• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 2
  • 1
  • Tagged with
  • 8
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Associative memory neural networks : an investigation with application to chaotic time series prediction

Silver-Warner, Stephen John January 1997 (has links)
No description available.
2

Message Authentication Codes On Ultra-Low SWaP Devices

Liao, Che-Hsien 27 May 2022 (has links)
This thesis focuses on specific crypto algorithms, Message Authentication Codes (MACs), running on ultra-low SWaP devices. The type of MACs we used is hash-based message authentication codes (HMAC) and cipher-block-chaining message authentication code (CBC-MAC). The most important thing about ultra-low SWaP devices is their energy usage. This thesis measures different implementations' execution times on ultra-low SWaP devices. We could understand which implementation is suitable for a specific device. In order to understand the crypto algorithm we used, this thesis briefly introduces the concept of hash-based message authentication codes (HMAC) and cipher-block-chaining message authentication code (CBC-MAC) from a high level, including their usage and advantage. The research method is empirical research. This thesis determines the execution times of different implementations. These two algorithms (HMAC and CBC-MAC) contain three implementations. The result comes from those implementations running on the devices we used. / Master of Science / The deployments of 5G cellular networks are now onboard. The demand increased due to consumers and the availability of more affordable devices. The amount of investment in 5G technology and infrastructure increases market interest in IoT. The 5G network security is essential. How to secure user privacy and their sensitive data while they use 5g network has become a big issue and needs to be solved. However, not all popular crypto algorithms are suited to all devices, especially in those resource-limited microcontrollers. In this thesis, we will deal with Message Authentication Codes that provide the data integrity check. With resource limit devices, energy usage is an important issue. We will identify which implementations have better energy usage depending on the device features. This thesis will use three implementations for each algorithm. The result of our experiment provide a straightforward way that helps people understand which implementation can run more efficiently on specific ultra-low devices.
3

A cooperative MAC protocol to improve the performance of in-home broadband PLC systems

Oliveira, Roberto Massi de 11 March 2015 (has links)
Submitted by Renata Lopes (renatasil82@gmail.com) on 2017-06-07T11:55:49Z No. of bitstreams: 1 robertomussideoliveira.pdf: 1293292 bytes, checksum: 78c6c9fd9415c0b3990a1aaf55b842a2 (MD5) / Approved for entry into archive by Adriana Oliveira (adriana.oliveira@ufjf.edu.br) on 2017-06-07T13:31:58Z (GMT) No. of bitstreams: 1 robertomussideoliveira.pdf: 1293292 bytes, checksum: 78c6c9fd9415c0b3990a1aaf55b842a2 (MD5) / Made available in DSpace on 2017-06-07T13:31:58Z (GMT). No. of bitstreams: 1 robertomussideoliveira.pdf: 1293292 bytes, checksum: 78c6c9fd9415c0b3990a1aaf55b842a2 (MD5) Previous issue date: 2015-03-11 / CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / Nesse trabalho, discutimos o uso de protocolos de cooperação na subcamada de controle de acesso ao meio (CMAC) para reduzir a taxa de perda de pacote e aumentar o goodput em um sistema de comunicação banda larga via rede elétrica (PLC) de ambientes residenciais. Para apoiar essa discussão, nós, pela primeira vez, apresentamos uma análise estatística da taxa de erro de pacote (PER) de canais PLC residenciais a partir de dados medidos em um modelo com um único relay. Adicionalmente, nós esboçamos um simples protocolo CMAC capaz de explorar a diversidade oferecida por uma rede elétrica doméstica. Usando esse protocolo, nosso objetivo é mostrar o impacto da variação da largura de banda, da variação da PER e da posição relativa do relay no desempenho do sistema. Sendo assim, nós mostramos que a taxa de perda de pacote e o goodput melhoram quando a largura de banda de frequência aumenta. Além disso, resultados mostram que a cooperação na camada de enlace não oferece vantagens caso os valores de PER do enlace direto e do enlace intermediado pelo relay sejam muito altos ou muito baixos. Nós também notamos que as melhorias estudadas dependem da posição do nó relay em relação ao nó fonte e ao nó destino (i.e., notamos melhoras na rede nos casos em que o relay estava situado próximo à fonte e no meio do caminho entre a fonte e o destino). Finalmente, uma comparação entre os esquemas de acesso múltiplo por divisão de frequências ortogonais - acesso múltiplo por divisão de tempo (OFDMA-TDMA) e acesso múltiplo por divisão de tempo - multiplexação por divisão ortogonal de frequência (TDMA-OFDM) mostra que o simples protocolo CMAC é mais eficaz quando usado juntamente com o primeiro esquema do que com o último. Em suma, a nossa contribuição é dividida em duas etapas: primeiramente, desenvolvemos um simples protocolo MAC de cooperação que traz melhorias de desempenho na rede quando comparado com um sistema sem a cooperação; em segundo lugar, nós realizamos uma análise sistemática de diferentes cenários, mostrando os benefícios e limitações da cooperação na camada de enlace de redes PLC. / In this work, we discuss the use of cooperative medium access control (CMAC) protocols to reduce packet loss rate and to improve goodput of in-home broadband power line communication (PLC) systems. To support this discussion, we, for the first time, present a statistical packet error rate (PER) analysis of measured in-home PLC channels by adopting a single relay model. Additionally, we outline a simple CMAC protocol that is capable of exploiting the diversity offered by in-home electric power grids. Using this protocol, we aim to show the impact of bandwidth variation, PER variation and of relative relay location on system performance. Thus, we show that packet loss rate and goodput improve when frequency bandwidth increases. Also, results show that cooperation at the link layer does not offer advantages if the PER values of direct and relayed links are very high or very low. Furthermore, we note that the improvements depend on the location of the node relay in relation to the nodes source and the destination (i.e., network improves if the relay is located near the source or in the midway between the source and the destination). Finally, a comparison between orthogonal frequency division multiple access - time division multiple access (OFDMA-TDMA) and time division multiple access - orthogonal frequency division multiplexing (TDMA-OFDM) schemes show that the simple CMAC protocol is more effective when it is used together with the former scheme than the latter.
4

A Cooperative MAC Protocol to Improve the Performance of In-Home Broadband PLC Systems

Oliveira, Roberto Massi de 11 March 2015 (has links)
Submitted by Renata Lopes (renatasil82@gmail.com) on 2015-12-01T12:45:13Z No. of bitstreams: 1 robertomussideoliveira.pdf: 1293292 bytes, checksum: 78c6c9fd9415c0b3990a1aaf55b842a2 (MD5) / Made available in DSpace on 2015-12-01T12:45:13Z (GMT). No. of bitstreams: 1 robertomussideoliveira.pdf: 1293292 bytes, checksum: 78c6c9fd9415c0b3990a1aaf55b842a2 (MD5) Previous issue date: 2015-03-11 / CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / Nesse trabalho, discutimos o uso de protocolos de coopera¸c˜ao na subcamada de controle de acesso ao meio (CMAC) para reduzir a taxa de perda de pacote e aumentar o goodput em um sistema de comunica¸c˜ao banda larga via rede el´etrica (PLC) de ambientes residenciais. Para apoiar essa discuss˜ao, n´os, pela primeira vez, apresentamos uma an´alise estat´ıstica da taxa de erro de pacote (PER) de canais PLC residenciais a partir de dados medidos em um modelo com um ´unico relay. Adicionalmente, n´os esbo¸camos um simples protocolo CMAC capaz de explorar a diversidade oferecida por uma rede el´etrica dom´estica. Usando esse protocolo, nosso objetivo ´e mostrar o impacto da varia¸c˜ao da largura de banda, da varia¸c˜ao da PER e da posi¸c˜ao relativa do relay no desempenho do sistema. Sendo assim, n´os mostramos que a taxa de perda de pacote e o goodput melhoram quando a largura de banda de frequˆencia aumenta. Al´em disso, resultados mostram que a coopera¸c˜ao na camada de enlace n˜ao oferece vantagens caso os valores de PER do enlace direto e do enlace intermediado pelo relay sejam muito altos ou muito baixos. N´os tamb´em notamos que as melhorias estudadas dependem da posi¸c˜ao do n´o relay em rela¸c˜ao ao n´o fonte e ao n´o destino (i.e., notamos melhoras na rede nos casos em que o relay estava situado pr´oximo `a fonte e no meio do caminho entre a fonte e o destino). Finalmente, uma compara¸c˜ao entre os esquemas de acesso m´ultiplo por divis˜ao de frequˆencias ortogonais - acesso m´ultiplo por divis˜ao de tempo (OFDMA-TDMA) e acesso m´ultiplo por divis˜ao de tempo - multiplexa¸c˜ao por divis˜ao ortogonal de frequˆencia (TDMA-OFDM) mostra que o simples protocolo CMAC ´e mais eficaz quando usado juntamente com o primeiro esquema do que com o ´ultimo. Em suma, a nossa contribui¸c˜ao ´e dividida em duas etapas: primeiramente, desenvolvemos um simples protocolo MAC de coopera¸c˜ao que traz melhorias de desempenho na rede quando comparado com um sistema sem a coopera¸c˜ao; em segundo lugar, n´os realizamos uma an´alise sistem´atica de diferentes cen´arios, mostrando os benef´ıcios e limita¸c˜oes da coopera¸c˜ao na camada de enlace de redes PLC. / In this work, we discuss the use of cooperative medium access control (CMAC) protocols to reduce packet loss rate and to improve goodput of in-home broadband power line communication (PLC) systems. To support this discussion, we, for the first time, present a statistical packet error rate (PER) analysis of measured in-home PLC channels by adopting a single relay model. Additionally, we outline a simple CMAC protocol that is capable of exploiting the diversity offered by in-home electric power grids. Using this protocol, we aim to show the impact of bandwidth variation, PER variation and of relative relay location on system performance. Thus, we show that packet loss rate and goodput improve when frequency bandwidth increases. Also, results show that cooperation at the link layer does not offer advantages if the PER values of direct and relayed links are very high or very low. Furthermore, we note that the improvements depend on the location of the node relay in relation to the nodes source and the destination (i.e., network improves if the relay is located near the source or in the midway between the source and the destination). Finally, a comparison between orthogonal frequency division multiple access - time division multiple access (OFDMA-TDMA) and time division multiple access - orthogonal frequency division multiplexing (TDMA-OFDM) schemes show that the simple CMAC protocol is more effective when it is used together with the former scheme than the latter.
5

Κώδικες πιστοποίησης μηνυμάτων : σχεδιασμός και υλοποιήσεις σε πλατφόρμες υλικού και συγκριτικές αποτιμήσεις / Message authentication codes : designs and implementations in hardware platforms and comparisons

Χαράλαμπος, Μιχαήλ 16 June 2011 (has links)
Σε αυτή τη μεταπτυχιακή διπλωματική εργασία μελετήθηκαν, αναπτύχτηκαν και συγκριθήκαν αρχιτεκτονικές για κρυπτογραφικές εφαρμογές που χρησιμοποιούνται στης τεχνικές πιστοποίησης μηνυμάτων. Σε αυτές χρησιμοποιήθηκαν και τεχνικές βελτιστοποίησης της απόδοσης. Στην ασφάλεια μετάδοσης των πληροφοριών, η πιστοποίηση μηνύματος είναι μία θεμελιώδης τεχνική, η οποία χρησιμοποιείται για να επιβεβαιώσει ότι τα ληφθέντα μηνύματα προέρχονται από τον σωστό αποστολέα και ότι δεν έχουν τροποποιηθεί κατά τη μετάδοση. Στην πιστοποίηση μηνύματος, απαιτείται η χρήση ενός κώδικα πιστοποίησης μηνύματος (Message Authentication Code-MAC). Οι τεχνικές για να δημιουργηθεί ένα MAC γίνεται με δύο τρόπους: α)Με χρήση μίας hash συνάρτησης σε συνδυασμό με ένα μυστικό κλειδί και αναφέρεται σαν HMAC (Hash-based MAC). β)Με χρήση ενός block cipher αλγορίθμου κρυπτογράφησης σε συνδυασμό με ένα μυστικό κλειδί και αναφέρεται σαν CMAC (Cipher block-based MAC). Θα υλοποιηθούν οι δύο παραπάνω τρόποι-μέθοδοι παραγωγής MAC, σε πλατφόρμες υλικού με γνώμονα την αύξηση της ρυθμαπόδοσης τους. Θα αποτιμηθεί ο ρόλος τους στα κρυπτογραφικά συστήματα ασφαλείας και σε ποιές περιπτώσεις συνίσταται η χρήση της κάθε μίας τεχνικής. Έτσι θα ξεκαθαριστούν οι διαφορές τους και θα καθοριστεί το προφίλ των εφαρμογών στης οποίες κάθε μια εκ των δύο αυτών τεχνικών ταιριάζει καλύτερα. Οι υλοποιήσεις συγκριθήκαν στην ίδια πλατφόρμα υλικού που χρησιμοποιήθηκε για την τελική υλοποίηση ώστε σε κάθε περίπτωση, ανάλογα με της απαιτήσεις της εκάστοτε εφαρμογής, να βρεθεί και η βέλτιστη λύση από πλευράς κόστους. / In the present M.Sc. thesis, several architectures for message authentication codes were studied, developed and compared to each other. Performance optimization techniques were exploited as well. Message Authentication Codes (MACs) are widely used in order to protect both a message's integrity -by ensuring that a different MAC will be produced if the message has changed - as well as its authenticity (only someone who knows the secret key could have generated a valid MAC). A message authentication code is an authentication tag (also called a checksum) derived by applying an authentication scheme, together with a secret key, to a message. Typically MACs are produced through: α) HMAC mechanism which is based on a FIPS approved collision-resistant hash function in combination with a secret key (Hash-based MAC). β)CMAC mechanism which is based on a block cipher algorithm in combination with a secret key (Cipher block-based MAC). The above two ways (mechanisms) for producing MACs were designed and implemented in hardware taking into consideration the increase of their throughput. The cryptographic systems in which the above two are exploited were described. Their key role in these systems was valued through an investigation concerning the way of their incorporation. Thus, the differences between them were clarified determining the applications where each one is better befitted. HMAC and CMAC designs are implemented in the same hardware FPGA platform and compared to each other in terms of operating frequency, area consumption and throughput. In this way, the best solution between them concerning their overall cost can be designated.
6

Simulation and Assessment of Long-Term Stormwater Basin Performance under Real-Time Control Retrofits

Schmitt, Zoe Kendall 18 June 2019 (has links)
The use of real-time control (RTC) as an adaptation technique for improving existing stormwater systems has been gaining attention in recent years for its ability to enhance water quality and quantity treatment. A case study RTC retrofit of seven existing detention basins was simulated for a small (162 ha), urbanized watershed in Blacksburg, VA. Two heuristic, reactive control algorithms were tested and compared for their ability to improve hydraulic conditions at each detention basin and the watershed outlet through manipulation of an actuated valve, under various permutations of RTC retrofitting (single facility, multiple facilities, etc.). Change in peak flow during 24-hour design storms was assessed. RTC only reduced peak flows at some of the facilities for storms with a return period of 2 years or less. For larger storms, RTC maintained or increased peak flow rates. During a 15-year simulation with historic precipitation data, total duration of erosive flows was reduced for most facility retrofit simulations; however, the duration of high intensity flows increased, or remained unchanged. This result was also reflected at the watershed outlet. / Master of Science / Stormwater management helps protect natural waterways from the harmful impacts of human development. A growing field of research is investigating the potential for “smart” technologies to improve the efficiency of existing stormwater facilities. This study investigates the application of a “smart” stormwater retrofit, known as real-time control (RTC), to existing stormwater management facilities located in a small case study watershed. The RTC system is composed of hypothetical internet-connected sensors and control valves which control flows at several points within the test watershed. Two control algorithms were tested, and compared to the current conditions (scenario with no RTC), for a large range of storm events. Results of this study found that RTC would lead to improved stream health for most rainfall events, but could potentially worsen conditions for the largest, most rare storm events. In addition, RTC was found to be much more effective at some points in the watershed than other points. Prediction of where RTC will be most effective should be the focus of future research.
7

Hierarchical Reinforcement Learning with Function Approximation for Adaptive Control

Skelly, Margaret Mary 08 April 2004 (has links)
No description available.
8

Securing the Future of 5G Smart Dust: Optimizing Cryptographic Algorithms for Ultra-Low SWaP Energy-Harvesting Devices

Ryu, Zeezoo 12 July 2023 (has links)
While 5G energy harvesting makes 5G smart dust possible, stretching computation across power cycles affects cryptographic algorithms. This effect may lead to new security issues that make the system vulnerable to adversary attacks. Therefore, security measures are needed to protect data at rest and in transit across the network. In this paper, we identify the security requirements of existing 5G networks and the best-of-breed cryptographic algorithms for ultra-low SWaP devices in an energy harvesting context. To do this, we quantify the performance vs. energy tradespace, investigate the device features that impact the tradespace the most, and assess the security impact when the attacker has access to intermediate results. Our open-source energy-harvesting-tolerant versions of the cryptographic algorithms provide algorithm and device recommendations and ultra-low SWaP energy-harvesting-device-optimized versions of the cryptographic algorithms. / Master of Science / Smart dust is a network of tiny and energy-efficient devices that can gather data from the environment using various sensors, such as temperature, pressure, and humidity sensors. These devices are extremely small, often as small as a grain of sand or smaller, and have numerous applications, including environmental monitoring, structural health monitoring, and military surveillance. One of the main challenges of smart dust is its small size and limited energy resources, making it challenging to power and process the collected data. However, advancements in energy harvesting and low-power computing are being developed to overcome these challenges. In the case of 5G, energy harvesting technologies can be used to power small sensors and devices that are part of the 5G network, such as the Internet of Things (IoT) devices. Examples of IoT devices are wearable fitness trackers, smart thermostats, security cameras, home automation systems, and industrial sensors. Since 5G energy harvesting impacts the daily lives of people using the relevant devices, our research seeks to find out what kind of measures are necessary to guarantee their security.

Page generated in 0.0181 seconds