Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Engineering and Information Sciences - Papers: Part A

Analysis

2007

Articles 1 - 3 of 3

Full-Text Articles in Social and Behavioral Sciences

Strategic Analysis Adaptation Assessment: An Alternative To The Storyline Scenario, Susan Krumdieck, Mohammed Imroz Sohel Jan 2007

Strategic Analysis Adaptation Assessment: An Alternative To The Storyline Scenario, Susan Krumdieck, Mohammed Imroz Sohel

Faculty of Engineering and Information Sciences - Papers: Part A

Scenarios of future trends are widely used by government and international agencies to inform decision-making. While story line scenarios may be useful for business or government thinking, they are not effective at informing engineering research, innovation and design, and add very little to the understanding of sustainability. This paper presents a strategic analysis approach to complex systems, which relies on identification of risks to important activities and wellbeing. This method mimics the actual processes of anthropogenic continuity, where people explore, experiment, learn from success and mistakes, and adapt and evolve. The method is applied to the case study of transportation …


Security Analysis Of Two Ultra-Lightweight Rfid Authentication Protocols, Tieyan Li, Guilin Wang Jan 2007

Security Analysis Of Two Ultra-Lightweight Rfid Authentication Protocols, Tieyan Li, Guilin Wang

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2AP, which are recently proposed by Peris-Lopez et al.We identify two e®ective attacks, namely De-synchronization attack and Full-disclosure attack, against their protocols. The former attack can break the synchro- nization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other in any following protocol runs. The latter attack can disclose all the secret information stored on a tag by interrogating the tag multiple times. Thus it compromises the tag completely. Moreover, we point …


Evolution Analysis Of Iterative Lmmse-App Detection For Coded Linear System With Cyclic Prefixes, Xiaojun Yuan, Qinghua Guo, Li Ping Jan 2007

Evolution Analysis Of Iterative Lmmse-App Detection For Coded Linear System With Cyclic Prefixes, Xiaojun Yuan, Qinghua Guo, Li Ping

Faculty of Engineering and Information Sciences - Papers: Part A

This paper is concerned with the iterative detection principles for coded linear systems with cyclic prefixes. We derive a matrix-form low-cost fast Fourier transform (FFT) based iterative LMMSE-APP detector and propose an evolution technique for the performance evaluation of the proposed detector. Numerical results show a good match between simulation and evolution prediction. ©2007 IEEE.