Search results for "Key"
showing 10 items of 1962 documents
Robustness of 40 Gb/s ASK modulation formats in the practical system infrastructure.
2006
In this work, we analyzed by means of numerical and laboratory experiments the resilience of 40 Gb/s amplitude shift keying modulation formats to transmission impairments in standard single-mode fiber lines as well as to optical filtering introduced by the optical add/drop multiplexer cascade. Our study is a pre-requisite to assess the implementation of cost-effective 40 Gb/s modulation technology in next generation high bit-rate robust optical transport networks. © 2006 Optical Society of America.
An asynchronous covert channel using spam
2012
AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…
Incomplete 3D motion trajectory segmentation and 2D-to-3D label transfer for dynamic scene analysis
2017
International audience; The knowledge of the static scene parts and the moving objects in a dynamic scene plays a vital role for scene modelling, understanding, and landmark-based robot navigation. The key information for these tasks lies on semantic labels of the scene parts and the motion trajectories of the dynamic objects. In this work, we propose a method that segments the 3D feature trajectories based on their motion behaviours, and assigns them semantic labels using 2D-to-3D label transfer. These feature trajectories are constructed by using the proposed trajectory recovery algorithm which takes the loss of feature tracking into account. We introduce a complete framework for static-m…
The role of network connectivity on epileptiform activity.
2021
AbstractA number of potentially important mechanisms have been identified as key players to generate epileptiform activity, such as genetic mutations, activity-dependent alteration of synaptic functions, and functional network reorganization at the macroscopic level. Here we study how network connectivity at cellular level can affect the onset of epileptiform activity, using computational model networks with different wiring properties. The model suggests that networks connected as in real brain circuits are more resistant to generate seizure-like activity. The results suggest new experimentally testable predictions on the cellular network connectivity in epileptic individuals, and highligh…
An improvement of NFC-SEC with signed exchanges for an e-prescription-based application
2013
International audience; In the context of an aging population, drug intake can be a potential source of errors leading to death in some cases. Almost all of these errors are unintentional and come from incorrect prescriptions, unsuitable dosages for the patient or incompatibility with other treatments. To limit these risks which are especially important in the elderly or pre-dependency, we propose a secure system for drug treatment through the NFC (Near Field Communication) contact-less communication technology. The proposed system provides security mechanisms such as integrity, authentication, encryption and non-repudiation. To ensure this security, an extension of the international standa…
Wireless sensor network for Spectrum Cartography based on Kriging interpolation
2012
Dynamic spectrum access with Cognitive Radio (CR) network is a promising approach to increase the efficiency of spectrum usage. To allow the optimization of resource allocation and transmission adaptation techniques, each CR terminal needs to acquire awareness of the state of the time-frequency-location varying radio spectrum. In this paper we present a Spectrum Cartography (SC) approach where CR terminals are supported by a fixed wireless sensor network (WSN) to estimate and update the Power Spectral Density (PSD) over the area of interest. The wireless sensors collaborate to estimate the spatial distribution of the received power at a given frequency using either a centralized or a distri…
Smart Manufacturing Testbed for the Advancement of Wireless Adoption in the Factory
2020
Wireless communication is a key enabling technology central to the advancement of the goals of the Industry 4.0 smart manufacturing concept. Researchers at the National Institute of Standards and Technology are constructing a testbed to aid in the adoption of wireless technology within the factory workcell and other harsh industrial radio environments. In this paper the authors present a new industrial wireless testbed design that motivates academic research and is relevant to the needs of industry. The testbed is designed to serve as both a demonstration and research platform for the wireless workcell. The work leverages lessons learned from past testbed incarnations that included a dual r…
Comparative Analysis of Different Types of Micro-grid Architectures and Controls
2018
An innovative and smart micro-grid model is an essentialfor the integration of distributed energy resources into the electrical power distribution network. There are various types of micro-grid architectures that have been designed and implemented in the last few years. These micro-grid architectures have their key advantages and limitations. This paper has been prepared with the objective to identify and address, key challenges and solutions for integration of micro-grid into the distribution network. It reviewsdifferent micro-grid architectures and control strategies which can help to address various challenges i.e. voltage imbalance, power quality, demand side management, smooth islandin…
Energy-Efficient M2M Communications in for Industrial Automation
2020
M2M communication with autonomous data acquisition and exchange plays a key role in realizing the “control”-oriented tactile Internet (TI) applications such as industrial automation. In this chapter, we develop a two-stage access control and resource allocation algorithm. In the first stage, we introduce a contract-based incentive mechanism to motivate some delay-tolerant machine-type communication (MTC) devices to postpone their access demands in exchange for higher access opportunities. In the second stage, a long-term cross-layer online resource allocation approach is based on Lyapunov optimization, which jointly optimizes rate control, power allocation, and channel selection without pri…
Performance evaluation of sum-of-cisoids Rice/Rayleigh fading channel simulators with respect to the bit error probability
2014
Sum-of-cisoids (SOC) processes provide an important framework for the modeling and simulation of multipath fading channels. In this paper, we analyze the performance of SOC Rice/Rayleigh narrowband fading channel simulators with respect to the bit error probability (BEP) of quadrature phase shift keying (QPSK) and differential phase shift keying (DPSK) systems with both coherent and noncoherent demodulation. For the BEP of coherent QPSK and DPSK, exact analytical expressions are derived, which provide insight into the influence of the number of propagation paths and the path gains on the system performance. It will be shown that at least 10 multipath components are required to guarantee tha…