443 results on '"Scrambler"'
Search Results
2. Data Protection Using Scrambling Technique
- Author
-
Madhuri, Pothuka, Prabhu, E., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Smys, S., editor, Kamel, Khaled A., editor, and Palanisamy, Ram, editor
- Published
- 2023
- Full Text
- View/download PDF
3. NAND Flash Memory Devices Security Enhancement Based on Physical Unclonable Functions
- Author
-
Zalivaka, Siarhei S., Ivaniuk, Alexander A., and Iranmanesh, Ali, editor
- Published
- 2023
- Full Text
- View/download PDF
4. Digital Modulations Digital modulations
- Author
-
Yang, Sung-Moon Michael and Yang, Sung-Moon Michael
- Published
- 2020
- Full Text
- View/download PDF
5. Digital Modulations
- Author
-
Michael Yang, Sung-Moon and Michael Yang, Sung-Moon
- Published
- 2019
- Full Text
- View/download PDF
6. On the Estimation of Synchronous Scramblers in Direct Sequence Spread Spectrum Systems
- Author
-
Dongyeong Kim, Junghwan Song, and Dongweon Yoon
- Subjects
Linear feedback shift register ,spread spectrum ,scrambler ,estimation ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In a non-cooperative context, the receiver has no information about communication parameters; therefore, it must perform communication forensics, which is the process of identifying what information it can from the collected data. This paper proposes a novel method for parameter estimation of synchronous scramblers in direct sequence spread spectrum systems. For the estimation, we use the bitwise relations inherent in the scrambling sequence and the repetitive patterns by the spreading code inherent in the scrambled sequence. Regarding computational complexity, previous studies of parameter estimation of synchronous scramblers require exponential computational complexities. Unlike the existing methods, our proposed method can practically estimate the feedback polynomial and initial state of the synchronous scrambler with polynomial computational complexity.
- Published
- 2020
- Full Text
- View/download PDF
7. Digitale Übertragung im Basisband
- Author
-
Werner, Martin and Werner, Martin
- Published
- 2017
- Full Text
- View/download PDF
8. Scrambler therapy for chemotherapy neuropathy: a randomized phase II pilot trial.
- Author
-
Loprinzi, Charles, Le-Rademacher, Jennifer G., Majithia, Neil, McMurray, Ryan P., O'Neill, Carrie R., Bendel, Markus A., Beutler, Andreas, Lachance, Daniel H., Cheville, Andrea, Strick, David M., Black, David F., Tilburt, Jon C., and Smith, Thomas J.
- Subjects
- *
TRANSCUTANEOUS electrical nerve stimulation , *NEUROPATHY , *PERIPHERAL neuropathy , *TREATMENT of peripheral neuropathy , *PAIN management , *PILOT projects , *ANTINEOPLASTIC agents , *TRANSDERMAL medication , *DRUG administration , *RANDOMIZED controlled trials , *QUALITY of life , *QUESTIONNAIRES , *TUMORS , *STATISTICAL sampling - Abstract
Introduction: Chemotherapy-induced peripheral neuropathy (CIPN) is a prominent clinical problem, with limited effective therapies. Preliminary non-randomized clinical trial data support that Scrambler Therapy is helpful in this situation.Methods: Patients were eligible if they had CIPN symptoms for at least 3 months and CIPN-related tingling or pain at least 4/10 in severity during the week prior to registration. They were randomized to receive Scrambler Therapy versus transcutaneous electrical nerve stimulation (TENS) for 2 weeks. Patient-reported outcomes (PROs) were utilized to measure efficacy and toxicity daily for 2 weeks during therapy and then weekly for 8 additional weeks.Results: This study accrued 50 patients, 25 to each of the 2 study arms; 46 patients were evaluable. There were twice as many Scrambler-treated patients who had at least a 50% documented improvement during the 2 treatment weeks, from their baseline pain, tingling, and numbness scores, when compared with the TENS-treated patients (from 36 to 56% compared with 16-28% for each symptom). Global Impression of Change scores for "neuropathy symptoms," pain, and quality of life were similarly improved during the treatment weeks. Patients in the Scrambler group were more likely than those in the TENS group to recommend their treatment to other patients, during both the 2-week treatment period and the 8-week follow-up period (p < 0.0001). Minimal toxicity was observed.Conclusions: The results from this pilot trial were positive, supporting the conduct of further investigations regarding the use of Scrambler Therapy for treating CIPN. [ABSTRACT FROM AUTHOR]- Published
- 2020
- Full Text
- View/download PDF
9. Linear Scrambler Identification
- Author
-
A. S. Krivonogov and E. O. Krivonogova
- Subjects
scrambler ,identification ,radiomonitoring ,pseudorandom sequence ,Electronics ,TK7800-8360 - Abstract
The article describes algorithm that allows determining scrambler type based on the signal from its output. The task of this kind is relevant for radio monitoring systems and when creating cognitive systems for digital signal receiving and processing. The identification algorithm determines the form of the scrambler both multiplicative and additive. There are no published papers providing algorithm for automatic determination of scrambler type. This article is intended to partly fill the gap. It provides a form al statement of the problem, an identification algorithm and simulation results.
- Published
- 2017
10. Scrambler Therapy for Neuromyelitis Optica Pain Treatment.
- Author
-
AHC MEDIA
- Subjects
- *
PAIN management , *NEURALGIA , *TRANSCUTANEOUS electrical nerve stimulation , *NEUROMYELITIS optica , *DISEASE complications - Abstract
Scrambler therapy appears to significantly reduce central neuropathic pain for patients with neuromyelitis optica spectrum disorder, although pain reduction is not shown to be sustained for more than 30 days after treatment. [ABSTRACT FROM AUTHOR]
- Published
- 2020
11. OTG Module for High Speed Transmission
- Author
-
Sundaram, C. Kalyana and Guru, R. Pavithra
- Published
- 2016
- Full Text
- View/download PDF
12. The Implementation of the Parallel Scrambler Scheme for the IEEE 802.11 Standard
- Author
-
Alexey Kudinov, Yaroslav Antimirov, Igor Tyshchenko, Mariia Popova, and Alexander Cherepanov
- Subjects
scrambler ,sequential circuit ,parallel circuit ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 ,Telecommunication ,TK5101-6720 - Published
- 2018
- Full Text
- View/download PDF
13. The Use of Scrambler Therapy in Treating Chronic Pain Syndromes: A Systematic Review.
- Author
-
Karri J, Marathe A, Smith TJ, and Wang EJ
- Subjects
- Humans, Retrospective Studies, Analgesics therapeutic use, Randomized Controlled Trials as Topic, Observational Studies as Topic, Chronic Pain drug therapy, Neuralgia therapy, Antineoplastic Agents
- Abstract
Background: Scrambler therapy (ST) is a noninvasive method of transcutaneous neuromodulation that has 510(K) clearance from the United States Food and Drug Administration for treating acute pain, postoperative pain, and intractable chronic pain. Since its inception, ST has been used to treat many chronic pain syndromes in a variety of patient populations. We synthesized the available literature for ST to delineate its overall evidence basis., Materials and Methods: We performed a systematic review based on conventional Preferred Reporting Items for Systematic Reviews and Meta-Analyses methods by surveying multiple data sources from January 1950 through October 2021. Two review authors, independently and in a standardized, unblinded fashion, conducted a systematic review to identify relevant studies and extract the necessary outcome measures. A conservative search strategy was implemented to identify all ST studies for the treatment of chronic pain syndromes. Primary outcome parameters collected were analgesic benefit, adverse effects, and other metrics such as sensorimotor testing., Results: A total of 21 studies met the final criteria for study inclusion and comprised randomized controlled trials (n = 8), prospective observational studies (n = 10), and retrospective cohort studies (n = 3). Nearly all the reported studies explored the use of ST for the treatment of neuropathic pain, with chemotherapy-induced peripheral neuropathy being the most studied condition. Most studies were limited by small cohorts but reported ST being safe, well tolerated, and providing clinically meaningful pain reduction. The duration of posttreatment follow-up ranged from ten to 14 days (concordant with completion of typical ST protocols) to three months. Secondary benefits such as medication reduction and improvement of sensory and motor symptoms were noted by some studies., Conclusions: ST is regarded as a safe intervention with potential for significant analgesic benefit for neuropathic pain conditions. Although the available evidence is most robust for treating chemotherapy-induced peripheral neuropathy, ST has also been shown to be effective in treating other neuropathic pain syndromes. Evidence for ST use in nociceptive pain conditions is limited but appears promising. The favorable safety profile and increasing evidence basis for ST warrant more extensive recognition and consideration for use in clinical care., (Copyright © 2022 International Neuromodulation Society. Published by Elsevier Inc. All rights reserved.)
- Published
- 2023
- Full Text
- View/download PDF
14. 线性扰码重建算法性能分析.
- Author
-
钟兆根, 孙雪丽, and 马 钰
- Abstract
Copyright of Systems Engineering & Electronics is the property of Journal of Systems Engineering & Electronics Editorial Department and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
15. A Method for Blind Identification of a Scrambler Based on Matrix Analysis.
- Author
-
Han, Shunan and Zhang, Min
- Abstract
Existing methods for identifying a scrambler placed after a convolutional encoder require prior knowledge about the encoding type and a dual word of the convolutional code. To overcome these limitations, we propose here a method for blind identification of a scrambler based on matrix analysis. The rank behaviors of self-synchronously and synchronously scrambled convolutional code bit matrices are first analyzed theoretically. Based on their rank deficient characteristics, preliminary identification of the encoding type of a received sequence can then take place. After this, by using the bases in the null space of the received bit matrix, the feedback polynomial of the scrambler can be reconstructed. Furthermore, according to the rank behavior of the descrambled sequence, the type of the scrambler can be determined. This method can thus arrive at the blind identification of a scrambler without any prior knowledge. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
16. Development of Brain Balancing System for Left and Right Hemispheres
- Author
-
Kok Swee Sim, Zheng You Lim, Shing Chiang Tan, and Karen Chua
- Subjects
Left and right ,Computer science ,Mnemonic ,Arithmetic ,Lateralization of brain function ,Word (computer architecture) ,Balance (ability) ,Scrambler ,Stroop effect ,Color code - Abstract
This paper presents the design of Mini Brain Games (MBGs) to improve either the left or right hemisphere of the brain. The MBG includes spot the difference, piano, block view, word building, word scrambler, sudoku, left hand control, memory card, flash card, crossword, math logic and mnemonics technique used for the order of operations in algebra, the planets in solar system, and resistor color code. Stroop test and brain dominance test are used to measure the level of balance between the two hemispheres of the brain before and after the exercise program. The mini brain games designed in the Brain Balancing System Windows Application are shown to improve the balance between the left and right hemisphere of the brain. The results show that the mini brain games are indeed able to assist in the left or right brain development. The largest improvement achieved is that the percentage of dominance between the two brain hemispheres is reduced by 18.18%. The smallest improvement achieved was that the difference between the two brain hemispheres was reduced by 9.08%.
- Published
- 2021
- Full Text
- View/download PDF
17. SCRAMBLER: A Tool for De Novo CRISPR Array Reconstruction and Its Application for Analysis of the Structure of Prokaryotic Populations
- Author
-
Anton Rykachevsky, Konstantin Severinov, Mark Dobrovolski, Alexander Stepakov, Sofia Medvedeva, Ekaterina Savitskaya, Polina Muzyukina, and Evgeny Burnaev
- Subjects
Extant taxon ,Sequencing data ,Genetics ,CRISPR ,Computational biology ,Recall rate ,Biology ,Genome ,CRISPR Arrays ,Biotechnology ,Scrambler - Abstract
CRISPR arrays are prokaryotic genomic loci consisting of repeat sequences alternating with unique spacers acquired from foreign nucleic acids. As one of the fastest-evolving parts of the genome, CRISPR arrays can be used to differentiate closely related prokaryotic lineages and track individual strains in prokaryotic communities. However, the assembly of full-length CRISPR arrays sequences remains a problem. Here, we developed SCRAMBLER, a tool that includes several pipelines for assembling CRISPR arrays from high-throughput short-read sequencing data. We assessed its performance with model data sets (Escherichia coli strains containing different CRISPR arrays and imitating prokaryotic communities of different complexities) and intestinal microbiomes of extant and extinct pachyderms. Evaluation of SCRAMBLER's performance using model data sets demonstrated its ability to assemble CRISPR arrays correctly from reads containing pairs of spacers, yielding a precision rate of >80% and a recall rate of 60-85% when checked against ground-truth data. Likewise, SCRAMBLER successfully assembled CRISPR arrays from the environmental samples, as attested by their matching with database entries. SCRAMBLER, an open-source software (github.com/biolab-tools/SCRAMBLER), can facilitate analysis of the composition and dynamics of CRISPR arrays in complex communities.
- Published
- 2021
- Full Text
- View/download PDF
18. Improve The Security of The Vigenère Cypher Algorithm by Modifying the Encoding Table and Key
- Author
-
Agung Purnomo Sidik
- Subjects
Vigenère cipher ,Blum Blum Shub ,law ,Computer science ,Encoding (memory) ,Ciphertext ,Contrast (statistics) ,Table (database) ,Cryptanalysis ,Algorithm ,law.invention ,Scrambler - Abstract
This investigation was conducted to move forward the security of the vigenère cypher calculation by tending to the key conveyance issue and the most key issue within the calculation if cryptoanalysts effectively got it. The working demonstrates employments a 512-bit Electronic Code Book (ECB). The essential key utilized was a 512-bit arbitrary key. The randomized encoding table was also generated by the Blum Blum Shub calculation employing a scrambler key. The RSA calculation was utilized to scramble 512-bits random keys and scrambler keys. It comes about to appear that the proposed calculation does not include a key dissemination issue. With a randomized encoding table, the 512-bits arbitrary key cannot be utilized to unscramble the ciphertext off chance that cryptanalysis did not know the mixed table utilized. The preparing time appeared the proportion of the contrast of the vigenère cypher calculation. The proposed calculation was not as well essentially distinctive, and the longer the message was handled, the proportion of the time distinction possessed was moreover getting closer to one, which implies the distinction was not critical. The coming about ciphertext was too exceptionally secure, where the coming about ciphertext was irregular since the key utilized was random, and there were 3.75 x 10126 keys combination. This algorithm can be an alternative algorithm that is fast, safe, and easy to implement
- Published
- 2021
- Full Text
- View/download PDF
19. Multi-Dimensional, Wide-Range, and Modulation-Format-Transparent Transceiver Imbalance Monitoring
- Author
-
Qun Zhang, Chao Lu, Chao Gu, Alan Pak Tao Lau, Yong Yao, and Yanfu Yang
- Subjects
Signal processing ,Computer science ,business.industry ,Transmitter ,Optical polarization ,02 engineering and technology ,Atomic and Molecular Physics, and Optics ,Scrambler ,QAM ,020210 optoelectronics & photonics ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Frequency offset ,Transceiver ,business ,Digital signal processing - Abstract
We propose and experimentally demonstrate a dual-polarization (DP) transceiver imbalance monitoring scheme, which is applicable for the coherent system using square QAM signals. The scheme can separate/monitor various kinds of transceiver imbalances and has technical advantages of multi-dimension, wide monitoring range, and modulation-format-transparency. In the proposed scheme, a polarization scrambler is configured between transmitter (Tx) and receiver (Rx). After coherent detection, the proposed digital signal processing (DSP) modules are implemented to monitor transceiver imbalance based on the received signals. To simplify the DSP modules, the implementation sequence of DSP modules is in reverse order compared to the order in which the sequence of impairments is introduced. Firstly, Godard timing error detection (TED) and Gram–Schmidt orthogonalization procedure (GSOP) is used to monitor and compensate Rx imbalances. After compensating the Rx imbalances, Tx imbalance monitoring is implemented. Complex/real maximum likelihood independent component analysis (ML-ICA) and Godard-TED are used to monitor Tx imbalance. Finally, the amplitude ratios of the final output signal and Tx in-phase/quadrature (IQ) amplitude imbalance are fed back to mitigate the interaction of Tx imbalances on the signal power and improve monitoring accuracy. The transceiver IQ and x-polarization/y-polarization (XY) imbalances are separated for the first time by using the frequency offset (FO) naturally existing in the system and the continuous polarization rotation induced by a polarization scrambler. The separation method combined with the reverse algorithm design and amplitude ratio feedback mechanism makes the proposed scheme achieve the most multi-dimensional imbalance monitoring by far. The simulation and experimental results verify that the proposed scheme is modulation-format-transparent and can separate/monitor multi-dimensional transceiver imbalances within a wide range.
- Published
- 2021
- Full Text
- View/download PDF
20. 284.8-Mb/s Physical-Layer Cryptographic Key Generation and Distribution in Fiber Networks
- Author
-
Weisheng Hu, Xuelin Yang, Adnan A. E. Hajomer, and Liuming Zhang
- Subjects
Key generation ,Computer science ,business.industry ,Key distribution ,Optical polarization ,02 engineering and technology ,Quantum key distribution ,Atomic and Molecular Physics, and Optics ,Scrambler ,020210 optoelectronics & photonics ,Secure communication ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Key (cryptography) ,business ,Computer Science::Cryptography and Security ,Data transmission - Abstract
Key distribution is a major challenge of secure communication. Computational approaches to key distribution are breached by quantum algorithms, while quantum key distribution (QKD) is an expensive, slow, and sophisticated solution. Secure key generation and distribution from unpredictable and inherent physical-layer properties of optical fiber channel is a classical, simple and cost-effective solution. However, the quasi-static nature of fiber channels dramatically limits the available key generation rate (KGR) to the order of ∼kbit/s. Here we effectively accelerate the KGR by six orders of magnitude using a developed high-speed chaotic polarization scrambler (CPS) driven by digital chaos in fiber channels. An error-free KGR of 284.8 Mbit/s is experimentally demonstrated over a 24 km standard single-mode fiber (SSMF), where the generated key passes the random test suite. Moreover, we fully analyze the security mechanism and find that a strong asymmetry exists between legal and illegal users, ensuring a high-level of security against potential fiber-tapping attacks. This scheme provides a major step towards the practical implementation of the “one-time-pad” in secure data transmission over fiber networks.
- Published
- 2021
- Full Text
- View/download PDF
21. 2.7 Gb/s Secure Key Generation and Distribution Using Bidirectional Polarization Scrambler in Fiber
- Author
-
Weisheng Hu, Adnan A. E. Hajomer, Xuelin Yang, and Liuming Zhang
- Subjects
Physics ,Key generation ,business.industry ,Bandwidth (signal processing) ,Single-mode optical fiber ,Physics::Optics ,Optical polarization ,02 engineering and technology ,Encryption ,Topology ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,Scrambler ,Fibre Channel ,020210 optoelectronics & photonics ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Electrical and Electronic Engineering ,business - Abstract
A physical-layer secure key generation and distribution (SKGD) scheme in classical fiber channel is proposed and demonstrated using a bidirectional wide-band polarization scrambler (WBPS), to alter rapidly and symmetrically the state of polarization (SOP) for the two counter-propagating optical signals in fiber. Due to the optical channel reciprocity, highly-consistent key bits can be extracted from the correlated SOP fluctuations, while the key secrecy is ensured by the fiber channel uniqueness. A final key generation rate (KGR) of 2.7 Gb/s is demonstrated over 10 km single mode fiber (SMF), where error-free and true randomness of the generated key are achieved after post-processing. The obtained KGR at Gb/s makes a further step towards the implementation of one-time-pad data encryption with perfect secrecy in fiber networks.
- Published
- 2021
- Full Text
- View/download PDF
22. On the Image Encryption Algorithm Based on the Chaotic System, DNA Encoding, and Castle
- Author
-
Muhammad Hanif, Muhammad Adnan Khan, Rizwan Ali Naqvi, Dildar Hussain, Sagheer Abbas, Muhammad Atif, and Nadeem Iqbal
- Subjects
General Computer Science ,Computer science ,chess ,decryption ,chaotic system ,DNA encoding ,Hash function ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Encryption ,law.invention ,Scrambler ,law ,DNA computing ,Castle ,General Materials Science ,Computer vision ,encryption ,Pixel ,business.industry ,General Engineering ,Plaintext ,TK1-9971 ,Cipher ,Electrical engineering. Electronics. Nuclear engineering ,Artificial intelligence ,Cryptanalysis ,business - Abstract
Hundreds of image encryption algorithms have been developed for the security and integrity of images through the combination of DNA computing and chaotic maps. This combination of the two instruments is not sufficient enough to thwart the potential threats from the cryptanalysis community as the literature review suggests. To inject more robustness and security stuff, a novel image encryption scheme has been written in this research by fusing the chaotic system, DNA computing and Castle—a chess piece. As the plain image is input, its pixels are shifted to the scrambled image at the randomly chosen pixel addresses. This scrambling has been realized through the routine called Image Scrambler using Castle (ISUC). Castle randomly moves on the hypothetical large chessboard. Pixels taken from the plain image are shifted to the addresses of the scrambled image, where Castle lands in each iteration. After the plain image is scrambled, it is DNA encoded. Two mask images are also DNA encoded. Then to throw the diffusion effects in the cipher, DNA Addition and DNA XOR operations between the DNA encoded pixels data and the DNA encoded mask images have been conducted. Next, the pixels data are converted back into their decimal equivalents. Four dimensional chaotic system has been used to get the chaotic vectors. The hash codes given by the SHA-256 function have been used in the cipher to introduce the plaintext sensitivity in its design. We got an information entropy of 7.9974. Simulation carried out through the machine, and the thorough security analyses demonstrate the good security effects, defiance to the varied attacks from the cryptanalysis community, and the bright prospects for some real world application of the proposed image cipher.
- Published
- 2021
- Full Text
- View/download PDF
23. Blind Estimation of Self-Synchronous Scrambler in DSSS Systems
- Author
-
Dongyeong Kim and Dongweon Yoon
- Subjects
Polynomial ,General Computer Science ,Computational complexity theory ,Computer science ,linear feedback shift register ,0211 other engineering and technologies ,02 engineering and technology ,Direct-sequence spread spectrum ,Scrambler ,Scrambling ,0202 electrical engineering, electronic engineering, information engineering ,Code (cryptography) ,Communication forensic ,General Materials Science ,Electrical and Electronic Engineering ,021110 strategic, defence & security studies ,Sequence ,estimation ,self-synchronous scrambler ,General Engineering ,020206 networking & telecommunications ,TK1-9971 ,Spread spectrum ,spread spectrum ,Electrical engineering. Electronics. Nuclear engineering ,Algorithm - Abstract
Self-synchronous scramblers are more difficult to blindly estimate than synchronous scramblers because their input sequence affects the state of the scrambler’s linear feedback shift register. There has been much research on the estimation of synchronous scramblers and relatively little on the estimation of self-synchronous scramblers. For non-cooperative contexts, this paper proposes a method for the estimation of a self-synchronous scrambler in direct sequence spread spectrum systems. We blindly estimate the self-synchronous scrambling parameter, the feedback polynomial, using the repeated patterns by a spreading code, the linearity between the bits in a scrambling sequence, and the coidentity of the self-synchronous scrambled sequence and the linear feedback shift register states. To validate the proposed method, we show the estimation performance in terms of the computational complexity, required minimum scrambled sequence length, execution time, and detection probability.
- Published
- 2021
24. Wideband and Low-Loss Mode Scrambler for Few-Mode Fibers Based on Distributed Multiple Point-Loads
- Author
-
Yaping Liu, Lin Zhang, David J. Richardson, Yongmin Jung, and Zhiqun Yang
- Subjects
Mode scrambler ,Materials science ,Optical fiber ,business.industry ,Mode (statistics) ,QC350-467 ,Optics. Light ,Multiplexing ,Atomic and Molecular Physics, and Optics ,Scrambler ,law.invention ,TA1501-1820 ,Optics ,few mode fiber ,law ,Mode coupling ,Insertion loss ,Applied optics. Photonics ,mode division multiplexing ,Electrical and Electronic Engineering ,Wideband ,business - Abstract
We propose a new type of all-fiber mode scrambler for mode division multiplexed data transmission based on few mode fibers. By randomly placing multiple point-loads along the fiber length, low loss and wideband mode coupling is obtained amongst all the guided modes. The effect of mode coupling is simulated from a single point-load to multiple point-loads with a specific focus on the insertion loss and wavelength dependence. In an exemplar experimental demonstration we present a mode scrambler for step-index two mode fibers incorporating 150 randomly located point-loads. Uniform mode coupling is achieved over the C band with an insertion loss of less than 1 dB.
- Published
- 2021
25. Field programmable gate array (FPGA) implementation of novel complex PN-code-generator- based data scrambler and descrambler
- Author
-
Shabir A. Parah
- Subjects
complex code generator ,VHDL ,FPGA ,scrambler ,descrambler ,Technology ,Technology (General) ,T1-995 ,Science ,Science (General) ,Q1-390 - Abstract
A novel technique for the generation of complex and lengthy code sequences using low- length linear feedback shift registers (LFSRs) for data scrambling and descrambling is proposed. The scheme has been implemented using VHSIC hardware description language (VHDL) approach which allows the reconfigurability of the proposed system such that the length of the generated sequences can be changed as per the security requirements. In the present design consideration the power consumption and chip area requirements are small and the operating speed is high compared to conventional discrete I.C. design, which is a pre-requisite for any system designer. The design has been synthesised on device EP2S15F484C3 of Straitx II FPGA family, using Quarts Altera version 8.1. The simulation results have been found satisfactory and are in conformity with the theoretical observations.
- Published
- 2010
26. 扰码器初始参数盲重建算法.
- Author
-
马 钰, 张立民, and 王好同
- Abstract
Copyright of Journal of Signal Processing is the property of Journal of Signal Processing and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2016
- Full Text
- View/download PDF
27. An Image Encryption Scheme Based on DNA Computing and Multiple Chaotic Systems
- Author
-
Muhammad Samiullah, Humaira Afzal, M. Ikramullah Lali, Basit Shahzad, Hira Nazir, Muhammad Rafiq Mufti, and Waqar Aslam
- Subjects
chaotic generator ,DNA sequence based linear feedback shift register ,General Computer Science ,Computer science ,Bit scrambling ,secure hash algorithm ,DNA encoding ,Cryptography ,02 engineering and technology ,Encryption ,Scrambler ,Computer Science::Multimedia ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Computer Science::Cryptography and Security ,Secure Hash Algorithm ,business.industry ,General Engineering ,020207 software engineering ,Plaintext ,Symmetric-key algorithm ,Cipher ,Key (cryptography) ,hypechaos ,020201 artificial intelligence & image processing ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,Algorithm ,lcsh:TK1-9971 - Abstract
A number of techniques for securing plaintext, images and video frames have been developed in cryptography using jointly DNA computing and Chaos Theory. With the advancement of DNA/quantum computing, the threats of security breaches to information have an increasing possibility. In this paper, we propose a symmetric encryption algorithm for color images by extending the current encryption/decryption techniques. Our encryption algorithm is based on three chaotic systems (PWLCM, Lorenz and 4D Lorenz-type), a Secure Hash Algorithm, a scrambler, a chaotic generator and DNA sequence based Linear Feedback Shift Register. We introduce multilevel security to increase the degree of diffusion and confusion. Through experiments, we present security analysis for key irreproducibility and sensitivity, Gray Level Co-occurrence Matrix based analysis, maximum deviation, irregular deviation, entropy, histogram, variance and correlation, number of pixel change rate, unified average cipher intensity, known/chosen-plaintext attacks, mean absolute error, robustness against noises of various types using PSNR and occlusion attacks. It is demonstrated that mostly our proposed encryption algorithm has enhanced performance as compared to contemporary works in information security, while comparable in other cases.
- Published
- 2020
28. Rancang Bangun Aplikasi Face Tracking dan Filter Berdasarkan Raut Wajah Menggunakan Algoritma Fisher-Yates Berbasis iOS
- Author
-
Ni Made Satvika Iswari, Malik Abdul Ghani, and Andre Rusli
- Subjects
Facial expression ,Hedonic motivation ,Software ,business.industry ,Computer science ,Filter (video) ,Speech recognition ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Video processing ,business ,Precision and recall ,Mobile device ,Scrambler - Abstract
Expressions of facial expressions in addition to providing important emotional indicators, are very important objects in our daily lives too. Real-time video processing on mobile devices is a hot topic and has a very broad application. Photos that have used the filter have 21% more possibilities to be seen and 45% more likely to be commented on by photo consumers. The use of the Fisher-Yates algorithm is used as a filter scrambler for each facial expression emotion. The application is made for the iOS operating system with the Swift programming language that utilizes the Core ML and Vision framework. Custom Vision is used as a tool for creating and training models. In making a model, this study uses a dataset from Cohn-Kanade AU-Coded Facial Expression Database and Karolinska Directed Emotional Faces. Custom Vision can provide performance result training and provide precision and recall values for data that has been trained. The facial expression match with the model is determined by the confidence level value. The results of trials with Hedonic Motivation System Adoption Model method produce a percentage of pleasure in using the application (joy) of 79.39% of the users agree that the application provides joy.
- Published
- 2019
- Full Text
- View/download PDF
29. Joint Multi-Beam Training and Codebook Design for Indoor High-Throughput Transmissions Under Limited Training Steps
- Author
-
An-Yeu Andy Wu, Ching-Chun Liao, and Hung-Yi Cheng
- Subjects
Computer engineering ,Computer Networks and Communications ,Computer science ,Automotive Engineering ,Fast Fourier transform ,Codebook ,Aerospace Engineering ,Electrical and Electronic Engineering ,Multiplexing ,Throughput (business) ,Discrete Fourier transform ,Scrambler ,Communication channel - Abstract
Along with the evolution of wireless technologies, users are expected to have high-throughput and low-latency indoor mobile applications, such as augmented reality and virtual reality. Therefore, the use of millimeter-wave for low-latency communications becomes attractive. Under low-latency criteria, a fast multi-link establishment is desired. In this paper, we present a novel concurrent multi-beam training jointly with a proposed multi-beam codebook. First, we propose a progressive multi-beam estimation (PMBE). This algorithm makes multiple coarse beams emerge within a few training steps. Second, we propose a Fast Fourier Transform (FFT)-based codebook which can be considered as a Discrete Fourier Transform based codebook built in a bit-reversal scrambler, thus forming a scattering multi-beam codebook. This FFT-based codebook design is optimally implemented on a sub-connected architecture, a hardware-efficient architecture. For fast multi-link establishment, we design our concurrent multi-beam training by combining the proposed PMBE jointly with the proposed FFT-based codebook, so as to further improve multiplexing gain. Since multiplexing gain can occur immediately, even under strictly-limited training steps, the high data rate can be achieved. Simulation results show that when reaching more than 95% capacity gain of exhaustive channel estimation, our work only spends 1% training steps of the exhaustive case.
- Published
- 2019
- Full Text
- View/download PDF
30. Front End to Back End Speech Scrambler
- Author
-
Taha A. Alsabbagh
- Subjects
Front and back ends ,Secure voice ,Computer science ,business.industry ,Speech coding ,business ,Telecommunications ,Computer hardware ,Scrambler - Published
- 2019
- Full Text
- View/download PDF
31. Gb/s physical-layer secure key generation and distribution in fiber communications
- Author
-
Xuelin Yang, Erich Leitgeb, Liuming Zhang, and Xinran Huang
- Subjects
Key generation ,Materials science ,Distribution (number theory) ,business.industry ,Physical layer ,Optoelectronics ,Fiber ,Polarization (waves) ,business ,Encryption ,Scrambler - Abstract
We present the high-speed physical-layer secure key generation and distribution in fiber networks. A key generation rate of 2.7 Gb/s is achieved over 10 km single-mode fiber using a specifically-designed bidirectional polarization scrambler.
- Published
- 2021
- Full Text
- View/download PDF
32. Deep Learning for Blind Detection of Interleaver and Scrambler
- Author
-
Weizhi Zhang, Chuan Huang, and Boxiao Shen
- Subjects
Noise measurement ,Channel (digital image) ,Artificial neural network ,business.industry ,Computer science ,Gaussian ,Deep learning ,Computer Science::Neural and Evolutionary Computation ,Pattern recognition ,Convolutional neural network ,Scrambler ,symbols.namesake ,Recurrent neural network ,symbols ,Artificial intelligence ,business ,Computer Science::Information Theory - Abstract
This paper considers the blind detection of interleaver and scrambler from the Gaussian noisy channel. Specifically, several architectures of the detectors are proposed based on the convolutional neural network (CNN) and recurrent neural network (RNN). By fully exploiting the neural network (NN) structures, the detectors can recognize the interleaver and scrambler with little prior information and only need several codewords. Finally, extensive experiments demonstrate that the constructed detectors can generalize new samples which are not in the training set.
- Published
- 2021
- Full Text
- View/download PDF
33. Scrambling of data in all-optical domain.
- Author
-
Mehra, Rekha, Janyani, Vijay, and Dixit, H.
- Abstract
This paper introduces a new approach for design of Scrambler in all-optical domain. Scrambler is used in the transmitter section of a communication system to make data random by removing long sequence of 0's and 1's. To obtain original data descrambler is used with the receiver section. Basic design of scrambler is based on shift register and Ex-OR addition. Desired result corresponding to input sequence is verified in time domain at 2.5 Gb/s. Minimum bit error rate achieved is zero and maximum quality factor is 64.4. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
34. Blind Recognition Algorithm for Scrambled Channel Encoder Based on the Features of Signal Matrix and Layered Neural Network
- Author
-
Wang Zhongfang, Wei Dong, and Zhai Liuqun
- Subjects
Signal processing ,Artificial neural network ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Data_CODINGANDINFORMATIONTHEORY ,Convolutional neural network ,Scrambler ,Scrambling ,Bit error rate ,Artificial intelligence ,business ,Encoder ,Communication channel - Abstract
Blind recognition is of great significance in non-cooperative communication research. In practical communication scenarios, multistage signal processing schemes are usually used, including scrambling, coding, modulation, etc. However, most prior researches on blind recognition only focus on the scenario where the single signal processing method is applied, and it is impractical. In this paper, a blind recognition algorithm based on the characteristics of signal matrix and layered neural network for scrambled channel encoder is proposed. First, this method analyzes the difference between the matrix features in different types of scrambled channel encoders and regards it as an important condition for recognition. Then, the convolutional neural network is used to learn the scrambled codes and classify the different encoder types. At last, the layered neural network architecture of channel encoder type recognition is proposed, which can recognize different encoder types by categories. Moreover, it also can resist error code. In this paper, the recognition of 6 channel encoder types is realized with high robustness and adaptability. Simulation results show that the recognition rate of the convolution encoder has reached 95% when the bit error rate is 0.5%, which is better than the traditional channel encoder classification method based on matrix features.
- Published
- 2021
- Full Text
- View/download PDF
35. VLSI implementation of STM-1 Framer and De-Framer.
- Author
-
Sundeep., B.A, Anand., T, and Yellampalli, Siva S
- Abstract
In this paper we present the VLSI implementation of STM-1 Framer and De-Framer. This paper mainly focuses on multiplexing digital data, transmitting and receiving the STM-1 frame. The design is implemented using Verilog HDL, simulated on Modelsim and Synthesized on Xilinx ISE 13.2. For power analysis and area calculation, the designed framer and de-framer are analyzed using Cadence version 6.1.5. The designed framer can be used for generation and analysis of STM-1 frame that has a data rate of 155.52Mbps. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
36. Cycle-efficient lineary feedback shift register implementation on word-based micro-architecture.
- Author
-
Lin, Jui-Chieh, Chen, Sao-Jie, and Hu, Yu Hen
- Abstract
A novel algorithm transformation method, called term-preserving look-ahead transformation (TePLAT) is proposed to transform the bit-serial linear feedback shift register (LFSR) algorithm into a bit-parallel formulation which promises order of magnitudes improvement of execution speed compared to the traditional look-ahead algorithm transformation approach. TePLAT is applied to 26 commonly used LFSRs and tested on two popular word-based micro-processor development platforms: a Texas Instrument C6416 Code Composition Simulator and an ARM-9 Simulator. In all 26 cases, TePLAT transformed implementations consistently deliver much higher throughput than those implementations based on traditional look-ahead algorithm transformation. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
37. Establishment of topographic circuit zones in the cerebellum of scrambler mutant mice
- Author
-
Stacey L Reeber, Courtney A. Loeschel, Amanda eFranklin, and Roy V Sillitoe
- Subjects
Cerebellum ,connectivity ,circuitry ,topography ,positional map ,scrambler ,Neurosciences. Biological psychiatry. Neuropsychiatry ,RC321-571 - Abstract
The cerebellum is organized into zonal circuits that are thought to regulate ongoing motor behavior. Recent studies suggest that neuronal birthdates, gene expression patterning, and apoptosis control zone formation. Importantly, developing Purkinje cell zones are thought to provide the framework upon which afferent circuitry is organized. Yet, it is not clear whether altering the final placement of Purkinje cells affects the assembly of circuits into topographic zones. To gain insight into this problem, we examined zonal connectivity in scrambler mice; spontaneous mutants that have severe Purkinje cell ectopia due to the loss of reelin-disabled1 signaling. We used immunohistochemistry and neural tracing to determine whether displacement of Purkinje cell zones into ectopic positions triggers defects in zonal connectivity within sensory-motor circuits. Despite the abnormal placement of more than 95% of Purkinje cells in scrambler mice, the complementary relationship between molecularly distinct Purkinje cell zones is maintained, and consequently, afferents are targeted into topographic circuits. These data suggest that although loss of disabled1 distorts the Purkinje cell map, its absence does not obstruct the formation of zonal circuits. These findings support the hypothesis that Purkinje cell zones play an essential role in establishing afferent topography.
- Published
- 2013
- Full Text
- View/download PDF
38. N Configuration TRNG based Scrambler Protocol for Secured File Transfer
- Author
-
S. Raghul, Yaddanapudi Akhileswar, and N. Mohankumar
- Subjects
Authentication ,business.industry ,Computer science ,Transfer (computing) ,File transfer ,Data security ,Hamming distance ,Information security ,Data breach ,business ,Scrambler ,Computer network - Abstract
In the modern era where huge amounts of information are being produced every second, still many loopholes are being found in the secured way of transferring data which risks the privacy of IP. Moreover, access to sensitive/confidential IoT sensor Data is vulnerable while transferring. A way to mitigate the issue that may cause serious data breach opportunities in the transferring of information from the IoT Device to a Remote Desktop/user device is being handled in this work. A new system has been described that uses multiple True Random Number Generators(TRNG’s) designed with the help of Fault-tolerant gates to generate OTP as a single-step authentication, which will then be used to transfer the files. Thus TRNG finds an effective application in the avenue of information security. The original IoT Sensor Data/scrambled IoT Sensor Data will be transferred depending upon the authentication. This ensures that only authorized users are accessible to the original data of the sensor values. The hamming distance of the original information file and the scrambled information file has been determined to verify the same and found to around 50%. Likewise, the time taken during original and scrambled file transfer has also been calculated to analyze the effectiveness of the proposal.
- Published
- 2021
- Full Text
- View/download PDF
39. Interpreting neural networks for biological sequences by learning stochastic masks
- Author
-
La Fleur A, Sreeram Kannan, Georg Seelig, David Baker, Zibo Chen, Johannes Linder, and Ajasja Ljubetič
- Subjects
Sequence ,Interpretation (logic) ,Artificial neural network ,Computer Networks and Communications ,business.industry ,Computer science ,Machine learning ,computer.software_genre ,Article ,Scrambler ,Human-Computer Interaction ,Generative model ,Artificial Intelligence ,Salient ,Feature (machine learning) ,Entropy (information theory) ,Computer Vision and Pattern Recognition ,Artificial intelligence ,business ,computer ,Software - Abstract
Sequence-based neural networks can learn to make accurate predictions from large biological datasets, but model interpretation remains challenging. Many existing feature attribution methods are optimized for continuous rather than discrete input patterns and assess individual feature importance in isolation, making them ill-suited for interpreting non-linear interactions in molecular sequences. Building on work in computer vision and natural language processing, we developed an approach based on deep generative modeling - Scrambler networks - wherein the most salient sequence positions are identified with learned input masks. Scramblers learn to generate Position-Specific Scoring Matrices (PSSMs) where unimportant nucleotides or residues are ‘scrambled’ by raising their entropy. We apply Scramblers to interpret the effects of genetic variants, uncover non-linear interactions between cis-regulatory elements, explain binding specificity for protein-protein interactions, and identify structural determinants of de novo designed proteins. We show that interpretation based on a generative model allows for efficient attribution across large datasets and results in high-quality explanations, often outperforming state-of-the-art methods.
- Published
- 2021
- Full Text
- View/download PDF
40. Joint Scrambler and Filter for Outdoor 70 m Duplex Visible Light Communication System Providing Robustness to Solar Irradiance
- Author
-
Min Zhang, Weishu Xu, Dahai Han, and Qiguan Chen
- Subjects
Computer science ,Robustness (computer science) ,Filter (video) ,Bit error rate ,Electronic engineering ,Irradiance ,Duplex (telecommunications) ,Visible light communication ,Solar irradiance ,Scrambler - Abstract
We demonstrated an outdoor 70 m duplex portable visible-light-communication (VLC) system. Reliable communications above 8 Mbps is achieved using joint scrambler and filter scheme under the effect of solar irradiance with a bit-error-rate of 3.2×10-6.
- Published
- 2021
- Full Text
- View/download PDF
41. Decreased Low Back Pain Intensity and Differential Gene Expression Following Calmare®: Results From a Double-Blinded Randomized Sham-Controlled Study.
- Author
-
Starkweather, Angela R., Coyne, Patrick, Lyon, Debra E., Elswick, R. K., An, Kyungeh, and Sturgill, Jamie
- Subjects
TREATMENT of backaches ,ELECTRIC stimulation ,GENE expression ,PAIN measurement ,RANDOMIZED controlled trials ,BLIND experiment - Abstract
In this double-blinded, randomized controlled trial we evaluated the effects of Calmare®, a non-invasive neurocutaneous electrical pain intervention, on lower back pain intensity as measured by the 'worst' pain score and on pain interference using the Brief Pain Inventory-Short Form, on measures of pain sensitivity assessed by quantitative sensory testing, and on mRNA expression of pain sensitivity genes. Thirty participants were randomized to receive up to 10 sessions of Calmare® treatment ( n = 15) or a sham treatment ( n = 15) using the same device at a non-therapeutic threshold. At 3 weeks after conclusion of treatment, compared with the sham group, the Calmare® group reported a significant decrease in the 'worst' pain and interference scores. There were also significant differences in pain sensitivity and differential mRNA expression of 17 pain genes, suggesting that Calmare® can be effective in reducing pain intensity and interference in individuals with persistent low back pain by altering the mechanisms of enhanced pain sensitivity. Further study of long-term pain outcomes, particularly functional status, analgesic use and health care utilization, is warranted. © 2015 Wiley Periodicals, Inc. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
42. ESPRESSO fiber-Link upgrade: III - alignment and integration activities
- Author
-
Luca Oggioni, Bruno Chazelas, Denis Mégevand, Matteo Aliverti, Jose Luis Rasilla, Felix Garcia Temich, Gerardo Avila, Edoardo Maria Alberto Redaelli, Marco Riva, Giorgio Pariani, Francesco Pepe, and Ian Huges
- Subjects
Computer science ,business.industry ,Interface (computing) ,Astrophysics::Instrumentation and Methods for Astrophysics ,Astrophysics::Cosmology and Extragalactic Astrophysics ,law.invention ,Scrambler ,Telescope ,Espresso ,Upgrade ,law ,Astrophysics::Solar and Stellar Astrophysics ,Astrophysics::Earth and Planetary Astrophysics ,Focus (optics) ,business ,Spectrograph ,Throughput (business) ,Astrophysics::Galaxy Astrophysics ,Computer hardware - Abstract
The ESPRESSO spectrograph is a high resolution, super stable echelle cross-dispersed fibre-fed spectrograph, installed in the ESO-VLT Combined Coude Laboratory of the ESO-VLT in Cerro Paranal. In the framework of the Fiber-Link (FL) recovery project, which was necessary to meet the throughput requirement of the instrument, we redesigned and build the whole fibre bundle. The FL subsystem of ESPRESSO is composed by the Input Ends (IE), one per telescope and observing mode, which inject the telescope light into the fibres, the double scrambler and the light combiner for the multi-telescope mode, which merges the light of the four telescopes in a single fibre, and the spectrograph entrance slit. In this paper we focus on the alignment strategy, the tools developed and the activities performed to integrate the different components of the FL. We will describe the gluing system of the mini-lenses on the fibre ends, to guarantee the field and pupil centration; the integration of the IE, where the position and telecentricity of the two channels (star/sky) were necessary to meet the interface with the telescopes; and the integration of the beam combiner for the multi-telescope mode, particularly demanding for the small scale of the elements to integrate and the high accuracy required to guarantee the high throughput. We will also show the procedure for the scrambler alignment for the single telescope modes and the multi- telescope mode developed in laboratory and replicated at the telescope.
- Published
- 2020
- Full Text
- View/download PDF
43. Fiber modal noise mitigation by a rotating optical double scrambler
- Author
-
Gert Raskin, David W. Coutts, Jacob Pember, Christian Schwab, and Dmytro Rogozin
- Subjects
Materials science ,Modal ,Acoustics ,Noise control ,Fiber ,Scrambler - Published
- 2020
- Full Text
- View/download PDF
44. Implementation of a basic ADSL System using the DSP kit TMS320C6748
- Author
-
Geronimo Passini, Maria Belen Rodriguez, Guillermo A. Magallan, Facundo Aguilera, and Mariano Sosa
- Subjects
Digital signal processor ,Asymmetric digital subscriber line ,business.industry ,Computer science ,Data_CODINGANDINFORMATIONTHEORY ,Scrambler ,Audio codec ,Cyclic redundancy check ,Codec ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,business ,Computer hardware ,Quadrature amplitude modulation ,Digital signal processing - Abstract
In this paper the implementation of a multi-carrier ADSL digital communication system in a TMS320C6748 DSP Development kit (LCDK) digital signal processor (DSP) is presented. QAM modulation / demodulation schemes, symbol timing and an equalization scheme are implemented. The information sent through the system is processed using cyclic redundancy check blocks, Scrambler and Reed-Solomon encoding. The operation of the system is verified experimentally by designating eight low frequency carriers and using the audio CODEC available in the DSP kit.
- Published
- 2020
- Full Text
- View/download PDF
45. Optimization of Physical Layer Modules of USB 3.0 Using FPGA
- Author
-
Kushaggr Sharma, Anu Mehra, Yash Chitransh, and Paurush Bhulania
- Subjects
Computer science ,business.industry ,Physical layer ,USB 3.0 ,USB ,Chip ,Scrambler ,law.invention ,law ,Verilog ,business ,Field-programmable gate array ,Encoder ,computer ,Computer hardware ,computer.programming_language - Abstract
Super speed bus communication is achieved through USB 3.0 architecture due to its dual-bus architecture. The main purpose of this research work is to reduce the power consumption and area occupancy due to the different components of the physical layer of the USB 3.0. This research work has implemented the scrambler, 8b/10b encoder modules through a low $\mu$)wer consumption approach. The implementation of scrambler and 8b/10b encoding modules are performed on two different FPGA i.e. Kintex-7 KC705 Evaluation Platform (xc7k325tffg900-2) and ZedBoard Zynq evaluation and development kit (xc7z020c1g484-1) both are based on 28nm technology. The result of power utilization, area consumption of chip and different parameters are compared. The power obtained and area utilized by Kintex-7 of scrambler circuit is 0.26% and 6.34% lesser compared to ZedBoard and similarly for Sb/10b encoder power and area utilization is reduced by1.5% and 6.96%. The proposed research work has designed the scrambler and 8b/10b encoder modules of the USB 3.0 using Xilinx 1SE tool and implements the verilog codes on it by generating the FPGA report.
- Published
- 2020
- Full Text
- View/download PDF
46. Iterative Recovery for Interfered Scrambling Code Sequence on Factor Graph
- Author
-
Bing Deng, Hongbo Hu, Zhengbo Sun, and Yuxiang Yang
- Subjects
Polynomial code ,Iterative method ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Code word ,Code generation ,Hamming distance ,Algorithm ,Factor graph ,Scrambling ,Scrambler - Abstract
To solve the problem of insufficient number of check equation in the reconstruction of high order interfered scrambling code sequence, a reconstruction algorithm is proposed. Firstly, the check relationships based on the scrambling code generator polynomial are used to construct the factor graph, and the factor graph iteration method is used to estimate the scrambling code sequences. Secondly, the check relationship inspection method is used to evaluate the compatibility between the iterative estimation sequences and the generator polynomial, and select the best continuous codeword to restore the scrambler initial state. Finally, the optimal reconstruction sequence is selected from the scrambling code for initial state recovery according to the principle of minimum Hamming distance. Simulation results show that the algorithm can effectively solve the problem of reconstruction by using a limited number of check equations.
- Published
- 2020
- Full Text
- View/download PDF
47. Design and Build an Early Childhood Puzzle Educational Game Using the Fisher-Yates Shuffle Algorithm as an Android-Based Scrambler for Snippets
- Author
-
Diena Rauda Ramdhania, Aldy Rialdy Atmadja, Irma Sovia Nita, Mohamad Irfan, and Tedi Priatna
- Subjects
Computer science ,Android application ,Early childhood ,Arithmetic ,Android (operating system) ,Fisher–Yates shuffle ,Scrambler ,Educational game - Abstract
Educational game is a game in which there are elements of education that can hone and can increase knowledge, while the puzzle is a game of construction through the activity of installing or matching an object so that it becomes a certain pattern. The Fisher yates shuffle algorithm is a randomization technique in which this algorithm is implemented on puzzle pieces so that the puzzle pieces that come out will be different and rewarding without repetition and duplication. In this study, it can be concluded that the fisher yates shuffle algorithm can determine randomization solutions that are not multiple and do not repeat. Based on the pretest and posttest testing this puzzle education game was able to increase the knowledge of PAUD students by 23.68%, of which the pretest results were 64.13% and the posttest results were 87.81%.
- Published
- 2020
- Full Text
- View/download PDF
48. A Systematic Approach for Internal Entropy Boosting in Delay-based RO PUF on an FPGA
- Author
-
Wei Yan, Jonathan Trinh, Fatemeh Tehranipoor, Michael Hall, Abby Aguirre, and Timothy Lim
- Subjects
Hardware security module ,Computer science ,business.industry ,020208 electrical & electronic engineering ,02 engineering and technology ,Ring oscillator ,Chip ,020202 computer hardware & architecture ,Scrambler ,Process variation ,0202 electrical engineering, electronic engineering, information engineering ,Entropy (information theory) ,Field-programmable gate array ,business ,Randomness ,Computer hardware - Abstract
Physical Unclonable Functions (PUFs) use process variation, random and unpredictable errors introduced during chip manufacturing, to create a silicon fingerprint for each IC. In this paper, we describe two new implementations of the ring oscillator (RO) PUF, a parallel and a serial scheme. The two schemes are tested on Xilinx Spartan 7 FPGAs with an 8-bit input challenge and an 8-bit output response. Our designs have the advantage of taking up less area with no decrease in performance metrics of reliability, randomness, and uniqueness. Our serial scheme uses a linear feedback shift register and scrambler to generate more than one output bit using the same set of ring oscillators for the same input challenge. Our parallel scheme shows a higher speed and more randomness. We argue that our serial scheme can be designed to be just as random, reliable, and unique as a parallel scheme while using less hardware.
- Published
- 2020
- Full Text
- View/download PDF
49. Secure Key Generation and Distribution Using Polarization Dynamics in Fiber
- Author
-
Adnan A. E. Hajomer, Weisheng Hu, Xuelin Yang, and Liuming Zhang
- Subjects
Physics ,symbols.namesake ,Key generation ,Interferometry ,Fibre Channel ,Optical fiber amplifiers ,Channel reciprocity ,Electronic engineering ,symbols ,Stokes parameters ,Polarization (waves) ,Scrambler - Abstract
Dynamic properties of optical signals in fiber channel provide a unique, random and reciprocal source for physical-layer secure key generation and distribution (SKGD). In this paper, an inherent physical-layer SKGD scheme is proposed and demonstrated, where the random source is originated from the dynamic fluctuation of the instant state of polarization (SOP) of optical signals in fiber. Due to the channel reciprocity, highly-correlated fluctuation of Stokes parameter of SOP is shared between the legal partners, where an error-free key generation rate (KGR) of 196-bit/s is successfully demonstrated over 25-km standard single-mode fiber (SSMF). In addition, an active polarization scrambler is deployed in fiber to increase the KGR, where an error-free KGR of 200-kbit/s is achieved.
- Published
- 2020
- Full Text
- View/download PDF
50. Efficient Autoencoder-Based Human Body Communication Transceiver for WBAN
- Author
-
Koji Inoue, Mohammed S. Sayed, Sabah M. Ahmed, Abdelhay Ali, and Ahmed Shalaby
- Subjects
IEEE 802.15.6 ,General Computer Science ,Computer science ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Scrambler ,Machine learning ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,General Materials Science ,human body communication (HBC) ,low power ,business.industry ,020208 electrical & electronic engineering ,Transmitter ,General Engineering ,deep learning ,020206 networking & telecommunications ,Frame synchronization ,Autoencoder ,Block Error Rate ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Transceiver ,WBAN ,business ,Encoder ,lcsh:TK1-9971 ,Computer hardware - Abstract
Human Body Communication (HBC), which utilizes the human body as a communication channel, is a promising communication method for wireless body area networks. In this paper, we use the deep-learning based approach to design and implement a new optimized architecture for HBC system with scalable date rates feature. The proposed transceiver is completely implemented using two deep neural networks, one represents the autoencoder for the transmitter and receiver, and the other for frame synchronization. The proposed autoencoder-based HBC improves block error rate by $2~dB$ compared to the conventional HBC design. In addition, low complexity modules for CRC encoder and decoder, Scrambler and Descrambler, and Preamble/SFD generator are proposed. Implemented under 45nm CMOS technology, the core size of the proposed design is $0.116~mm^{2}$ , and the estimated power is 1.468 mW with a peak data rate of 5.25 Mbps. The energy efficiency ( $E_{b}$ ) of the proposed design is 280 pJ/b that is over 3.5x better than the conventional HBC designs in literature.
- Published
- 2019
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.