Wyniki wyszukiwania dla: SIDE CHANNEL ATTACK - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: SIDE CHANNEL ATTACK

Wyniki wyszukiwania dla: SIDE CHANNEL ATTACK

  • Estimating the uncertainty of discharge coefficient predicted for oblique side weir using Monte Carlo method

    Publikacja

    Side weir is a hydraulic structure, which is used in irrigation systems to divert some water from main to side channel. It is installed at the entrance of the side channel to control and measure passing water into the side channel. Many studies provided side weir water surface profile and coefficient of discharge to measure water discharge diverted into the side channel. These studies dealt with different side weir shapes (rectangular,...

    Pełny tekst do pobrania w portalu

  • Fake VIP Attacks and Their Mitigation via Double-Blind Reputation

    Publikacja

    - Rok 2017

    In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...

    Pełny tekst do pobrania w portalu

  • Radio Channel Measurements in Off-Body Communications in a Ferry Passenger Cabin

    Publikacja

    - Rok 2017

    This paper presents an off-body radio channel measurements in a ferry passenger cabin at 2.45 GHz band, for static sleeping scenarios with different body orientation and on-body antennas placements, and also for upper and lower sleeping berths. The measurements have been performed with two types of on-body wearable receiving antennas: FlexPIFA (flexible planar inverted F antenna), and FlexNotch (flexible adhesive-backed notch antenna)...

  • Power equalization of AES FPGA implementation

    This paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....

    Pełny tekst do pobrania w portalu

  • Diver Observations by Means of Acoustic Methods

    Publikacja

    Searching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...

    Pełny tekst do pobrania w portalu

  • Device for spoofing in global positioning system

    This article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Effect of asymmetric fluid flow distribution on flow boiling in a microchannel heat sink – An experimental investigation

    Publikacja

    - APPLIED THERMAL ENGINEERING - Rok 2022

    Flow boiling in microchannels is emerging as an exclusive cooling solution for miniaturized high-power electronic devices alongside having other high heat flux applications. Size miniaturization at microscale strangely increases heat transfer performance as well as flow boiling instabilities. Many flow boiling instabilities are interrelated and result from imperfect hydrodynamic conditions. One of such problems is flow maldistribution among...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks

    Quality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...

    Pełny tekst do pobrania w portalu

  • Prediction of coking dynamics for wet coal charge

    Publikacja

    - Chemical and Process Engineering-Inżynieria Chemiczna i Procesowa - Rok 2015

    A one-dimensional transient mathematical model describing thermal and flow phenomena during coal coking in an oven chamber was studied in the paper. It also accounts for heat conduction in the ceramic oven wall when assuming a constant temperature at the heating channel side. The model was solved numerically using partly implicit methods for gas flow and heat transfer problems. The histories of temperature, gas evolution and internal...

    Pełny tekst do pobrania w portalu

  • Adversarial attack algorithm for traffic sign recognition

    Publikacja

    - MULTIMEDIA TOOLS AND APPLICATIONS - Rok 2022

    Deep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Heat exchange enhancement of jet impingement cooling with the novel humped-cone heat sink

    Publikacja

    - Case Studies in Thermal Engineering - Rok 2021

    Jet impingement cooling technology is applicable to control temperature of devices, where very high heat flux is generated within a small area. This paper is about the improvement of the jet impingement cooling efficiency by the heat sink geometry modification. Two reference cases were sourced from the literature – flat heat sink and modified one with cone in the jet stagnation region. Such a change improves cooling capability...

    Pełny tekst do pobrania w portalu

  • Client-side versus server-side geographic data processing performance comparison: Data and code

    Publikacja

    - Data in Brief - Rok 2019

    The data and code presented in this article are related to the research article entitled “Analysis of Server-side and Client-side Web-GIS data processing methods on the example of JTS and JSTS using open data from OSM and Geoportal” (Kulawiak et al., 2019). The provided 12 datasets include multi-point and multi-polygon data of different scales and volumes, representing real-world geographic features. The datasets cover the area...

    Pełny tekst do pobrania w portalu

  • [ITiT] Transmission Channel in Radio Communication Systems

    Kursy Online
    • S. J. Ambroziak

    {mlang pl} Dyscyplina: informatyka techniczna i telekomunikacja Zajęcia fakultatywne dla doktorantów II roku Prowadzący:  dr hab. inż. Sławomir Ambroziak, prof. PG Liczba godzin: 15 Forma zajęć: wykład {mlang} {mlang en} Discipline: technical informatics and telecommunications Elective course for 2nd-year PhD students Academic teachers: dr hab. inż. Sławomir Ambroziak, prof. PG Total hours of training: 15 teaching hours Course...

  • The Boltzmann sequence-structure channel

    Publikacja

    - Rok 2016

    We rigorously study a channel that maps binary sequences to self-avoiding walks in the two-dimensional grid, inspired by a model of protein statistics. This channel, which we also call the Boltzmann sequence-structure channel, is characterized by a Boltzmann/Gibbs distribution with a free parameter corresponding to temperature. In our previous work, we verified experimentally that the channel capacity has a phase transition for...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Arsalan Muhammad Soomar Doctoral Student

    Osoby

    Hi, I'm Arsalan Muhammad Soomar, an Electrical Engineer. I received my Master's and Bachelor's Degree in the field of Electrical Engineering from Mehran University of Engineering and Technology, Jamshoro, Sindh, Pakistan.  Currently enrolled as a Doctoral student at the Gdansk University of Technology, Gdansk, Poland. Also worked in Yellowlite. INC, Ohio  as a Solar Design Engineer.   HEADLINE Currently Enrolled as a Doctoral...

  • Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange

    This paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...

  • Stability of trusses with linear elastic side-supports

    Publikacja

    The present research is devoted to study of a lateral buckling of truss with linear elastic side supports. The elastic support reaction in relation to force in compressed chord and coefficient of buckling length related to side support distance are also calculated. The effect of slope of side support on limit force is also considered. The nonlinear analysis of two roof trusses are carried out. The results are compared to design...

  • High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks

    Publikacja
    • G. Savva
    • K. Manousakis
    • J. Rak
    • I. Tomkos
    • G. Ellinas

    - IEEE Access - Rok 2021

    This work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...

    Pełny tekst do pobrania w portalu

  • Performance of the Direct Sequence Spread Spectrum Underwater Acoustic Communication System with Differential Detection in Strong Multipath Propagation Conditions

    The underwater acoustic communication (UAC) operating in very shallow-water should ensure reliable transmission in conditions of strong multipath propagation, significantly disturbing the received signal. One of the techniques to achieve this goal is the direct sequence spread spectrum (DSSS) technique, which consists in binary phase shift keying (BPSK) according to a pseudo-random spreading sequence. This paper describes the DSSS...

    Pełny tekst do pobrania w portalu

  • Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

    Publikacja

    - Rok 2017

    In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...

    Pełny tekst do pobrania w portalu