2,117 research outputs found

    Secure management of logs in internet of things

    Full text link
    Ever since the advent of computing, managing data has been of extreme importance. With innumerable devices getting added to network infrastructure, there has been a proportionate increase in the data which needs to be stored. With the advent of Internet of Things (IOT) it is anticipated that billions of devices will be a part of the internet in another decade. Since those devices will be communicating with each other on a regular basis with little or no human intervention, plethora of real time data will be generated in quick time which will result in large number of log files. Apart from complexity pertaining to storage, it will be mandatory to maintain confidentiality and integrity of these logs in IOT enabled devices. This paper will provide a brief overview about how logs can be efficiently and securely stored in IOT devices.Comment: 6 pages, 1 tabl

    Biomimetic Algorithms for Coordinated Motion: Theory and Implementation

    Full text link
    Drawing inspiration from flight behavior in biological settings (e.g. territorial battles in dragonflies, and flocking in starlings), this paper demonstrates two strategies for coverage and flocking. Using earlier theoretical studies on mutual motion camouflage, an appropriate steering control law for area coverage has been implemented in a laboratory test-bed equipped with wheeled mobile robots and a Vicon high speed motion capture system. The same test-bed is also used to demonstrate another strategy (based on local information), termed topological velocity alignment, which serves to make agents move in the same direction. The present work illustrates the applicability of biological inspiration in the design of multi-agent robotic collectives

    Survey on security issues in file management in cloud computing environment

    Full text link
    Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data, generated by various devices in real time, with the advent of cloud networks. The privacy of users data is maintained by data centers around the world and hence it has become feasible to operate on that data from lightweight portable devices. But with ease of processing comes the security aspect of the data. One such security aspect is secure file transfer either internally within cloud or externally from one cloud network to another. File management is central to cloud computing and it is paramount to address the security concerns which arise out of it. This survey paper aims to elucidate the various protocols which can be used for secure file transfer and analyze the ramifications of using each protocol.Comment: 5 pages, 1 tabl

    MMORPGs and Their Effect on Players

    Get PDF
    The purpose of this essay is to explore the popularity and effects of video games in the MMORPG genre. Games and play have been a part of human culture for an exceptionally long time, and in the recent decades video games have a become a large medium to continue this. Studying how video games, such as MMORPGs, can be used in order to advance life skills is important to understand the future of human development. By researching other studies done on various topics of related to MMORPG, I developed the idea that this genre of video games could be very impactful on future human development. The skills taught while playing a MMORPG can have real world applications and have shown preliminary success in doing so. Such skills include rapid decision making, civic responsibility, and social skills have been shown to improve as players play in this fantasy world. As such, further research into the full impact of MMORPGs needs to be done to fully understand the full scope of skills being utilized and developed during this form of play

    Space-and Time-like Electromagnetic Kaon Form Factors

    Full text link
    A simultaneous investigation of the space- and time-like electromagnetic form factors of the charged kaon is presented within the framework of light-cone QCD, with perturbative kTk_T-factorization including Sudakov suppression. The effects of power suppressed sub-leading twists and the genuine ``soft'' QCD corrections turn out to be dominant at low- and moderate-energies/momentum transfers Q2Q^2. Our predictions agree well with the available moderate-energy experimental data, including the recent results from the CLEO measurements and certain estimates based on the phenomenological analyses of J/ψJ/\psi decays.Comment: 32 pages, 7 figure

    Holographic Description of Noncommutative Schwinger Effect

    Full text link
    We consider the phenomenon of spontaneous pair production in presence of an external electric field for noncommutative Yang Mills theories. Using Maldacena's holographic conjecture the threshold electric field for pair production is computed from the quark-antiquark potential for noncommutative theories. As an effect of noncommutativity, the threshold electric field is seen to be smaller than its commutative counterpart. We also estimate the correction to the pair production rate of quark-antiquark pairs to the first order of the noncommutative deformation parameter. Our result bears resemblance with an earlier work (based on field theoretic methods).Comment: Few comments added as per reviewer's questions. To be published at Advances in High Energy Physics, Hindaw
    corecore