1,297 research outputs found
Regarding the Montreal Protocol communication after the Kigali Amendment
The Kigali Amendment introduced a new family of chemical compounds, which do not contribute to stratospheric ozone depletion but present a high global warming potential, under the watch of the Montreal Protocol in 2016. Earlier this year, a press note from the World Meteorological Organization entitled “Ozone layer recovery is on track, helping avoid global warming by 0.5°C” caught our attention because of the wrong conclusions that can be potentially drawn by laypersons due to an apparent linkage of ozone depletion and global warming problems. Public communication of the Montreal Protocol since the Kigali Amendment should be more careful than ever to avoid lessening the social perception of the threat of climate change, particularly considering that society already has a distorted representation of these problems, assuming causal relations between ozone depletion and climate change, that could lead to unfounded optimism towards the climate crisisThis research was supported by Resclim@tiempo project (PID2022-136933OB-C21), funded by MCIN/AEI/10.13039/501100011033 and by “ESF Investing in your future”S
Port Protocols for Deadlock-Freedom of Component Systems
In component-based development, approaches for property verification exist
that avoid building the global system behavior of the component model.
Typically, these approaches rely on the analysis of the local behavior of fixed
sized subsystems of components. In our approach, we want to avoid not only the
analysis of the global behavior but also of the local behaviors of the
components. Instead, we consider very small parts of the local behaviors called
port protocols that suffice to verify properties.Comment: In Proceedings ICE 2010, arXiv:1010.530
A Statistical Approach to Adaptive Playout Scheduling in Voice Over Internet Protocol Communication
Factors like network delay, latency and bandwidth significantly affect the quality of communication using Voice over Internet Protocol. The use of jitter buffer at the receiving end compensates the effect of varying network delay up to some extent. But the extra buffer delay given for each packet plays a major role in playing late packets and thereby improving voice quality. As the buffer delay increases packet loss rate decreases, which in general is a very good sign. However, an increase of buffer delay beyond a certain limit affects the interactive quality of voice communication. In this paper, we propose a statistical framework for adaptive playout scheduling of voice packets based on network statistics, packet loss rate and availability of packets in the buffer. Experimental results show that the proposed model allocates optimal buffer delay with the lowest packet loss rate when compared with other algorithms
A Talk on Quantum Cryptography, or How Alice Outwits Eve
Alice and Bob wish to communicate without the archvillainess Eve
eavesdropping on their conversation. Alice, decides to take two college
courses, one in cryptography, the other in quantum mechanics. During the
courses, she discovers she can use what she has just learned to devise a
cryptographic communication system that automatically detects whether or not
Eve is up to her villainous eavesdropping. Some of the topics discussed are
Heisenberg's Uncertainty Principle, the Vernam cipher, the BB84 and B92
cryptographic protocols. The talk ends with a discussion of some of Eve's
possible eavesdropping strategies, opaque eavesdropping, translucent
eavesdropping, and translucent eavesdropping with entanglement.Comment: 31 pages, 8 figures. Revised version of a paper published in "Coding
Theory, and Cryptography: From Geheimscheimschreiber and Enigma to Quantum
Theory," (edited by David Joyner), Springer-Verlag, 1999 (pp. 144-174). To be
published with the permission of Springer-Verlag in an AMS PSAPM Short Course
volume entitled "Quantum Computation.
Enhanced International Space Station Ku-Band Telemetry Service
(1) The ISS is diligently working to increase utilization of the resources this unique laboratory provides; (2) Recent upgrades enabled the use of Internet Protocol communication using the CCSDS IP Encapsulation protocol; and (3) The Huntsville Operations Support Center has extended the onboard LAN to payload teams enabling the use of standard IP protocols for payload operations
LIN 1.3 driver implementation in a DEMO9S12XEP100 Board
In this document it is described in detail the implementation of a LIN 1.3 protocol communication between two commercial boards configured as Master and Slave nodes respectively. It is explained how a driver was developed to establish communication between boards and which consideration were made in order to create a configurable driver. First, an analysis of different communications options in LIN protocols is presented, then it is briefly described how the implemented code using resources available in LIN protocol was designed.Consejo Nacional de Ciencia y Tecnologí
Pointing System Simulation Toolbox with Application to a Balloon Mission Simulator
The development of attitude estimation and pointing-control algorithms is necessary in order to achieve high-fidelity modeling for a Balloon Mission Simulator (BMS). A pointing system simulation toolbox was developed to enable this. The toolbox consists of a star-tracker (ST) and Inertial Measurement Unit (IMU) signal generator, a UDP (User Datagram Protocol) communication le (bridge), and an indirect-multiplicative extended Kalman filter (imEKF). This document describes the Python toolbox developed and the results of its implementation in the imEKF
- …