Infocommunications Journal最新文献

筛选
英文 中文
The Processing Algorithm for Wideband Signals Propagating in Media with Frequency Dispersion 频散介质中宽带信号传播的处理算法
IF 1.1
Infocommunications Journal Pub Date : 2020-01-01 DOI: 10.36244/icj.2020.3.1
A. A. Kalshchikov, V. V. Shtykov, S. Smolskiy
{"title":"The Processing Algorithm for Wideband Signals Propagating in Media with Frequency Dispersion","authors":"A. A. Kalshchikov, V. V. Shtykov, S. Smolskiy","doi":"10.36244/icj.2020.3.1","DOIUrl":"https://doi.org/10.36244/icj.2020.3.1","url":null,"abstract":"The new processing algorithm for wideband signals, which are propagating in frequency dispersion media, is developed in the context of the ground penetrating radar technology. The mathematical substantiation of offered method is presented on the base of linear functional spaces. The method is described for calculation acceleration on the base of the recursive approach. Results of numerical modeling of this method are presented for electromagnetic waves propagating in frequency dispersion media at utilization of chirp pulse signals. The Debye model is used as the model of electrical medium properties. The frequency dispersion of losses in the medium is taken into consideration at modeling. Results of operation modeling of the ground penetrating radar are described. Results of this paper will be useful for the ground penetrating radar technology and the ultrasonic flaw detection.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"16 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85015601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Amplified spontaneous emission based quantum random number generator 基于放大自发发射的量子随机数发生器
IF 1.1
Infocommunications Journal Pub Date : 2020-01-01 DOI: 10.36244/icj.2020.2.2
Ádám Marosits, Ágoston Schranz, E. Udvary
{"title":"Amplified spontaneous emission based quantum random number generator","authors":"Ádám Marosits, Ágoston Schranz, E. Udvary","doi":"10.36244/icj.2020.2.2","DOIUrl":"https://doi.org/10.36244/icj.2020.2.2","url":null,"abstract":"There is an increasing need for true random bits, for which true random number generators (TRNG) are absolutely necessary, because the output of pseudo random number generators is deterministically calculated from the previous states. We introduce our quantum number generator (QRNG) based on amplified spontaneous emission (ASE), a truly random quantum physical process. The experimental setup utilizes the randomness of the process. In this system, optical amplifiers (based on ASE) play the major role. The suitable sampling rate is selected in order to build the fastest generator, while avoiding the correlation between consecutive bits. Furthermore, the applied post-processing increases the quality of the random bits. As a results of this, our system generated random bits which successfully passed the NIST tests. Our real-time generation system – which is currently a trial version implemented with cheap equipment – will be available for public use, generating real time random bits using a web page.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"18 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77557255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimisation of Optical Network for Continuous-Variable Quantum Key Distribution by Means of Simulation 基于仿真的连续变量量子密钥分配光网络优化
IF 1.1
Infocommunications Journal Pub Date : 2020-01-01 DOI: 10.36244/icj.2020.2.3
Dávid Kóbor, E. Udvary
{"title":"Optimisation of Optical Network for Continuous-Variable Quantum Key Distribution by Means of Simulation","authors":"Dávid Kóbor, E. Udvary","doi":"10.36244/icj.2020.2.3","DOIUrl":"https://doi.org/10.36244/icj.2020.2.3","url":null,"abstract":"The unprecedented breakthrough in the field of quantum computing in the last several years is threatening with the exploitation of our current communication systems. To address this issue, researchers are getting more involved in finding methods to protect these systems. Amongst other tools, quantum key distribution could be a potentially applicable way to achieve the desired level of protection. In this paper we are evaluating the physical layer of an optical system realising continuous variable quantum key distribution (CVQKD) with simulations to determine its weak points and suggest methods to improve them. We found that polarisation dependent devices are crucial for proper operation, therefore we determined their most defining parameters from the point of operation and suggested extra optical devices to largely improve transmission quality. We also paid attention to polarisation controlling in these sort of systems. Our findings could be valuable as practical considerations to construct reliable CVQKD optical transmission links.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"81 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80483534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Wireless Authentication Solution and TTCN-3 based Test Framework for ISO-15118 Wireless V2G Communication ISO-15118无线V2G通信的无线认证方案和基于TTCN-3的测试框架
IF 1.1
Infocommunications Journal Pub Date : 2019-01-01 DOI: 10.36244/icj.2019.2.5
Z. Jakó, Ádám Knapp, N. E. Sayed
{"title":"Wireless Authentication Solution and TTCN-3 based Test Framework for ISO-15118 Wireless V2G Communication","authors":"Z. Jakó, Ádám Knapp, N. E. Sayed","doi":"10.36244/icj.2019.2.5","DOIUrl":"https://doi.org/10.36244/icj.2019.2.5","url":null,"abstract":"Vehicle to grid (V2G) communication for electric vehicles and their charging points is already well established by the ISO 15118 standard. The standard allows vehicles to communicate with the charging station using the power cable, i.e. a wired link, but it is improved to enable wireless (WLAN) links as well. This paper aims to provide an implementation accomplishes a wireless authentication solution (WAS). With that the electric vehicles can establish V2G connection when approaching the charging pool, then identify and authenticate the driver and/or the vehicle. Furthermore, the paper presents a TTCN-3 based validation and verification (V&V) framework in order to test the conformance of the prototype implementation against the standard.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"16 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78812419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Minimum BER Criterion Based Robust Blind Separation for MIMO Systems 基于最小误码率准则的MIMO系统鲁棒盲分离
IF 1.1
Infocommunications Journal Pub Date : 2019-01-01 DOI: 10.36244/icj.2019.1.5
Zhongqiang Luo, Wei Zhang, Lidong Zhu, Chengjie Li
{"title":"Minimum BER Criterion Based Robust Blind Separation for MIMO Systems","authors":"Zhongqiang Luo, Wei Zhang, Lidong Zhu, Chengjie Li","doi":"10.36244/icj.2019.1.5","DOIUrl":"https://doi.org/10.36244/icj.2019.1.5","url":null,"abstract":"In this paper, a robust blind source separation (BSS) algorithm is investigated based on a new cost function for noise suppression. This new cost function is established according to the criterion of minimum bit error rate (BER) incorporated into maximum likelihood (ML) principle based independent component analysis (ICA). With the help of natural gradient search, the blind separation work is carried out through optimizing this constructed cost function. Simulation results and analysis corroborate that the proposed blind separation algorithm can realize better performance in speed of convergence and separation accuracy as opposed to the conventional ML-based BSS.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"1 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89291251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Communication System with Fluctuating Beckmann Fading 具有波动贝克曼衰落的通信系统性能分析
IF 1.1
Infocommunications Journal Pub Date : 2019-01-01 DOI: 10.36244/icj.2019.4.6
Zakir Hussain, A. Khan, H. Mehdi, Aamir Ali
{"title":"Performance Analysis of Communication System with Fluctuating Beckmann Fading","authors":"Zakir Hussain, A. Khan, H. Mehdi, Aamir Ali","doi":"10.36244/icj.2019.4.6","DOIUrl":"https://doi.org/10.36244/icj.2019.4.6","url":null,"abstract":"In this paper, performance of device-to-device (D2D) communication system over Fluctuating Beckmann (FB) fading channels is analyzed. FB fading model is a novel generalized fading model that unifies various fading models such as Rayleigh, Nakagami, one-sided Gaussian, Rician, Rician shadowed, κ-μ, κ-μ shadowed, η-μ and Beckmann. The considered D2D system is assumed to be affected by various FB faded co-channel interferers. Using the characteristic function (CF) approach outage probability and success probability expressions are given. These expressions are functions of D2D and interference path-loss exponents, distance between the D2D devices, distances between interferers and the D2D receiver and, interference and D2D fading channel conditions. Maximum ratio combining (MRC) and selection combining (SC) based diversity schemes are considered to itigate channel fading effects. D2D communication system under various conditions of channel fading and interference is numerically analyzed and discussed.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"27 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80926513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An OFDMA-based Hybrid MAC Protocol for IEEE 802.11ax 基于ofdma的IEEE 802.11ax混合MAC协议
IF 1.1
Infocommunications Journal Pub Date : 2019-01-01 DOI: 10.36244/icj.2019.2.6
G. Z. Islam, M. A. Kashem
{"title":"An OFDMA-based Hybrid MAC Protocol for IEEE 802.11ax","authors":"G. Z. Islam, M. A. Kashem","doi":"10.36244/icj.2019.2.6","DOIUrl":"https://doi.org/10.36244/icj.2019.2.6","url":null,"abstract":"Two types of MAC mechanisms i.e., random access and reservation could be adopted for OFDMA-based wireless LANs. Reservation-based MAC is more appropriate than random access MAC for connection-oriented applications as connectionoriented applications provide strict requirements of traffic demands. On the other hand, random access mechanism is a preferred choice for bursty traffic i.e., data packets which have no fixed pattern and rate. As OFDMA-based wireless networks promise to support heterogeneous applications, researchers assume that applications with and without traffic specifications will coexist. Eventually, OFDMA-based wireless LAN will deploy hybrid MAC mechanisms inheriting traits from random access and reservation. In this article, we design a new MAC protocol which employs one kind of hybrid mechanism that will provide high throughput of data as well as maintains improved fair access policy to the medium among the terminals. The protocol works in two steps, where at step 1 sub-channels are approximately evenly distributed to the terminals and at step 2 terminals within in a subchannel will contend for medium randomly if the total number of terminals of the system is larger than the number of sub-channels. The details of the protocol is illustrated in the paper and we analyze the performance of our OFDMA-based multi-channel hybrid protocol using comprehensive computer simulations. Simulation results validate that our proposed protocol is more robust than the conventional CSMA/CA protocol in terms of throughput, collision reduction and fair access. In addition, the theoretical analysis of the saturation throughput of the protocol is also evaluated using an existing comprehensive model.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"13 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81162977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IoT Hacking – A Primer 物联网黑客-入门
IF 1.1
Infocommunications Journal Pub Date : 2019-01-01 DOI: 10.36244/icj.2019.2.1
Dorottya Papp, Kristóf Tamás, Levente Buttyán
{"title":"IoT Hacking – A Primer","authors":"Dorottya Papp, Kristóf Tamás, Levente Buttyán","doi":"10.36244/icj.2019.2.1","DOIUrl":"https://doi.org/10.36244/icj.2019.2.1","url":null,"abstract":"The Internet of Things (IoT) enables many new and exciting applications, but it also creates a number of new risks related to information security. Several recent attacks on IoT devices and systems illustrate that they are notoriously insecure. It has also been shown that a major part of the attacks resulted in full adversarial control over IoT devices, and the reason for this is that IoT devices themselves are weakly protected and they often cannot resist even the most basic attacks. Penetration testing or ethical hacking of IoT devices can help discovering and fixing their vulnerabilities that, if exploited, can result in highly undesirable conditions, including damage of expensive physical equipment or even loss of human life. In this paper, we give a basic introduction into hacking IoT devices. We give an overview on the methods and tools for hardware hacking, firmware extraction and unpacking, and performing basic firmware analysis. We also provide a survey on recent research on more advanced firmware analysis methods, including static and dynamic analysis of binaries, taint analysis, fuzzing, and symbolic execution techniques. By giving an overview on both practical methods and readily available tools as well as current scientific research efforts, our work can be useful for both practitioners and academic researchers.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"32 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73291041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance Evaluation of Closed-loop Industrial Applications Over Imperfect Networks 不完全网络下闭环工业应用的性能评价
IF 1.1
Infocommunications Journal Pub Date : 2019-01-01 DOI: 10.36244/icj.2019.2.4
Sándor Rácz, G. Szabó, József Peto
{"title":"Performance Evaluation of Closed-loop Industrial Applications Over Imperfect Networks","authors":"Sándor Rácz, G. Szabó, József Peto","doi":"10.36244/icj.2019.2.4","DOIUrl":"https://doi.org/10.36244/icj.2019.2.4","url":null,"abstract":"5G networks provide technology enablers targeting industrial applications. One key enabler is the Ultra Reliable Low Latency Communication (URLLC). This paper studies the performance impact of network delay on closed-loop control for industrial applications. We investigate the performance of the closed-loop control of an UR5 industrial robot arm assuming fix delay. The goal is to stress the system at the upper limit of the possible network delay. We prove that to achieve the maximum speed, URLLC is a must have.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"35 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88063837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SAT Attacks on ARX Ciphers with Automated Equations Generation 基于自动生成方程的ARX密码的SAT攻击
IF 1.1
Infocommunications Journal Pub Date : 2019-01-01 DOI: 10.36244/icj.2019.4.1
Michal Andrzejczak, Władysław Dudzic
{"title":"SAT Attacks on ARX Ciphers with Automated Equations Generation","authors":"Michal Andrzejczak, Władysław Dudzic","doi":"10.36244/icj.2019.4.1","DOIUrl":"https://doi.org/10.36244/icj.2019.4.1","url":null,"abstract":"We propose a novel and simple approach to algebraic attack on block ciphers with the SAT-solvers. As opposed to a standard approach, the equations for key expansion algorithms are not included in the formulas that are converted to satisfiability problem. The lack of equations leads to finding the solution much faster. The method was used to attack a lightweight block ciphers SIMON and SPECK. We report the timings for roundreduced versions of selected ciphers and discuss the potential factors affecting the execution time of our attack.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":"102 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79411525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信