21 research outputs found

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    Intelligent Circuits and Systems

    Get PDF
    ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society.  This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering

    Shakespeare, Race and Minstrelsy in Nineteenth Century America

    Get PDF
    This thesis explores the interface between Shakespeare and Blackface Minstrelsy in Nineteenth-Century America. Critics such as Eric Lott have noted the often mutually contradictory intentions and effects of blackface minstrelsy. For some it offered a racist lampooning of African Americans, while for others it broke the boundaries between black and white and could even be embraced as part of the anti-slavery cause. The myriad minstrel performances of Shakespeare’s plays seem to intensify this tension. Some felt that Shakespeare - a symbol of ‘Anglo-Saxon’ superiority – was debased when performed in a ‘Black’ voice. Others welcomed the ways in which minstrel performances undermined English hegemony at a time when America was declaring its cultural independence. Thus, a ‘highbrow’ attempt to adopt and adapt Shakespeare as part of a project to define the parameters of a white American cultural identity in the antebellum era was countered on the minstrel stage by the blackface burlesques which were immensely popular across the whole social spectrum. Drawing on commentaries by an array of writers, from the anti-slavery orator Frederick Douglass to the author and essayist Ralph Ellison, this thesis argues that a common cultural nationalist patriotism was shared by both the minstrel stage and the literary elite. Beginning with an analysis of the legitimate stage and minstrel adaptations of Shakespeare in nineteenth century America, the thesis proceeds to explore the presence and influence of Shakespeare and blackface minstrelsy in the works of canonical American authors. A series of distinct, by thematically related chapters, discuss the ways in which Harriet Beecher Stowe, Herman Melville and Mark Twain can be read in terms of this tension between highbrow and lowbrow articulations of an ‘Americanness’ in formation. The thesis foregrounds the ways in which these authors drew on Shakespeare and on minstrel conventions of masking and subversion in their novels. It is suggested that a study of the clash of the disparate and disguised voices within Shakespeare’s plays and the melodramatic excess of the blackface minstrel shows allows us to explore the contested political forces at work in nineteenth century United States in new and revealing ways

    War as risk management.

    Get PDF
    This thesis examines the reconceptualisation of war as risk management. It is suggested that recent wars exhibit repetitive patterns revolving around the central concem of managing systemic risks to security in an age of globalisation. It implies continuity where one might expect discontinuity in US and British campaigns over Kosovo, Afghanistan and Iraq from 1998-2003, given the different US Administrations and strategic contexts involved. The challenges it poses relate to 'classical' notions associated, rightly or wrongly, with war such as 'noble' heroic purposes, to decisive outcomes in the form of surrender ceremonies. Such notions have hampered a proper appreciation of the various forms war can take. Furthermore, the predominant International Relations (IR) approach relating to war and security - Realism- appears to contribute incomplete explanations to these wars. The alternative perspective developed here is based on 'risk management'. Underpinning this study is what sociologists call the Risk Society where risk management has emerged as an axial organising principle. Social science disciplines, notably sociology and criminology, have incorporated these theories into their research agendas, yielding richer perspectives as a result. Yet, IR has largely not done so in a concerted way, despite its inherently cross-disciplinary nature and increased prominence of risk in the strategic context. The framework informing this study is thus adapted from recent theorising on risk management strategies in the wider social sciences. The purpose is to systematically analyse using the theoretical framework developed herein, how concepts of proactive risk management such as active anticipation, the precautionary principle, 'reshaping the environment' and appreciating 'non-events' can be usefully applied to understanding contemporary war and IR

    Data and the city – accessibility and openness. a cybersalon paper on open data

    Get PDF
    This paper showcases examples of bottom–up open data and smart city applications and identifies lessons for future such efforts. Examples include Changify, a neighbourhood-based platform for residents, businesses, and companies; Open Sensors, which provides APIs to help businesses, startups, and individuals develop applications for the Internet of Things; and Cybersalon’s Hackney Treasures. a location-based mobile app that uses Wikipedia entries geolocated in Hackney borough to map notable local residents. Other experiments with sensors and open data by Cybersalon members include Ilze Black and Nanda Khaorapapong's The Breather, a "breathing" balloon that uses high-end, sophisticated sensors to make air quality visible; and James Moulding's AirPublic, which measures pollution levels. Based on Cybersalon's experience to date, getting data to the people is difficult, circuitous, and slow, requiring an intricate process of leadership, public relations, and perseverance. Although there are myriad tools and initiatives, there is no one solution for the actual transfer of that data

    Safety and Reliability - Safe Societies in a Changing World

    Get PDF
    The contributions cover a wide range of methodologies and application areas for safety and reliability that contribute to safe societies in a changing world. These methodologies and applications include: - foundations of risk and reliability assessment and management - mathematical methods in reliability and safety - risk assessment - risk management - system reliability - uncertainty analysis - digitalization and big data - prognostics and system health management - occupational safety - accident and incident modeling - maintenance modeling and applications - simulation for safety and reliability analysis - dynamic risk and barrier management - organizational factors and safety culture - human factors and human reliability - resilience engineering - structural reliability - natural hazards - security - economic analysis in risk managemen

    Information technology and military performance

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Political Science, 2011.Cataloged from PDF version of thesis.Includes bibliographical references (p. 519-544).Militaries have long been eager to adopt the latest technology (IT) in a quest to improve knowledge of and control over the battlefield. At the same time, uncertainty and confusion have remained prominent in actual experience of war. IT usage sometimes improves knowledge, but it sometimes contributes to tactical blunders and misplaced hubris. As militaries invest intensively in IT, they also tend to develop larger headquarters staffs, depend more heavily on planning and intelligence, and employ a larger percentage of personnel in knowledge work rather than physical combat. Both optimists and pessimists about the so-called "revolution in military affairs" have tended to overlook the ways in which IT is profoundly and ambiguously embedded in everyday organizational life. Technocrats embrace IT to "lift the fog of war," but IT often becomes a source of breakdowns, misperception, and politicization. To describe the conditions under which IT usage improves or degrades organizational performance, this dissertation develops the notion of information friction, an aggregate measure of the intensity of organizational struggle to coordinate IT with the operational environment. It articulates hypotheses about how the structure of the external battlefield, internal bureaucratic politics, and patterns of human-computer interaction can either exacerbate or relieve friction, which thus degrades or improves performance. Technological determinism alone cannot account for the increasing complexity and variable performances of information phenomena. Information friction theory is empirically grounded in a participant-observation study of U.S. special operations in Iraq from 2007 to 2008. To test the external validity of insights gained through fieldwork in Iraq, an historical study of the 1940 Battle of Britain examines IT usage in a totally different structural, organizational, and technological context.(cont.) These paired cases show that high information friction, and thus degraded performance, can arise with sophisticated IT, while lower friction and impressive performance can occur with far less sophisticated networks. The social context, not just the quality of technology, makes all the difference. Many shorter examples from recent military history are included to illustrate concepts. This project should be of broad interest to students of organizational knowledge, IT, and military effectiveness.by Jon Randall Lindsay.Ph.D
    corecore