2,117 research outputs found
Secure management of logs in internet of things
Ever since the advent of computing, managing data has been of extreme
importance. With innumerable devices getting added to network infrastructure,
there has been a proportionate increase in the data which needs to be stored.
With the advent of Internet of Things (IOT) it is anticipated that billions of
devices will be a part of the internet in another decade. Since those devices
will be communicating with each other on a regular basis with little or no
human intervention, plethora of real time data will be generated in quick time
which will result in large number of log files. Apart from complexity
pertaining to storage, it will be mandatory to maintain confidentiality and
integrity of these logs in IOT enabled devices. This paper will provide a brief
overview about how logs can be efficiently and securely stored in IOT devices.Comment: 6 pages, 1 tabl
Biomimetic Algorithms for Coordinated Motion: Theory and Implementation
Drawing inspiration from flight behavior in biological settings (e.g.
territorial battles in dragonflies, and flocking in starlings), this paper
demonstrates two strategies for coverage and flocking. Using earlier
theoretical studies on mutual motion camouflage, an appropriate steering
control law for area coverage has been implemented in a laboratory test-bed
equipped with wheeled mobile robots and a Vicon high speed motion capture
system. The same test-bed is also used to demonstrate another strategy (based
on local information), termed topological velocity alignment, which serves to
make agents move in the same direction. The present work illustrates the
applicability of biological inspiration in the design of multi-agent robotic
collectives
Survey on security issues in file management in cloud computing environment
Cloud computing has pervaded through every aspect of Information technology
in past decade. It has become easier to process plethora of data, generated by
various devices in real time, with the advent of cloud networks. The privacy of
users data is maintained by data centers around the world and hence it has
become feasible to operate on that data from lightweight portable devices. But
with ease of processing comes the security aspect of the data. One such
security aspect is secure file transfer either internally within cloud or
externally from one cloud network to another. File management is central to
cloud computing and it is paramount to address the security concerns which
arise out of it. This survey paper aims to elucidate the various protocols
which can be used for secure file transfer and analyze the ramifications of
using each protocol.Comment: 5 pages, 1 tabl
MMORPGs and Their Effect on Players
The purpose of this essay is to explore the popularity and effects of video games in the MMORPG genre. Games and play have been a part of human culture for an exceptionally long time, and in the recent decades video games have a become a large medium to continue this. Studying how video games, such as MMORPGs, can be used in order to advance life skills is important to understand the future of human development. By researching other studies done on various topics of related to MMORPG, I developed the idea that this genre of video games could be very impactful on future human development. The skills taught while playing a MMORPG can have real world applications and have shown preliminary success in doing so. Such skills include rapid decision making, civic responsibility, and social skills have been shown to improve as players play in this fantasy world. As such, further research into the full impact of MMORPGs needs to be done to fully understand the full scope of skills being utilized and developed during this form of play
Space-and Time-like Electromagnetic Kaon Form Factors
A simultaneous investigation of the space- and time-like electromagnetic form
factors of the charged kaon is presented within the framework of light-cone
QCD, with perturbative -factorization including Sudakov suppression. The
effects of power suppressed sub-leading twists and the genuine ``soft'' QCD
corrections turn out to be dominant at low- and moderate-energies/momentum
transfers . Our predictions agree well with the available moderate-energy
experimental data, including the recent results from the CLEO measurements and
certain estimates based on the phenomenological analyses of decays.Comment: 32 pages, 7 figure
Holographic Description of Noncommutative Schwinger Effect
We consider the phenomenon of spontaneous pair production in presence of an
external electric field for noncommutative Yang Mills theories. Using
Maldacena's holographic conjecture the threshold electric field for pair
production is computed from the quark-antiquark potential for noncommutative
theories. As an effect of noncommutativity, the threshold electric field is
seen to be smaller than its commutative counterpart. We also estimate the
correction to the pair production rate of quark-antiquark pairs to the first
order of the noncommutative deformation parameter. Our result bears resemblance
with an earlier work (based on field theoretic methods).Comment: Few comments added as per reviewer's questions. To be published at
Advances in High Energy Physics, Hindaw
- …
