635 research outputs found

    Charakterisierungen einiger Schunckklassen endlicher auflösbarer Gruppen I

    Get PDF

    "Unrechtsstaat! Diktatur!! Lebenslanger Knast!!!" : Was die in der DDR aufgewachsenen MittdreiĂźiger zu solchen SprĂĽchen meinen

    Get PDF

    A tip-based source of femtosecond electron pulses at 30keV

    Full text link
    We present a nano-scale photoelectron source, optimized towards ultrashort pulse durations and well-suited for time-resolved diffraction experiments. A tungsten tip, mounted in a suppressor-extractor electrode configuration, allows the generation of 30 keV electron pulses with an estimated pulse duration of 37 fs at the gun exit. We infer the pulse duration from particle tracking simulations, which are in excellent agreement with experimental measurements of the electron-optical properties of the source. We furthermore demonstrate femtosecond laser-triggered operation. Besides the short electron pulse duration, a tip-based source is expected to feature a large transverse coherence as well as a nanometric emittance.Comment: 4 pages, 3 figure

    Determining Distributions of Security Means for WSNs based on the Model of a Neighbourhood Watch

    Full text link
    Neighbourhood watch is a concept that allows a community to distribute a complex security task in between all members. Members of the community carry out individual security tasks to contribute to the overall security of it. It reduces the workload of a particular individual while securing all members and allowing them to carry out a multitude of security tasks. Wireless sensor networks (WSNs) are composed of resource-constraint independent battery driven computers as nodes communicating wirelessly. Security in WSNs is essential. Without sufficient security, an attacker is able to eavesdrop the communication, tamper monitoring results or deny critical nodes providing their service in a way to cut off larger network parts. The resource-constraint nature of sensor nodes prevents them from running full-fledged security protocols. Instead, it is necessary to assess the most significant security threats and implement specialised protocols. A neighbourhood-watch inspired distributed security scheme for WSNs has been introduced by Langend\"orfer. Its goal is to increase the variety of attacks a WSN can fend off. A framework of such complexity has to be designed in multiple steps. Here, we introduce an approach to determine distributions of security means on large-scale static homogeneous WSNs. Therefore, we model WSNs as undirected graphs in which two nodes connected iff they are in transmission range. The framework aims to partition the graph into nn distinct security means resulting in the targeted distribution. The underlying problems turn out to be NP hard and we attempt to solve them using linear programs (LPs). To evaluate the computability of the LPs, we generate large numbers of random {\lambda}-precision unit disk graphs (UDGs) as representation of WSNs. For this purpose, we introduce a novel {\lambda}-precision UDG generator to model WSNs with a minimal distance in between nodes
    • …
    corecore