The document discusses covert channels and side channels. It defines covert channels as communication channels that were not intended for information transfer, while side channels leak implementation details. It notes covert channels may require cooperation while side channels do not. The document also discusses how protection models can convert a side channel to a covert channel, or vice versa, by changing the scope of the model.
Near-Far Resistance of MC-DS-CDMA Communication SystemsIDES Editor
In this paper, the near-far resistance of the minimum
mean square error (MMSE) detector is derived for the
multicarrier direct sequence code division multiple access
(MC-DS-CDMA) communication systems. It is shown that
MC-DS-CDMA has better performance on near-far resistance
than that of DS-CDMA.
The document discusses the power-bandwidth tradeoff in MIMO systems. It begins with background on MIMO systems, including their structure and key performance improvements like spatial multiplexing gain and diversity gain. It then defines spectral efficiency and energy efficiency, noting that maximizing both is not possible due to the inherent tradeoff between them known as the EE-SE tradeoff. The concept of this tradeoff is explained through mathematical formulations. As an example, the EE-SE tradeoff for an AWGN channel is shown. Approximation methods for determining the EE-SE tradeoff in MIMO systems are also presented.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Ber performance analysis of mimo systems using equalizationAlexander Decker
The document discusses equalization techniques for analyzing bit error rate (BER) performance in multiple-input multiple-output (MIMO) systems. It analyzes different equalization techniques like zero forcing (ZF), minimum mean squared error (MMSE), ZF with successive interference cancellation (ZF-SIC), MMSE with SIC (MMSE-SIC), maximum likelihood (ML) and sphere decoding. Simulation results show that successive interference methods outperform ZF and MMSE, but have higher complexity. ML provides better performance than others, while sphere decoding gives the best performance but highest complexity compared to ML.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
An ad-hoc routing protocol is a convention, or standard, that controls how nodes decide which way to route packets between computing devices in a mobile ad hoc network .
In ad-hoc networks, nodes are not familiar with the topology of their networks; instead, they have to discover it.The basic idea is that a new node may announce its presence and should listen for announcements broadcast by its neighbors.Each node learns about nodes nearby and how to reach them, and may announce that it, too, can reach them
The document discusses spaces and subspaces in vector spaces and their applications in telecommunications engineering. It begins by defining a vector space and subspace, and providing examples. It then discusses the Wronskian theorem, which can be used to determine if a set of functions are linearly independent or dependent over an interval by examining the Wronskian determinant. Finally, it outlines how vector spaces and subspaces appear in areas like electromagnetic wave analysis, data transmission from antennas, cable laying, and fiber optic transmission in telecommunications engineering applications.
Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...IDES Editor
In order to accurately model high frequency affects,
inductance has been taken into consideration. No longer can
interconnects be treated as mere delays or lumped RC networks.
In that frequency range, the most accurate simulation model for
on-chip VLSI interconnects is the distributed RLC model.
Unfortunately, this model has many limitations at much higher
of operating frequency used in today’s VLSI design. The reduction
in cross-sectional dimension leads to more tightly couple
interconnects and therefore, a higher probability of unwanted
crosstalk interference. This can lead to inaccurate simulations
if not modelled properly. At even higher frequency, the aggressor
net carries a signal that couples to the victim net through the
parasitic capacitances. To determine the effects that this crosstalk
will have on circuit operation, the resulting delays and logic
levels for the victim nets must be computed. This paper proposes
a difference model approach to derive crosstalk and delay in the
transform domain. A closed form solution for crosstalk and delay
is obtained by incorporating initial conditions using difference
model approach for distributed RLCG interconnects. The
simulation is performed in 0.18μm technology node and an error
of less than 1% has been achieved with the proposed model when
compared with SPICE.
Near-Far Resistance of MC-DS-CDMA Communication SystemsIDES Editor
In this paper, the near-far resistance of the minimum
mean square error (MMSE) detector is derived for the
multicarrier direct sequence code division multiple access
(MC-DS-CDMA) communication systems. It is shown that
MC-DS-CDMA has better performance on near-far resistance
than that of DS-CDMA.
The document discusses the power-bandwidth tradeoff in MIMO systems. It begins with background on MIMO systems, including their structure and key performance improvements like spatial multiplexing gain and diversity gain. It then defines spectral efficiency and energy efficiency, noting that maximizing both is not possible due to the inherent tradeoff between them known as the EE-SE tradeoff. The concept of this tradeoff is explained through mathematical formulations. As an example, the EE-SE tradeoff for an AWGN channel is shown. Approximation methods for determining the EE-SE tradeoff in MIMO systems are also presented.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Ber performance analysis of mimo systems using equalizationAlexander Decker
The document discusses equalization techniques for analyzing bit error rate (BER) performance in multiple-input multiple-output (MIMO) systems. It analyzes different equalization techniques like zero forcing (ZF), minimum mean squared error (MMSE), ZF with successive interference cancellation (ZF-SIC), MMSE with SIC (MMSE-SIC), maximum likelihood (ML) and sphere decoding. Simulation results show that successive interference methods outperform ZF and MMSE, but have higher complexity. ML provides better performance than others, while sphere decoding gives the best performance but highest complexity compared to ML.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
An ad-hoc routing protocol is a convention, or standard, that controls how nodes decide which way to route packets between computing devices in a mobile ad hoc network .
In ad-hoc networks, nodes are not familiar with the topology of their networks; instead, they have to discover it.The basic idea is that a new node may announce its presence and should listen for announcements broadcast by its neighbors.Each node learns about nodes nearby and how to reach them, and may announce that it, too, can reach them
The document discusses spaces and subspaces in vector spaces and their applications in telecommunications engineering. It begins by defining a vector space and subspace, and providing examples. It then discusses the Wronskian theorem, which can be used to determine if a set of functions are linearly independent or dependent over an interval by examining the Wronskian determinant. Finally, it outlines how vector spaces and subspaces appear in areas like electromagnetic wave analysis, data transmission from antennas, cable laying, and fiber optic transmission in telecommunications engineering applications.
Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...IDES Editor
In order to accurately model high frequency affects,
inductance has been taken into consideration. No longer can
interconnects be treated as mere delays or lumped RC networks.
In that frequency range, the most accurate simulation model for
on-chip VLSI interconnects is the distributed RLC model.
Unfortunately, this model has many limitations at much higher
of operating frequency used in today’s VLSI design. The reduction
in cross-sectional dimension leads to more tightly couple
interconnects and therefore, a higher probability of unwanted
crosstalk interference. This can lead to inaccurate simulations
if not modelled properly. At even higher frequency, the aggressor
net carries a signal that couples to the victim net through the
parasitic capacitances. To determine the effects that this crosstalk
will have on circuit operation, the resulting delays and logic
levels for the victim nets must be computed. This paper proposes
a difference model approach to derive crosstalk and delay in the
transform domain. A closed form solution for crosstalk and delay
is obtained by incorporating initial conditions using difference
model approach for distributed RLCG interconnects. The
simulation is performed in 0.18μm technology node and an error
of less than 1% has been achieved with the proposed model when
compared with SPICE.
This document provides an overview of the learning plan and objectives for a course on network security. The course covers topics such as wireless network threats, encryption, and protocols. It discusses weaknesses in early wireless networks and alternatives to improve security. The document also examines wireless network architectures, attacks targeting different layers, and ways antenna configuration can impact threats.
Iterative network channel decoding with cooperative space-time transmissionijasuc
This document summarizes an iterative network-channel decoding scheme for cooperative space-time transmission with network coding. The scheme uses convolutional codes as network codes at the relay node and Reed-Solomon codes as channel codes at the user nodes. An iterative joint network-channel decoder exchanges soft information between convolutional code-based network decoder and Reed-Solomon code-based channel decoders. Extrinsic information transfer analysis is performed to investigate the convergence properties of the proposed iterative decoder.
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...IDES Editor
The Elmore delay is fast becoming ineffective for
deep submicron technologies, and reduced order transfer
function delays are impractical for use as early-phase design
metrics or as design optimization cost functions. This paper
describes an accurate approach for fitting moments of the
impulse response to probability density functions so that delay
and slew metric can be estimated accurately at an early
physical design stage. PERI (Probability distribution function
Extension for Ramp Inputs) technique has been used that
extends the delay and slew metrics for step inputs to the more
general and realistic non-step or ramp inputs. The accuracy
of the proposed model is justified by the results obtained from
the proposed model and that of SPICE simulations
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksIJMER
The document proposes three novel methods to prevent selective jamming attacks in wireless networks:
1. Strong Hiding Commitment Scheme (SHCS) which uses asymmetric cryptography to commit a sender to a value while keeping it hidden.
2. Cryptographic Puzzle Hiding Scheme which generates puzzles that force attackers to spend time solving before obtaining secret keys.
3. Hiding based on All-Or-Nothing Transformation which partitions messages into blocks that are meaningless individually, preventing selective jamming until all blocks are received.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document discusses a proposed CDMA-based watermarking scheme that aims to improve robustness and message capacity. It begins with an overview of digital watermarking phases and concepts. It then discusses applying CDMA techniques to watermarking, modeling video as a bit plane stream, defining the watermark and spreading it using m-sequences. The watermark is inserted into video bit planes determined by a pseudorandom sequence. Experimental results showed the proposed scheme has higher robustness than conventional approaches under different attacks. Wavelet transforms and their use in watermark extraction are also briefly covered.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
This document proposes symmetric downlink permutation schemes for OFDMA PHY that are analogous to the uplink PUSC permutation schemes currently defined. Such symmetric schemes would enable optimal adaptive beamforming by pairing uplink and downlink allocations, while maintaining the frequency diversity and cell-based structure of PUSC. The proposal analyzes how both frequency diversity and spatial diversity from antenna arrays affect performance, finding that frequency diversity can significantly reduce the required fade margin even in the presence of spatial diversity. Detailed changes to the IEEE 802.16 standard are provided to define the new downlink permutation schemes.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes and analyzes different digital watermarking techniques under various attacks. It compares the Least Significant Bit (LSB), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT) watermarking algorithms in terms of invisibility, distortion, and robustness. The LSB, DCT, and DWT watermark embedding and extraction procedures are described. Simulation results showed that the algorithms had good robustness against common image processing operations and were invisible with low distortion.
The document contains four exam papers for the subject of Mobile Computing. Each paper contains 8 questions with sub-questions focusing on various topics related to mobile computing including GSM architecture, CDMA, mobile IP, TCP for mobility, ad-hoc networks, and wireless protocols. The papers are from Jawaharlal Nehru Technological University and include questions ranging from basic concepts to detailed explanations and examples.
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...IDES Editor
Orthogonal Frequency Division Multiplexing
(OFDM) systems are very sensitive to carrier frequency offset
(CFO), caused by either frequency differences between
transmitter and receiver local oscillators or by frequency
selective channels. The CFO disturbs the orthogonality among
subcarriers of OFDM system and results intercarrier
interference (ICI), which degrades the bit error rate (BER)
performance of the system. This paper presents a new blind
CFO estimation scheme for single-input single-output (SISO)
OFDM systems. The presented scheme is based on the
assumption that the channel frequency response changes
slowly in frequency domain. In this scheme an excellent tradeoff
between complexity and performance, as compared to
existing estimation schemes, is obtained. The improved
performance of the present scheme is confirmed through
extensive simulations.
This document analyzes carrier frequency offset estimation techniques for MC-DS-CDMA uplink systems using zero-IF receivers. It proposes using zero correlation zone spreading sequences to exploit frequency and temporal diversity. Simulation results show that the variance of carrier frequency offset estimators is lower for MC-DS-CDMA compared to OFDM systems. The document also compares MC-DS-CDMA and MC-CDMA, discussing their differences in spreading, spectral efficiency, peak-to-average power ratio, and applications. Tables and figures are included to analyze the performance of carrier frequency offset estimation and compare theoretical and simulated variances.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document provides guidance to address potential problems when running an operating systems simulator for a class lecture, including enabling X11 tunneling if the simulator cannot run, avoiding hitting "run until done" if the simulator hangs, and how to add code lines and restart the simulator. It also notes submission requirements are the HTML logfiles without screenshots.
This document describes the implementation of a piecewise linear branch prediction algorithm. It discusses:
1) The algorithm uses a three dimensional array to store weights for branch predictions based on branch address, path history, and global history register.
2) It provides the prediction algorithm that uses the stored weights to calculate an output to predict branches, and the update algorithm that adjusts the weights based on actual branch outcomes.
3) An experiment was conducted to evaluate the performance with different array dimensions, finding the best miss prediction rate with a 64K size array using 64 entries for branch address, 16 for path history, and 64 for global history.
The document lists possible problems when running a simulator and their solutions: enabling X11 tunneling and installing xlaunch to avoid display errors; pressing "execute" before "run until done" to prevent hanging; adding "wait(NULL)" using vi/vim and reloading the code to fix an error; and only submitting html logfiles for assignments, not screenshots.
This project aims to build a binary classifier model to label unlabeled DNA sequences as either positive (p) or negative (n) based on labeled training sequences. The team will take two approaches: 1) A k-mer approach that generates all DNA sequence fragments of length K and counts frequencies to use as attributes for classification models. 2) A PWM approach that uses motif finding tools to generate position weight matrices and score sequences to use as attributes. The approaches will be evaluated individually and combined to obtain the best performing model. Key challenges include deriving meaningful attributes from the sequence data alone. Parameters like k-mer length, number of motifs, and motif lengths will be tuned to optimize model performance.
Keyless Signature Infrastructure (KSI) provides data integrity, timestamping, and verification without public/private keys. It works by having a service calculate hashes of data stored in the cloud each second and publish the hashes in a calendar database and newspaper. To check integrity later, one compares the stored hash value to the current one. However, simultaneous updates may go undetected, and an attacker could theoretically alter data and forge the published record if they compromised the cloud, hashing service, and newspaper. KSI aims to make public key infrastructure key management more efficient but has high computational costs for large datasets.
The document discusses several cryptographic techniques including public key infrastructure (PKI), identity-based encryption (IDE), fuzzy identity-based encryption (Fuzzy-IDE), attribute-based encryption (ABE), and hierarchical attribute-based encryption (HABE). It compares how these techniques handle key distribution and management, encryption, and decryption using user identities and attributes. The document also discusses variants of ABE including key-policy vs ciphertext-policy, and monotonic vs non-monotonic access structures.
IRJET- Spatial Context Preservation and Propagation - Layer States in Convolu...IRJET Journal
This document presents a novel approach to preserving spatial context in convolutional neural networks (CNNs) called layer states. It proposes adding a separate context vector (state) for each layer that depends on the context vector of the previous layer. This allows context to be propagated explicitly between layers rather than being encoded within feature maps. The paper implements this approach by adding state blocks to a VGG-style CNN and compares its performance to the base model and ResNet18 on image classification tasks. Results show the state-augmented model outperforms both baseline models, demonstrating the effectiveness of explicitly preserving context through layer states.
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSijsptm
The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated. The method is specified by giving its class model in UML and by
explaining the related attributes and methods. Different attacks against the network and against WCT2M deployed in the network are considered. The experimental evaluation of WCT2M involves laboratory experiments and simulations using a dedicated simulator. The evaluation focuses on efficiency of detecting and isolating the malicious nodes that implement different attack scenarios in the network and on the
method’s sensitivity to the changes in effectiveness of the security mechanisms deployed in the network nodes.
This document provides an overview of the learning plan and objectives for a course on network security. The course covers topics such as wireless network threats, encryption, and protocols. It discusses weaknesses in early wireless networks and alternatives to improve security. The document also examines wireless network architectures, attacks targeting different layers, and ways antenna configuration can impact threats.
Iterative network channel decoding with cooperative space-time transmissionijasuc
This document summarizes an iterative network-channel decoding scheme for cooperative space-time transmission with network coding. The scheme uses convolutional codes as network codes at the relay node and Reed-Solomon codes as channel codes at the user nodes. An iterative joint network-channel decoder exchanges soft information between convolutional code-based network decoder and Reed-Solomon code-based channel decoders. Extrinsic information transfer analysis is performed to investigate the convergence properties of the proposed iterative decoder.
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...IDES Editor
The Elmore delay is fast becoming ineffective for
deep submicron technologies, and reduced order transfer
function delays are impractical for use as early-phase design
metrics or as design optimization cost functions. This paper
describes an accurate approach for fitting moments of the
impulse response to probability density functions so that delay
and slew metric can be estimated accurately at an early
physical design stage. PERI (Probability distribution function
Extension for Ramp Inputs) technique has been used that
extends the delay and slew metrics for step inputs to the more
general and realistic non-step or ramp inputs. The accuracy
of the proposed model is justified by the results obtained from
the proposed model and that of SPICE simulations
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksIJMER
The document proposes three novel methods to prevent selective jamming attacks in wireless networks:
1. Strong Hiding Commitment Scheme (SHCS) which uses asymmetric cryptography to commit a sender to a value while keeping it hidden.
2. Cryptographic Puzzle Hiding Scheme which generates puzzles that force attackers to spend time solving before obtaining secret keys.
3. Hiding based on All-Or-Nothing Transformation which partitions messages into blocks that are meaningless individually, preventing selective jamming until all blocks are received.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document discusses a proposed CDMA-based watermarking scheme that aims to improve robustness and message capacity. It begins with an overview of digital watermarking phases and concepts. It then discusses applying CDMA techniques to watermarking, modeling video as a bit plane stream, defining the watermark and spreading it using m-sequences. The watermark is inserted into video bit planes determined by a pseudorandom sequence. Experimental results showed the proposed scheme has higher robustness than conventional approaches under different attacks. Wavelet transforms and their use in watermark extraction are also briefly covered.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
This document proposes symmetric downlink permutation schemes for OFDMA PHY that are analogous to the uplink PUSC permutation schemes currently defined. Such symmetric schemes would enable optimal adaptive beamforming by pairing uplink and downlink allocations, while maintaining the frequency diversity and cell-based structure of PUSC. The proposal analyzes how both frequency diversity and spatial diversity from antenna arrays affect performance, finding that frequency diversity can significantly reduce the required fade margin even in the presence of spatial diversity. Detailed changes to the IEEE 802.16 standard are provided to define the new downlink permutation schemes.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes and analyzes different digital watermarking techniques under various attacks. It compares the Least Significant Bit (LSB), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT) watermarking algorithms in terms of invisibility, distortion, and robustness. The LSB, DCT, and DWT watermark embedding and extraction procedures are described. Simulation results showed that the algorithms had good robustness against common image processing operations and were invisible with low distortion.
The document contains four exam papers for the subject of Mobile Computing. Each paper contains 8 questions with sub-questions focusing on various topics related to mobile computing including GSM architecture, CDMA, mobile IP, TCP for mobility, ad-hoc networks, and wireless protocols. The papers are from Jawaharlal Nehru Technological University and include questions ranging from basic concepts to detailed explanations and examples.
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...IDES Editor
Orthogonal Frequency Division Multiplexing
(OFDM) systems are very sensitive to carrier frequency offset
(CFO), caused by either frequency differences between
transmitter and receiver local oscillators or by frequency
selective channels. The CFO disturbs the orthogonality among
subcarriers of OFDM system and results intercarrier
interference (ICI), which degrades the bit error rate (BER)
performance of the system. This paper presents a new blind
CFO estimation scheme for single-input single-output (SISO)
OFDM systems. The presented scheme is based on the
assumption that the channel frequency response changes
slowly in frequency domain. In this scheme an excellent tradeoff
between complexity and performance, as compared to
existing estimation schemes, is obtained. The improved
performance of the present scheme is confirmed through
extensive simulations.
This document analyzes carrier frequency offset estimation techniques for MC-DS-CDMA uplink systems using zero-IF receivers. It proposes using zero correlation zone spreading sequences to exploit frequency and temporal diversity. Simulation results show that the variance of carrier frequency offset estimators is lower for MC-DS-CDMA compared to OFDM systems. The document also compares MC-DS-CDMA and MC-CDMA, discussing their differences in spreading, spectral efficiency, peak-to-average power ratio, and applications. Tables and figures are included to analyze the performance of carrier frequency offset estimation and compare theoretical and simulated variances.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document provides guidance to address potential problems when running an operating systems simulator for a class lecture, including enabling X11 tunneling if the simulator cannot run, avoiding hitting "run until done" if the simulator hangs, and how to add code lines and restart the simulator. It also notes submission requirements are the HTML logfiles without screenshots.
This document describes the implementation of a piecewise linear branch prediction algorithm. It discusses:
1) The algorithm uses a three dimensional array to store weights for branch predictions based on branch address, path history, and global history register.
2) It provides the prediction algorithm that uses the stored weights to calculate an output to predict branches, and the update algorithm that adjusts the weights based on actual branch outcomes.
3) An experiment was conducted to evaluate the performance with different array dimensions, finding the best miss prediction rate with a 64K size array using 64 entries for branch address, 16 for path history, and 64 for global history.
The document lists possible problems when running a simulator and their solutions: enabling X11 tunneling and installing xlaunch to avoid display errors; pressing "execute" before "run until done" to prevent hanging; adding "wait(NULL)" using vi/vim and reloading the code to fix an error; and only submitting html logfiles for assignments, not screenshots.
This project aims to build a binary classifier model to label unlabeled DNA sequences as either positive (p) or negative (n) based on labeled training sequences. The team will take two approaches: 1) A k-mer approach that generates all DNA sequence fragments of length K and counts frequencies to use as attributes for classification models. 2) A PWM approach that uses motif finding tools to generate position weight matrices and score sequences to use as attributes. The approaches will be evaluated individually and combined to obtain the best performing model. Key challenges include deriving meaningful attributes from the sequence data alone. Parameters like k-mer length, number of motifs, and motif lengths will be tuned to optimize model performance.
Keyless Signature Infrastructure (KSI) provides data integrity, timestamping, and verification without public/private keys. It works by having a service calculate hashes of data stored in the cloud each second and publish the hashes in a calendar database and newspaper. To check integrity later, one compares the stored hash value to the current one. However, simultaneous updates may go undetected, and an attacker could theoretically alter data and forge the published record if they compromised the cloud, hashing service, and newspaper. KSI aims to make public key infrastructure key management more efficient but has high computational costs for large datasets.
The document discusses several cryptographic techniques including public key infrastructure (PKI), identity-based encryption (IDE), fuzzy identity-based encryption (Fuzzy-IDE), attribute-based encryption (ABE), and hierarchical attribute-based encryption (HABE). It compares how these techniques handle key distribution and management, encryption, and decryption using user identities and attributes. The document also discusses variants of ABE including key-policy vs ciphertext-policy, and monotonic vs non-monotonic access structures.
IRJET- Spatial Context Preservation and Propagation - Layer States in Convolu...IRJET Journal
This document presents a novel approach to preserving spatial context in convolutional neural networks (CNNs) called layer states. It proposes adding a separate context vector (state) for each layer that depends on the context vector of the previous layer. This allows context to be propagated explicitly between layers rather than being encoded within feature maps. The paper implements this approach by adding state blocks to a VGG-style CNN and compares its performance to the base model and ResNet18 on image classification tasks. Results show the state-augmented model outperforms both baseline models, demonstrating the effectiveness of explicitly preserving context through layer states.
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSijsptm
The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated. The method is specified by giving its class model in UML and by
explaining the related attributes and methods. Different attacks against the network and against WCT2M deployed in the network are considered. The experimental evaluation of WCT2M involves laboratory experiments and simulations using a dedicated simulator. The evaluation focuses on efficiency of detecting and isolating the malicious nodes that implement different attack scenarios in the network and on the
method’s sensitivity to the changes in effectiveness of the security mechanisms deployed in the network nodes.
Double layer security using visual cryptography and transform based steganogr...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document summarizes a research paper on encrypting images using wavelet transforms and chaotic maps. It begins with an abstract that describes using discrete wavelet transforms and calculating metrics like number of changing pixel rate and unified averaged changed intensity to evaluate encryption strength. It then provides background on image processing techniques, discrete wavelet transforms, and logistic maps. The proposed method segments the original image into blocks, encrypts each block by applying a discrete wavelet transform and using a logistic map to generate random numbers for permutation. Encryption involves conversion to 1D, permutation, and inverse conversion. Decryption reverses the process. Results are evaluated using NPCR and UACI metrics between the encrypted image and a changed pixel key image.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Optimized rationalize security and efficient data gathering in wireless senso...ijmnct
Wireless reprogramming during a wireless detector net- work (WSN) is that the method of propagating a
replacement code image or relevant commands to detector nodes. As a WSN is sometimes deployed in
hostile environments, secure reprogramming is and can continue to be a significant concern. Whereas all
existing insecure/secure reprogramming protocols square measure supported the centralized approach,
it\'s necessary to support distributed reprogramming during which multiple licensed network users will at
the same time and directly reprogram detector nodes while not involving the bottom station. Terribly
recently, a novel secure rationalize and distributed reprogramming protocol named SRDRP has been
planned, that is that the initial work of its kind. However, during this paper, we have a tendency to establish
associate inherent style weakness within the increased signature verification of SRDRP associated demonstrate
that it\'s at risk of associate impersonation attack by that an resister will simply impersonate any
licensed user to hold out reprogramming. Later on, we have a tendency to propose a straightforward
modification to mend the known security drawback while not losing any options of SRDRP. Our
experimental results demonstrate that it\'s able to eliminate the planning weakness by adding one-B
redundant information which the execution time of the prompt answer during a 1.6-GHz laptop personal
computer is not any quite one ms. Therefore, our answer is possible and secure for real-world applications.
Moreover, we have a tendency to show that, so as to additional improve the safety and potency of SRDRP;
any higher established identity-based position formula will be directly utilized in SRDRP. Supported
implementation results, we have a tendency to demonstrate potency improvement over the initial SRDRP
Popularity of ubiquitous computing increases the importance of location-aware applications,
which increases the need for finding location of the user. In this paper, we present a novel localization method
for indoor environments using Wi-Fi infrastructure.
While localization using Wi-Fi is cost effective, handling the obstructions which are the main cause of
signal propagation error in indoor environments is a challenging task. We address this problem in two levels,
resulting in increased accuracy of localization. In the first level, we "localize" the residing area of user node in
coarse granularity. Then, we use building layout to find the objects that attenuate the signal between the
reference node and the coarse estimate of the location of user node. Using multi-wall propagation model, we
apply corrections for all obstructions and find the location of user node. Empirical results based on experiments
conducted in lab-scale, shows meter-level accuracy.
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...IJERA Editor
This paper presents a new algorithm on waveletbased robust and invisible digital image watermarking for multimedia security. The proposed algorithm has been designed, implemented and verified using MATLAB R2014a simulation for both embedding and extraction of the watermark and the results of which shows significant improvement in performance metrics like PSNR, SSIM, Mean Correlation, MSE than the other existing algorithms in the current literature. The cover image considered here in our algorithm is of the size (256x256) and the binary watermark image size is taken as (16x16).
We take some parts of a theoretical mobility model in a two-dimension grid proposed by Greenlaw and
Kantabutra to be our model. The model has eight necessary factors that we commonly use in a mobile
wireless network: sources or wireless signal providers, the directions that a source can move, users or
mobile devices, the given directions which define a user’s movement, the given directions which define a
source’s movement, source’s velocity, source’s coverage, and obstacles. However, we include only the
sources, source’s coverage, and the obstacles in our model. We define SQUARE GRID POINTS COVERAGE
(SGPC) problem to minimize number of sources with coverage radius of one to cover a square grid point
size of p with the restriction that all the sources must be communicable and proof that SGPC is in NPcomplete
class. We also give an APPROX-SQUARE-GRID-COVERAGE (ASGC) algorithm to compute the
approximate solution of SGPC. ASGC uses the rule that any number can be obtained from the addition of
3, 4 and 5 and then combines 3-gadgets, 4-gadgets and 5-gadgets to specify the position of sources to cover
a square grid point size of p. We find that the algorithm achieves an approximation ratio of
2
1 2 10 2
p
p .
Moreover, we state about the extension usage of our algorithm and show some examples. We show that if
we use ASPC on a square grid size of p and if sources can be moved, the area under the square grid can be
covered in eight-time-steps movement. We also prove that if we extend our source coverage radius to 1.59,
without any movement the area under the square gird will also be covered. Further studies are also
discussed and a list of some tentative problems is given in the conclusion.
T tmac energy aware sensor mac protocol forNabil Kolta
T-TMAC is an energy-efficient MAC protocol proposed for healthcare monitoring applications using wireless sensor networks. The key elements of T-TMAC include:
1. A three-tier heterogeneous network architecture with medical, coordinator, video, and sink nodes organized into groups.
2. A dynamic scheduling approach where nodes wake up only when needed to transmit or receive data to save energy. Scheduling is organized separately for each network tier.
3. Mechanisms for initializing the network topology, collecting sensor data, and reconfiguring the topology to support node mobility and energy awareness. Data is transmitted in a many-to-one fashion from medical to coordinator to video to sink nodes.
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
This document summarizes a research paper that proposes a Challenge-Response Authentication Protocol (CRAP) to detect Sybil attacks in wireless sensor networks. The CRAP generates unique keys for each transmission to provide encrypted communication. It is used to prevent Sybil attacks where an attacker steals node identities during data transmission. The performance of the detection scheme is evaluated using detection ratio. The proposed CRAP involves three phases: 1) nodes are selected and grouped, 2) two nearby nodes transmit packets to detect collisions indicating Sybil nodes, 3) if no hop is detected between Sybil identities, the nodes are confirmed to be under attack. The scheme is analyzed using performance metrics like packet delivery ratio, energy efficiency, and attack detection ratio.
The document summarizes a technical seminar presentation on a mutual trust based access control model (MTBAC) for cloud computing. The presentation covers: (1) introducing the need for access control in cloud computing environments; (2) surveying existing trust and access control models; (3) proposing a mutual trust model between cloud users and service nodes based on direct experience and recommendations; and (4) describing the MTBAC access control model and simulations showing its improved performance over other models. The presentation concludes that MTBAC is well-suited for the uncertain and dynamic nature of cloud computing by considering both user and service node trust levels.
Non standard size image compression with reversible embedded waveletseSAT Journals
Abstract
The rapid growth of digital imaging applications, including desktop publishing, multimedia, teleconferencing and high definition television, (HDTV) has increased the need of effective image processing. While processing any data, it requires large memory space for storage, which ultimately increases the transmission time. In order to save memory space and speed up the rate of transmission of data over networks, data compression is essential. Technically all image data Compressed into two groups as lossless and lossy. Some information is lost in the lossy compression, especially for radiological images. In this paper Non standard size still images are compressed by CREW using MATLAB. It uses a new form of wavelet transform technology. It is pyramidal (similar to hierarchical) and progressive by nature. From results it is observed that CREW provides higher compression ratio as compared to JPEG compression with same quality of image. The PSNR is also in acceptable range. The features make CREW an ideal choice for applications that require high quality and flexibility for multiple input and output environments, such as, medical imagery, fixed-rate and fixed-size applications. Keywords– CREW, JPEG, Image Compression, JPEG2000
Non standard size image compression with reversible embedded waveletseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes the challenges of securing ad hoc networks and proposes approaches to address those challenges. It discusses how ad hoc networks differ from traditional wireless networks in relying on nodes connecting to each other rather than fixed infrastructure. The main security goals for ad hoc networks are identified as availability, confidentiality, integrity, authentication, and non-repudiation. Challenges include vulnerability to attacks on wireless links, compromised nodes, dynamic network topology and membership changes, and large network sizes. The document proposes taking advantage of network redundancy and distributing trust among nodes to achieve availability and security. It focuses on defending routing against denial of service attacks and establishing a secure and highly available key management service.
This technical report describes the design of a rectangular microstrip patch antenna using CST simulation software. The key steps included:
1) Calculating the antenna dimensions using standard formulas based on the given parameters of 3GHz frequency, 2.33 permittivity, 0.508mm substrate thickness.
2) Simulating the antenna in CST to analyze the S-parameters, radiation pattern, return loss. The results showed a return loss above -10dB, indicating room for improvement.
3) Etching defected ground structures (DGS) on the patch and ground plane to perturb the current and modify the transmission characteristics.
4) Simulating the modified antenna, which showed significantly improved results with a return
Steganography is the art and science of hiding the
existence of information. In computer-based steganography,
several forms of digital media may be used as “cover” for hidden
information. Photos, documents, web pages and even MP3 music
files may all serve as innocuous looking hosts for secret messages.
In this paper, we generate a ECG signal of patient and hide this
ECG signal in the image of patient i.e. patient photo is used as a
cover for hiding the ECG signal. Steganography is done using the
Contourlet transform. To hide the data in image Singular Value
Decomposition (SVD) is used. The contourlet transform provides
higher correlation coefficient. The results are comparing with the
wavelet transform. The proposed system provides a better PSNR
value than the wavelet transform.
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET Journal
This document proposes an image encryption technique using histograms and cheat images. It involves permuting the input image and a cheat image using a logistic map and secret key parameters. The encrypted image is generated using the permuted values. For decryption, the same process is applied in reverse using the cheat image and secret key. The technique is analyzed for security through statistical analysis, differential attacks, sensitivity analysis, and entropy measures, showing it effectively encrypts images and is robust against attacks.
There are three main types of digital certificates: extended validated, organization validated, and domain validated certificates. Certificates can be encoded in .der, .pem, .key, .cert, .cer, and .crt formats. The .pem format encodes the .der certificate in base64 and can contain additional data like private keys. Openssl commands can be used to view the contents and properties of a certificate.
SAML metadata describes a SAML entity like a service provider or identity provider. It is needed for entities to communicate and establish a trust relationship. Examples of metadata include the identity provider metadata from Auth0 and service provider metadata from AWS, both available via URLs. SAML metadata provides an overview of the entities and how they work together using the SAML standard.
This document discusses static analysis of source code using various tools. It lists some pros and cons of static analysis, such as early feedback but also high false positives. It then describes common static analysis tools like FindBugs, Checkstyle, and PMD. Finally, it provides instructions on installing and using SonarLint in IntelliJ and references resources on common software weaknesses.
The document discusses exploiting a parsing bug in Bash by combining it with CGI to gain remote code execution on a vulnerable system. It demonstrates using Bash variables containing payloads that are exported to a child shell via CGI, allowing the execution of arbitrary commands. Finally, it suggests using Netcat to create an interactive reverse shell backdoor on the target system without raising security flags.
The document presents research on attribute transformation for attribute-based access control. It discusses two types of attribute transformation: attribute reduction, which transforms non-policy attributes into policy attributes, and attribute expansion, which transforms policy attributes into other policy attributes. The goal is to address issues like attribute explosion and enable more modular policy design and abstraction.
The document presents research on attribute transformation for attribute-based access control. It discusses two types of attribute transformation: attribute reduction, which transforms non-policy attributes into policy attributes, and attribute expansion, which transforms policy attributes into other policy attributes. The goal is to address issues like attribute explosion and enable more flexible authorization policies.
Big Data Processing: Performance Gain Through In-Memory ComputationUT, San Antonio
The document reports on a project comparing the performance of Hadoop MapReduce and Spark in-memory frameworks for big data processing. The authors analyzed execution times for running a PageRank benchmark on various datasets using each framework. They found that Spark performed better for smaller datasets with multiple iterations due to its in-memory caching. However, for larger datasets MapReduce was more efficient due to Spark's memory requirements not being met by the cluster configuration.
Enumerated authorization policy ABAC (EP-ABAC) modelUT, San Antonio
This presentation discuss logical formula and enumerated authorization policy. It further provides a enumerated authorization policy Attribute Based Access Control model.
Where is my Privacy presentation slideshow (one page only)UT, San Antonio
Privacy is a growing concern as technology advances. The author questions where privacy now stands with increasing data collection and sharing online. In just 3 sentences, the document title and author are identified to provide context for the high-level topic and question being raised regarding privacy in today's digital age.
The document outlines a 3 month extended course covering Windows, MS Word, and the Internet/Web. The Windows course consists of 4 classes covering basic Windows concepts, the Control Panel, program installation/uninstallation, and recommended programs. The MS Word course has 4 classes teaching typing, formatting, tables, and images. The Internet/Web course includes 4 classes on web browsing, email with Gmail, social media like Facebook and Twitter, and blogging with Wordpress.
ZeroVM backgroud: Introduction to some of the concept behind zerovm. Little discussion of google native client project, Software based fault isolation is also provided.
This document summarizes two experiments on testing the security of Keystone, the authentication module of OpenStack. The first experiment examines Keystone's resiliency to DDoS attacks by monitoring processing time and resource usage under simulated attacks. The second analyzes the randomness of generated tokens by generating a large number of tokens and analyzing their uniqueness. Challenges mentioned include incomplete documentation of Keystone.
This document discusses tools and methods for research including critical thinking, deductive and inductive reasoning, the scientific method, theory building, and collaboration. It covers six key tools of research: the library, computer technology, measurement, statistics, language, and the human mind. Reasoning tools covered are critical thinking, deductive logic, inductive reasoning, and the scientific method. Theory building involves observing, organizing, finding correlations, creating hypotheses, and justifying and building models. The scientific method is used to investigate phenomena and acquire new knowledge. Collaboration is important for going far in research and involves working with individuals, groups, industry, and institutions through internships, fellowships and grants.
Final Project Transciption Factor DNA binding Prediction UT, San Antonio
The document discusses different approaches for transcription factor-DNA binding prediction including k-mer based models using fixed-length k-mers, k-mers with mismatches, and regular expressions, as well as PWM based models using MEME and MAST. It evaluates various classifiers and tuning parameters such as k-mer length and number of attributes on different datasets, finding that classifier choice, k-mer length, and attribute selection all impact accuracy. Additional work was done on one dataset to build a new combined k-mer and PWM model.
The document discusses different approaches for transcription factor-DNA binding prediction including k-mer based models using fixed-length k-mers, k-mers with mismatches, and regular expressions, as well as PWM based models using MEME and MAST. It evaluates various classifiers and tuning parameters such as k-mer length and number of attributes on different datasets, finding that classifier choice, k-mer length, and attribute selection all impact accuracy. Additional work was done on one dataset to build a new combined k-mer and PWM model.
The document discusses web browser security and cross-site scripting (XSS) attacks. It explains that XSS attacks work by injecting malicious JavaScript code into web pages. This code can then access sensitive data like cookies or modify the page's content. The document outlines the risks of XSS and how attackers use it to steal user information or launch other attacks. It also summarizes some existing approaches to prevent XSS, such as restricting where JavaScript can be placed or limiting its access to sensitive resources.
On the incoherencies in web browser access controlUT, San Antonio
This document discusses inconsistencies in how web browsers implement access control policies. It identifies three main issues: 1) Inconsistent labeling of principals for DOM and cookie resources, 2) Inappropriate handling of changes to principal labels, and 3) Disregard of the user principal for resources like browsing history. The paper argues for a more coherent approach where each shared browser resource has a clearly defined principal and access control policy.
The document discusses pair programming and compares it to solo programming. Solo programming involves a single person taking on all development roles alone, which can lead to high error rates, low productivity, and frustration. Pair programming involves two developers sharing a workstation, with one typing - the "driver" - while the other reviews the work and identifies errors or opportunities - the "navigator." Benefits of pair programming include learning from each other, improved quality through peer review, and increased enjoyment of the work. While not suited to all people, pair programming generally results in higher productivity and more reliable code compared to solo programming.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Cyber Security Exam 2
1. Submitted By: Prosunjit Biswas (@01232785)
1. Difference between Covert Channel & Side Channel:
In the simplest definition, ‘A communication channel is covert if it is neither designed nor intended to
transfer information at all’ [1]. A more compelling definition appears as – ‘Given a security model M and
its interpretation I(M) in an operating system and any potential communication between two
subjects I(Sh) and I(Si) of ((M) is covert only if the communication between the subjects Sh and Si of the
model of M is illegal in M’ [2].
On the other hand, “Side channel leaks
S Subjects
implementation-specific characteristics to
S
i
d
i recover the secret parameters involved in
d
e
e the computation and specific to given
C
C implementation.”[3] Figure 1. shows the
h
h
a …….. : a
position of covert channel and side
n convert
n channel
n channel in a system.
n
e Projection Model e
l
l Fig 1: Side channel & Covert channel.
Environment Side Effect (Heat, Sound, Power etc)
i) Covert channel is created inside a protection model where either that channel was not identified
or not intended for communication where as side channel stays outside the protection model
based on the side effect of the model with the environment (ex: electromagnetic emission).
ii) Covert channel may require cooperating sender and receiver where as side channel do not require
sender.
Conversion between Covert channel and Side channel: As shown in figure 1b, we can convert side-
channel into covert channel and vice versa.
M We see that for model M1, C1 is side channel
o Information Leaking
d because it stays outside the model but if we
C1 Side channel for M1 / Covert channel for M2
e build another protection model M2 including
l
Protection M1, then C1 becomes the Covert channel for
M Model (M1)
M2 by leaking information from a subject in M1
2
to other subject outside m1. Thus by changing
the protection model from M1 to M2 we can convert between side channel into covert channel. Similarly,
we can do the opposite.
Fig 1b: Conversion between side & Covert Channel
References:
[1] B.W. Lampson, "A Noto on the Confinement Problem," Communications ACM 16 (1973). 613-615.
[2] C. Tsai and V. D. Gligor, "A Bandwidth Computation Model for Covert Storage Channels and its Applications,"
IEEE Symposium on Security and Privacy, 1988.
[3] F.-X. Standaert. Introduction to side-channel attacks. In I. M. Verbauwhede, Secure Integrated Circuit.2009
I have not taken any help on this examination from anybody and have not given any help to
anybody.
2. 2. Intrusion Detection & Intrusion Prevention System:
Although both Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) analyze
the traffic and work based on different predefined rules, there are fundamental differences on how
data they work and on action they can take. Figure 2. Shows the scope of both system in some
great details.
Fig 2: Breakdown of Intrusion Detection and Intrusion Prevention System
Differences:
i) IPS works with real traffic which means that the traffic, if allowed, is feed to real devices
where as IDS works with the copy of the data, in the sense that even if we have IDS
setup to update firewall with blocking rules, the initial attack packet has already gone
through.
ii) IDS is a passive device only used for loging/reporting purpose where as IPS acts as an
active device which can terminate network connection or user sessions based on the need
of IPS system.
Implications of Base-rate fallacy on IPS:
Similar to the base-rate fallacy in IDS, IPS effectiveness depends on how we can improve false alarm
rate. If we use an IPS with high false alarm rate, eventually it will hurt system performance badly by
filtering / stopping legitimate traffic. So, the impact of base rate fallacy on IPS is much more critical than
its impact on IDS.
Reference:
[1] S. Axelsson. The base-rate fallacy and its implications for the difficulty of intrusion detection. In Proceedings of
the 6th ACM Conference on Cornpurer and Communications Securiry,1999.
[2] “IDS vs IPS”, available at : http://blog.inetu.net/2011/02/intrusion-detection-or-prevention-ids-vs-ips/
[3] “IDS vs IPS”, available at : http://www.focus.com/fyi/ids-vs-ips/
I have not taken any help on this examination from anybody and have not given any help to
anybody.
3. 3. Continuous enforcement ensures that the control on a resource stays even after access to that resource
is given to a user. Thus, it is required to monitor consumption of the resource or subsequent request for
consumption so that it does not violate the policy under which access was granted. In the following
model, I am not considering how the resource is consumed which is very inflexible to monitor in real
situation. This model tries to provide continuous enforcement where continuous requests for a resource
are made and each request has some side effect in the system. Fig. 3a. gives a general model for
continuous enforcement while fig. 3b is specialized model for video streaming service provider.
I
S n
G
S e s
r
r t Customer
e Customer a
Mutable System States a status: {New,
r v Balance, n
Attributes base on n reliable,
v i Trust, t
attributes t Unreliable,
i c History
trustworthy} /
c e S
e D
t
e
r
G n
Condition e 1.Prefer
r y
R Application a trustworthy
Enforcem ent / a 1.Sufficient
e Level Policy m Customer,
Access Control Balance ? S
q t 2. Prefer
2. More cond. ? t
u n R customer with r
e / e more balance a
s D q
Update M utable Attributes based Per m
t e u Update balance, history etc. based Per
Request Processing i
n e Request Processing n
y s
g
General Enforcem ent System(each t
Enforcement System for Online video
Service request goes through this
Stream Provider
system )
Fig 3a: General Model for continuous Enforcement Fig. 3b: Continuous enforcement model
for video streaming service Provider.
Here we assume that each request is going through the enforcement model. The model has mutable
attributes which define the current state (and all possible states) for the system. The condition
enforcement diamond in fig 3a. ensures that any violation of system policy will be detected and any
further service request will be ignored in such violation cases.
For a specific application, I have considered a video streaming service provider where each customer
should have some balance, some trust worthiness, and/or balance history to get service. Possible state /
status for a customer are new, reliable, unreliable etc. A future request will be allowed or denied based on
which state the customer is currently in as well as on the policy of the system some of which are
enumerated in figure 3b.
References:
[1] Jaehong Park and Ravi Sandhu. The UCON_ABC Usage Control Model, ACM Transactions on Information and
System Security, Volume 7, Number 1, February 2004, pages 128-174.
[2] Jaehong Park, Ravi Sandhu and Yuan Cheng, ACON: Activity-Centric Access Control for Social Computing. In
Proceedings 5th International Conference on Availability, Reliability and Security (ARES)
I have not taken any help on this examination from anybody and have not given any help to
anybody.
4. 4. The Good Part and Bad Part:
In this paper the authors have nicely identified the scope of their work by identifying the fact that
although there exists de-facto standard for confidentiality and integrity for online banking, there is no
standard scheme for authentication and non-repudiation. Then they presented two solutions for achieving
authentication and non-repudiation. While they have engineered fairly technical solutions, the way they
have presented them is not quite comprehensible and the article would have required more technical
representation and technical analysis of their claim. For example, their approach for certificate-based
solution should be more distinct in the sense what already exists and what they are proposing. The authors
should have also shown attack scenarios that are possible in existing approached but not possible when
their proposed solution is deployed.
Something I have learned from the paper:
In order to protect man-in-the-middle (MITM) attack, this paper has proposed a short time password
scheme based on hardware generated token. Eventually, they have transferred the defense against secret
key tampering on an offline hardwired device (smart card) which is interesting to learn. I have also come
to know about the security concern and measurements for online banking ( for both online & offline )
from this and other papers I have read for answering the question.
Weakness of the paper:
The authors have identified and provided solution for issues like authentication, confidentiality, Integrity
and non-repudiation. But today there exists more sophisticated attack than MITM or SSL certificate
tempering among which MITB (Man-in-the-Browser) is worth to mention. So, they did not cover these
types of client browser specific attacks (ex: XSS, XSRF and many others) although they have brought up
this issues in another paper[4]. It is also reported that [3] a special, dedicated hardware device like smart
card and card reader(additionally other equipments) for online banking may potentially hurt customer
experiences caused by the limited portability of the hardware device.
References:
[1] Read the paper: Hiltgen, A., Kramp, T. and Weigold, T., “Secure Internet banking authentication.” IEEE
Security & Privacy, vol.4, no.2, pp.21-29, March-April 2006.
[2] Shoji Sakurai, Shinobu Ushirozawa, "Input Method against Trojan Horse and Replay Attack "Information
Theory and Information Security (ICmS), pp.3S4-3S9, Jan 2010.
[3] A. Vapen and N. Shahmehri. “Security levels for web authentication using mobile phones.” PrimeLife/IFIP
Summer School Post-proceedings, Springer, 2011 (In Press).
[4] Oppliger, R.; Rytz, R.; Holderegger, T.; “Internet Banking: Client-Side Attacks and Protection Mechanisms.”
Computer (IEEE), 2009, Vol. 42 , No. 6, pp. 27-33.
I have not taken any help on this examination from anybody and have not given any help to
anybody.