Reliability and ageing tests on power semiconductor devices require estimation of junction temperatures in order to control thermal stresses and monitor failure criteria. For this purpose, thermo-electrical parameters, such as voltage forward drop dependence with temperature are usually carried out in low injection level. Nevertheless, it is still difficult to evaluate the limits of such exploitation. An analytical model has been developed and validated by experimental measurements in order to evaluate self-heating effects and to understand high temperature effects. This model should also allow to highlight the role of some physical parameters in the voltage–temperature dependence and to clarify such thermal calibration. 相似文献
As a network-based localized mobility management protocol, Proxy Mobile IPv6 (PMIPv6) enables a Mobile Host (MH) to roam within a localized domain without MH intervention in the mobility-related signalling. However, the PMIPv6 maintains MH mobility support in a restriction domain. Therefore, whenever the MH roams away from the PMIPv6 domain, its reachability status will be broken-down causing high handover latency and inevitable traffic loss for its communication session. This article proposes a proactive mechanism to mange the MH handover and maintain its data session continually across inter-PMIPv6-domains. The proposed mechanism introduces an intermediate global mobility anchor entity, called, which is responsible to coordinate MH handover as well as redirect its traffic across inter-PMIPv6-domains. Through various simulation evaluations, via ns-2, several experiments were conducted, revealing numerous results that verify the proposed mechanism superior performance over the conventional inter-PMIPv6-domain handover schemes in terms of handover latency, achieved throughput, protocol signalling cost and end-to-end traffic delivery latency. 相似文献
In this paper the bit error rate performance and error vector magnitude of a tunable impedance matching network is analyzed assuming QPSK, 16-QAM and 64-QAM digital modulation schemes. The characterized tunable impedance matching network is based on barium–strontium–titanate ferroelectric thick-film varactors. Inherent dispersive behavior is subsumed into the forward transmission of the passive device. Due to this nonlinear phase response, in general to maximize the overall system performance, an agile tuning of the varactor values is demonstrated, taking into account the phase and group delay of s21 parameter. Detailed signal simulation results based on measured data of a testbed are presented. The influence of varying matched impedances on the tuning behavior with different modulation bandwidths is discussed at a center frequency of 1.9 GHz. 相似文献
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations of RFID technology are security and privacy concerns. Many methods, including encryption, authentication and hardware techniques, have been presented to overcome security and privacy problems. This paper focuses on authentication protocols. The combination of RFID technology being popular but unsecure has led to an influx of mutual authentication protocols. Authentication protocols are classified as being fully fledged, simple, lightweight or ultra-lightweight. Since 2002, much important research and many protocols have been presented, with some of the protocols requiring further development. The present paper reviews in detail recently proposed RFID mutual authentication protocols, according to the classes of the authentication protocols. The protocols were compared mainly in terms of security, the technique that they are based on, protocols that the presented protocol has been compared with, and finally, the method of verifying the protocol. Important points of the comparisons were collected in two tables.
Sleep scheduling, which is putting some sensor nodes into sleep mode without harming network functionality, is a common method
to reduce energy consumption in dense wireless sensor networks. This paper proposes a distributed and energy efficient sleep
scheduling and routing scheme that can be used to extend the lifetime of a sensor network while maintaining a user defined
coverage and connectivity. The scheme can activate and deactivate the three basic units of a sensor node (sensing, processing,
and communication units) independently. The paper also provides a probabilistic method to estimate how much the sensing area
of a node is covered by other active nodes in its neighborhood. The method is utilized by the proposed scheduling and routing
scheme to reduce the control message overhead while deciding the next modes (full-active, semi-active, inactive/sleeping)
of sensor nodes. We evaluated our estimation method and scheduling scheme via simulation experiments and compared our scheme
also with another scheme. The results validate our probabilistic method for coverage estimation and show that our sleep scheduling
and routing scheme can significantly increase the network lifetime while keeping the message complexity low and preserving
both connectivity and coverage. 相似文献
The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient’s sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals. 相似文献
We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while analyzing and storing the data to generate apt aftermaths. Privacy and security are the colossal perturb in the domain space of extensive data analysis. In this paper, our foremost priority is the computing technologies that focus on big data, IoT (Internet of Things), Cloud Computing, Blockchain, and fog computing. Among these, Cloud Computing follows the role of providing on-demand services to their customers by optimizing the cost factor. AWS, Azure, Google Cloud are the major cloud providers today. Fog computing offers new insights into the extension of cloud computing systems by procuring services to the edges of the network. In collaboration with multiple technologies, the Internet of Things takes this into effect, which solves the labyrinth of dealing with advanced services considering its significance in varied application domains. The Blockchain is a dataset that entertains many applications ranging from the fields of crypto-currency to smart contracts. The prospect of this research paper is to present the critical analysis and review it under the umbrella of existing extensive data systems. In this paper, we attend to critics' reviews and address the existing threats to the security of extensive data systems. Moreover, we scrutinize the security attacks on computing systems based upon Cloud, Blockchain, IoT, and fog. This paper lucidly illustrates the different threat behaviour and their impacts on complementary computational technologies. The authors have mooted a precise analysis of cloud-based technologies and discussed their defense mechanism and the security issues of mobile healthcare.
This paper presents a simple and efficient multiple access interference (MAI) cancelation technique in optical code division multiple access (OCDMA) system. The proposed technique is based on hybrid frequency shift keying (FSK) with an enhanced modified prime code as a signature sequence for coding techniques. Coherent FSK modulation along with incoherent demodulation using Arrayed-Waveguide Grating has been examined in the transceiver structure. In the proposed technique, a reference signal is constructed by using one of the addressed spreading sequences, and MAI cancelation is performed by subtracting the reference signal from the received signal of the desired user. The performance of the proposed FSK-OCDMA system is compared with the performance of the existing pulse position modulation (PPM)–OCDMA system. The simulation results reveal that the bit-error rate performance of the proposed technique is superior to the performance of the pulse position modulation (PPM) technique. Also, the results indicate that the proposed technique is very power efficient, and when the bit rate is constant, the network capacity can be expanded to accommodate a large number of simultaneous active users with low error rate. Moreover, the proposed technique simplifies the hardware of the receiver design. 相似文献
Sr2La3Nb1?xTaxTi4O17 (0 ≤ x ≤ 1) ceramics were processed via a solid-state mixed oxide route. Sr2La3Nb1?xTaxTi4O17 (0 ≤ x ≤ 1) solid solutions were single phase in the whole range of x values within the x-ray diffraction (XRD) detection limit. The microstructure comprised elongated and needle-shaped grains. The ceramics exhibit relative permittivity (εr) of 73 to 68.6, product of unloaded quality factor and resonant frequency (Quf0) of 7100 GHz to 9500 GHz, and temperature coefficient of resonant frequency (τf) of 78.6 ppm/°C to 56.6 ppm/°C. 相似文献