GNSS and SAR Signal Delay in Perturbed Ionospheric D-Region During Solar X-Ray Flares

We investigate the influence of the perturbed (by a solar X-ray flare) ionospheric D-region on the global navigation satellite systems (GNSS) and synthetic aperture radar (SAR) signals. We calculate a signal delay in the D-region based on the low ionospheric monitoring by very-low-frequency (VLF) radio waves. The results show that the ionospheric delay in the perturbed D-region can be important and, therefore, should be taken into account in modeling the ionospheric influence on the GNSS and SAR signal propagation and in calculations relevant for space geodesy.

Compact Ground-Based Interferometric Synthetic Aperture Radar Short-range structural monitoring

Recently, structural monitoring by radar remote sensing has become more necessary for both economic and security reasons. Infrastructure monitoring with no incorporated deformation sensors (e.g., old generation water dams for which regulations did not impose monitoring capabilities) is usually performed by regular in situ topographic surveys. However, these surveys cannot be performed very often, and alternative methods are desirable.

Quantum Trajectories for the Dynamics in the Exact Factorization Framework: A Proof-of-Principle Test

In the framework of the exact factorization of the time-dependent electron-nuclear wave function, we investigate the possibility of solving the nuclear time-dependent Schrödinger equation based on trajectories. The nuclear equation is separated in a Hamilton-Jacobi equation for the phase of the wave function, and a continuity equation for its (squared) modulus. For illustrative adiabatic and nonadiabatic one-dimensional models, we implement a procedure to follow the evolution of the nuclear density along the characteristics of the Hamilton-Jacobi equation.

Mapping Precipitable Water Vapor Time Series From Sentinel-1 Interferometric SAR

In this article, a methodology to retrieve the precipitable water vapor (PWV) from a differential interferometric time series is presented. We used external data provided by atmospheric weather models (e.g., ERA-Interim reanalysis) to constrain the initial state and by Global Navigation Satellite System (GNSS) to phase ambiguities elimination introduced by phase unwrapping algorithm. An iterative least-square is then used to solve the optimization problem.

Epidemic data survivability in Unattended Wireless Sensor Networks: New models and results

Unattended Wireless Sensor Networks (UWSNs), characterized by the intermittent presence of the sink, are exposed to attacks aiming at tampering with the sensors and the data they store. In order to prevent an adversary from erasing any sensed data before the sink collects them, it is common practice to rely on data replication. However, identifying the most suitable replication rate is challenging: data should be redundant enough to avoid data loss, but not so much as to pose an excessive burden on the limited resources of the sensors.

Security in wireless ad-hoc networks - A survey

Pervasive mobile and low-end wireless technologies, such as radio-frequency identification (RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs), make the wireless scenario exciting and in full transformation. For all the above (and similar) technologies to fully unleash their potential in the industry and society, there are two pillars that cannot be overlooked: security and privacy. Both properties are especially relevant if we focus on ad-hoc wireless networks, where devices are required to cooperate - e.g.

Provable Storage Medium for Data Storage Outsourcing

In remote storage services, delays in the time to retrieve data can cause economic losses to the data owners. In this paper, we address the problem of properly establishing specific clauses in the service level agreement (SLA), intended to guarantee a short and predictable retrieval time. Based on the rationale that the retrieval time mainly depends on the storage media used at the server side, we introduce the concept of Provable Storage Medium (PSM), to denote the ability of a user to efficiently verify that the provider is complying to this aspect of the SLA.

Multi-Word Structural Topic Modelling of ToR Drug Marketplaces

Topic Modelling (TM) is a widely adopted generative model used to infer the thematic organization of text corpora. When document-level covariate information is available, so-called Structural Topic Modelling (STM) is the state-of-the-art approach to embed this information in the topic mining algorithm. Usually, TM algorithms rely on unigrams as the basic text generation unit, whereas the quality and intelligibility of the identified topics would significantly benefit from the detection and usage of topical phrasemes.

Data Confidentiality and Availability via Secret Sharing and Node Mobility in UWSN

In Mobile Unattended Wireless Sensor Networks (MUWSNs), nodes sense the environment and store the acquired data until the arrival of a trusted data sink. In this paper, we address the fundamental issue of quantifying to which extent secret sharing schemes, combined with nodes mobility, can help in assuring data availability and confidentiality. We provide accurate analytical results binding the fraction of the network accessed by the sink and the adversary to the amount of information they can successfully recover. Extensive simulations support our findings.

Fractional Orlicz-Sobolev embeddings

The optimal Orlicz target space is exhibited for embeddings of fractional-order Orlicz-Sobolev spaces in $R^n$. An improved embedding with an Orlicz-Lorentz target space, which is optimal in the broader class of all rearrangement-invariant spaces, is also established. Both spaces of order s in (0, 1), and higher-order spaces are considered. Related Hardy type inequalities are proposed as well.