-
881
The Effects of Multipath on the Performance of High Rate Digital QAM and OFDM Wireless Link Operating in Tunnels
Published 2025-01-01“…The results include a comprehensive comparison of various cases for Bit Error Rate (BER), Error Vector Magnitude (EVM), constellations, and facilitating a thorough examination of the tunnel effects in each scenario. …”
Get full text
Article -
882
Multiple redundant flow fingerprint model based on time slots
Published 2023-02-01“…With the increasingly widespread use of the Internet, various network security problems are frequently exposed, while the “patching” style security enhancement mechanisms cannot effectively prevent the growing security risks.The researchers in the field of network security believe that the future Internet architecture should take security as a basic attribute to provide the native security support which is also called as endogenous safety and security.In order to support the data trustworthiness of endogenous security, a time-slot based multiple redundant flow fingerprint model was designed and implemented based on the research of the watermark (or fingerprint) mechanism.The proposed model used only three time slot intervals and operated the packets within the specified time slots, so that the fingerprint can be embedded without conflicting with the adjacent bit operations.Redundant coding was introduced to improve the fingerprint robustness, and the behaviors such as jitter or malicious disruptions by attackers in the network were considered.Furthermore, the impacts of delayed interference, spam packet interference and packet loss interference were analyzed.The analytical results show that the robustness of the fingerprint model improves with increasing redundant bits when the packet distribution in the network stream is given.Besides, in order to reduce the consumption of time and space and improve the efficiency and accuracy of packet operations, a flow fingerprinting prototype system was designed and implemented based on the kernel, and its efficiency and robustness were evaluated.The experimental result show that the model has high robustness.Additionally, the application scenario of the model was elaborated, which can effectively detect man-in-the-middle attacks and prevent network identity spoofing with the help of the flow fingerprinting model.…”
Get full text
Article -
883
BER Performance of Stratified ACO-OFDM for Optical Wireless Communications over Multipath Channel
Published 2018-01-01“…In this paper, we analyze the BER performance of STACO-OFDM under the effect of multipath fading. The theoretical bit error rate (BER) bound is derived and compared with the simulation results, and good agreement is achieved. …”
Get full text
Article -
884
Improved Training Sequence Channel Estimation Scheme in 16QAM MB-OFDM UWBoF System
Published 2020-01-01“…The simulation results showed that the performance of system with the improved Golay TS channel estimation scheme was improved by about 1 dB compared with the traditional Golay TS channel estimation scheme, at a bit error rate (BER) of 3.8 × 10−3 after 70 km standard single mode fiber (SSMF) transmission. …”
Get full text
Article -
885
A New Cooperative MIMO Scheme Based on SM for Energy-Efficiency Improvement in Wireless Sensor Network
Published 2014-01-01“…In order to evaluate the performance of the proposed scheme, a detailed analysis in terms of energy consumption per bit of the proposed scheme compared with the conventional CMIMO is presented. …”
Get full text
Article -
886
Pseudo-Random Number Generators for Stochastic Computing (SC): Design and Analysis
Published 2024-01-01“…The proposed RNG design leverages the inherent randomness between each bit of data to generate larger sets of random numbers by concatenating the modules of the customized linear feedback shift registers. …”
Get full text
Article -
887
The effects of foliar fertilization on maize inbred lines
Published 2024-01-01“…The second tested fertilizer with an increased phosphorus content, Đ2, was applied a bit later, at the stage of 11-12 leaves. The experiment also included a control variant on which no foliar fertilizers were applied. …”
Get full text
Article -
888
All-silicon non-volatile optical memory based on photon avalanche-induced trapping
Published 2025-01-01“…By manipulating the photon avalanche effect, we introduce a trapping effect at the silicon-silicon oxide interface, which in turn demonstrates a non-volatile reprogrammable optical memory cell with a record-high 4-bit encoding, robust retention and endurance. This silicon avalanche-induced trapping memory provides a distinctively cost-efficient and high-reliability route to realize optical data storage in standard silicon foundry processes. …”
Get full text
Article -
889
A Modified Dijkstra Algorithm for ROS Based Autonomous Mobile Robots
Published 2023-03-01“…It is observed that the modified version of the Dijkstra’s algorithm comparatively yielded a bit more satisfactory results in the aspect of path planning.…”
Get full text
Article -
890
Capacity Improvement for DVB-NGH with Dual-Polarized MIMO Spatial Multiplexing and Hybrid Beamforming
Published 2020-01-01“…The performance results on bit error rate, channel capacity, and beampatterns show that the proposed hybrid beamforming and dual-polarized MIMO spatial multiplexing schemes provide more robustness against signal interference by beamforming and/or nulling techniques. …”
Get full text
Article -
891
Fast and low‐power leading‐one detectors for energy‐efficient logarithmic computing
Published 2021-07-01“…Our simulation results show that the 32‐bit LOD III can be up to 2.8× more energy‐efficient than existing designs in the literature. …”
Get full text
Article -
892
Experimental Investigation of Zadoff-Chu Matrix Precoding for Visible Light Communication System with OFDM Modulation
Published 2018-01-01“…The experimental demonstration further validates the bit error rate (BER) performance improvement, where the measured BERs are all below the 7% pre-forward error correction (pre-FEC) limit of 3.8 × 10−3 when the transmitted data rate is 50 Mb/s.…”
Get full text
Article -
893
A Mixed-Signal Programmable Time-Division Power-On-Reset and Volume Control Circuit for High-Resolution Hearing-Aid SoC Application
Published 2018-01-01“…With 120 Hz input signal and 15 kHz clock, the ADC shows that Signal to Noise plus Distortion Ratio (SNDR) is 46.5 dB and Effective Number Of Bits (ENOB) is 7.43 bits. Total circuit power consumption is only 86 μw for low-power application.…”
Get full text
Article -
894
An Embedded Reconfigurable IP Core with Variable Grain Logic Cell Architecture
Published 2008-01-01“…In the present paper, we propose a variable grain logic cell (VGLC) architecture, which consists of a 4-bit ripple carry adder with configuration memory bits and develop a technology mapping tool. …”
Get full text
Article -
895
Research on vehicle feature recognition algorithm based on optimized convolutional neural network
Published 2023-10-01“…To address the issue of weak identification and low accuracy in recognizing features of target vehicles at different distances in road scene images, a vehicle feature recognition algorithm based on optimized convolutional neural network (CNN) was proposed.Firstly, a multi-scale input based on the PAN model was employed to capture target vehicle features at varying distances.Subsequently, improvements were made to the network model by incorporating multi-pool, batch normalization (BN) layers, and Leaky ReLU activation functions within the CNN architecture.Furthermore, the generalization ability of the network model was enhanced by introducing a hybrid attention mechanism that focuses on important features and regions in the vehicle image.Lastly, a multi-level CNN structure was constructed to achieve feature recognition for vehicles.Simulation experiment results conducted on the BIT-Vehicle database within a single scene show the proposed algorithm’s significant enhancements in single-object and multi-object recognition rates compared to CNN, R-CNN, ABC-CNN, Faster R-CNN, AlexNet, VGG16, and YOLOV8.Specifically, improvements of 16.75%, 10.9%, 4%, 3.7%, 2.46%, 1.3%, and 1% in single-object recognition, as well as 17.8%, 10.5%, 2.5%, 3.8%, 2.7%, 1.1%, and 1.3% in multi-object recognition, have been demonstrated by the proposed algorithm, respectively.Over the more complex UA-DETRAC datasets, more precise results have been also achieved by the proposed algorithm in recognizing target vehicles at various distances compared to other algorithms.…”
Get full text
Article -
896
REFRACTIVE INDEX DETERMINATION FOR A PLANE DIELECTRIC LAYER USING THE MEASUREMENTS OF TRANSMITTED BEAM INTENSITY
Published 2017-02-01“…We have found the function of energy transmission coefficients for these polarizations, which does not depend on the layer thickness and is characterized bIt is shown that this function provides the opportunity to determine the layer refractive index uniquely. …”
Get full text
Article -
897
An OFDM Signal Enhancement and Demodulation Method Based on Segmented Asymmetric Bistable Stochastic Resonance
Published 2025-01-01“…Simulation results demonstrate that, at an input SNR of 8 dB, the SABSR system achieves a bit error rate (BER) approximately 30% lower than that of the segmented symmetric system, significantly improving OFDM signal detection and demodulation performance.…”
Get full text
Article -
898
A Novel L-Shape Ultra Wideband Chipless Radio-Frequency Identification Tag
Published 2017-01-01“…As a proof of concept, three different 18-bit dual-polarized RFID tags are simulated, fabricated, and tested in an anechoic chamber environment. …”
Get full text
Article -
899
Toward Authentication of Videos: Integer Transform Based Motion Vector Watermarking
Published 2022-01-01“…The results validate the performance of the proposed approach in terms of quality metrics like peak signal-to-noise ratio (PSNR), structural similarity index (SSIM), normalized coefficients (NC) and bit error rate (BER).…”
Get full text
Article -
900
A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption
Published 2024-01-01“…The practical importance of the S-box was further assessed by using a variety of criteria, including nonlinearity, strict avalanche criteria, bit independence criteria, differential probability, and linear approximation probability. …”
Get full text
Article