Time filter

Source Type

Sidharth S.,Center for Artificial Intelligence and Robotics | Sebastian M.P.,Indian Institute of Management Kozhikode
ACE 2010 - 2010 International Conference on Advances in Computer Engineering | Year: 2010

The WiMAX IEEE 802.16 (e) is defined as the Worldwide Interoperability for Microwave Access by the WiMAX Forum, formed in April 2001 to promote conformance and interoperability of the IEEE 802.16 standard, officially known as WirelessMAN. The absence of physical boundaries makes in general a wireless network more vulnerable than a wired network. The IEEE 802.16 provides a security sublayer in the MAC layer to address the privacy issues across the fixed BWA (Broadband Wireless Access). Several proposals have been published to address the flaws in IEEE802.16 security after the release of IEEE802.16-2001. However, even with the modified version IEEE802.16-2004, the security problems still persist and many additional flaws have emerged. This paper examines the threats against the authentication protocols of WiMAX and proposes a new authentication protocol which is more reliable and secure. The proposed protocol is rigid against the attacks like Denial of service (DOS), Man-in-the-middle and replay. © 2010 IEEE. Source

Panigrahi N.,Center for Artificial Intelligence and Robotics | Mishra C.S.,National Institute of Technology Rourkela
Defence Science Journal | Year: 2015

Map projections are mathematical methods for projecting spherical coordinates in the form of (9, X) to the map coordinates in the form of (X,Y) in Cartesian reference frame. Numerous methods for map projection have been derived and are being used for preparation of cartographic products. These map projections take into account specific position of the viewer on the datum surface for derivation of the map projections. A generic method for azimuthal map projection where the position of the viewer can be taken at an arbitrary point on the datum surface is derived. Using this generic method all the specific azimuthal map projections can be derived. © 2015, DESIDOC. Source

Mohamed A.E.G.,Islamic University | Faudzi A.A.M.,Center for Artificial Intelligence and Robotics
2015 10th Asian Control Conference: Emerging Control Techniques for a Sustainable World, ASCC 2015 | Year: 2015

The modal method for modeling in time - domain model of pressure transients in hydraulic transmission lines is shown to be equivalent to a variation method. Attenuation factors, similar to the windows used in spectral analysis, are used to attenuate Gibbs phenomenon oscillations. Explicit formulas are given for various end conditions. The method is also applied to nonlinear damping models. © 2015 IEEE. Source

Kundu A.,Center for Artificial Intelligence and Robotics
Procedia Computer Science | Year: 2015

Gateways implementing IPSec protocol suite are used to provide secure communication between different client machines over public infrastructure. However the exploitation of covert storage channel in the IPSec protocol may defeat the very purpose of protecting leakage of information from the client machine. This threat gets more aggravated as some of the channels might be exploited from the client machine even without compromising the security of the IPSec gateways. The possibility of information leakage by compromising only the client machine, either in form of a colluding insider or due to the presence of some malware at the client machine, poses a serious threat to any organization dealing with sensitive information and a resourceful adversary. The existing approaches to mitigate the threats against storage covert channels severely restrict the usability of many QoS aware applications by reducing the allowance of relevant header fields to minimum. This work overcomes the same by creating separate partitions based on application specific QoS requirements. Subsequent IPSec processing involves extension of the scope of security services as per the predefined QoS requirements. This is achieved by appropriate allowance of QoS related header fields using a comprehensive treatment of the storage and timing covert channels. When compared with existing approaches, the proposed approach provides better usability in QoS demanding contexts while maintaining equivalent strength of protection against storage covert channels and providing equivalent performance. The paper also outlines an implementation strategy of the same on Linux kernel IPSec stack. © 2015 The Authors. Source

Sahoo S.,Center for Artificial Intelligence and Robotics | Subramanian S.C.,Indian Institute of Technology Madras | Srivastava S.,Defence Research and Development Organization
Proceedings of the Institution of Mechanical Engineers, Part D: Journal of Automobile Engineering | Year: 2016

In this paper, a dynamic mathematical model of an autonomous ground vehicle was used to analyse its transient response and to design a heading-angle controller for the vehicle. A suitable 'control-oriented model' that could accurately characterize the phenomenon of interest was used to design the controller. The efficacy of this model was evaluated by corroborating its results with experimental data. This model included the cornering stiffness of the tyres as an unknown parameter, and two approaches were attempted to estimate its value. The dynamics of the actuator were included in the analysis since the response time to steer the front wheel is of the same order as that of the heading-angle dynamics of the vehicle. The performance of two controllers (namely a classical transfer-function-based controller and an optimal linear quadratic regulator) were evaluated using the IPG: CarMaker® simulation platform over a range of speeds. The transfer-function-based controller was also implemented on the experimental test vehicle at low speeds (high-speed experimental implementation was not possible because of safety concerns). It was found that control gain scheduling helped to track the desired heading angles of the vehicle at various speeds. Subsequently, a lane-change manoeuvre using the test vehicle was performed to evaluate the controller further. It was found that the transfer-function-based heading-angle controller could provide a comparable performance with that of the linear quadratic regulator, while keeping the sensing requirements to a minimum; thus, it was suitable for real-time implementation in an autonomous ground vehicle. © Institution of Mechanical Engineers. Source

Discover hidden collaborations