[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (13)

Search Parameters:
Keywords = OpenWrt

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 3882 KiB  
Article
A Network Performance Analysis of MQTT Security Protocols with Constrained Hardware in the Dark Net for DMS
by Antonio Francesco Gentile, Davide Macrì, Domenico Luca Carnì, Emilio Greco and Francesco Lamonaca
Appl. Sci. 2024, 14(18), 8501; https://doi.org/10.3390/app14188501 - 20 Sep 2024
Cited by 1 | Viewed by 1380
Abstract
In the context of the internet of things, and particularly within distributed measurement systems that are subject to high privacy risks, it is essential to emphasize the need for increasingly effective privacy protections. The idea presented in this work involves managing critical traffic [...] Read more.
In the context of the internet of things, and particularly within distributed measurement systems that are subject to high privacy risks, it is essential to emphasize the need for increasingly effective privacy protections. The idea presented in this work involves managing critical traffic through an architectural proposal aimed at solving the problem of communications between nodes by optimizing both the confidentiality to be guaranteed to the payload and the transmission speed. Specifically, data such as a typical sensor on/off signal could be sent via a standard encrypted channel, while a sensitive aggregate could be transmitted through a dedicated private channel. Additionally, this work emphasizes the critical importance of optimizing message sizes to 5 k-bytes (small payload messages) for transmission over the reserve channel, enhancing both privacy and system responsiveness, a mandatory requirement in distributed measurement systems. By focusing on small, encrypted payloads, the study facilitates secure, timely updates and summaries of network conditions, maintaining the integrity and privacy of communications in even the most challenging and privacy-sensitive environments. This study provides a comprehensive performance analysis of IoT networks using Dark Net technologies and MQTT protocols, with a focus on privacy and anonymity. It highlights the trade-offs between enhanced security and performance, noting increased latency, reduced bandwidth, and network instability when using TOR, particularly with cipher suites like AES256-GCM-SHA384 and DHE-RSA-CHACHA20-POLY1305. The research emphasizes the need for further exploration of alternative protocols like LWM2M in secure IoT environments and calls for optimization to balance privacy with performance in Dark-Net-based IoT deployments. Full article
Show Figures

Figure 1

Figure 1
<p>MQTTs Over TOR Network Encryption Flow Architecture.</p>
Full article ">Figure 2
<p>Overview of the Proposed MQTT over TOR Architecture for IoT.</p>
Full article ">Figure 3
<p>MQTT Benchmarking Architecture.</p>
Full article ">Figure 4
<p>Algorithm flowchart.</p>
Full article ">Figure 5
<p>Physical Deploy for 3GPP-4G, IEEE 802.3ab, and IEEE 802.11n/ac testbeds.</p>
Full article ">Figure 6
<p>Latency Patterns Analysis for MQTT V3.11 over IEEE 802.3ab Connection: Examining TLS v1.2 Encryption Protocols at QoS0 Priority Level. The × represents the median value.</p>
Full article ">Figure 7
<p>The percentage difference in bandwidth between the dark web and the web using TLSv1. With MQTT V3.11 and IEEE 802.3ab Link, two cipher suites and all QoS levels are supported with a fixed payload size of 1 MB.</p>
Full article ">Figure 8
<p>Percentage difference in bandwidth used to transmit a 1 Mb payload versus a 5 Kb payload over an IEEE 802.3ab link on the Dark Web with the TLSv1.2 cipher suite for all levels of QoS and MQTT V3.11.</p>
Full article ">Figure 9
<p>Performance Analysis of Data Throughput: MQTT V3.11 over IEEE 802.3ab Connections with TLSv1.2 Encryption Protocols across Quality of Service Tiers.</p>
Full article ">Figure 10
<p>Performance Analysis of Data Throughput: MQTT V5.0 over IEEE 802.3ab Connections with TLSv1.2 Encryption Protocols across Quality of Service Tiers.</p>
Full article ">Figure 11
<p>Performance Analysis of Data Throughput: MQTT V3.11 over IEEE 802.11n/ac Connections with TLSv1.2 Encryption Protocols across Quality of Service Tiers.</p>
Full article ">Figure 12
<p>Performance Analysis of Data Throughput: MQTT V5.0 over IEEE 802.11n/ac Connections with TLSv1.2 Encryption Protocols across Quality of Service Tiers.</p>
Full article ">Figure 13
<p>Performance Analysis of Data Throughput: MQTT V3.11 over 3GPP-4G Connections with TLSv1.2 Encryption Protocols across Quality of Service Tiers.</p>
Full article ">Figure 14
<p>Performance Analysis of Data Throughput: MQTT V5.0 over 3GPP-4G Connections with TLSv1.2 Encryption Protocols across Quality of Service Tiers.</p>
Full article ">Figure 15
<p>Latency Patterns Analysis for MQTT V3.11 over 3GPP-4G Connection: Examining TLS v1.2 Encryption Protocols at QoS0 Priority Level. × represents the median value.</p>
Full article ">Figure 16
<p>Performance Analysis of Data Throughput: MQTT V3.11 over IEEE 802.3ab Connections with TLSv1.3 Encryption Protocols across Quality of Service Tiers.</p>
Full article ">Figure 17
<p>Performance Analysis of Data Throughput: MQTT V5.0 over IEEE 802.3ab Connections with TLSv1.3 Encryption Protocols across Quality of Service Tiers.</p>
Full article ">Figure 18
<p>Performance Analysis of Data Throughput: MQTT V3.11 over IEEE 802.11n/ac Connections with TLSv1.3 Encryption Protocols across Quality of Service Tiers.</p>
Full article ">Figure 19
<p>Performance Analysis of Data Throughput: MQTT V5.0 over IEEE 802.11n/ac Connections with TLSv1.3 Encryption Protocols across Quality of Service Tiers.</p>
Full article ">Figure 20
<p>Performance Analysis of Data Throughput: MQTT V3.11 over 3GPP-4G Connections with TLSv1.3 Encryption Protocols across Quality of Service Tiers.</p>
Full article ">Figure 21
<p>Performance Analysis of Data Throughput: MQTT V5.0 over 3GPP-4G Connections with TLSv1.3 Encryption Protocols across Quality of Service Tiers.</p>
Full article ">Figure 22
<p>Statistical Distribution of Delays for TLS v1.2 cipher suites and QoS0 level on IEEE 802.11n/ac Link and MQTT V3.11. × represents the median value.</p>
Full article ">
21 pages, 2734 KiB  
Article
IoT IP Overlay Network Security Performance Analysis with Open Source Infrastructure Deployment
by Antonio Francesco Gentile, Davide Macrì, Emilio Greco and Peppino Fazio
J. Cybersecur. Priv. 2024, 4(3), 629-649; https://doi.org/10.3390/jcp4030030 - 26 Aug 2024
Cited by 1 | Viewed by 1706
Abstract
Some of the most deployed infrastructures nowadays are Overlay Networks (ONs). They consist of hardware and software components designed to establish private and secure communication channels, typically over the Internet. ONs are among the most reliable technologies for achieving this objective and represent [...] Read more.
Some of the most deployed infrastructures nowadays are Overlay Networks (ONs). They consist of hardware and software components designed to establish private and secure communication channels, typically over the Internet. ONs are among the most reliable technologies for achieving this objective and represent the next-generation solution for secure communication. In this paper, we analyze important network performance metrics (RTT, bandwidth) while varying the type of Overlay Network used for interconnecting traffic between two or more hosts (within the same data center, in different data centers in the same building, or over the Internet). These networks establish connections between KVM (Kernel-based Virtual Machine) instances rather than the typical Docker/LXC/Podman containers. The first analysis will assess network performance as it is, without any overlay channels. The second will establish various types of channels without encryption, and the final one will encapsulate overlay traffic via IPsec (Transport mode), where encrypted channels like VTI are not already available for use. The obtained performance is demonstrated through a comprehensive set of traffic-simulation campaigns. Full article
Show Figures

Figure 1

Figure 1
<p>Generic VPN/overlay stacking technology.</p>
Full article ">Figure 2
<p>Generic VPN deploy topology.</p>
Full article ">Figure 3
<p>The trend of the average RTT for the considered connections.</p>
Full article ">Figure 4
<p>Clustered RTT distribution trend for the first six tunnels (one refers just to a clean IP connection) of <a href="#jcp-04-00030-f003" class="html-fig">Figure 3</a>.</p>
Full article ">Figure 5
<p>Clustered RTT distribution trend for the central tunnels group number 2 illustrated in <a href="#jcp-04-00030-f003" class="html-fig">Figure 3</a>.</p>
Full article ">Figure 6
<p>Clustered RTT distribution trend for the central tunnels group number 3 illustrated in <a href="#jcp-04-00030-f003" class="html-fig">Figure 3</a>.</p>
Full article ">
21 pages, 6032 KiB  
Article
Experimental Investigation into Deploying a Wi-Fi6 Mesh System for Underground Gold and Platinum Mine Stopes
by Brenton Lloyd Chetty, Tom Mmbasu Walingo, Carel Phillip Kruger and Sherrin John Isaac
Mining 2024, 4(3), 567-587; https://doi.org/10.3390/mining4030032 - 17 Aug 2024
Cited by 1 | Viewed by 942
Abstract
Stopes suffer from unreliable wireless communication due to their harsh environment. There is a lack of confidence within industry regarding the effectiveness of existing solutions in providing reliable high-bandwidth performance in hard rock stopes. This work proposes that Wi-Fi6 is a good candidate [...] Read more.
Stopes suffer from unreliable wireless communication due to their harsh environment. There is a lack of confidence within industry regarding the effectiveness of existing solutions in providing reliable high-bandwidth performance in hard rock stopes. This work proposes that Wi-Fi6 is a good candidate for reliable high-bandwidth communications in underground hard rock stopes. Experiments in a tunnel and mine stope were conducted to evaluate the performance of Wi-Fi6 in terms of latency, jitter, and throughput. Different criteria, such as multi-hop systems, varying multipath, mesh routing protocols, and frequencies at different bandwidths, were used to evaluate performance. The results show that Wi-Fi6 performance is greater in stopes compared to tunnels. Signal quality evaluations were conducted using the Asus RT-AX53U running OpenWrt, and an additional experiment was conducted on the nrf7002dk running Zephyr OS to evaluate the power consumption of Wi-Fi6 against the industry standard for low-powered wireless communications, IEEE 802.15.4. Wi-Fi6 was found to be more power-efficient than IEEE 802.15.4 for Mbps communications. These experiments highlight the signal robustness of Wi-Fi6 in stope environments and also highlights its low-powered nature. This work also highlights the performance of the two most widely used open-source mesh routing protocols for Wi-Fi. Full article
(This article belongs to the Topic Mining Innovation)
Show Figures

Figure 1

Figure 1
<p>Mine layout.</p>
Full article ">Figure 2
<p>The stope.</p>
Full article ">Figure 3
<p>Wi-Fi6 intended deployment for a stope.</p>
Full article ">Figure 4
<p>Asus RT-AX53U Wi-Fi6 router.</p>
Full article ">Figure 5
<p>Power evaluation setup.</p>
Full article ">Figure 6
<p>Test mine tunnel.</p>
Full article ">Figure 7
<p>Stope.</p>
Full article ">Figure 8
<p>Average Wi-Fi6 throughputs for tunnel and stope.</p>
Full article ">Figure 9
<p>Wi-Fi6 sample throughput.</p>
Full article ">Figure 10
<p>Average jitter.</p>
Full article ">Figure 11
<p>Wi-Fi6 jitter samples.</p>
Full article ">Figure 12
<p>Average latency.</p>
Full article ">Figure 13
<p>Wi-Fi6 latency samples.</p>
Full article ">Figure 14
<p>Power consumption for transmitting 10 MB of data.</p>
Full article ">
25 pages, 3477 KiB  
Article
Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment
by Antonio Francesco Gentile, Davide Macrì, Emilio Greco and Peppino Fazio
Future Internet 2024, 16(8), 283; https://doi.org/10.3390/fi16080283 - 7 Aug 2024
Cited by 2 | Viewed by 1626
Abstract
Nowadays, some of the most well-deployed infrastructures are Virtual Private Networks (VPNs) and Overlay Networks (ONs). They consist of hardware and software components designed to build private/secure channels, typically over the Internet. They are currently among the most reliable technologies for achieving this [...] Read more.
Nowadays, some of the most well-deployed infrastructures are Virtual Private Networks (VPNs) and Overlay Networks (ONs). They consist of hardware and software components designed to build private/secure channels, typically over the Internet. They are currently among the most reliable technologies for achieving this objective. VPNs are well-established and can be patched to address security vulnerabilities, while overlay networks represent the next-generation solution for secure communication. In this paper, for both VPNs and ONs, we analyze some important network performance components (RTT and bandwidth) while varying the type of overlay networks utilized for interconnecting traffic between two or more hosts (in the same data center, in different data centers in the same building, or over the Internet). These networks establish connections between KVM (Kernel-based Virtual Machine) instances rather than the typical Docker/LXC/Podman containers. The first analysis aims to assess network performance as it is, without any overlay channels. Meanwhile, the second establishes various channels without encryption and the final analysis encapsulates overlay traffic via IPsec (Transport mode), where encrypted channels like VTI are not already available for use. A deep set of traffic simulation campaigns shows the obtained performance. Full article
Show Figures

Figure 1

Figure 1
<p>Generic VPN/Overlay stacking technology.</p>
Full article ">Figure 2
<p>Site-to-site Overlay network scenario.</p>
Full article ">Figure 3
<p>Site-to-multi-site Overlay network scenario.</p>
Full article ">Figure 4
<p>Hub and spoke Overlay network scenario.</p>
Full article ">Figure 5
<p>Mesh Overlay network scenario.</p>
Full article ">Figure 6
<p>Generic VPN deploy topology.</p>
Full article ">Figure 7
<p>The trend of the average RTT for the considered connections.</p>
Full article ">Figure 8
<p>Clustered RTT distribution trend for the first six tunnels (one refers just to a clean IP connection) of <a href="#futureinternet-16-00283-f007" class="html-fig">Figure 7</a>.</p>
Full article ">Figure 9
<p>Clustered RTT distribution trend for the central group of tunnels illustrated in <a href="#futureinternet-16-00283-f007" class="html-fig">Figure 7</a>.</p>
Full article ">Figure 10
<p>Clustered RTT distribution trend for the central group of tunnels illustrated in <a href="#futureinternet-16-00283-f007" class="html-fig">Figure 7</a>.</p>
Full article ">Figure 11
<p>Clustered RTT distribution trend for the central group of tunnels illustrated in <a href="#futureinternet-16-00283-f007" class="html-fig">Figure 7</a>.</p>
Full article ">Figure 12
<p>Clustered RTT distribution trend for the central group of tunnels illustrated in <a href="#futureinternet-16-00283-f007" class="html-fig">Figure 7</a>.</p>
Full article ">Figure 13
<p>Clustered RTT distribution trend for the central group of tunnels illustrated in <a href="#futureinternet-16-00283-f007" class="html-fig">Figure 7</a>.</p>
Full article ">Figure 14
<p>The trend of maximum reachable bandwidth (Mbps) for each TCP connection with the underlying tunnel (MTU = 9000B).</p>
Full article ">Figure 15
<p>The trend of maximum reachable bandwidth (Mbps) for each UDP connection with the underlying tunnel (MTU = 9000B).</p>
Full article ">Figure 16
<p>The trend of Tinc average RTT for different MTU lengths.</p>
Full article ">Figure 17
<p>The trend of the average throughput (Mbps) for each TCP connection with only a VPN tunnel (MTU = 9000B).</p>
Full article ">Figure 18
<p>The trend of the average throughput (Mbps) for each UDP connection with only VPN tunnels (MTU = 9000B).</p>
Full article ">Figure 19
<p>The trend of maximum reachable bandwidth (Mbps) for each TCP connection with the underlying tunnel (MTU = 1500B).</p>
Full article ">Figure 20
<p>The trend of maximum reachable bandwidth (Mbps) for each UDP connection with the underlying tunnel (MTU = 1500B).</p>
Full article ">Figure 21
<p>The average reachable throughput (MBps) for each TCP connection with the underlying tunnel (MTU = 1500B).</p>
Full article ">Figure 22
<p>The average reachable throughput (MBps) for each UDP connection with the underlying tunnel (MTU = 1500B).</p>
Full article ">
22 pages, 3002 KiB  
Article
A Performance Analysis of Security Protocols for Distributed Measurement Systems Based on Internet of Things with Constrained Hardware and Open Source Infrastructures
by Antonio Francesco Gentile, Davide Macrì, Domenico Luca Carnì, Emilio Greco and Francesco Lamonaca
Sensors 2024, 24(9), 2781; https://doi.org/10.3390/s24092781 - 26 Apr 2024
Cited by 6 | Viewed by 1573
Abstract
The widespread adoption of Internet of Things (IoT) devices in home, industrial, and business environments has made available the deployment of innovative distributed measurement systems (DMS). This paper takes into account constrained hardware and a security-oriented virtual local area network (VLAN) approach that [...] Read more.
The widespread adoption of Internet of Things (IoT) devices in home, industrial, and business environments has made available the deployment of innovative distributed measurement systems (DMS). This paper takes into account constrained hardware and a security-oriented virtual local area network (VLAN) approach that utilizes local message queuing telemetry transport (MQTT) brokers, transport layer security (TLS) tunnels for local sensor data, and secure socket layer (SSL) tunnels to transmit TLS-encrypted data to a cloud-based central broker. On the other hand, the recent literature has shown a correlated exponential increase in cyber attacks, mainly devoted to destroying critical infrastructure and creating hazards or retrieving sensitive data about individuals, industrial or business companies, and many other entities. Much progress has been made to develop security protocols and guarantee quality of service (QoS), but they are prone to reducing the network throughput. From a measurement science perspective, lower throughput can lead to a reduced frequency with which the phenomena can be observed, generating, again, misevaluation. This paper does not give a new approach to protect measurement data but tests the network performance of the typically used ones that can run on constrained hardware. This is a more general scenario typical for IoT-based DMS. The proposal takes into account a security-oriented VLAN approach for hardware-constrained solutions. Since it is a worst-case scenario, this permits the generalization of the achieved results. In particular, in the paper, all OpenSSL cipher suites are considered for compatibility with the Mosquitto server. The most used key metrics are evaluated for each cipher suite and QoS level, such as the total ratio, total runtime, average runtime, message time, average bandwidth, and total bandwidth. Numerical and experimental results confirm the proposal’s effectiveness in foreseeing the minimum network throughput concerning the selected QoS and security. Operating systems yield diverse performance metric values based on various configurations. The primary objective is identifying algorithms to ensure suitable data transmission and encryption ratios. Another aim is to explore algorithms that ensure wider compatibility with existing infrastructures supporting MQTT technology, facilitating secure connections for geographically dispersed DMS IoT networks, particularly in challenging environments like suburban or rural areas. Additionally, leveraging open firmware on constrained devices compatible with various MQTT protocols enables the customization of the software components, a crucial necessity for DMS. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>MQTT benchmarking architecture.</p>
Full article ">Figure 2
<p>Physical deployment for 4G/LTE, Ethernet, and WiFi testbeds.</p>
Full article ">Figure 3
<p>Algorithm flowchart.</p>
Full article ">Figure 4
<p>WiFi Information for dedicated VLAN BRIDGE IoT.</p>
Full article ">Figure 5
<p>Statistical distribution of delays for TLSv1.2 cipher suites and QoS0 level on Ethernet link and MQTT V3.11.</p>
Full article ">Figure 6
<p>Benchmark of bandwidth for TLSv1.2 cipher suites and all QoS levels on Ethernet link and MQTT V3.11.</p>
Full article ">Figure 7
<p>Benchmark of mean time (in milliseconds) for TLSv1.2 cipher suites and all QoS levels on Ethernet link and MQTT V3.11.</p>
Full article ">Figure 8
<p>Benchmark of bandwidth for TLSv1.2 cipher suites and all QoS levels on WiFi link and MQTT V3.11.</p>
Full article ">Figure 9
<p>Benchmark of bandwidth for TLSv1.2 cipher suites and all QoS levels on WiFi link and MQTT V5.0.</p>
Full article ">Figure 10
<p>Benchmark of bandwidth for TLSv1.2 cipher suites and all QoS levels on 4G link and MQTT V3.11.</p>
Full article ">Figure 11
<p>Benchmark of bandwidth for TLSv1.2 cipher suites and all QoS levels on 4G link and MQTT V5.0.</p>
Full article ">Figure 12
<p>Statistical distribution of delays for TLSv1.2 cipher suites and QoS0 level on 4G link and MQTT V3.</p>
Full article ">Figure 13
<p>Benchmark of bandwidth for TLSv1.3 cipher suites and all QoS levels on WiFi link and MQTT V3.11.</p>
Full article ">Figure 14
<p>Benchmark of bandwidth for TLSv1.3 cipher suites and all QoS levels on WiFi link and MQTT V5.0.</p>
Full article ">Figure 15
<p>Benchmark of bandwidth for TLSv1.3 cipher suites and all QoS levels on 4G link and MQTT V3.11.</p>
Full article ">Figure 16
<p>Benchmark of bandwidth for TLSv1.3 cipher suites and all QoS levels on 4G link and MQTT V5.0.</p>
Full article ">Figure 17
<p>Statistical distribution of delays for TLSv1.3 cipher suites and QoS0 level on 4G link and MQTT V5.</p>
Full article ">
16 pages, 3310 KiB  
Article
Polyvinylidene Fluoride/Aromatic Hyperbranched Polyester of Third-Generation-Based Electrospun Nanofiber as a Self-Powered Triboelectric Nanogenerator for Wearable Energy Harvesting and Health Monitoring Applications
by Ramadasu Gunasekhar, Ponnan Sathiyanathan, Mohammad Shamim Reza, Gajula Prasad, Arun Anand Prabu and Hongdoo Kim
Polymers 2023, 15(10), 2375; https://doi.org/10.3390/polym15102375 - 19 May 2023
Cited by 15 | Viewed by 2264
Abstract
Flexible pressure sensors have played an increasingly important role in the Internet of Things and human–machine interaction systems. For a sensor device to be commercially viable, it is essential to fabricate a sensor with higher sensitivity and lower power consumption. Polyvinylidene fluoride (PVDF)-based [...] Read more.
Flexible pressure sensors have played an increasingly important role in the Internet of Things and human–machine interaction systems. For a sensor device to be commercially viable, it is essential to fabricate a sensor with higher sensitivity and lower power consumption. Polyvinylidene fluoride (PVDF)-based triboelectric nanogenerators (TENGs) prepared by electrospinning are widely used in self-powered electronics owing to their exceptional voltage generation performance and flexible nature. In the present study, aromatic hyperbranched polyester of the third generation (Ar.HBP-3) was added into PVDF as a filler (0, 10, 20, 30 and 40 wt.% w.r.t. PVDF content) to prepare nanofibers by electrospinning. The triboelectric performances (open-circuit voltage and short-circuit current) of PVDF-Ar.HBP-3/polyurethane (PU)-based TENG shows better performance than a PVDF/PU pair. Among the various wt.% of Ar.HBP-3, a 10 wt.% sample shows maximum output performances of 107 V which is almost 10 times that of neat PVDF (12 V); whereas, the current slightly increases from 0.5 μA to 1.3 μA. The self-powered TENG is also effective in measuring human motion. Overall, we have reported a simpler technique for producing high-performance TENG using morphological alteration of PVDF, which has the potential for use as mechanical energy harvesters and as effective power sources for wearable and portable electronic devices. Full article
(This article belongs to the Special Issue Polymer-Based Composites for Biomedical Applications)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>). Schematic explanation of preparation and electrospinning of P-Ar.HBP-3 solution followed by TENG fabrication: (<b>i</b>). preparation of P-Ar.HBP-3 blend solution, (<b>ii</b>). solution blending by constant magnetic stirring, (<b>iii</b>). electrospinning process, (<b>iv</b>). SEM image of electrospun nanofiber and (<b>v</b>). fabricated TENG device. (<b>b</b>). Schematic illustration of triboelectric mechanism.</p>
Full article ">Figure 2
<p>(<b>a</b>). XRD pattern and (<b>b</b>). FTIR spectra of PVDF fibers as well as P-Ar.HBP-3 (0 to 40 wt.%) blended nanofibers. (<b>c</b>). Computed <span class="html-italic">β</span>-phase content variability in P-Ar.HBP-3 (0 to 40 wt.%) blended nanofibers, and (<b>d</b>). Mechanism of <span class="html-italic">β</span>-phase formation in P-Ar.HBP-3 nanofiber.</p>
Full article ">Figure 3
<p>(<b>a</b>,<b>a′</b>). Surface morphologies of neat PVDF (16 wt.%), (<b>b</b>,<b>b′</b>). Surface morphologies of P/HBP-3 (10 wt.%) nanofibers, respectively. (<b>c</b>,<b>d</b>). EDS and elemental mapping of P-Ar.HBP-3 (10 wt.%) nanofiber, respectively. (<b>e</b>). Map spectrum of elements in P-Ar.HBP-3 (10 wt.%) nanofiber and (<b>f</b>–<b>h</b>). Energy-dispersive spectral images of carbon, fluorine and oxygen elements, respectively.</p>
Full article ">Figure 4
<p>(<b>a</b>–<b>d</b>). Time-dependent <span class="html-italic">V</span><sub>OC</sub> and <span class="html-italic">I</span><sub>SC</sub> graphs of PVDF and P-Ar.HBP-3/PU (10 wt.%)-based TENG under constant frequency of 1 Hz and load of 10 N, respectively. (<b>e</b>,<b>f</b>). Output performances (<span class="html-italic">V</span><sub>OC</sub> and <span class="html-italic">I</span><sub>SC</sub>) of P/PU and P-Ar.HBP-3/PU (10 wt.%)-based TENG device as a function of load 5–10 N). (<b>g</b>). Rectified voltage of P-Ar.HBP-3/PU (10 wt.%)-based TENG (<b>h</b>). P-Ar.HBP-3/PU (10 wt.%)-based TENG device energy storage with various capacitors (2.2–22 μF) with charging cycles. (<b>i</b>). Circuit diagram for LED application. (<b>j</b>,<b>k</b>). Images of 12 LEDs before and after connecting P-Ar.HBP-3/PU (10 wt.%)-based TENG.</p>
Full article ">Figure 5
<p>Real-time monitoring of P-Ar.HBP-3/PU (10 wt.%)-based TENG: (<b>a</b>). Sensitivity efficiency under various physical deformations of the sensor (tapping, twisting, bending, and folding), (<b>b</b>). Sensor’s performance when used as a finger ring, (<b>c</b>). Detection of punching intensity, (<b>d</b>). Sensitivity of the joint-bending when the sensor is placed at elbow flexion, (<b>e</b>). Smart chair health care, (<b>f</b>). Detecting and differentiating the intensities of slow and fast coughing pattern while the sensor is used on mouth mask, (<b>g</b>–<b>i</b>). Motion detection and differentiation (hand moment, leg moment, walk and jump) when the sensor is placed on pocket, knee and shoe insole, respectively for human health motion applications.</p>
Full article ">
23 pages, 5212 KiB  
Article
HomeMonitor: An Enhanced Device Event Detection Method for Smart Home Environment
by Meng Zhao, Jie Chen, Zhikai Yang, Yaping Liu and Shuo Zhang
Sensors 2022, 22(23), 9389; https://doi.org/10.3390/s22239389 - 1 Dec 2022
Cited by 1 | Viewed by 1749
Abstract
As more and more smart devices are deployed in homes, the communication between these smart home devices and elastic computing services may face some risks of privacy disclosure. Different device events (such as the camera on, video on, etc.) will generate different data [...] Read more.
As more and more smart devices are deployed in homes, the communication between these smart home devices and elastic computing services may face some risks of privacy disclosure. Different device events (such as the camera on, video on, etc.) will generate different data traffic during communication. However, the current smart home system lacks monitoring of these device events, which may cause the disclosure of private data collected by these devices. In this paper, we present our device event monitor system, HomeMonitor. HomeMonitor runs in the OpenWRT system and supports complete event monitoring for smart home devices. HomeMoitor solves the problem that machine learning models for detecting device events do not scale flexibly. It uses the network packet size and the direction of the device event for unique identification during training. When detecting, it only needs to get the packet size and timestamp and then query the policy table for signature matching to control the device events. We evaluated the effectiveness of HomeMonitor, and the experiments show that the match rate of our method is 98.8%, the false positive rate is 1.8%, and the detection time is only 16.67% for PINBALL. The results mean that our method achieves the balance of applicable protocol scope, detection performance, and detection accuracy. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

Figure 1
<p>Smart home privacy threats.</p>
Full article ">Figure 2
<p>Wemo-plug on-signature.</p>
Full article ">Figure 3
<p>Signature detection process in PINGPONG.</p>
Full article ">Figure 4
<p>Signature detection process in PINBALL.</p>
Full article ">Figure 5
<p>Signature detection process in DESEND+.</p>
Full article ">Figure 6
<p>HomeMonitor architecture.</p>
Full article ">Figure 7
<p>Packet capture framework.</p>
Full article ">Figure 8
<p>DESEND+ in a real environment with the topology.</p>
Full article ">Figure 9
<p>Device matching experiment.</p>
Full article ">Figure 10
<p>Event detection experiment.</p>
Full article ">Figure 11
<p>Max_time parameter experiment.</p>
Full article ">Figure 12
<p>Fix parameter experiment.</p>
Full article ">Figure 13
<p>Time consumption comparison.</p>
Full article ">Figure 14
<p>Lenovo R1 View the video unsuccessful.</p>
Full article ">Figure 15
<p>Device event detection.</p>
Full article ">
27 pages, 6047 KiB  
Article
A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment
by Antonio Francesco Gentile, Davide Macrì, Floriano De Rango, Mauro Tropea and Emilio Greco
Future Internet 2022, 14(9), 264; https://doi.org/10.3390/fi14090264 - 13 Sep 2022
Cited by 14 | Viewed by 5437
Abstract
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet. VPN is currently one of the most reliable technologies to achieve this goal, also because being a consolidated technology, it is possible [...] Read more.
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet. VPN is currently one of the most reliable technologies to achieve this goal, also because being a consolidated technology, it is possible to apply appropriate patches to remedy any security holes. In this paper we analyze the performances of open source firmware OpenWrt 21.x compared with a server-side operating system (Debian 11 x64) and Mikrotik 7.x, also virtualized, and different types of clients (Windows 10/11, iOS 15, Android 11, OpenWrt 21.x, Debian 11 x64 and Mikrotik 7.x), observing the performance of the network according to the current implementation of the various protocols and algorithms of VPN tunnel examined on what are the most recent HW and SW for deployment in outdoor locations with poor network connectivity. Specifically, operating systems provide different performance metric values for various combinations of configuration variables. The first pursued goal is to find the algorithms to guarantee a data transmission/encryption ratio as efficiently as possible. The second goal is to research the algorithms capable of guaranteeing the widest spectrum of compatibility with the current infrastructures that support VPN technology, to obtain a connection system secure for geographically scattered IoT networks spread over difficult-to-manage areas such as suburban or rural environments. The third goal is to be able to use open firmware on constrained routers that provide compatibility with different VPN protocols. Full article
(This article belongs to the Special Issue Security and Privacy in Blockchains and the IoT II)
Show Figures

Figure 1

Figure 1
<p>A publish/subscribe scenario from Mikrotik to OpenWRT MQTT Broker.</p>
Full article ">Figure 2
<p>Site to Site VPN Scenario.</p>
Full article ">Figure 3
<p>Site to Multi Site VPN Scenario.</p>
Full article ">Figure 4
<p>Site to Road Warriors VPN Scenario.</p>
Full article ">Figure 5
<p>Generic VPN Deploy Topology.</p>
Full article ">Figure 6
<p>Comparison of the average Throughput in IKEv1-L2TP Road Warriors scenario.</p>
Full article ">Figure 7
<p>Comparison of the average Throughput in IPsec XAUTH Road Warriors scenario.</p>
Full article ">Figure 8
<p>Comparison of the average Throughput in IKEv2-EAP Road Warriors scenario.</p>
Full article ">Figure 9
<p>Comparison of the average Throughput in IPsec IKEv2 X509 Road Warriors scenario.</p>
Full article ">Figure 10
<p>Comparison of the average Throughput in OpenConnect Road Warriors scenario.</p>
Full article ">Figure 11
<p>Comparison of the average Throughput in SSTP Road Warriors scenario.</p>
Full article ">Figure 12
<p>Comparison of the average Throughput in OpenVPN Road Warriors scenario.</p>
Full article ">Figure 13
<p>Comparison of the average Throughput in Wireguard Road Warriors scenario.</p>
Full article ">Figure 14
<p>Comparison of Throughputs on iPhone 8 in all scenarios.</p>
Full article ">Figure 15
<p>Comparison of Throughputs on iPhone 11 in all scenarios.</p>
Full article ">Figure 16
<p>Comparison of Throughputs on Android 11 in all scenarios.</p>
Full article ">Figure 17
<p>Comparison of Throughputs on Mikrotik 7 in all scenarios.</p>
Full article ">Figure 18
<p>Comparison of Throughputs on Raspberry Pi 2 in all scenarios.</p>
Full article ">Figure 19
<p>Comparison of Throughputs on OpenWRT 21 in all scenarios.</p>
Full article ">Figure 20
<p>Comparison of Throughputs on Windows 10 in all scenarios.</p>
Full article ">Figure 21
<p>Throughput of OpenVPN using different encryption algorithms.</p>
Full article ">Figure 22
<p>RTT of the OpenWRT VPN using different encryption algorithms.</p>
Full article ">Figure 23
<p>Phy Rate, Average and Peak measured on deployed scenarios.</p>
Full article ">Figure 24
<p>RTT data collected during the VPN connection tests with wired devices.</p>
Full article ">Figure 25
<p>RTT data collected during the VPN connection tests with wireless devices.</p>
Full article ">Figure 26
<p>Throughputs data collected during the VPN connection tests with wireless devices.</p>
Full article ">Figure 27
<p>Throughputs data collected during the VPN connection tests with wired devices.</p>
Full article ">Figure 28
<p>Comparison of Throughputs on OpenWrt in all scenarios.</p>
Full article ">
18 pages, 626 KiB  
Article
Towards Enhancing Coding Productivity for GPU Programming Using Static Graphs
by Leonel Toledo, Pedro Valero-Lara, Jeffrey S. Vetter and Antonio J. Peña
Electronics 2022, 11(9), 1307; https://doi.org/10.3390/electronics11091307 - 20 Apr 2022
Cited by 2 | Viewed by 2301
Abstract
The main contribution of this work is to increase the coding productivity of GPU programming by using the concept of Static Graphs. GPU capabilities have been increasing significantly in terms of performance and memory capacity. However, there are still some problems in terms [...] Read more.
The main contribution of this work is to increase the coding productivity of GPU programming by using the concept of Static Graphs. GPU capabilities have been increasing significantly in terms of performance and memory capacity. However, there are still some problems in terms of scalability and limitations to the amount of work that a GPU can perform at a time. To minimize the overhead associated with the launch of GPU kernels, as well as to maximize the use of GPU capacity, we have combined the new CUDA Graph API with the CUDA programming model (including CUDA math libraries) and the OpenACC programming model. We use as test cases two different, well-known and widely used problems in HPC and AI: the Conjugate Gradient method and the Particle Swarm Optimization. In the first test case (Conjugate Gradient) we focus on the integration of Static Graphs with CUDA. In this case, we are able to significantly outperform the NVIDIA reference code, reaching an acceleration of up to 11× thanks to a better implementation, which can benefit from the new CUDA Graph capabilities. In the second test case (Particle Swarm Optimization), we complement the OpenACC functionality with the use of CUDA Graph, achieving again accelerations of up to one order of magnitude, with average speedups ranging from 2× to 4×, and performance very close to a reference and optimized CUDA code. Our main target is to achieve a higher coding productivity model for GPU programming by using Static Graphs, which provides, in a very transparent way, a better exploitation of the GPU capacity. The combination of using Static Graphs with two of the current most important GPU programming models (CUDA and OpenACC) is able to reduce considerably the execution time w.r.t. the use of CUDA and OpenACC only, achieving accelerations of up to more than one order of magnitude. Finally, we propose an interface to incorporate the concept of Static Graphs into the OpenACC Specifications. Full article
(This article belongs to the Special Issue Emerging Technologies of High-Performance and Parallel Computing)
Show Figures

Figure 1

Figure 1
<p>Graph configuration for the NVIDIA CG reference code (<b>left</b>) and optimized approach (<b>right</b>).</p>
Full article ">Figure 2
<p>Top figure: execution time of the three different CG versions: NVIDIA reference code (<a href="#electronics-11-01307-listing001" class="html-boxed-text">Listing 1</a>) in red color, optimized version using CUDA Graph (<a href="#electronics-11-01307-listing002" class="html-boxed-text">Listing 2</a>) in blue color, and optimized version without using CUDA Graph (in yellow color). Bottom figure: speedup achieved by the optimized version using CUDA Graph (<a href="#electronics-11-01307-listing002" class="html-boxed-text">Listing 2</a>) w.r.t. the NVIDIA version (<a href="#electronics-11-01307-listing001" class="html-boxed-text">Listing 1</a>).</p>
Full article ">Figure 3
<p>Execution time (<math display="inline"><semantics> <mi mathvariant="sans-serif">μ</mi> </semantics></math>s) comparison between sequential, OpenACC, OpenACC and CUDA Graph and CUDA implementations of the PSO algorithm.</p>
Full article ">Figure 4
<p>Execution time (<math display="inline"><semantics> <mi mathvariant="sans-serif">μ</mi> </semantics></math>s) increasing the size of the population and keeping the number of iterations (100) constant.</p>
Full article ">Figure 5
<p>Execution time (<math display="inline"><semantics> <mi mathvariant="sans-serif">μ</mi> </semantics></math>s) increasing the number of iterations and keeping constant the size of the population (1024 particles).</p>
Full article ">Figure 6
<p>OpenACC static graph API mapping on the CUDA programming model.</p>
Full article ">
13 pages, 1369 KiB  
Article
Utilization of SDN Technology for Flexible EtherCAT Networks Applications
by Ireneusz Smołka and Jacek Stój
Sensors 2022, 22(5), 1944; https://doi.org/10.3390/s22051944 - 2 Mar 2022
Cited by 9 | Viewed by 3180
Abstract
At the beginning of the current century, Ethernet-based communication networks began to be implemented in industrial applications. Some previously used protocols were migrated to Ethernet networks, while many others were strictly developed for this communication medium. Numerous industrial Ethernet protocols do not deliver [...] Read more.
At the beginning of the current century, Ethernet-based communication networks began to be implemented in industrial applications. Some previously used protocols were migrated to Ethernet networks, while many others were strictly developed for this communication medium. Numerous industrial Ethernet protocols do not deliver all the capabilities provided by the Ethernet. For example, limitations may arise associated with wireless communication, use of dedicated switching devices, or operation solely for certain topologies. On the other hand, new technologies are now available, such as software defined networks (SDN), that add new features to Ethernet-based communication systems. In this paper, an EtherCAT network in combination with SDN is analyzed. EtherCAT network may only consist of devices with an implemented EtherCAT protocol stack. Therefore, regular Ethernet switches cannot typically be used in this network and, hence, special network infrastructure may be required to create topologies other than standard line topology. It is shown, however, that this limitation can be overcome by the application of SDN. In addition, a definition of datagram forwarding rules (called SDN flows here) is given, and we demonstrate that EtherCAT datagrams can be sent through routes that are required for proper EtherCAT network operation. Full article
(This article belongs to the Topic Recent Advances in Robotics and Networks)
Show Figures

Figure 1

Figure 1
<p>Schematic showing the EtherCAT network, the topology for which is always a logical ring.</p>
Full article ">Figure 2
<p>Schematic of the EtherCAT network, in a typical line topology configuration, used during the experimental research. The encircled digit “1” denotes the ET2000 probe location (measurements point no. 1).</p>
Full article ">Figure 3
<p>Depiction of the EtherCAT over SDN (EOS) network solution in a star topology. The encircled digits “1” to “4” denote the ET2000 probe locations (measurements points no. 1 to 4).</p>
Full article ">Figure 4
<p>Histogram showing the update time of the EtherCAT ESC in a network without the SDN.</p>
Full article ">Figure 5
<p>Histograms for the EtherCAT with SDN: (<b>a</b>) measurements taken at point no. 1, which provide the latency time for datagram routing through all the devices, and (<b>b</b>) measurements at points no. 1 through 4.</p>
Full article ">
16 pages, 1230 KiB  
Article
Detection of Misconfigured BYOD Devices in Wi-Fi Networks
by Jaehyuk Choi
Appl. Sci. 2020, 10(20), 7203; https://doi.org/10.3390/app10207203 - 15 Oct 2020
Cited by 5 | Viewed by 2478
Abstract
As Bring Your Own Device (BYOD) policy has become widely accepted in the enterprise, anyone with a mobile device that supports Wi-Fi tethering can provide an active wireless Internet connection to other devices without restriction from network administrators. Despite the potential benefits of [...] Read more.
As Bring Your Own Device (BYOD) policy has become widely accepted in the enterprise, anyone with a mobile device that supports Wi-Fi tethering can provide an active wireless Internet connection to other devices without restriction from network administrators. Despite the potential benefits of Wi-Fi tethering, it raises new security issues. The open source nature of mobile operating systems (e.g., Google Android or OpenWrt) can be easily manipulated by selfish users to provide an unfair advantage throughput performance to their tethered devices. The unauthorized tethering can interfere with nearby well-planned access points (APs) within Wi-Fi networks, which results in serious performance problems. In this paper, we first conduct an extensive evaluation study and demonstrate that the abuse of Wi-Fi tethering that adjusts the clear channel access parameters has strong adverse effects in Wi-Fi networks, while providing the manipulated device a high throughput gain. Subsequently, an online detection scheme diagnoses the network condition and detects selfish tethering devices by passively exploiting the packet loss information of on-going transmissions. Our evaluation results show that the proposed method accurately distinguishes the manipulated tethering behavior from other types of misbehavior, including the hidden node problem. Full article
(This article belongs to the Special Issue Wireless Communication: Applications, Security and Reliability)
Show Figures

Figure 1

Figure 1
<p>Illustration of the problem: a misbehaving unauthorized Wi-Fi tethering sets up the network in a managed multi-access point (AP) network.</p>
Full article ">Figure 2
<p>Adversary model: selfish behavior with Clear Channel Assessment (CCA) manipulation will not freeze its back-off counter even if other nodes are transmitting.</p>
Full article ">Figure 3
<p>(<b>a</b>) PHY capture effect allows a receiver to successfully capture the signal of interest (SoI) if its Tx power is sufficiently higher than the sum of interferences. (<b>b</b>) MIM (Message-In-Message) allows for a receiver to disengage from an ongoing packet reception, and engage in a new, stronger packet.</p>
Full article ">Figure 4
<p>AP Interference graph of two simulated topologies.</p>
Full article ">Figure 5
<p>Impact of selfish carrier sense on throughput of transport-layer protocols over various cellular backhaul link capacities <math display="inline"><semantics> <msub> <mi>B</mi> <mrow> <mi>c</mi> <mi>e</mi> <mi>l</mi> </mrow> </msub> </semantics></math> for tethering in two multi-AP topologies.</p>
Full article ">Figure 6
<p>Impact of launching tethering on a partial-overlapped channel.</p>
Full article ">Figure 7
<p>Throughput comparison with selfish configurations of the <math display="inline"><semantics> <mrow> <mi>C</mi> <msub> <mi>W</mi> <mrow> <mi>m</mi> <mi>i</mi> <mi>n</mi> </mrow> </msub> </mrow> </semantics></math> parameter.</p>
Full article ">Figure 8
<p>Throughput gain of selfish carrier sensing over various cellular backhaul link capacities and AP densities.</p>
Full article ">Figure 9
<p>The dynamics of CUBIA toward three difference types of frame losses.</p>
Full article ">Figure 10
<p>Impact of selfish intensity on the performance of well-behaving nodes.</p>
Full article ">Figure 11
<p>Impact of <math display="inline"><semantics> <msub> <mi>B</mi> <mrow> <mi>c</mi> <mi>e</mi> <mi>l</mi> </mrow> </msub> </semantics></math> on detection time.</p>
Full article ">Figure 12
<p>Impact of the first alarm threshold <math display="inline"><semantics> <msub> <mi>θ</mi> <mrow> <mi>A</mi> <mi>S</mi> </mrow> </msub> </semantics></math> on detection time for UDP and TCP protocols with <math display="inline"><semantics> <msub> <mi>B</mi> <mrow> <mi>c</mi> <mi>e</mi> <mi>l</mi> </mrow> </msub> </semantics></math> = 20 Mbps.</p>
Full article ">Figure 13
<p>Impact of the second alarm threshold <math display="inline"><semantics> <msub> <mi>θ</mi> <mi>S</mi> </msub> </semantics></math> for the given <math display="inline"><semantics> <msub> <mi>θ</mi> <mrow> <mi>A</mi> <mi>S</mi> </mrow> </msub> </semantics></math> = 3 on detection time with <math display="inline"><semantics> <msub> <mi>B</mi> <mrow> <mi>c</mi> <mi>e</mi> <mi>l</mi> </mrow> </msub> </semantics></math> = 20 Mbps.</p>
Full article ">
19 pages, 7831 KiB  
Article
Analysis of Wave Distribution Simulated by WAVEWATCH-III Model in Typhoons Passing Beibu Gulf, China
by Weizeng Shao, Yexin Sheng, Huan Li, Jian Shi, Qiyan Ji, Wei Tan and Juncheng Zuo
Atmosphere 2018, 9(7), 265; https://doi.org/10.3390/atmos9070265 - 15 Jul 2018
Cited by 34 | Viewed by 5928
Abstract
The Beibu Gulf is an important offshore region in the South China Sea for the fishing industry and other human activities. In 2017, typhoons Doksuri and Khanun passed the Beibu Gulf in two paths, at maximum wind speeds of up to 50 m/s. [...] Read more.
The Beibu Gulf is an important offshore region in the South China Sea for the fishing industry and other human activities. In 2017, typhoons Doksuri and Khanun passed the Beibu Gulf in two paths, at maximum wind speeds of up to 50 m/s. Typhoon Doksuri passed the Beibu Gulf through the open waters of the South China Sea and Typhoon Khanun moved towards the Beibu Gulf through the narrow Qiongzhou Strait. The aim of this study is to analyze the typhoon-induced wave distribution in the Beibu Gulf. WAVEWATCH-III (WW3) is a third-generation numeric wave model developed by the National Oceanic and Atmospheric Administration (NOAA), which has been widely used for sea wave research. The latest version of the WW3 (5.16) model provides three packages of nonlinear term for four wave components (quadruplets) wave–wave interactions, including Discrete Interaction Approximation (DIA), Full Boltzmann Integral (WRT), and Generalized Multiple DIA (GMD) with two kinds of coefficients, herein called GMD1 and GMD2. These four packages have been conveniently implemented for simulating wave fields in two typhoons after taking winds from the European Centre for Medium-Range Weather Forecasts (ECMWF) at 0.125° grids as the forcing fields. It was found that the GMD2 package was the recommended option of the nonlinear term for quadruplets wave–wave interactions due to the minimum error when comparing a number of simulated results from the WW3 model with significant wave height (SWH) from ECMWF and altimeter Jason-2. Then the wave distribution simulated by the WW3 model employing the GMD2 package was analyzed. In the case of Typhoon Doksuri, wind-sea dominated in the early and middle stages while swell dominated at the later stage. However, during Typhoon Khanun, wind-sea dominated throughout and swell distributed outside the bay around the east of Hainan Island, because the typhoon-induced swell at mesoscale was difficult to propagate into the Beibu Gulf through the narrow Qiongzhou Strait. Full article
(This article belongs to the Special Issue Storms, Jets and Other Meteorological Phenomena in Coastal Seas)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) the bathymetric topography of the South China Sea, in which the black lines represent the track of typhoons Doksuri and Khanun, and the colored points represent the maximum wind speed of typhoons. The area inside the black rectangular box is the geographic location of the analyzed area; (<b>b</b>) the bathymetric topography of the analyzed area corresponds to the black rectangular box in <a href="#atmosphere-09-00265-f001" class="html-fig">Figure 1</a>a.</p>
Full article ">Figure 2
<p>The maps of the European Centre for Medium-Range Weather Forecasts (ECMWF) winds overlaid with footprints of satellite altimeter Jason-2. (<b>a</b>) wind speed map on 13 September 2017 at 12:00 p.m. UTC during Typhoon Doksuri; and (<b>b</b>) wind speed map on 15 October 2017 at 6:00 p.m. UTC during Typhoon Khanu.</p>
Full article ">Figure 3
<p>The maps of ECMWF significant wave height (SWH) overlaid with footprints of satellite altimeter Jason-2. (<b>a</b>) SWH map on 13 September 2017 at 12:00 p.m. UTC during Typhoon Doksuri; and (<b>b</b>) SWH map on 15 October 2017 at 6:00 p.m. UTC during Typhoon Khanun.</p>
Full article ">Figure 4
<p>The simulated SWH maps using the three packages of nonlinear term for quadruplets wave–wave interactions in Typhoon Doksuri at 12:00 a.m. UTC on 15 September 2017. (<b>a</b>) simulated results using the Discrete Interaction Approximation (DIA) package; (<b>b</b>) simulated results using the Webb–Resio–Tracy (WRT) package; (<b>c</b>) simulated results using the GMD1 package; (<b>d</b>) simulated results using the GMD2 package.</p>
Full article ">Figure 5
<p>The simulated SWH maps using the three packages of nonlinear term for quadruplets wave–wave interactions in Typhoon Khanun at 12:00 a.m. UTC on 15 October 2017. (<b>a</b>) simulated results using the DIA package; (<b>b</b>) simulated results using the WRT package; (<b>c</b>) simulated results using the GMD1 package; (<b>d</b>) simulated results using the GMD2 package.</p>
Full article ">Figure 6
<p>The comparisons between simulated results and SWH from ECMWF, in which the color represents the amount of data. (<b>a</b>) simulated results using the DIA package; (<b>b</b>) simulated results using the WRT package; (<b>c</b>) simulated results using the GMD1 package; (<b>d</b>) simulated results using the GMD2 package.</p>
Full article ">Figure 7
<p>The comparisons between simulated results and measurements from altimeter Jason-2, in which the color represents the amount of data points. (<b>a</b>) Simulated results using the DIA package; (<b>b</b>) simulated results using the WRT package; (<b>c</b>) simulated results using the GMD1 package; (<b>d</b>) simulated results using the GMD2 package.</p>
Full article ">Figure 8
<p>The wave energy density at the point (19.5° N, 107.5° E) in Typhoon Doksuri at 6:00 a.m. UTC on 16 September 2017.</p>
Full article ">Figure 9
<p>The wave energy density at the point (19.5° N, 107.5° E) in Typhoon Khanun at 6:00 a.m. UTC on 16 October 2017.</p>
Full article ">Figure 10
<p>The distribution of wave at 6:00 a.m. UTC on 16 September 2017 during Typhoon Doksuri. (<b>a</b>) the distribution of total SWH; (<b>b</b>) the distribution of wind-sea portion; (<b>c</b>) the distribution of swell portion.</p>
Full article ">Figure 11
<p>The distribution of wave at 6:00 a.m. UTC on 16 September 2017 during Typhoon Khanun. (<b>a</b>) the distribution of total SWH; (<b>b</b>) the distribution of wind-sea portion; (<b>c</b>) the distribution of swell portion.</p>
Full article ">Figure 12
<p>The time series at the point (19.5° N, 107.5° E) from 1 September 2017 to 31 October 2017. (<b>a</b>) SWH; (<b>b</b>) wind-sea; and (<b>c</b>) swell.</p>
Full article ">Figure 13
<p>Daily mean wind-sea fraction of Typhoon Doksuri from 12 September 2017 to 16 September 2017. (<b>a</b>) on 12 September; (<b>b</b>) on 13 September; (<b>c</b>) on 14 September; (<b>d</b>) on 15 September; and (<b>e</b>) on 16 September.</p>
Full article ">Figure 14
<p>Daily mean wind-sea fraction of Typhoon Khanun from 12 October 2017 to 16 October 2017. (<b>a</b>) on 12 September; (<b>b</b>) on 13 September; (<b>c</b>) on 14 September; (<b>d</b>) on 15 September; and (<b>e</b>) on 16 September.</p>
Full article ">
2381 KiB  
Article
TESMA: Requirements and Design of a Tool for Educational Programs
by Nicolas Guelfi, Benjamin Jahic and Benoît Ries
Information 2017, 8(1), 37; https://doi.org/10.3390/info8010037 - 22 Mar 2017
Cited by 3 | Viewed by 7276
Abstract
Defining and managing teaching programs at universities or other institutions is a complex task for which there is not much support in terms of methods and tools. This task becomes even more critical when the time comes to obtain certifications w.r.t. official standards. [...] Read more.
Defining and managing teaching programs at universities or other institutions is a complex task for which there is not much support in terms of methods and tools. This task becomes even more critical when the time comes to obtain certifications w.r.t. official standards. In this paper, we present an on-going project called TESMA, whose objective is to provide an open-source tool dedicated to the specification and management (including certification) of teaching programs. An in-depth market analysis regarding related tools and conceptual frameworks of the project is presented. This tool has been engineered using a development method called Messir for its requirements elicitation and introduces a domain-specific language dedicated to the teaching domain. This paper presents the current status of this project and the future activities planned. Full article
(This article belongs to the Special Issue Applications in Information Technology)
Show Figures

Figure 1

Figure 1
<p>TESMA summary use-case model.</p>
Full article ">Figure 2
<p>TESMA concepts.</p>
Full article ">Figure 3
<p>Architectural components overview.</p>
Full article ">Figure 4
<p>TESMA grammar.</p>
Full article ">Figure 5
<p>TESMA file generation.</p>
Full article ">Figure 6
<p>An example of course specification in the TESMA textual editor.</p>
Full article ">Figure 7
<p>Generated course in Moodle.</p>
Full article ">Figure 8
<p>Generated course description in PDF.</p>
Full article ">
Back to TopTop