8,792 research outputs found
Spectra for the product of Gaussian noises
Products of Gaussian noises often emerge as the result of non-linear
detection techniques or as a parasitic effect, and their proper handling is
important in many practical applications, including in fluctuation-enhanced
sensing, indoor air or environmental quality monitoring, etc. We use Rice's
random phase oscillator formalism to calculate the power density spectra
variance for the product of two Gaussian band-limited white noises with
zero-mean and the same bandwidth W. The ensuing noise spectrum is found to
decrease linearly from zero frequency to 2W, and it is zero for frequencies
greater than 2W. Analogous calculations performed for the square of a single
Gaussian noise confirm earlier results. The spectrum at non-zero frequencies,
and the variance of the square of a noise, is amplified by a factor two as a
consequence of correlation effects between frequency products. Our analytic
results is corroborated by computer simulations.Comment: submitted for publicatio
Fluctuation-enhanced sensing
We present a short survey on fluctuation-enhanced gas sensing. We compare
some of its main characteristics with those of classical sensing. We address
the problem of linear response, information channel capacity, missed alarms and
false alarms.Comment: Keynote Talk at SPIE's 4th international symposium on Fluctuations
and Noise, Conference Noise and Fluctuations in Circuits, Devices and
Materials, Florence, Italy, May 20-24, 200
Resource requirements and speed versus geometry of unconditionally secure physical key exchanges
The imperative need for unconditional secure key exchange is expounded by the
increasing connectivity of networks and by the increasing number and level of
sophistication of cyberattacks. Two concepts that are information theoretically
secure are quantum key distribution (QKD) and Kirchoff-law-Johnson-noise
(KLJN). However, these concepts require a dedicated connection between hosts in
peer-to-peer (P2P) networks which can be impractical and or cost prohibitive. A
practical and cost effective method is to have each host share their respective
cable(s) with other hosts such that two remote hosts can realize a secure key
exchange without the need of an additional cable or key exchanger. In this
article we analyze the cost complexities of cable, key exchangers, and time
required in the star network. We mentioned the reliability of the star network
and compare it with other network geometries. We also conceived a protocol and
equation for the number of secure bit exchange periods needed in a star
network. We then outline other network geometries and trade-off possibilities
that seem interesting to explore.Comment: 13 pages, 7 figures, MDPI Entrop
- …