scispace - formally typeset
Search or ask a question

Showing papers on "Guard (information security) published in 2017"


Book
05 Dec 2017
TL;DR: Data from 409 members of forty-five new product teams in five high technology companies indicate the existence of four sets of boundary management activities which can be labeled Ambassador, Task Coordinator, Scout, and Guard.
Abstract: Data from 409 members of forty-five new product teams in five high technology companies indicate the existence of four sets of boundary management activities which can be labeled Ambassador, Task Coordinator, Scout, and Guard. These activities are related to the frequency, type, and destination of communications between team members and others. This article describes these activities and examines the impact of individual and environmental variables on the frequency in which individual team members engage in them.

158 citations


Proceedings Article
12 Jul 2017
TL;DR: This paper describes the user-centered approach towards designing a fully functional privacy feedback interface for the Android platform and shows that users of the new interface were significantly more likely to both understand and control the selected set of circumstances under which applications could access sensitive data when compared to the default Android privacy settings interface.
Abstract: Current mobile platforms provide privacy management interfaces to regulate how applications access sensitive data. Prior research has shown how these interfaces are insufficient from a usability standpoint: they do not account for context. In allowing for more contextual decisions, machine-learning techniques have shown great promise for designing systems that automatically make privacy decisions on behalf of the user. However, if such decisions are made automatically, then feedback mechanisms are needed to empower users to both audit those decisions and correct any errors. In this paper, we describe our user-centered approach towards designing a fully functional privacy feedback interface for the Android platform. We performed two large-scale user studies to research the usability of our design. Our second, 580-person validation study showed that users of our new interface were significantly more likely to both understand and control the selected set of circumstances under which applications could access sensitive data when compared to the default Android privacy settings interface.

44 citations


Proceedings ArticleDOI
17 Mar 2017
TL;DR: A new detection and prevention system against DDoS (Distributed Denial of Service) attack in SDN (software defined network) architecture, FL-GUARD (Floodlight-based guard system), which applies dynamic IP address binding to solve the problem of IP spoofing, and uses 3.3.2 C-SVM algorithm to detect attacks.
Abstract: This paper proposed a new detection and prevention system against DDoS (Distributed Denial of Service) attack in SDN (software defined network) architecture, FL-GUARD (Floodlight-based guard system). Based on characteristics of SDN and centralized control, etc., FL-GUARD applies dynamic IP address binding to solve the problem of IP spoofing, and uses 3.3.2 C-SVM algorithm to detect attacks, and finally take advantage of the centralized control of software-defined network to issue flow tables to block attacks at the source port. The experiment results show the effectiveness of our system. The modular design of FL-GUARD lays a good foundation for the future improvement.

39 citations


Journal ArticleDOI
TL;DR: In this article, the authors reveal the peculiarities of cadets' practical training at The National academy of the State Border Guard Service of Ukraine named after Bohdan Khmelnytskyi majoring in “State Border Security”, “Law enforcement activity,” and “Philology” at the Bachelor's level.
Abstract: Considering the difficult situation in the country and the need for protection and defense of the southeastern border of Ukraine, the role of professional training of future border guard officers, particularly its practical component, is extremely important today. Therefore, the article reveals the peculiarities of cadets’ practical training at The National academy of the State Border Guard Service of Ukraine named after Bohdan Khmelnytskyi majoring in “State Border Security”, “Law enforcement activity”, “Philology”, “Psychology”, “Automobile transport” and “Telecommunications” at the Bachelor’s level. Enhancement of cadets’ practical training for the Seniors is implemented and conducted at the following departments of the academy: border guard service tactics; border control; combined subjects; personal security; constitutional, administrative and international law; engineering and technical means of border protection. The implementation of trainings simulating practical actions (general military, military-engineering, fire and medical trainings; courses on border control, border guard service tactics, personal security, administrative proceedings) contributes to cadets’ practical skills mastering and professional training’s practical component improvement.

27 citations


Proceedings ArticleDOI
18 Jun 2017
TL;DR: This work aims to improve the safety of critical CPS through synthesis of runtime enforcers, named safety guards, which are reactive components attached to the original systems to protect them against catastrophic failures.
Abstract: Due to their safety-critical nature, cyber-physical systems (CPS) must tolerate faults and security attacks to remain fail-operational. However, conventional techniques for improving safety, such as testing and validation, do not meet this requirement, as shown by many of the real-world system failures in recent years, often with major economic and public-safety implications. We aim to improve the safety of critical CPS through synthesis of runtime enforcers, named safety guards, which are reactive components attached to the original systems to protect them against catastrophic failures. That is, even if the system occasionally malfunctions due to unknown defects, transient errors, or malicious attacks, the guard always reacts instantaneously to ensure that the combined system satisfies a predefined set of safety properties, and the deviation from the original system is kept at minimum. We illustrate the main ideas of this approach with examples, discuss the advantages compared to existing approaches, and point out some research challenges.

24 citations


Book ChapterDOI
20 Feb 2017
TL;DR: In the story of the Battle of the Books as mentioned in this paper, Eustathius of Thessalonica plays a conspicuous role, initially enrolled among the orators (and thus on the far left wing of the ancients' army), he soon switches to the middlefield upon the request of the old and blind Homer, who desperately needs a lieutenant, and thus implores Demosthenes to let the archbishop, however ideologically hostile to war, cross over to the infantry of the poets and help him out in this bloodless fight.
Abstract: In the fantastic battle between ancient and modern authors envisaged by the French scholar François de Callières in 1688 (a story that inspired Jonathan Swift’s Battle of the Books, published twelve years later), Eustathius of Thessalonica plays a conspicuous role1. Initially enrolled among the orators (and thus on the far left wing of the ancients’ army), he soon switches to the middlefield upon the request of the old and blind Homer, who desperately needs a lieutenant, and thus implores Demosthenes to let the archbishop, however ideologically hostile to war, cross over to the infantry of the poets and help him out in this bloodless fight2. Once proclaimed captain of Homer’s guard, Eustathius starts a thorough examination of the troops, consisting of the Iliad and the Odyssey, and engages in a firm defence of the Shield of Achilles against the attacks of the moderns; shortly after, however, he discovers to his dismay a worrying hole in the ranks of the Iliad, corresponding to the description of Aphrodite’s kestos, “la ceinture de Venus”, which has been stolen overnight by the modern poets Voiture and Sarrasin disguised as Greeks – very painful news for poor Homer, who believed Iliad 14 to be among the highlights of his entire poetical output3. Callières’ parody of the Querelle des Anciens et des Modernes is subtler and less absurd than it may appear at first glance: when Homer greets Eustathius as the worthiest defender of his person and works4, this reflects a communis opinio grounded in the wide success of the Parekbolai to Homer’s Iliad and Odyssey since their editio princeps published in Rome in 1542‒1550 – a success that will only be properly appreciated by whoever writes a proper history of the art of commenting Homer, perhaps one of the most urgent desiderata of contempo-

20 citations


Proceedings ArticleDOI
04 Apr 2017
TL;DR: The Crossing Guard interface provides the accelerator designer with a standardized set of coherence messages that are simple enough to aid in design of bug-free coherent caches, and sufficiently complex to allow customized and optimized accelerator caches with performance comparable to using the host protocol.
Abstract: Specialized hardware accelerators have performance and energy-efficiency advantages over general-purpose processors. To fully realize these benefits and aid programmability, accelerators may share a physical and virtual address space and full cache coherence with the host system. However, allowing accelerators -- particularly those designed by third parties -- to directly communicate with host coherence protocols poses several problems. Host coherence protocols are complex, vary between companies, and may be proprietary, increasing burden on accelerator designers. Bugs in the accelerator implementation may cause crashes and other serious consequences to the host system.We propose Crossing Guard, a coherence interface between the host coherence system and accelerators. The Crossing Guard interface provides the accelerator designer with a standardized set of coherence messages that are simple enough to aid in design of bug-free coherent caches. At the same time, they are sufficiently complex to allow customized and optimized accelerator caches with performance comparable to using the host protocol. The Crossing Guard hardware is implemented as part of the trusted host, and provides complete safety to the host coherence system, even in the presence of a pathologically buggy accelerator cache.

17 citations


Patent
01 Aug 2017
TL;DR: In this paper, an entrance guard control method, device and system for counting the permanent resident population and non-permanent resident population was proposed, which is more accurate than an existing face recognition method.
Abstract: The application provides an entrance guard control method, device and system. The method comprises the following steps: acquiring an image of a target photographed by a camera; identifying feature information of the target based on the image of the target; determining a category of the target based on the feature information and a previously calculated center of clustering; determining an entrance guard control instruction according to the categort of the target and access information of the target within a preset time range. According to the entrance guard control method, device and system, permanent resident population and nonpermanent resident population can be automatically counted. After establishing association with an entrance guard, the permanent resident population does not need to swipe a card. Compared with an existing face recognition method, the entrance guard control method is more accurate.

17 citations


Journal ArticleDOI
24 Feb 2017
TL;DR: In this paper, the authors focus on the Swiss border guard's relationship with the border space since the use of military drone systems (ADS-95 Ranger) for surveillance missions and explore the way in which the fundamentally mobile and flexible nature of this technology also gives rise to new surveillance practices and identification controls.
Abstract: . This paper focuses on the Swiss border guard's relationship with the border space since the use of military drone systems (ADS-95 Ranger) for surveillance missions. Firstly, the paper highlights how the use of these flying devices both facilitates and limits the acquisition of new knowledge by the border guards. It then explores the way in which the fundamentally mobile and flexible nature of this technology also gives rise to new surveillance practices and identification controls. We show that these changes influence the border guard's relationship with the border. To achieve this, our analysis is based on empirical data obtained from semi-structured interviews with key players in the field, action maps and field observation carried out during a drone engagement in September 2014. One major question therefore guides this study: how do military drone systems – by way of the new knowledge and practices they generate – influence relationships in the border space?

17 citations


Patent
10 Nov 2017
TL;DR: In this article, a two-dimensional code intelligent entrance guard system consisting of an intelligent mobile terminal and an information comprehensive processing server is presented. But the implementation method of the system is not described.
Abstract: The present invention discloses a two-dimensional code intelligent entrance guard system and an implementation method thereof. The two-dimensional code intelligent entrance guard system comprises a two-dimensional code intelligent entrance guard lock, an intelligent mobile terminal and an information comprehensive processing server, wherein the intelligent mobile terminal and the information comprehensive processing server form wireless mobile communication connection, the intelligent mobile terminal is used for identifying and reading the information of the two-dimensional code intelligent entrance guard lock, and the two-dimensional code intelligent entrance guard lock is connected to the information comprehensive processing server through a network. According to the present invention, with the two-dimensional code intelligent entrance guard system, the intelligent management of the entrance guard in enterprises, schools, hospitals, governments, banks, prisons, commercial areas, residential communities, elevators and the like can be achieved, the entry of miscellaneous personnel can be prevented, and the entry of owners and invited personnel can be allowed; and with the two-dimensional code intelligent entrance guard system, the intelligent property management can be achieved, the automatic operation starting and the management mechanism of the entrance guard under the unattended condition can be achieved, the whole range information tracking management function of the property management can be achieved, the safety and the convenience of the property management are greatly improved, and the property management cost can be reduced.

16 citations


Journal ArticleDOI
TL;DR: In this paper, the authors explore the nature of the security guard industry with a focus on security guard employment relative to police officer, the diverse legislative guidelines pertaining to the scope of their functions, employment eligibility, training, and legal powers in the new independent and post-socialist countries in Eastern Europe and post Soviet republics.
Abstract: In this paper, we explore the nature of the security guard industry with a focus on security guard employment relative to police officer, the diverse legislative guidelines pertaining to the scope of their functions, employment eligibility, training, and legal powers in the new independent and post-socialist countries in Eastern Europe and post-Soviet republics. Findings suggest that despite the rapid proliferation of private security industry in the post-socialist countries relative to the gradual growth experienced in the European continent in many of the new independent states, public police continue to play a critical role in the form of employees of state-owned security guard companies. Further, we find considerable disparity in the employment ratios of police officers and security guards in these countries though not much variation in the rigor of legislative framework for private security guard employment in the post-socialist nations appeared, which was minimal at best.

Journal ArticleDOI
TL;DR: Wyrtzen as discussed by the authors explores how the competing logics in the colonial field transformed the position of Sultan Mohamed V from a potential ally of the "protectorate intervention" to a politicoreligious nationalist leader and hero of anticolonial struggles.
Abstract: While nationalist urban women articulated their resistance in terms of equal access to education and rights, Amazigh rural women contested colonial intervention in terms of the integrity of the Muslim community and in gendered terms of ‘‘bravery/impotence’’ of Amazigh men. The postcolonial struggles over gender and women’s rights have been profoundly shaped by these earlier disputes. Chapter Eight explores how the competing logics in the colonial field transformed the position of Sultan Mohamed V from a potential ally of the ‘‘protectorate intervention’’ to a politicoreligious nationalist leader and hero of anticolonial struggles. The last three decades of the protectorate (1930s to 1950s) saw the issuing of the Berber dahir, the formation of the party of Istiqlal, independence (1943), the sultan’s exile (1953), and his return as national hero in 1955. Exploring these three decades reveals the way in which struggles around Moroccan independence shaped the colonial political field and secured the centrality of the monarchy as a symbol of unity and national political identity in the years following independence. Detailing the dynamics of consolidation of state symbolic, religious, and political power is the task of the concluding chapters. Wyrtzen’s book is a refreshing reading of Morocco’s contemporary history that draws on a wide body of historical literature and colonial writings to build an original perspective on the factors that shaped the history of contemporary Morocco and the identification processes of ordinary Moroccans.

Posted Content
TL;DR: In this article, the secrecy performance of a wireless network (primary network) overlaid with an ambient RF energy harvesting IoT network (secondary network) is studied using tools from stochastic geometry and game theory.
Abstract: This paper studies the secrecy performance of a wireless network (primary network) overlaid with an ambient RF energy harvesting IoT network (secondary network). The nodes in the secondary network are assumed to be solely powered by ambient RF energy harvested from the transmissions of the primary network. We assume that the secondary nodes can eavesdrop on the primary transmissions due to which the primary network uses secrecy guard zones. The primary transmitter goes silent if any secondary receiver is detected within its guard zone. Using tools from stochastic geometry, we derive the probability of successful connection of the primary network as well as the probability of secure communication. Two conditions must be jointly satisfied in order to ensure successful connection: (i) the SINR at the primary receiver is above a predefined threshold, and (ii) the primary transmitter is not silent. In order to ensure secure communication, the SINR value at each of the secondary nodes should be less than a predefined threshold. Clearly, when more secondary nodes are deployed, more primary transmitters will remain silent for a given guard zone radius, thus impacting the amount of energy harvested by the secondary network. Our results concretely show the existence of an optimal deployment density for the secondary network that maximizes the density of nodes that are able to harvest sufficient amount of energy. Furthermore, we show the dependence of this optimal deployment density on the guard zone radius of the primary network. In addition, we show that the optimal guard zone radius selected by the primary network is a function of the deployment density of the secondary network. This interesting coupling between the two networks is studied using tools from game theory. Overall, this work is one of the few concrete works that symbiotically merge tools from stochastic geometry and game theory.

Journal ArticleDOI
TL;DR: In this paper, the authors examine the relative effects of environmental factors on job satisfaction as well as dissatisfaction among security guards, and find that overall the guards expressed satisfaction with their jobs because of the thrill and anticipation they received from the job assignment, however, inadequate training, poor pay, shift-work schedules, boredom and a lack of basic amenities at work were among the factors identified that left them with low job satisfaction.
Abstract: An important attribute of high turnover in private security guard industry relates to factors associated with job satisfaction. While sweeping statements have been attributed as reasons for high turnover in the security guard industry (including poor pay, inadequate regulations and poor training), few studies have examined the factors associated with job satisfaction among unarmed guards. This study seeks to examine the relative effects of environmental factors on job satisfaction as well as dissatisfaction among security guards. Data were drawn from in-depth interviews with 18 security guards employed in a highly industrialized Midwestern state in the United States to explore factors that influence their satisfaction and dissatisfaction at work. Findings suggest that overall the guards expressed satisfaction with their jobs because of the thrill and anticipation they received from the job assignment. However, inadequate training, poor pay, shift-work schedules, boredom and a lack of basic amenities at work were among the factors identified that left them with low-job satisfaction. In addition, respondents identified factors that help remedy the situation to create a productive working environment for employees in a high turnover, underpaid occupation.

Patent
14 Jul 2017
TL;DR: In this paper, an entrance guard management method based on real name social contact is proposed, which comprises owner entering, family member entering, visitor entrance and exit, establishment of community, cross-region social contact, property broadcast, request for repair by an owner, payment of the owner, and value-added services.
Abstract: The invention relates to an entrance guard management method based on real name social contact. The method comprises owner entering, family member entering, visitor entrance and exit, establishment of community, cross-region social contact, property broadcast, request for repair by an owner, payment of the owner, and value-added services. The entrance guard management method integrates an entrance guard system, social contact communication, property management and security management, and integrates computer network and a traditional communication network, so that the entrance guard can be opened remotely by means of cell phone app. All members in the system are grouped into a community, wherein the members can communicate with each other through a chatting app built-in a system, and a property manager can communicate with owners at any time, so that connection between property management center and the owners is enhanced, and the owners can perform property payment and request for repair with the app. Through the app, the property management center also can provide other value-added services, thus improving service experience of the property management center.

Patent
25 Jan 2017
TL;DR: In this paper, the authors proposed a home security system consisting of a data processing module, an infrared detector, an image acquisition module, image display module, voice module, a wireless communication module and an entrance guard module.
Abstract: The invention relates to a home security system and an implementation method thereof. The home security system comprises a data processing module, an infrared detector, an image acquisition module, an image display module, a voice module, a wireless communication module, a visual intercom module and an entrance guard module, wherein the infrared detector is used for sensing whether a visitor appears; the image acquisition module is used for video monitoring and for transmitting the monitored video to the data processing module; the voice module is used for voice communication; the wireless communication module is used for making a call; the visual intercom module is used for the video call; and the entrance guard module is used for controlling the opening of an entrance guard. By adopting the home security system, when a user is not home when the visitor visits the home of the user, the function of remotely opening the entrance guard for the visitor after the identification of the visitor is confirmed by the user can be realized.

Patent
28 Jul 2017
TL;DR: In this paper, a touch sensing system with a guard signal generation chip operating in a first power domain and a voltage regulator is described, where the voltage regulator selectively regulates a voltage of the guard signal at the touch sensing chip.
Abstract: A touch sensing system is disclosed. The touch sensing system includes a guard signal generation chip operating in a first power domain referenced to a first voltage, the guard signal generation chip configured to generate a guard signal. A touch sensing chip operates in a second power domain, different from the first power domain, referenced to the guard signal, the touch sensing chip configured to sense touch at one or more touch electrodes included in a touch sensor panel operating in the second power domain referenced to the guard signal, and the touch sensing chip a different chip than the guard signal generation chip. A voltage regulator is configured to selectively regulate a voltage of the guard signal at the touch sensing chip.

Journal ArticleDOI
TL;DR: In this article, the authors investigate the use of near-post guard systems when defending corner kicks in the English Premier League during the 2015/2016 season, and find that there was no significant association between the different near post guard systems and the number of attempts at goal (p < 0.05).
Abstract: The aim of this study was to investigate the use of near-post guard systems when defending corner kicks in the English Premier League during the 2015/2016 season. A total of 750 corner kicks from 79 English Premier League matches were analysed. There were a total of eight different near-post guard systems observed. Only six corner kicks (0.8%) were observed where there was no guard positioned in the near-post area when defending corner kicks. The one-one system only conceded one goal from 148 corner kicks (0.7%) observed, whereas the one-zero system conceded 8 goals from 159 corner kicks (5.0%) observed. However, when all attempts at goal were included, there was no significant association between the different near-post guard systems and the number of attempts at goal (p > 0.05). An important finding was that there were 236 defensive clearances performed by the guards from the 750 corner kicks that were analysed (31.5%), this suggests that these defensive players play an important role in prevent...


Journal ArticleDOI
TL;DR: Russian students are ambivalent in general about the nature of security work, security guards' professionalism, if they are effective, and that they are not satisfied with their services, however, positive contact with security guards appeared to be a strong predictor of their positive views on various dimensions of security guard work.
Abstract: In this exploratory study article, we examine Russian citizens, more specifically youth (college students), perceptions of private security guards who come in contact with private citizens. We exam...

01 Jan 2017
TL;DR: This work compares performance of Vguard to an available drive-managed SMR drive analyzed and modeled in previous research, and finds that Vguard reduces the 99.9% latency by 15× for real-world traces, and maximum latency by 32% for synthetic random write workloads.
Abstract: Virtual Guard (Vguard) is a track-based static mapping translation layer for shingled magnetic recording (SMR) drives. Data is written in-place by caching data from the next track in the shingling direction, allowing direct overwrite of sectors in the target track. This enables Vguard to take advantage of track-level locality, nearly eliminating cleaning for many workloads. We compare performance of Vguard to an available drive-managed SMR drive analyzed and modeled in previous research. Vguard reduces the 99.9% latency by 15× for real-world traces, and maximum latency by 32% for synthetic random write workloads.

Patent
27 Jun 2017
TL;DR: In this paper, an intelligent community security protection system based on the Internet of Things (IOT) is proposed, which comprises a central controller, a server, a mobile terminal and a plurality of subsystems.
Abstract: The invention provides an intelligent community security protection system based on Internet of Things (IOT) The intelligent community security protection system comprises a central controller, a server, a mobile terminal and a plurality of subsystems The subsystems comprise a community entry-exit control system, a community patrol system, a community monitoring system, a building guard control system, a community alarm system, an emergency calling system, an owner identity authentication system, a fingerprint authentication system, a face authentication system and a visitor temporary authentication system The intelligent community security protection system improves convenience and security from the security aspect, greatly improves the life and property safety and the satisfaction of the owners By using the mobile terminal as an information carrier, triple identity authentication including identity card authentication, fingerprint authentication, and face recognition authentication, and the organic combination of networked information transmission, digitized information resources and the intelligent user terminal, the intelligent community security protection achieves intelligent community security management

Proceedings ArticleDOI
17 May 2017
TL;DR: This paper entails a contemporary methodology to guard the code against exploitation by which the tamper resistance of the program code is magnified by the inclusion of two modules that work in tandem with each other to protect critical pieces of code.
Abstract: The operations of devices in automated, possibly in hostile environments, puts the dependability and reliability of the IoT systems at stake. More specifically, adversaries may tamper with the devices, tamper with sensor values triggering false alarms, instrument the data gathering and overall operation to their own interest. Protecting integrity and confidentiality of IoT devices from tampering attempts is a big challenge. Protection against code tampering is the focal point of this research. This paper entails a contemporary methodology to guard the code against exploitation. The approach focuses on a novel distributed solution by which the tamper resistance of the program code is magnified by the inclusion of two modules that work in tandem with each other. These security modules employ Return Oriented Programming (ROP) techniques and code check-summing techniques to protect critical pieces of code. When working together they provide dual lines of defence to the critical piece of code where the malicious entity has to bypass both the modules in order to tamper the critical piece of code thereby hardening the overall security and increasing the cost of exploitation drastically making it infeasible to mount an attack on IoT devices.

Patent
20 Oct 2017
TL;DR: In this paper, the authors proposed a temporary password entrance guard system with dynamic update of encrypting parameters, which can be applied to real-time and non-real-time on-line entrance guard systems.
Abstract: The invention discloses a temporary password entrance guard system with dynamic update of encrypting parameters, which can be applied to real-time on-line and non-real-time on-line entrance guard systems. A temporary password formed by the system is generated on the basis of algorithm, time and a random number SEED and is sent to an applicant by a password management server; and meanwhile, the password management server sends a latest random number SEED to an entrance guard controller through network or an intermediate device; the applicant tells the temporary password to a user, so that the user can input the temporary password on the entrance guard controller, and then the entrance guard controller inverse-calculates the generation time of the temporary password according to decrypting algorithm, the temporary password and the random number SEED and compares the generation time with present time; if the time difference is located in a setting range, the password is legal and the entrance guard controller performs unlocking action. The temporary password is variable with time and dynamic parameters, so that reliability and adaptability are better.


Proceedings ArticleDOI
19 Mar 2017
TL;DR: This paper studies the secrecy performance in wireless networks (primary network) overlaid with an ambient RF energy harvesting network (secondary network) and proposes an algorithm that can assist the two networks to converge to Nash equilibrium.
Abstract: This paper studies the secrecy performance in wireless networks (primary network) overlaid with an ambient RF energy harvesting network (secondary network). The nodes in the secondary network are assumed to be solely powered by ambient RF energy harvested from transmissions of the primary network. We assume that the secondary nodes can eavesdrop on the primary transmissions due to which the primary network uses {\em secrecy guard zones}. The primary transmitter goes silent if any secondary receiver is detected within its guard zone. Using tools from stochastic geometry, we first derive the optimal guard zone radius that minimizes the probability of going silent while ensuring a predefined minimum secure connection probability. Clearly, when more secondary nodes are deployed, more primary transmitters will remain silent for a given guard zone radius, thus impacting the amount of energy harvested by the secondary network. This introduces an interesting coupling between the performance of the two networks. We study this coupling using tools from game theory and propose an algorithm that can assist the two networks to converge to Nash equilibrium. Our results demonstrate the convergence of the proposed algorithm to the Nash equilibrium in finite number of iterations. Overall, this work forms one of the few concrete works that symbiotically merge tools from stochastic geometry and game theory.

25 May 2017
TL;DR: In this paper, the 32nd Division of the US Army's American Expeditionary Force (AEWF) was examined and analyzed, highlighting its growth as a learning organization, commander's visualization and application of operational art.
Abstract: : Upon entering WWI in April 1917, the US Army required a significant increase in operational size and capability. Historically, fear of a large standing army led to a precarious reliance on reserve forces to augment the active component in times of need. The National Defense Act of 1916 completed the transition of all state militias into the National Guard, reinforcing its position as the primary organized reserve within the formal defense architecture. The Guard of 1917 lacked operational capability, yet the 32nd Division quickly assembled, trained, and proved itself as one of the most skilled divisions in the American Expeditionary Force. Examination and analysis of mobilization, pre-war training, and staff development establishes the state of the division prior to arriving in France. Further analysis of the division's development in actual combat highlights its growth as a learning organization, commander's visualization and application of operational art, and how capable staffs enable both. Critical lessons applicable to National Guard mobilization emerge from analyzing the division's evolution.

Patent
15 Mar 2017
TL;DR: In this paper, an intelligent entrance guard control method, device and system, relates to the technical field of Internet, and mainly aims at enhancing the safety of the Intelligent Entrance Guard control through setting the timeliness of an opening password.
Abstract: The invention discloses an intelligent entrance guard control method, device and system, relates to the technical field of Internet, and mainly aims at enhancing the safety of the intelligent entrance guard control through setting the timeliness of an opening password. The intelligent entrance guard control method has the main technical scheme that a server responds to an instruction for obtaining the opening password, sent by a client, of an intelligent entrance guard; an initial password of the intelligent entrance guard is called according to the instruction; a dynamic encryption factor is obtained by aiming at the initial password, and the dynamic encryption factor is updated according to preset time intervals; the dynamic encryption factor and a ciphertext of the initial password are encrypted through a high-grade encryption standard, and the opening password of the intelligent entrance guard is generated; the opening password of the intelligent entrance guard is encrypted and transmitted to the client, so that the intelligent entrance guard is opened by using the opening password. The method, the device and the system are mainly used for controlling the intelligent entrance guard.

Patent
08 Dec 2017
TL;DR: In this article, a cell entrance guard opening method was proposed, which consists of binding the floor of a proprietor with a wechat account of the proprietor, and storing in a server.
Abstract: The invention discloses a cell entrance guard opening method. The method comprises the following steps: binding the floor of a proprietor with a wechat account of the proprietor, and storing in a server; acquiring the visitor name, the floor of the visited proprietor and the wetchat account of the visitor through the server, and generating a first entering and exiting two-dimensional code and pushing to the wetchat of the visitor; scanning the first entering and exiting two-dimensional code and transmitting to the server through an entrance guard system; binding the visitor name, the floor of the visited proprietor, the wetchat account of the visitor, the time of entering the cell, and the time of leaving the cell, and storing; and opening entrance guard. With the adoption of the method, the condition of the visitor entering and exiting the cell can be timely known; the management cost can be saved; the working efficiency is improved; the security of the cell can be ensured. The invention also provides a cell entrance guard system.

Patent
24 May 2017
TL;DR: In this article, a control method for a vehicle-mounted intelligent interactive device is presented, which consists of the following steps of awakening the VI device after the door guard is unlocked and obtaining a vehicle door opening and closing signal and an ACC switch signal in real time.
Abstract: The invention discloses a control method for a vehicle-mounted intelligent interactive device. The control method for the vehicle-mounted intelligent interactive device comprises the following steps of awakening the vehicle-mounted intelligent interactive device after door guard is unlocked and obtaining a vehicle door opening and closing signal and an ACC switch signal in real time; if determining that a vehicle door is in an open state, entering a background operation mode; in the background operation mode, terminating the background operation mode and entering a normal operation mode if determining that the ACC is ON; and in the normal operation mode, terminating the normal operation mode and entering the background operation mode if determining that the ACC is switched from ON into OFF. According to the control method for the vehicle-mounted intelligent interactive device, when users enter into the vehicle from outside, the vehicle-mounted intelligent interactive device is in the background operation mode; and when an ACC gear is switched into ON, the vehicle-mounted intelligent interactive device directly enters the normal operation mode; in addition, the ACC gear is switched from ON into OFF, the vehicle-mounted intelligent interactive device enters the background operation mode to be convenient for the users to use again; therefore, the waiting time during starting the vehicle-mounted intelligent interactive device is reduced.