2,087 research outputs found

    Transition from anticipatory to lag synchronization via complete synchronization in time-delay systems

    Get PDF
    The existence of anticipatory, complete and lag synchronization in a single system having two different time-delays, that is feedback delay Ï„1\tau_1 and coupling delay Ï„2\tau_2, is identified. The transition from anticipatory to complete synchronization and from complete to lag synchronization as a function of coupling delay Ï„2\tau_2 with suitable stability condition is discussed. The existence of anticipatory and lag synchronization is characterized both by the minimum of similarity function and the transition from on-off intermittency to periodic structure in laminar phase distribution.Comment: 14 Pages and 12 Figure

    Cyber Security Awareness Among College Students

    Get PDF
    This study reports the early results of a study aimed to investigate student awareness and attitudes toward cyber security and the resulting risks in the most advanced technology environment: the Silicon Valley in California, USA. The composition of students in Silicon Valley is very ethnically diverse. The objective was to see how much the students in such a tech-savvy environment are aware of cyber-attacks and how they protect themselves against them. The early statistical analysis suggested that college students, despite their belief that they are observed when using the Internet and that their data is not secure even on university systems, are not very aware of how to protect their data. Also, it appears that educational institutions do not have an active approach to improve awareness among college students to increase their knowledge on these issues and how to protect themselves from potential cyber-attacks, such as identity theft or ransomware

    Secure Data Sharing in Cloud Computing using Revocable Storage Identity- Based Encryption

    Get PDF
    Nowadays regularly use cloud services in our daily life.There are various services provided by cloud such as a service, Platform as a service, and Infrastructure asa service. The used to keep our data,documents, and files on cloud. The data that store may be Personal, Private, secret data. So must be very sure that whatever the cloud service we use that must be secure. Cloud computing Provides number of services to client over internet. Storage service isone ofthe important services that people used now days for storing data on network so that they can access their data from anywhere and anytime. With the benefit of storage service there is an issue of security. To overcome security problem the proposed system contain two levels of security and to reduce the unwanted storage space de-duplication[1,2] technique is involved. To increase the level of security one technique is a session password.Session passwords can be used only once and every time a new password is generated.To protect the confidentiality of sensitive data while supporting de-duplication[1,2]the convergent encryption technique has been proposed to encrypt the data before outsourcing,Symmetrickey algorithm uses same key for both encryption and decryption.In this paper,I will focus on session based authentication for both encryptions for files and duplication check for reduce space of storage on cloud

    Clone Node Detection in Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSNs) are often deployed in unfavourable situations where an assailant can physically capture some of the nodes, first can reprogram, and then, can replicate them in a large number of clones, easily taking control over the network. This replication node is also called as Clone node. The clone node or replicated node behave as a genuine node. It can damage the network. In node replication attack detecting the clone node important issue in Wireless Sensor Networks. A few distributed solutions have been recently proposed, but they are not satisfactory. First, they are intensity and memory demanding: A serious drawback for any protocol to be used in the WSN- resource constrained environment. In this project first investigate the selection criteria of clone detection schemes with regard to device types, detection methodologies, deployment strategies, and detection ranges. Further, they are vulnerable to the specific assailant models introduced in this paper. In this scenario, a particularly dangerous attack is the replica attack, in which the assailant takes the secret keying materials from a compromised node, generates a large number of assailant-controlled replicas that share the node’s keying materials and ID, and then spreads these replicas throughout the network. With a single captured node, the assailant can create as many replica nodes as he has the hardware to generate.. The replica nodes are controlled by the assailant, but have keying materials that allow them to seem like authorized participants in the network. Our implementation specifies, user will specify its ID, which means client id, secret key will be create, and then include the port number. The witness node will verify the internally bounded user Id and secret key. The witness node means original node. If the verification is success, the information collecting to the packets that packets are send to the destination

    Automatic Solar Tracking System and Fault Detection Using Wireless Technology

    Get PDF
    Renewable energy solutions are becoming increasingly popular. Photovoltaic (solar) systems are but one example. Maximizing power output from a solar system is desirable to increase efficiency. In order to maximize power output from the solar panels, one needs to keep the panels aligned with the sun. As such, a means of tracking the sun is required. This is a far more cost effective solution than purchasing additional solar panels. It has been estimated that the yield from solar panels can be increased by 30 to 60 percent by utilizing a tracking system instead of a stationary array [1]. This project develops an automatic tracking system which will keep the solar panels aligned with the sun in order to maximize efficiency. In this paper we proposed automatic solar tracking system and fault detection using wireless technology as a key to the new era

    Exploitation of Acoustic signature of Low flying Aircraft using Acoustic Vector Sensor

    Get PDF
    Acoustics is emerging as a significant complementary modality to be explored and exploited in the development of Intelligence and surveillance systems that traditionally rely on technology rooted in electro-magnetic field phenomena. Acoustics is emerging as a significant complementary modality to be explored and exploited in the development of Intelligence and surveillance systems that traditionally rely on technology rooted in electro-magnetic field phenomena. An application of the current interest is the detection and localization of the sound sources on battlefield using Acoustic sensors in ground and on board unmanned aerial vehicle. In this work a nonlinear least-square cepstrum and auto correlation methods are made to estimate the motion parameters of a low flying aircraft whose narrowband acoustic energy emissions were received by a ground-based Acoustic vector sensor. The data obtained from the sensor were processed and analyzed using digital signal processing approach. This passive technique is applied to real acoustic sensor data under the condition that the vehicle flies at a constant velocity and the trajectory is a straight line. The performances of both methods are evaluated and compared using actual acoustic data.Defence Science Journal, 2014, 64(2), pp. 95-98. DOI: http://dx.doi.org/10.14429/dsj.64.3924

    BEAT CLASSIFICATION USING HYBRID WAVELET TRANSFORM BASED FEATURES AND SUPERVISED LEARNING APPROACH

    Get PDF
    This paper describes an automatic heartbeat recognition based on QRS detection, feature extraction and classification. In this paper five different type of ECG beats of MIT BIH arrhythmia database are automatically classified. The proposed method involves QRS complex detection based on the differences and approximation derivation, inversion and threshold method. The computation of combined Discrete Wavelet Transform (DWT) and Dual Tree Complex Wavelet Transform (DTCWT) of hybrid features coefficients are obtained from the QRS segmented beat from ECG signal which are then used as a feature vector. Then the feature vectors are given to Extreme Learning Machine (ELM) and k- Nearest Neighbor (kNN) classifier for automatic classification of heartbeat. The performance of the proposed system is measured by sensitivity, specificity and accuracy measures

    Phase synchronization in time-delay systems

    Get PDF
    Though the notion of phase synchronization has been well studied in chaotic dynamical systems without delay, it has not been realized yet in chaotic time-delay systems exhibiting non-phase coherent hyperchaotic attractors. In this article we report the first identification of phase synchronization in coupled time-delay systems exhibiting hyperchaotic attractor. We show that there is a transition from non-synchronized behavior to phase and then to generalized synchronization as a function of coupling strength. These transitions are characterized by recurrence quantification analysis, by phase differences based on a new transformation of the attractors and also by the changes in the Lyapunov exponents. We have found these transitions in coupled piece-wise linear and in Mackey-Glass time-delay systems.Comment: 4 pages, 3 Figures (To appear in Physical Review E Rapid Communication
    • …
    corecore