210 research outputs found

    Future Computer Requirements for Computational Aerodynamics

    Get PDF
    Recent advances in computational aerodynamics are discussed as well as motivations for and potential benefits of a National Aerodynamic Simulation Facility having the capability to solve fluid dynamic equations at speeds two to three orders of magnitude faster than presently possible with general computers. Two contracted efforts to define processor architectures for such a facility are summarized

    Robust data protection and high efficiency for IoTs streams in the cloud

    Get PDF
    Remotely generated streaming of the Internet of Things (IoTs) data has become a vital category upon which many applications rely. Smart meters collect readings for household activities such as power and gas consumption every second - the readings are transmitted wirelessly through various channels and public hops to the operation centres. Due to the unusually large streams sizes, the operation centres are using cloud servers where various entities process the data on a real-time basis for billing and power management. It is possible that smart pipe projects (where oil pipes are continuously monitored using sensors) and collected streams are sent to the public cloud for real-time flawed detection. There are many other similar applications that can render the world a convenient place which result in climate change mitigation and transportation improvement to name a few. Despite the obvious advantages of these applications, some unique challenges arise posing some questions regarding a suitable balance between guaranteeing the streams security, such as privacy, authenticity and integrity, while not hindering the direct operations on those streams, while also handling data management issues, such as the volume of protected streams during transmission and storage. These challenges become more complicated when the streams reside on third-party cloud servers. In this thesis, a few novel techniques are introduced to address these problems. We begin by protecting the privacy and authenticity of transmitted readings without disrupting the direct operations. We propose two steganography techniques that rely on different mathematical security models. The results look promising - security: only the approved party who has the required security tokens can retrieve the hidden secret, and distortion effect with the difference between the original and protected readings that are almost at zero. This means the streams can be used in their protected form at intermediate hops or third party servers. We then improved the integrity of the transmitted protected streams which are prone to intentional or unintentional noise - we proposed a secure error detection and correction based stenographic technique. This allows legitimate recipients to (1) detect and recover any noise loss from the hidden sensitive information without privacy disclosure, and (2) remedy the received protected readings by using the corrected version of the secret hidden data. It is evident from the experiments that our technique has robust recovery capabilities (i.e. Root Mean Square (RMS) <0.01%, Bit Error Rate (BER) = 0 and PRD < 1%). To solve the issue of huge transmitted protected streams, two compression algorithms for lossless IoTs readings are introduced to ensure the volume of protected readings at intermediate hops is reduced without revealing the hidden secrets. The first uses Gaussian approximation function to represent IoTs streams in a few parameters regardless of the roughness in the signal. The second reduces the randomness of the IoTs streams into a smaller finite field by splitting to enhance repetition and avoiding the floating operations round errors issues. Under the same conditions, our both techniques were superior to existing models mathematically (i.e. the entropy was halved) and empirically (i.e. achieved ratio was 3.8:1 to 4.5:1). We were driven by the question ‘Can the size of multi-incoming compressed protected streams be re-reduced on the cloud without decompression?’ to overcome the issue of vast quantities of compressed and protected IoTs streams on the cloud. A novel lossless size reduction algorithm was introduced to prove the possibility of reducing the size of already compressed IoTs protected readings. This is successfully achieved by employing similarity measurements to classify the compressed streams into subsets in order to reduce the effect of uncorrelated compressed streams. The values of every subset was treated independently for further reduction. Both mathematical and empirical experiments proved the possibility of enhancing the entropy (i.e. almost reduced by 50%) and the resultant size reduction (i.e. up to 2:1)

    Satellite Communications

    Get PDF
    This study is motivated by the need to give the reader a broad view of the developments, key concepts, and technologies related to information society evolution, with a focus on the wireless communications and geoinformation technologies and their role in the environment. Giving perspective, it aims at assisting people active in the industry, the public sector, and Earth science fields as well, by providing a base for their continued work and thinking

    Three essays on the role of amenities as an economic development strategy

    Get PDF
    It is well known that an amenity is a key driving engine to regional economic growth. However, the site-specific nature of an amenity can characterize them as public goods. Due to this characteristic, local governments have difficulty optimally supplying amenities. This dissertation tries to find relationships between an amenity and economic growth. Three empirical papers comprise the original research in this dissertation. The findings of the meta-analysis in the first essay suggest little methodological diversity exists among researchers linking amenities to economic growth., I do find that employment growth is more likely related to man-made amenities even in research on rural areas than natural amenities. Further, incorporating spatial estimators into amenity research improves modeling performance while reducing the net impact of amenities on economic growth. The second essay indicates a distinctive distribution between man-made amenities and natural amenities over counties of the United States. While man-made amenities are agglomerated in urban areas, natural amenities show heterogeneous dispersion. Both agricultural land and conservation land show an inverse relationship to man-made amenities across space. From an analysis using a local government’s public policy along with an areas’ physical attributes, I find government tax policy having the greatest effect on film location decisions with natural amenities having little impact. The third essay analyzed the impact of a tax incentive program targeted to film industries on local economies using a quasi-experimental approach. This last essay provided three findings. First, this chapter found meaningful methodological specifications that should be considered in regional studies using a quasi-experimental approach. They are appropriate consideration of control periods, spatial units of comparison, and validities of dummy variables representing extraneous shocks. Second, the impact of the film industry tax program on local economies is insignificant for most industries. Third, the influence of tax subsidy policy on local economies is limited to a central area but is not beneficial to its adjacent areas
    corecore