Wireless Personal Communications - This paper presents a Multilayer Partially Homomorphic Encryption Text Steganography, an invisible approach for covert communication. Existing text-based schemes... 相似文献
We demonstrate a novel RF switch based on a multifinger AlGaN/GaN MOSHFET. Record high saturation current and breakdown voltage, extremely low gate leakage current and low gate capacitance of the III-N MOSHFETs make them excellent active elements for RF switching. Using a single element test circuit with 1-mm wide multifinger MOSHFET we achieved 0.27 dB insertion loss and more than 40 dB isolation. These parameters can be further improved by impedance matching and by using submicron gate devices. The maximum switching power extrapolated from the results for 1A/mm 100 /spl mu/m wide device exceeds 40 W for a 1-mm wide 2-A/mm MOSHFET. 相似文献
The union of residual vector quantization (RVQ) and trellis-coded vector quantization (TCVQ) was considered by various authors where the emphasis was on the sequential design. We consider a new jointly optimized combination of RVQ and TCVQ with advantages in all categories. Necessary conditions for optimality of the jointly optimized trellis-coded residual vector quantizers (TCRVQ) are derived. A constrained direct sum tree structure is introduced that facilitates RVQ codebook partitioning. Simulation results for jointly optimized TCRVQ are presented for memoryless Gaussian, Laplacian, and uniform sources. The rate-distortion performance is shown to be better than RVQ and sequentially designed TCRVQ 相似文献
SDN enables a new networking paradigm probable to improve system efficiency where complex networks are easily managed and controlled. SDN allows network virtualization and advance programmability for customizing the behaviour of networking devices with user defined features even at run time. SDN separates network control and data planes. Intelligently controlled network management and operation, such that routing is eliminated from forwarding elements (switches) while shifting the routing logic in a centralized module named SDN Controller. Mininet is Linux based network emulator which is cost effective for implementing SDN having in built support of OpenFlow switches. This paper presents practical implementation of Mininet with ns-3 using Wi-Fi. Previous results reported in literature were limited upto 512 nodes in Mininet. Tests are conducted in Mininet by varying number of nodes in two distinct scenarios based on scalability and resource capabilities of the host system. We presented a low cost and reliable method allowing scalability with authenticity of results in real time environment. Simulation results show a marked improvement in time required for creating a topology designed for 3 nodes with powerful resources i.e. only 0.077 sec and 4.512 sec with limited resources, however with 2047 nodes required time is 1623.547 sec for powerful resources and 4615.115 sec with less capable resources respectively.
The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health, smart cities, smart homes, intelligent transport, amongst others. However, security often serves as a critical reason for the widespread adoption of any innovation. While the IoT has increased business productivity and enriched diverse areas of life over the years, the world is yet to see a methodical revolution of its humongous application and transformation given its ubiquity and highly interconnected global network structure. The main culprit for such lapses is principally attributed to security and privacy issues which have been widely discussed in research articles and reviews but remain largely unaddressed in the literature. Hence, this paper provides a state-of-the-art review of IoT security and its challenges. It overviews technical and legal solutions that are useful to private, organizational, and governmental enterprises. The study encompasses the review and security analysis of IoT’s evolution and revolution, IoT security assessments, requirements, current research challenges in security and much more. Consequently, it offers potential solutions to address the security challenges discussed and further present open research issues, research gaps, opportunities, future development, and recommendations. This overview is intended to serve as a knowledgebase that will proffer novel foresight to guide users and administrators in positioning themselves and their organizations in a manner that is consistent with their overall objectives, mission, and vision for remarkable outcomes. Likewise, interested scholars and researchers can explore topics and directions from the study in providing better solutions to the numerous problems in IoT security.
This paper presents the results of a preliminary study in which the effect of the initial rusting on the corrosion behavior of rebars embedded in concrete has been investigated. Concrete specimens were made with pre-rusted and rust free rebars of different compositions. Two concrete mixes, one with a sodium chloride content of 2 kg/m3 of concrete and the other without any sodium chloride were used. The reinforced concrete specimens, immersed in potable water and then transferred to 5% NaCl solution, were subjected to corrosion monitoring for a period of 10 months. The test results indicate that the initial rusting does not have an adverse effect on the corrosion resistance of rebars embedded in concrete. 相似文献
This paper describes the shear imposed interfacial segregation of release systems for the facilitated attenuation of polyurethane (PU) adhesion to metal coun-terfaces using a RI-RIM system. It is shown that the migration rate of the dispersed release additives due to a shear imposed stress in the resin fluid is much greater than that arising from Fickian diffusion, thereby removing a vital constraint from conventional practice. The novel rotary injection RIM system is presented to simulate the on-line injection and shear induced interfacial segregation in model PU/abherent systems. A wide range of recipes comprising single (liquids or solids) and multicomponent (liquid-liquid and solid-liquid) release materials were injected into the polymerizing resin mixture to provide cohesively weak and friable “particle” boundary layer assemblies at the PU/metal interface. An instrumented Blister Test was employed to evaluate the quality of the molded interfaces in terms of adhesion and the concentration distribution of the injected species in the final cured moldings was determined through high pressure liquid chromatography (HPLC). A comparison of the results on the shear modified and the compounded interfaces confirm an accentuated lateral migration of the additives to the interface resulting in an appreciable diminution in the adhesion of the system. Finally, transport models are suggested to account for the observed augmented transport. 相似文献
In this paper we propose high throughput collision free, mobility adaptive and energy efficient medium access protocol (MAC) called Collision Free Mobility Adaptive (CFMA) for wireless sensor networks. CFMA ensures that transmissions incur no collisions, and allows nodes to undergo sleep mode whenever they are not transmitting or receiving. It uses delay allocation scheme based on traffic priority at each node and avoids allocating same backoff delay for more than one node unless they are in separate clusters. It also allows nodes to determine when they can switch to sleep mode during operation. CFMA for mobile nodes provides fast association between the mobile node and the cluster coordinator. The proposed MAC performs well in both static and mobile scenarios, which shows its significance over existing MAC protocols proposed for mobile applications. The performance of CFMA is evaluated through extensive simulation, analysis and comparison with other mobility aware MAC protocols. The results show that CFMA outperforms significantly the existing CSMA/CA, Sensor Mac (S-MAC), Mobile MAC (MOB-MAC), Adaptive Mobility MAC (AM-MAC), Mobility Sensor MAC (MS-MAC), Mobility aware Delay sensitive MAC (MD-MAC) and Dynamic Sensor MAC (DS-MAC) protocols including throughput, latency and energy consumption. 相似文献
Networks of phased array radars are generally able to provide better counter stealth target detection and classification. Each radar sensor (or node) generates information which requires transmission to a central authority that is able to evaluate the information. This requires a communications network to be established to allow transmission of information to and from any node. Each radar node is limited by range and degree and relies on the formation of a multi-hop network to facilitate these transmissions.This paper presents a model whereby the radar beam itself is used in the formation of a multi-hop network. The phased array’s multi-functional nature allows rapid switching between communications and radar function. A model of how the communication system could operate is presented, and an evolutionary optimisation algorithm based upon the concept of Pareto optimality is used for the topological design of the network. Finally, a simulation environment is presented to show the simulated performance of the communication model and designed networks. 相似文献