6,383 research outputs found
The crystal structure of thiourea nitrate
The structure of thiourea nitrate has been determined by three-dimensional X-ray methods. Both Cu Ke and Mo K~ data were obtained with a single-crystal diffractometer and the final R values are 4.9% and 5.5% respectively. The space group is P211m and there are two molecules in the unit cell. All atoms, including hydrogen, lie on mirror planes. The whole structure is built up of layers of atoms, the atoms within each layer being linked by a network of hydrogen bonds
Personalized Ambience: An Integration of Learning Model and Intelligent Lighting Control
The number of households and offices adopting automation system is on the rise. Although devices and actuators can be controlled through wireless transmission, they are mostly static with preset schedules, or at different times it requires human intervention. This paper presents a smart ambience system that analyzes the user’s lighting habits, taking into account different environmental context variables and user needs in order to automatically learn about the user’s preferences and automate the room ambience dynamically. Context information is obtained from Yahoo Weather and environmental data pertaining to the room is collected via Cubesensors to study the user’s lighting habits. We employs a learning model known as the Reduced Error Prune Tree (REPTree) to analyze the users’ preferences, and subsequently predicts the preferred lighting condition to be actuated in real time through Philips Hue. The system is able to ensure the user’s comfort at all time by performing a closed feedback control loop which checks and maintains a suitable lighting ambience at optimal level
Half-Monopole in the Weinberg-Salam Model
We present new axially symmetric half-monopole configuration of the
SU(2)U(1) Weinberg-Salam model of electromagnetic and weak
interactions. The half-monopole configuration possesses net magnetic charge
which is half the magnetic charge of a Cho-Maison monopole. The
electromagnetic gauge potential is singular along the negative -axis.
However the total energy is finite and increases only logarithmically with
increasing Higgs field self-coupling constant at
. In the U(1) magnetic field, the half-monopole is just
a one dimensional finite length line magnetic charge extending from the origin
and lying along the negative -axis. In the SU(2) 't Hooft magnetic
field, it is a point magnetic charge located at . The half-monopole
possesses magnetic dipole moment that decreases exponentially fast with
increasing Higgs field self-coupling constant at
.Comment: 14 pages, 3 Figure
A Lightweight Privacy-Preserved Spatial and Temporal Aggregation of Energy Data
Smart grid provides fine-grained real time energy consumption, and it is able to improve the efficiency of energy management. It enables the collection of energy consumption data from consumer and hence has raised serious privacy concerns. Energy consumption data, a form of personal information that reveals behavioral patterns can be used to identify electrical appliances being used by the user through the electricity load signature, thus making it possible to further reveal the residency pattern of a consumer’s household or appliances usage habit. This paper proposes to enhance the privacy of energy con- sumption data by enabling the utility to retrieve the aggregated spatial and temporal consumption without revealing individual energy consumption. We use a lightweight cryptographic mech- anism to mask the energy consumption data by adding random noises to each energy reading and use Paillier’s additive homo- morphic encryption to protect the noises. When summing up the masked energy consumption data for both Spatial and Temporal aggregation, the noises cancel out each other, hence resulting in either the total sum of energy consumed in a neighbourhood at a particular time, or the total sum of energy consumed by a household in a day. No third party is able to derive the energy consumption pattern of a household in real time. A proof-of- concept was implemented to demonstrate the feasibility of the system, and the results show that the system can be efficiently deployed on a low-cost computing platform
Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification
The integrity and authenticity of the energy usage data in Advanced Metering Infrastructure (AMI) is crucial to ensure the correct energy load to facilitate generation, distribution and customer billing. Any malicious tampering to the data must be detected immediately. This paper introduces secure end-to-end data aggregation for AMI, a security protocol that allows the concentrators to securely aggregate the data collected from the smart meters, while enabling the utility back-end that receives the aggregated data to verify the integrity and data originality. Compromise of concentrators can be detected. The aggregated data is protected using Chameleon Signatures and then forwarded to the utility back-end for verification, accounting, and analysis. Using the Trapdoor Chameleon Hash Function, the smart meters can periodically send an evidence to the utility back-end, by computing an alternative message and a random value (m', r) such that m' consists of all previous energy usage measurements of the smart meter in a specified period of time.
By verifying that the Chameleon Hash Value of (m', r) and that the energy usage matches those aggregated by the concentrators, the utility back-end is convinced of the integrity and authenticity of the data from the smart meters. Any data anomaly between smart meters and concentrators can be detected, thus indicating potential compromise of concentrators
SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems
There is an increasing security risk in Building Automation Systems (BAS) in that its communication is unprotected, resulting in the adversary having the capability to inject spurious commands to the actuators to alter the behaviour of BAS. The communication between the Human-Machine-Interface (HMI) and the controller (PLC) is vulnerable as there is no secret key being used to protect the authenticity, confidentiality and integrity of the sensor data and commands.
We propose SEABASS, a lightweight key management scheme to distribute and manage session keys between HMI and PLCs, providing a secure communication channel between any two communicating devices in BAS through a symmetric-key based hash-chain encryption and authentication of message exchange. Our scheme facilitates automatic renewal of session keys periodically based on the use of a reversed hash-chain. A prototype was implemented using the BACnet/IP communication protocol and the preliminary results show that the symmetric keychain approach is lightweight and incurs low latency
- …
