of a referent is asserted to be carried out through the unchallenged analysis of securitization processes which have emerged through relations of exclusion and power. It then offers a critical understanding and application of securitization studies as a way of overcoming the identified normative dilemma. First, it examines how the Copenhagen School’s formation of securitization theory gives rise to a normative dilemma, which is situated in the performative and symbolic power of security as a political invocation and theoretical concept. Second, it evaluates previous attempts to overcome the normative dilemma of securitization studies, outlining the obstacles that each individual proposal faces. Third, this article argues that the normative dilemma of applying securitization can be avoided by firstly, deconstructing the institutional power of security actors and dominant security subjectivities and secondly, by addressing countering or alternative approaches to security and incorporating different security subjectivities. Examples of the securitization of international terrorism and immigration are prominent throughout.
Resumo:
Since the independence processes in the African continent, armed conflicts, peace and security have raised concern and attention both at the domestic level and at the international scale. In recent years, all aspects have undergone significant changes which have given rise to intense debate. The end of some historical conflicts has taken place in a context of slight decrease in the number of armed conflicts and the consolidation of post-conflict reconstruction processes. Moreover, African regional organizations have staged an increasingly more active internal shift in matters related to peace and security, encouraged by the idea of promoting “African solutions to African problems”. This new scenario, has been accompanied by new uncertainties at the security level and major challenges at the operational level, especially for the African Union. This article aims to ascertain the state of affairs on all these issues and raise some key questions to consider.
Resumo:
Tal i com estableix la Carta de les Nacions Unides, el Consell de Seguretat determina l’existència d’una amenaça a la pau, un trencament de la pau o un acte d’agressió i decideix les mesures que han de fer-se servir per restaurar la pau i seguretat internacionals, també l’ús de la força. L’objectiu d’aquest article és explorar la legitimitat d’aquest ús de la força. Amb aquest objectiu, el text parteix d’una definició centrada en les seves dimensions legal, normativa i social. En segon lloc, s’analitzarà com aquestes dimensions estan representades als debats del Consell de Seguretat de la guerra d’Irak de 2003, un dels usos de la força més controvertits i que més debat ha generat als darrers anys. Finalment, l’anàlisi proposat permet treure algunes conclusions sobre les bases canviants de la legitimitat de l’ús de la força.