The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Underwater acoustic sensor networks are characterized by limited transmit power and bandwidth, and a harsh communication environment. Different techniques for reliable communication in underwater networks have been studied in the literature at different layers of the network protocol stack. Among these, the use of fountain codes as a way for improving the quality of the communication over a highly...
Vehicular network standard demands a short range reliable vehicle-to-vehicle (V2V) communication with high mobility, also increasing amount of downloaded data in short encounters. Satisfying demands of clients with minimum number of transmissions using index coding has proven notable significance in wireless ad-hoc networks. The proper encoding at the server with side information leads to simultaneous...
Asynchronous quasi-delay-insensitive (QDI) circuits are a promising solution for coping with aggressive process variations faced by modern technologies, as they can gracefully accommodate gate and wire delay variations. Furthermore, due to their inherent robustness, such circuits are also promising for deep voltage scaling applications, where delays are orders of magnitude larger. However, QDI design...
In this paper, we initiate the study of garbled protocols — a generalization of Yaos garbled circuits construction to distributed protocols. More specifically, in a garbled protocol construction, each party can independently generate a garbled protocol component along with pairs of input labels. Additionally, it generates an encoding of its input. The evaluation procedure takes as input...
To satisfy the requirements of complex distributed power electronic system (PES) communication, this paper has proposed a single optic-fiber link data communication protocol based on the Manchester code due to an vacancy in the commonly-adopted protocols, analyzed the encoding and decoding principle of Manchester code, defined the formats of command frame and data frame, calculated the communication...
While prior studies on student innovation have examined cognitive and social aspects, recent studies have demonstrated the important role motivation plays in the engineering student experience of innovation, particularly in dealing with the unique challenges innovation presents. However, motivation can be observed in diverse ways and at diverse levels. Using Deci & Ryan's Self-determination Theory,...
This paper presents the joint design of network coding and backpressure algorithm for cognitive radio networks and its implementation with software-defined radios (SDRs) in a high fidelity network emulation testbed. The backpressure algorithm is known to provide throughput optimal solutions to joint routing and scheduling for dynamic packet traffic. This solution applies to cognitive radio networks...
We investigate adaptive transmission for tactical packet radio networks in which a source uses fountain coding to multicast a file to a number of destinations over time-varying links. We examine two strategies from the literature for packet-by-packet adaptation of the modulation and channel code. The maximum data-recovery rate philosophy attempts to maximize the throughput for each transmitted packet...
The 10Gbase-KR protocol is widely used to accomplish the high speed data conversion in the Ethernet area. This paper presents a design of the critical controller in the physical coding sublayer based on the 10Gbase-KR. In order to satisfy the demand of the high speed data conversion, the scrambler and descrambler are specially designed to work in a parallel mode. The post-synthesis simulation results...
The Kiwi project revolves around a compiler that converts C# .NET bytecode into Verilog RTL and/or SystemC. An alpha version of the Kiwi toolchain is now open source and a user community is growing. We will demonstrate an incremental approach to large system assembly of HLS and blackbox components, based on an extended IP-XACT intermediate representation. We show how to address multi-FPGA designs...
The specification of the Transport Layer Security (TLS) protocol defines its own presentation language used for the purpose of semi-formally describing the structure and on-the-wire format of TLS protocol messages. This TLS Presentation Language (TPL) is more expressive and concise than natural language or tabular descriptions, but as a result of its limited objective has a number of deficiencies...
A cryptographic security scheme is proposed for a subsystem of the integrated computer-aided system that is intended for holding elections and counting the election returns. The main idea is to use two modern quantum cryptographic technologies: quantum bit commitment and quantum secret sharing. The scheme of information security of vote count procedure, and also the quantum bit commitment protocol...
The existing communication technologies for IOT have become either saturated or do not meet actual needs, regarding long distances or low power consumption. We propose a study about mobility for the LoRa protocol, a new Low Power Wide Area Network technology. The paper draws upon a short overview of LoRa physical layer protocol, as well as on our testing design, some distances achieved and signal...
In the next few years, the development of wireless communication systems propel the world into a fully connected society where the Machine-type Communications (MTC) plays a substantial role as key enabler in the future cellular systems. MTC is categorized into mMTC and uMTC, where mMTC provides the connectivity to massive number of devices while uMTC is related to low latency and ultra-high reliability...
In this paper, we focus on the problem of collision in tags identification in RFID systems. We propose tree algorithm with single error bit tracking that utilizes Manchester coding to know the position of collision bit among the ID of the tags. The reader broadcasts the Query bit that is updated in every collision. The update is done according to the position of the collision bit that allows to reduce...
System-on-a-Chip (Soc) design has become more complex, because many functional components or IPs (Intellectual Property) will be integrated within a chip. The test of integration is “how to verify on-chip communication properties”. Since conventional simulation-based bus protocol monitors can validate whether bus signals obey bus protocol or not, but they often lack of efficient debugging techniques...
As a specific example of network coding, the butterfly network often represents the networks with bottlenecks. In this paper, we propose a typical butterfly quantum network coding scheme based on remote state preparation of arbitrary two-qubit states with the assistance of GHZ channels. Firstly, in a butterfly network, each source node simultaneously performs two appropriate projective measurements...
This paper focuses on one type of Covert Storage Channel (CSC) that uses the 6-bit TCP flag header in TCP/IP network packets to transmit secret messages between accomplices. We use relative entropy to characterize the irregularity of network flows in comparison to normal traffic. A normal profile is created by the frequency distribution of TCP flags in regular traffic packets. In detection, the TCP...
Quantum secure direct communication is one of the major branches of quantum cryptography. In quantum secure direct communication, secret information can be transmitted directly through a quantum channel without the use of a private key. Quantum secure direct communication(QSDC) offers higher security and instantaneousness in communication. Because it does not use private key, key management is dispensed...
Interference forwarding by a relay enhances the interference level and enables the cancellation of the interference. If the interfering source to relay link is not strong, then the relay can decode a part of the interference and forward it to the destination, and the destination can cancel only that part of the interference. It is known as partial decode-and-forward (PDF) and partial interference...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.