20,709 research outputs found

    Safe and Secure Wireless Power Transfer Networks: Challenges and Opportunities in RF-Based Systems

    Full text link
    RF-based wireless power transfer networks (WPTNs) are deployed to transfer power to embedded devices over the air via RF waves. Up until now, a considerable amount of effort has been devoted by researchers to design WPTNs that maximize several objectives such as harvested power, energy outage and charging delay. However, inherent security and safety issues are generally overlooked and these need to be solved if WPTNs are to be become widespread. This article focuses on safety and security problems related WPTNs and highlight their cruciality in terms of efficient and dependable operation of RF-based WPTNs. We provide a overview of new research opportunities in this emerging domain.Comment: Removed some references, added new references, corrected typos, revised some sections (mostly I-B and III-C

    Quantum Cryptography in Practice

    Get PDF
    BBN, Harvard, and Boston University are building the DARPA Quantum Network, the world's first network that delivers end-to-end network security via high-speed Quantum Key Distribution, and testing that Network against sophisticated eavesdropping attacks. The first network link has been up and steadily operational in our laboratory since December 2002. It provides a Virtual Private Network between private enclaves, with user traffic protected by a weak-coherent implementation of quantum cryptography. This prototype is suitable for deployment in metro-size areas via standard telecom (dark) fiber. In this paper, we introduce quantum cryptography, discuss its relation to modern secure networks, and describe its unusual physical layer, its specialized quantum cryptographic protocol suite (quite interesting in its own right), and our extensions to IPsec to integrate it with quantum cryptography.Comment: Preprint of SIGCOMM 2003 pape

    Using an identity lens : constructive working with children in the criminal justice system

    Get PDF
    Research has shown that identity, and how you feel about yourself, can be key to moving forward with life and away from crime. Working with the University of Salford, Youth Offending Teams and supported by the Barrow Cadbury Trust, this resource has been developed to promote a constructive, identity-focused approach to ultimately help divert children away from progressing further through the criminal justice system. Using the principles of the Nacro-led Beyond Youth Custody programme, this toolkit outlines how these can be applied to working with children before custody to support them towards positive outcomes and prevent further offending

    Highly reliable, low-latency communication in low-power wireless networks

    Get PDF
    Low-power wireless networks consist of spatially distributed, resource-constrained devices – also referred to as nodes – that are typically equipped with integrated or external sensors and actuators. Nodes communicate with each other using wireless transceivers, and thus, relay data – e. g., collected sensor values or commands for actuators – cooperatively through the network. This way, low-power wireless networks can support a plethora of different applications, including, e. g., monitoring the air quality in urban areas or controlling the heating, ventilation and cooling of large buildings. The use of wireless communication in such monitoring and actuating applications allows for a higher flexibility and ease of deployment – and thus, overall lower costs – compared to wired solutions. However, wireless communication is notoriously error-prone. Message losses happen often and unpredictably, making it challenging to support applications requiring both high reliability and low latency. Highly reliable, low-latency communication – along with high energy-efficiency – are, however, key requirements to support several important application scenarios and most notably the open-/closed-loop control functions found in e. g., industry and factory automation applications. Communication protocols that rely on synchronous transmissions have been shown to be able to overcome this limitation. These protocols depart from traditional single-link transmissions and do not attempt to avoid concurrent transmissions from different nodes to prevent collisions. On the contrary, they make nodes send the same message at the same time over several paths. Phenomena like constructive interference and capture then ensure that messages are received correctly with high probability. While many approaches relying on synchronous transmissions have been presented in the literature, two important aspects received only little consideration: (i) reliable operation in harsh environments and (ii) support for event-based data traffic. This thesis addresses these two open challenges and proposes novel communication protocols to overcome them

    Making Waves, Mixing Colors, and Using Mirrors: The Self-Regulated Learning Support Features and Procedural Rhetoric of Three Whole-Body Educational Games

    Get PDF
    This dissertation investigates the question, How can the procedural rhetoric of three whole-body educational games improve the understanding of self-regulated learning with digital technology? It explores three whole-body educational games (WBEGs) using a quantitative study, a case study, and analyses of their procedural rhetoric to better understand the roles these types of games can have in teaching digital literacy and self-regulated learning (SRL) skills. The three WBEGs, Waves, Color Mixer, and Light and Mirrors, are each intended to teach science concepts to players. These games are similarly structured in that they all invite players to immerse themselves in the game by standing on the screen (the games project images on the floor). The WBEGs differ from traditional console video games because they receive input from players via motion-sensing technology, requiring players to make large movements with their bodies to influence elements within the game. This study explains SRL as a complex combination of internal (mental) behavior, external (observable) behavior, and interpersonal (social) behavior, identifying within three WBEGs the presence of elements supporting the SRL behaviors of goal setting, strategy planning, collaboration, progress monitoring, feedback, and reflection. These findings inform the understanding of SRL by revealing that each game includes a different combination of SRL-supporting elements that encourage the use of SRL skills in different ways. SRL scaffolding features are those elements within a WBEG that guide players to use certain SRL strategies, helping and supporting their efforts much like construction scaffolding supports a building as it is being erected. This dissertation also utilizes analyses of procedural rhetoric to investigate the techniques reinforced by the underlying structure of these three WBEGs in an effort to further the understanding of digital literacy in education and sociocultural contexts. All three WBEGs appear to emphasize player agency and collaboration. Waves and Light and Mirrors encourage player strategy, while Color Mixer rewards speed and rote knowledge. These reinforced techniques perpetuate the underlying cultural values of accuracy, collaboration, problem-solving, autonomy, and scaffolding. This study discusses these values in the contexts of education and society

    The Future of Digital Spaces and Their Role in Democracy

    Get PDF
    This is the 13th"Future of the Internet" canvassing Pew Research Center and Elon University's Imagining the Internet Center have conducted together to gather expert views about important digital issues. In this report, the questions focused on the prospects for improvements in the tone and activities of the digital public sphere by 2035. This is a nonscientific canvassing based on a nonrandom sample; this broad array of opinions about where current trends may lead in the next decade represents only the points of view of the individuals who responded to the queries.Pew Research Center and Elon's Imagining the Internet Center built a database of experts to canvass from a wide range of fields, inviting professionals and policy people based in government bodies, nonprofits and foundations, technology businesses and think tanks, as well as interested academics and technology innovators. The predictions reported here came in response to a set of questions in an online canvassing conducted between June 29 and Aug. 2, 2021.In all, 862 technology innovators and developers, business and policy leaders, researchers and activists responded to at least one of the questions covered in this report. More on the methodology underlying this canvassing and the participants can be found in the section titled "About this canvassing of experts.

    Making Things Right: Nurses' Experiences with Workplace Bullying—A Grounded Theory

    Get PDF
    While bullying in the healthcare workplace has been recognized internationally, there is still a culture of silence in many institutions in the United States, perpetuating underreporting and insufficient and unproven interventions. The deliberate, repetitive, and aggressive behaviors of bullying can cause psychological and/or physical harm among professionals, disrupt nursing care, and threaten patient safety and quality outcomes. Much of the literature focuses on categories of bullying behaviors and nurse responses. This qualitative study reports on the experiences of nurses confronting workplace bullying. We collected data from the narratives of 99 nurses who completed an open-ended question embedded in an online survey in 2007. A constructivist grounded theory approach was used to analyze the data and shape a theory of how nurses make things right when confronted with bullying. In a four-step process, nurses place bullying in context, assess the situation, take action, and judge the outcomes of their actions. While many nurses do engage in a number of effective yet untested strategies, two additional concerns remain: inadequate support among nursing colleagues and silence and inaction by nurse administrators. Qualitative inquiry has the potential to guide researchers to a greater understanding of the complexities of bullying in the workplace

    IoT Anomaly Detection Methods and Applications: A Survey

    Full text link
    Ongoing research on anomaly detection for the Internet of Things (IoT) is a rapidly expanding field. This growth necessitates an examination of application trends and current gaps. The vast majority of those publications are in areas such as network and infrastructure security, sensor monitoring, smart home, and smart city applications and are extending into even more sectors. Recent advancements in the field have increased the necessity to study the many IoT anomaly detection applications. This paper begins with a summary of the detection methods and applications, accompanied by a discussion of the categorization of IoT anomaly detection algorithms. We then discuss the current publications to identify distinct application domains, examining papers chosen based on our search criteria. The survey considers 64 papers among recent publications published between January 2019 and July 2021. In recent publications, we observed a shortage of IoT anomaly detection methodologies, for example, when dealing with the integration of systems with various sensors, data and concept drifts, and data augmentation where there is a shortage of Ground Truth data. Finally, we discuss the present such challenges and offer new perspectives where further research is required.Comment: 22 page
    corecore