8,742 research outputs found

    Low-complexity Multiclass Encryption by Compressed Sensing

    Get PDF
    The idea that compressed sensing may be used to encrypt information from unauthorised receivers has already been envisioned, but never explored in depth since its security may seem compromised by the linearity of its encoding process. In this paper we apply this simple encoding to define a general private-key encryption scheme in which a transmitter distributes the same encoded measurements to receivers of different classes, which are provided partially corrupted encoding matrices and are thus allowed to decode the acquired signal at provably different levels of recovery quality. The security properties of this scheme are thoroughly analysed: firstly, the properties of our multiclass encryption are theoretically investigated by deriving performance bounds on the recovery quality attained by lower-class receivers with respect to high-class ones. Then we perform a statistical analysis of the measurements to show that, although not perfectly secure, compressed sensing grants some level of security that comes at almost-zero cost and thus may benefit resource-limited applications. In addition to this we report some exemplary applications of multiclass encryption by compressed sensing of speech signals, electrocardiographic tracks and images, in which quality degradation is quantified as the impossibility of some feature extraction algorithms to obtain sensitive information from suitably degraded signal recoveries.Comment: IEEE Transactions on Signal Processing, accepted for publication. Article in pres

    On Known-Plaintext Attacks to a Compressed Sensing-based Encryption: A Quantitative Analysis

    Get PDF
    Despite the linearity of its encoding, compressed sensing may be used to provide a limited form of data protection when random encoding matrices are used to produce sets of low-dimensional measurements (ciphertexts). In this paper we quantify by theoretical means the resistance of the least complex form of this kind of encoding against known-plaintext attacks. For both standard compressed sensing with antipodal random matrices and recent multiclass encryption schemes based on it, we show how the number of candidate encoding matrices that match a typical plaintext-ciphertext pair is so large that the search for the true encoding matrix inconclusive. Such results on the practical ineffectiveness of known-plaintext attacks underlie the fact that even closely-related signal recovery under encoding matrix uncertainty is doomed to fail. Practical attacks are then exemplified by applying compressed sensing with antipodal random matrices as a multiclass encryption scheme to signals such as images and electrocardiographic tracks, showing that the extracted information on the true encoding matrix from a plaintext-ciphertext pair leads to no significant signal recovery quality increase. This theoretical and empirical evidence clarifies that, although not perfectly secure, both standard compressed sensing and multiclass encryption schemes feature a noteworthy level of security against known-plaintext attacks, therefore increasing its appeal as a negligible-cost encryption method for resource-limited sensing applications.Comment: IEEE Transactions on Information Forensics and Security, accepted for publication. Article in pres

    Bibliographic Review on Distributed Kalman Filtering

    Get PDF
    In recent years, a compelling need has arisen to understand the effects of distributed information structures on estimation and filtering. In this paper, a bibliographical review on distributed Kalman filtering (DKF) is provided.\ud The paper contains a classification of different approaches and methods involved to DKF. The applications of DKF are also discussed and explained separately. A comparison of different approaches is briefly carried out. Focuses on the contemporary research are also addressed with emphasis on the practical applications of the techniques. An exhaustive list of publications, linked directly or indirectly to DKF in the open literature, is compiled to provide an overall picture of different developing aspects of this area

    Model Prediction-Based Approach to Fault Tolerant Control with Applications

    Get PDF
    Abstract— Fault-tolerant control (FTC) is an integral component in industrial processes as it enables the system to continue robust operation under some conditions. In this paper, an FTC scheme is proposed for interconnected systems within an integrated design framework to yield a timely monitoring and detection of fault and reconfiguring the controller according to those faults. The unscented Kalman filter (UKF)-based fault detection and diagnosis system is initially run on the main plant and parameter estimation is being done for the local faults. This critical information\ud is shared through information fusion to the main system where the whole system is being decentralized using the overlapping decomposition technique. Using this parameter estimates of decentralized subsystems, a model predictive control (MPC) adjusts its parameters according to the\ud fault scenarios thereby striving to maintain the stability of the system. Experimental results on interconnected continuous time stirred tank reactors (CSTR) with recycle and quadruple tank system indicate that the proposed method is capable to correctly identify various faults, and then controlling the system under some conditions

    Publication Article Masculinity And Femininity Refelected By Tris In Veronica Roth's Divergent Trilogy Novel

    Get PDF
    The study aimed to analyze the presence of masculine and feminine sides shown by a person who does not only depend on what is already their biological characters. The research conducted has three main objectives behind its creation, namely the masculine and feminine characteristics shown by Tris as the female lead in Veronica Roth’s Divergent Trilogy Novel, Tris’ portrayal of the masculine and feminine sides in the novel and the author's reasons for raising the issue of masculinity and femininity in her novel. In analyzing the Divergent Trilogy Novel by Veronica Roth, researchers used a psychological approach presented by Wellek and Warren (1949). In addition, this research uses qualitative methods that are usually used in descriptive form. The results showed that the masculine and feminine characteristics shown by Tris were the same or balanced which made him a character with an androgynous identity. Depictions of masculinity and femininity in the novel are based on actions performed based on their purpose or goal-oriented (dynamic masculine) and actions based on awareness to the surrounding environment (dynamic feminine). In addition, research conducted shows that the formation of tris character which has a feminine and masculine side in him is based on personal experience and the author’s belief to build a character that not only describes her biological side as a woman

    Assessing a Journal Publisher

    Get PDF

    Invisible Article III Delinquency: History, Mystery, and Concerns About “Federal Juvenile Courts”

    Full text link
    This essay is the second in a two-part series focused on our nation’s invisible juvenile justice system—one that operates under the legal radar as part of the U.S. Constitution’s Article III federal district court system. The first publication, Article III Adultification of Kids: History, Mystery, and Troubling Implications of Federal Youth Transfers, examined the little-known practice of prosecuting children as adults in federal courts. This paper will look at the related phenomenon of juvenile delinquency matters that are filed and pursued in our nation’s federal court system. To date, most scholarship evaluating youth prosecution has focused on our country’s juvenile courts—venues established and run in each of the individual states and territories. The anomaly of child prosecution under federal laws in our nation’s Article III courts has received far less attention—particularly over the last two decades. However, recent events suggest—and policies of the current presidential administration demonstrate—federal apprehension and prosecution of youth is a subject worthy of greater study

    KONTRIBUSI DUKUNGAN ORANG TUA DAN KEDISIPLINAN SISWA TERHADAP KREATIVITAS BELAJAR MATEMATIKA KELAS V SD

    Get PDF
    This is a new author guidelines and article template of Tematik : journal since year 2016 publication. Article should be started by Title of Article followed by Authors Name and Affiliation Address and abstract. This abstract section should be typed in Italic font and font size of 11 pt and number of words of 150-250. Special for the abstract section, please use left margin of 25 mm, top margin of 30 mm, right and bottom margins of 20 mm. The single spacing should be used between lines in this article. If article is written in Indonesian, the abstract should be typed in Indonesian and English. Meanwhile, if article is written in English, the abstract should be typed in English only. The Abstract is a miniature contents of the entire writing statement, comprise : problem, purpose, method, scientific finding results, and short conclusion. The abstract should only be typed in one paragraph and one-column format

    Ontology Winnowing: A Case Study on the AKT Reference Ontology

    Get PDF
    Many ontologies are built for the main purpose of representing a domain, rather than to meet the requirements of a specific application. When applications and services are deployed over an ontology, it is sometimes the case that only few parts of the ontology are queried and used. Identifying which parts of an ontology are being used could useful for realising the necessary fragments of the ontology to run the applications. Such information could be used to winnow an ontology, i.e., simplifying or shrinking the ontology to smaller, more fit for purpose sizes. This paper presents a study on the use of the AKT Reference Ontology by a number of applications and services, and investigate the possibility of using this information to winnow that ontology
    • 

    corecore