We consider a three-node wireless relay system with frequency selective quasi-static fading channels between the nodes. We assume practical constraints require the relay to operate in half-duplex mode and employ a low...
详细信息
Stability issues involved with using a time domain formulation of the perfectly matched layer (PML) absorbers are considered. We consider one time domain form of the anisotropic PML and show that it is dynamically uns...
详细信息
Stability issues involved with using a time domain formulation of the perfectly matched layer (PML) absorbers are considered. We consider one time domain form of the anisotropic PML and show that it is dynamically unstable. Numerical stability of Berenger's formulation is next considered. This formulation is shown to be conditionally stable. The stability condition is shown to be independent of the coordinate stretch variables sigma(x), sigma(y), and sigma(z).
Two-dimensional and three-dimensional photoacoustic (PA) visualization is an emerging diagnostic procedure for investigation and research in vascular studies. Current manual/mechanized target scanning techniques invol...
详细信息
Relay transmissions improve performance and save communication energy in wireless network. We present an optimal relay nodes assignment algorithm to maximize the number of information packets received at the sink for ...
详细信息
Channel state information is vital for exploiting diversity in cooperative networks. The existing literature on cooperative channel estimation assumes block lengths are long and that channel estimation takes place wit...
详细信息
A true random number generator (RNG) based on a digital phase-locked loop (PLL) has been designed and implemented in a 1.5um CMOS process. It achieved an output data rate of 100 kbps from the sampling of two 30MHz rin...
详细信息
ISBN:
(纸本)0780393457
A true random number generator (RNG) based on a digital phase-locked loop (PLL) has been designed and implemented in a 1.5um CMOS process. It achieved an output data rate of 100 kbps from the sampling of two 30MHz ring oscillators, and successfully passed the NIST test suite SP800-22.
This paper considers a distributed wireless reception system with M-ary phase shift keyed (M-PSK) modulated signals in which two or more receivers exchange quantized information about their observations to approximate...
详细信息
We are developing a low cost ultrasound training system running on a laptop in which the user scans a generic 3D curved surface representing the patient using a 5 DoF sensor. A critical component of this system is the...
详细信息
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless sensor networks. It is therefore com...
详细信息
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless sensor networks. It is therefore common practice to emulate the asymmetry of traditional public key based cryptographic services through a set of of protocols using symmetric key based message authentication codes (MACs). Although the low computational complexity of MACs is advantageous, the protocol layer requires time synchronization between devices on the network and a significant amount of overhead for communication and temporary storage. The requirement for a general purpose CPU to implement these protocols as well as their complexity makes them prone to vulnerabilities and practically eliminates all the advantages of using symmetric key techniques in the first place. In this paper we chanllenge the basic assumptions about public key cryptography in sensor networks which are based on a traditional software based approach. We propose a custom hardware asisted approach for which we claim that it makes public key cryptography ritms and associated parameters, careful optimization, and low-powerdesign techniques. In order to validate our claim we present proff of concept implementations of two different algorithms-Rabin's Scheme and NtruEncrypt-and analyze their architecture and performance according to various established metrics like power consumption, area, delay, throughput, level of security and energy per bit. Our implementation of NtruEncrypt in ASIC standard cell logic uses no more than 3,000 gates with an average power consumption of less than 20μW. We envision that our public key core would be embedded into a light-weight sensor node architecture.
We introduce a novel bi-phase modulation scheme, which extends dynamic range, system bandwidth and increases scanning frequencies of OCT systems. Additionally there are significant improvements in the real-time imagin...
详细信息
暂无评论