1,057 research outputs found
Recommended from our members
A parallel convolutional coder including embedded puncturing with application to consumer devices
As consumers demand more functionality) from their electronic devices and manufacturers supply the demand then electrical power and clock requirements tend to increase, however reassessing system architecture can fortunately lead to suitable counter reductions. To maintain low clock rates and therefore reduce electrical power, this paper presents a parallel convolutional coder for the transmit side in many wireless consumer devices. The coder accepts a parallel data input and directly computes punctured convolutional codes without the need for a separate puncturing operation while the coded bits are available at the output of the coder in a parallel fashion. Also as the computation is in parallel then the coder can be clocked at 7 times slower than the conventional shift-register based convolutional coder (using DVB 7/8 rate). The presented coder is directly relevant to the design of modern low-power consumer device
Recommended from our members
âYou couldnât finish the job without breaking the rulesâ: common sense safety on a large construction project
Temporal variation in abundance and diversity of butterflies in Bornean rain forests: opposite impacts of logging recorded in different seasons
We used traps baited with fruit to examine how the temporal variation of butterflies within primary forest in Sabah, Borneo differed between species. In addition, we compared patterns of temporal variation in primary and selectively logged forest, and we tested the hypothesis that selective logging has different recorded impacts on species diversity of adults during the wet monsoon period and the drier remaining half of the year. Species of Satyrinae and Morphinae had significantly less-restricted flight periods than did species of Nymphalinae and Charaxinae, which were sampled mainly during the drier season. especially in primary forest. Species diversity of adults was significantly higher during the drier season in primary forest, but did not differ between seasons in logged forest. As a consequence, logging had opposite recorded impacts on diversity during wetter and drier seasons: primary forest had significantly higher diversity than logged forest during the drier season but significantly lower diversity than logged forest during the wetter monsoon season. The results of this study have important implications for the assessment of biodiversity in tropical rain forests, particularly in relation to habitat disturbance: short-term assessments that do not take account of seasonal variation in abundance are likely to produce misleading results, even in regions where the seasonal variation in rainfall is not that great
Recommended from our members
Efficient biometric and password based mutual authentication for consumer USB mass storage devices
A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security
Recommended from our members
Enhanced three-factor security protocol for consumer USB mass storage devices
The Universal Serial Bus (USB) is an extremely popular interface standard for computer peripheral connections and is widely used in consumer Mass Storage Devices (MSDs). While current consumer USB MSDs provide relatively high transmission speed and are convenient to carry, the use of USB MSDs has been prohibited in many commercial and everyday environments primarily due to security concerns. Security protocols have been previously proposed and a recent approach for the USB MSDs is to utilize multi-factor authentication. This paper proposes significant enhancements to the three-factor control protocol that now makes it secure under many types of attacks including the password guessing attack, the denial-of-service attack, and the replay attack. The proposed solution is presented with a rigorous security analysis and practical computational cost analysis to demonstrate the usefulness of this new security protocol for consumer USB MSDs
Recommended from our members
Wireless capsule gastrointestinal endoscopy: direction of arrival estimation based localization survey
One of the significant challenges in Capsule Endoscopy (CE) is to precisely determine the pathologies location. The localization process is primarily estimated using the received signal strength from sensors in the capsule system through its movement in the gastrointestinal (GI) tract. Consequently, the wireless capsule endoscope (WCE) system requires improvement to handle the lack of the capsule instantaneous localization information and to solve the relatively low transmission data rate challenges. Furthermore, the association between the capsuleâs transmitter position, capsule location, signal reduction and the capsule direction should be assessed. These measurements deliver significant information for the instantaneous capsule localization systems based on TOA (time of arrival) approach, PDOA (phase difference of arrival), RSS (received signal strength), electromagnetic, DOA (direction of arrival) and video tracking approaches are developed to locate the WCE precisely. The current article introduces the acquisition concept of the GI medical images using the endoscopy with a comprehensive description of the endoscopy system components. Capsule localization and tracking are considered to be the most important features of the WCE system, thus the current article emphasizes the most common localization systems generally, highlighting the DOA-based localization systems and discusses the required significant research challenges to be addressed
The mathematical modelling of cell kinetics in corneal epithelial wound healing
This paper considers the comparison of experimental spatial and temporal data of mitotic rates measured during corneal epithelial wound healing (CEWH) of a rat model with the predictions of a computer modelling framework. We begin by briefly showing that previous models, used in the study of corneal epithelial wound healing speeds, are inadequate for the study of cell kinetics. We proceed to formulate a new modelling framework more suited to such a study. This framework is simulated in its simplest form, and the results from this motivate a new realisation of the modelling framework, including a caricature of age structuring. Finally, a model with a simple representation of juxtacrine signalling is considered. The final model captures many, though not all, of the trends of the experimental data. This paper thus lays a foundation for the modelling of the cell kinetics of corneal epithelial wound healing, and yields valuable insight regarding the important mechanisms a model should consider in order to reproduce the observed experimental trends
Recommended from our members
A software agent enabled biometric security algorithm for secure file access in consumer storage devices
In order to resist unauthorized access, consumer storage devices are typically protected using a low entropy password. However, storage devices are not fully protected against an adversary because the adversary can utilize an off-line dictionary attack to find the correct password and/or run an existing algorithm for resetting the existing password. In addition, a password protected device may also be stolen or misplaced allowing an adversary to easily retrieve all the stored confidential information from a removable storage device. In order to protect the consumerâs confidential information that has been stored, this paper proposes a mutual authentication and key negotiation protocol that can be used to protect the confidential information in the device. The functionality of the protocol enables the storage device to be secure against relevant security attacks. A formal security analysis using Burrows-Abadi-Needham (BAN) logic is presented to verify the presented algorithm. In addition, a performance analysis of the proposed protocol reveals a significantly reduced communication overhead compared to the relevant literature
Recommended from our members
Developing residential wireless sensor networks for ECG healthcare monitoring
Wireless technology development has increased rapidly due to itâs convenience and cost effectiveness compared to wired applications, particularly considering the advantages offered by Wireless Sensor Network (WSN) based applications. Such applications exist in several domains including healthcare, medical, industrial and home automation. In the present study, a home-based wireless ECG monitoring system using Zigbee technology is considered. Such systems can be useful for monitoring people in their own home as well as for periodic monitoring by physicians for appropriate healthcare, allowing people to live in their home for longer. Health monitoring systems can continuously monitor many physiological signals and offer further analysis and interpretation. The characteristics and drawbacks of these systems may affect the wearerâs mobility during monitoring the vital signs. Real-time monitoring systems record, measure, and monitor the heart electrical activity while maintaining the consumerâs comfort. Zigbee devices can offer low-power, small size, and a low-cost suitable solution for monitoring the ECG signal in the home, but such systems are often designed in isolation, with no consideration of existing home control networks and smart home solutions. The present study offers a state of the art review and then introduces the main concepts and contents of the wireless ECG monitoring systems. In addition, models of the ECG signal and the power consumption formulas are highlighted. Challenges and future perspectives are also reported. The paper concludes that such mass-market health monitoring systems will only be prevalent when implemented together with home environmental monitoring and control systems
- âŠ