670 research outputs found

    Hybrid Urban Navigation for Smart Cities

    Full text link
    This paper proposes a design for a hybrid, city-wide urban navigation system for moving agents demanding dedicated assistance. The hybrid system combines GPS and vehicle-to-vehicle communication from an ad-hoc network of parked cars, and RFID from fixed infrastructure -such as smart traffic lights- to enable a safely navigable city. Applications for such a system include high-speed drone navigation and directing visually impaired pedestrians.Comment: 21 pages, 10 figures, 2 table

    Distributed Ledger Technology for IoT: Parasite Chain Attacks

    Full text link
    Directed Acyclic Graph (DAG) based Distributed Ledgers can be useful in a number of applications in the IoT domain. A distributed ledger should serve as an immutable and irreversible record of transactions, however, a DAG structure is a more complicated mathematical object than its blockchain counterparts, and as a result, providing guarantees of immutability and irreversibility is more involved. In this paper, we analyse a commonly discussed attack scenario known as a parasite chain attack for the IOTA Foundation DAG based ledger. We analyse the efficacy of IOTA core MCMC algorithm using a matrix model and present an extension which improves the ledger resistance to these attacks

    Issues in the design of switched linear systems : a benchmark study

    Get PDF
    In this paper we present a tutorial overview of some of the issues that arise in the design of switched linear control systems. Particular emphasis is given to issues relating to stability and control system realisation. A benchmark regulation problem is then presented. This problem is most naturally solved by means of a switched control design. The challenge to the community is to design a control system that meets the required performance specifications and permits the application of rigorous analysis techniques. A simple design solution is presented and the limitations of currently available analysis techniques are illustrated with reference to this example
    corecore