57 research outputs found

    A Privacy-Aware Access Control Model for Distributed Network Monitoring

    No full text
    International audienceIn this paper, we introduce a new access control model that aims at addressing the privacy implications surrounding network monitoring. In fact, despite its importance, network monitoring is natively leakage-prone and, moreover, this is exacerbated due to the complexity of the highly dynamic monitoring procedures and infrastructures, that may include multiple traffic observation points, distributed mitigation mechanisms and even inter-operator cooperation. Conceived on the basis of data protection legislation, the proposed approach is grounded on a rich in expressiveness information model, that captures all the underlying monitoring concepts along with their associations. The model enables the specification of contextual authorisation policies and expressive separation and binding of duty constraints. Finally, two key innovations of our work consist in the ability to define access control rules at any level of abstraction and in enabling a verification procedure, which results in inherently privacy-aware workflows, thus fostering the realisation of the Privacy by Design vision

    Improved control strategy of DFIG-based wind turbines using direct torque and direct power control techniques

    Get PDF
    This paper presents different control strategies for a variable-speed wind energy conversion system (WECS), based on a doubly fed induction generator. Direct Torque Control (DTC) with Space-Vector Modulation is used on the rotor side converter. This control method is known to reduce the fluctuations of the torque and flux at low speeds in contrast to the classical DTC, where the frequency of switching is uncontrollable. The reference for torque is obtained from the maximum power point tracking technique of the wind turbine. For the grid-side converter, a fuzzy direct power control is proposed for the control of the instantaneous active and reactive power. Simulation results of the WECS are presented to compare the performance of the proposed and classical control approaches.Peer reviewedFinal Accepted Versio

    New records of soil mites (Acari) from citrus orchards of Tunisia

    Get PDF
    An inventory of soil mites from citrus orchards was carried out in four localities situated in the regions of Mornag and Bizerte, northern Tunisia. The soil sampling was performed monthly under the canopy throughout the two years of the study (2016 and 2017). A total of 31 species of mites belonging to 20 families were identified. The acari fauna was predominantly composed of Oribatida followed by Mesostigmata mites. The most frequent and abundant Oribatida families were Oribatulidae and Phenopelopidae, while Parasitidae, Laelapidae and Pachylaelapidae were the predominant families of Mesostigmata

    Low incidence of SARS-CoV-2, risk factors of mortality and the course of illness in the French national cohort of dialysis patients

    Get PDF

    Insensitive Load Balancing

    Get PDF
    International audienceA large variety of communication systems, including telephone and data networks, can be represented by so-called Whittle networks. The stationary distribution of these networks is insensitive, depending on the service requirements at each node through their mean only. These models are of considerable practical interest as derived engineering rules are robust to the evolution of traffic characteristics. In this paper we relax the usual assumption of static routing and address the issue of dynamic load balancing. Specifically, we identify the class of load balancing policies which preserve insensitivity and characterize optimal strategies in some specific cases. Analytical results are illustrated numerically on a number of toy network examples
    • …
    corecore