70,687 research outputs found

    Internet of things security implementation using blockchain for wireless technology

    Get PDF
    Blockchain is a new security system which group many data into a block or so called classifying the data into a block. The block can have many types and each of them content data and security code. By using a decentralize mechanism, one security code protect all the data. That could happen at the server. In this research, a network of wireless sensor technology is proposed. The transmission of sensor data is via the Internet of things (Internet of Thing) technology. As many data transmitted, they have to classified and group them into a block. All the blocks are then send to the central processing unit, like a microcontroller. The block of data is then processed, identified and encrypted before send over the internet network. At the receiver, a GUI or Apps is developed to open and view the data. The Apps or GUI have an encrypted data or security code. User must key in the password before they can view the data. The password used by the end user at the Apps or GUI must be equivalent to the one encrypted at the sensor nodes. This is to satisfy the decentralized concept used in the Blockchain. To demonstrate the Blockchain technology applied to the wireless sensor network, a MATLAB Simulink function is used. The expected results should show a number of block of data in cryptography manner and chain together. The two set of data. Both have the data encrypted using hash. The black dots indicate the data has been encrypted whereas the white dot indicate indicates the data is not encrypted. The half white and half black indicates the data is in progress of encrypted. All this data should arrange in cryptography order and chain together in a vertical line. A protocol called block and chain group the data into the block and then chain then. The data appears in the blocks and send over the network. As seen in the simulation results, the yellow color represents the user data. This data has a default amplitude as 1 or 5. The data is chained and blocked to produce the Blockchain waveform Keywords: Blockchain, Internet of things, Wireless Sensor Network and MATLAB Simulin

    Three dimensional Loop Quantum Gravity: towards a self-gravitating Quantum Field Theory

    Get PDF
    In a companion paper, we have emphasized the role of the Drinfeld double DSU(2) in the context of three dimensional Riemannian Loop Quantum Gravity coupled to massive spinless point particles. We make use of this result to propose a model for a self-gravitating quantum field theory (massive spinless non-causal scalar field) in three dimensional Riemannian space. We start by constructing the Fock space of the free self-gravitating field: the vacuum is the unique DSU(2) invariant state, one-particle states correspond to DSU(2) unitary irreducible simple representations and any multi-particles states is obtained as the symmetrized tensor product between simple representations. The associated quantum field is defined by the usual requirement of covariance under DSU(2). Then, we introduce a DSU(2)-invariant self-interacting potential (the obtained model is a Group Field Theory) and compute explicitely the lowest order terms (in the self-interaction coupling constant λ\lambda) of the propagator and of the three-points function. Finally, we compute the lowest order quantum gravity corrections (in the Newton constant G) to the propagator and to the three-points function.Comment: 36 pages, published in Class. Quant. Gra

    A Note on New Sources of Gaugino Masses

    Get PDF
    In IIB orientifold models, the singlet twisted moduli appear in the tree-level gauge kinetic function. They might be responsible for generating gaugino masses if they acquire non-vanishing F-terms. We discuss some aspects of this new possibility, such as the size of gaugino masses and their non-universalities. A possible brane setting is presented to illustrate the usefulness of these new sources.Comment: 7 pages, late

    S-storage operators

    Full text link
    In 1990, J.L. Krivine introduced the notion of storage operator to simulate, for Church integers, the "call by value" in a context of a "call by name" strategy. In this present paper, we define, for every λ\lambda-term S which realizes the successor function on Church integers, the notion of S-storage operator. We prove that every storage operator is a $S-storage operator. But the converse is not always true

    Casimir force in Schwarzschild metric: Progress report

    Get PDF
    In this paper I report progress on both theoretical and experimental aspects. I describe two approaches to calculating putative effects of gravitational curvature on the Casimir force. The work I describe continues the quest to answer the question: do virtual field excitations follow geodesics
    corecore