23 research outputs found

    Study of magnetic properties and characterization of Ni/Cu multi-layer structures using in-situ high-temperature X-Ray diffraction (HT-XRD)

    Get PDF
    In this paper, the results of magnetic and structural measurements of Ni/Cu multi-layers with different thicknesses of Cu and Ni grown on Si (100) substrate are presented. The Ni/Cu multi-layers nanostructure is analyzed using X-ray diffraction (XRD) diagram at room temperature and X-ray diffraction in a vacuum at high temperature (HT-XRD). The periodic peaks in the XRD spectrum, the multilayer structure and thus, the superlattice structure of the films are confirmed. But the in-situ XRD spectrums at high temperature reveal that the increase of temperature and annealing time is associated with the decrease or disappearance of intensity of the multilayer peaks and periodic peaks. It means the increase of these two parameters is accompanied with the weakening of interface sharpness between the layers, and the samples' multilayer structures are inclined toward the alloy structure

    Study of magnetic properties and characterization of Ni/Cu multi-layer structures using in-situ high-temperature X-Ray diffraction (HT-XRD)

    Get PDF
    In this paper, the results of magnetic and structural measurements of Ni/Cu multi-layers with different thicknesses of Cu and Ni grown on Si (100) substrate are presented. The Ni/Cu multi-layers nanostructure is analyzed using X-ray diffraction (XRD) diagram at room temperature and X-ray diffraction in a vacuum at high temperature (HT-XRD). The periodic peaks in the XRD spectrum, the multilayer structure and thus, the superlattice structure of the films are confirmed. But the in-situ XRD spectrums at high temperature reveal that the increase of temperature and annealing time is associated with the decrease or disappearance of intensity of the multilayer peaks and periodic peaks. It means the increase of these two parameters is accompanied with the weakening of interface sharpness between the layers, and the samples' multilayer structures are inclined toward the alloy structure

    Analysis of AeroMACS Data Link for Unmanned Aircraft Vehicles

    Full text link
    Aeronautical Mobile Airport Communications System (AeroMACS) is based on the IEEE 802.16e mobile wireless standard commonly known as WiMAX. It is expected to be the main part of the next-generation aviation communication system to support fixed and mobile services for manned and unmanned applications. AeroMACS will be an essential technology helping pave the way toward full integration of Unmanned Aircraft Vehicle (UAV) into the national airspace. A number of practical tests and analyses have been done so far for AeroMACS. The main contribution of this paper is to consider the theoretical concepts behind its features and discuss their suitability for UAV applications. Mathematical analyses of the AeroMACS physical layer framework are provided to show the theoretical trade-offs. We mainly focus on the analysis of the AeroMACS OFDMA structure, which affects the speed limits, coverage cell, channel estimation requirements, and inter-carrier interference

    Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things

    Full text link
    It is critical to secure the Industrial Internet of Things (IIoT) devices because of potentially devastating consequences in case of an attack. Machine learning and big data analytics are the two powerful leverages for analyzing and securing the Internet of Things (IoT) technology. By extension, these techniques can help improve the security of the IIoT systems as well. In this paper, we first present common IIoT protocols and their associated vulnerabilities. Then, we run a cyber-vulnerability assessment and discuss the utilization of machine learning in countering these susceptibilities. Following that, a literature review of the available intrusion detection solutions using machine learning models is presented. Finally, we discuss our case study, which includes details of a real-world testbed that we have built to conduct cyber-attacks and to design an intrusion detection system (IDS). We deploy backdoor, command injection, and Structured Query Language (SQL) injection attacks against the system and demonstrate how a machine learning based anomaly detection system can perform well in detecting these attacks. We have evaluated the performance through representative metrics to have a fair point of view on the effectiveness of the methods

    Efficient virtual network function placement strategies for Cloud Radio Access Networks

    No full text
    The new generation of 5G mobile services place stringent requirements for cellular network operators in terms of latency and costs. The latest trend in radio access networks (RANs) is to pool the baseband units (BBUs) of multiple radio base stations and to install them in a centralized infrastructure, such as a cloud, for statistical multiplexing gains. The technology is known as Cloud Radio Access Network (CRAN). Since cloud computing is gaining significant traction and virtualized data centers are becoming popular as a cost-effective infrastructure in the telecommunication industry, CRAN is being heralded as a candidate technology to meet the expectations of radio access networks for 5G. In CRANs, low energy base stations (BSs) are deployed over a small geographical location and are connected to a cloud via finite capacity backhaul links. Baseband processing unit (BBU) functions are implemented on the virtual machines (VMs) in the cloud over commodity hardware. Such functions, built in software, are termed as virtual functions (VFs). The optimized placement of VFs is necessary to reduce the total delays and minimize the overall costs to operate CRANs. Our study considers the problem of optimal VF placement over distributed virtual resources spread across multiple clouds, creating a centralized BBU cloud. We propose a combinatorial optimization model and the use of two heuristic approaches, which are, branch-and-bound (BnB) and simulated annealing (SA) for the proposed optimal placement. In addition, we propose enhancements to the standard BnB heuristic and compare the results with standard BnB and SA approaches. The proposed enhancements improve the quality of the solution in terms of latency and cost as well as reduce the execution complexity significantly. We also determine the optimal number of clouds, which need to be deployed so that the total links delays, as well as the service migration delays, are minimized, while the total cloud deployment cost is within the acceptable limits.This publication was made possible by the NPRP award [ NPRP 8-634-1-131 ] from the Qatar National Research Fund (a member of The Qatar Foundation) and NSF Grant CNS-1718929 . The statements made herein are solely the responsibility of the author[ s ]

    Green biosynthesis of silver nanoparticles by Spirulina platensis

    No full text
    Abstract Crystallized silver nanoparticles (SNPs) have been biosynthesized by Spirulina platensis in an aqueous system. An aqueous solution of silver ions was treated with a live biomass of Spirulina platensis for the formation of SNPs. These nanoparticles showed an absorption peak at 430 nm in the UV-visible spectrum, corresponding to the plasmon resonance of SNPs. The transmission electron micrographs of nanoparticles in an aqueous solution showed the production of SNPs (average size of most particles: ∼12 nm) by Spirulina platensis. The X-Ray Diffraction (XRD) spectrum of the nanoparticles confirmed the formation of metallic silver, and the average size of the crystallite was estimated from the peak profile by the Scherrer method. The synthesized SNPs had an average size of 11.6 nm

    Fault and performance management in multi-cloud virtual network services using AI: A tutorial and a case study

    No full text
    Carriers find Network Function Virtualization (NFV) and multi-cloud computing a potent combination for deploying their network services. The resulting virtual network services (VNS) offer great flexibility and cost advantages to them. However, vesting such services with a level of performance and availability akin to traditional networks has proved to be a difficult problem for academics and practitioners alike. There are a number of reasons for this complexity. The challenging nature of management of fault and performance issues of NFV and multi-cloud based VNSs is an important reason. Rule-based techniques that are used in the traditional physical networks do not work well in the virtual environments. Fortunately, machine and deep learning techniques of Artificial Intelligence (AI) are proving to be effective in this scenario. The main objective of this tutorial is to understand how AI-based techniques can help in fault detection and localization to take such services closer to the performance and availability of the traditional networks. A case study, based on our work in this area, has been included for a better understanding of the concepts. - 2019This publication was made possible by NPRP grant #8-634-1-131 from the Qatar National Research Fund (a member of Qatar Foundation), NSF grants CNS-1718929and CNS-1547380.The statements made herein are solely the responsibility of the authors.This paper draws from earlier works of the authors including ̳HYPER-VINES: A Hybrid Learning Fault and Performance Issues Eradicator for Virtual Network Services over Multi-Cloud Systems’ presented at the IEEE ICNC 2019 Conference in February 2019, andfrom the other references listed in the reference section.Scopu

    Cybersecurity for industrial control systems: A survey

    No full text
    Industrial Control System (ICS) is a general term that includes supervisory control & data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic controllers (PLC). ICSs are often found in the industrial sectors and critical infrastructures, such as nuclear and thermal plants, water treatment facilities, power generation, heavy industries, and distribution systems. Though ICSs were kept isolated from the Internet for so long, significant achievable business benefits are driving a convergence between ICSs and the Internet as well as information technology (IT) environments, such as cloud computing. As a result, ICSs have been exposed to the attack vectors used in the majority of cyber-attacks. However, ICS devices are inherently much less secure against such advanced attack scenarios. A compromise to ICS can lead to enormous physical damage and danger to human lives. In this work, we have a close look at the shift of the ICS from stand-alone systems to cloud-based environments. Then we discuss the major works, from industry and academia towards the development of the secure ICSs, especially applicability of the machine learning techniques for the ICS cyber-security. The work may help to address the challenges of securing industrial processes, particularly while migrating them to the cloud environments.American Association for the Advancement of Science; IEEE Foundation; Qatar Foundation; Qatar National Research Fund; Anacostia Community Museum; Academy of Science of St. LouisScopu

    Flow-based intrusion detection algorithm for supervisory control and data acquisition systems: A real-time approach

    No full text
    Intrusion detection in supervisory control and data acquisition (SCADA) systems is integral because of the critical roles of these systems in industries. However, available approaches in the literature lack representative flow-based datasets and reliable real-time adaption and evaluation. A publicly available labelled dataset to support flow-based intrusion detection research specific to SCADA systems is presented. Cyberattacks were carried out against our SCADA system test bed to generate this flow-based dataset. Moreover, a flow-based intrusion detection system (IDS) is developed for SCADA systems using a deep learning algorithm. We used the dataset to develop this IDS model for real-time operations of SCADA systems to detect attacks momentarily after they happen. The results show empirical proof of the model’s adequacy when deployed online to detect cyberattacks in real timeNational Science Foundation; Washington University in St. Louis;?Qatar National Research Fund; Funda o de Amparo Pesquisa do Estado de So Paulo; Qatar UniversityScopu

    An Integrated Octree-RANSAC Technique for Automated LiDAR Building Data Segmentation for Decorative Buildings

    Get PDF
    The 12th International Symposium on Visual Computing (ISVC 2016), Las Vegas, United States of America, 12-14 December 2016This paper introduces a new method for the automated segmentation of laser scanning data for decorative urban buildings. The method combines octree indexing and RANSAC - two previously established but heretofore not integrated techniques. The approach was successfully applied to terrestrial point clouds of the facades of five highly decorative urban structures for which existing approaches could not provide an automated pipeline. The segmentation technique was relatively efficient and wholly scalable requiring only 1 second per 1,000 points, regardless of the façade’s level of ornamentation or non-recti-linearity. While the technique struggled with shallow protrusions, its ability to process a wide range of building types and opening shapes with data densities as low as 400 pts/m2 demonstrate its inherent potential as part of a large and more sophisticated processing approach.European Research Counci
    corecore