Search results for "Key"

showing 10 items of 1962 documents

Robustness of 40 Gb/s ASK modulation formats in the practical system infrastructure.

2006

In this work, we analyzed by means of numerical and laboratory experiments the resilience of 40 Gb/s amplitude shift keying modulation formats to transmission impairments in standard single-mode fiber lines as well as to optical filtering introduced by the optical add/drop multiplexer cascade. Our study is a pre-requisite to assess the implementation of cost-effective 40 Gb/s modulation technology in next generation high bit-rate robust optical transport networks. © 2006 Optical Society of America.

Computer scienceOptical communication02 engineering and technologyOptical modulation amplitude01 natural sciencesMultiplexerMultiplexing010309 optics020210 optoelectronics & photonicsOpticsOptical Transport Network0103 physical sciences0202 electrical engineering electronic engineering information engineeringcost effectiveness; frequency shift keying; multiplexingFiberOptical add-drop multiplexerbusiness.industryOptical cross-connectNonlinear opticsOptical performance monitoringAtomic and Molecular Physics and OpticsAmplitude-shift keyingRaman amplifiersModulationPolarization mode dispersionBit error ratebusinessOptics express
researchProduct

An asynchronous covert channel using spam

2012

AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…

Computer scienceRetransmissionCovert channelAsynchronous covert channelData lossComputer securitycomputer.software_genreSecure communicationModelling and SimulationCommunication sourceRaptor codeStegosystemSpam steganographybusiness.industryE-mail steganographyComputational MathematicsComputational Theory and MathematicsAsynchronous communicationRaptor codesSecure communicationModeling and SimulationKey (cryptography)businessAsynchronous covert channel; E-mail steganography; Raptor codes; Secure communication; Spam steganography; Stegosystem; Modeling and Simulation; Computational Theory and Mathematics; Computational MathematicscomputerComputer networkComputers & Mathematics with Applications
researchProduct

Incomplete 3D motion trajectory segmentation and 2D-to-3D label transfer for dynamic scene analysis

2017

International audience; The knowledge of the static scene parts and the moving objects in a dynamic scene plays a vital role for scene modelling, understanding, and landmark-based robot navigation. The key information for these tasks lies on semantic labels of the scene parts and the motion trajectories of the dynamic objects. In this work, we propose a method that segments the 3D feature trajectories based on their motion behaviours, and assigns them semantic labels using 2D-to-3D label transfer. These feature trajectories are constructed by using the proposed trajectory recovery algorithm which takes the loss of feature tracking into account. We introduce a complete framework for static-m…

Computer scienceScene UnderstandingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technology[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Motion (physics)[INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]0502 economics and business0202 electrical engineering electronic engineering information engineering[INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO]Computer visionSegmentationMotion Segmentation050210 logistics & transportationbusiness.industry[INFO.INFO-RB] Computer Science [cs]/Robotics [cs.RO][ INFO.INFO-RB ] Computer Science [cs]/Robotics [cs.RO]05 social sciences3D reconstruction[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]2D to 3D conversionFeature (computer vision)TrajectoryKey (cryptography)Robot020201 artificial intelligence & image processingArtificial intelligence3D Reconstructionbusiness2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)
researchProduct

The role of network connectivity on epileptiform activity.

2021

AbstractA number of potentially important mechanisms have been identified as key players to generate epileptiform activity, such as genetic mutations, activity-dependent alteration of synaptic functions, and functional network reorganization at the macroscopic level. Here we study how network connectivity at cellular level can affect the onset of epileptiform activity, using computational model networks with different wiring properties. The model suggests that networks connected as in real brain circuits are more resistant to generate seizure-like activity. The results suggest new experimentally testable predictions on the cellular network connectivity in epileptic individuals, and highligh…

Computer scienceScienceAction PotentialsCellular levelArticleFunctional networksComputational biophysicsSeizuresNeural Pathwayscomputational model networkHumansThe role of network connectivity on epileptiform activityComputational modelMultidisciplinaryNetwork modelsEpilepsycellular network connectivitySettore INF/01 - InformaticaQRBrainElectroencephalographyNetwork connectivityApplied mathematicsepileptiform activitywiring propertieCellular networkKey (cryptography)MedicineNerve NetNeuroscienceScientific reports
researchProduct

An improvement of NFC-SEC with signed exchanges for an e-prescription-based application

2013

International audience; In the context of an aging population, drug intake can be a potential source of errors leading to death in some cases. Almost all of these errors are unintentional and come from incorrect prescriptions, unsuitable dosages for the patient or incompatibility with other treatments. To limit these risks which are especially important in the elderly or pre-dependency, we propose a secure system for drug treatment through the NFC (Near Field Communication) contact-less communication technology. The proposed system provides security mechanisms such as integrity, authentication, encryption and non-repudiation. To ensure this security, an extension of the international standa…

Computer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]NFC0211 other engineering and technologiesSystème d'exploitationE-signatureRéseaux et télécommunicationsContext (language use)02 engineering and technologyEncryptionComputer securitycomputer.software_genreNear field communication[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Architectures Matérielles0202 electrical engineering electronic engineering information engineeringMedical prescription021110 strategic defence & security studiesAuthentication[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryInternational standard020207 software engineeringPublic key infrastructureSystèmes embarquésElectronic signatureSSTA3. Good healthERISISHealthcare applicationSecurityE-prescriptionISO/IEC 13157businesscomputer
researchProduct

Wireless sensor network for Spectrum Cartography based on Kriging interpolation

2012

Dynamic spectrum access with Cognitive Radio (CR) network is a promising approach to increase the efficiency of spectrum usage. To allow the optimization of resource allocation and transmission adaptation techniques, each CR terminal needs to acquire awareness of the state of the time-frequency-location varying radio spectrum. In this paper we present a Spectrum Cartography (SC) approach where CR terminals are supported by a fixed wireless sensor network (WSN) to estimate and update the Power Spectral Density (PSD) over the area of interest. The wireless sensors collaborate to estimate the spatial distribution of the received power at a given frequency using either a centralized or a distri…

Computer sciencebusiness.industry05 social sciences050801 communication & media studies020206 networking & telecommunications02 engineering and technologyRadio spectrumKey distribution in wireless sensor networks0508 media and communicationsCognitive radioKriging0202 electrical engineering electronic engineering information engineeringResource allocationWirelessRadio resource managementFixed wirelessbusinessWireless sensor networkCartography
researchProduct

Smart Manufacturing Testbed for the Advancement of Wireless Adoption in the Factory

2020

Wireless communication is a key enabling technology central to the advancement of the goals of the Industry 4.0 smart manufacturing concept. Researchers at the National Institute of Standards and Technology are constructing a testbed to aid in the adoption of wireless technology within the factory workcell and other harsh industrial radio environments. In this paper the authors present a new industrial wireless testbed design that motivates academic research and is relevant to the needs of industry. The testbed is designed to serve as both a demonstration and research platform for the wireless workcell. The work leverages lessons learned from past testbed incarnations that included a dual r…

Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineeringTestbed02 engineering and technologyRadio propagation0202 electrical engineering electronic engineering information engineeringSystems engineeringKey (cryptography)Factory (object-oriented programming)RobotWireless020201 artificial intelligence & image processingWorkcellbusinessRobotic arm
researchProduct

Comparative Analysis of Different Types of Micro-grid Architectures and Controls

2018

An innovative and smart micro-grid model is an essentialfor the integration of distributed energy resources into the electrical power distribution network. There are various types of micro-grid architectures that have been designed and implemented in the last few years. These micro-grid architectures have their key advantages and limitations. This paper has been prepared with the objective to identify and address, key challenges and solutions for integration of micro-grid into the distribution network. It reviewsdifferent micro-grid architectures and control strategies which can help to address various challenges i.e. voltage imbalance, power quality, demand side management, smooth islandin…

Computer sciencebusiness.industryDistributed computingDistributed generationControl (management)Key (cryptography)IslandingMicro gridPower qualityElectric powerbusinessVoltage2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN)
researchProduct

Energy-Efficient M2M Communications in for Industrial Automation

2020

M2M communication with autonomous data acquisition and exchange plays a key role in realizing the “control”-oriented tactile Internet (TI) applications such as industrial automation. In this chapter, we develop a two-stage access control and resource allocation algorithm. In the first stage, we introduce a contract-based incentive mechanism to motivate some delay-tolerant machine-type communication (MTC) devices to postpone their access demands in exchange for higher access opportunities. In the second stage, a long-term cross-layer online resource allocation approach is based on Lyapunov optimization, which jointly optimizes rate control, power allocation, and channel selection without pri…

Computer sciencebusiness.industryDistributed computingKey (cryptography)Resource allocationAccess controlLyapunov optimizationThe InternetbusinessAutomationCommunication channelEfficient energy use
researchProduct

Performance evaluation of sum-of-cisoids Rice/Rayleigh fading channel simulators with respect to the bit error probability

2014

Sum-of-cisoids (SOC) processes provide an important framework for the modeling and simulation of multipath fading channels. In this paper, we analyze the performance of SOC Rice/Rayleigh narrowband fading channel simulators with respect to the bit error probability (BEP) of quadrature phase shift keying (QPSK) and differential phase shift keying (DPSK) systems with both coherent and noncoherent demodulation. For the BEP of coherent QPSK and DPSK, exact analytical expressions are derived, which provide insight into the influence of the number of propagation paths and the path gains on the system performance. It will be shown that at least 10 multipath components are required to guarantee tha…

Computer sciencebusiness.industryKeyingCondensed Matter PhysicsComputer Science::PerformanceNarrowbandGeneral Earth and Planetary SciencesDemodulationFadingElectrical and Electronic EngineeringTelecommunicationsbusinessAlgorithmMultipath propagationComputer Science::Information TheoryCommunication channelPhase-shift keyingRayleigh fadingRadio Science
researchProduct