28 Hits in 11.6 sec

Wireless Chaos-Based Communication Systems: A Comprehensive Survey

Georges Kaddoum
2016 IEEE Access  
Recently, the major focus, however, has been given to the non-coherent chaos based systems to benefit from the advantages of chaotic signals and noncoherent detection and to avoid the use of chaotic synchronization  ...  It outlines first the challenges of chaos implementations and synchronization methods, followed by comprehensive literature review and analysis of chaos-based coherent techniques and their applications  ...  On the other hand, with non-coherent receivers, like differential chaos shift keying (DCSK) systems or chaos-based on off Keying (COOK) systems chaotic signal generation and synchronization are not required  ... 
doi:10.1109/access.2016.2572730 fatcat:vk4pho2hubbtxirku45jdll7sq

2020 Index IEEE Transactions on Circuits and Systems I: Regular Papers Vol. 67

2020 IEEE Transactions on Circuits and Systems Part 1: Regular Papers  
., +, TCSI Oct. 2020 3574-3587 Efficient and Secure Non-Coherent OFDM-Based Overlapped Chaotic Chip Position Shift Keying System: Design and Performance Analysis.  ...  Wu, Z., Efficient and Secure Non-Coherent OFDM-Based Overlapped Chaotic Chip Position Shift Keying System: Design and Performance Analysis; TCSI Jan. 2020 309-321 Zhang, L., see Bose, S.K., TCSI March  ...  ., TCSI Dec. 2020 5092-5100 High-Efficiency Low Voltage Inverse Class-F Power Amplifier Design Based on Harmonic Control Network Analysis.  ... 
doi:10.1109/tcsi.2021.3055003 fatcat:kbmst5td2bbvtl7vpbj3knnkri

2019 Index IEEE Transactions on Circuits and Systems I: Regular Papers Vol. 66

2019 IEEE Transactions on Circuits and Systems Part 1: Regular Papers  
Li, H., +, TCSI April 2019 1620-1631 Amplitude shift keying A 0.34 mm 2 1 Gb/s Non-Coherent UWB Receiver Architecture With Pulse Enhancement and Double PLL Clock/Data Packet Recovery.  ...  Jeon, Y., +, TCSI Oct. 2019 3797-3810 A 0.34 mm 2 1 Gb/s Non-Coherent UWB Receiver Architecture With Pulse Enhancement and Double PLL Clock/Data Packet Recovery.  ...  Analysis of SRAM Enhancements Through Sense Amplifier  ... 
doi:10.1109/tcsi.2020.2966967 fatcat:f663jj5g45e3peggn3gwn5jys4

2020 Index IEEE Photonics Journal Vol. 12

2020 IEEE Photonics Journal  
., +, JPHOT April 2020 7901512 Prediction Algorithm of Key Design Parameters for Space Chaotic Optical Communication System.  ...  ., +, JPHOT April 2020 7902011 DNA A Novel Hybrid Secure Method Based on DNA Encoding Encryption and Spiral Scrambling in Chaotic OFDM-PON.  ...  Light interferometry Fourier and Inverse Fourier Transform Model for Delayed Self-interferometry System. Zhang  ... 
doi:10.1109/jphot.2021.3050278 fatcat:lbfms2rznnhurdanu5rfora5pe

2020 Index IEEE Transactions on Wireless Communications Vol. 19

2020 IEEE Transactions on Wireless Communications  
Identification for MIMO Systems in Dynamic Environments; TWC June 2020 3643-3657 Huang, C., see Yang, M., TWC Sept. 2020 5860-5874 Huang, D., Tao, X., Jiang, C., Cui, S., and Lu, J  ...  ., and Saad, W., Joint Access and Backhaul Resource Management in Satellite-Drone Networks: A Competitive Market Approach; TWC June 2020 3908-3923 Hu, Y.H., see Xia, M., TWC June 2020 3769-3781 Hua,  ...  Maric, A., +, TWC Dec. 2020 7864-7880 Chaotic communication Design and Performance Analysis of a New M-Ary Differential Chaos Shift Keying With Index Modulation.  ... 
doi:10.1109/twc.2020.3044507 fatcat:ie4rwz4dgvaqbaxf3idysubc54

A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels

Junqing Zhang, Guyue Li, Alan Marshall, Aiqun Hu, Lajos Hanzo
2020 IEEE Access  
ACKNOWLEDGEMENTS We would like to thank Mr Yan Wang for his hard work implementing the key generation demonstration system during his final year project.  ...  Apart from the above OFDM-based applications, a chaotic signal-based key generation was proposed in [181] for transmissions over frequency-selective fading channels.  ...  Key generation security analysis. As mentioned above, the attack model is weak. It is strongly recommended to enhance the security analysis and the investigation of both passive and active attacks.  ... 
doi:10.1109/access.2020.3012006 fatcat:yqlhgsxfjvdwvfo2jcvxxzhj2i

Roadmap on all-optical processing

Paolo Minzioni, Cosimo Lacava, Takasumi Tanabe, Jianji Dong, Xiaoyong Hu, Gyorgy Csaba, Wolfgang Porod, Ghanshyam Singh, Alan E Willner, Ahmed Almaiman, Victor Torres-Company, Jochen Schröder (+20 others)
2019 Journal of Optics  
This work was partially supported by an NSF NEB 2020 grant and an NSF EAGER award.  ...  Acknowledgments We are grateful to George Bourianoff (Intel corp.) for discussions and for seed funding for our work.  ...  From a DSP-based coherent system to an analogue signal processing based coherent system for data centre interconnection.  ... 
doi:10.1088/2040-8986/ab0e66 fatcat:6zg52wqctvgldeddmehkezzjnq

An Ultra Wideband Survey: Global Regulations and Impulse Radio Research Based on Standards

Ville Niemela, Jussi Haapola, Matti Hamalainen, Jari Iinatti
2017 IEEE Communications Surveys and Tutorials  
Our purpose is to provide an in-depth survey with a clearly specified topic together with the standard specifications and the related regulatory restrictions.  ...  The latter standard including the UWB specifications was first published in 2007 and the latest revision dates to 2015. The focus in this article is the period from 2007 to 2015.  ...  The article presents also results of the implemented system based on non-coherent receivers.  ... 
doi:10.1109/comst.2016.2634593 fatcat:24c47v73jbdgxpephkqpbgu3ke

National Conference on Recent Advances in Communication Engineering and Information Technology

2020 International journal for innovative engineering and management research  
We provide a broad-based engineering curriculum, with opportunities for specialization and self-directed learning and development.  ...  Our first mission is to educate Electronics and Communication engineers for Indian and Global industries.  ...  277 Design and Performance Analysis of Hybrid SPDT Rf Mems Switch 277 278 Design and Performance Analysis of Double Cantilever Type Capacitive Shunt Rf Mems Switch 279 A Modified Proposed Capacitance  ... 
doi:10.48047/ijiemr/v08/spe/02 fatcat:woay334irjgebf5bixuc4ng6em

Optical Communication in Space: Challenges and Mitigation Techniques

Hemani Kaushal, Georges Kaddoum
2017 IEEE Communications Surveys and Tutorials  
The first part of the paper will focus on various types of impairments that pose a serious challenge to the performance of optical communication system for ground-to-satellite or satellite-to-ground and  ...  It also provides details of various performance mitigation techniques in order to have high link availability and reliability.  ...  His recent research activities cover wireless communication systems, chaotic modulations, secure transmissions, and space communications and navigation. Dr.  ... 
doi:10.1109/comst.2016.2603518 fatcat:zv3fa7k2pbet3pi6gphq6izqae

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
In [202] , authors have designed a flexible, efficient and secure retrieval system based on fog and cloud computing.  ...  In [198] authors designed a secured and efficient system for data distribution in MCC.  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

Bibliography on cyclostationarity

Erchin Serpedin, Flaviu Panduru, Ilkay Sarı, Georgios B. Giannakis
2005 Signal Processing  
The present bibliography represents a comprehensive list of references on cyclostationarity and its applications.  ...  An attempt has been made to make this bibliography complete by listing most of the existing references up to the year 2005 and by providing a detailed classification group. r  ...  Halford, Performance analysis of blind equalizers based on cyclostationary statistics, in: 28th Conference on Information Sciences and Systems, CISS '94, Princeton, NJ, 16-18 March 1994, pp. 873-876  ... 
doi:10.1016/j.sigpro.2005.05.002 fatcat:kbbwleidwnhzhhp3uekidxlx5u

8th Laser Display and Lighting Conference: Abstract Book

Tetsuya Yagi, Keisuke Hieda, Sunao Kurimura
2019 8th Laser Display and Lighting Conference  
., Ltd. and Konica Minolta Japan, Inc, for providing instruments and fruitful discussions, and Dr Kenichiro Masaoka of NHK for critical reading of the manuscript and for providing colour gamut volume calculations  ...  Kuroda from Utsunomiya University, and Prof. Kinoshita and Mr. Ochi from Osaka University for their advices on the measuring and calculating method of color speckle.  ...  Design and device fabrication We adopt the chaotic cavity to obtain many pseudorandom spatial modes for low coherence [4, 6] .  ... 
doi:10.1117/12.2540345 fatcat:3nfr7hbuznhmjldyseexbt5xqu

9th Laser Display and Lighting Conference: Abstract Book

Kazuo Kuroda, Hiroshi Murata
2020 9th Laser Display and Lighting Conference  
Acknowledgement This work was supported by the National Key R&D Program of China (2016YFB0401804).  ...  Fig. 2 A plasmonic spectral filter (a plasmonic mirror) with the metal-insulator-metal (MIM) structure (upper) and white LED spectra before and after filtering (bottom).  ...  This can be achieved using a projector based on a MEMS scanning mirror, with no additional hardware. The following work presents key points in designing a MEMS based projector system.  ... 
doi:10.1117/12.2574806 fatcat:zu6picunx5cyfi5uq3gfnixzfi

An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers

Fang Zuo, Wei Zhang
2014 Journal of Networks  
Telecommunication networks need to support a wide range of services and functionalities with capability of autonomy, scalability and adaptability for managing applications to meet business needs.  ...  This paper explores an introduction to networks programmability, by distributing independent computing environment, which would be demonstrated through a structured system named DAIM model (Distributed  ...  Based on the specific security issues and security requirements of RFID systems, we had summed up a series of rules called R-RAPSE, designed to provide systematic theory support for RFID authentication  ... 
doi:10.4304/jnw.9.01.10-17 fatcat:tbmafdamk5am7a6ba26gsxzydq
« Previous Showing results 1 — 15 out of 28 results