An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Jian Wang, Camillo Gentile, Peter B. Papazian, Jae-Kark Choi, Jelena Senic
The most salient feature differentiating millimeter-wave communication systems from their predecessors will be the steerable pencilbeam antennas at the transceivers. As opposed to conventional widebeam antennas, only a few multipath components will be
AbstractIn this paper a new approach which is based on a collaborative system of MicroGrids (MGs), is proposed to enable household appliance scheduling. To achieve this, appliances are categorized into flexible and non-flexible Deferrable Loads (DLs)
The deployment of a large number of small cells poses new challenges to energy efficiency, which has often been ignored in fifth generation (5G) cellular networks. While massive multiple-input multiple outputs (MIMO) will reduce the transmission power at
With the anticipated deployment of new advanced technologies and smart devices in the next generation electric system, developing a robust wireless network along with effective design architectures for inter/intra communications between various entities
Dhananjay Anand, Allen R. Goldstein, Alison Silverstein, Laurie Miller, Francis Tuffner, Yuri Makarov
Data from synchrophasor devices like phasor measurement units (PMU) is increasingly being used to enhance and improve power grid operations, analysis, and planning applications. However, PMU data often arrive at the application with a variety of data
A major challenge facing future grid systems is to identify the source of abnormal behaviors caused by faults or voltage instability. In this paper Phasor Measurement Units (PMUs) have been considered for detecting disturbances and degradation in the grid
In recent years the IETF has been making a range of efforts to secure the email infrastructure and its use. Infrastructure protection includes source authentication by RFC 7208 Sender Policy Framework (SPF), message integrity authentication by RFC 6376
Supply chain management is critically dependent on trusted email with authentication systems that work on a global scale. Solutions to date have not adequately addressed the issues of email forgery, confidentiality, and sender authenticity. The IETF DANE
IEEE 802.15.6 is a radio interface standard for a wireless connectivity of wearable and implantable sensors and actuators located inside or in close proximity to the human body i.e. Body Area Network (BAN). Medical applications requirements impose
A major problem of the grid system is identifying the source of abnormal behaviors. It is particularly important to identify the areas in which the grid system suffers from power deficiencies due to fault or voltage instability. Phasor Measurement Units
Camillo Gentile, Jelena Senic, Peter B. Papazian, Jae-Kark Choi, Kate Remley
Conventional pathloss models are based on the received power from an omnidirectional antenna. Millimeter-wave receivers, conversely, will feature highly directional antennas that can be steered towards the angle with maximum power, exploiting their high
This bulletin summarizes the information presented in NIST SP 800-177: Trustworthy Email. This publication gives recommendations and guidelines for enhancing trust in email. This guideline applies to federal IT systems and will also be useful for any small
Systems are integrations of devices or component elements and even other systems. The notion of a system comprehends engineered and biological or mechanical or physical systems. Examples include information and dynamical systems as well as integrations of
Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack
Ramaswamy Chandramouli, Simson L. Garfinkel, J. S. Nightingale, Scott W. Rose
This document gives recommendations and guidelines for enhancing trust in email. The primary audience includes enterprise email administrators, information security specialists and network managers. This guideline applies to federal IT systems and will
Nader Moayeri, Mustafa O. Ergin, Filip Lemic, Vlado Handziski, Adam Wolisz
This paper describes a major effort to collect smartphone data useful for indoor localization. Data has been collected with four Android phones according to numerous scenarios in each of four large buildings. The data includes time-stamped traces of
Cooperative linear dispersion coding (LDC) can support arbitrary configurations of source nodes and destination nodes in virtual multi-input multi-output (MIMO) systems. In this paper, we investigate two spatial diversity applications of cooperative LDC
Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal
Diversity as a security mechanism has received revived interest recently due to its potential for improving the resilience of software and networks against unknown attacks. Recent work show diversity can be modeled and quantified as a security metric at
Sergio Camara, Dhananjay Anand, Victoria Yan Pillitteri, Luiz F. Carmo
Multicast authentication of synchrophasor data is challenging due to the design requirements of electric power monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf
Linear dispersion codes (LDC) can support arbitrary configurations of transmit and receive antennas in multiinput multi-output (MIMO) systems. In this paper, we investigate two transmit diversity applications of LDC for orthogonal frequency division
Traffic control at road intersections is based on traffic lights. The control mechanism typically used for traffic lights operates based on a periodic schedule to change the light (red/yellow/green). In many cases, a different schedule is used in late
Many researchers use simulation to investigate network congestion, often finding congestion spread can be modeled as percolation, spreading slowly under increasing load until a critical point, then spreading quickly through the network. The researchers
Kamran Sayrafian, Hamid Mahboubi, Walid Masoudimansour, Amir G. Aghdam
In this paper, an energy-efficient strategy is proposed for tracking a moving target in an environment with obstacles, using a network of mobile sensors. Typically, the most dominant sources of energy consumption in a mobile sensor network are sensing