70,687 research outputs found
Internet of things security implementation using blockchain for wireless technology
Blockchain is a new security system which group many data into a block or so called classifying the data into a block. The block can have many types and each of them content data and security code. By using a decentralize mechanism, one security code protect all the data. That could happen at the server. In this research, a network of wireless sensor technology is proposed. The transmission of sensor data is via the Internet of things (Internet of Thing) technology. As many data transmitted, they have to classified and group them into a block. All the blocks are then send to the central processing unit, like a microcontroller. The block of data is then processed, identified and encrypted before send over the internet network. At the receiver, a GUI or Apps is developed to open and view the data. The Apps or GUI have an encrypted data or security code. User must key in the password before they can view the data. The password used by the end user at the Apps or GUI must be equivalent to the one encrypted at the sensor nodes. This is to satisfy the decentralized concept used in the Blockchain. To demonstrate the Blockchain technology applied to the wireless sensor network, a MATLAB Simulink function is used. The expected results should show a number of block of data in cryptography manner and chain together. The two set of data. Both have the data encrypted using hash. The black dots indicate the data has been encrypted whereas the white dot indicate indicates the data is not encrypted. The half white and half black indicates the data is in progress of encrypted. All this data should arrange in cryptography order and chain together in a vertical line. A protocol called block and chain group the data into the block and then chain then. The data appears in the blocks and send over the network. As seen in the simulation results, the yellow color represents the user data. This data has a default amplitude as 1 or 5. The data is chained and blocked to produce the Blockchain waveform
Keywords: Blockchain, Internet of things, Wireless Sensor Network and MATLAB Simulin
Three dimensional Loop Quantum Gravity: towards a self-gravitating Quantum Field Theory
In a companion paper, we have emphasized the role of the Drinfeld double
DSU(2) in the context of three dimensional Riemannian Loop Quantum Gravity
coupled to massive spinless point particles. We make use of this result to
propose a model for a self-gravitating quantum field theory (massive spinless
non-causal scalar field) in three dimensional Riemannian space. We start by
constructing the Fock space of the free self-gravitating field: the vacuum is
the unique DSU(2) invariant state, one-particle states correspond to DSU(2)
unitary irreducible simple representations and any multi-particles states is
obtained as the symmetrized tensor product between simple representations. The
associated quantum field is defined by the usual requirement of covariance
under DSU(2). Then, we introduce a DSU(2)-invariant self-interacting potential
(the obtained model is a Group Field Theory) and compute explicitely the lowest
order terms (in the self-interaction coupling constant ) of the
propagator and of the three-points function. Finally, we compute the lowest
order quantum gravity corrections (in the Newton constant G) to the propagator
and to the three-points function.Comment: 36 pages, published in Class. Quant. Gra
A Note on New Sources of Gaugino Masses
In IIB orientifold models, the singlet twisted moduli appear in the
tree-level gauge kinetic function. They might be responsible for generating
gaugino masses if they acquire non-vanishing F-terms. We discuss some aspects
of this new possibility, such as the size of gaugino masses and their
non-universalities. A possible brane setting is presented to illustrate the
usefulness of these new sources.Comment: 7 pages, late
S-storage operators
In 1990, J.L. Krivine introduced the notion of storage operator to simulate,
for Church integers, the "call by value" in a context of a "call by name"
strategy. In this present paper, we define, for every -term S which
realizes the successor function on Church integers, the notion of S-storage
operator. We prove that every storage operator is a $S-storage operator. But
the converse is not always true
Casimir force in Schwarzschild metric: Progress report
In this paper I report progress on both theoretical and experimental aspects. I describe two approaches to calculating putative effects of gravitational curvature on the Casimir force. The work I describe continues the quest to answer the question: do virtual field excitations follow geodesics
- …