845 resultados para Secure Authentication for Broadcast (DNP3-SAB)
Resumo:
Recently, there has been a dramatic increase in the number of ecotoxicological studies examining the effects of toxicants on fertilization success in marine broadcast spawners and it appears that this life-history stage is one of the most vulnerable to toxicants. Most of the studies examining this issue use single sperm concentrations in their assays. Here, I discuss recent advances in fertilization ecology that suggest this technique has some severe limitations resulting in unreliable estimations of the size and direction of toxicant effects. I present an alternative assay technique and two metrics (F-max and [Sperm](max)) that will reliably estimate the size of a toxicant's effect on fertilization success. This technique has the added advantage of making comparisons among species and studies easier without an impractical increase in effort. (c) 2006 Elsevier Ltd. All rights reserved.
Resumo:
User requirements of multimedia authentication are various. In some cases, the user requires an authentication system to monitor a set of specific areas with respective sensitivity while neglecting other modification. Most current existing fragile watermarking schemes are mixed systems, which can not satisfy accurate user requirements. Therefore, in this paper we designed a sensor-based multimedia authentication architecture. This system consists of sensor combinations and a fuzzy response logic system. A sensor is designed to strictly respond to given area tampering of a certain type. With this scheme, any complicated authentication requirement can be satisfied, and many problems such as error tolerant tamper method detection will be easily resolved. We also provided experiments to demonstrate the implementation of the sensor-based system
Resumo:
Infrastructureless networks are becoming more popular with the increased prevalence of wireless networking technology. A significant challenge faced by these infrastructureless networks is that of providing security. In this paper we examine the issue of authentication, a fundamental component of most security approaches, and show how it can be performed despite an absence of trusted infrastructure and limited or no existing trust relationship between network nodes. Our approach enables nodes to authenticate using a combination of contextual information, harvested from the environment, and traditional authentication factors (such as public key cryptography). Underlying our solution is a generic threshold signature scheme that enables distributed generation of digital certificates.
Resumo:
Internet of Things (IoT) can be defined as a “network of networks” composed by billions of uniquely identified physical Smart Objects (SO), organized in an Internet-like structure. Smart Objects can be items equipped with sensors, consumer devices (e.g., smartphones, tablets, or wearable devices), and enterprise assets that are connected both to the Internet and to each others. The birth of the IoT, with its communications paradigms, can be considered as an enabling factor for the creation of the so-called Smart Cities. A Smart City uses Information and Communication Technologies (ICT) to enhance quality, performance and interactivity of urban services, ranging from traffic management and pollution monitoring to government services and energy management. This thesis is focused on multi-hop data dissemination within IoT and Smart Cities scenarios. The proposed multi-hop techniques, mostly based on probabilistic forwarding, have been used for different purposes: from the improvement of the performance of unicast protocols for Wireless Sensor Networks (WSNs) to the efficient data dissemination within Vehicular Ad-hoc NETworks (VANETs).
Resumo:
A sociedade digital nos abraça em todos os aspectos do cotidiano e uma parte significativa da população vive conectada em multiplataformas. Com a instantaneidade dos fluxos de comunicação, vivemos uma rotina onde muitos acessos estão a um clique ou toque. A televisão como mídia preponderante durante várias décadas, na sua transição digital comporta uma função além da TV que conhecíamos, como display interativo que se conecta e absorve conteúdos provenientes de várias fontes. Os consagrados modelos mundiais de distribuição de audiovisual, especialmente pelo Broadcast, sofrem as consequências da mudança do comportamento do seu público pelas novas oportunidades de acesso aos conteúdos, agora interativos e sob demanda. Neste contexto, os modelos das SmartTVs (TVs conectadas) em Broadband (Banda Larga) apresentam opções diferenciadas e requerem um espaço cada vez maior na conexão com todos os outros displays. Com este cenário, o presente estudo busca descrever e analisar as novas ofertas de conteúdos, aplicativos, possibilidades e tendências do hibridismo das fontes para a futura TV.
Resumo:
We investigate the use of Gallager's low-density parity-check (LDPC) codes in a degraded broadcast channel, one of the fundamental models in network information theory. Combining linear codes is a standard technique in practical network communication schemes and is known to provide better performance than simple time sharing methods when algebraic codes are used. The statistical physics based analysis shows that the practical performance of the suggested method, achieved by employing the belief propagation algorithm, is superior to that of LDPC based time sharing codes while the best performance, when received transmissions are optimally decoded, is bounded by the time sharing limit.
Resumo:
A local area network that can support both voice and data packets offers economic advantages due to the use of only a single network for both types of traffic, greater flexibility to changing user demands, and it also enables efficient use to be made of the transmission capacity. The latter aspect is very important in local broadcast networks where the capacity is a scarce resource, for example mobile radio. This research has examined two types of local broadcast network, these being the Ethernet-type bus local area network and a mobile radio network with a central base station. With such contention networks, medium access control (MAC) protocols are required to gain access to the channel. MAC protocols must provide efficient scheduling on the channel between the distributed population of stations who want to transmit. No access scheme can exceed the performance of a single server queue, due to the spatial distribution of the stations. Stations cannot in general form a queue without using part of the channel capacity to exchange protocol information. In this research, several medium access protocols have been examined and developed in order to increase the channel throughput compared to existing protocols. However, the established performance measures of average packet time delay and throughput cannot adequately characterise protocol performance for packet voice. Rather, the percentage of bits delivered within a given time bound becomes the relevant performance measure. Performance evaluation of the protocols has been examined using discrete event simulation and in some cases also by mathematical modelling. All the protocols use either implicit or explicit reservation schemes, with their efficiency dependent on the fact that many voice packets are generated periodically within a talkspurt. Two of the protocols are based on the existing 'Reservation Virtual Time CSMA/CD' protocol, which forms a distributed queue through implicit reservations. This protocol has been improved firstly by utilising two channels, a packet transmission channel and a packet contention channel. Packet contention is then performed in parallel with a packet transmission to increase throughput. The second protocol uses variable length packets to reduce the contention time between transmissions on a single channel. A third protocol developed, is based on contention for explicit reservations. Once a station has achieved a reservation, it maintains this effective queue position for the remainder of the talkspurt and transmits after it has sensed the transmission from the preceeding station within the queue. In the mobile radio environment, adaptions to the protocols were necessary in order that their operation was robust to signal fading. This was achieved through centralised control at a base station, unlike the local area network versions where the control was distributed at the stations. The results show an improvement in throughput compared to some previous protocols. Further work includes subjective testing to validate the protocols' effectiveness.
Resumo:
Objective - To evaluate long-term safety of intravitreal ranibizumab 0.5-mg injections in neovascular age-related macular degeneration (nAMD). Design - Twenty-four–month, open-label, multicenter, phase IV extension study. Participants - Two hundred thirty-four patients previously treated with ranibizumab for 12 months in the EXCITE/SUSTAIN study. Methods - Ranibizumab 0.5 mg administered at the investigator's discretion as per the European summary of product characteristics 2007 (SmPC, i.e., ranibizumab was administered if a patient experienced a best-corrected visual acuity [BCVA] loss of >5 Early Treatment Diabetic Retinopathy Study letters measured against the highest visual acuity [VA] value obtained in SECURE or previous studies [EXCITE and SUSTAIN], attributable to the presence or progression of active nAMD in the investigator's opinion). Main Outcome Measures - Incidence of ocular or nonocular adverse events (AEs) and serious AEs, mean change in BCVA from baseline over time, and the number of injections. Results - Of 234 enrolled patients, 210 (89.7%) completed the study. Patients received 6.1 (mean) ranibizumab injections over 24 months. Approximately 42% of patients had 7 or more visits at which ranibizumab was not administered, although they had experienced a VA loss of more than 5 letters, indicating either an undertreatment or that factors other than VA loss were considered for retreatment decision by the investigator. The most frequent ocular AEs (study eye) were retinal hemorrhage (12.8%; 1 event related to study drug), cataract (11.5%; 1 event related to treatment procedure), and increased intraocular pressure (6.4%; 1 event related to study drug). Cataract reported as serious due to hospitalization for cataract surgery occurred in 2.6% of patients; none was suspected to be related to study drug or procedure. Main nonocular AEs were hypertension and nasopharyngitis (9.0% each). Arterial thromboembolic events were reported in 5.6% of the patients. Five (2.1%) deaths occurred during the study, none related to the study drug or procedure. At month 24, mean BCVA declined by 4.3 letters from the SECURE baseline. Conclusions - The SECURE study showed that ranibizumab administered as per a VA-guided flexible dosing regimen recommended in the European ranibizumab SmPC at the investigator's discretion was well tolerated over 2 years. No new safety signals were identified in patients who received ranibizumab for a total of 3 years. On average, patients lost BCVA from the SECURE study baseline, which may be the result of disease progression or possible undertreatment.
Resumo:
Based on an assumption that a steady state exists in the full-memory multidestination automatic repeat request (ARQ) scheme, we propose a novel analytical method called steady-state function method (SSFM), to evaluate the performance of the scheme with any size of receiver buffer. For a wide range of system parameters, SSFM has higher accuracy on throughput estimation as compared to the conventional analytical methods.