660 research outputs found

    The Youth Correction Authority Act

    Get PDF
    Since wireless communication has become a standard feature in the daily life, smartphones and tablets among other things are integrated with the Bluetooth technology. While in some parts of the day wireless communication can be used for searching the internet and share information on social networks without the need of having a secure connection, there are some other parts where the security might become of high importance. When the technology gets integrated in companies the security problem becomes more evident. This is because when the radio signals spread in the medium they can be accessed by anyone that is in reach in the network and the information that was sent may not be intended for everyone. To secure the network from unintended users becomes important when handling fragile information, which companies may deal with daily.  This paper gives an introduction on which security features and techniques that already exist in some personal area networks. From this it has been clear that a security feature could be implemented on the baseband layer of Bluetooth to increase the secrecy during the transmission since at the moment security is only implemented on higher layers using encryption algorithms.  This paper proposes a conceptual idea of improving the secrecy in the network by using a wiretap code that is implemented before the error-correction coding in the Bluetooth's baseband. By disabling the ARQ scheme in Bluetooth one can modulate the channel as a Packet Erasure Channel that will lose packet with a certain probability. By using a nested code structure, the message can then be securely sent by using a higher rate than what the eavesdropper can recover due to the amount of errors the received signal will have. The performance of the concept is evaluated with the secrecy throughput, secrecy outage and the leakage

    The Legal Approach to Crime and Correction

    Get PDF
    This report documents the research and experiments on evaluating the possibilities of using OpenCV for developing a markerless augmented reality applications using the structure from motion algorithm. It gives a background on what augmented reality is and how it can be used and also theory about camera calibration and the structure from motion algorithm is presented. Based on the theory the algorithm was implemented using OpenCV and evaluated regarding its performance and possibilities when creating markerless augmented reality applications

    The Youth Correction Authority Act

    Get PDF

    Exploring the Standard Model and Beyond using B and D meson decays

    Get PDF
    In this research, I have tested the standard model(SM) and various new physics (NP) models using B and D meson decays. In D meson decays, the SU(3) flavor symmetry of the SM for Cabibbo favored decays is tested against experimental measurements. The SU(3) analysis with η and η′ are considered in a general and consistent way for the first time. In B decays, a fit to the data for four B → πK decays is performed, within the SM and with NP. The fit confirms that the SM gives a poor fit to the B → πK data which is known as the B → πK ”puzzle”. A solution to the B → πK ”puzzle” is presented in terms of an axion like particle (ALP) with a mass near the neutral pion mass. Several search strategies to observe this particle in various experiments have also been explored. Finally, an explanation of the B → πK ”puzzle” via the presence of diquarks is considered. The possibility to generate neutrino masses and mixing via a combination of diquarks and leptoquarks is also discussed. The leptoquark can account for the lepton universality violating anomalies in semileptonic B decays

    Effectiveness of Oral Contracts, Within the Statute of Frauds

    Get PDF
    In Morris v. Baron and Co., (House of Lords, 1917), 87 L. J. R. (K. B.) 145, plaintiff and defendant had entered into a contract of sale and plaintiff, as vendor, had delivered part of the goods agreed upon. Delivery of the remainder would have been a condition precedent to any recovery by the plaintiff. This contract, however, was followed by a second one, not in writing, whereby plaintiff was absolved from delivering the rest of the goods, but by which he agreed that he would deliver them if the defendant should so request. Thereafter plaintiff brought this action for the price of the goods delivered. The defendant set up, by way of counterclaim, plaintiff\u27s failure to deliver the rest of the goods as requested under the second contract. The court held that the second contract, although not in writing, absolved the plaintiff from having to deliver all the goods under the first contract, and therefore allowed him to recover for the goods delivered, but that, because it was not in writing, the defendant could not maintain his counterclaim for breach of it

    The Self-assembly Of Papaya Mosaic Virus

    Get PDF
    • …
    corecore