about.jpg

Filter by

SANC: Source authentication using network coding

In this paper, we explore the security merits of network coding and potential trade-offs with the widely accepted throughput benefits, especially in multicast scenarios. In particular, we propose a novel Source Authentication using Network Coding (SANC) scheme that can either complement state-of-the-art application-layer authentication schemes proposed in the literature or be used as a stand-alone

Software and Communications

Comparison of statistical deterioration models for water distribution networks

The use of water main break history as a proxy for condition has become common practice because of the high costs associated with direct assessments. Statistical deterioration models predict future water main breaks on the basis of historical patterns. Many municipalities are beginning to understand the value of utilizing water pipe break histories to manage their noncritical distribution networks

Energy and Water

Constrained interference alignment and the spatial degrees of freedom of mimo cognitive networks

An interference alignment (IA) scheme is presented that allows multiple opportunistic transmitters (secondary users) to use the same frequency band of a pre-existing primary link without generating any interference. The primary and secondary transmit-receive pairs are equipped with multiple antennas. Under power constraints on the primary transmitter, the rate of the primary user is maximized by

Software and Communications

DPSK receiver-sensitivity enhancement using an SOA in front of the receiver

A technique for DPSK receiver-sensitivity improvement is demonstrated using numerical simulations. It is based on reshaping and reamplifying of received 80 Gbit/s DPSK using an SOA before a one bit delay interferometer. The SOA re-amplifies data without adding amplitude or differential phase noise due to its gain-compression. The system is tested using 231-1 PRBS RZ-DPSK (NRZ-DPSK) loaded with

Software and Communications

Proactive resource allocation in cognitive networks

Recently we have introduced the notion of proactive resource allocation and predictive wireless networks, where intelligent wireless networks are capable of tracking and exploiting the repetition patterns in human behavior while accessing the network resources. This predictability advantage grants the network more flexibility to schedule users' requests over a longer time horizon, and thereby

Software and Communications

Practical provably secure communication for half-duplex radios

In this paper, we present a practical and provably secure two-way wireless communication scheme in the presence of a passive eavesdropper. The scheme implements a randomized scheduling and power allocation mechanism, where each legitimate node transmits in random time slots and with random transmit power. Such randomization results in ambiguity at the eavesdropper with regard to the origin of each

Software and Communications

Cooperative sensing with sequential ordered transmissions to secondary fusion center

Successful spectrum sharing in a cognitive radio network depends on the correct and quick detection of primary activity. Cooperative spectrum sensing is therefore suggested to enhance the reliability of such detection. However, it renders another significant problem of increased detection delay and traffic burden. Moreover, efficient schemes for multi-sensor data fusion should be designed. In this

Software and Communications

A multiple performance analysis of market-capacity integration policies

A model that uses simulation augmented with Design of Experiments (DOE) is presented to analyse the performance of a Make-to-Order (MTO) reconfigurable manufacturing system with scalable capacity. Unlike the classical capacity scaling policies, the proposed hybrid capacity scaling policy is determined using multiple performance measures that reflect cost, internal stability and responsiveness. The

Polarization in bistatic radar probing of planetary surfaces: Application to mars express data

Spacecraft-to-ground bistatic radar provides a straightforward method for surveying planetary surfaces on scales of importance to landers and rovers. Centimeter wavelengths, currently in use for deep-space telecommunications, interact with surface structure of similar to somewhat larger scales. For the quasi-specular component of scattering and for surfaces uniformly illuminated by monochromatic

Improved strain measuring using fast strain-encoded cardiac MR

The strain encoding (SENC) technique encodes regional strain of the heart into the acquired MR images and produces two images with two different tunings so that longitudinal strain, on the short-axis view, or circumferential strain on the long-axis view, are measured. Interleaving acquisition is used to shorten the acquisition time of the two tuned images by 50%, but it suffers from errors in the

Healthcare
Circuit Theory and Applications
Innovation, Entrepreneurship and Competitiveness