scholarly journals Optimal Initial Synchronization Time in the Minimal 6TiSCH Configuration

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Apostolos Karalis ◽  
Dimitrios Zorbas ◽  
Christos Douligeris
2016 ◽  
Vol 93 ◽  
pp. 17-36 ◽  
Author(s):  
Liujiang Kang ◽  
Xiaoning Zhu ◽  
Huijun Sun ◽  
Jakob Puchinger ◽  
Mario Ruthmair ◽  
...  

2019 ◽  
Vol 18 (10) ◽  
pp. 4668-4678 ◽  
Author(s):  
Antonio A. D'amico ◽  
Michele Morelli ◽  
Marco Moretti

Author(s):  
Gilberto Berardinelli ◽  
Fernando M. L. Tavares ◽  
Olav Tirkkonen ◽  
Troels B. Sorensen ◽  
Preben Mogensen

Author(s):  
V. Bakış ◽  
H. Bakış ◽  
Z. Eker

AbstractPhysical dimensions and evolutionary status of the A-type twin binary GSC 4019 3345 are presented. Located at a distance of ~1.1 kpc from the Sun, the system was found to have two components with identical masses (M1,2 = 1.92 M⊙), radii (R1,2 = 1.76 R⊙), and luminosities (log L1,2 = 1.1 L⊙) revolving in a circular orbit. Modeling the components with theoretical evolutionary tracks and isochrones implies a young age (t = 280 Myr) for the system, which is bigger than the synchronization time scale but smaller than the circularization time scale. Nevertheless, synthetic spectrum models revealed components’ rotation velocity of Vrot12 = 70 km s−1, that is about three times higher than their synchronization velocity. No evidence is found for an age difference between the components.


2019 ◽  
Vol 2019 ◽  
pp. 1-10
Author(s):  
Édgar Salguero Dorokhin ◽  
Walter Fuertes ◽  
Edison Lascano

When establishing a cryptographic key between two users, the asymmetric cryptography scheme is generally used to send it through an insecure channel. However, given that the algorithms that use this scheme, such as RSA, have already been compromised, it is imperative to research for new methods of establishing a cryptographic key that provide security when they are sent. To solve this problem, a new branch known as neural cryptography was born, using a modified artificial neural network called Tree Parity Machine or TPM. Its purpose is to establish a private key through an insecure channel. This article proposes the analysis of an optimal structure of a TPM network that allows generating and establishing a private cryptographic key of 512-bit length between two authorized parties. To achieve this, the combinations that make possible to generate a key of that length were determined. In more than 15 million simulations that were executed, we measured synchronization times, the number of steps required, and the number of times in which an attacking TPM network manages to imitate the behaviour of the two networks. The simulations resulted in the optimal combination, minimizing the synchronization time and prioritizing security against the attacking network. Finally, the model was validated by applying a heuristic rule.


Sign in / Sign up

Export Citation Format

Share Document