ror model
Recently Published Documents


TOTAL DOCUMENTS

6
(FIVE YEARS 5)

H-INDEX

1
(FIVE YEARS 0)

2021 ◽  
Vol 2 (10) ◽  
pp. 1059-1066
Author(s):  
Ricardo Oses Rodriguez ◽  
Claudia Oses Llanes ◽  
Rigoberto Fimia Duarte

In this work, 8 weather variables were modeled at the Yabu meteorological station, Cuba, a daily database from the Yabu meteorological station, Cuba, of extreme temperatures, extreme humidity and their average value, precipitation, was used. The force of the wind and the cloudiness corresponding to the period from 1977 to 2021, a linear mathematical model is obtained through the methodology of Regressive Objective Regression (ROR) for each variable that explains their behavior, depending on these 15, 13, 10 and 8 years in advance. It is concluded that these models allow the long-term forecast of the weather, opening a new possibility for the forecast, concluding that the chaos in time can be overcome if this way of predicting is used, the calculation of the mean error regarding the forecast of persistence in temperatures, wind force and cloud cover, while the persistence model is better in humidity, this allows to have valuable information in the long term of the weather in a locality, which results in a better decision making in the different aspects of the economy and society that are impacted by the weather forecast. It is the first time that an ROR model has been applied to the weather forecast processes for a specific day 8, 10, 13 and 15 years in advance.


2021 ◽  
Vol 2 (9) ◽  
pp. 870-875
Author(s):  
Ricardo Oses Rodriguez ◽  
Rigoberto Fimia Duarte ◽  
Alfredo Gonzalez Meneses

The objective of this work is to model the variable number of cold fronts that affect the Cuban territory in a winter season for a long series of data, to establish if the trend is significant and to see which are the main statistics of the model, to observe the impact of prediction using the number of sunspots with the help of Objective Regressive ROR modeling. In this work, the series of cold fronts per season that affect the Cuban territory was modeled in the years from the 1916-1917 seasons to the 2006-2007 seasons. There are more moderate cold fronts than any other front, on average there are more classic fronts than any other type, on average 19 fronts can be presented per season with a standard deviation of 4.8 Sunspots and they only have a significant linear correlation with sunspots. In moderate fronts, as the stains increase, the number of fronts decreases. The ROR model explains 98% of the variance with an error of 4.2 cases and depends on the fronts returned in 5 seasons, which could coincide with the ENSO event, and also depends on the number of sunspots returned in 12 years. From 1916-1917 approximately the 1952-1953 season, moderate fronts predominated, later from 1953-1954 to the end of the data, weak fronts predominate over the rest with some exceptions throughout history. No significant trend was observed in the model. It is concluded that forecasts of the number of cold fronts can be made with the variable number of sunspots.


2021 ◽  
Author(s):  
E Haodudin Nurkifli

This article proposed a new protocol "untraceable and unclonable sensor movement in the distributed IoT environment". The proposal has the following several advantages: (1) the new protocol using PUF achieved the main contributions of both untraceable and unclonable sensors. (2) the new protocol also achieved standard security features such as mutual authentication, perfect forward and backward secrecy. (3) The proposed authentication protocol can withstand from various kinds of attacks, such as to reply, DoS, impersonation, and cloning attack. (4) Analysis formally using BAN Logic has been conducted and denoted that the protocol achieved a secure mutual authentication. In addition, analysis formally using the RoR model and Scyther tool denoted that the proposed protocol withstands from various attacks. (5) A comparison of security features and computational complexity ensures that the proposal is secure and has low computational complexity


2021 ◽  
Author(s):  
E Haodudin Nurkifli

This article proposed a new protocol "untraceable and unclonable sensor movement in the distributed IoT environment". The proposal has the following several advantages: (1) the new protocol using PUF achieved the main contributions of both untraceable and unclonable sensors. (2) the new protocol also achieved standard security features such as mutual authentication, perfect forward and backward secrecy. (3) The proposed authentication protocol can withstand from various kinds of attacks, such as to reply, DoS, impersonation, and cloning attack. (4) Analysis formally using BAN Logic has been conducted and denoted that the protocol achieved a secure mutual authentication. In addition, analysis formally using the RoR model and Scyther tool denoted that the proposed protocol withstands from various attacks. (5) A comparison of security features and computational complexity ensures that the proposal is secure and has low computational complexity


Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1417
Author(s):  
Soumya Banerjee ◽  
Ashok Kumar Das ◽  
Samiran Chattopadhyay ◽  
Sajjad Shaukat Jamal ◽  
Joel J. P. C. Rodrigues ◽  
...  

Fog computing as an extension to the cloud computing infrastructure has been invaluable in enhancing the applicability of the Internet of Things (IoT) paradigm. IoT based Fog systems magnify the range and minimize the latency of IoT applications. However, as fog nodes are considered transient and they offer authenticated services, when an IoT end device loses connectivity with a fog node, it must authenticate freshly with a secondary fog node. In this work, we present a new security mechanism to leverage the initial authentication to perform fast lightweight secondary authentication to ensure smooth failover among fog nodes. The proposed scheme is secure in the presence of a current de-facto Canetti and Krawczyk (CK)-adversary. We demonstrate the security of the proposed scheme with a detailed security analysis using formal security under the broadly recognized Real-Or-Random (ROR) model, informal security analysis as well as through formal security verification using the broadly-used Automated Validation of Internet Security Protocols and Applications (AVISPA) software tool. A testbed experiment for measuring computational time for different cryptographic primitives using the Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) has been done. Finally, through comparative analysis with other related schemes, we show how the presented approach is uniquely advantageous over other schemes.


Sign in / Sign up

Export Citation Format

Share Document