Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by CTM

2018

Analysis of AO modeling for pseudo-synthetic interaction matrix at the LBT

Authors
Heritier, CT; Esposito, S; Fusco, T; Neichel, B; Oberti, S; Pinna, E; Agapito, G; Puglisi, A; Briguglio, R; Correia, C; Madec, PY; Sauvage, JF; Kolb, J; Quiros Pacheco, F;

Publication
ADAPTIVE OPTICS SYSTEMS VI

Abstract
The performance of an Adaptive Optics (AO) System relies on the accuracy of its Interaction Matrix which defines the opto-geometrical link between the Deformable Mirror (DM) and the Wave Front Sensor (WFS). Any mis-registrations (relative shifts, rotation, magnification or higher order pupil distortion) will strongly impact the performance, especially for high orders AO systems. Adaptive Telescopes provide a constraining environment for the AO calibration with large number of actuators DM, located inside the telescope with often no access to a calibration source and with a high accuracy required. The future Extremely Large Telescope (ELT) will take these constraints to another level with a longer calibration time required, no artificial calibration source and most of all, frequent updates of the calibration during the operation. To overcome these constraints, new calibration strategies have to be developed either doing it on-sky or working with synthetic models. The most promising approach seems to be the Pseudo-Synthetic Calibration. The principle is to generate the Interaction Matrix of the system in simulator, injecting the correct model alignment parameters identified from on-sky Measurements. It is currently the baseline for the Adaptive Optics Facility (AOF) at the Very Large Telescope (VLT) working with a Shack-Hartmann WFS but it remains to be investigated in the case of the Pyramid WFS.

2018

Advanced control laws for the new generation of AO systems

Authors
Correia, CM;

Publication
ADAPTIVE OPTICS SYSTEMS VI

Abstract
Geared by the increasing need for enhanced performance, both optical and computational, new dynamic control laws have been researched in recent years for next generation adaptive optics systems on current 10 m-class and extremely large telescopes up to 40 m. We provide an overview of these developments and point out prospects to making such controllers drive actual systems on-sky.

2018

Peak-locking centroid bias in Shack-Hartmann wavefront sensing

Authors
Anugu, N; Garcia, PJV; Correia, CM;

Publication
MONTHLY NOTICES OF THE ROYAL ASTRONOMICAL SOCIETY

Abstract
Shack-Hartmann wavefront sensing relies on accurate spot centre measurement. Several algorithms were developed with this aim, mostly focused on precision, i.e. minimizing random errors. In the solar and extended scene community, the importance of the accuracy (bias error due to peak-locking, quantization, or sampling) of the centroid determination was identified and solutions proposed. But these solutions only allow partial bias corrections. To date, no systematic study of the bias error was conducted. This article bridges the gap by quantifying the bias error for different correlation peak-finding algorithms and types of sub-aperture images and by proposing a practical solution to minimize its effects. Four classes of sub-aperture images (point source, elongated laser guide star, crowded field, and solar extended scene) together with five types of peak-finding algorithms (1D parabola, the centre of gravity, Gaussian, 2D quadratic polynomial, and pyramid) are considered, in a variety of signal-to-noise conditions. The best performing peak-finding algorithm depends on the sub-aperture image type, but none is satisfactory to both bias and random errors. A practical solution is proposed that relies on the antisymmetric response of the bias to the sub-pixel position of the true centre. The solution decreases the bias by a factor of similar to 7 to values of less than or similar to 0.02 pix. The computational cost is typically twice of current cross-correlation algorithms.

2018

Enhancing Indoor Smartphone Location Acquisition using Floor Plans

Authors
Rajagopal, N; Lazik, P; Pereira, N; Chayapathy, S; Sinopoli, B; Rowe, A;

Publication
2018 17TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN)

Abstract
Indoor localization systems typically determine a position using either ranging measurements, inertial sensors, environmental-specific signatures or some combination of all of these methods. Given a floor plan, inertial and signature-based systems can converge on accurate locations by slowly pruning away inconsistent states as a user walks through the space. In contrast, range-based systems are capable of instantly acquiring locations, but they rely on densely deployed beacons and suffer from inaccurate range measurements given non-line-of-sight (NLOS) signals. In order to get the best of both worlds, we present an approach that systematically exploits the geometry information derived from building floor plans to directly improve location acquisition in range-based systems. Our solving approach can disambiguate multiple feasible locations taking into account a mix of LOS and NLOS hypotheses to accurately localize with significantly fewer beacons. We demonstrate our geometry-aware solving approach using a new ultrasonic beacon platform that is able to perform direct time-of-flight ranges on commodity smartphones. The platform uses Bluetooth Low Energy (BLE) for time synchronization and ultrasound for measuring propagation distance. We evaluate our system's accuracy with multiple deployments in a university campus and show that our approach shifts the 80% accuracy point from 4-8m to 1m as compared to solvers that do not use the floor plan information. We are able to detect and remove NLOS signals with 91.5% accuracy.

2018

A Framework for Web Application Integrity

Authors
Fortuna, P; Pereira, N; Butun, I;

Publication
ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY

Abstract
Due to their universal accessibility, interactivity and scaling ease, Web applications relying on client-side code execution are currently the most common form of delivering applications and it is likely that they will continue to enter into less common realms such as IoT-based applications. We reason that modern Web applications should be able to exhibit advanced security protection mechanisms and review the research literature that points to useful partial solutions. Then, we propose a framework to support such characteristics and the features needed to implement them, providing a roadmap for a comprehensive solution to support Web application integrity.

2018

Demystifying Security of LoRaWAN v1.1

Authors
Butun, I; Pereira, N; Gidlund, M;

Publication

Abstract
LoRa and its upper layers definition LoRaWAN is one of the most promising LPWAN technologies for implementing the Internet of Things (IoT). Although being a popular technology, several works in the literature have revealed various weaknesses regarding the security of LoRaWAN v1.0 (the official 1st draft). By using all these recommendations from the academia and industry, the LoRa-Alliance has worked on the v1.0 to develop an enhanced version and provide more secure and trustable architecture. The result of these efforts ended-up with LoRaWAN v1.1, which was released on Oct 11, 2017. This manuscript aims at demystifying the security aspects and provide a comprehensive Security Risk Analysis related to latest version of LoRaWAN. Besides, it provides several remedies to the recognized vulnerabilities. To the best of authors’ knowledge, this work is one of its first kind by providing a detailed security analysis related to latest version of LoRaWAN. According to our analysis, end-device physical capture, rogue gateway and replay attacks are found to be threating for safety operation of the network. Eventually, v1.1 of LoRaWAN is found to be less vulnerable to attacks compared to v1.0, yet possesses several security implications that need to be addressed and fixed for the upcoming releases.

  • 180
  • 368