1,278 research outputs found

    Wireless ATM layouts for chain networks

    Get PDF
    In this paper we consider the problem of constructing ATM layouts for wireless networks in which mobile users can move along a chain of base stations. We first show that deciding the existence of a layout with maximum hop count h, load l and channel distance d is NP-complete for every fixed value of d greater or equal to 1. We then provide optimal layout constructions for the case d less than or equal to 2. Finally, optimal layout constructions are obtained also for any d within the class of the so-called canonic layouts, that so far have always been shown to be the optimal ones

    ATM layouts with bounded hop count and congestion

    Full text link

    Designing Usable and Secure Authentication Mechanisms for Public Spaces

    Get PDF
    Usable and secure authentication is a research field that approaches different challenges related to authentication, including security, from a human-computer interaction perspective. That is, work in this field tries to overcome security, memorability and performance problems that are related to the interaction with an authentication mechanism. More and more services that require authentication, like ticket vending machines or automated teller machines (ATMs), take place in a public setting, in which security threats are more inherent than in other settings. In this work, we approach the problem of usable and secure authentication for public spaces. The key result of the work reported here is a set of well-founded criteria for the systematic evaluation of authentication mechanisms. These criteria are justified by two different types of investigation, which are on the one hand prototypical examples of authentication mechanisms with improved usability and security, and on the other hand empirical studies of security-related behavior in public spaces. So this work can be structured in three steps: Firstly, we present five authentication mechanisms that were designed to overcome the main weaknesses of related work which we identified using a newly created categorization of authentication mechanisms for public spaces. The systems were evaluated in detail and showed encouraging results for future use. This and the negative sides and problems that we encountered with these systems helped us to gain diverse insights on the design and evaluation process of such systems in general. It showed that the development process of authentication mechanisms for public spaces needs to be improved to create better results. Along with this, it provided insights on why related work is difficult to compare to each other. Keeping this in mind, first criteria were identified that can fill these holes and improve design and evaluation of authentication mechanisms, with a focus on the public setting. Furthermore, a series of work was performed to gain insights on factors influencing the quality of authentication mechanisms and to define a catalog of criteria that can be used to support creating such systems. It includes a long-term study of different PIN-entry systems as well as two field studies and field interviews on real world ATM-use. With this, we could refine the previous criteria and define additional criteria, many of them related to human factors. For instance, we showed that social issues, like trust, can highly affect the security of an authentication mechanism. We used these results to define a catalog of seven criteria. Besides their definition, we provide information on how applying them influences the design, implementation and evaluation of a the development process, and more specifically, how adherence improves authentication in general. A comparison of two authentication mechanisms for public spaces shows that a system that fulfills the criteria outperforms a system with less compliance. We could also show that compliance not only improves the authentication mechanisms themselves, it also allows for detailed comparisons between different systems

    Reduction of Uncertainty Propagation in the Airport Operations Network

    Full text link
    [EN] Airport operations are a complex system involving multiple elements (ground access, landside, airside and airspace), stakeholders (ANS providers, airlines, airport managers, policy makers and ground handling companies) and interrelated processes. To ensure appropriate and safe operation it is necessary to understand these complex relationships and how the effects of potential incidents, failures and delays (due to unexpected events or capacity constraints) may propagate throughout the different stages of the system. An incident may easily ripple through the network and affect the operation of the airport as a whole, making the entire system vulnerable. A holistic view of the processes that also takes all of the parties (and the connections between them) into account would significantly reduce the risks associated with airport operations, while at the same time improving efficiency. Therefore, this paper proposes a framework to integrate all relevant stakeholders and reduce uncertainty in delay propagation, thereby lowering the cause-effect chain probability of the airport system (which is crucial for the operation and development of air transport). Firstly, we developed a model (map) to identify the functional relationships and interdependencies between the different stakeholders and processes that make up the airport operations network. This will act as a conceptual framework. Secondly, we reviewed and characterised the main causes of delay. Finally, we extended the system map to create a probabilistic graphical model, using a Bayesian Network approach and influence diagrams, in order to predict the propagation of unexpected delays across the airport operations network. This will enable us to learn how potential incidents may spread throughout the network creating unreliable, uncertain system states. Policy makers, regulators and airport managers may use this conceptual framework (and the associated indicators) to understand how delays propagate across the airport network, thereby enabling them to reduce system vulnerability, and increase its robustness and efficiency.Rodríguez Sanz, Á.; Gómez Comendador, F.; Arnaldo Valdés, R. (2016). Reduction of Uncertainty Propagation in the Airport Operations Network. En XII Congreso de ingeniería del transporte. 7, 8 y 9 de Junio, Valencia (España). Editorial Universitat Politècnica de València. 36-78. https://doi.org/10.4995/CIT2016.2016.3484OCS367

    Enterprise Network Design and Simulation - Cisco Virtual Lab

    Get PDF
    Tématem této diplomové práce (dále jen DP) je návrh rozsáhlých podnikových sítí podle doporučení stanovených společností Cisco. Dále je realizována simulace navržené topologie prostřednictvím programů s otevřeným zdrojovým kódem a dohled nad sítí prostřednictvím programu Nagios. Úvodní část obsahuje stručné seznámení se základním rozdělením sítě do jednotlivých funkčních bloků. Druhá část se zabývá popisem jednotlivých funkčních bloků a jejich rolí v rámci celé síťové topologie. Bloky jsou dále rozděleny na jednotlivá zařízení a jsou popsány služby, které tato zařízení musí poskytovat. Třetí část DP se snaží zmapovat základní požadavky na služby, které jsou kladeny na dnešní síťové infrastruktury. Hlavní důraz je kladen na dostupnost všech nabízených služeb sítě. Jsou vyjmenovány jednotlivé protokoly druhé až třetí vrstvy OSI modelu, které zabezpečují stálou dostupnost sítě v případě selhání aktivních prvků. Čtvrtá část DP se věnuje popisu návrhu síťové topologie WAN. Pátá část obsahuje popis bezpečnostních rizik, která ohrožují dostupnost sítě, tak i popis útoků, které mají za cíl krádež identity uživatele. V šesté části DP jsou popsány programové nástroje pro zprávu sítí (Nagios, Cisco Security Device Manager) a programy, které simulují Cisco přepínače, směrovače (Dynamips & Dynagen, GNS3) a Cisco PIX firewall (PEMU). Sedmá kapitola se zabývá konkrétním návrhem rozsáhlé sítě s použitím principů, které byly zmíněny v předcházejících kapitolách. Navržená infrastruktura je dále realizována pomocí simulačních programů a tato virtuální síť dovoluje demonstrovat nastavení a chování všech popsaných protokolů a zařízení. V závěrečném shrnutí je nejdůležitější poznatek, že návrh a konfigurace rozsáhlé sítě a její realizace ve virtuálním prostředí je funkční a použitelná pro pokusné účely i pro studijní účely.This Master's Thesis (further only MT) deals with subject of enterprise network design according to recommendations of Cisco company. As part of the thesis is developed simulation of enterprise network, according to created concept. The virtual lab is realized by open-source programs and monitored by Nagios software. The first part contains brief introduction to network designs and description of hierarchical network design. The second part describes building blocks of the network design and their role in hierarchical network. Each block is further divided into specific network devices and then there are described services that have to be provided by them. The third part of MT deals with basic service demands which are expected from today’s network infrastructures. The main focus is on availability of network services. There are specified information about second and third layer protocols of OSI model which are securing availability of all services provided by the network infrastructure in case of failure. The following fourth part contains information about WAN design. The fifth part describes security risks which can jeopardize network availability. It also contains description of attacks on network users. The sixth part of MT contains brief description of software tools for network management and monitoring (Nagios, Cisco Security Device Manager) and programs for simulating Cisco routes and switches (Dynamips & Dynagen, GNS3) and Cisco PIX firewall simulation program (PEMU). The seventh chapter deals with developed network design concept. The concept is deployed as virtual lab running under simulation programs. The virtual infrastructure allows demonstration of settings and behavior of all protocols and equipments described before. In conclusion is the most important recognition that the network concept and its simulation as virtual lab is functional and it can be used for tests or educational purposes.

    Full Automation of Air Traffic Management in High Complexity Airspace

    Get PDF
    The thesis is that automation of en-route Air Traffic Management in high complexity airspace can be achieved with a combination of automated tactic planning in a look-ahead time horizon of up to two hours complemented with automated tactic conflict resolution functions. The literature review reveals that no significant results have yet been obtained and that full automation could be approached with a complementary integration of automated tactic resolutions AND planning. The focus shifts to ‘planning for capacity’ and ‘planning for resolution’ and also – but not only – for ‘resolution’. The work encompasses a theoretical part on planning, and several small scale studies of empirical, mathematical or simulated nature. The theoretical part of the thesis on planning under uncertainties attempts to conceive a theoretical model which abstracts specificities of planning in Air Traffic Management into a generic planning model. The resulting abstract model treats entities like the planner, the strategy, the plan and the actions, always considering the impact of uncertainties. The work innovates in specifying many links from the theory to the application in planning of air traffic management, and especially the new fields of tactical capacity management. The second main part of the thesis comprises smaller self-containing works on different aspects of the concept grouped into a section on complexity, another on tactic planning actions, and the last on planners. The produced studies are about empirical measures of conflicts and conflict densities to get a better understanding of the complexity of air traffic; studies on traffic organisation using tactical manoeuvres like speed control, lateral offset and tactical direct using fast time simulation; and studies on airspace design like sector optimisation, dynamic sectorisation and its optimisation using optimisation techniques. In conclusion it is believed that this work will contribute to further automation attempts especially by its innovative focus which is on planning, base on a theory of planning, and its findings already influence newer developments

    Research reports: 1990 NASA/ASEE Summer Faculty Fellowship Program

    Get PDF
    A collection of technical reports on research conducted by the participants in this program is presented. The topics covered include: human-computer interface software, multimode fiber optic communication links, electrochemical impedance spectroscopy, rocket-triggered lightning, robotics, a flammability study of thin polymeric film materials, a vortex shedding flowmeter, modeling of flow systems, monomethyl hydrazine vapor detection, a rocket noise filter system using digital filters, computer programs, lower body negative pressure, closed ecological systems, and others. Several reports with respect to space shuttle orbiters are presented

    Technological Advancements in E-Commerce and Customer Relationship Management

    Get PDF
    In the recent past, for any business to be successful it is essential to acquire, serve and retain customers. The number of users of commercial purposes has led to increased demand for E-Commerce in the global market. There has been a remarkable progress in E-Commerce due to globalization and technological advancements which led to sustainable quantum of business at affordable price. Technologies used in E-Commerce includes: Augmented Reality: The Future of E-Commerce Stores, Artificial Intelligence: Improving E-Commerce services and Optimizing Customer Experience, Voice Search, Chatbot, Blockchain Technology: A Faster, Safer and More Transparent used as E-Commerce Payment System, Security and Supply chain management. This paper focuses on the evolution of E-Commerce, development of CRM initiatives, leading E-Commerce companies, technological advancement in E-Commerce: E-Commerce platforms and service providers; software and tools used in E-Commerce and recent trends in E-Commerce and CRM in streamlining the CRM process thereby minimizing the cost of CRM

    An Empirical Methodology for Engineering Human Systems Integration

    Get PDF
    The systems engineering technical processes are not sufficiently supported by methods and tools that quantitatively integrate human considerations into early system design. Because of this, engineers must often rely on qualitative judgments or delay critical decisions until late in the system lifecycle. Studies reveal that this is likely to result in cost, schedule, and performance consequences. This dissertation presents a methodology to improve the application of systems engineering technical processes for design. This methodology is mathematically rigorous, is grounded in relevant theory, and applies extant human subjects data to critical systems development challenges. The methodology is expressed in four methods that support early systems engineering activities: a requirements elicitation method, a function allocation method, an input device design method, and a display layout design method. These form a coherent approach to early system development. Each method is separately discussed and demonstrated using a prototypical system development program. In total, this original and significant work has a broad range of systems engineer applicability to improve the engineering of human systems integration
    corecore