70 research outputs found

    FPAA based desıgn and implementation of sprott N chaotic system

    Get PDF
    Nowadays, chaotic systems are used in various studies of different disciplines. Today, chaotic systems are used in various studies of different disciplines. In the literature, chaotic systems with various features have been introduced up to the present. In order to use these new chaotic systems in real-world engineering applications such as encryption, secure communication and authentication, they must be realized besides numerical simulations. In the literature, analog chaotic system implementations have been realized mainly with OPAMP devices. FPGAs and microcontrollers are used mostly in digital designs of chaotic systems. In this study, FPAA (Field Programmable Analog Array) based design and realization of Sprott N chaotic system was carried out. FPAA based design and numerical simulation results confirmed each other. As a result, it has been shown that the Sprott N chaotic system can be used based on FPAA in various engineering applications.Nowadays, chaotic systems are used in various studies of different disciplines. Today, chaotic systems are used in various studies of different disciplines. In the literature, chaotic systems with various features have been introduced up to the present. In order to use these new chaotic systems in real-world engineering applications such as encryption, secure communication and authentication, they must be realized besides numerical simulations. In the literature, analog chaotic system implementations have been realized mainly with OPAMP devices. FPGAs and microcontrollers are used mostly in digital designs of chaotic systems. In this study, FPAA (Field Programmable Analog Array) based design and realization of Sprott N chaotic system was carried out. FPAA based design and numerical simulation results confirmed each other. As a result, it has been shown that the Sprott N chaotic system can be used based on FPAA in various engineering applications

    High-speed imaging with optical encoding and compressive sensing

    Get PDF
    Imaging instruments can be used to obtain a series of frames in domains such as frequency and time. Recent advancements in applications such as medical astronomical, scientic and the consumer application, demand overall improvements in these imaging systems. Many current imaging methods rely on the well-known Shannon-Nyquist theorem where sustaining this conventional model increases the system complexity, data rate, storage and processing power as well as the overall build costs of these units. Recent investigations based on the mathematical theory of compressed sensing (CS) have broken the traditional sampling mechanisms and introduces alternative methods of data sampling. This dissertation investigates the current advancements in the high-speed imaging schemes and proposes new methods and optical designs to improve the spatial and temporal resolution as well as the required transmission and storage capacity of the imaging systems. First, we investigate the current mathematical models of CS based algorithms in video acquisition systems and propose an improved adapted technique for data reconstruction. Then we investigate the state-of-the-art high-speed imaging methods and introduce optical encoding techniques that enable the current high-speed imaging systems to reach 10 times faster frame rates whilst preserving the spatial resolution of the existing systems. Second, we develop a novel high-speed imaging system that implements CS based optical imaging technique and experimentally demonstrate the operation of this novel imaging system. The proposed compressive coded rotating mirror (CCRM) camera benefits from noticeably improved physical dimensions, highly reduced build costs and the significantly simplified operation compared to the other high-speed cameras. Due to the built-in optical encoding and on-the-fly compression functionalities of CCRM camera, it becomes a viable option for the fields such as the medical and military based imaging applications where the security of the data remains one of the top priorities in the imaging instruments. Finally, we discuss the potential improvements on the CCRM camera and propose several advancement plans for the future of this system

    Authentication enhancement in command and control networks: (a study in Vehicular Ad-Hoc Networks)

    Get PDF
    Intelligent transportation systems contribute to improved traffic safety by facilitating real time communication between vehicles. By using wireless channels for communication, vehicular networks are susceptible to a wide range of attacks, such as impersonation, modification, and replay. In this context, securing data exchange between intercommunicating terminals, e.g., vehicle-to-everything (V2X) communication, constitutes a technological challenge that needs to be addressed. Hence, message authentication is crucial to safeguard vehicular ad-hoc networks (VANETs) from malicious attacks. The current state-of-the-art for authentication in VANETs relies on conventional cryptographic primitives, introducing significant computation and communication overheads. In this challenging scenario, physical (PHY)-layer authentication has gained popularity, which involves leveraging the inherent characteristics of wireless channels and the hardware imperfections to discriminate between wireless devices. However, PHY-layerbased authentication cannot be an alternative to crypto-based methods as the initial legitimacy detection must be conducted using cryptographic methods to extract the communicating terminal secret features. Nevertheless, it can be a promising complementary solution for the reauthentication problem in VANETs, introducing what is known as “cross-layer authentication.” This thesis focuses on designing efficient cross-layer authentication schemes for VANETs, reducing the communication and computation overheads associated with transmitting and verifying a crypto-based signature for each transmission. The following provides an overview of the proposed methodologies employed in various contributions presented in this thesis. 1. The first cross-layer authentication scheme: A four-step process represents this approach: initial crypto-based authentication, shared key extraction, re-authentication via a PHY challenge-response algorithm, and adaptive adjustments based on channel conditions. Simulation results validate its efficacy, especially in low signal-to-noise ratio (SNR) scenarios while proving its resilience against active and passive attacks. 2. The second cross-layer authentication scheme: Leveraging the spatially and temporally correlated wireless channel features, this scheme extracts high entropy shared keys that can be used to create dynamic PHY-layer signatures for authentication. A 3-Dimensional (3D) scattering Doppler emulator is designed to investigate the scheme’s performance at different speeds of a moving vehicle and SNRs. Theoretical and hardware implementation analyses prove the scheme’s capability to support high detection probability for an acceptable false alarm value ≤ 0.1 at SNR ≥ 0 dB and speed ≤ 45 m/s. 3. The third proposal: Reconfigurable intelligent surfaces (RIS) integration for improved authentication: Focusing on enhancing PHY-layer re-authentication, this proposal explores integrating RIS technology to improve SNR directed at designated vehicles. Theoretical analysis and practical implementation of the proposed scheme are conducted using a 1-bit RIS, consisting of 64 × 64 reflective units. Experimental results show a significant improvement in the Pd, increasing from 0.82 to 0.96 at SNR = − 6 dB for multicarrier communications. 4. The fourth proposal: RIS-enhanced vehicular communication security: Tailored for challenging SNR in non-line-of-sight (NLoS) scenarios, this proposal optimises key extraction and defends against denial-of-service (DoS) attacks through selective signal strengthening. Hardware implementation studies prove its effectiveness, showcasing improved key extraction performance and resilience against potential threats. 5. The fifth cross-layer authentication scheme: Integrating PKI-based initial legitimacy detection and blockchain-based reconciliation techniques, this scheme ensures secure data exchange. Rigorous security analyses and performance evaluations using network simulators and computation metrics showcase its effectiveness, ensuring its resistance against common attacks and time efficiency in message verification. 6. The final proposal: Group key distribution: Employing smart contract-based blockchain technology alongside PKI-based authentication, this proposal distributes group session keys securely. Its lightweight symmetric key cryptography-based method maintains privacy in VANETs, validated via Ethereum’s main network (MainNet) and comprehensive computation and communication evaluations. The analysis shows that the proposed methods yield a noteworthy reduction, approximately ranging from 70% to 99%, in both computation and communication overheads, as compared to the conventional approaches. This reduction pertains to the verification and transmission of 1000 messages in total

    18th IEEE Workshop on Nonlinear Dynamics of Electronic Systems: Proceedings

    Get PDF
    Proceedings of the 18th IEEE Workshop on Nonlinear Dynamics of Electronic Systems, which took place in Dresden, Germany, 26 – 28 May 2010.:Welcome Address ........................ Page I Table of Contents ........................ Page III Symposium Committees .............. Page IV Special Thanks ............................. Page V Conference program (incl. page numbers of papers) ................... Page VI Conference papers Invited talks ................................ Page 1 Regular Papers ........................... Page 14 Wednesday, May 26th, 2010 ......... Page 15 Thursday, May 27th, 2010 .......... Page 110 Friday, May 28th, 2010 ............... Page 210 Author index ............................... Page XII

    Leveraging contextual-cognitive relationships into mobile commerce systems

    Get PDF
    A thesis submitted to the University of Bedfordshire in partial fulfilment of the requirements for the degree of Doctor of PhilosophyMobile smart devices are becoming increasingly important within the on-line purchasing cycle. Thus the requirement for mobile commerce systems to become truly context-aware remains paramount if they are to be effective within the varied situations that mobile users encounter. Where traditionally a recommender system will focus upon the user – item relationship, i.e. what to recommend, in this thesis it is proposed that due to the complexity of mobile user situational profiles the how and when must also be considered for recommendations to be effective. Though non-trivial, it should be, through the understanding of a user’s ability to complete certain cognitive processes, possible to determine the likelihood of engagement and therefore the success of the recommendation. This research undertakes an investigation into physical and modal contexts and presents findings as to their relationships with cognitive processes. Through the introduction of the novel concept, disruptive contexts, situational contexts, including noise, distractions and user activity, are identified as having significant effects upon the relationship between user affective state and cognitive capability. Experimental results demonstrate that by understanding specific cognitive capabilities, e.g. a user’s perception of advert content and user levels of purchase-decision involvement, a system can determine potential user engagement and therefore improve the effectiveness of recommender systems’ performance. A quantitative approach is followed with a reliance upon statistical measures to inform the development, and subsequent validation, of a contextual-cognitive model that was implemented as part of a context-aware system. The development of SiDISense (Situational Decision Involvement Sensing system) demonstrated, through the use of smart-phone sensors and machine learning, that is was viable to classify subjectively rated contexts to then infer levels of cognitive capability and therefore likelihood of positive user engagement. Through this success in furthering the understanding of contextual-cognitive relationships there are novel and significant advances that are now viable within the area of m-commerce

    A Poetics of Chaos: Schizoanalysis and Post modern American Fiction.

    Get PDF
    In "A Poetics of Chaos: Schizoanalysis and Postmodern American Fiction," I use theories from physics and psychoanalysis together to explore narrative structures in recent American fiction. Chaos theory, which emerged in mathematical and biological discourses in the 1960s, postulates the intrinsic instability and unpredictability of many natural and physical phenomena. Theorists like Bertalanffy, Mandelbrot and Lorenz produced a vocabulary to account for these pervasive systems. In assessing historical, economic and, indeed, literary systems, we may draw terms from chaotic inquiry: bifurcation, fractal, moebial, reiteration, complexity, butterfly effect, strange attractors, and sensitive dependence upon initial conditions. '"Chaotic narratives*" may explicitly deploy (Barth, Pynchon, Gibson) or inadvertently express (Coover, Ondaatje, Powers) the structural features of chaotic systems. Such writing is characterized by a diffusion of linear chronology, as well as ontological and narrative fracture, repetition and variation. Literary theorists N. Katherine Hayles, Joseph Conte, Hanjo Berressem and others have discussed how chaotic scientific and psycho-social systems are not only invoked in contemporary literature, but are themselves the structural and philosophical underpinnings of postmodern culture. My thesis builds upon chaotic-literary criticism by investigating the psychological implications of "chaotic narratives." Drawing from the anti-deterministic "schizoanalysis" of Gilles Deleuze and Felix Guattari, I explain how writings by Don DeLillo, Paul Auster, David Foster Wallace and Mark Z. Danielewski perform and reflect the "orderly disorder" of psychic development. I advance the term "psychochaotics*' to describe a theoretical approach that uses principles from chaos theory to reveal the psychodynamic systems in postmodern fiction

    Nonlinear Dynamics of Semiconductor Lasers and Their Applications

    Get PDF
    Semiconductor lasers are key components in many optical systems due to their advantages, including their small size, low cost, high efficiency, and low power consumption. It is well-known that semiconductor lasers under external perturbations, such as optical injection, optical feedback, or delayed coupling can exhibit a large variety of complex dynamical behaviors. Nowadays, cutting-edge engineering applications based on the complex dynamics of diode lasers are being conducted in areas, such as optical communications, optical signal processing, encoded communications, neuro-inspired ultra-fast optical computing devices, microwave signal generation, RADAR and LIDAR applications, biomedical imaging, and broadband spectroscopy. The prospects for these applications are even more exciting with the advent of photonic integrated circuits. This Special Issue focuses on theoretical and experimental advances in the nonlinear dynamics of semiconductor lasers subject to different types of external perturbations

    Distant Operational Care Centre: Design Project Report

    Get PDF
    The goal of this project is to outline the design of the Distant Operational Care Centre (DOCC), a modular medical facility to maintain human health and performance in space, that is adaptable to a range of remote human habitats. The purpose of this project is to outline a design, not to go into a complete technical specification of a medical facility for space. This project involves a process to produce a concise set of requirements, addressing the fundamental problems and issues regarding all aspects of a space medical facility for the future. The ideas presented here are at a high level, based on existing, researched, and hypothetical technologies. Given the long development times for space exploration, the outlined concepts from this project embodies a collection of identified problems, and corresponding proposed solutions and ideas, ready to contribute to future space exploration efforts. In order to provide a solid extrapolation and speculation in the context of the future of space medicine, the extent of this project's vision is roughly within the next two decades. The Distant Operational Care Centre (DOCC) is a modular medical facility for space. That is, its function is to maintain human health and performance in space environments, through prevention, diagnosis, and treatment. Furthermore, the DOCC must be adaptable to meet the environmental requirements of different remote human habitats, and support a high quality of human performance. To meet a diverse range of remote human habitats, the DOCC concentrates on a core medical capability that can then be adapted. Adaptation would make use of the DOCC's functional modularity, providing the ability to replace, add, and modify core functions of the DOCC by updating hardware, operations, and procedures. Some of the challenges to be addressed by this project include what constitutes the core medical capability in terms of hardware, operations, and procedures, and how DOCC can be adapted to different remote habitats
    corecore