8,792 research outputs found

    Spectra for the product of Gaussian noises

    Get PDF
    Products of Gaussian noises often emerge as the result of non-linear detection techniques or as a parasitic effect, and their proper handling is important in many practical applications, including in fluctuation-enhanced sensing, indoor air or environmental quality monitoring, etc. We use Rice's random phase oscillator formalism to calculate the power density spectra variance for the product of two Gaussian band-limited white noises with zero-mean and the same bandwidth W. The ensuing noise spectrum is found to decrease linearly from zero frequency to 2W, and it is zero for frequencies greater than 2W. Analogous calculations performed for the square of a single Gaussian noise confirm earlier results. The spectrum at non-zero frequencies, and the variance of the square of a noise, is amplified by a factor two as a consequence of correlation effects between frequency products. Our analytic results is corroborated by computer simulations.Comment: submitted for publicatio

    Fluctuation-enhanced sensing

    Full text link
    We present a short survey on fluctuation-enhanced gas sensing. We compare some of its main characteristics with those of classical sensing. We address the problem of linear response, information channel capacity, missed alarms and false alarms.Comment: Keynote Talk at SPIE's 4th international symposium on Fluctuations and Noise, Conference Noise and Fluctuations in Circuits, Devices and Materials, Florence, Italy, May 20-24, 200

    Resource requirements and speed versus geometry of unconditionally secure physical key exchanges

    Get PDF
    The imperative need for unconditional secure key exchange is expounded by the increasing connectivity of networks and by the increasing number and level of sophistication of cyberattacks. Two concepts that are information theoretically secure are quantum key distribution (QKD) and Kirchoff-law-Johnson-noise (KLJN). However, these concepts require a dedicated connection between hosts in peer-to-peer (P2P) networks which can be impractical and or cost prohibitive. A practical and cost effective method is to have each host share their respective cable(s) with other hosts such that two remote hosts can realize a secure key exchange without the need of an additional cable or key exchanger. In this article we analyze the cost complexities of cable, key exchangers, and time required in the star network. We mentioned the reliability of the star network and compare it with other network geometries. We also conceived a protocol and equation for the number of secure bit exchange periods needed in a star network. We then outline other network geometries and trade-off possibilities that seem interesting to explore.Comment: 13 pages, 7 figures, MDPI Entrop
    corecore