To support scientists of different disciplines, different fields of computerscience have developed tools and infrastructures with the aim of giving them access to vast computational resources in the easiest possible ...
详细信息
To support scientists of different disciplines, different fields of computerscience have developed tools and infrastructures with the aim of giving them access to vast computational resources in the easiest possible way. Such extremely complex structures have evolved naturally in the last decades both in depth and breath and, in addition to scientists, a plethora of heterogeneous actors (system administrators, developers, etc.) cooperate and interact with them. This complex and unstructured flow of actions and information poses difficulties in the development and usage of science Gateways because information can be missing or hard to isolate at the right layer. In this paper, we aim to start a discussion on how to best manage these information flows to help the design and implementation of more flexible and userfriendly science Gateways and workflow management systems in the future.
Modern ground-based gravitational wave (GW) detectors require a complex interferometer configuration with multiple coupled optical cavities. Since achieving the resonances of the arm cavities is the most challenging a...
详细信息
Radio Frequency Identification (RFID) Is used to replace bar code system, RFID is more powerful than bar code system but it suffers from the weakness of wireless communication. Security issues in RFID systems include ...
详细信息
ISBN:
(纸本)9789881404763
Radio Frequency Identification (RFID) Is used to replace bar code system, RFID is more powerful than bar code system but it suffers from the weakness of wireless communication. Security issues in RFID systems include tag or reader impersonation, replay attack, eavesdropping, location privacy, forward and backward un-traceability. Appling traditional security mechanism such as MD4, MD5, SHA 256 or AES directly on RFID Is impossible due to the hardware limitation of a passive tag. Thus, many studies try to design all new protocols about mutual authentication and ownership transfer on RFID system. Physical unclonable function (PUF) is a new hardware security device that could make their protocol;tinier. In order to keep location privacy of tag, most of these works will not usc tag's unique identification. Instead, they will use a temporary Identification once and update It individually each run. However, hi this way, their works will suffer from de-synchronization between the tag and reader, if an attacker blocks some messages. In this paper, we propose protocols about mutual authentication and ownership transfer with PUF that can significantly alleviate this issue because the dc-synchronization attacks will not happen in our mutual authentication protocol. On the other hand, our protocol also can be compatible with EPC Gen2v2 standard easily. Besides, our simple and robust methods have better performance.
Physical Unclonable Functions (PUFs) have been widely proposed as security primitives to provide device identification and authentication. Recently, PUFs based on Non-volatile Memory (NVM) are widely proposed since th...
详细信息
A vibration isolation system called Type-Bp system used for power recycling mirrors has been developed for KAGRA, the interferometric gravitational-wave observatory in Japan. A suspension of the Type-Bp system passive...
详细信息
Edge contact geometries are thought to yield ultralow contact resistances in most non-ferromagnetic metal-graphene interfaces owing to their large metal-graphene coupling strengths. Here, we examine the contact resist...
详细信息
Radiative cooling of the thermally isolated system is investigated in KAGRA gravitational wave telescope. KAGRA is a laser interferometer-based detector and main mirrors constituting optical cavities are cool down to ...
Radiative cooling of the thermally isolated system is investigated in KAGRA gravitational wave telescope. KAGRA is a laser interferometer-based detector and main mirrors constituting optical cavities are cool down to 20K to reduce noises caused by the thermal fluctuation. The mirror is suspended with the multi-stage pendulum to isolate any vibration. Therefore, this mirror suspension system has few heat links to reduce vibration injection. Thus, this system is mainly cooled down with thermal radiation. In order to understand the process of radiative cooling of the mirror, we analyzed cooling curve based on mass and specific heat. As a result, it was newly found that a cryogenic part called 'cryogenic duct-shield' seems to have large contribution in the beginning of the mirror cooling. This finding will help to design new cooling system for the next generation cryogenic gravitational wave detector.
We apply independent component analysis (ICA) to the real data from a gravitational wave detector for the first time. ICA separates various sources of signals from multiple detection channels making use of non-Gaussia...
详细信息
This second part addresses a selection of topics related to Electromagnetic interference (EMI) issues in three-dimensional integrated components. Details about Through Silicon Via (TSV) technology, modelling and paras...
详细信息
暂无评论