30,998 research outputs found
Implementation of packaged integrated antenna with embedded front end for Bluetooth applications
The design, integration and realization of system in enhanced package approach towards fully functional system level integration by using a compact Bluetooth USB dongle as the demonstrator is presented here. The integration was done on FR4 substrates, which is totally compatible with today’s printed circuit board manufacturing capability. A commercially available Bluetooth integrated chip was chosen as the chipset of our demonstrator, and a package integrated antenna together with an embedded front end completes the system in package integration. The front end developed here is based on an embedded meander line combline filter and an embedded transformer balun. The filter has a 35% area reduction when compared with the classical combline filter and similar performance. The balun has the coils distributed on three layers that minimized the board area needed it and optimizes the performances. The proposed packaged integrated antenna approach is successfully demonstrated here and the new module shows excellent performance when compared with a commercial solution, surpassing the normal Bluetooth class II dongle range which is up to 10 m and increasing the module range up to 120 m without an extra power amplifier
Spartan Daily, November 20, 1936
Volume 25, Issue 40https://scholarworks.sjsu.edu/spartandaily/2525/thumbnail.jp
UWB wireless coexistence by fibre-based photonic ADC interference monitoring
The interference monitoring of UWB wireless picocell clusters through an in-house fibre installation is proposed and evaluated in a proof-of-concept experiment. UWB clusters enable range extension of UWB technology providing Gbit/s communications in home or office buildings. Coexistence of a large number of UWB clusters with other wireless services is guaranteed by a photonic analog-to-digital converter employing the in-house optical fiber installation
State-of-the-art in Power Line Communications: from the Applications to the Medium
In recent decades, power line communication has attracted considerable
attention from the research community and industry, as well as from regulatory
and standardization bodies. In this article we provide an overview of both
narrowband and broadband systems, covering potential applications, regulatory
and standardization efforts and recent research advancements in channel
characterization, physical layer performance, medium access and higher layer
specifications and evaluations. We also identify areas of current and further
study that will enable the continued success of power line communication
technology.Comment: 19 pages, 12 figures. Accepted for publication, IEEE Journal on
Selected Areas in Communications. Special Issue on Power Line Communications
and its Integration with the Networking Ecosystem. 201
DolphinAtack: Inaudible Voice Commands
Speech recognition (SR) systems such as Siri or Google Now have become an
increasingly popular human-computer interaction method, and have turned various
systems into voice controllable systems(VCS). Prior work on attacking VCS shows
that the hidden voice commands that are incomprehensible to people can control
the systems. Hidden voice commands, though hidden, are nonetheless audible. In
this work, we design a completely inaudible attack, DolphinAttack, that
modulates voice commands on ultrasonic carriers (e.g., f > 20 kHz) to achieve
inaudibility. By leveraging the nonlinearity of the microphone circuits, the
modulated low frequency audio commands can be successfully demodulated,
recovered, and more importantly interpreted by the speech recognition systems.
We validate DolphinAttack on popular speech recognition systems, including
Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa. By
injecting a sequence of inaudible voice commands, we show a few
proof-of-concept attacks, which include activating Siri to initiate a FaceTime
call on iPhone, activating Google Now to switch the phone to the airplane mode,
and even manipulating the navigation system in an Audi automobile. We propose
hardware and software defense solutions. We validate that it is feasible to
detect DolphinAttack by classifying the audios using supported vector machine
(SVM), and suggest to re-design voice controllable systems to be resilient to
inaudible voice command attacks.Comment: 15 pages, 17 figure
Spartan Daily, November 18, 1960
Volume 48, Issue 37https://scholarworks.sjsu.edu/spartandaily/4091/thumbnail.jp
Spartan Daily, April 2, 1996
Volume 106, Issue 41https://scholarworks.sjsu.edu/spartandaily/8826/thumbnail.jp
- …