control entity
Recently Published Documents


TOTAL DOCUMENTS

15
(FIVE YEARS 6)

H-INDEX

2
(FIVE YEARS 1)

Sensors ◽  
2022 ◽  
Vol 22 (1) ◽  
pp. 349
Author(s):  
Mohammad Al Shinwan ◽  
Laith Abualigah ◽  
Trong-Dinh Huy ◽  
Ahmed Younes Shdefat ◽  
Maryam Altalhi ◽  
...  

Reaching a flat network is the main target of future evolved packet core for the 5G mobile networks. The current 4th generation core network is centralized architecture, including Serving Gateway and Packet-data-network Gateway; both act as mobility and IP anchors. However, this architecture suffers from non-optimal routing and intolerable latency due to many control messages. To overcome these challenges, we propose a partially distributed architecture for 5th generation networks, such that the control plane and data plane are fully decoupled. The proposed architecture is based on including a node Multi-session Gateway to merge the mobility and IP anchor gateway functionality. This work presented a control entity with the full implementation of the control plane to achieve an optimal flat network architecture. The impact of the proposed evolved packet Core structure in attachment, data delivery, and mobility procedures is validated through simulation. Several experiments were carried out by using NS-3 simulation to validate the results of the proposed architecture. The Numerical analysis is evaluated in terms of total transmission delay, inter and intra handover delay, queuing delay, and total attachment time. Simulation results show that the proposed architecture performance-enhanced end-to-end latency over the legacy architecture.


Author(s):  
Mehmet Fatih Hocaoğlu

Threat evaluation is a vital process for any defense system, and it consists of a series of calculation and evaluation based on the inferred capabilities and intents of the targets that aim to give damage to defended assets. Target evaluation is proceeded in a wargame and the aim is to compare weapon target pairs according to a set of criteria. The target evaluation cycle is repeated anytime a new detection is received and when any change happens in the target currently detected. The whole process consists of a set of tasks that are shared between Command and Control units and the tasks require different responsibilities. Each task is succeeded by a specific behavior that is represented as a reasonably ordered set of actions. The task sharing is organized by taking the C2 architectures into account. In this paper, an agent-based command and control entity, which is in charge of target evaluation and giving engagement decision, is designed and it is situated in an air defense simulation environment. The study aims to propose an agent design in military decision-making domain, bringing analytic methods with the first-order logic together, and combine aspect orientation with agent design. The study also improves dynamic aspect management in agent programming using the relation concept.


Author(s):  
Dr. T. Kowsalya , Et. al.

A MANET network is made up of wireless nodes which operate without a defined structure, the arrangement of existing devices does not have any ministerial or control entity . the management tasks are carried out by the teams which are in the network, therefore a MANET network is said to be a managed network. As there is no infrastructure, such as, the bandwidth, availability, input error rate, among others, depend exclusively on the behaviour of the network users. This work presents a functional solution, which decreases the energy consumption in MANET networks, implemented using game theories and genetic  algorithms  solution. The evaluation of the pay-as-you-go strategy from the modified prisoner dilemma was shown to be an easy to implement and interpret tool for the network equipment.  The processes of generation, combination and  mutation  of  strategies  demonstrated the in-centive of cooperation in the network, observed in the increase of the average confidence of the nodes, a  very high  value.   The  intervention of the protocol with the  use  of  genetic  algorithms,  demonstrated  ot be  a  form  of  implementation  of  solutions  for problems of multiple agents, the increase in the evaluation of trust of the nodes was observed, which can be interpreted as a convergence of the nodes to cooperate. The results obtained in the simulations carried out show the functioning of the  algorithm implemented and the functionality  of  the  network  after  its  implementation.  


Author(s):  
Francisco Parrilla Ayuso ◽  
David Batista ◽  
Daniel Maldonado ◽  
Jon Colado ◽  
Sergio Jiménez Gómez ◽  
...  

Indra Sistemas S.A. have designed and developed a safety and secure solution system for the rail transportation environment based on a distributed architecture under the domain of the Industrial IoT that enables V2V, V2I, and I2I communications, allowing peer-to-peer data sharing. UPM has designed and implemented a HW-based security infrastructure for extreme edge devices in IoT. The implementation takes advantage of HW accelerator to enhance security in low resources devices with a very low overhead in cost and memory footprint. Current security solutions are problematic due to centralized control entity. The complexity of this kind of system resides in the management, in a decentralized way, of the security at each point of the distributed architecture. This chapter describes how the system secures all the infrastructure based on a distributed architecture without affecting the throughput and the high availability of the data in order to get a top-performance, in compliance with the strengthen safety and security constrains of the rail environment's regulations.


Author(s):  
Nazirkhan Gadzhievich Gadzhiev ◽  
Sergei Aleksandrovich Konovalenko

The article highlights the current needs of the state in implementing the financial and economic control, which requires a combination of financial audit and performance audit. The need to ensure the approach is largely stipulated by the specifics of the activities of control and accounting bodies and their territorial structure. The problems associated with the organization of the activities of state external financial control at the level of subjects of the Russian Federation are of par-ticular importance. The current state of the legal regulation of the control and accounting bodies’ activity at the level of the subject of the Russian Federation has been examined; it has been inferred that the accounts chamber, being the regional control entity, has organizational and functional independence and prospects for development. At the same time, the lack of a modern unified concept of financial and control activities does not allow to develop common approaches to assessing the effectiveness of the control and audit bodies. It has been found that the Accounts Chamber activities in the Republic of Dagestan founded on September 28, 1995, are aimed at ensuring the legality and efficiency of using public funds and assets, at identifying corruption components in the budget and financial sphere. The analysis of the structure of budget and financial violations, according to the results of the Accounting Chamber of the Republic of Dagestan, indicates the multiple violations in the budgetary sphere, in the trade and procurement processes, reflecting financial and economic operations in the primary accounting and reporting, etc. There have been given the recommendations to unify control and accounting bodies at the regional level, to introduce information systems in the control environment for the purpose of improving the efficiency of public resources management at the level of the subjects of the Russian Federation.


2019 ◽  
Vol 26 (1) ◽  
pp. 128-143 ◽  
Author(s):  
Sarah Danthony ◽  
Nicolas Mascret ◽  
François Cury

Test anxiety is experienced by a substantial number of students in many school subjects, including physical education, and it may be deleterious for their school performance and their well-being. The aim of our study was to explore through multiple regression and mediation analyses the relationships between test anxiety in physical education, implicit theories, gender, and age. Five hundred and twenty-six French students ( Mage = 15.82, SD = 1.19) voluntarily participated in the study. The results mainly highlighted the following: Gender was a significant predictor of all the components of physical education test anxiety, evidencing that girls scored higher than boys on the four negative components (worry, self-focus, bodily symptoms, somatic tension), and lower on the positive component (perceived control). Age negatively predicted the self-focus component only. Entity theory was a significant predictor of the five components of test anxiety, whereas incremental theory only positively predicted perceived control. Entity theory partially mediated the relationships between gender and perceived control. A better understanding by physical education teachers of the characteristics of their students (e.g. gender differences, age, implicit theories of athletic ability) may contribute to decreasing test anxiety in physical education.


Electronics ◽  
2018 ◽  
Vol 7 (12) ◽  
pp. 414 ◽  
Author(s):  
Eduardo Rodríguez-Orozco ◽  
Enrique García-Guerrero ◽  
Everardo Inzunza-Gonzalez ◽  
Oscar López-Bonilla ◽  
Abraham Flores-Vergara ◽  
...  

A new embedded chaotic cryptosystem is introduced herein with the aim to encrypt digital images and performing speech recognition as an external access key. The proposed cryptosystem consists of three technologies: (i) a Spartan 3E-1600 FPGA from Xilinx; (ii) a 64-bit Raspberry Pi 3 single board computer; and (iii) a voice recognition chip manufactured by Sunplus. The cryptosystem operates with four embedded algorithms: (1) a graphical user interface developed in Python language for the Raspberry Pi platform, which allows friendly management of the system; (2) an internal control entity that entails the start-up of the embedded system based on the identification of the key access, the pixels-entry of the image to the FPGA to be encrypted or unraveled from the Raspberry Pi, and the self-execution of the encryption/decryption of the information; (3) a chaotic pseudo-random binary generator whose decimal numerical values are converted to an 8-bit binary scale under the VHDL description of m o d ( 255 ) ; and (4) two UART communication algorithms by using the RS-232 protocol, all of them described in VHDL for the FPGA implementation. We provide a security analysis to demonstrate that the proposed cryptosystem is highly secure and robust against known attacks.


Energies ◽  
2018 ◽  
Vol 11 (9) ◽  
pp. 2330 ◽  
Author(s):  
Joao Ferreira ◽  
Ana Martins

Energy markets are based on energy transactions with a central control entity, where the players are companies. In this research work, we propose an IoT (Internet of Things) system for the accounting of energy flows, as well as a blockchain approach to overcome the need for a central control entity. This allows for the creation of local energy markets to handle distributed energy transactions without needing central control. In parallel, the system aggregates users into communities with target goals and creates new markets for players. These two approaches (blockchain and IoT) are brought together using a gamification approach, allowing for the creation and maintenance of a community for electricity market participation based on pre-defined goals. This community approach increases the number of market players and creates the possibility of traditional end users earning money through small coordinated efforts. We apply this approach to the aggregation of batteries from electrical vehicles so that they become a player in the spinning reserve market. It is also possible to apply this approach to local demand flexibility, associated with the demand response (DR) concept. DR is aggregated to allow greater flexibility in the regulation market based on an OpenADR approach that allows the turning on and off of predefined equipment to handle local microgeneration.


Author(s):  
Raghunath Reddy Yeddula ◽  
Vetrivelan P

The leading-edge vehicle tracking and scanning system based on embedded board is intended and executed to observe any vehicle from different locations. Every year, many numbers of vehicles are stolen. To prohibit thievery, a phenomenal type of negator is preowned, like padlock, disk break lock and more which is a defensive motion, but it is not safe for all designs. The main impartial is to initiate a control entity that shows the locale spot of a vehicle proving by global position system (GPS) to find the position. Here, global system for mobile (GSM) is accepting for communicating with the vehicle that easily finding a steal. The entity is built for trying out the mastery of the locale spot that transmits to the user when the motion is in exciting direction and stable in the city and some other areas. This whole entity is built by bringing together a Raspberry Pi with GPS, general packetradio service (GPRS), and GSM. The preferred entity makes better use of unique automation that based on the Raspberry Pi. This entity works on the GPS and GSM SIM 900A modules which consists all the three things for communication. GPS and GPRS circulate the chasing information to the server to transmit the message to the mobile number which is saved in this sector for communicating through GSM. This preferred entity also acquires the traveler’s protection by testing liquefied petroleum gas effused gas sensor MQ135 and temperature DS18B20 sensor. 


Sign in / Sign up

Export Citation Format

Share Document