First measurement service applied to event dating for reliable business transactions: metrology for digital transformation using Colombian legal time.

Author(s):  
Claudia Fernanda Rodriguez ◽  

Diffusing the legal time in Colombia is one missional assessment of INM (National Metrology Institute of Colombia). This is done via a public IP through an NTP server (Network Time Protocol Server) disciplined to the National Standard of Time and Frequency. So, the companies can synchronize their servers, but they do not have certainty about the difference that exists between the time of the client-server and the legal time of the INM server because there is not a constant verification implemented by themselves. In Colombia, the demand for the legal time service has increased because it is used by many companies due to the rise of innovative applications such as time-stamp, digital signature, electronic invoice, and economic transactions. This has an impact on the economic environment of a country for world trade. For this reason, the INM of Colombia implemented a new service to measure the synchronization offset with the legal time, which allows the companies to have a new service that generates reliability respecting the time they use to provide their services. Inspired by the INM contribution to the international comparison Universal Time Coordinated (UTC) and the intercomparison of the National Standards of Time and Frequency implemented through the SIM time scale (SIMT) using GPS (Global Positioning System), the INM developed a customized application for national comparison using NTP. As a result, this is the first remote measurement service as evidence of metrology for digital transformation in Colombia in the field of time and frequency.

Author(s):  
Judah Levine

In this study, I used standard statistical tools (such as the various forms of the two-sample Allan variance) to characterize the clocks in computers, and I show how the results of this study are used to design algorithms to synchronize the computer clocks. These synchronization algorithms can be used to synchronize the time of a computer to a local reference clock or to a remote server. The algorithms by themselves are not intended to be a simple replacement for software that implements the Network Time Protocol (NTP) or any other similar application. Instead, they describe the statistical principles that should be used to design an algorithm to synchronize any computer clock by using data from any external reference received in any format. These algorithms have been used to synchronize the clocks of the computers that support the Internet Time Service operated by the National Institute of Standards and Technology (NIST), and I illustrate the performance of the algorithm with real-time data from these servers. In addition to presenting the design principles of the algorithm, I illustrate the principles with two specific examples: synchronizing a computer clock to a local reference signal, and the design of a synchronization process that is based on time-difference data received from a remote server over the public Internet. The message exchange between the local system and the remote server in this configuration is realized in NTP format, but that is not a fundamental requirement.


Author(s):  
Antonio Maria D’Altri ◽  
Francesco Cannizzaro ◽  
Massimo Petracca ◽  
Diego Alejandro Talledo

AbstractIn this paper, a simple and practitioners-friendly calibration strategy to consistently link target panel-scale mechanical properties (that can be found in national standards) to model material-scale mechanical properties is presented. Simple masonry panel geometries, with various boundary conditions, are utilized to test numerical models and calibrate their mechanical properties. The calibration is successfully conducted through five different numerical models (most of them available in commercial software packages) suitable for nonlinear modelling of masonry structures, using nonlinear static analyses. Firstly, the panel stiffness calibration is performed, focusing the attention to the shear stiffness. Secondly, the panel strength calibration is conducted for several axial load ratios by attempts using as reference the target panel strength deduced by well-known analytical strength criteria. The results in terms of panel strength for the five different models show that this calibration strategy appears effective in obtaining model properties coherent with Italian National Standard and Eurocode. Open issues remain for the calibration of the post-peak response of masonry panels, which still appears highly conventional in the standards.


Proceedings ◽  
2021 ◽  
Vol 74 (1) ◽  
pp. 1
Author(s):  
Hilal Çepik ◽  
Ömer Aydın ◽  
Gökhan Dalkılıç

With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared.


1985 ◽  
Vol 29 (10) ◽  
pp. 987-987 ◽  
Author(s):  
Gene Lynch

The American National Standard for Human Factors Engineering of Visual Display Terminal Workstations, the first standard sponsored by the Human Factors Society, is in the final stages of acceptance as an American National Standard. This standard addresses the physical and perceptual aspects of the visual display terminal workstation as used in text processing, data entry, and data inquiry. Standards take on many different forms and fill a variety of needs. Basically a standard provides a reference. Some standards are written so that two systems may be designed to complement each other or fit together. Lightbulbs and fixtures designed to the same standard will work together. In the case of human factors standards one half of the system is already designed, the human. The variety of the design of this part of the system requires that human factors standards identify the parameters to be considered and the corresponding measurement methods needed to insure that the equipment is designed to fit the individual human. A good solution needs to be based on the particular set of circumstances at hand. The voluntary standards method, known as the American National Standards, provides a vehicle for specifying the appropriate parameters and measurement methods while incorporating the necessary flexibility required to insure good designs for individuals. The purpose of this panel session is to provide the society with an interactive session with representatives of the standards drafting committee. A brief history of the committee and its activities will be presented. The panelists will then describe the approach taken in each of the major sections, the mandatory requirements, and the elements the panelists consider to be of particular interest


2014 ◽  
Vol 1073-1076 ◽  
pp. 562-566
Author(s):  
Zhe Min Li

This paper summarized the measure methods which include both Chinese national standards and international standards of how to determine the concentration of Non-methane Hydrocarbons (NMHC).Some problems and suggestions were discussed in this paper to improve the level of the measure methods and prompt the establishment of relative Chinese national standard.


Author(s):  
D. Shevchenko ◽  
V. Mihaylov

The article is devoted to the problems of digital transformation of companies in the service sector. The article describes the concepts of "digitization", "digitalization", "digital transformation", "automation". The analysis of the main sectors of the public services sector, the processes of transformation into a new business model of their development is carried out. Specific examples show the role of digital technologies implemented by individual companies, the leaders of their industry: "Internet of Things" (IoT); virtual diagnostics of the service; mobile applications and portals; artificial intelligence and machine learning (AI / ML); remote maintenance; UX design; virtual reality; cloud technologies; online services and others. The authors proceed from understanding the difference between automation and digitalization, the strategic goal of which is to create a new digital business model that creates new value. The result of digital transformation is the reconfiguration of processes that change the business logic of the company and the process of creating value. The article concludes that the rapid development of new technologies leads to the fact that companies face not only a dilemma when choosing the most suitable technologies for investment, but also the problem of staffing and finding an adequate organizational structure to create and maintain a new business model of the company.


2014 ◽  
Vol 644-650 ◽  
pp. 2875-2880
Author(s):  
A. Alfraih Abdulaziz Nasser ◽  
Wen Bo Chen

The Network Time Protocol (NTP) is used to synchronize clocks of various computer devices such as personal computers, tablets, and phones based their set time zones. The network of devices that use these NTP servers form a huge distributed network that attracted a number of attacks from late 2013 towards early 2014. This paper presents a hands-on test of the Distributed Reflection Denial of Service (DRDoS) attack by the monlist command, provides more vulnerability in the protocol, and offers mitigation to these vulnerabilities. A Kali Linux server was used to test the monlist command on its localhost. The results showed that a request with a size of 234 bytes got a response of 4,680 bytes. A busy NTP server can return up to 600 addresses which were theoretically calculated to return approximately 48 kilobytes in 100 packets. Consequently, this results in an amplification factor of 206×. The knowledge of the way the attack can be propagated was an important step in thwarting the attack and mitigating more such threats in the same protocol.


Sign in / Sign up

Export Citation Format

Share Document