Search results

Filter

Filetype

Your search for "*" yielded 530072 hits

Performance Evaluation of QUIC vs TCP for Cloud Control Systems

QUIC is a UDP-based transport layer protocol developed by Google that boasts lower latency performance than TCP. However, different conclusions have been reported regarding its performance due to variations in targeted applications and experimental setups. This leads to our conclusion that protocol performance evaluation should be heavily dependent on the QoS requirements of the target application

Punctual Cloud: Achieving Punctuality for Time-Critical Cloud Control Systems

Cloud Control Systems (CCSs) harness the power of cloud resources to carry out intense computational tasks, however, they face challenges in delivering time-critical control signals due to network and cloud-induced delays. In this paper, we introduce a novel framework, "Punctual Cloud", designed to enhance the timely delivery of control signals in CCS. This framework ensures that control signals a

Comparative microRNA profiling of Trypanosoma cruzi infected human cells

Introduction: Trypanosoma cruzi, the causative agent of Chagas disease, can infect almost any nucleated cell in the mammalian host. Although previous studies have described the transcriptomic changes that occur in host cells during parasite infection, the understanding of the role of post-transcriptional regulation in this process is limited. MicroRNAs, a class of short non-coding RNAs, are key pl

Detecting and Mitigating Actuator Attacks on Cloud Control Systems through Digital Twins

Recently, the industry has been driven to move industrial control systems to the cloud due to the significant advantages it offers in terms of storage and computing resources. However, this shift also brings forth significant security challenges. By moving control systems to the cloud, the potential for attackers to infiltrate the system and launch damaging attacks increases. These attacks can res

Implementation of Sequential Detection of Replay Attacks for a Cloud Native Controller

This paper focuses on the investigation of a sequential detection policy for combating the effect of the replay attack on a cloud-native controller. In reply attacks, an external attacker records true signals for some time duration and replays them later. The effect of such an attack is mitigated by adding random signals to the optimal control signal before the actuation process, which is known as

Norm compliance in an uncertain world

In many situations, pro-social norms govern behavior. While the existence of a pro-social norm may be clear to someone entering the situation, it is often less clear precisely how much effort is required in order to comply with the norm. We investigate how people react to uncertainty about which effort level implements the prevailing norm using a modified version of the dictator game. Since the be

Malign foreign interference and information influence on video game platforms: Understanding the adversarial playbook

Vi lever i en tid där omfattningen av otillbörlig kognitiv informationspåverkan från främmande makt med syfte att påverka människors uppfattningar, beteenden och beslut ökar. Särskild uppmärksamhet har riktats mot sociala mediers betydelse ochpotentiella effekter. Men det finns en stor digital sektor som hamnat utanför strålkastarljuset – dataspel inklusive de plattformar och sociala aktiviteter s

Hydrological response of sedum-moss roof

Eco-roofs are becoming popular for aesthetic reasons and also as units of stormwater systems. It is thought that such roofs with soil cover and vegetation reduces the total runoff, the peak flows and improves the quality of the roof water. Here are reported investigations of runoff from thin, 3-4 cm soil, extensive green roofs with sedum-moss in southern Sweden. The two-year study was performed on

A decision support system for watershed flood design purpose in China

The paper presents a computer-based decision support system for watershed planning and flood design purposes including a conceptual rainfall-runoff model. The software package uses up-to-date programing techniques in Windows environment which makes it flexible to handle, adaptable to new areas, and easy to test for different design criteria. The package is suitable for design problems in small as

Environmental Ambitions Meet Industry Protection : The Swedish Approach to Energy Taxation

Since the 1990s, economic policy instruments have become increasingly important to Swedish climate policy. To understand the characteristics of current systems, this paper presents an analysis of the development of economic policy instruments since the 1950s, with a focus on Swedish industry. Since the introduction of energy taxation, industry has received preferential treatment in the interests o

Early life exposure to cigarette smoking and adult and old-age male mortality: Evidence from linked US full-count census and mortality data

Background: Smoking is a leading cause of premature death across contemporary developed nations, but few longitudinal individual-level studies have examined the long-term health consequences of exposure to smoking.Objective: We examine the effect of fetal and infant exposure to exogenous variation in smoking, brought about by state-level cigarette taxation, on adulthood and old-age mortality (ages

No title

The chapter extends the concept of the uncanny to conceptualize the affective experience which arises when our most intimate space, the home, is permeated with connected sensors and new machine vision technologies. This range of experience, we argue, which is intimately linked to the current age of ubiquitous computing and smart technologies, can be understood through the category of the technolog

Commentary on Renewed Swedish Censorship Laws (1684)

The first general censorship regulations in Sweden were issued in 1661 and 1662. Due to poor compliance and the expansion of the book market, they were repeated and reinforced in a renewed censorship statute in 1684. This was supplemented in 1688 with instructions for a newly established separate censorial office. Together, these two frameworks laid the foundation for the control of the book marke