15 research outputs found

    Digital watermarking methods for data security and authentication

    Get PDF
    Philosophiae Doctor - PhDCryptology is the study of systems that typically originate from a consideration of the ideal circumstances under which secure information exchange is to take place. It involves the study of cryptographic and other processes that might be introduced for breaking the output of such systems - cryptanalysis. This includes the introduction of formal mathematical methods for the design of a cryptosystem and for estimating its theoretical level of securit

    Fundamental limits in Gaussian channels with feedback: confluence of communication, estimation, and control

    Get PDF
    The emerging study of integrating information theory and control systems theory has attracted tremendous attention, mainly motivated by the problems of control under communication constraints, feedback information theory, and networked systems. An often overlooked element is the estimation aspect; however, estimation cannot be studied isolatedly in those problems. Therefore, it is natural to investigate systems from the perspective of unifying communication, estimation, and control;This thesis is the first work to advocate such a perspective. To make Matters concrete, we focus on communication systems over Gaussian channels with feedback. For some of these channels, their fundamental limits for communication have been studied using information theoretic methods and control-oriented methods but remain open. In this thesis, we address the problems of characterizing and achieving the fundamental limits for these Gaussian channels with feedback by applying the unifying perspective;We establish a general equivalence among feedback communication, estimation, and feedback stabilization over the same Gaussian channels. As a consequence, we see that the information transmission (communication), information processing (estimation), and information utilization (control), seemingly different and usually separately treated, are in fact three sides of the same entity. We then reveal that the fundamental limitations in feedback communication, estimation, and control coincide: The achievable communication rates in the feedback communication problems can be alternatively given by the decay rates of the Cramer-Rao bounds (CRB) in the associated estimation problems or by the Bode sensitivity integrals in the associated control problems. Utilizing the general equivalence, we design optimal feedback communication schemes based on the celebrated Kalman filtering algorithm; these are the first deterministic, optimal communication schemes for these channels with feedback (except for the degenerated AWGN case). These schemes also extend the Schalkwijk-Kailath (SK) coding scheme and inherit its useful features, such as reduced coding complexity and improved performance. Hence, this thesis demonstrates that the new perspective plays a significant role in gaining new insights and new results in studying Gaussian feedback communication systems. We anticipate that the perspective could be extended to more general problems and helpful in building a theoretically and practically sound paradigm that unifies information, estimation, and control

    Wavelet Theory

    Get PDF
    The wavelet is a powerful mathematical tool that plays an important role in science and technology. This book looks at some of the most creative and popular applications of wavelets including biomedical signal processing, image processing, communication signal processing, Internet of Things (IoT), acoustical signal processing, financial market data analysis, energy and power management, and COVID-19 pandemic measurements and calculations. The editor’s personal interest is the application of wavelet transform to identify time domain changes on signals and corresponding frequency components and in improving power amplifier behavior

    Technology 2004, Vol. 2

    Get PDF
    Proceedings from symposia of the Technology 2004 Conference, November 8-10, 1994, Washington, DC. Volume 2 features papers on computers and software, virtual reality simulation, environmental technology, video and imaging, medical technology and life sciences, robotics and artificial intelligence, and electronics

    Intelligent Sensor Networks

    Get PDF
    In the last decade, wireless or wired sensor networks have attracted much attention. However, most designs target general sensor network issues including protocol stack (routing, MAC, etc.) and security issues. This book focuses on the close integration of sensing, networking, and smart signal processing via machine learning. Based on their world-class research, the authors present the fundamentals of intelligent sensor networks. They cover sensing and sampling, distributed signal processing, and intelligent signal learning. In addition, they present cutting-edge research results from leading experts

    Fifth Biennial Report : June 1999 - August 2001

    No full text

    Formal Techniques for Component-based Design of Embedded Systems

    Get PDF
    Embedded systems have become ubiquitous - from avionics and automotive over consumer electronics to medical devices. Failures may entailmaterial damage or compromise safety of human beings. At the same time, shorter product cycles, together with fast growing complexity of the systems to be designed, create a tremendous need for rigorous design techniques. The goal of component-based construction is to build complex systems from simpler components that are well understood and can be (re)used so as to accelerate the design process. This document presents a summary of the formal techniques for component-based design of embedded systems I have (co-)developed

    Efficient Passive Clustering and Gateways selection MANETs

    Get PDF
    Passive clustering does not employ control packets to collect topological information in ad hoc networks. In our proposal, we avoid making frequent changes in cluster architecture due to repeated election and re-election of cluster heads and gateways. Our primary objective has been to make Passive Clustering more practical by employing optimal number of gateways and reduce the number of rebroadcast packets
    corecore