940 resultados para Encryption schemes
Resumo:
This work numerically analyzes the performances of a 2R (reamplification and reshaping) regenerator based on a nonlinear optical loop mirror and a 3R (reamplification, reshaping, and retiming) regenerator using a nonlinearly enhanced amplitude modulator in 40-Gb/s standard single-mode fiber (SMF)-based optical networks with large amplifier spacing. The characteristics of one(600 km of SMF) and two-step regeneration are examined and the feasibility of wavelength-division multiplexing (WDM) operation is demonstrated.
Resumo:
Multicast is an efficient approach to save network bandwidth for multimedia streaming services. To provide Quality of Services (QoS) for the multimedia services while maintain the advantage of multicast in bandwidth efficiency, admission control for multicast sessions are expected. Probe-based multicast admission control (PBMAC) schemes are of a sort of scalable and simple admission control for multicast. Probing scheme is the essence of PBMAC. In this paper, after a detailed survey on three existing probing schemes, we evaluate these schemes using simulation and analysis approaches in two aspects: admission correctness and group scalability. Admission correctness of the schemes is compared by simulation investigation. Analytical models for group scalability are derived, and validated by simulation results. The evaluation results illustrate the advantages and weaknesses of each scheme, which are helpful for people to choose proper probing scheme for network.
Resumo:
In this thesis we present an overview of sparse approximations of grey level images. The sparse representations are realized by classic, Matching Pursuit (MP) based, greedy selection strategies. One such technique, termed Orthogonal Matching Pursuit (OMP), is shown to be suitable for producing sparse approximations of images, if they are processed in small blocks. When the blocks are enlarged, the proposed Self Projected Matching Pursuit (SPMP) algorithm, successfully renders equivalent results to OMP. A simple coding algorithm is then proposed to store these sparse approximations. This is shown, under certain conditions, to be competitive with JPEG2000 image compression standard. An application termed image folding, which partially secures the approximated images is then proposed. This is extended to produce a self contained folded image, containing all the information required to perform image recovery. Finally a modified OMP selection technique is applied to produce sparse approximations of Red Green Blue (RGB) images. These RGB approximations are then folded with the self contained approach.
Resumo:
DUE TO COPYRIGHT RESTRICTIONS ONLY AVAILABLE FOR CONSULTATION AT ASTON UNIVERSITY LIBRARY AND INFORMATION SERVICES WITH PRIOR ARRANGEMENT
Resumo:
This paper numerically analyzes the performances of a 2R (reamplification and reshaping) regenerator based on a nonlinear optical loop mirror and a 3R (reamplification, reshaping, and retiming) regenerator using a nonlinearly enhanced amplitude modulator in 40-Gb/s standard single-mode fiber (SMF)-based optical networks with large amplifier spacing. The characteristics of one- (600 km of SMF) and two-step regeneration are examined and the feasibility of wavelength-division multiplexing operation is demonstrated. © 2005 IEEE.
Resumo:
This article presents a potential method to assist developers of future bioenergy schemes when selecting from available suppliers of biomass materials. The method aims to allow tacit requirements made on biomass suppliers to be considered at the design stage of new developments. The method used is a combination of the Analytical Hierarchy Process and the Quality Function Deployment methods (AHP-QFD). The output of the method is a ranking and relative weighting of the available suppliers which could be used to improve optimization algorithms such as linear and goal programming. The paper is at a conceptual stage and no results have been obtained. The aim is to use the AHP-QFD method to bridge the gap between treatment of explicit and tacit requirements of bioenergy schemes; allowing decision makers to identify the most successful supply strategy available.
Resumo:
bCHP (Biomass combined heat and power) systems are highly efficient at smaller-scales when a significant proportion of the heat produced can be effectively utilised for hot water, space heating or industrial heating purposes. However, there are many barriers to project development and this has greatly inhibited deployment in the UK. Project viability is highly subjective to changes in policy, regulation, the finance market and the low cost fossil fuel incumbent. The paper reviews the barriers to small-scale bCHP project development in the UK along with a case study of a failed 1.5MWel bCHP scheme. The paper offers possible explanations for the project's failure and suggests adaptations to improve the project resilience. Analysis of the project's: capital structuring contract length and bankability; feedstock type and price uncertainty, and plant oversizing highlight the negative impact of the existing project barriers on project development. The research paper concludes with a discussion on the effects of these barriers on the case study project and this industry more generally. A greater understanding of the techno-economic effects of some barriers for small-scale bCHP schemes is demonstrated within this paper, along with some methods for improving the attractiveness and resilience of projects of this kind. © 2014 Elsevier Ltd.
Resumo:
We report an experimental comparison between broadband fibre Bragg gratings (FBGs) and conventional dispersion compensating fibre (DCF) for a 40 x 10Gb/s DWDM system over 525km. A performanceoptimised configuration using FBG compensators is presented.
Resumo:
The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedicated to Nikola Obreshkoff and Lubomir Tschakaloff , Sofia, July, 2006. The material in this paper was presented in part at the 11th Workshop on Selected Areas in Cryptography (SAC) 2004
Resumo:
Dedicated to the memory of our colleague Vasil Popov January 14, 1942 – May 31, 1990 * Partially supported by ISF-Center of Excellence, and by The Hermann Minkowski Center for Geometry at Tel Aviv University, Israel
Resumo:
This chapter discusses network protection of high-voltage direct current (HVDC) transmission systems for large-scale offshore wind farms where the HVDC system utilizes voltage-source converters. The multi-terminal HVDC network topology and protection allocation and configuration are discussed with DC circuit breaker and protection relay configurations studied for different fault conditions. A detailed protection scheme is designed with a solution that does not require relay communication. Advanced understanding of protection system design and operation is necessary for reliable and safe operation of the meshed HVDC system under fault conditions. Meshed-HVDC systems are important as they will be used to interconnect large-scale offshore wind generation projects. Offshore wind generation is growing rapidly and offers a means of securing energy supply and addressing emissions targets whilst minimising community impacts. There are ambitious plans concerning such projects in Europe and in the Asia-Pacific region which will all require a reliable yet economic system to generate, collect, and transmit electrical power from renewable resources. Collective offshore wind farms are efficient and have potential as a significant low-carbon energy source. However, this requires a reliable collection and transmission system. Offshore wind power generation is a relatively new area and lacks systematic analysis of faults and associated operational experience to enhance further development. Appropriate fault protection schemes are required and this chapter highlights the process of developing and assessing such schemes. The chapter illustrates the basic meshed topology, identifies the need for distance evaluation, and appropriate cable models, then details the design and operation of the protection scheme with simulation results used to illustrate operation. © Springer Science+Business Media Singapore 2014.
Resumo:
We explore the efficiency of various regeneration schemes in communication systems. We discuss new efficient schemes for multilevel phase and amplitude regeneration and illustrate it on example of 16-symbol constellations. © 2014 IEEE.
Resumo:
The distribution of the secret key is the weakest link of many data encryption systems. Quantum key distribution (QKD) schemes provide attractive solutions [1], however their implementation remains challenging and their range and bit-rate are limited. Moreover, practical QKD systems, employ real-life components and are, therefore, vulnerable to diverse attack schemes [2]. Ultra-Long fiber lasers (UFLs) have been drawing much attention recently because of their fundamentally different properties compared to conventional lasers as well as their unique applications [3]. Here, we demonstrate a 100Bps, practically secure key distribution, over a 500km link, employing Raman gain UFL. Fig. 1(a) depicts a schematic of the UFL system. Each user has an identical set of two wavelength selective mirrors centered at l0 and l 1. In order to exchange a key-bit, each user independently choose one of these mirrors and introduces it as a laser reflector at their end. If both users choose identical mirrors, a clear signal develops and the bits in these cases are discarded. However if they choose complementary mirrors, (1, 0 or 0, 1 states), the UFL remains below lasing threshold and no signal evolves. In these cases, an eavesdropper can only detect noise and is unable to determine the mirror choice of the users, where the choice of mirrors represent a single key bit (e.g. Alice's choice of mirror is the key-bit). These bits are kept and added to the key. The absence of signal in the secure states faxilitates fast measurements to distinguish between the non-secure and the secure states and to determine the key-bit in the later case, Sequentially reapeating the single bit exchange protocol generate the entire keys of any desirable length. © 2013 IEEE.
Resumo:
AMS subject classification: 49N35,49N55,65Lxx.
Resumo:
2000 Mathematics Subject Classification: 62H30, 62M10, 62M20, 62P20, 94A13.