To see the other types of publications on this topic, follow the link: All-Optical Network Security.

Journal articles on the topic 'All-Optical Network Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'All-Optical Network Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zhao, Zhong-Nan, Pei-Li Qiao, Jian Wang, and Guan-Yu Hu. "Security Situation Assessment of All-Optical Network Based on Evidential Reasoning Rule." Mathematical Problems in Engineering 2016 (2016): 1–7. http://dx.doi.org/10.1155/2016/9312476.

Full text
Abstract:
It is important to determine the security situations of the all-optical network (AON), which is more vulnerable to hacker attacks and faults than other networks in some cases. A new approach of the security situation assessment to the all-optical network is developed in this paper. In the new assessment approach, the evidential reasoning (ER) rule is used to integrate various evidences of the security factors including the optical faults and the special attacks in the AON. Furthermore, a new quantification method of the security situation is also proposed. A case study of an all-optical networ
APA, Harvard, Vancouver, ISO, and other styles
2

Palak, Kesar, and Kaur Sandhu Mandeep. "Security Issues and the Energy Consumption in the Optical Burst Switched Networks." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 881–85. https://doi.org/10.31142/ijtsrd23934.

Full text
Abstract:
Optical burst switching is an optical network technology that helps in improving the use of the optical networks resources. In OCS, the network is configured to establish a circuit, from an entry to an exit node, by adjusting the optical cross connects circuits in the core routers in a manner that the data signal, in an optical form, can travel in an all optical manner from source to destination node. This approach suffers from all the disadvantages known to circuit switching the circuits require time to set up and to destroy, and while the circuit is established, the resources will not be eff
APA, Harvard, Vancouver, ISO, and other styles
3

Feng, Manying, Yiyuan Xie, Li Dai, et al. "Security mesh-based optical network exploiting the double masking scheme." Optics Express 30, no. 24 (2022): 43826. http://dx.doi.org/10.1364/oe.471213.

Full text
Abstract:
In order to tackle the security and privacy problems in optical networks, a novel mesh-based optical security network exploiting double masking (DM) scheme for multipoint confidential communication is proposed and studied theoretically. For each node in the network, a pair of mutually asynchronous vertical-cavity surface-emitting lasers (VCSELs) are required as transceivers, and the delay fiber (DF) is used to set different time delays as network node markers. In this security network, the encryption of the message is implemented on the transmitter of the source node by using the DM scheme, an
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yi. "Exploration On the Construction of Smart Campus All-Optical Network." Journal of Big Data and Computing 2, no. 2 (2024): 106–11. http://dx.doi.org/10.62517/jbdc.202401214.

Full text
Abstract:
With the rapid development of information technology, the construction of education informatization is urgent, and it is particularly important to promote the gradual development of colleges and universities towards digital transformation. Among them, the construction of smart campus has become an important means to enhance the level of education informatization and improve the quality of education and teaching. As an important part of the new generation of information technology, all-optical network has been widely used in the construction of smart campus. This paper first summarizes the exis
APA, Harvard, Vancouver, ISO, and other styles
5

Fok, Mable P., and Paul R. Prucnal. "All-optical encryption based on interleaved waveband switching modulation for optical network security." Optics Letters 34, no. 9 (2009): 1315. http://dx.doi.org/10.1364/ol.34.001315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Lanlan. "Secure Data Sequence Recognition of All-Optical High-Speed Network Using Semiconductor Optical Amplifier." Journal of Nanoelectronics and Optoelectronics 16, no. 10 (2021): 1667–74. http://dx.doi.org/10.1166/jno.2021.3124.

Full text
Abstract:
Semiconductor optical amplifier (SOA) has nonlinear optical effect and integration advantages, and is widely used in all-optical logic gates. Hence, it is used in the identification of all-optical high-speed network security data sequences. First, the SOA model is established and then simplified based on the existing model. On this basis, the identification model of all-optical high-speed network security data sequence is established, and the concept of integrated turbo-switch is introduced. The structure of the turbo-switch is analyzed. Then, an integrated turbo-switch architecture based on S
APA, Harvard, Vancouver, ISO, and other styles
7

Mao, Zhi Jie, Jiang Tao Wei, Hong Wei Li, Qiong Wu, and Feng Chen Qian. "Physical Layer Security Solutions for High Speed Data Networks." Advanced Materials Research 712-715 (June 2013): 2514–20. http://dx.doi.org/10.4028/www.scientific.net/amr.712-715.2514.

Full text
Abstract:
To improve the confidentiality and availability of the network, it is important to provide multilevel security in the physical layer of optical networks. Based on the orthogonal characterization of OFDM, we introduce a new electronic encryption method for the encryption of the subcarriers symbols after data mapping. Since all-optical networks are emerging as implementations for very high data rate communications, flexible switching and broadband application support, we present a novel all-optical security system technique using random sequence encryption. The noise function was applied via a p
APA, Harvard, Vancouver, ISO, and other styles
8

Spurny, Vladimir, Petr Munster, Adrian Tomasov, Tomas Horvath, and Edvin Skaljo. "Physical Layer Components Security Risks in Optical Fiber Infrastructures." Sensors 22, no. 2 (2022): 588. http://dx.doi.org/10.3390/s22020588.

Full text
Abstract:
Optical fiber communications are essential for all types of long- and short-distance transmissions. The aim of this paper is to analyze the previously presented security risks and, based on measurements, provide the risk level evaluation. The major risk is the possibility of inserting a splitter into the optical distribution network and capturing a portion of the entire spectrum, i.e., all channels in the optical fiber. Another significant security risk is crosstalk on multiplexers in networks with wavelength division multiplexing. The paper covers the macrobend attenuation evaluation of fiber
APA, Harvard, Vancouver, ISO, and other styles
9

Fahmida, Rahman, and Arozullah Mohammed. "REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PHYSICAL LEVEL." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 01–21. https://doi.org/10.5281/zenodo.4400051.

Full text
Abstract:
This paper deals with protecting all-optical networks (AON) from security attacks at the physical level. It firstly presents an overall high level protocol for establishment, management and on-the-fly restoration of optimal secure lightpaths established by applying constraint-based open shortest path first (OSPF) source routing using proposed security databases of components. Secondly it presents a protocol for using fiber diversity between adjacent nodes to protect against attacks on fiber links. Thirdly it presents analytical models of propagation of security attacks on optical amplifiers an
APA, Harvard, Vancouver, ISO, and other styles
10

Tang, Ying, Ziyi Kang, Xin Li, Ningjing Liang, Jinyong Chang, and Genqing Bian. "Tunable All-Optical Pattern Recognition System Based on Nonlinear Optical Loop Mirror for Bit-Flip BPSK Targets." Photonics 12, no. 4 (2025): 342. https://doi.org/10.3390/photonics12040342.

Full text
Abstract:
As the basic physical infrastructure of various networks, optical networks are crucial to the advancement of information technology. Meanwhile, as new technologies emerge, the security of optical networks is facing serious threats. To improve the security of optical networks, optoelectronic firewalls primarily leverage all-optical pattern recognition to perform direct detection and analysis of data transmitted through the optical network at the optical layer. However, the current all-optical pattern recognition system still faces some problems when deployed in optical networks, including phase
APA, Harvard, Vancouver, ISO, and other styles
11

Zhang, Qian, Sujay Charania, Stefan Rothe, et al. "Multimode Optical Interconnects on Silicon Interposer Enable Confidential Hardware-to-Hardware Communication." Sensors 23, no. 13 (2023): 6076. http://dx.doi.org/10.3390/s23136076.

Full text
Abstract:
Following Moore’s law, the density of integrated circuits is increasing in all dimensions, for instance, in 3D stacked chip networks. Amongst other electro-optic solutions, multimode optical interconnects on a silicon interposer promise to enable high throughput for modern hardware platforms in a restricted space. Such integrated architectures require confidential communication between multiple chips as a key factor for high-performance infrastructures in the 5G era and beyond. Physical layer security is an approach providing information theoretic security among network participants, exploitin
APA, Harvard, Vancouver, ISO, and other styles
12

Savva, Giannis, Konstantinos Manousakis, and Georgios Ellinas. "Network coding-based routing and spectrum allocation in elastic optical networks for enhanced physical layer security." Photonic Network Communications 40 (August 6, 2020): 160–74. https://doi.org/10.1007/s11107-020-00893-w.

Full text
Abstract:
In this work, an eavesdropping-aware routing and spectrum allocation approach is proposed utilizing network coding (NC) in elastic optical networks (EONs). To provide physical layer security in EONs and secure the confidential connections against eavesdropping attacks using NC, the signals of the confidential connections are combined (XOR-ed) with other signals at different nodes in their path, while transmitted through the network. The combination of signals through NC significantly increases the security of confidential connections, since an eavesdropper must access all i
APA, Harvard, Vancouver, ISO, and other styles
13

Clupek, Vlastimil, Tomas Horvath, Petr Munster, and Vaclav Oujezsky. "New Security Improvements in Next-Generation Passive Optical Networks Stage 2." Applied Sciences 9, no. 20 (2019): 4430. http://dx.doi.org/10.3390/app9204430.

Full text
Abstract:
Passive optical networks are currently the most promising solution for access networks. These networks rely on broadcast signal distribution in the downstream direction and unicast signal transmission in the upstream direction. The upstream direction is controlled by optical line termination (OLT). The broadcast transmission method increases security vulnerability because the attacker is able to connect his/her modified optical network unit (ONU) to the free port of the splitter (commonly in the basement). We present the concept for the activation process of ONUs based on physical unclonable f
APA, Harvard, Vancouver, ISO, and other styles
14

Aslam, Muhammad Muzamil, Liping Du, Xiaoyan Zhang, Yueyun Chen, Zahoor Ahmed, and Bushra Qureshi. "Sixth Generation (6G) Cognitive Radio Network (CRN) Application, Requirements, Security Issues, and Key Challenges." Wireless Communications and Mobile Computing 2021 (October 13, 2021): 1–18. http://dx.doi.org/10.1155/2021/1331428.

Full text
Abstract:
Recently, 5G installation has been started globally. Different capabilities are in the consistent procedure, like ultrareliability, mass connectivity, and specific low latency. Though, 5G is insufficient to meet all the necessities of the future technology in 2030 and so on. Next generation information and communication technology is playing an important role in attraction of researchers, industries, and technical people. With respect to 5G networks, sixth-generation (6G) CR networks are anticipated to familiarize innovative use cases and performance metrics, such as to offer worldwide coverag
APA, Harvard, Vancouver, ISO, and other styles
15

Xu, Fang, and Mingda Dong. "Unmanned-Aerial-Vehicle-Assisted Secure Free Space Optical Transmission in Internet of Things: Intelligent Strategy for Optimal Fairness." Sensors 24, no. 24 (2024): 8070. https://doi.org/10.3390/s24248070.

Full text
Abstract:
In this article, we consider an UAV (unmanned aerial vehicle)-assisted free space optical (FSO) secure communication network. Since FSO signal is impossible to detect by eavesdroppers without proper beam alignment and security authentication, a BS employs FSO technique to transfer information to multiple authenticated sensors, to improve the transmission security and reliability with the help of an UAV relay with decode and forward (DF) mode. All the sensors need to first send information to the UAV to obtain security authentication, and then the UAV forwards corresponding information to them.
APA, Harvard, Vancouver, ISO, and other styles
16

Zhang, Min, Yue Cui, Yueying Zhan, Danshi Wang, and Xue Chen. "All-Optical Parallel Encryption of QPSK Signals Based on Non-Degenerate Four Wave Mixing in HNLF for Physical Layer Security of Optical Network." Procedia Engineering 140 (2016): 8–11. http://dx.doi.org/10.1016/j.proeng.2015.09.236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Su, Xuan, and Han Gao. "Intelligent fault diagnosis and security early warning method of new power system based on system network situation." Journal of Computational Methods in Sciences and Engineering 24, no. 2 (2024): 891–905. http://dx.doi.org/10.3233/jcm-247293.

Full text
Abstract:
In the past few decades, China’s power demand has been increasing, and the power fiber plays a key role in ensuring the orderly dispatching of all links of the power system. The study used a wavelet decomposition and reconstruction method, which is a signal processing technique used to decompose complex optical power data into low-frequency and high-frequency signals with different frequency components. Through this decomposition, we can more clearly observe periodic fluctuations, trend changes, and noise components in optical power data. The study also examined different prediction models, in
APA, Harvard, Vancouver, ISO, and other styles
18

Papapavlou, Charalampos, Konstantinos Paximadis, Dimitrios Uzunidis, and Ioannis Tomkos. "Toward SDM-Based Submarine Optical Networks: A Review of Their Evolution and Upcoming Trends." Telecom 3, no. 2 (2022): 234–80. http://dx.doi.org/10.3390/telecom3020015.

Full text
Abstract:
Submarine networks have evolved alongside terrestrial ones over the past several decades. Although there are similarities between these two network categories (e.g., the need to cover ultra-long-haul distances and transport huge amounts of data), there are also important differences that have dictated their different evolutionary paths. Space division multiplexing (SDM) promises to be the ultimate solution to cover future capacity needs and overcome problems of both networks. In this work, we review recent and future submarine technologies, focusing on all critical sectors: cable systems, ampl
APA, Harvard, Vancouver, ISO, and other styles
19

Nakazawa, Masataka. "Proposal of multifunctional coherent Nyquist pulse and ultra-high-speed and high-efficiency optical transmission technology." Impact 2020, no. 2 (2020): 18–20. http://dx.doi.org/10.21820/23987073.2020.2.18.

Full text
Abstract:
A cornerstone of technological advancement in the last century has been the development of ever faster and higher capacity telecommunications. Being able to transmit large amounts of information, at a good rate over long distances is essential for running many of the services, business and industries that we all rely upon. The development of large national and international telecommunication networks underpins the internet and, with it, the World Wide Web. All this powers a huge range of diverse activities as security services, the entertainment industry, national health services and distribut
APA, Harvard, Vancouver, ISO, and other styles
20

Dovgiy, Stanislav O., Oleh V. Kopiika, and Oleksii S. Kozlov. "Synthesis of information and telecommunication networks of automatized environmental security systems with the purpose of gaining maximum noise resistance with a given efficiency." Environmental safety and natural resources 40, no. 4 (2021): 5–20. http://dx.doi.org/10.32347/2411-4049.2021.4.5-20.

Full text
Abstract:
The article defines the system features, properties and characteristics of information and telecommunication networks of automated environmental safety systems: information reliability and proven efficiency as a fundamental characteristic of system perfection. The main task of this research is to standardize the highest level of information and telecommunications networks architecture that provide the creation, processing, storage, deletion and transportation of information. In this case, the architecture is considered as a single for: all types of networks (including network services): optica
APA, Harvard, Vancouver, ISO, and other styles
21

Skladova, L., R. Murnieks, I. Kurbatska, A. Ostrovskis, V. Bobrovs, and S. Spolitis. "Extending Transceiver Capacity with a Scalable Spectrum Slicing Technique for Optical Access Networks." Latvian Journal of Physics and Technical Sciences 61, no. 3 (2024): 43–52. http://dx.doi.org/10.2478/lpts-2024-0019.

Full text
Abstract:
Abstract The paper demonstrates a spectrum slicing technique applied to PAM-4 modulated signal spectrum at 40 Gbaud baudrate for optical access networks. The spectrum slicing is shown in VPIphotonics simulation environment, where characteristics of key components are measured in the laboratory and loaded into the corresponding elements of the simulation setup. The spectrum of electrical baseband signal is sliced in four slices introducing an additional degree of freedom – higher data rate signals can be transmitted by re-using already-existing lower bandwidth transceiver components in an optic
APA, Harvard, Vancouver, ISO, and other styles
22

Lipps, Christoph, Annika Tjabben, Matthias Rüb, et al. "Designing Security for the Sixth Generation: About Necessity, Concepts and Opportunities." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 267–75. http://dx.doi.org/10.34190/eccws.22.1.1207.

Full text
Abstract:
Intelligent, comprehensive and, above all, secure wireless interconnection is the driving force behind technological progress. To ensure this, the development towards Sixth Generation (6G) Wireless Systems has been launched and is scheduled to be operational by 2030. This data technology of the future turns 6G into the infrastructure of a new generation of mobile, intelligent, and context-sensitive services, available everywhere and featuring high trustworthiness and performance, relying on both, network-side and off-network context sources. In addition, the networks themselves ought to become
APA, Harvard, Vancouver, ISO, and other styles
23

Wen, Heping, Zhen Liu, Haowen Lai, et al. "Secure DNA-Coding Image Optical Communication Using Non-Degenerate Hyperchaos and Dynamic Secret-Key." Mathematics 10, no. 17 (2022): 3180. http://dx.doi.org/10.3390/math10173180.

Full text
Abstract:
With the aim of tackling insufficient security in the chaotic encryption algorithm for digital images in the Optical Access Network, a color image encryption scheme combining non-degenerate discrete hyperchaotic system and deoxyribonucleic acid (DNA) dynamic encoding is proposed. First, a new non-degenerate hyperchaotic system is constructed with all positive Lyapunov and more complex dynamic characteristics. Furthermore, the key sequence based on non-degenerate hyperchaotic system is generated using plaintext correlation to achieve the effect of a dynamic secret key. Next, a binary bit-planes
APA, Harvard, Vancouver, ISO, and other styles
24

C. A. D, Pahalson, and Nanchen Nimyel Caleb. "5G Wireless Communications for Future Internet of Things: The Need for Free-Space Optical/Visible Light Communication Technology." International Journal of Computer Science and Mobile Computing 8, no. 12 (2019): 124–32. http://dx.doi.org/10.47760/ijcsmc.2019.v08i12.001.

Full text
Abstract:
IoT networks have some important characteristics. Some key requirements of the IoT are low device cost, low deployment cost, high energy efficiency, high security and privacy, and support for a large number of devices. The LED-based OWC systems have all the great features required to support the IoT. The key technologies currently used for IoT connectivity are Zigbee, Bluetooth Low Energy (BLE), and WiFi. ZigBee is a low-cost, low-power, wireless mesh network standard that has been widely used for IoT applications. The Internet of Things (IoT) based on the tactile internet will also be an esse
APA, Harvard, Vancouver, ISO, and other styles
25

Caserta, Marco, Silvia Schwarze, and Stefan Voß. "Developing a Ring-Based Optical Network Structure with Glass-Through Nodes." Journal of Telecommunications and Information Technology, no. 2 (June 30, 2012): 13–20. http://dx.doi.org/10.26636/jtit.2012.2.1260.

Full text
Abstract:
An important issue in designing optical transport networks (OTN) is security. The concept of 1+1 protection requires to connect each origin-destination(OD)-pair by at least two node-disjoint paths. In the case of a single edge or node failure, the connection of all OD-pairs is maintained under 1+1 protection. On a ring, 1+1 protection is given naturally. Moreover, on rings, the routing effort is typically decreasing. These observations motivate the investigation of ring structures for OTN. When developing a ring structure for telecommunication networks, several subtasks can be identified. Ring
APA, Harvard, Vancouver, ISO, and other styles
26

Zan, Yinkai, Pingping Lu, and Tingyu Meng. "A Gradual Adversarial Training Method for Semantic Segmentation." Remote Sensing 16, no. 22 (2024): 4277. http://dx.doi.org/10.3390/rs16224277.

Full text
Abstract:
Deep neural networks (DNNs) have achieved great success in various computer vision tasks. However, they are susceptible to artificially designed adversarial perturbations, which limit their deployment in security-critical applications. In this paper, we propose a gradual adversarial training (GAT) method for remote sensing image segmentation. Our method incorporates a domain-adaptive mechanism that dynamically modulates input data, effectively reducing adversarial perturbations. GAT not only improves segmentation accuracy on clean images but also significantly enhances robustness against adver
APA, Harvard, Vancouver, ISO, and other styles
27

Nuha, Hilal H., Satria Akbar Mugitama, Ahmed Abo Absa, and Sutiyo. "K-Nearest Neighbors with Third-Order Distance for Flooding Attack Classification in Optical Burst Switching Networks." IoT 6, no. 1 (2024): 1. https://doi.org/10.3390/iot6010001.

Full text
Abstract:
Optical burst switching (OBS) is a network architecture that combines the advantages of packet and circuit switching techniques. However, OBS networks are susceptible to cyber-attacks, such as flooding attacks, which can degrade their performance and security. This paper introduces a novel machine learning method for flooding attack detection in OBS networks, based on a third-order distance function for k-nearest neighbors (KNN3O). The proposed distance is expected to improve detection accuracy due to higher sensitivity with respect to the distance difference between two points. The developed
APA, Harvard, Vancouver, ISO, and other styles
28

Ullah, Muhammad Asad, Jason William Setiawan, Junaid ur Rehman, and Hyundong Shin. "On the Robustness of Quantum Algorithms for Blockchain Consensus." Sensors 22, no. 7 (2022): 2716. http://dx.doi.org/10.3390/s22072716.

Full text
Abstract:
Blockchain has revolutionized many fields, such as distributed sensor networks, finance, and cryptocurrency. Consensus between distributed network nodes is at the core of such blockchain technologies. The three primary performance measures for any consensus algorithm are scalability, security, and decentralization. This paper evaluates the usefulness and practicality of quantum consensus algorithms for blockchain-enhanced sensor, and computing networks and evaluates them against the aforementioned performance measures. In particular, we investigate their noise robustness against quantum decohe
APA, Harvard, Vancouver, ISO, and other styles
29

Wang, Chunzhi, Zaoning Wang, Xing Li, Sha Guan, and Ruoxi Wang. "Serial Combination Optimization Method of Packet Transport Network." Wireless Communications and Mobile Computing 2021 (October 18, 2021): 1–10. http://dx.doi.org/10.1155/2021/5495425.

Full text
Abstract:
Packet transport network (PTN) has problems such as waste of resources and low network stability due to the excessive complexity of the existing network or improper network architecture design. The optimization of the transport networks can not only make the network structure more reasonable but also reduce all kinds of unexpected scenarios in the network operation, improving the network efficiency and reducing the failure rate. This research will be optimized from three aspects. (1) In order to solve the problem of the same active and standby routing in the existing network, an optimization a
APA, Harvard, Vancouver, ISO, and other styles
30

T., Priyanka. "Wireless Communication – A Study." Journal of Optoelectronics and Communication 5, no. 3 (2023): 40–46. https://doi.org/10.5281/zenodo.10258867.

Full text
Abstract:
<i>Both wired and wireless communication systems are available, as well as directed and unguided communication media. A physical channel, such as coaxial cables, twisted pair cables, optical fiber links, etc., is the medium in wired communication, and it directs the signal's propagation from one point to another. We refer to this kind of media as Guided Medium. The transmission of data over a distance without the need of wires, cables, or other electrical conductors is referred to as wireless communication. One of the key means of sending data or information to other devices is wireless commun
APA, Harvard, Vancouver, ISO, and other styles
31

Lazzez, Amor. "All-Optical Networks: Security Issues Analysis." Journal of Optical Communications and Networking 7, no. 3 (2015): 136. http://dx.doi.org/10.1364/jocn.7.000136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Medard, M., D. Marquis, R. A. Barry, and S. G. Finn. "Security issues in all-optical networks." IEEE Network 11, no. 3 (1997): 42–48. http://dx.doi.org/10.1109/65.587049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Mustafa, H. Ali, M. ALkargole Hazim, and A. Hassan Tariq. "A Review of immigration obstacles to PON-FTTH and its evolution around the world." TELKOMNIKA Telecommunication, Computing, Electronics and Control 19, no. 2 (2021): pp. 645~663. https://doi.org/10.12928/TELKOMNIKA.v19i2.16444.

Full text
Abstract:
The require a bandwidth of every person will be increased from 16 Mbit/s to 50 up to 100M bit/s in the next 5 years in most of the growing counties. To solve this problem, FTTH may be the appropriate solution in a wide range. We experimentally investigate the deploy of PON-FTTH based on different kinds of passive optical network technology (E-PON, G-PON and VCSEL) and study the Obstacles of PON-FTTH Immigration after comparing it with older service (XDSL). Then analysis the reason on why these technologies chose by some country not others and why the technological need in Europe different with
APA, Harvard, Vancouver, ISO, and other styles
34

Viola, Roberto, Nicola Liberatore, Domenico Luciani, and Sandro Mengali. "Quartz Enhanced Photoacoustic Spectroscopy for Detection of Improvised Explosive Devices and Precursors." Advances in Optical Technologies 2016 (February 1, 2016): 1–12. http://dx.doi.org/10.1155/2016/5757361.

Full text
Abstract:
A compact portable and standalone point sensor has been developed for the detection and identification of precursors of improvised explosive devices (IEDs) and to be part of a network of sensors for the discovery of hidden bomb factories in homeland security applications. The sensor is based on quartz enhanced photoacoustic spectroscopy (QEPAS), and it implements a broadly tunable external cavity quantum cascade laser source (EC-QCL). It makes use of an optical cell purposely designed with a miniaturized internal volume, to achieve fast response and high sensitivity, and that can also be heate
APA, Harvard, Vancouver, ISO, and other styles
35

Li, Jian, Xuhui Tang, Jian Lu, et al. "TDMSANet: A Tri-Dimensional Multi-Head Self-Attention Network for Improved Crop Classification from Multitemporal Fine-Resolution Remotely Sensed Images." Remote Sensing 16, no. 24 (2024): 4755. https://doi.org/10.3390/rs16244755.

Full text
Abstract:
Accurate and timely crop distribution data are crucial for governments, in order to make related policies to ensure food security. However, agricultural ecosystems are spatially and temporally dynamic systems, which poses a great challenge for accurate crop mapping using fine spatial resolution (FSR) imagery. This research proposed a novel Tri-Dimensional Multi-head Self-Attention Network (TDMSANet) for accurate crop mapping from multitemporal fine-resolution remotely sensed images. Specifically, three sub-modules were designed to extract spectral, temporal, and spatial feature representations
APA, Harvard, Vancouver, ISO, and other styles
36

Vijayakumar, Elakiya, Aruna Puviarasan, Puviarasan Natarajan, and Suresh Kumar Ramu Ganesan. "Optical Flow-Based Feature Selection with Mosaicking and FrIFrO Inception V3 Algorithm for Video Violence Detection." Engineering, Technology & Applied Science Research 14, no. 3 (2024): 14475–82. http://dx.doi.org/10.48084/etasr.7270.

Full text
Abstract:
Violence in recent years poses the biggest threat to society, which needs to be addressed by all means. Video-based Violence detection is very tough to discern when the person or things that are recipients of a violent act are in motion. Detection of violence in video content is a critical task with applications spanning security surveillance, content moderation, and public safety. Leveraging the power of deep learning, the Violence Guard Freeze-In Freeze-Out Inception V3(VGFrIFrOI3) deep learning model in conjunction with optical flow-based characteristics proposes an effective solution for a
APA, Harvard, Vancouver, ISO, and other styles
37

Gao, Yuzhou, and Guoquan Ma. "Human Motion Recognition Based on Multimodal Characteristics of Learning Quality in Football Scene." Mathematical Problems in Engineering 2021 (August 30, 2021): 1–8. http://dx.doi.org/10.1155/2021/7963616.

Full text
Abstract:
The task of human motion recognition based on video is widely concerned, and its research results have been widely used in intelligent human-computer interaction, virtual reality, intelligent monitoring, security, multimedia content analysis, etc. The purpose of this study is to explore the human action recognition in the football scene combined with learning quality related multimodal features. The method used in this study is to select BN-Inception as the underlying feature extraction network and use uncontrolled environment and real world to capture datasets UCFl01 and HMDB51, and pretraini
APA, Harvard, Vancouver, ISO, and other styles
38

Siddiky, Md Nurul Absar, Muhammad Enayetur Rahman, Md Shahriar Uzzal, and H. M. Dipu Kabir. "A Comprehensive Exploration of 6G Wireless Communication Technologies." Computers 14, no. 1 (2025): 15. https://doi.org/10.3390/computers14010015.

Full text
Abstract:
As the telecommunications landscape braces for the post-5G era, this paper embarks on delineating the foundational pillars and pioneering visions that define the trajectory toward 6G wireless communication systems. Recognizing the insatiable demand for higher data rates, enhanced connectivity, and broader network coverage, we unravel the evolution from the existing 5G infrastructure to the nascent 6G framework, setting the stage for transformative advancements anticipated in the 2030s. Our discourse navigates through the intricate architecture of 6G, highlighting the paradigm shifts toward sup
APA, Harvard, Vancouver, ISO, and other styles
39

Zhang, Minghui, Yuhao Sun, Shan Zhao, Jiale Kang, and Weiqi Liu. "Plug-and-play measurement-device-independent quantum digital signature." Laser Physics Letters 22, no. 3 (2025): 035204. https://doi.org/10.1088/1612-202x/adb4c6.

Full text
Abstract:
Abstract Measurement-device-independent quantum digital signature (MDI-QDS) guarantees the authenticity and integrity of a message with security against all detector side-channel attacks. However, the experimental implementation of MDI-QDS in actual systems is extremely complicated since: (i) high-visibility interference requires several additional active control units for mode matching; (ii) a key assumption in MDI-QDS is that the laser source located at each user should be trusted. In this work, we propose a plug-and-play MDI-QDS scheme with a single untrusted source. On the one hand, it com
APA, Harvard, Vancouver, ISO, and other styles
40

Rahman, Fahmida, and Mohammed Arozullah. "Real Time Securing of All-Optical Networks Against Security Attacks at the Physical Level." International Journal of Network Security & Its Applications 5, no. 4 (2013): 01–21. http://dx.doi.org/10.5121/ijnsa.2013.5401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Zhao, Hongwei, Zhongxin Chen, Hao Jiang, Wenlong Jing, Liang Sun, and Min Feng. "Evaluation of Three Deep Learning Models for Early Crop Classification Using Sentinel-1A Imagery Time Series—A Case Study in Zhanjiang, China." Remote Sensing 11, no. 22 (2019): 2673. http://dx.doi.org/10.3390/rs11222673.

Full text
Abstract:
Timely and accurate estimation of the area and distribution of crops is vital for food security. Optical remote sensing has been a key technique for acquiring crop area and conditions on regional to global scales, but great challenges arise due to frequent cloudy days in southern China. This makes optical remote sensing images usually unavailable. Synthetic aperture radar (SAR) could bridge this gap since it is less affected by clouds. The recent availability of Sentinel-1A (S1A) SAR imagery with a 12-day revisit period at a high spatial resolution of about 10 m makes it possible to fully util
APA, Harvard, Vancouver, ISO, and other styles
42

Belokrynitskiy, Serhii, Kostiantyn Darchuk, and Anton Melnyk. "Analysis of the geodetic support of the territory of the Dnistrovsky district of the Chernivtsi region." Scientific Herald of Chernivtsi University. Geography, no. 845 (December 27, 2023): 161–68. http://dx.doi.org/10.31861/geo.2023.845.161-168.

Full text
Abstract:
Current analysis of geodetic security of the territory of the Dniester region of the Chernivets region. It is stated that until 1940 Bukovina was located near the warehouse of Romania, therefore all geodetic surveys that were located on its territory at that time were according to the normative documents of this region. After the establishment of the Chernivets region, the establishment of geodetic surveys began on its territory, first under the Regulations of 1939, and then under the Regulations of 1954–61. The current DGM was prompted by the Regulations of 1998, which in 2013 were replaced b
APA, Harvard, Vancouver, ISO, and other styles
43

Kalake, Lesole, Wanggen Wan, and Yanqiu Dong. "Applying Ternion Stream DCNN for Real-Time Vehicle Re-Identification and Tracking across Multiple Non-Overlapping Cameras." Sensors 22, no. 23 (2022): 9274. http://dx.doi.org/10.3390/s22239274.

Full text
Abstract:
The increase in security threats and a huge demand for smart transportation applications for vehicle identification and tracking with multiple non-overlapping cameras have gained a lot of attention. Moreover, extracting meaningful and semantic vehicle information has become an adventurous task, with frameworks deployed on different domains to scan features independently. Furthermore, approach identification and tracking processes have largely relied on one or two vehicle characteristics. They have managed to achieve a high detection quality rate and accuracy using Inception ResNet and pre-trai
APA, Harvard, Vancouver, ISO, and other styles
44

Rejeb, Ridha, and Mark S. Leeson. "Control Mechanism for All-Optical Components." Journal of Telecommunications and Information Technology, no. 1 (June 26, 2023): 57–62. http://dx.doi.org/10.26636/jtit.2009.1.915.

Full text
Abstract:
In this article, we give a brief overview of security and management issues that arise in all-optical networks (AONs). Then we present an outline of the multiple attack localization and identification (MALI) algorithm that can participate in some of the tasks for fault management in AONs. Consequently, we discuss a hardware-based control unit that can be embedded in AON nodes to accelerate the performance of the MALI algorithm. We conclude the article with a discussion concerning the applicability and implementation of this device in AON management systems.
APA, Harvard, Vancouver, ISO, and other styles
45

Novikova, Irina, and Kunchao Xie. "National Strategic Planning for the Digital Economy: a Competitive Analysis on material of China and Russia." Strategizing: Theory and Practice 3, no. 3 (2023): 298–307. http://dx.doi.org/10.21603/2782-2435-2023-3-3-298-307.

Full text
Abstract:
At present, the wave of digital economy is sweeping the world. Countries all over the world are competing for the strategic commanding height in digital economy. In order to firmly seize this major historical opportunity and to transform and upgrade its economic structure faster, Russia keeps on strengthening the core capabilities of the digital economy such as information infrastructure, new generation information technology, ICT industry, human resources, information security, and digital environment supervision. Research purpose: a competitive analysis of the national strategic planning for
APA, Harvard, Vancouver, ISO, and other styles
46

Horvath, Tomas, Petr Munster, and Miloslav Filka. "A Novel Unique Parameter for Increasing of Security in GPON Networks." Journal of Communications Software and Systems 12, no. 2 (2016): 112. http://dx.doi.org/10.24138/jcomss.v12i2.82.

Full text
Abstract:
Passive optical networks are widely used because of their sufficient bandwidth and low price of individual elements.Based on the European Commission, The Czech Republic ISPs have to ensure 30 Mbit/s (in existing networks) and 100 Mbit/s (in new constructed networks) for each customer in selected areas till 2020. Nowadays, the GPON standard is dominating in the Europe due to its low price and maturity. In general, the passive optical networks are based on P2MP (Point to Multipoint) physical topology. Therefore each end unit receives data meant for all units. To mitigate this, the standard defin
APA, Harvard, Vancouver, ISO, and other styles
47

Sundeepkumar Singh. "Integrating AI-Based Anomaly Detection with MPK-Isolated Microservices for Proactive Security in Optical Networks." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1693–704. https://doi.org/10.32628/cseit25112537.

Full text
Abstract:
Our work dives into mixing AI-powered anomaly detection with microservices segregated by Multi-Protocol Kinematics (MPK), all meant to shore up security in optical networks. We hit a point where, generally speaking, traditional detection methods just couldn’t handle the vulnerabilities these networks face. Using a huge dataset of everyday traffic and those odd, unexpected spikes, we pieced together a system that speeds up real-time detection and response—often in ways that feel both innovative and, well, a bit off the beaten path. One standout is that this combo boosts how often we catch anoma
APA, Harvard, Vancouver, ISO, and other styles
48

Médard, Muriel, Stephen R. Chinn, and Poompat Saengudomlert. "Node wrappers for QoS monitoring in transparent optical nodes." Journal of High Speed Networks 10, no. 4 (2001): 247–68. https://doi.org/10.3233/hsn-2001-205.

Full text
Abstract:
Transparent optical nodes (TONs), such as all‐optical switches and erbium‐doped fiber amplifiers, are an increasingly important part of wavelength‐division multiplexed (WDM) networks. Our goal in this paper is to consider how quality of service (QoS) may be monitored at such TONs. The question is particularly important as access to WDM networks, and associated security concerns, increase. Our paper has four parts. First, we present an overview of the vulnerabilities of TONs to QoS degradation for two main classes of TONs, namely all‐optical switching nodes and amplifiers in optical networks. S
APA, Harvard, Vancouver, ISO, and other styles
49

Yugay, V. V., A. D. Mekhtiyev, P. Sh Madi, A. D. Alkina, and E. G. Neshina. "The use of optical fiber for the creation of security systems for electrical cables of distribution networks of 0.4 kV." Journal of Physics: Conference Series 2140, no. 1 (2021): 012002. http://dx.doi.org/10.1088/1742-6596/2140/1/012002.

Full text
Abstract:
Abstract The article presents the results of research aimed at solving important production issues related to the theft of power cables and reducing the reliability of electrical networks with a voltage of 0.4 kV. To implement the security system, a single-mode optical fiber and a hardware and software complex for data processing were used. The results of the work can be used in security systems for various purposes, including telecommunications and construction systems. During the experiments, it was found that the photoelasticity effect occurs during mechanical action on the optical fiber, w
APA, Harvard, Vancouver, ISO, and other styles
50

Swarup Kumar, J. N. V. R., and D. Suresh. "Automated Secured Data Delivery for Next Generation Optical Networks." Asian Journal of Computer Science and Technology 7, S1 (2018): 104–7. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1794.

Full text
Abstract:
The present cloud benefit measurements truly are stunning. By one year from now 80% of all new programming will be accessible as a cloud benefit, 58% of all Internet activity is guage to be video in only two years and before the decade’s over, 20 billion brilliant gadgets will be associated with the system. There is no uncertainty this will make difficulties wherever in the system. However, with this test, there regularly comes chance to go into the new optical system; never again is it only an asset for transporting bits. What’s more, it’s more than expanding limit. What’s new is the requirem
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!