A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Integrated all-optical manipulation of orbital angular momentum carrying modes via enhanced electro-optic Kerr effect
[article]
2018
arXiv
pre-print
OAM based high-dimensional Quantum Key Distribution (QKD) encrypted channels also improve transmission rate and security. ...
All-optical mode-selective spatial distribution manipulation is a significant function in implemented MDM and QKD networks. ...
High-dimensional QKD is feasible by OAM modulated states and provides higher transmission rates and security [13, 14] . ...
arXiv:1812.08111v1
fatcat:uojts3gaznfbpd2qb42cjv4dre
Securing and auto-synchronizing communication over free-space optics using quantum key distribution and chaotic systems
2018
Quantum Communications and Quantum Imaging XVI
In this paper, we demonstrate a communication protocol that demonstrates improved security and longer-range FSO communication, compared to existing FSO security techniques, such as N-slit interferometers ...
A Lorenz chaotic system, which is inherently secure and auto-synchronized, is utilized for secure data communications over a classical channel, while QKD is used to exchange crucial chaotic system parameters ...
In this paper, we propose a scheme which combines chaotic communications with quantum key distribution, in order to achieve more secure and synchronized FSO communication. ...
doi:10.1117/12.2318849
fatcat:kvvwipxgvbbxpo75y2mkhh43oa
Integrated optical modulator manipulating the polarization and rotation handedness of Orbital Angular Momentum states
2017
Scientific Reports
It is shown that all four possible output polarization-OAM encoded states can be achieved with only 6 V and 7 V applied voltages to the electrodes in the two parts of the modulator. ...
In addition, secure transmission is one of the concerns of communication systems. ...
In the proposed modulator, |+1〉|H〉 is assumed to be as the input state and four desired output quantum states of |−1〉|H〉, |−1〉|V〉, |+1〉|V〉, and |+1〉|H〉 can be achieved exploiting the advantages of a high-frequency ...
doi:10.1038/s41598-017-04118-5
pmid:28630486
pmcid:PMC5476591
fatcat:oihcgglhjnebjnjxdyzwvaltli
Secured ECG signal transmission for human emotional stress classification in wireless body area networks
2016
EURASIP Journal on Information Security
In this paper, we specially work on a secured electrocardiogram (ECG) signal transmission scheme to prevent further injuries for patients with heart diseases from human emotional stress. ...
Simulation results show that the improved transmission rate and signal power capacity can lower the probability of data intercept (LPI) and detection (LPD) by taking the advantages of both temporal and ...
Then, further research found that the improved transmission data rate and signal power are related to the higher level of transmission security in wireless communication. ...
doi:10.1186/s13635-015-0024-x
fatcat:me4dc2pzxfczdkebzicfb2npza
A brick-architecture-based mobile under-vehicle inspection system
2005
Unmanned Ground Vehicle Technology VII
This system has been successfully used in several military applications and proved to be an effective safer method for national security. ...
Each brick is mainly composed by five modules: data acquisition, data processing, data transmission, power, and self-management. ...
ACKNOWLEDGEMENTS We greatly thank Cheng Chang for his work in developing the mobility bricks and navigation algorithms, and Zhenhao Cheng for his work in developing the communication DLL and building the ...
doi:10.1117/12.602979
fatcat:ud6zxbox6vhjtj2v4mh5ktpftq
ENERGY-EFFICIENT CODING MATRIX FMD-RDA SECURE TRANSMISSION SCHEME BASED ON QUADRATURE SPATIAL MODULATION FOR MMWAVE SYSTEMS
2019
Progress In Electromagnetics Research M
This paper proposes coding matrix secure transmission based on quadrature spatial modulation (QSM) utilizing a frequency modulated diverse retrospective array (FMD-RDA). ...
Artificial noise (AN) aided method in mmWave is hard to realize due to large transmit antennas and also requires additional power. ...
QSM Modulator Scheme Following [32] , herein, we demonstrate the principle of QSM transmission. We consider MISO and quadrature amplitude modulation (4-QAM). ...
doi:10.2528/pierm19021403
fatcat:iiftslxogjfnpkbckmnw5unuwm
System for efficient and secure distribution of medical images on the Internet
1998
Proceedings. AMIA Symposium
A progressive transmission algorithm with automatic security filtering features for on-line medical image distribution using Daubechies' wavelets has been developed and is discussed in this paper. ...
The system is practical for real-world applications, processing and coding each 12-bit image of size 512 x 512 within 2 seconds on a Pentium Pro. ...
Acknowledgments We would like to thank Oscar Firschein and Michel Bilello of Stanford University, and Steve Wong of University of California at San Francisco for valuable help and discussions. ...
pmid:9929350
pmcid:PMC2232158
fatcat:nf47hzhxszfw7g3fvzotp674ou
A New Mechanism for Network Monitoring and Shielding in Wireless LAN
2014
Mathematical Problems in Engineering
During the development of WLAN, the security is more and more important, and wireless monitoring and shielding are of prime importance for network security. ...
We implemented an actual wireless LAN monitoring and shielding system on Maemo operating system to monitor wireless network data stream efficiently and solve the security problems of mobile users. ...
Plan Grant no. 2012BAH15F03, and by NSFC under Grants 51174210, 61003102, and 61103072. ...
doi:10.1155/2014/620926
fatcat:xncgptgsefa2fckmrl5solc7gu
Transmission Matrix Measurement of Multimode Optical Fibers by Mode-Selective Excitation Using One Spatial Light Modulator
2019
Applied Sciences
However, their use is hampered by mode mixing and other effects, leading to speckled output patterns. This can be overcome by measuring the transmission matrix (TM) of a multimode fiber. ...
The TM determines the amplitude and phase relationships of the modes, which allows us to understand the mode scrambling processes in the MMF and can be used for mode division multiplexing. ...
In [20] , an amplitude-only modulator based on digital micromirrors is used to achieve a light field modulation. ...
doi:10.3390/app9010195
fatcat:cc4sdlazkjfdpcc5ww5dvynvrm
Diagnosis-Steganography-Transmission: An Innovative Integrated Paradigm for ECG Healthcare
2021
SN Computer Science
offers computing distribution of diagnosis, UEP-based steganography, and UEP-based transmission are inherently connected with each other. ...
things, and the wireless communication module is typically very energy-hungry, so offloading some computing tasks to the edge is a lot of energy economical [59] . ...
In our previous work [1] , we have proposed Deep Neural Network (DNN)-based Neural-JS 2 C 2 to achieve the optimum rate allocation for our secure and energy-efficient transmission framework for the ECG ...
doi:10.1007/s42979-021-00721-6
fatcat:mrh54y72xnaqnewwhstbhp2lka
A Survey on Sharing Secret Image using NVSS Scheme
2016
International Journal of Computer Applications
This information can be in the form of documents, images, photographs and many more. ...
Hence the transmission of secret image with the cover image is secured. At the receiver end the share is decomposed into secret image and cover image. ...
At this stage the generated share is decomposed into cover image and secret image. In this way, receiver can receive the secret image securely. ...
doi:10.5120/ijca2016908154
fatcat:olzewww3lrbspprskwq7hw5zpy
Research of SOA-Based Data Exchange Platform
2013
Applied Mechanics and Materials
Solve the data exchange process in a variety of data transmission and efficient mutual use of data transmission services. ...
omplexity and versatility of problems encountered in the process in order to improve the traditional data exchange platform, "Proxy + server "loosely coupled mode data exchange platform system, system ...
structure: From the module structure, 8 core modules to achieve the main function of the DEP system, These modules according to the division level is decomposed into multiple sub-modules, each sub-divided ...
doi:10.4028/www.scientific.net/amm.347-350.2266
fatcat:vszhzckmvfbubbmxyqcpvcp5yi
High Level Security of Image Transmission through STBC-COFDM System
2023
International Journal of Intelligent Engineering and Systems
The bit error rate (BER) performance of the suggested system achieved 10 -4 at SNR=1, and 2 dB for (TLC, LSC) and STC, respectively. ...
In this paper, the security of image transmission through space time block coding (STBC)-coded orthogonal frequency division multiplexing (COFDM) is enhanced using two stage algorithms. ...
In this paper, one level of security was included and AWGN channel was considered to test the secure image transmission system. ...
doi:10.22266/ijies2023.0228.14
fatcat:cjpa7xtxifeubg34qzwzhwvyiy
The Physical Layer Security Beamforming Method based on Large-scale Multi-antenna
2016
International Journal of Future Generation Communication and Networking
information system security, the simulation results demonstrate the ability to secure transmission algorithms can effectively improve the system. 309 deterioration of the eavesdropper channel interference ...
In general, said the capacity can be achieved secret channel coding for the security code. ...
Acknowledgments This work is supported by the research projects of Henan province under Grant 162102210395, the science and technology innovation team in Colleges and universities of Henan province plan ...
doi:10.14257/ijfgcn.2016.9.7.29
fatcat:2yw7mn3bqfeahfq3ih3gd5ywda
Improvement of Architecture Based on Hierarchical Message Bus
2020
International Journal of Advanced Network, Monitoring, and Controls
The article introduces message-message modem and interface-message modem construction middleware to propose a new hierarchical message bus. ...
The structure new hierarchical message bus solves the problem that the hierarchical message bus architecture requires too strict system components, and the components that fail to provide corresponding ...
to ensure the security of message transmission. ...
doi:10.21307/ijanmc-2020-023
fatcat:vsrrdaqjnfdcrgk3ufbseugevq
« Previous
Showing results 1 — 15 out of 12,647 results