773 resultados para Network-based IP mobility
Resumo:
A hydrolyzable model network comprising interconnected star polymers was prepared by the sequential group transfer polymerization of methyl methacrylate and the acid-labile diacetal-based dimethacrylate crosslinker bis[(2-methacryloyloxy)ethoxymethyl] ether. in contrast to other polymer networks previously synthesized by our group, all the branching points of this polymer network were found to hydrolyze under mildly acidic conditions, giving a linear copolymer with the theoretically expected molecular weight and composition. The ease of hydrolysis of this polymer network renders it a good candidate for use in the biomedical field. The characterization of the synthesized network, its linear and star polymer precursors and the hydrolysis products of the network and its precursors, by a variety of techniques, established the successful synthesis and hydrolysis of this well-defined polymer nanostructure.
Resumo:
While virtualisation can provide many benefits to a networks infrastructure, securing the virtualised environment is a big challenge. The security of a fully virtualised solution is dependent on the security of each of its underlying components, such as the hypervisor, guest operating systems and storage.
This paper presents a single security service running on the hypervisor that could potentially work to provide security service to all virtual machines running on the system. This paper presents a hypervisor hosted framework which performs specialised security tasks for all underlying virtual machines to protect against any malicious attacks by passively analysing the network traffic of VMs. This framework has been implemented using Xen Server and has been evaluated by detecting a Zeus Server setup and infected clients, distributed over a number of virtual machines. This framework is capable of detecting and identifying all infected VMs with no false positive or false negative detection.
Resumo:
Masked implementations of cryptographic algorithms are often used in commercial embedded cryptographic devices to increase their resistance to side channel attacks. In this work we show how neural networks can be used to both identify the mask value, and to subsequently identify the secret key value with a single attack trace with high probability. We propose the use of a pre-processing step using principal component analysis (PCA) to significantly increase the success of the attack. We have developed a classifier that can correctly identify the mask for each trace, hence removing the security provided by that mask and reducing the attack to being equivalent to an attack against an unprotected implementation. The attack is performed on the freely available differential power analysis (DPA) contest data set to allow our work to be easily reproducible. We show that neural networks allow for a robust and efficient classification in the context of side-channel attacks.
Resumo:
Ancillary services represent a good business opportunity that must be considered by market players. This paper presents a new methodology for ancillary services market dispatch. The method considers the bids submitted to the market and includes a market clearing mechanism based on deterministic optimization. An Artificial Neural Network is used for day-ahead prediction of Regulation Down, regulation-up, Spin Reserve and Non-Spin Reserve requirements. Two test cases based on California Independent System Operator data concerning dispatch of Regulation Down, Regulation Up, Spin Reserve and Non-Spin Reserve services are included in this paper to illustrate the application of the proposed method: (1) dispatch considering simple bids; (2) dispatch considering complex bids.
Resumo:
The evolving antimicrobial resistance coupled with a recent increase in incidence highlights the importance of reducing gonococcal transmission. Establishing novel risk factors associated with gonorrhea facilitates the development of appropriate prevention and disease control strategies. Sexual Network Analysis (NA), a novel research technique used to further understand sexually transmitted infections, was used to identify network-based risk factors in a defined region in Ontario, Canada experiencing an increase in the incidence of gonorrhea. Linear network structures were identified as important reservoirs of gonococcal transmission. Additionally, a significant association between a central network position and gonorrhea was observed. The central participants were more likely to be younger, report a greater number of risk factors, engage in anonymous sex, have multiple sex partners in the past six months and have sex with the same sex. The network-based risk factors identified through sexual NA, serving as a method of analyzing local surveillance data, support the development of strategies aimed at reducing gonococcal spread.
Resumo:
International School of Photonics, Cochin University of Science and Technology
Resumo:
The Towed Array electronics is a multi-channel simultaneous real time high speed data acquisition system. Since its assembly is highly manpower intensive, the costs of arrays are prohibitive and therefore any attempt to reduce the manufacturing, assembly, testing and maintenance costs is a welcome proposition. The Network Based Towed Array is an innovative concept and its implementation has remarkably simplified the fabrication, assembly and testing and revolutionised the Towed Array scenario. The focus of this paper is to give a good insight into the Reliability aspects of Network Based Towed Array. A case study of the comparison between the conventional array and the network based towed array is also dealt with