19 research outputs found

    Diseño e implementación de un prototipo de identificación digital de datos técnicos vehiculares utilizando tecnología inalámbrica RFID

    Get PDF
    The purpose of this article is to shed light on the development of ID software using RFID technology (Radiofrequency identification) that allows automatic data capture by means of radiofrequency waves. It consists in installing a reader in any location in order to streamline traffic flow and increase vehicle safety. To develop the model, we considered concepts such as: operation, types of communication, propagation, norms, standards, and possible interference caused by transmission systems such as Ubiquiti rocket m5 that transmits Wi-Fi signals. It is necessary to establish structures to define the advances in the electronics applied. The automatic vehicle monitoring system incorporates fixed RFID readers “CSL” (Converge System Limited) installed on roads and turnpikes to be used by the transit authorities, and public and private entities. This technology allows such entities to identify the vehicles very quickly.Este articulo tiene como objetivo dar a conocer la elaboración de un software de identificación utilizando tecnología RFID (Identificación por radio frecuencia) que permite la captura automática de datos mediante ondas de radiofrecuencia. Consiste en instalar un lector en cualquier sitio o lugar para agilizar el flujo y generar seguridad vehicular. Para desarrollar este modelo teorizamos conceptos acerca de: funcionamiento, tipos de comunicación, propagación, normas, estándares, e interferencias que originan problemas en la transmisión sistemas como por ejemplo los Ubiquiti rocketm5 que transmiten señal Wifi, entonces al cruzarse estas señales pueden generan interferencias. Siendo necesario establecer estructuras que nos definieran como ha sido el avance en la electrónica aplicada.El sistema de seguimiento vehicular totalmente automatizado incorpora lectores RFID fijos “CSL” (Converge System Limited) instalados en vías y peajes para uso de autoridades de tránsito, empresas públicas y privadas. Logrando hacer una identificación en el menor tiempo posible

    Emotion Regulation Difficulties and Maladaptive Behaviors: Examination of Deliberate Self-Harm, Disordered Eating, and Substance Misuse in Two Samples

    No full text
    Data from two studies were utilized to examine whether the co-occurrence of maladaptive behaviors thought to serve an emotion regulating function would be associated with greater emotion regulation difficulties compared to one or none of these behaviors. Study 1 included an undergraduate sample (N = 119; 76 % female) and Study 2 included a sample of patients receiving treatment at a residential substance abuse treatment facility (N = 82; 48 % female). Subgroups were created based on the presence or absence of the following maladaptive behaviors: (a) deliberate self-harm (DSH) and disordered eating (Study 1); and (b) DSH, disordered eating, and substance misuse (Study 2). Subgroup differences in mean levels of emotion regulation difficulties (overall and six dimensions) were evaluated for each study. In Study 1, individuals who reported clinically-relevant levels of both DSH and disordered eating had more difficulties with emotion regulation (overall and three dimensions) compared to those who reported neither behavior. In Study 2, individuals who reported clinically-relevant levels of both DSH and substance misuse had more difficulties with emotion regulation (Study 2; overall and five dimensions) compared to those with only substance misuse. Overall, the results of these studies support the hypothesis that the co-occurrence of clinically-relevant maladaptive behaviors is associated with greater difficulties regulating emotions than the presence of only one maladaptive behavior (or no maladaptive behaviors). These findings suggest that clinical interventions targeting emotion regulation skills may be particularly useful for individuals who display a pattern of co-occurring maladaptive behaviors

    Impossible differential attack on Simpira v2

    No full text
    Simpira v2 is a family of cryptographic permutations proposed at ASIACRYPT 2016 which can be used to construct high throughput block ciphers using the Even-Mansour construction, permutation-based hashing and wide-block authenticated encryption. In this paper, we give a 9-round impossible differential of Simpira-4, which turns out to be the first 9-round impossible differential. In order to get some efficient key recovery attacks on its block cipher mode (EM construction with Simpira-4), we use some 6/7-round shrunken impossible differentials. Based on eight different 6-round impossible differentials, we propose a series of 7-round key recovery attacks on the block cipher mode, each 6-round impossible differential helps to recover 32-bit of the master key (512-bit) and totally half of the master key bits are recovered. The attacks need 2572^{57} chosen plaintexts and 2572^{57} 7-round encryptions. Furthermore, based on ten 7-round impossible differentials, we add one round on the top or at the bottom to mount ten 8-round key recovery attacks on the block cipher mode, which recover the full key space (512-bit) with the data complexity of 21702^{170} chosen plaintexts and time complexity of 21702^{170} 8-round encryptions. Those are the first attacks on round-reduced Simpira v2 and do not threaten the EM mode with the full 15-round Simpira-4
    corecore