1,055 research outputs found

    Interview with Kevin Scharp

    Get PDF

    Joint Design of Overlaid Communication Systems and Pulsed Radars

    Full text link
    The focus of this paper is on co-existence between a communication system and a pulsed radar sharing the same bandwidth. Based on the fact that the interference generated by the radar onto the communication receiver is intermittent and depends on the density of scattering objects (such as, e.g., targets), we first show that the communication system is equivalent to a set of independent parallel channels, whereby pre-coding on each channel can be introduced as a new degree of freedom. We introduce a new figure of merit, named the {\em compound rate}, which is a convex combination of rates with and without interference, to be optimized under constraints concerning the signal-to-interference-plus-noise ratio (including {\em signal-dependent} interference due to clutter) experienced by the radar and obviously the powers emitted by the two systems: the degrees of freedom are the radar waveform and the afore-mentioned encoding matrix for the communication symbols. We provide closed-form solutions for the optimum transmit policies for both systems under two basic models for the scattering produced by the radar onto the communication receiver, and account for possible correlation of the signal-independent fraction of the interference impinging on the radar. We also discuss the region of the achievable communication rates with and without interference. A thorough performance assessment shows the potentials and the limitations of the proposed co-existing architecture

    Editorial Letter

    Get PDF

    A high throughput Intrusion Detection System (IDS) to enhance the security of data transmission among research centers

    Full text link
    Data breaches and cyberattacks represent a severe problem in higher education institutions and universities that can result in illegal access to sensitive information and data loss. To enhance the security of data transmission, Intrusion Prevention Systems (IPS, i.e., firewalls) and Intrusion Detection Systems (IDS, i.e., packet sniffers) are used to detect potential threats in the exchanged data. IPSs and IDSs are usually designed as software programs running on a server machine. However, when the speed of exchanged data is too high, this solution can become unreliable. In this case, IPSs and IDSs designed on a real hardware platform, such as ASICs and FPGAs, represent a more reliable solution. This paper presents a packet sniffer that was designed using a commercial FPGA development board. The system can support a data throughput of 10 Gbit/s with preliminary results showing that the speed of data transmission can be reliably extended to 100 Gbit/s. The designed system is highly configurable by the user and can enhance the data protection of information transmitted using the Ethernet protocol. It is particularly suited for the security of universities and research centers, where point-to-point network connections are dominant and large amount of sensitive data are shared among different hosts.Comment: 10 pages, 10 figures, 16th Topical Seminar on Innovative Particle and Radiation Detectors (IPRD23), 25-29 September 2023, Siena, Ital

    Explicit recognition of emotional facial expressions is shaped by expertise: evidence from professional actors

    Get PDF
    Can reading others' emotional states be shaped by expertise? We assessed processing of emotional facial expressions in professional actors trained either to voluntary activate mimicry to reproduce character's emotions (as foreseen by the “Mimic Method”), or to infer others' inner states from reading the emotional context (as foreseen by “Stanislavski Method”). In explicit recognition of facial expressions (Experiment 1), the two experimental groups differed from each other and from a control group with no acting experience: the Mimic group was more accurate, whereas the Stanislavski group was slower. Neither acting experience, instead, influenced implicit processing of emotional faces (Experiment 2). We argue that expertise can selectively influence explicit recognition of others' facial expressions, depending on the kind of “emotional expertise”

    Joint Design of surveillance radar and MIMO communication in cluttered environments

    Full text link
    In this study, we consider a spectrum sharing architecture, wherein a multiple-input multiple-output communication system cooperatively coexists with a surveillance radar. The degrees of freedom for system design are the transmit powers of both systems, the receive linear filters used for pulse compression and interference mitigation at the radar receiver, and the space-time communication codebook. The design criterion is the maximization of the mutual information between the input and output symbols of the communication system, subject to constraints aimed at safeguarding the radar performance. Unlike previous studies, we do not require any time-synchronization between the two systems, and we guarantee the radar performance on all of the range-azimuth cells of the patrolled region under signal-dependent (endogenous) and signal-independent (exogenous) interference. This leads to a non-convex problem, and an approximate solution is thus introduced using a block coordinate ascent method. A thorough analysis is provided to show the merits of the proposed approach and emphasize the inherent tradeoff among the achievable mutual information, the density of scatterers in the environment, and the number of protected radar cells.Comment: Submitted to IEEE Transaction on Signal Processing on June 24, 201
    • …
    corecore