194,910 research outputs found

    IR-based satellite and radar rainfall estimates of convective storms over northern Italy

    Get PDF
    Convective precipitation events in northern Italy during 1996 and 1997 are analysed using two infrared-based geosynchronous satellite rainfall estimation methods to verify the level of applicability of the techniques for operational applications in the area, their quantitative results, and relative performances. The Negri–Adler–Wetzel (NAW) and the convective stratiform technique (CST) are applied to METEOSAT's thermal infrared (IR) data. C-band radar reflectivity fields detail the vertical and horizontal structure of the cloud systems, and radar rainfall data are retrieved. Satellite rain areas are checked against simultaneous radar rainfall retrievals through a contingency analysis procedure. A semi-quantitative analysis is presented. Positive brightness temperature differences between water vapour and thermal IR channels are also examined and related to the storms' development stage and rainrate. Results show that NAW and CST perform reasonably in delimiting rain areas during active convection and care should be used in the initial and final development stage when statistical parameters lose most of their significance. NAW tends to overestimate rainfall while CST approaches more closely radar measurements. Most common errors arise from considering only portions of the storm, contamination from cold non-precipitating cloud, and merging of two or more cloud masses of independent origin. Operational applications, though not completely quantitative, are also possible, including positive values of the difference between water vapour and IR brightness temperature

    Medical Cyber-Physical Systems Development: A Forensics-Driven Approach

    Full text link
    The synthesis of technology and the medical industry has partly contributed to the increasing interest in Medical Cyber-Physical Systems (MCPS). While these systems provide benefits to patients and professionals, they also introduce new attack vectors for malicious actors (e.g. financially-and/or criminally-motivated actors). A successful breach involving a MCPS can impact patient data and system availability. The complexity and operating requirements of a MCPS complicates digital investigations. Coupling this information with the potentially vast amounts of information that a MCPS produces and/or has access to is generating discussions on, not only, how to compromise these systems but, more importantly, how to investigate these systems. The paper proposes the integration of forensics principles and concepts into the design and development of a MCPS to strengthen an organization's investigative posture. The framework sets the foundation for future research in the refinement of specific solutions for MCPS investigations.Comment: This is the pre-print version of a paper presented at the 2nd International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT 2017

    Adaptive data synchronization algorithm for IoT-oriented low-power wide-area networks

    Get PDF
    The Internet of Things (IoT) is by now very close to be realized, leading the world towards a new technological era where people’s lives and habits will be definitively revolutionized. Furthermore, the incoming 5G technology promises significant enhancements concerning the Quality of Service (QoS) in mobile communications. Having billions of devices simultaneously connected has opened new challenges about network management and data exchange rules that need to be tailored to the characteristics of the considered scenario. A large part of the IoT market is pointing to Low-Power Wide-Area Networks (LPWANs) representing the infrastructure for several applications having energy saving as a mandatory goal besides other aspects of QoS. In this context, we propose a low-power IoT-oriented file synchronization protocol that, by dynamically optimizing the amount of data to be transferred, limits the device level of interaction within the network, therefore extending the battery life. This protocol can be adopted with different Layer 2 technologies and provides energy savings at the IoT device level that can be exploited by different applications
    • …
    corecore