In this paper, we study the power allocation scheme for a single user, multi-channel system, e.g. orthogonal frequency-division multiplexing (OFDM) systems, under time-variant wireless fading channels. We assume the r...
详细信息
This paper discusses the use of natural language or 'conversational' agents in e-learning environments. We describe and contrast the various applications of conversational agent technology represented in the e...
详细信息
In this paper, we apply a novel active control scheme to suppress chaotic behavior in a cam-follower impacting system using Fixed-Point Inducting Control or FPIC Technique. Namely, the input speed of the cam-follower ...
详细信息
ISBN:
(纸本)9783902661654
In this paper, we apply a novel active control scheme to suppress chaotic behavior in a cam-follower impacting system using Fixed-Point Inducting Control or FPIC Technique. Namely, the input speed of the cam-follower system is actively controlled in order to reach a single-impact periodic motion. A cam-follower system characterized by a radial cam and a flat-faced follower is used as a representative example. High-order periodic-impact and chaotic motions are controlled varying the input speed of the cam-follower system. Stroboscopic and impact maps are used to select the suitable control parameters under which stable single-impact periodic responses are reached.
In this paper, we apply a novel active control scheme to suppress chaotic behavior in a cam-follower impacting system using Fixed-Point Inducting Control or FPIC Technique. Namely, the input speed of the cam-follower ...
详细信息
In this paper, we apply a novel active control scheme to suppress chaotic behavior in a cam-follower impacting system using Fixed-Point Inducting Control or FPIC Technique. Namely, the input speed of the cam-follower system is actively controlled in order to reach a single-impact periodic motion. A cam-follower system characterized by a radial cam and a flat-faced follower is used as a representative example. High-order periodic-impact and chaotic motions are controlled varying the input speed of the cam-follower system. Stroboscopic and impact maps are used to select the suitable control parameters under which stable single-impact periodic responses are reached.
Permanently mounted ultrasonic sensors arranged as a spatially distributed array are being considered for in situ monitoring of the integrity of structural components. Here we consider two imaging algorithms for locat...
详细信息
Automotive electronics are becoming ever more complex. The quantity and sensitivity of data that is transmitted throughout a car is expected to continue to increase in coming years. On board computers can contain info...
详细信息
ISBN:
(纸本)9780863419317
Automotive electronics are becoming ever more complex. The quantity and sensitivity of data that is transmitted throughout a car is expected to continue to increase in coming years. On board computers can contain information about the car and dictate how the car behaves. This means that these systems need to be secure to protect the data held within such system so that the behaviour cannot be modified by an unauthorised user. This paper outlines a method for implementing AES encryption over a CAN bus and how such a system could be attacked using correlation power analysis.
The sensitivity to damage achievable by guided wave structural health monitoring systems is limited by the repeatability of recorded signals under normal operating conditions. Direct subtraction of reference signals l...
The sensitivity to damage achievable by guided wave structural health monitoring systems is limited by the repeatability of recorded signals under normal operating conditions. Direct subtraction of reference signals leads to unacceptably high post‐subtraction noise in the presence of modest temperature changes due to variations in reflections from benign structural features, hence temperature compensation is necessary. In this paper, various numerical compensation strategies are investigated. It is concluded that a combination of stretching and translating time‐traces provides reasonable compensation performance for modest temperature changes.
Block ciphers are typically resistant to direct attacks, such as an exhaustive key search or cryptanalysis, all of which require too many resources to achieve an efficient attack. Many block ciphers are examined for t...
详细信息
ISBN:
(纸本)9780863419317
Block ciphers are typically resistant to direct attacks, such as an exhaustive key search or cryptanalysis, all of which require too many resources to achieve an efficient attack. Many block ciphers are examined for their resistance to less direct attacks that target a given implementation. Of these attacks, fault attacks are amongst the most effective at retrieving information on secret key, and require specific countermeasures to be included in an implementation. In this paper we describe a simple platform for the study of fault injection and analysis in the context of fault attacks block ciphers based on a Feistel structure (e.g. DES). We show that an attacker who can successfully inject faults into a block cipher can reduce the complexity of an attack to derive the secret key. We also present a novel version of the attack than can be applied to Triple-DES by independently injecting faults in the second and third instantiations of DES involved in a Triple- DES computation.
The optical quantum computer is one of the few experimental systems to have demonstrated small scale quantum information processing. Making use of cavity quantum electrodynamics approaches to operator measurements, we...
详细信息
The optical quantum computer is one of the few experimental systems to have demonstrated small scale quantum information processing. Making use of cavity quantum electrodynamics approaches to operator measurements, we detail an optical network for the deterministic preparation of arbitrarily large two-dimensional cluster states. We show that this network can form the basis of a large scale deterministic optical quantum computer that can be fabricated entirely on chip.
We present and analyze a quantum key distribution protocol based on sending entangled N-qubit states instead of single-qubit ones as in the trail-blazing scheme by Bennett and Brassard 1984 (BB84). Since the qubits ar...
详细信息
We present and analyze a quantum key distribution protocol based on sending entangled N-qubit states instead of single-qubit ones as in the trail-blazing scheme by Bennett and Brassard 1984 (BB84). Since the qubits are sent and acknowledged individually, an eavesdropper is limited to accessing them one by one. In an intercept-resend attack, this fundamental restriction allows one to make the eavesdropper’s information on the transmitted key vanish if even one of the qubits is not intercepted. The implied upper bound 1∕(2N) for this information is further shown not to be the lowest, as the information can be reduced to less than 30% of that in the BB84 scheme in the case N=2. In general, the protocol is at least as secure as BB84.
暂无评论