194,910 research outputs found
IR-based satellite and radar rainfall estimates of convective storms over northern Italy
Convective precipitation events in northern Italy during 1996 and 1997 are analysed using two infrared-based geosynchronous satellite rainfall estimation methods to verify the level of applicability of the techniques for operational applications in the area, their quantitative results, and relative performances. The Negri–Adler–Wetzel (NAW) and the convective stratiform technique (CST) are applied to METEOSAT's thermal infrared (IR) data. C-band radar reflectivity fields detail the vertical and horizontal structure of the cloud systems, and radar rainfall data are retrieved. Satellite rain areas are checked against simultaneous radar rainfall retrievals through a contingency analysis procedure. A semi-quantitative analysis is presented. Positive brightness temperature differences between water vapour and thermal IR channels are also examined and related to the storms' development stage and rainrate. Results show that NAW and CST perform reasonably in delimiting rain areas during active convection and care should be used in the initial and final development stage when statistical parameters lose most of their significance. NAW tends to overestimate rainfall while CST approaches more closely radar measurements. Most common errors arise from considering only portions of the storm, contamination from cold non-precipitating cloud, and merging of two or more cloud masses of independent origin. Operational applications, though not completely quantitative, are also possible, including positive values of the difference between water vapour and IR brightness temperature
Medical Cyber-Physical Systems Development: A Forensics-Driven Approach
The synthesis of technology and the medical industry has partly contributed
to the increasing interest in Medical Cyber-Physical Systems (MCPS). While
these systems provide benefits to patients and professionals, they also
introduce new attack vectors for malicious actors (e.g. financially-and/or
criminally-motivated actors). A successful breach involving a MCPS can impact
patient data and system availability. The complexity and operating requirements
of a MCPS complicates digital investigations. Coupling this information with
the potentially vast amounts of information that a MCPS produces and/or has
access to is generating discussions on, not only, how to compromise these
systems but, more importantly, how to investigate these systems. The paper
proposes the integration of forensics principles and concepts into the design
and development of a MCPS to strengthen an organization's investigative
posture. The framework sets the foundation for future research in the
refinement of specific solutions for MCPS investigations.Comment: This is the pre-print version of a paper presented at the 2nd
International Workshop on Security, Privacy, and Trustworthiness in Medical
Cyber-Physical Systems (MedSPT 2017
Adaptive data synchronization algorithm for IoT-oriented low-power wide-area networks
The Internet of Things (IoT) is by now very close to be realized, leading the world towards a new technological era where people’s lives and habits will be definitively revolutionized. Furthermore, the incoming 5G technology promises significant enhancements concerning the Quality of Service (QoS) in mobile communications. Having billions of devices simultaneously connected has opened new challenges about network management and data exchange rules that need to be tailored to the characteristics of the considered scenario. A large part of the IoT market is pointing to Low-Power Wide-Area Networks (LPWANs) representing the infrastructure for several applications having energy saving as a mandatory goal besides other aspects of QoS. In this context, we propose a low-power IoT-oriented file synchronization protocol that, by dynamically optimizing the amount of data to be transferred, limits the device level of interaction within the network, therefore extending the battery life. This protocol can be adopted with different Layer 2 technologies and provides energy savings at the IoT device level that can be exploited by different applications
- …