947 resultados para dual system encryption
Resumo:
Dual-rail encoding, return-to-spacer protocol, and hazard-free logic can be used to resist power analysis attacks by making energy consumed per clock cycle independent of processed data. Standard dual-rail logic uses a protocol with a single spacer, e.g., all-zeros, which gives rise to energy balancing problems. We address these problems by incorporating two spacers; the spacers alternate between adjacent clock cycles. This guarantees that all gates switch in every clock cycle regardless of the transmitted data values. To generate these dual-rail circuits, an automated tool has been developed. It is capable of converting synchronous netlists into dual-rail circuits and it is interfaced to industry CAD tools. Dual-rail and single-rail benchmarks based upon the advanced encryption standard (AES) have been simulated and compared in order to evaluate the method and the tool.
Resumo:
Practical demonstration of the operational advantages gained through the use of a co-operating retrodirective array (RDA) basestation and Van Atta node arrangements is discussed. The system exploits a number of inherent RDA features to provide analogue real time multifunctional operation at low physical complexity. An active dual-conversion four element RDA is used as the power distribution source (basestation) while simultaneously achieving a receive sensitivity level of ??109 dBm and 3 dB automatic beam steering angle of ??45??. When mobile units are each equipped with a semi-passive four element Van Atta array, it is shown mobile device orientation issues are mitigated and optimal energy transfer can occur because of automatic beam formation resulting from retrodirective self-pointing action. We show that operation in multipath rich environments with or without line of sight acts to reduce average power density limits in the operating volume with high energy density occurring at mobile nodes sites only. The system described can be used as a full duplex ASK communications link, or, as a means for remote node charging by wireless means, thereby enhancing deployment opportunities between unstabilised moving platforms.
Resumo:
Physical transceivers have hardware impairments that create distortions which degrade the performance of communication systems. The vast majority of technical contributions in the area of relaying neglect hardware impairments and, thus, assume ideal hardware. Such approximations make sense in low-rate systems, but can lead to very misleading results when analyzing future high-rate systems. This paper quantifies the impact of hardware impairments on dual-hop relaying, for both amplify-and-forward and decode-and-forward protocols. The outage probability (OP) in these practical scenarios is a function of the effective end-to-end signal-to-noise-and-distortion ratio (SNDR). This paper derives new closed-form expressions for the exact and asymptotic OPs, accounting for hardware impairments at the source, relay, and destination. A similar analysis for the ergodic capacity is also pursued, resulting in new upper bounds. We assume that both hops are subject to independent but non-identically distributed Nakagami-m fading. This paper validates that the performance loss is small at low rates, but otherwise can be very substantial. In particular, it is proved that for high signal-to-noise ratio (SNR), the end-to-end SNDR converges to a deterministic constant, coined the SNDR ceiling, which is inversely proportional to the level of impairments. This stands in contrast to the ideal hardware case in which the end-to-end SNDR grows without bound in the high-SNR regime. Finally, we provide fundamental design guidelines for selecting hardware that satisfies the requirements of a practical relaying system.
Resumo:
Quasi-phase matching (QPM) can be used to increase the conversion efficiency of the high harmonic generation (HHG) process. We observed QPM with an improved dual-gas foil target with a 1 kHz, 10 mJ, 30 fs laser system. Phase tuning and enhancement were possible within a spectral range from 17 nm to 30 nm. Furthermore analytical calculations and numerical simulations were carried out to distinguish QPM from other effects, such as the influence of adjacent jets on each other or the laser gas interaction. The simulations were performed with a 3 dimensional code to investigate the phase matching of the short and long trajectories individually over a large spectral range.
Resumo:
The non-covalent incorporation of responsive luminescent lanthanide, Ln(iii), complexes with orthogonal outputs from Eu(iii) and Tb(iii) in a gel matrix allows for in situ logic operation with colorimetric outputs. Herein, we report an exemplar system with two inputs ([H(+)] and [F(-)]) within a p(HEMA-co-MMA) polymer organogel acting as a dual-responsive device and identify future potential for such systems.
Resumo:
The electron dynamics in a planar coil inductively coupled plasma (ICP) system with a capacitively biased electrode is investigated using space and phase resolved optical emission spectroscopy. The two power source frequencies are exact multiple of each other and phase-locked. In this configuration, the system is investigated when the coil is operated in both E-mode and H-mode. The results show that in a phase synchronized RF biased ICP, the electrode bias power couples with the capacitive contribution of the coil, in both E-mode and H-modes, similar to dual-frequency capacitively coupled plasmas (2f-CCPs). It is also demonstrated that in H-mode, the phase between the electrode bias frequency and the ICP coil frequency influences the electron heating, similar to the electrical asymmetry effect in 2f-CCPs.
Resumo:
In physical layer security systems there is a clear need to exploit the radio link characteristics to automatically generate an encryption key between two end points. The success of the key generation depends on the channel reciprocity, which is impacted by the non-simultaneous measurements and the white nature of the noise. In this paper, an OFDM subcarriers' channel responses based key generation system with enhanced channel reciprocity is proposed. By theoretically modelling the OFDM subcarriers' channel responses, the channel reciprocity is modelled and analyzed. A low pass filter is accordingly designed to improve the channel reciprocity by suppressing the noise. This feature is essential in low SNR environments in order to reduce the risk of the failure of the information reconciliation phase during key generation. The simulation results show that the low pass filter improves the channel reciprocity, decreases the key disagreement, and effectively increases the success of the key generation.
Resumo:
We analyze the performance of amplify-and-forward dual-hop relaying systems in the presence of in-phase and quadrature-phase imbalance (IQI) at the relay node. In particular, an exact analytical expression for and tight lower bounds on the outage probability are derived over independent, non-identically distributed Nakagami-m fading channels. Moreover, tractable upper and lower bounds on the ergodic capacity are presented at arbitrary signal-to-noise ratios (SNRs). Some special cases of practical interest (e.g., Rayleigh and Nakagami-0.5 fading) are also studied. An asymptotic analysis is performed in the high SNR regime, where we observe that IQI results in a ceiling effect on the signal-to-interference-plus-noise ratio (SINR), which depends only on the level of I/Q impairments, i.e., the joint image rejection ratio. Finally, the optimal I/Q amplitude and phase mismatch parameters are provided for maximizing the SINR ceiling, thus improving the system performance. An interesting observation is that, under a fixed total phase mismatch constraint, it is optimal to have the same level of transmitter (TX) and receiver (RX) phase mismatch at the relay node, while the optimal values for the TX and RX amplitude mismatch should be inversely proportional to each other.
Resumo:
A core activity in information systems development involves building a conceptual model of the domain that an information system is intended to support. Such models are created using a conceptual-modeling (CM) grammar. Just as high-quality conceptual models facilitate high-quality systems development, high-quality CM grammars facilitate high-quality conceptual modeling. This paper provides a new perspective on ways to improve the quality of the semantics of CM grammars. For many years, the leading approach to this topic has relied on ontological theory. We show, however, that the ontological approach captures only half the story. It needs to be coupled with a logical approach. We explain how the ontological quality and logical quality of CM grammars interrelate. Furthermore, we outline three contributions that a logical approach can make to evaluating the quality of CM grammars: a means of seeing some familiar conceptual-modeling problems in simpler ways; the illumination of new problems; and the ability to prove the benefit of modifying existing CM grammars in particular ways. We demonstrate these benefits in the context of the Entity-Relationship grammar. More generally, our paper opens up a new area of research with many opportunities for future research and practice.
Resumo:
This paper presents a new encryption scheme implemented at the physical layer of wireless networks employing orthogonal frequency-division multiplexing (OFDM). The new scheme obfuscates the subcarriers by randomly reserving several subcarriers for dummy data and resequences the training symbol by a new secure sequence. Subcarrier obfuscation renders the OFDM transmission more secure and random, while training symbol resequencing protects the entire physical layer packet, but does not affect the normal functions of synchronization and channel estimation of legitimate users while preventing eavesdroppers from performing these functions. The security analysis shows the system is robust to various attacks by analyzing the search space using an exhaustive key search. Our scheme is shown to have a better performance in terms of search space, key rate and complexity in comparison with other OFDM physical layer encryption schemes. The scheme offers options for users to customize the security level and key rate according to the hardware resource. Its low complexity nature also makes the scheme suitable for resource limited devices. Details of practical design considerations are highlighted by applying the approach to an IEEE 802.11 OFDM system case study.
Resumo:
This paper is on the implementation of a dual axis positioning system controller. The system was designed to be used for space-dependent ultrasound signal acquisition problems, such as pressure field mapping. The work developed can be grouped in two main subjects: hardware and software. Each axis includes one stepper motor connected to a driver circuit, which is then connected to a processing unit. The graphical user interface is simple and clear for the user. The system resolution was computed as 127 mu m with an accuracy of 2.44 mu m. Although the target application is ultrasound signal acquisition, the controller can be applied to other devices that has up to four stepper motors. The application was developed as an open source software, thus it can be used or changed to fit different purposes.
Resumo:
Maintaining a high level of data security with a low impact on system performance is more challenging in wireless multimedia applications. Protocols that are used for wireless local area network (WLAN) security are known to significantly degrade performance. In this paper, we propose an enhanced security system for a WLAN. Our new design aims to decrease the processing delay and increase both the speed and throughput of the system, thereby making it more efficient for multimedia applications. Our design is based on the idea of offloading computationally intensive encryption and authentication services to the end systems’ CPUs. The security operations are performed by the hosts’ central processor (which is usually a powerful processor) before delivering the data to a wireless card (which usually has a low-performance processor). By adopting this design, we show that both the delay and the jitter are significantly reduced. At the access point, we improve the performance of network processing hardware for real-time cryptographic processing by using a specialized processor implemented with field-programmable gate array technology. Furthermore, we use enhanced techniques to implement the Counter (CTR) Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) and the CTR protocol. Our experiments show that it requires timing in the range of 20–40 μs to perform data encryption and authentication on different end-host CPUs (e.g., Intel Core i5, i7, and AMD 6-Core) as compared with 10–50 ms when performed using the wireless card. Furthermore, when compared with the standard WiFi protected access II (WPA2), results show that our proposed security system improved the speed to up to 3.7 times.
Resumo:
Lactate has been shown to offer neuroprotection in several pathologic conditions. This beneficial effect has been attributed to its use as an alternative energy substrate. However, recent description of the expression of the HCA1 receptor for lactate in the central nervous system calls for reassessment of the mechanism by which lactate exerts its neuroprotective effects. Here, we show that HCA1 receptor expression is enhanced 24 hours after reperfusion in an middle cerebral artery occlusion stroke model, in the ischemic cortex. Interestingly, intravenous injection of L-lactate at reperfusion led to further enhancement of HCA1 receptor expression in the cortex and striatum. Using an in vitro oxygen-glucose deprivation model, we show that the HCA1 receptor agonist 3,5-dihydroxybenzoic acid reduces cell death. We also observed that D-lactate, a reputedly non-metabolizable substrate but partial HCA1 receptor agonist, also provided neuroprotection in both in vitro and in vivo ischemia models. Quite unexpectedly, we show D-lactate to be partly extracted and oxidized by the rodent brain. Finally, pyruvate offered neuroprotection in vitro whereas acetate was ineffective. Our data suggest that L- and D-lactate offer neuroprotection in ischemia most likely by acting as both an HCA1 receptor agonist for non-astrocytic (most likely neuronal) cells as well as an energy substrate.
Resumo:
Green mould is a serious disease of commercially grown mushrooms, the causal agent being attributed to the filamentous soil fungus Triclzodenna aggressivum f. aggressivu11l and T. aggressivum f. ellropaellm. Found worldwide, and capable of devastating crops, this disease has caused millions of dollars in lost revenue within the mushroom industry. One mechanism used by TricllOdenlla spp. in the antagonism of other fungi, is the secretion of lytic enzymes such as chitinases, which actively degrade a host's cell wall. Therefore, the intent of this study was to examine the production of chitinase enzymes during the host-parasite interaction of Agaricus bisporus (commercial mushroom) and Triclzodemza aggressivum, focusing specifically on chitinase involvement in the differential resistance of white, off-white, and brown commercial mushroom strains. Chitinases isolated from cultures of A. bisporus and T. aggressivu11l grown together and separately, were identified following native PAGE, and analysis of fluorescence based on specific enzymatic cleavage of 4-methylumbelliferyl glucoside substrates. Results indicate that the interaction between T. aggressivulll and A. bisporus involves a complex enzyme battle. It was determined that T. aggressivum produces a number of chitinases that appear to correlate to those isolated in previous studies using biocontrol strains of T. Izarziallilm. A 122 kDa N-acetylglucosaminidase of T. aggressivu11l revealed the highest and most variable activity, and is therefore believed to be an important predictor of antifungal activity. Furthermore, results indicate that brown strain resistance of mushrooms may be related to high levels of a 96 kDa N-acetylglucosaminidase, which showed elevated activity in both solitary and dual cultures with T. aggressivum. Overall, each host-parasite combination produced unique enzyme profiles, with the majority of the differences seen between day 0 and day 6 for the extracellular chitinases. Therefore, it was concluded that the antagonistic behaviour of T. aggressivli1ll does not involve a typical response, always producing the same types and levels of enzymes, but that mycoparasitism, specifically in the form of chitinase production, may be induced and regulated based on the host presented.
Resumo:
In this thesis, I examined the relevance of dual-process theory to understanding forgiveness. Specifically, I argued that the internal conflict experienced by laypersons when forgiving (or finding themselves unable to forgive) and the discrepancies between existing definitions of forgiveness can currently be best understood through the lens of dual-process theory. Dual-process theory holds that individuals engage in two broad forms of mental processing corresponding to two systems, here referred to as System 1 and System 2. System 1 processing is automatic, unconscious, and operates through learned associations and heuristics. System 2 processing is effortful, conscious, and operates through rule-based and hypothetical thinking. Different definitions of forgiveness amongst both lay persons and scholars may reflect different processes within each system. Further, lay experiences with internal conflict concerning forgiveness may frequently result from processes within each system leading to different cognitive, affective, and behavioural responses. The study conducted for this thesis tested the hypotheses that processing within System 1 can directly affect one's likelihood to forgive, and that this effect is moderated by System 2 processing. I used subliminal conditioning to manipulate System 1 processing by creating positive or negative conditioned attitudes towards a hypothetical transgressor. I used working memory load (WML) to inhibit System 2 processing amongst half of the participants. The conditioning phase of the study failed and so no conclusions could be drawn regarding the roles of System 1 and System 2 in forgiveness. The implications of dual-process theory for forgiveness research and clinical practice, and directions for future research are discussed.