Filters








81 Hits in 7.5 sec

LT Codes with Double Encoding Matrix Reorder Physical Layer Secure Transmission

Hang Zhang, Fanglin Niu, Ling Yu, Si Zhang, Kashif Naseer
2022 Journal of Sensors  
To reduce the intercept efficiency of eavesdropping nodes, a physical layer security (PLS) method of LT codes with double encoding matrix reorder (DEMR-LT codes) is proposed.  ...  This method performs two consecutive LT code concatenated encoding on the source symbol, and part of the encoding matrix is reordered according to the degree value of each column from large to small, which  ...  Figure 2 : 2 Figure 2: DEMR-LT codes' physical layer security encoding model.  ... 
doi:10.1155/2022/6106786 fatcat:wx4yprsr6nhc5kurxlfdpgx4ja

Multilayer Dynamic Encryption for Security OFDM-PON Using DNA-reconstructed Chaotic Sequences under Cryptanalysis

Mengwei Cui, Chongfu Zhang, Yuhang Chen, Zhi Zhang, Tingwei Wu, Heping Wen
2021 IEEE Access  
A security enhancement scheme combining improved DNA coding at the bit-level and matrix scrambling at the symbol-level is proposed to obtain a larger key space and ensure the security of the physical layer  ...  The reliability of the physical layer is improved by scrambling subcarriers [8] - [10] . Double-chaos is used for floating probability shaping (PS).  ... 
doi:10.1109/access.2021.3054380 fatcat:zazeqk5jnbccbj5mxd2m5znsda

A Testbed for Evaluating Video Streaming Services in LTE

M. Solera, M. Toril, I. Palomo, G. Gomez, J. Poncela
2017 Wireless personal communications  
The main contribution of this testbed is the modification of NetEm code to model the impact of time correlation between packet arrivals on the packet delay in a video stream.  ...  With the deployment of the first commercial Long Term Evolution (LTE) networks, mobile operators need to understand how Quality of Service (QoS) network indicators and codec parameters affect subjective  ...  In the case of video streaming service, such a complexity comes from the introduction of data encryption (e.g., Transport Layer Security-TLS, Secure Sockets Layer-SSL [4] ), adaptive coding (e.g., MPEG-DASH  ... 
doi:10.1007/s11277-017-4999-0 fatcat:hx3ycd3u7jcdhiwata46q34grq

Network Coding as a WiMAX Link Reliability Mechanism [article]

S. Teerapittayanon, K. Fouli, M. Medard, M.-J. Montpetit, X. Shi, I. Seskar, A. Gosain
2013 arXiv   pre-print
Our network coding (NC) architecture uses a flexible thread-based design, with each encoder-decoder instance applying systematic intra-session random linear network coding as a packet erasure code at the  ...  Our experiments show that network coding as a packet erasure code in the upper layers of the protocol stack has the potential to reduce the need for joint HARQ/ARQ schemes in the PHY/MAC layers, thus offering  ...  PHY-and MAC-Layer Settings At the physical layer, four fixed downlink MCSs and BS transmission power levels are available, with increasing PHY code rates and power levels.  ... 
arXiv:1208.4766v2 fatcat:qrrfyzgotjeung7iebzafjlhje

Protocols and Mechanisms to Recover Failed Packets in Wireless Networks: History and Evolution

Sheraz Ali Khan, Muhammad Moosa, Farhan Naeem, Muhammad Hamad Alizai, Jong-Myon Kim
2016 IEEE Access  
Despite years of active research in the field, we lack a comprehensive survey that summarizes recent developments in this area and highlights avenues with potential for future growth.  ...  The proliferation of multimedia services on 3G and long term evolution networks, and the stringent quality of service requirements for these applications have given birth to robust codes and new error  ...  links to the finest level of data transmissions, i.e symbols, code words and pseudo-noise chip sequence (physical layer).  ... 
doi:10.1109/access.2016.2593605 fatcat:gfekacgponhwbnyydpccxwnia4

Wireless LAN Comes of Age: Understanding the IEEE 802.11n Amendment

Thomas Paul, Tokunbdo Ogunfrunmiri
2008 IEEE Circuits and Systems Magazine  
The latest draft of IEEE 802.11n (Draft 3.0) offers the potential of throughputs beyond 200 Mbps, based on physical layer (PHY) data rates up to 600 Mbps.  ...  A description of channel modeling with MIMO is shown, followed by the signal processing techniques employed, including MIMO channel estimation and detection, space-time block coding (STBC), and transmitter  ...  Afterwards, the physical layer (PHY) for 802.11n is described.  ... 
doi:10.1109/mcas.2008.915504 fatcat:p6q5fqwkvbc2pggsxzydchmkmm

VR-LAB---a distributed multi-user environment for educational purposes and presentations

Dieter W. Fellner, Armin Hopp
1999 Proceedings of the fourth symposium on Virtual reality modeling language - VRML '99  
(4x3 matrix of floats, 12 times 4 bytes) The modification of a camera is coded as: • tag: (double, 64 bit, value: modify camera: 0x0203000000000000) • length: (int,2 byte, value: 58) • eye point (float  ...  Updates concern one object at a time, resulting in low data rates using secure transmission.  ...  It shows the circuit layouts which were used to built the environmental, camera and audio controllers and the source code listings of the software programmed into the PIC microcontroller.  ... 
doi:10.1145/299246.299286 dblp:conf/vrml/FellnerH99 fatcat:hsdtvxxhjnbqjdk76zx3empxcy

RSS++

Tom Barbette, Georgios P. Katsikas, Gerald Q. Maguire, Dejan Kostić
2019 Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies - CoNEXT '19  
While the current literature typically focuses on load-balancing among multiple servers, in this paper, we demonstrate the importance of load-balancing within a single machine (potentially with hundreds  ...  Additionally, functions needing to reconstruct the payload and reorder packets, e.g., Deep Packet Inspection (DPI), proxy caches, or Transport Layer Security (TLS) termination proxies need to handle the  ...  Concurrently processing packets can double the CPU usage, but highly increases reordering. Can the state migration algorithm handle RSS++'s migrations?  ... 
doi:10.1145/3359989.3365412 dblp:conf/conext/BarbetteKMK19 fatcat:mfqyg32ywvbmjpg4lppgmk76iu

Hints and Principles for Computer System Design [article]

Butler Lampson
2021 arXiv   pre-print
This is simplest if the parts being reordered commute. They do in a functional program, but code with side effects may not.  ...  So a layer is a big module, normally a client of its host, a single layer below it, with one or more layers as its clients above it.  ... 
arXiv:2011.02455v3 fatcat:jolyz5lknjdbpjpxjcrx5rh6fa

Applying Secure Multi-Party Computation In Practice

Riivo Talviste
2017 Zenodo  
Involving large stakeholders like government institutions introduces also some non-technical requirements like signing contracts and negotiating with the Data Protection Agency.  ...  In this work, we present solutions for technical difficulties in deploying secure multi-party computation in real-world applications.  ...  However, these messages are transferred over a TLS channel between the security servers for secure transmission over the internet.  ... 
doi:10.5281/zenodo.1116316 fatcat:jhzsyrgt2beptj6jdb6axtvzfy

Entropy of quantum channel in the theory of quantum information [article]

Wojciech Roga
2011 arXiv   pre-print
Such operations describe discrete time evolution of an open quantum system interacting with an environment.  ...  A relation between the Holevo information and the entropy of an auxiliary matrix consisting of square root fidelities between the elements of the ensemble is proved in some special cases.  ...  Therefore, quantum coding consists in taking states from the smaller subspace of dimension 2 kS(ρ) instead of a space of dimension N k to encode the same message.  ... 
arXiv:1108.5065v3 fatcat:uazwprzpx5dsxdlkbptybsafbq

Meshless techniques for anisotropic diffusion

Annamaria Mazzia, Giorgio Pini, Flavio Sartoretto
2014 Applied Mathematics and Computation  
Our approach is to develop locally conservative Eulerian-Lagrangian (or semi-Lagrangian) methods combined with ideas from Eulerian WENO schemes, since they have the potential to attain the desired properties  ...  Numerical models of compaction and advection-diffusion of a porous matrix with a spherical inclusion are built using the automated code generation package FEniCS.  ...  We will focus on parallelisation and discuss a run-length encoding to deal with the data exchange on the shared inter-process edges.  ... 
doi:10.1016/j.amc.2014.03.032 fatcat:c527226gyfgbffnq4p67qxd7wi

On the Energy Efficiency of Physical Topology Design for IP over WDM Networks

X. Dong, El-Gorashi, Elmirghani
2012 Journal of Lightwave Technology  
This paper has been published jointly with my supervisor Prof. Jaafar Elmirghani, Dr. Taisir Elgorashi and Mr. Ahamd Lawey who is a PhD student in our research group.  ...  The physical topology has been optimised under a symmetric full-mesh connectivity traffic matrix considering a limited number of links.  ...  Traffic is currently growing at about 40% per year and therefore is doubling approximately every 2 years [3] .  ... 
doi:10.1109/jlt.2012.2186557 fatcat:qao52hoconhlxmvvgyabeofqxa

Downloadable Full Issue

2020 Hungarian Journal of Industry and Chemistry  
The Randles circuit parameters such as the resistances Rs and Rct, double-layer C dl , leaky capacitance CPE and Warburg coefficients were estimated using ZView software.  ...  In this paper, the torque transmission time-constant of a simple disk-type magnetorheological (MR) clutch is investigated.  ...  We would like to thank Zoltán Lukács and Tamás Kristóf to support conducting EIS measurements in the laboratory of Faculty of Physical Chemistry and sharing their knowledge in electrochemical modeling.  ... 
doi:10.33927/931 fatcat:pgjn46w74vb5djx3koev7lnsty

The Delft-Java Engine [chapter]

John Glossner, Stamatis Vassiliadis
2002 Java Microarchitectures  
As with data-handling operations, the format transformations are code independent (e.g. decoding and encoding steps are not involved).  ...  Indicators that are recorded as the result of a general computation are termed condition codes because they encode secondary operations. A problem with condition codes is that they constitute state.  ...  Previously, John managed groups at IBM Research whose efforts were directed at DSP designs and highperformance transmission systems. .  ... 
doi:10.1007/978-1-4615-0993-6_6 fatcat:67xqmkixtva7nbrqcuwlh2e5wu
« Previous Showing results 1 — 15 out of 81 results