950 resultados para passive intermodulation


Relevância:

10.00% 10.00%

Publicador:

Resumo:

At Eurocrypt’04, Freedman, Nissim and Pinkas introduced a fuzzy private matching problem. The problem is defined as follows. Given two parties, each of them having a set of vectors where each vector has T integer components, the fuzzy private matching is to securely test if each vector of one set matches any vector of another set for at least t components where t < T. In the conclusion of their paper, they asked whether it was possible to design a fuzzy private matching protocol without incurring a communication complexity with the factor (T t ) . We answer their question in the affirmative by presenting a protocol based on homomorphic encryption, combined with the novel notion of a share-hiding error-correcting secret sharing scheme, which we show how to implement with efficient decoding using interleaved Reed-Solomon codes. This scheme may be of independent interest. Our protocol is provably secure against passive adversaries, and has better efficiency than previous protocols for certain parameter values.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocols. The attack is an application of Coppersmith’s baby-step giant-step algorithm on human identification protcols. Under this attack, the achievable security of some of the best candidates for human identification protocols in the literature is further reduced. We show that our protocol preserves similar usability while achieves better security than these protocols. A comprehensive security analysis is provided which suggests parameters guaranteeing desired levels of security.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This cross-sectional study examined the association between psychosocial factors (mothers’ perception of own and child weight, maternal self-efficacy in feeding and involvement of the mother-in-law in child-feeding) and controlling feeding practices (monitoring, restriction, pressure to eat and passive feeding). Participants were 531 affluent-Indian mothers in Australia and Mumbai with children aged 1-5 years. The psychosocial variables and feeding practices were measured using a combination of previously validated scales and study-developed items/scales. Multivariable regression analyses were stratified by sample (Australia and Mumbai) to investigate psychosocial factors related to the feeding practices, adjusting for covariates. Self-efficacy in feeding was associated with each of the feeding practices in at least one of the samples (β values between 0.1-0.2, p= 0.04-0.005). The greater involvement of the mother-in-law in child-feeding was related to the higher use of restriction in both samples (β values ≥0.2, p=0.02). In contrast, maternal weight perceptions were not consistently associated with feeding practices in either sample. The findings highlighted that unique (self-efficacy in feeding) and culturally-specific (involvement of the mother-in-law) variables not extensively researched within the context of child-feeding were important factors associated with Indian mothers’ feeding practices. Greater consideration of these factors may be required when tailoring child-feeding interventions for Indian mothers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. The main security claim of PAS is to resist passive adversaries who can observe the whole authentication session between the human user and the remote server. In this paper we show that PAS is insecure against both brute force attack and a probabilistic attack. In particular, we show that its security against brute force attack was strongly overestimated. Furthermore, we introduce a probabilistic attack, which can break part of the password even with a very small number of observed authentication sessions. Although the proposed attack cannot completely break the password, it can downgrade the PAS system to a much weaker system similar to common OTP (one-time password) systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P 1, ..., P n , each with their own private input x i , to compute a function Y = F(x 1, ..., x n ), such that at the end of the protocol, all participants learn the correct value of Y, while secrecy of the private inputs is maintained. Classical results in the unconditionally secure MPC indicate that in the presence of an active adversary, every function can be computed if and only if the number of corrupted participants, t a , is smaller than n/3. Relaxing the requirement of perfect secrecy and utilizing broadcast channels, one can improve this bound to t a  < n/2. All existing MPC protocols assume that uncorrupted participants are truly honest, i.e., they are not even curious in learning other participant secret inputs. Based on this assumption, some MPC protocols are designed in such a way that after elimination of all misbehaving participants, the remaining ones learn all information in the system. This is not consistent with maintaining privacy of the participant inputs. Furthermore, an improvement of the classical results given by Fitzi, Hirt, and Maurer indicates that in addition to t a actively corrupted participants, the adversary may simultaneously corrupt some participants passively. This is in contrast to the assumption that participants who are not corrupted by an active adversary are truly honest. This paper examines the privacy of MPC protocols, and introduces the notion of an omnipresent adversary, which cannot be eliminated from the protocol. The omnipresent adversary can be either a passive, an active or a mixed one. We assume that up to a minority of participants who are not corrupted by an active adversary can be corrupted passively, with the restriction that at any time, the number of corrupted participants does not exceed a predetermined threshold. We will also show that the existence of a t-resilient protocol for a group of n participants, implies the existence of a t’-private protocol for a group of n′ participants. That is, the elimination of misbehaving participants from a t-resilient protocol leads to the decomposition of the protocol. Our adversary model stipulates that a MPC protocol never operates with a set of truly honest participants (which is a more realistic scenario). Therefore, privacy of all participants who properly follow the protocol will be maintained. We present a novel disqualification protocol to avoid a loss of privacy of participants who properly follow the protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Falling prices have led to an ongoing spread of public displays in urban areas. Still, they mostly show passive content such as commercials and digital signage. At the same time, technological advances have enabled the creation of interactive displays potentially increasing their attractiveness for the audience, e.g. through providing a platform for civic discourse. This poses considerable challenges, since displays need to communicate the opportunity to engage, motivate the audience to do so, and be easy to use. In this paper we present Vote With Your Feet, a hyperlocal public polling tool for urban screens allowing users to express their opinions. Similar to vox populi interviews on TV or polls on news websites, the tool is meant to reflect the mindset of the community on topics such as current affairs, cultural identity and local matters. It is novel in that it focuses on a situated civic discourse and provides a tangible user interface, tackling the mentioned challenges. It shows one Yes/No question at a time and enables users to vote by stepping on one of two tangible buttons on the ground. This user interface was introduced to attract people’s attention and to lower participation barriers. Our field study showed that Vote With Your Feet is perceived as inviting and that it can spark discussions among co-located people.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A high-level relationPopper dimension—( Exclusion dimension—( VC dimension—( between Karl Popper’s ideas on “falsifiability of scientific theories” and the notion of “overfitting”Overfitting in statistical learning theory can be easily traced. However, it was pointed out that at the level of technical details the two concepts are significantly different. One possible explanation that we suggest is that the process of falsification is an active process, whereas statistical learning theory is mainly concerned with supervised learningSupervised learning, which is a passive process of learning from examples arriving from a stationary distribution. We show that concepts that are closer (although still distant) to Karl Popper’s definitions of falsifiability can be found in the domain of learning using membership queries, and derive relations between Popper’s dimension, exclusion dimension, and the VC-dimensionVC dimension.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a novel control strategy for velocity tracking of Permanent Magnet Synchronous Machines (PMSM). The model of the machine is considered within the port-Hamiltonian framework and a control is designed using concepts of immersion and invariance (I&I) recently developed in the literature. The proposed controller ensures internal stability and output regulation, and it forces integral action on non-passive outputs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The role and influence of media in the The lives of children are ongoing sources of public, political and academic debates. These debates move back and forth along a care-control continuum (Cohen, 1997), and reflect a commitment both to educate children and to regulate their media experiences. Rapid advancements in computer technologies have vastly expanded the range of media experiences available to children. The development of Internet information and the rapid expansion of channels as a result of digital television have created increasingly accessible and diverse sources of media for children. These media are instantaneous and, in some circumstances, constantly available. As a result, a substantial body of international research has emerged that examines the influence of media consumption on children. How much time do children spend interacting with media? What sorts of media do they access? Are media harmful or beneficial to children? If so, in which contexts? Do media influence children’s personal development? And what role should governments, broadcasters and independent producers play in the regulation of the media? These questions remain central to contemporary debates about children and the media. This paper examines current patterns of television and radio consumption by New Zealand children in the context of household and peer environments. It explores parental attitudes towards and responsibilities for the protection of children in relation to broadcast media. The paper also aims to provide children with a voice by exploring their views about media content, and how they feel about the controls and regulations currently placed on their media consumption. Children do not constitute a unitary social category. They comprise a disparate group with diverse cultures and styles that must be examined from within. Rather than treating and studying children as inferior and underdeveloped beings, it is important to identify children as individual social actors (Smith, Taylor & Gollop, 2000). Children are often viewed as passive, invisible and irrational. However, a growing body of scholarship recognises that children are a heterogeneous group with valid and meaningful life experiences that must be accessed and analysed within specific cultural contexts (Burman, 1994; Atwool, 2000). In order to understand the media consumption habits of children and to explore issues of regulatory responsibility, it was essential to access children and their families. To this end, and within a New Zealand context, this paper enters relatively uncharted waters. To date, there are no other comprehensive New Zealand-based research projects that specifically identify the attitudes and behaviours of children in relation to broadcast media, and broadcasting standards.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Port-Hamiltonian Systems (PHS) have a particular form that incorporates explicitly a function of the total energy in the system (energy function) and also other functions that describe structure of the system in terms of energy distribution. For PHS, the product of the input and output variables gives the rate of energy change. This type of systems have the property that under certain conditions on the energy function, the system is passive; and thus, stable. Therefore, if one can design a controller such that the closed-loop system retains - or takes - a PHS form, such closed-loop system will inherit the properties of passivity and stability. In this paper, the classical model of marine craft is put into a PHS form. It is shown that models used for positioning control do not have a PHS form due to a kinematic transformation, but a control design can be done such that the closed-loop system takes a PHS form. It is further shown how integral action can be added and how the PHS-form can be exploited to provide a procedure for control design that ensures passivity and thus stability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A grid-connected microinverter with a reduced number of power conversion stages and fewer passive components is proposed. A high-frequency transformer and a series-resonant tank are used to interface the full-bridge inverter to the half-wave cycloconverter. All power switches are switched with zero-voltage switching. Phase-shift power modulation is used to control the output power of the inverter. A steady-state analysis of the proposed topology is presented to determine the average output power of the inverter. Analysis of soft switching of the full-bridge and the half-wave cycloconverter is presented with respect to voltage gain, quality factor, and phase shift of the inverter. Simulation and experimental results are presented to validate the operation of the proposed topology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A robust and reliable grid power interface system for wind turbines using a permanent-magnet synchronous generator (PMSG) is proposed in this paper, where an integration of a generator-side three-switch buck-type rectifier and a grid-side Z-source inverter is employed as a bridge between the generator and the grid. The modulation strategy for the proposed topology is developed from space-vector modulation and Z-source network operation principles. Two PMSG control methods, namely, unity-power-factor control and rotor-flux-orientation control (Id = 0), are studied to establish an optimized control scheme for the generator-side three-switch buck-type rectifier. The system control scheme decouples active- and reactive-power control through voltage-oriented control and optimizes PMSG control for the grid- and generator-side converters independently. Maximum power point tracking is implemented by adjusting the shoot-through duty cycles of the Z-source network. The design considerations of the passive components are also provided. The performances and practicalities of the designed architecture have been verified by simulations and experiments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Level crossing risk continues to be a significant safety concern for the security of rail operations around the world. Over the last decade or so, a third of railway related fatalities occurred as a direct result of collisions between road and rail vehicles in Australia. Importantly, nearly half of these collisions occurred at railway level crossings with no active protection, such as flashing lights or boom barriers. Current practice is to upgrade level crossings that have no active protection. However, the total number of level crossings found across Australia exceed 23,500, and targeting the proportion of these that are considered high risk (e.g. public crossings with passive controls) would cost in excess of AU$3.25 billion based on equipment, installation and commissioning costs of warning devices that are currently type approved. Level crossing warning devices that are low-cost provide a potentially effective control for reducing risk; however, over the last decade, there have been significant barriers and legal issues in both Australia and the US that have foreshadowed their adoption. These devices are designed to have significantly lower lifecycle costs compared with traditional warning devices. They often make use of use of alternative technologies for train detection, wireless connectivity and solar energy supply. This paper describes the barriers that have been encountered for the adoption of these devices in Australia, including the challenges associated with: (1) determining requisite safety levels for such devices; (2) legal issues relating to duty of care obligations of railway operators; and (3) issues of Tort liability around the use of less than fail-safe equipment. This paper provides an overview of a comprehensive safety justification that was developed as part of a project funded by a collaborative rail research initiative established by the Australian government, and describes the conceptual framework and processes being used to justify its adoption. The paper provides a summary of key points from peer review and discusses prospective barriers that may need to be overcome for future adoption. A successful outcome from this process would result in the development of a guideline for decision-making, providing a precedence for adopting low-cost level crossing warning devices in other parts of the world. The framework described in this paper also provides relevance to the review and adoption of analogous technologies in rail and other safety critical industries.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Intelligent Transport System (ITS) technology is seen as a cost-effective way to increase the conspicuity of approaching trains and the effectiveness of train warnings at level crossings by providing an in-vehicle warning of an approaching train. The technology is often seen as a potential low-cost alternative to upgrading passive level crossings with traditional active warning systems (flashing lights and boom barriers). ITS platforms provide sensor, localization and dedicated short-range communication (DSRC) technologies to support cooperative applications such as collision avoidance for road vehicles. In recent years, in-vehicle warning systems based on ITS technology have been trialed at numerous locations around Australia, at level crossing sites with active and passive controls. While significant research has been conducted on the benefits of the technology in nominal operating modes, little research has focused on the effects of the failure modes, the human factors implications of unreliable warnings and the technology adoption process from the railway industry’s perspective. Many ITS technology suppliers originate from the road industry and often have limited awareness of the safety assurance requirements, operational requirements and legal obligations of railway operators. This paper aims to raise awareness of these issues and start a discussion on how such technology could be adopted. This paper will describe several ITS implementation cenarios and discuss failure modes, human factors considerations and the impact these scenarios are likely to have in terms of safety, railway safety assurance requirements and the practicability of meeting these requirements. The paper will identify the key obstacles impeding the adoption of ITS systems for the different implementation scenarios and a possible path forward towards the adoption of ITS technology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a proof of concept for a novel nanosensor for the detection of ultra-trace amounts of bio-active molecules in complex matrices. The nanosensor is comprised of gold nanoparticles with an ultra-thin silica shell and antibody surface attachment, which allows for the immobilization and direct detection of bio-active molecules by surface enhanced Raman spectroscopy (SERS) without requiring a Raman label. The ultra-thin passive layer (~1.3 nm thickness) prevents competing molecules from binding non-selectively to the gold surface without compromising the signal enhancement. The antibodies attached on the surface of the nanoparticles selectively bind to the target molecule with high affinity. The interaction between the nanosensor and the target analyte result in conformational rearrangements of the antibody binding sites, leading to significant changes in the surface enhanced Raman spectra of the nanoparticles when compared to the spectra of the un-reacted nanoparticles. Nanosensors of this design targeting the bio-active compounds erythropoietin and caffeine were able to detect ultra-trace amounts the analyte to the lower quantification limits of 3.5×10−13 M and 1×10−9 M, respectively.