2,612 research outputs found

    R&D Management challenges for the desing and development of an E2E-DRM content business integration platform

    Get PDF
    Current studies on Digital Rights Management (DRM) have focused on controlling access to and copies of contents, centered exclusively on the end of the value chain (end users). This focus has been oriented towards security and encryption as a means of solving the issue of illegal copying by purchasers. In this paper, we propose End-toEnd Digital Rights Management (E2E DRM) that involves the protection of the content throughout the entire value chain. This concept is given form in the new technologies for representing intellectual property (IP) which, in a secure and unequivocal manner, identify the content at each point in the value chain: from the author to the end user, the content is identifiable in any of the transactions and statuses through which it passes. The key concept which E2E DRM must provide is not only the governability of access and copying, but also that of all the processes associated with the content business. We establish an E2E DRM model and architecture, and propose the R&D management of its design and implementation that makes it possible to protect content from content creator to purchaser. Finally, the paper also analyzes their impact from a global perspective. The research was financed by the Autonomous Region of Madrid through the program “Aid to Promote Technological Innovation in the ICT sector

    Low cost passive radar through software defined radio

    Get PDF
    Passive radars utilise existing terrestrial radio signals, such as those produced by radio or television stations, to track objects within their range. This project aims to determine the suitability of low cost USB TV tuners as hardware receivers for a Software Defined Radio (SDR) based passive radar receiver. Subsequently determining its effectiveness in producing inverse synthetic aperture radar images using data collected from Digital Television signals. Since the initial identification of passive radar, Militaries the world over have been using it as a part of electronic warfare. The evolution of SDR has enabled greater access to the technologies required to implement passive radar, with the greatest limitation being the cost of the required hardware. The availability of low cost hardware was therefore investigated to determine its suitability and subsequently the availability of passive radar to a wider audience. Research was conducted into the available SDR receivers, and comparison of specifications was made against the low cost receiver used in the project. A functional hardware platform based around the Realtek RTL2832U chipset has been developed to determine its suitability as a low cost receiver verifying its ability to coherently receive radio signals for target identification. A complex ambiguity function was implemented to interpret sampled data windows, with the output of these windows to be compared to the requirements for an inverse synthetic aperture radar input, thus determining the suitability of the device. Interpretation of the received data has identified that although the hardware is capable, a real time implementation of data processing is not yet possible, impeding the ability to determine the suitability of the receiver as an inverse synthetic aperture receiver. The results of testing show that the hardware is capable of receiving and producing radar images, however due to the bandwidth of DVB-T signals , and the bandwidth limitations inherent in RTL-SDR dongles, they have proven not to be suitable for DVB-T based inverse synthetic aperture radar receivers

    Cooperating broadcast and cellular conditional access system for digital television

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.The lack of interoperability between Pay‐TV service providers and a horizontally integrated business transaction model have compromised the competition in the Pay‐TV market. In addition, the lack of interactivity with customers has resulted in high churn rate and improper security measures have contributed into considerable business loss. These issues are the main cause of high operational costs and subscription fees in the Pay‐TV systems. This paper presents a novel end‐to‐end system architecture for Pay‐TV systems cooperating mobile and broadcasting technologies. It provides a cost‐effective, scalable, dynamic and secure access control mechanism supporting converged services and new business opportunities in Pay‐TV systems. It enhances interactivity, security and potentially reduces customer attrition and operational cost. In this platform, service providers can effectively interact with their customers, personalise their services and adopt appropriate security measures. It breaks up the rigid relationship between a viewer and set‐top box as imposed by traditional conditional access systems, thus, a viewer can fully enjoy his entitlements via an arbitrary set‐top box. Having thoroughly considered state‐of‐the‐art technologies currently being used across the world, the thesis highlights novel use cases and presents the full design and implementation aspects of the system. The design section is enriched by providing possible security structures supported thereby. A business collaboration structure is proposed, followed by a reference model for implementing the system. Finally, the security architectures are analysed to propose the best architecture on the basis of security, complexity and set‐top box production cost criteria

    A Contribution to Solving the Problem of Automated Functional Verification ofConsumer Electronic Devices with Touchscreens

    Get PDF
    Predmet istraživanja ove doktorske disertacije je pronalaženje rešenja problema automatske funkcionalne provere uređaja potrošačke elektronike koji su zasnovani na ekranu osetljivom na dodir. Osnovni izazov je pronaći efikasan i pouzdan način električne stimulacije ekrana, bez mehaničke pobude. Drugi izazov je definisati algoritam za proveru sadržaja na ekranu posmatrajući ga sa stanovišta percepcije korisnika, pomoću kamere. Rezultat istraživanja je integrisani sistem sa stimulacionom pločom koja kontrolisano pobuđuje ekran električnim stimulusom, bez mehaničkih pokreta. Provera uređaja se vrši po principu crne kutije. Cilj sistema je proveriti da li se uređaj i njegova programska podrška ponašaju očekivano.Topic of research of this PhD thesis is finding the solution for the mentioned problem of automated functional verification of consumer electronics devices with touchscreens. The main challenge is to find a reliable and efficient way of electric stimulation of touchscreens, without mechanical movements. The second challenge is to design an algorithm for analysis of content on the touchscreen, observing it from the user’s perception, with the help of a camera. Result of the research is the integrated system with the stimulation board for controllable electrical stimulation of touchscreens, without mechanical movements. The integrated system verifies whether the device and its software behave as expected

    Recent Advances in Signal Processing

    Get PDF
    The signal processing task is a very critical issue in the majority of new technological inventions and challenges in a variety of applications in both science and engineering fields. Classical signal processing techniques have largely worked with mathematical models that are linear, local, stationary, and Gaussian. They have always favored closed-form tractability over real-world accuracy. These constraints were imposed by the lack of powerful computing tools. During the last few decades, signal processing theories, developments, and applications have matured rapidly and now include tools from many areas of mathematics, computer science, physics, and engineering. This book is targeted primarily toward both students and researchers who want to be exposed to a wide variety of signal processing techniques and algorithms. It includes 27 chapters that can be categorized into five different areas depending on the application at hand. These five categories are ordered to address image processing, speech processing, communication systems, time-series analysis, and educational packages respectively. The book has the advantage of providing a collection of applications that are completely independent and self-contained; thus, the interested reader can choose any chapter and skip to another without losing continuity

    High-frequency oscillator design for integrated transceivers

    Get PDF

    High-frequency oscillator design for integrated transceivers

    Get PDF

    Uncovering the Hidden Cognitive Processes and Underlying Dynamics of Deception

    Get PDF
    This dissertation examines the processing demands associated with motor responding and verbal statements during deceptive (or deceptive-like) behavior. In the first set of studies presented in Chapter 2, participants motor movements in a false response paradigm revealed signatures of competition with the truth. In a second set of studies presented in Chapter 3, deceptive participants used language that reflected cognitive and social demands inherent to various types of deception. In evaluating both motor and verbal cues, this dissertation provides a comprehensive, multi-modal approach to better understanding the cognitive processes underlying deception. in conducting the motor responding studies, participants\u27 arm movements were analyzed as they navigated a motor tracking device (computer-mouse, Nintendo Wiimote). To visually co-present response options, where the true option acts as a competitor to a false target. In an initial study, competition during deceptive responding was shown to be much greater than during truthful responding. In two follow-up studies, the introduction of various task-based cognitive demands was shown to systematically modulate response performance. Specifically, these studies suggest that an intention to false respond early in question presentation will amplify competition effects, and that false responding to information in autobiographical memory is much more difficult than responding to information in general semantic memory. In the studies analyzing verbal statements, the focus is turned to large-scale linguistic analyses using automated natural language processing tools. In the first study, changes in language use were identifed between deceptive and truthful narratives using six psychologically relevant categories. A major finding was that the language of deception is adapted to faciliate ease of cognitive processing. In a second study, the indicative phrasing and semantic content of deceptive texts was extracted using a contrastive corpus analysis, whereby indicative features are defined by frequent use in one corpus while being infrequent in a comparative corpus. Two contexts of deception were evaluated. In the first context of computer-mediated conversations, decievers used a range of unique thematic elements, as in avoiding personal involvement in their narrative accounts. In the second context of attitudes towards abortion, unique thematic elements once again emerged; for example, participants tended to position their arguments in terms of formal law

    Engineering evaluations and studies. Volume 3: Exhibit C

    Get PDF
    High rate multiplexes asymmetry and jitter, data-dependent amplitude variations, and transition density are discussed

    The Deep Space Network

    Get PDF
    Deep Space Network progress in flight project support, tracking and data acquisition, research and technology, network engineering, hardware and software implementation, and operations is cited. Topics covered include: tracking and ground based navigation; spacecraft/ground communication; station control and operations technology; ground communications; and deep space stations
    corecore