The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As general international standard, Inter-Range Instrumentation Group (IRIG) time codes were widely used in modern digital world, monitor and measurement system, autocontrol and commercial fields etc. A new design of IRIG-B decode based on Field Programmable Gate Array (FPGA) is proposed in this paper. The results demonstrate that the system runs steadily with high synchronization precision and better...
Reflector attacks are a variant of denial-of-service attacks that use unwitting, legitimate servers to flood a target. The attacker spoofs the target's address in legitimate service requests, such as TCP SYN packets. The servers, called "reflectors,'' reply to these requests, flooding the target. RAD is a novel defense against reflector attacks. It has two variants -- locally-deployed (L-RAD)...
This paper introduces the question of multi-reader collision in crowded environment of RFID system, and proposes a kind of highly effective practical method of multi-reader coordinative work. The method can ensure completive point in time synchronization of each reader sending order to the tag through two synchronization, and reducing the possibility of reader-reader collision, improving the efficiency...
We are witnessing an increasing adoption of GPUs for performing general purpose computation, which is usually known as GPGPU. The main challenge in developing such applications is that they often do not fit in the model required by the graphics processing devices, limiting the scope of applications that may be benefit from the computing power provided by GPUs. Even when the application fits GPU model,...
In this paper we suggest a protocol for secure data distribution in a one-way communication scenario aimed at time distribution for sensor networks. Our protocol is designed to support timestamps in any format, including repeating, resettable, and incomplete timestamps. The protocol requires a trusted powerful source node. We show that the protocol is immune to attacks including replay attacks, wormhole...
Synchronized clocks are fundamental for multiple applications sometimes also requiring to protect clock synchronization protocol information against malicious attacks. This article analyses security vulnerabilities of the IEEE 1588 clock synchronization protocol caused by a flaw in the integrity check value (ICV) calculation. The paper elaborates counter measures that protect protocol addresses and...
We study the multi-robot synchronization on a segment. The goal is for each robot to move along a subsegment of equal length in equal time interval with potential impacts. To achieve the synchronization, we propose a decentralized algorithm by designing impact law, which does not depend on the position of the robot, but on the time information. Specifically, ??the time interval between two consecutive...
Field-Programmable Gate Arrays (FPGAs) are becoming increasingly important in embedded and high-performance computing systems. They allow performance levels close to the ones obtained from Application-Specific Integrated Circuits (ASICs), while still keeping design and implementation flexibility. However, to efficiently program FPGAs, one needs the expertise of hardware developers and to master hardware...
Most compilers focus on optimizing performance, often at the expense of memory, but efficient memory use can be just as important in constrained environments such as embedded systems.
This paper introduces random number generators based on hybrid cellular automata (HCA). It is shown that by properly mixing CA cells from two categories (two different rules) an automaton generating near maximal length pseudo-random sequences can be easily obtained. The resulting system is similar to the well-known linear feedback shift register (LFSR) but in addition it posses the binary synchronization...
In a safety-critical real time system it is important to prevent the babbling idiot failure (BIF), which is characterized by a faulty node transmitting arbitrary messages at random points in time. However, existing communication systems based on flexible time division multiple access (FTDMA), whose development was driven explicitly by the new needs of future in-car control applications involving safety-critical...
Current DTV systems like DVB or ATSC are based on MPEG-2 transport streams. A single transport stream (TS) combines several programs while each program is related to an independent time base. The elementary stream packets that make up a single program share a common time base. These time bases represent numerical samples of the original system clock frequency and are called program clock reference...
In this paper we propose a distributed algorithm to detect whether a given node is present or absent in an ad-hoc network. This information is valuable since many proposed protocols and applications for MANETs exhibit worst-case behavior when an intended communication partner is currently not present. Our distributed algorithm improves upon existing approaches to presence detection by significantly...
Biometric watermarking refers to the incorporation of biometrics in watermarking technology. In this paper, we present a novel biometric watermarking scheme to embed handwritten signature invisibly in the host as a notice of legitimate ownership. We propose to adaptively fuse Least Significant Bit (LSB) and Discrete Wavelet Transform (DWT)-based approaches into a unison framework, which to be known...
It is generally recognized that asynchronous operation of logic networks offers specific advantages over synchronous operation controlled by a central clock when the network is subject to large or widely varying inter-module propagation delays. In this paper we characterize several previously described techniques for achieving asynchronous operation by a single model. Essential to the model is the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.