Sökresultat

Filtyp

Din sökning på "fc 26 coins Buyfc26coins.com is EA Sports official for FC 26 coins The service is affordable and quick..qajn" gav 95964 sökträffar

Single Antenna Anchor-Free UWB Positioning based on Multipath Propagation

Radio based localization and tracking usually require multiple receivers/transmitters or a known floor plan. This paper presents a method for anchor free indoor positioning based on single antenna ultra wideband (UWB) measurements. By using time of arrival information from multipath propagation components stemming from scatterers with different, but unknown, positions we estimate the movement of t

Vad forskar du om?

"Det finns alltid något att leva för" Sophia Eberhard om hur en enda fråga ibland kan vara vägen framåt Det osynliga blir synligt Bilden visar en fästingklo koloniserad av mikroorganismer. Från fjärilar i magen till ångestsyndrom Att ha ångest är en del av att vara människa. Matti Cervin berättar varför. ”Vi föräldrar behöver hänga med vår tid!” Emma Claesdotter-Knutsson tycker att föräldrar behöv

https://www.medicin.lu.se/forskning/vad-forskar-du-om - 2026-05-08

Performance-based contracting in service supply chains: a service provider risk perspective

Purpose – The performance of service supply chains in terms of service levels and cost efficiency depends not only on the effort of service providers but also on the inputs of sub-contractors and the customer. In this sense, performance-based contracting (PBC) entails increased financial risk for providers. Allocating and managing risk through contractual relationships along the service supply cha

Alternating Projections on Nontangential Manifolds

We consider sequences of points obtained by projecting a given point B=B (0) back and forth between two manifolds and , and give conditions guaranteeing that the sequence converges to a limit . Our motivation is the study of algorithms based on finding the limit of such sequences, which have proved useful in a number of areas. The intersection is typically a set with desirable properties but for w

On Lightweight Security for Constrained Environments

The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight IoT devices are used in several sectors, such as smart cities, smart homes, healthcare, and the manufacturing industry.IoT solutions help increase productivity by predictive maintenance and resource management in the industry. Devices with voice interfaces are spreading rapidly in the home automatio

On the Suitability of Using SGX for Secure Key Storage in the Cloud

This paper addresses the need for secure storage in virtualized services in the cloud. To this purpose, we evaluate the security properties of Intel's Software Guard Extensions (SGX) technology, which provides hardware protection for general applications, for securing virtual Hardware Security Modules (vHSM). In order for the analysis to be comparable with analyses of physical HSMs, the evaluation

5G Radio Access Network Slicing in Massive MIMO Systems for Industrial Applications

A key enabler for Industry 4.0 is Fifth Generation Wireless Specifications (5G), within which network slicing is a promising technique to ensure customized quality of service for specific end-user groups in industrial scenarios. Massive Multiple Input Multiple Output (MIMO) plays a significant role in 5G but network slicing for massive MIMO has not yet been addressed. In this paper, we propose a n

Energy-Efficient Stable and Balanced Task Scheduling in Data Centers

It is well known that load balancing in data centers can lead to unnecessary energy usage if all servers are kept active. Usingdynamic server provisioning, the number of servers that serve requests can be reduced by turning off idle servers and thereby savingenergy. However, such a scheme, usually increases the risk of instability of server queues. In this work, we analyze the trade-offbetween ene

Electromagnetic Side-Channel Attack on AES using Low-end Equipment

Side-channel attacks on cryptographic algorithms targets the implementation of the algorithm. Information can leak from the implementation in several different ways and, in this paper, electromagnetic radiation from an FPGA is considered. We examine to which extent key information from an AES implementation can be deduced using a low-end oscilloscope. Moreover, we examine how the antenna's distanc

Software Evaluation of Grain-128AEAD for Embedded Platforms

Grain-128AEAD is a stream cipher supporting authenticated encryptionwith associated data, and it is currently in round 2 of the NIST lightweight cryptostandardization process. In this paper we present and benchmark software implementations of the cipher, targeting constrained processors. The processors chosen arethe 8-bit (AVR) and 16-bit (MSP) processors used in the FELICS-AEAD framework.Both hig

Do patients or their physicians more accurately assess long-term risk associated with hypertension? A population-based study

Objective: To compare the assessments of 10-year probability by patients and their physicians of cardiovascular complications of hypertension with actual outcomes. Design: Patients with uncomplicated hypertension treated with at least one antihypertensive drug at inclusion were followed for 10 years through mandatory national health registers. Setting: 55 primary health care centres, 11 hospital o

A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM

In the implementation of post-quantum primitives, it is well known that all computations that handle secret information need to be implemented to run in constant time. Using the Fujisaki-Okamoto transformation or any of its different variants, a CPA-secure primitive can be converted into an IND-CCA secure KEM. In this paper we show that although the transformation does not handle secret informatio

Making the BKW Algorithm Practical for LWE

The Learning with Errors (LWE) problem is one of the main mathematical foundations of post-quantum cryptography. One of the main groups of algorithms for solving LWE is the Blum-Kalai-Wasserman (BKW) algorithm. This paper presents new improvements for BKW-style algorithms for solving LWE instances. We target minimum concrete complexity and we introduce a new reduction step where we partially reduc

Hedwig : A named entity linker

Named entity linking is the task of identifying mentions of named things in text, such as “Barack Obama” or “New York”, and linking these mentions to unique identifiers. In this paper, we describe Hedwig, an end-to-end named entity linker, which uses a combination of word and character BILSTM models for mention detection, a Wikidata and Wikipedia-derived knowledge base with global information aggr

Some Notes on Post-Quantum Cryptanalysis

Cryptography as it is used today relies on a foundational level on the assumptionthat either the Integer Factoring Problem (IFP) or the DiscreteLogarithm Problem (DLP) is computationally intractable. In the 1990s PeterShor developed a quantum algorithm that solves both problems in polynomialtime. Since then alternative foundational mathematical problems to replace IFPand DLP have been suggested. T

Building Knowledge Graphs : Processing Infrastructure and Named Entity Linking

Things such as organizations, persons, or locations are ubiquitous in all texts circulating on the internet, particularly in the news, forum posts, and social media. Today, there is more written material than any single person can read through during a typical lifespan. Automatic systems can help us amplify our abilities to find relevant information, where, ideally, a system would learn knowledge

Delayed Gadolinium-Enhanced MRI of Menisci and Cartilage (dGEMRIM/dGEMRIC) in Obese Patients With Knee Osteoarthritis : Cross-Sectional Study of 85 Obese Patients With Intra-articular Administered Gadolinium Contrast

Background: Early cartilage changes in knee osteoarthritis (OA) can be assessed by both intravenous (i.v.) and intra-articular (i.a.) delayed gadolinium-enhanced MRI of cartilage (dGEMRIC). Purpose: To examine the relationship between i.a. dGEMRIC and delayed gadolinium-enhanced MRI of menisci (dGEMRIM), and to investigate if the approach can be used to assess the morphological degeneration of men

On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving

The Learning with Errors problem (LWE) has become a central topic in recent cryptographic research. In this paper, we present a new solving algorithm combining important ideas from previous work on improving the Blum-Kalai-Wasserman (BKW) algorithm and ideas from sieving in lattices. The new algorithm is analyzed and demonstrates an improved asymptotic performance. For the Regev parameters $q=n^2$

Comparing LSTM and FOFE-based Architectures for Named Entity Recognition

LSTM architectures (Hochreiter and Schmidhuber, 1997) have become standard to recognize named entities (NER) in text (Lample et al., 2016; Chiu and Nichols, 2016). Nonetheless, Zhang et al. (2015) recently proposed an approach based on fixed-size ordinally forgetting encoding (FOFE) to translate variable-length contexts into fixed-length features. This encoding method can be used with feed-forward

Vectorized linear approximations for attacks on SNOW 3G

SNOW 3G is a stream cipher designed in 2006 by ETSI/SAGE, serving in 3GPP as one of the standard algorithms for data confidentiality and integrity protection. It is also included in the 4G LTE standard. In this paper we derive vectorized linear approximations of the finite state machine in SNOW3G. In particular,we show one 24-bit approximation with a bias around 2−37 and one byte-oriented approxim