The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, we have used a new concept of sensor-based seed generator in order to generate the keys for a stream cipher based on a new algorithm mixing a Skew Tent Map and a Linear Feedback Shift Register. The cryptosystem has been implemented in a Xilinx Virtex 7 FPGA and has been proven to be fast and secure for application in IoT networks.
Blind rendezvous strategies for dynamic spectrum access in multi-channel ad-hoc networks have recently attracted the attention of many researchers. Their work has mostly focused on the design of rendezvous strategies between two network devices which actively try to establish communication. In this paper, we extend the analysis of pair-wise strategies to multi-hop ad-hoc networks and propose strategies...
In this paper we propose a fast and secure encryption system with a mixed-architecture based on a Modified Logistic Map and a Linear Feedback Shift Register. The system has been simulated showing that it can encrypt and decrypt images efficiently. The encrypted messages have been able to pass the NIST as well as the diehard battery of tests proving that the system is secure.
Handling the dynamics of future service-based distributed systems in real-time is a complex problem; a number of state transitions or reconfigurations take place that must be handled in real-time; this requires to impose some bounds to the structure of the system to ensure timely operation. We present a model for real-time reconfiguration based on a service model using the concept of service implementations...
Diffusion Weighted Magnetic Resonance Imaging (DW-MRI) and tractography approaches are the only tools that can be utilized to estimate structural connections between different brain areas, non-invasively and in-vivo. A first step that is commonly utilized in these techniques includes the estimation of the underlying fibre orientations and their uncertainty in each voxel of the image. A popular method...
This paper studies a topical capacitated network design problem that arises in the telecommunication industry. In this problem, given point-to-point demand between various pairs of nodes, a minimum cost survivable network must be designed by installing equipments (routers, line cards, ...) on nodes as well as link facilities on arcs. This realistic problem finds its motivation in the rapidly developing...
This paper introduces a methodology to design automatically QFT (Quantitative Feedback Theory) robust controllers for SISO (single input-single output) plants with model uncertainty. The method generalizes previous automatic loop-shaping techniques, avoiding restrictive assumptions about the search space. This methodology applies two strategies: a) Evolutionary Algorithms, and b) Genetic Algorithms...
This paper studies a topical capacitated network design problem that arises in the telecommunication industry. In this problem, given point-to-point demand between various pairs of nodes, a minimum cost survivable network must be designed by installing capacitated equipments (routers, line cards, ...) on nodes as well as link facilities on arcs. This realistic problem finds its motivation in the rapidly...
Encryption algorithms could suffer fault injection attacks in order to obtain the secret key. In this paper, a specific protection for any round-based encryption algorithm is presented, analyzed and tested. It is providing a high degree of robustness together with a small penalty in the algorithm throughput when dealing with specific intentional attacks. Experimental results on advanced encryption...
We discuss some aspects of a well known algorithm for inhomogeneity intensity correction in Magnetic Resonance Imaging (MRI), the parametric bias correction (PABIC) algorithm. In this approach, the intensity inhomogeneity is modelled by a linear combination of 2D or 3D Legengre polynomials (computed as outer products of 1D polynomials). The model parameter estimation process proposed in the original...
This paper shows an efficient implementation of symbol synchronization and frequency equalization algorithms for OFDM (orthogonal frequency division multiplexing) based systems. The aim is to have a low complexity realization that can be implemented on a FPGA (Field Programmable Gate Array), to obtain an area-efficient receiver. The algorithms are described theoretically, and hardware considerations...
A fast parallel dynamic programming algorithm which adresses to a broad class of discrete time optimal control problems is presented. Conditions for reducing the algorithm complexity are stressed. First experiments on a CRAY-2 vector quadriprocessor are given.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.