The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automatic localization of the seizure onset zone (SOZ) is able to output an objective result and help clinical doctors greatly in epilepsy therapy. Transfer entropy is one of the most frequently used measures based on information theory to localize the SOZ. However, if only using transfer entropy to localize the SOZ, different results can be obtained during different periods, thus humans still need...
Key management in wireless sensor networks is a challenging problem because public key cryptosystems are unsuitable for using in resource constrained sensor nodes, and the nodes could by physically compromised by an adversary. For the existing key pre-distribution schemes, as the number of compromised nodes increasing, the fraction of affected pairwise keys will increase quickly. As a result, a small...
Key management in sensor networks is the core security protocols for wireless sensor networks (WSNs) in the hostile environment. Sensor nodes have highly constrained resource like limited battery power, memory, processing capabilities, etc. These limitations make infeasible to apply traditional key management techniques such as public key cryptography in the WSNs. For the existing key pre-distribution...
In this paper we propose two distributed power control algorithms for cognitive radio cellular network (CogCell). Our objective is to maximize the number of admitted Secondary Users (SUs), while making sure both the Primary User's and SUs' requirements of Quality of Service (QoS) are satisfied with certain constraints. Here the PU's requirement of QoS is described that the Interference Temperature...
Transmission line port de-embedding is critical in characterization and modeling for high-speed digital systems. De-embedding technique for single-ended transmission lines has been developed and widely used. However, few de-embedding techniques for coupled transmission lines have been reported in the literature. In this paper, a de-embedding technique for coupled transmission lines using a single-ended...
In multilayer printed circuit boards (PCBs), vias are commonly used to connect traces on different signal layers. This paper derives the mixed-mode input impedance of differential vias in typical multilayer structures, and proposes to use the input impedance concept to achieve impedance matching at the via and trace connections. Effects of several geometrical parameters on the input impedance of differential...
In a user hierarchy, a user belongs to higher-privileged class will have access right to message owned by user in a lower-privileged class; while the opposite in not allowed. Many schemes based on cryptography have been proposed to solve this problem. However, previous schemes need large values associated with each security class. Considering the solution of dynamic access problem in a hierarchy,...
Wheezy breath is a general sign for airway obstructive diseases like asthma and chronic obstructive pulmonary disease. This paper presents a novel wheeze detection method that can be used to detect and identify wheezes automatically. The proposed method exploits ``entropy" to describe the pattern of the frequency spectrum of the wheezing signal and the wheeze identification can be conducted using...
Key agreement is paramount for wireless sensor networks (WSNs) security. Many key pre-distribution schemes have been developed to establish pair wise keys for WSNs. In WSNs, node capture attack is the most serious attack. And existing scheme can not offer strong resilience against node capture attack. In order to improve the resiliency of against sensor nodes capture, this paper proposes an improved...
One of the most difficult jobs in designing communication and multimedia chips, is to design and verify complex complementary circuit pair (E, E-1), in which circuit E transforms information into a format that is suitable for transmission and storage, while E's complementary circuit E-1 recovers this information. In order to ease this job, we propose a novel two-step approach to synthesize complementary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.