226 research outputs found

    Cryptographic-Paging Mechanism with Secure Coprocessor to Enhance Digital Signature Integrity for Cyber Hygiene Standard

    Get PDF
    Digital Signature is a mathematical algorithm to validate the authenticity and integrity of an electronic message. Modern browsers enable a wide range  of sensitive operations over SSL/TLS connections. Cryptographic protocols (SSL/TLS) are used to imbue web communications with intgrity, security, and  resilience against unauthorized tampering. It is interesting to note that PKI (Public Key Infrastructure) uses the TLS protocol to establish secure  connections between clients and servers over the internet. Thereby ensuring that the information relayed is encrypted and can not be read by an  external third party. Great scholars over the last decades have proved that a great number of internet users either tend to ignore or do not understand  browser security indicators. Hence there are flaws and vulnerabilities in the certificates and websites. This study proposes a technique hereby referred as  cryptographic paging mechanism with secure coprocessor to enhance the integrity of digital Signature. As a result of the encryption and integrity check,  data security on the outgoing page is maintained.&nbsp

    Dies-Non: Refusal of Work in the 21st Century

    Get PDF
    My comments aim to cast light on a specific political proposal that can arise from a discussion of the topic of the ‘refusal of work’ and its implications for a social radical change. Autonomist, anarchist and feminist activism, have been and are the main sources of a long-term conceptual and empirical work on the refusal of work. Refusal of work is a very complex concept that has traversed history and is reduced for uncritical dominant common sense to unemployment, laziness, idleness, indolence but it is in reality one of the basic foundational qualification to think any radical change. Among many important intuitions, the added value of Silvia Federici’s work is to have offered a different perspective on the refusal of work discussion and how it can be expressed to develop different forms of communing. Her work provides the backbone for this brief excursion on the issue of the refusal of work. Emerging and consolidated social movements, for example in Southern Europe, have, consciously or not, taken position, often contradictorily, regarding what refusal of work means. In the context of current neoliberal capitalism, an increasing structural unemployment and precarious jobs are one of the trademarks of austerity policies to ‘revive’ economies. Drawing on Federici’s insights on the women exclusion as a useful way of thinking about the spatial dimension of these issues in feminist theory, this article looks at examples of prefigurative politics that define their strategies of refusal of work building significant spatial patterns. © 2019, © 2019 Informa UK Limited, trading as Taylor & Francis Group

    Concept of Cryptographic Operations Based on Code Division Multiple Access

    Get PDF
    It is a given that numerous users connect to a single satellite transponder on a daily basis in order to communicate while discussing any satellite-based technology. As a result, they must all share the resources that are available without compromising the privacy of one another. Thus, the multiple access strategy is employed to achieve this. This paper focuses on code division multiple access, which does not require time slots or frequency slots to be shared across numerous users. The primary source of communication problems is multipath fading; and if the signal undergoes any multipath fading, then the total signal may be distorted. This work presents improved correlation features of the current Walsh code through one simple yet powerful algorithm. Here, a simulation-based method is used to evaluate performance. Utilizing power delay profiles in several mobile radio propagation channels, measurement-based channel models for indoor, outdoor, suburban, and urban environments are derived. The number of taps and tap gains are then estimated using statistics on the path loss characteristics. Since the source, output is known it is compared with a delayed version of the decision device output to obtain an empirical basis for the error rate. The suggested code’s performance is then compared to a few existing orthogonal and semi- orthogonal codes using a variety of performance criteria, and the conclusion is that this proposal is superior

    Analysis of Multi-Threading and Cache Memory Latency Masking on Processor Performance Using Thread Synchronization Technique

    Get PDF
    Multithreading is a process in which a single processor executes multiple threads concurrently. This enables the processor to divide tasks into separate threads and run them simultaneously, thereby increasing the utilization of available system resources and enhancing performance. When multiple threads share an object and one or more of them modify it, unpredictable outcomes may occur. Threads that exhibit poor locality of memory reference, such as database applications, often experience delays while waiting for a response from the memory hierarchy. This observation suggests how to better manage pipeline contention. To assess the impact of memory latency on processor performance, a dual-core MT machine with four thread contexts per core is utilized. These specific benchmarks are chosen to allow the workload to include programs with both favorable and unfavorable cache locality. To eliminate the issue of wasting the wake-up signals, this work proposes an approach that involves storing all the wake-up calls. It asserts the wake-up calls to the consumer and the producer can store the wake-up call in a variable.   An assigned value in working system (or kernel) storage that each process can check is a semaphore. Semaphore is a variable that reads, and update operations automatically in bit mode. It cannot be actualized in client mode since a race condition may persistently develop when two or more processors endeavor to induce to the variable at the same time. This study includes code to measure the time taken to execute both functions and plot the graph. It should be noted that sending multiple requests to a website simultaneously could trigger a flag, ultimately blocking access to the data. This necessitates some computation on the collected statistics. The execution time is reduced to one third when using threads compared to executing the functions sequentially. This exemplifies the power of multithreading

    Efeitos da falha lógica e fuga (dissipação de energia de área) em sistemas criptográficos usando a técnica de clock gating para aprimorar o protocolo na web

    Get PDF
    The last century has seen an evolution in technology that has improved communication systems and, in general, made life easier for people. Our communication systems have become faster and more dependable as a result of the explosion of gadgets and services. But, these upgrades come at a price. The power consumption is one of the most worrying costs. In recent years, the solution involved installing larger, more powerful batteries—so long as doing so did not limit mobility. Today's economic and environmental problems compel us to consider alternative solutions, like methods for lowering the power consumption of digital devices. This study focuses on using digital circuits, which promise to deliver good energy efficiency and desirable performance at very low voltage savings. Certain digital switches are allegedly redundant and not required for the circuit to function properly, yet they continue to use energy. So, one of the primary issues for low power design is reducing such redundant switches. Subthreshold conduction in digital circuits is typically seen as a “parasitic” leakage in a condition where there should ideally be no conduction. Sub-threshold activities thereby reduce the problem of lowering power consumption, but do so at the expense of system throughput deterioration, fluctuations in system stability and functionality, temperature variations, and most critically, design space utilization. In order to minimize some of these redundant switches and to make circuits more energy-efficient while maintaining functionality, this study suggests two novel techniques. It uses an optimization method based on threshold voltage change to reduce glitch power. A glitch-free circuit netlist is created using an algorithm, while still maintaining the requisite delay performance. Using this approach results in a 6.14% overall reduction in energy consumption.El siglo pasado fue testigo de una evolución de la tecnología que mejoró los sistemas de comunicación y, en general, facilitó la vida de las personas. Nuestros sistemas de comunicación se han vuelto más rápidos y confiables como resultado de la explosión de dispositivos y servicios. Pero, estas actualizaciones tienen un precio. El consumo de energía es uno de los costes más preocupantes. En los últimos años, la solución ha pasado por instalar baterías más grandes y potentes, siempre que esto no limite la movilidad. Los problemas económicos y ambientales actuales nos obligan a considerar soluciones alternativas, como métodos para reducir el consumo de energía de los dispositivos digitales. Este estudio se centra en el uso de circuitos digitales, que prometen ofrecer una buena eficiencia energética y un rendimiento deseable con un ahorro de tensión muy bajo. Se supone que ciertos interruptores digitales son redundantes y no necesarios para que el circuito funcione correctamente, pero continúan consumiendo energía. Por lo tanto, uno de los principales problemas para el diseño de bajo consumo es reducir estos conmutadores redundantes. La conducción por debajo del umbral en los circuitos digitales normalmente se considera una fuga “parásita” en una condición en la que, idealmente, no debería haber conducción. Por lo tanto, las actividades por debajo del umbral reducen el problema de disminuir el consumo de energía, pero lo hacen a expensas del deterioro del rendimiento del sistema, las fluctuaciones en la estabilidad y funcionalidad del sistema, las variaciones de temperatura y, lo que es más importante, la utilización del espacio de diseño. Para minimizar algunos de estos interruptores redundantes y hacer que los circuitos sean más eficientes desde el punto de vista energético manteniendo la funcionalidad, este estudio sugiere dos nuevas técnicas. Utiliza un método de optimización basado en cambiar el voltaje de umbral para reducir la energía de falla. Se crea una lista de conexiones de circuito impecable utilizando un algoritmo mientras se mantiene el rendimiento de retardo requerido. El uso de este enfoque da como resultado una reducción general del 6,14 % en el consumo de energía.O último século assistiu a uma evolução da tecnologia que melhorou os sistemas de comunicação e, em geral, facilitou a vida das pessoas. Nossos sistemas de comunicação tornaram-se mais rápidos e confiáveis como resultado da explosão de aparelhos e serviços. Mas, essas atualizações têm um preço. O consumo de energia é um dos custos mais preocupantes. Nos últimos anos, a solução envolveu a instalação de baterias maiores e mais potentes, desde que isso não limitasse a mobilidade. Os problemas econômicos e ambientais de hoje nos obrigam a considerar soluções alternativas, como métodos para reduzir o consumo de energia de dispositivos digitais. Este estudo se concentra no uso de circuitos digitais, que prometem oferecer boa eficiência energética e desempenho desejável com economia de tensão muito baixa. Certos interruptores digitais são supostamente redundantes e não são necessários para o funcionamento adequado do circuito, mas continuam a consumir energia. Portanto, um dos principais problemas para o projeto de baixo consumo de energia é reduzir esses switches redundantes. A condução abaixo do limiar em circuitos digitais é normalmente vista como uma fuga “parasita” em uma condição em que idealmente não deveria haver condução. As atividades abaixo do limite reduzem, assim, o problema de diminuir o consumo de energia, mas o fazem às custas da deterioração da taxa de transferência do sistema, flutuações na estabilidade e funcionalidade do sistema, variações de temperatura e, mais criticamente, utilização do espaço de projeto. A fim de minimizar alguns desses switches redundantes e tornar os circuitos mais eficientes em termos de energia, mantendo a funcionalidade, este estudo sugere duas novas técnicas. Ele usa um método de otimização baseado na mudança de tensão limite para reduzir a energia de falha. Uma netlist de circuito sem falhas é criada usando um algoritmo, mantendo o desempenho de atraso necessário. O uso dessa abordagem resulta em uma redução geral de 6,14% no consumo de energia

    Processing and Characterization of Polypropylene Nanocomposite Films Reinforced with Hexagonal Boron Nitride Nanosheets

    Get PDF
    In this study, we synthesized hexagonal boron nitride nanosheets (h-BNN) via the molten hydroxide exfoliation method which results in small flakes and nanoscrolls. The resultant h-BNNs can be dispersed in various solvents such as water, ethanol, and acetone, and form a stable dispersion. The morphological and structural analysis of h-BNNs were performed with Fourier Transform infrared spectroscopy (FTIR), X-ray diffractometry (XRD), and scanning electron microscopy (SEM). The masterbatch (MB) method was used to incorporate the h-BNNs into the polypropylene (PP) matrix via melt mixing. Dilution and film production processes were performed using a twin screw extruder. Nanocomposite films having an h-BNN weight ratio of 1%, 2%, 3%, and 5% were prepared. Thermogravimetric analyzer (TGA) and differential scanning calorimetry (DSC) were used to investigate the thermal stability. Crystallization (Tc) temperatures were increased with the increased amount of h-BNNs and h-BNNs nucleating agent behavior on the PP crystallization was observed. Oxidation induction time (OIT) of the pure PP was increased from 8.84 min to 17.82 min. The results show a considerable effect of the h-BNN content on the thermo-oxidative stability of the nanocomposites studied. The rheological and mechanical properties of the PP-hBNN nanocomposite films were also determined depending on the particle loading ratio. Optimum particle content providing the best thermal, mechanical, and rheological properties were found to be 3% wt

    The role of space-time activity patterns in the exposure assessment of residents

    Get PDF
    International audienceIndustrial development can generate hazardous situations – in particular, when there is a need to deal with dangerous substances, such as those in chemical or petrochemical plants. Too often, these industries are located in the heart of urbanized areas with high-density populations, as urbanization intrudes on the hazardous sites (originally established outside of cities). Protecting civil populations from these risks – either through precautionary measures or special crisis management plans, if a catastrophe occurs – is a key issue. To better protect citizens, identifying the risks to which they are exposed and also how they perceive the risks in their area can help authorities and stakeholders better understand the risks (Glatron & Beck, 2008). Adequate knowledge of these risks can also dissuade populations from settling in certain zones and thus lower their vulnerability. Finally, authorities need to assess the exposure of populations to hazards – through modelling – to set up appropriate and efficient risk management plans based on land planning. The present chapter – founded on responses to a questionnaire-based investigation (see the Annex) carried out in the Milazzo–Valle del Mela area of Sicily, in 2008 – explores two main aspects of exposure assessment: space-time-pattern methodological challenges and results of individual space-time activity data extracted from the investigation in the Milazzo–Valle del Mela area
    corecore