30,998 research outputs found

    Personal area technologies for internetworked services

    Get PDF

    Implementation of packaged integrated antenna with embedded front end for Bluetooth applications

    No full text
    The design, integration and realization of system in enhanced package approach towards fully functional system level integration by using a compact Bluetooth USB dongle as the demonstrator is presented here. The integration was done on FR4 substrates, which is totally compatible with today’s printed circuit board manufacturing capability. A commercially available Bluetooth integrated chip was chosen as the chipset of our demonstrator, and a package integrated antenna together with an embedded front end completes the system in package integration. The front end developed here is based on an embedded meander line combline filter and an embedded transformer balun. The filter has a 35% area reduction when compared with the classical combline filter and similar performance. The balun has the coils distributed on three layers that minimized the board area needed it and optimizes the performances. The proposed packaged integrated antenna approach is successfully demonstrated here and the new module shows excellent performance when compared with a commercial solution, surpassing the normal Bluetooth class II dongle range which is up to 10 m and increasing the module range up to 120 m without an extra power amplifier

    Spartan Daily, November 20, 1936

    Get PDF
    Volume 25, Issue 40https://scholarworks.sjsu.edu/spartandaily/2525/thumbnail.jp

    UWB wireless coexistence by fibre-based photonic ADC interference monitoring

    Get PDF
    The interference monitoring of UWB wireless picocell clusters through an in-house fibre installation is proposed and evaluated in a proof-of-concept experiment. UWB clusters enable range extension of UWB technology providing Gbit/s communications in home or office buildings. Coexistence of a large number of UWB clusters with other wireless services is guaranteed by a photonic analog-to-digital converter employing the in-house optical fiber installation

    State-of-the-art in Power Line Communications: from the Applications to the Medium

    Get PDF
    In recent decades, power line communication has attracted considerable attention from the research community and industry, as well as from regulatory and standardization bodies. In this article we provide an overview of both narrowband and broadband systems, covering potential applications, regulatory and standardization efforts and recent research advancements in channel characterization, physical layer performance, medium access and higher layer specifications and evaluations. We also identify areas of current and further study that will enable the continued success of power line communication technology.Comment: 19 pages, 12 figures. Accepted for publication, IEEE Journal on Selected Areas in Communications. Special Issue on Power Line Communications and its Integration with the Networking Ecosystem. 201

    DolphinAtack: Inaudible Voice Commands

    Full text link
    Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and have turned various systems into voice controllable systems(VCS). Prior work on attacking VCS shows that the hidden voice commands that are incomprehensible to people can control the systems. Hidden voice commands, though hidden, are nonetheless audible. In this work, we design a completely inaudible attack, DolphinAttack, that modulates voice commands on ultrasonic carriers (e.g., f > 20 kHz) to achieve inaudibility. By leveraging the nonlinearity of the microphone circuits, the modulated low frequency audio commands can be successfully demodulated, recovered, and more importantly interpreted by the speech recognition systems. We validate DolphinAttack on popular speech recognition systems, including Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa. By injecting a sequence of inaudible voice commands, we show a few proof-of-concept attacks, which include activating Siri to initiate a FaceTime call on iPhone, activating Google Now to switch the phone to the airplane mode, and even manipulating the navigation system in an Audi automobile. We propose hardware and software defense solutions. We validate that it is feasible to detect DolphinAttack by classifying the audios using supported vector machine (SVM), and suggest to re-design voice controllable systems to be resilient to inaudible voice command attacks.Comment: 15 pages, 17 figure

    Spartan Daily, November 18, 1960

    Get PDF
    Volume 48, Issue 37https://scholarworks.sjsu.edu/spartandaily/4091/thumbnail.jp

    The Cord Weekly (November 17, 1999)

    Get PDF

    Spartan Daily, April 2, 1996

    Get PDF
    Volume 106, Issue 41https://scholarworks.sjsu.edu/spartandaily/8826/thumbnail.jp
    corecore