6,383 research outputs found

    The crystal structure of thiourea nitrate

    Get PDF
    The structure of thiourea nitrate has been determined by three-dimensional X-ray methods. Both Cu Ke and Mo K~ data were obtained with a single-crystal diffractometer and the final R values are 4.9% and 5.5% respectively. The space group is P211m and there are two molecules in the unit cell. All atoms, including hydrogen, lie on mirror planes. The whole structure is built up of layers of atoms, the atoms within each layer being linked by a network of hydrogen bonds

    Personalized Ambience: An Integration of Learning Model and Intelligent Lighting Control

    Get PDF
    The number of households and offices adopting automation system is on the rise. Although devices and actuators can be controlled through wireless transmission, they are mostly static with preset schedules, or at different times it requires human intervention. This paper presents a smart ambience system that analyzes the user’s lighting habits, taking into account different environmental context variables and user needs in order to automatically learn about the user’s preferences and automate the room ambience dynamically. Context information is obtained from Yahoo Weather and environmental data pertaining to the room is collected via Cubesensors to study the user’s lighting habits. We employs a learning model known as the Reduced Error Prune Tree (REPTree) to analyze the users’ preferences, and subsequently predicts the preferred lighting condition to be actuated in real time through Philips Hue. The system is able to ensure the user’s comfort at all time by performing a closed feedback control loop which checks and maintains a suitable lighting ambience at optimal level

    Half-Monopole in the Weinberg-Salam Model

    Full text link
    We present new axially symmetric half-monopole configuration of the SU(2)×\timesU(1) Weinberg-Salam model of electromagnetic and weak interactions. The half-monopole configuration possesses net magnetic charge 2π/e2\pi/e which is half the magnetic charge of a Cho-Maison monopole. The electromagnetic gauge potential is singular along the negative zz-axis. However the total energy is finite and increases only logarithmically with increasing Higgs field self-coupling constant λ1/2\lambda^{1/2} at sin2θW=0.2312\sin^2\theta_W=0.2312. In the U(1) magnetic field, the half-monopole is just a one dimensional finite length line magnetic charge extending from the origin r=0r=0 and lying along the negative zz-axis. In the SU(2) 't Hooft magnetic field, it is a point magnetic charge located at r=0r=0. The half-monopole possesses magnetic dipole moment that decreases exponentially fast with increasing Higgs field self-coupling constant λ1/2\lambda^{1/2} at sin2θW=0.2312\sin^2\theta_W=0.2312.Comment: 14 pages, 3 Figure

    A Lightweight Privacy-Preserved Spatial and Temporal Aggregation of Energy Data

    Get PDF
    Smart grid provides fine-grained real time energy consumption, and it is able to improve the efficiency of energy management. It enables the collection of energy consumption data from consumer and hence has raised serious privacy concerns. Energy consumption data, a form of personal information that reveals behavioral patterns can be used to identify electrical appliances being used by the user through the electricity load signature, thus making it possible to further reveal the residency pattern of a consumer’s household or appliances usage habit. This paper proposes to enhance the privacy of energy con- sumption data by enabling the utility to retrieve the aggregated spatial and temporal consumption without revealing individual energy consumption. We use a lightweight cryptographic mech- anism to mask the energy consumption data by adding random noises to each energy reading and use Paillier’s additive homo- morphic encryption to protect the noises. When summing up the masked energy consumption data for both Spatial and Temporal aggregation, the noises cancel out each other, hence resulting in either the total sum of energy consumed in a neighbourhood at a particular time, or the total sum of energy consumed by a household in a day. No third party is able to derive the energy consumption pattern of a household in real time. A proof-of- concept was implemented to demonstrate the feasibility of the system, and the results show that the system can be efficiently deployed on a low-cost computing platform

    Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification

    Get PDF
    The integrity and authenticity of the energy usage data in Advanced Metering Infrastructure (AMI) is crucial to ensure the correct energy load to facilitate generation, distribution and customer billing. Any malicious tampering to the data must be detected immediately. This paper introduces secure end-to-end data aggregation for AMI, a security protocol that allows the concentrators to securely aggregate the data collected from the smart meters, while enabling the utility back-end that receives the aggregated data to verify the integrity and data originality. Compromise of concentrators can be detected. The aggregated data is protected using Chameleon Signatures and then forwarded to the utility back-end for verification, accounting, and analysis. Using the Trapdoor Chameleon Hash Function, the smart meters can periodically send an evidence to the utility back-end, by computing an alternative message and a random value (m', r) such that m' consists of all previous energy usage measurements of the smart meter in a specified period of time. By verifying that the Chameleon Hash Value of (m', r) and that the energy usage matches those aggregated by the concentrators, the utility back-end is convinced of the integrity and authenticity of the data from the smart meters. Any data anomaly between smart meters and concentrators can be detected, thus indicating potential compromise of concentrators

    SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems

    Get PDF
    There is an increasing security risk in Building Automation Systems (BAS) in that its communication is unprotected, resulting in the adversary having the capability to inject spurious commands to the actuators to alter the behaviour of BAS. The communication between the Human-Machine-Interface (HMI) and the controller (PLC) is vulnerable as there is no secret key being used to protect the authenticity, confidentiality and integrity of the sensor data and commands. We propose SEABASS, a lightweight key management scheme to distribute and manage session keys between HMI and PLCs, providing a secure communication channel between any two communicating devices in BAS through a symmetric-key based hash-chain encryption and authentication of message exchange. Our scheme facilitates automatic renewal of session keys periodically based on the use of a reversed hash-chain. A prototype was implemented using the BACnet/IP communication protocol and the preliminary results show that the symmetric keychain approach is lightweight and incurs low latency
    corecore