Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








12,647 Hits in 4.6 sec

Integrated all-optical manipulation of orbital angular momentum carrying modes via enhanced electro-optic Kerr effect [article]

S. Faezeh Mousavi, Rahman Nouroozi
2018 arXiv   pre-print
OAM based high-dimensional Quantum Key Distribution (QKD) encrypted channels also improve transmission rate and security.  ...  All-optical mode-selective spatial distribution manipulation is a significant function in implemented MDM and QKD networks.  ...  High-dimensional QKD is feasible by OAM modulated states and provides higher transmission rates and security [13, 14] .  ... 
arXiv:1812.08111v1 fatcat:uojts3gaznfbpd2qb42cjv4dre

Securing and auto-synchronizing communication over free-space optics using quantum key distribution and chaotic systems

Harry Shaw, Naveed Mahmud, Esam El-Araby, Lavida Cooper, Ronald E. Meyers, Yanhua Shih, Keith S. Deacon
2018 Quantum Communications and Quantum Imaging XVI  
In this paper, we demonstrate a communication protocol that demonstrates improved security and longer-range FSO communication, compared to existing FSO security techniques, such as N-slit interferometers  ...  A Lorenz chaotic system, which is inherently secure and auto-synchronized, is utilized for secure data communications over a classical channel, while QKD is used to exchange crucial chaotic system parameters  ...  In this paper, we propose a scheme which combines chaotic communications with quantum key distribution, in order to achieve more secure and synchronized FSO communication.  ... 
doi:10.1117/12.2318849 fatcat:kvvwipxgvbbxpo75y2mkhh43oa

Integrated optical modulator manipulating the polarization and rotation handedness of Orbital Angular Momentum states

S. Faezeh Mousavi, Rahman Nouroozi, Giuseppe Vallone, Paolo Villoresi
2017 Scientific Reports  
It is shown that all four possible output polarization-OAM encoded states can be achieved with only 6 V and 7 V applied voltages to the electrodes in the two parts of the modulator.  ...  In addition, secure transmission is one of the concerns of communication systems.  ...  In the proposed modulator, |+1〉|H〉 is assumed to be as the input state and four desired output quantum states of |−1〉|H〉, |−1〉|V〉, |+1〉|V〉, and |+1〉|H〉 can be achieved exploiting the advantages of a high-frequency  ... 
doi:10.1038/s41598-017-04118-5 pmid:28630486 pmcid:PMC5476591 fatcat:oihcgglhjnebjnjxdyzwvaltli

Secured ECG signal transmission for human emotional stress classification in wireless body area networks

Hansong Xu, Kun Hua
2016 EURASIP Journal on Information Security  
In this paper, we specially work on a secured electrocardiogram (ECG) signal transmission scheme to prevent further injuries for patients with heart diseases from human emotional stress.  ...  Simulation results show that the improved transmission rate and signal power capacity can lower the probability of data intercept (LPI) and detection (LPD) by taking the advantages of both temporal and  ...  Then, further research found that the improved transmission data rate and signal power are related to the higher level of transmission security in wireless communication.  ... 
doi:10.1186/s13635-015-0024-x fatcat:me4dc2pzxfczdkebzicfb2npza

A brick-architecture-based mobile under-vehicle inspection system

Cheng Qian, David Page, Andreas Koschan, Mongi Abidi, Grant R. Gerhart, Charles M. Shoemaker, Douglas W. Gage
2005 Unmanned Ground Vehicle Technology VII  
This system has been successfully used in several military applications and proved to be an effective safer method for national security.  ...  Each brick is mainly composed by five modules: data acquisition, data processing, data transmission, power, and self-management.  ...  ACKNOWLEDGEMENTS We greatly thank Cheng Chang for his work in developing the mobility bricks and navigation algorithms, and Zhenhao Cheng for his work in developing the communication DLL and building the  ... 
doi:10.1117/12.602979 fatcat:ud6zxbox6vhjtj2v4mh5ktpftq

ENERGY-EFFICIENT CODING MATRIX FMD-RDA SECURE TRANSMISSION SCHEME BASED ON QUADRATURE SPATIAL MODULATION FOR MMWAVE SYSTEMS

Shaddrack Yaw Nusenu, Abdul Basit
2019 Progress In Electromagnetics Research M  
This paper proposes coding matrix secure transmission based on quadrature spatial modulation (QSM) utilizing a frequency modulated diverse retrospective array (FMD-RDA).  ...  Artificial noise (AN) aided method in mmWave is hard to realize due to large transmit antennas and also requires additional power.  ...  QSM Modulator Scheme Following [32] , herein, we demonstrate the principle of QSM transmission. We consider MISO and quadrature amplitude modulation (4-QAM).  ... 
doi:10.2528/pierm19021403 fatcat:iiftslxogjfnpkbckmnw5unuwm

System for efficient and secure distribution of medical images on the Internet

J Z Wang, G Wiederhold
1998 Proceedings. AMIA Symposium  
A progressive transmission algorithm with automatic security filtering features for on-line medical image distribution using Daubechies' wavelets has been developed and is discussed in this paper.  ...  The system is practical for real-world applications, processing and coding each 12-bit image of size 512 x 512 within 2 seconds on a Pentium Pro.  ...  Acknowledgments We would like to thank Oscar Firschein and Michel Bilello of Stanford University, and Steve Wong of University of California at San Francisco for valuable help and discussions.  ... 
pmid:9929350 pmcid:PMC2232158 fatcat:nf47hzhxszfw7g3fvzotp674ou

A New Mechanism for Network Monitoring and Shielding in Wireless LAN

Jiujun Cheng, Liufei Hu, Junjun Liu, Qingyang Zhang, Chendan Yan
2014 Mathematical Problems in Engineering  
During the development of WLAN, the security is more and more important, and wireless monitoring and shielding are of prime importance for network security.  ...  We implemented an actual wireless LAN monitoring and shielding system on Maemo operating system to monitor wireless network data stream efficiently and solve the security problems of mobile users.  ...  Plan Grant no. 2012BAH15F03, and by NSFC under Grants 51174210, 61003102, and 61103072.  ... 
doi:10.1155/2014/620926 fatcat:xncgptgsefa2fckmrl5solc7gu

Transmission Matrix Measurement of Multimode Optical Fibers by Mode-Selective Excitation Using One Spatial Light Modulator

Stefan Rothe, Hannes Radner, Nektarios Koukourakis, Jürgen W. Czarske
2019 Applied Sciences  
However, their use is hampered by mode mixing and other effects, leading to speckled output patterns. This can be overcome by measuring the transmission matrix (TM) of a multimode fiber.  ...  The TM determines the amplitude and phase relationships of the modes, which allows us to understand the mode scrambling processes in the MMF and can be used for mode division multiplexing.  ...  In [20] , an amplitude-only modulator based on digital micromirrors is used to achieve a light field modulation.  ... 
doi:10.3390/app9010195 fatcat:cc4sdlazkjfdpcc5ww5dvynvrm

Diagnosis-Steganography-Transmission: An Innovative Integrated Paradigm for ECG Healthcare

Neerja Sahu, Dongming Peng, Hamid Sharif
2021 SN Computer Science  
offers computing distribution of diagnosis, UEP-based steganography, and UEP-based transmission are inherently connected with each other.  ...  things, and the wireless communication module is typically very energy-hungry, so offloading some computing tasks to the edge is a lot of energy economical [59] .  ...  In our previous work [1] , we have proposed Deep Neural Network (DNN)-based Neural-JS 2 C 2 to achieve the optimum rate allocation for our secure and energy-efficient transmission framework for the ECG  ... 
doi:10.1007/s42979-021-00721-6 fatcat:mrh54y72xnaqnewwhstbhp2lka

A Survey on Sharing Secret Image using NVSS Scheme

Sejal Patel, Jyoti Rao
2016 International Journal of Computer Applications  
This information can be in the form of documents, images, photographs and many more.  ...  Hence the transmission of secret image with the cover image is secured. At the receiver end the share is decomposed into secret image and cover image.  ...  At this stage the generated share is decomposed into cover image and secret image. In this way, receiver can receive the secret image securely.  ... 
doi:10.5120/ijca2016908154 fatcat:olzewww3lrbspprskwq7hw5zpy

Research of SOA-Based Data Exchange Platform

Qian Zhong Zhang
2013 Applied Mechanics and Materials  
Solve the data exchange process in a variety of data transmission and efficient mutual use of data transmission services.  ...  omplexity and versatility of problems encountered in the process in order to improve the traditional data exchange platform, "Proxy + server "loosely coupled mode data exchange platform system, system  ...  structure: From the module structure, 8 core modules to achieve the main function of the DEP system, These modules according to the division level is decomposed into multiple sub-modules, each sub-divided  ... 
doi:10.4028/www.scientific.net/amm.347-350.2266 fatcat:vszhzckmvfbubbmxyqcpvcp5yi

High Level Security of Image Transmission through STBC-COFDM System

2023 International Journal of Intelligent Engineering and Systems  
The bit error rate (BER) performance of the suggested system achieved 10 -4 at SNR=1, and 2 dB for (TLC, LSC) and STC, respectively.  ...  In this paper, the security of image transmission through space time block coding (STBC)-coded orthogonal frequency division multiplexing (COFDM) is enhanced using two stage algorithms.  ...  In this paper, one level of security was included and AWGN channel was considered to test the secure image transmission system.  ... 
doi:10.22266/ijies2023.0228.14 fatcat:cjpa7xtxifeubg34qzwzhwvyiy

The Physical Layer Security Beamforming Method based on Large-scale Multi-antenna

Zhou Wen-gang, Li Jing, Guo Hui-ling
2016 International Journal of Future Generation Communication and Networking  
information system security, the simulation results demonstrate the ability to secure transmission algorithms can effectively improve the system. 309 deterioration of the eavesdropper channel interference  ...  In general, said the capacity can be achieved secret channel coding for the security code.  ...  Acknowledgments This work is supported by the research projects of Henan province under Grant 162102210395, the science and technology innovation team in Colleges and universities of Henan province plan  ... 
doi:10.14257/ijfgcn.2016.9.7.29 fatcat:2yw7mn3bqfeahfq3ih3gd5ywda

Improvement of Architecture Based on Hierarchical Message Bus

Zhengwei Wang, Jinhui Li, Kun Wang
2020 International Journal of Advanced Network, Monitoring, and Controls  
The article introduces message-message modem and interface-message modem construction middleware to propose a new hierarchical message bus.  ...  The structure new hierarchical message bus solves the problem that the hierarchical message bus architecture requires too strict system components, and the components that fail to provide corresponding  ...  to ensure the security of message transmission.  ... 
doi:10.21307/ijanmc-2020-023 fatcat:vsrrdaqjnfdcrgk3ufbseugevq
« Previous Showing results 1 — 15 out of 12,647 results