To see the other types of publications on this topic, follow the link: Computers / Data Transmission Systems / General.

Journal articles on the topic 'Computers / Data Transmission Systems / General'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computers / Data Transmission Systems / General.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Venable, Richard M. "Data Transmission Through the Telephone Network: Protocols, Pitfalls, and Some Examples." Journal of AOAC INTERNATIONAL 69, no. 5 (September 1, 1986): 749–54. http://dx.doi.org/10.1093/jaoac/69.5.749.

Full text
Abstract:
Abstract Invariably, the situation arises where it is desirable to transfer data from one computer to another, especially from small laboratory systems, word processors, or home computers to large mainframe computers. In many of these cases, there are no common storage media; home computers do not have 9-track tape drives and large mainframes do not have 5¼ in. floppy disk drives. Transmission of data through the telephone network is a viable method for data transfer, which is paradoxically both easier than many believe and more difficult than some may claim. One of the keys to successful data transmission is an understanding of telecommunications protocols, i.e., the rules governing intersystem communication through the telephone network. Some of the most common protocols allow exchanging ASCII-coded data at either 300 or 1200 baud. A variety of computer systems can be used, including IBM and DEC mainframes, a Wang word processor, an IBM PC-compatible microcomputer, and the Atari 800 microcomputer. A specific example is the use of the Atari 800 as an APL terminal, complete with the custom character set, standard ASCII text, and data transfer.
APA, Harvard, Vancouver, ISO, and other styles
2

Akhmetshina, Eleonora G. "MODELING DATA TRANSMISSION SYSTEMS USING MODERN INFORMATION TECHNOLOGIES." T-Comm 15, no. 8 (2021): 52–57. http://dx.doi.org/10.36724/2072-8735-2021-15-8-52-57.

Full text
Abstract:
When modeling data transmission systems for various purposes, including computer and telecommunication networks, both components of mathematical modeling are widely used. These are simulation modeling and analytical modeling based on queuing theory. At the same time, researchers can always compare the results obtained by means of simulation and analytical modeling. From modern technologies of simulation modeling, one can single out the IT GURU Academic Edition technologies, represented by the Opnet Modeler and Riverbed Modeler software products with powerful graphical editors. Graphic editors allow you to create simulation models of data transmission systems of any complexity, and launch and run their models to obtain statistics of the main performance indicators of these systems. Comparison of the simulation results with the results of queuing systems (QS) of the G/G/1 type makes it possible to assess the adequacy of those and other mathematical models. This article summarizes the results of the author’s publications on G/G/1 systems based on time-shifted distribution laws such as exponential, hyperexponential, and Erlang distribution. Thus, these distribution laws for the random variables used provide the coefficients of variation less than, equal or greater than one. This fact is important from the point of view of the queuing theory, because the average delay of claims in the system directly depends on the coefficients of variations in the time intervals for the arrival and servicing of claims.
APA, Harvard, Vancouver, ISO, and other styles
3

Voropaieva, A., G. Stupak, and O. Zhabko. "INFORMATION TRANSMISSION ALGORITHMS FOR INFRASTRUCTURE COMPUTER-INTEGRATED DATA PROCESSING SYSTEMS." Naukovyi visnyk Donetskoho natsionalnoho tekhnichnoho universytetu 1(6), no. 2(7) (2021): 14–23. http://dx.doi.org/10.31474/2415-7902-2021-1(6)-2(7)-14-23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Younus, Safwan Hafeedh, Aubida A. Al-Hameed, Ahmed Taha Hussein, Mohammed Thamer Alresheedi, and Jaafar M. H. Elmirghani. "Parallel Data Transmission in Indoor Visible Light Communication Systems." IEEE Access 7 (2019): 1126–38. http://dx.doi.org/10.1109/access.2018.2886398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Birvinskas, Darius, Vacius Jusas, Ignas Martisius, and Robertas Damasevicius. "Fast DCT algorithms for EEG data compression in embedded systems." Computer Science and Information Systems 12, no. 1 (2015): 49–62. http://dx.doi.org/10.2298/csis140101083b.

Full text
Abstract:
Electroencephalography (EEG) is widely used in clinical diagnosis, monitoring and Brain - Computer Interface systems. Usually EEG signals are recorded with several electrodes and transmitted through a communication channel for further processing. In order to decrease communication bandwidth and transmission time in portable or low cost devices, data compression is required. In this paper we consider the use of fast Discrete Cosine Transform (DCT) algorithms for lossy EEG data compression. Using this approach, the signal is partitioned into a set of 8 samples and each set is DCT-transformed. The least-significant transform coefficients are removed before transmission and are filled with zeros before an inverse transform. We conclude that this method can be used in real-time embedded systems, where low computational complexity and high speed is required.
APA, Harvard, Vancouver, ISO, and other styles
6

Elhoseny, Mohamed, Gustavo Ramirez-Gonzalez, Osama M. Abu-Elnasr, Shihab A. Shawkat, N. Arunkumar, and Ahmed Farouk. "Secure Medical Data Transmission Model for IoT-Based Healthcare Systems." IEEE Access 6 (2018): 20596–608. http://dx.doi.org/10.1109/access.2018.2817615.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Inyutin, S. A. "A Method for Reducing the Register Effect for Modular Data Formats." Informacionnye Tehnologii 28, no. 8 (August 15, 2022): 405–10. http://dx.doi.org/10.17587/it.28.405-410.

Full text
Abstract:
The substantiation of the author's method of reducing redundancy from the register effect when placing the components of a tuple representing a numerical value in a modular format designed for storage, transmission and processing in modular arithmetic in a specialized SIMD processor of parallel structure is given. Modular coding allows to obtain parallel execution of ring operations in independent computing paths. This, according to Amdahl's law, accelerates the execution of the computational process on multiprocessor computing systems or on multiple cores. Modular data formats are not consistent with the binary bit grid of a multiprocessor computer. In homogeneous binary registers designed to display modulo deductions, redundancy occurs because not all possible binary combinations in a digital register are used to display data. The method is based on the redistribution of the redundancy of digital registers used to display the components of the modular tuple, which allows to reduce to zero the register effect and redundancy of the representation of the components of the tuple. This makes it possible to obtain a dense packing of components of vector modular formats in homogeneous digital registers, which makes the development of SIMD architecture computers processing data in computer modular formats promising. The simulation results allow us to obtain mutually simple bases of the modular number system that meet the conditions of a new patented method for the complete elimination of redundancy.
APA, Harvard, Vancouver, ISO, and other styles
8

Riznyk, Volodymyr. "Big Data Process Engineering under Manifold Coordinate Systems." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 18 (April 2, 2021): 7–11. http://dx.doi.org/10.37394/23209.2021.18.2.

Full text
Abstract:
This paper involves techniques for improving the quality indices of big data process engineering with respect to high-performance coded design, transmission speed, and reliability under manifold coordinate systems. The system formed with limited number of basis vectors. The set of modular sums of the vectors including themselves form t-dimensional toroidal coordinate grid over the toroid, and the basis is sub-set of general number of grid coordinate set. These design techniques make it possible to configure high performance information technology for big data coding design and vector signal processing. The underlying mathematical principles relate to the optimal placement of structural elements in spatially or temporally distributed systems by the appropriate algebraic constructions based on cyclic groups in extensions of Galois fields, and development of the scientific basis for optimal solutions for wide classes of technological problems in big data process engineering and computer science.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Ziheng, Heng Chen, and Weiguo Wu. "Client-Aware Negotiation for Secure and Efficient Data Transmission." Energies 13, no. 21 (November 4, 2020): 5777. http://dx.doi.org/10.3390/en13215777.

Full text
Abstract:
In Wireless Sensor Networks (WSNs), server clusters, and other systems requiring secure transmission, the overhead of data encryption and transmission is often not negligible. Unfortunately, a conflict exists between security and efficiency in processing data. Therefore, this paper proposes a strategy to overcome this conflict, called Client-Aware Negotiation for Secure and Efficient Data Transmission (CAN-SEAT). This strategy allows a client with different security transmission requirements to use the appropriate data security transmission without modifying the client. Two methods are designed for different clients. The first method is based on two-way authentication and renegotiation. After handshakes, the appropriate data security transmission scheme is selected according to the client requirements. Another method is based on redirection, which can be applied when the client does not support two-way authentication or renegotiation. For the characteristics of different architecture, this paper classifies and discusses symmetric key algorithms, asymmetric key algorithms, and hardware encryption instructions. In four application scenarios, the CAN-SEAT strategy is tested. Compared with the general transmission strategy, when only software encryption is used, the data processing and transmission cost can be reduced by 89.41% in the best case and by 15.40% in the worst case. When supporting hardware encryption, the cost can be reduced by 85.30% and 24.63%, respectively. A good effect was produced on the experimental platforms XiLinx, FT-2000+, and Intel processors. To the best of our knowledge, for Client-Aware Negotiation (CAN), this is the first method to be successfully deployed on a general system. CAN-SEAT can be easily combined with other energy-efficient strategies.
APA, Harvard, Vancouver, ISO, and other styles
10

Melián, José M., Adán Jiménez, María Díaz, Alejandro Morales, Pablo Horstrand, Raúl Guerra, Sebastián López, and José F. López. "Real-Time Hyperspectral Data Transmission for UAV-Based Acquisition Platforms." Remote Sensing 13, no. 5 (February 25, 2021): 850. http://dx.doi.org/10.3390/rs13050850.

Full text
Abstract:
Hyperspectral sensors that are mounted in unmanned aerial vehicles (UAVs) offer many benefits for different remote sensing applications by combining the capacity of acquiring a high amount of information that allows for distinguishing or identifying different materials, and the flexibility of the UAVs for planning different kind of flying missions. However, further developments are still needed to take advantage of the combination of these technologies for applications that require a supervised or semi-supervised process, such as defense, surveillance, or search and rescue missions. The main reason is that, in these scenarios, the acquired data typically need to be rapidly transferred to a ground station where it can be processed and/or visualized in real-time by an operator for taking decisions on the fly. This is a very challenging task due to the high acquisition data rate of the hyperspectral sensors and the limited transmission bandwidth. This research focuses on providing a working solution to the described problem by rapidly compressing the acquired hyperspectral data prior to its transmission to the ground station. It has been tested using two different NVIDIA boards as on-board computers, the Jetson Xavier NX and the Jetson Nano. The Lossy Compression Algorithm for Hyperspectral Image Systems (HyperLCA) has been used for compressing the acquired data. The entire process, including the data compression and transmission, has been optimized and parallelized at different levels, while also using the Low Power Graphics Processing Units (LPGPUs) embedded in the Jetson boards. Finally, several tests have been carried out to evaluate the overall performance of the proposed design. The obtained results demonstrate the achievement of real-time performance when using the Jetson Xavier NX for all the configurations that could potentially be used during a real mission. However, when using the Jetson Nano, real-time performance has only been achieved when using the less restrictive configurations, which leaves room for further improvements and optimizations in order to reduce the computational burden of the overall design and increase its efficiency.
APA, Harvard, Vancouver, ISO, and other styles
11

Virmani, Dr Deepali, Nidhi Beniwal, Gargi Mandal, and Saloni Talwar. "Enhanced Tiny Encryption Algorithm with Embedding (ETEA)." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 7, no. 1 (April 21, 2013): 493–99. http://dx.doi.org/10.24297/ijct.v7i1.3479.

Full text
Abstract:
As computer systems become more pervasive and complex, security is increasingly important. Secure Transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. Many secure transmission methods require a type of encryption. Secure transmissions are put in place to prevent attacks such as ARP spoofing and general data loss. Hence,  in order to provide a better security mechanism, in this paper we  propose Enhanced Tiny Encryption Algorithm with Embedding (ETEA), a data hiding technique called steganography along with the technique of encryption (Cryptography). The advantage of ETEA is that it incorporates cryptography and steganography. The advantage proposed algorithm is that it hides the messages.
APA, Harvard, Vancouver, ISO, and other styles
12

Li, Yuhua, Lishuang Wan, and Haimin Zhang. "Communication Network for Sports Activity Monitoring Systems." Complexity 2021 (April 17, 2021): 1–10. http://dx.doi.org/10.1155/2021/9971605.

Full text
Abstract:
In this paper, through research and analysis of the communication network of the physical activity monitoring system, we combine wearable technology and identification technology and design a physical health monitoring bracelet that integrates multifaceted physical data collection and effective identity matching function. We match the identity through the chip and collect the physical fitness data generated in the process of exercise and centralized test by the sensor in real-time. Finally, the data transmission is realized through the WIFI communication function to achieve the purpose of monitoring physical exercise and improving physical quality. To ensure the continuity and stability of information transmission, the joint transmission method of direct transmission and indirect transmission is essential. Besides, considering the energy causality limitation of sensor nodes and relay nodes, a collaborative transmission model of wireless body area network based on wireless cognitive network is constructed. And, a power allocation algorithm based on maximum ratio merging and wireless cognitive network is proposed, which puts forward a new idea for the future research of wireless body area network resource allocation.
APA, Harvard, Vancouver, ISO, and other styles
13

Yang, He-Ping, Ying-Rui Sun, Nan Chen, Xiao-Wei Jiang, Jing-Hua Chen, Ming Yang, Qi Wang, Zi-Mo Huo, and Ming-Nong Feng. "Quick Compression and Transmission of Meteorological Big Data in Complicated Visualization Systems." Complexity 2022 (May 5, 2022): 1–9. http://dx.doi.org/10.1155/2022/6860915.

Full text
Abstract:
The sizes of individual data files have steadily increased along with rising demand for customized services, leading to issues such as low efficiency of web-based geographical information system (WebGIS)-based data compression, transmission, and rendering for rich Internet applications (RIAs) in complicated visualization systems. In this article, a WebGIS-based technical solution for the efficient transmission and visualization of meteorological big data is proposed. Based on open-source technology such as HTML5 and Mapbox GL, the proposed scheme considers distributed data compression and transmission on the server side as well as distributed requests and page rendering on the browser side. A high-low 8-bit compression method is developed for compressing a 100 megabyte (MB) file into a megabyte-scale file, with a compression ratio of approximately 90%, and the recovered data are accurate to two decimal places. Another part of the scheme combines pyramid tile cutting, concurrent domain name request processing, and texture rendering. Experimental results indicate that with this scheme, grid files of up to 100 MB can be transferred and displayed in milliseconds, and multiterminal service applications can be supported by building a grid data visualization mode for big data and technology centers, which may serve as a reference for other industries.
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Xiaofei, Haichao Wang, and Xin Dai. "A Power and Data Decoupled Transmission Method for Wireless Power Transfer Systems via a Shared Inductive Link." Energies 11, no. 8 (August 18, 2018): 2161. http://dx.doi.org/10.3390/en11082161.

Full text
Abstract:
Wireless Power Transfer (WPT) technology is gaining global popularity. However, in some applications, data transmission is also required to monitor the load states. This paper presents an alternative wireless power and data transmission method via the shared inductive link. With the method, the system presents three characteristics: (1) controllability and stability of the output voltage; (2) miniaturization in volume of the system; (3) decoupled transmission of power and data. The output voltage control is realized by a non-inductive hysteresis control method. In particular, data is transferred when the power transmission is blocked (i.e., the hysteresis switch is off). The interference between power and data transmission is very small. The signal to noise ratio (SNR) performance which is relevant to the interference from power transfer to data transfer and data transfer capacity, is studied and optimized. Both simulation and experimental results have verified the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
15

Levin, I. I., E. A. Semernikov, and D. S. Buriakov. "FPGA-BASED DATA COMMUNICATION SYSTEM IN DIGITAL SIGNAL PROCESSING DEVICES WITH PHASED ANTENNA ARRAYS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 213 (March 2022): 42–50. http://dx.doi.org/10.14489/vkit.2022.03.pp.042-050.

Full text
Abstract:
The paper represents some engineering solutions which provide coherence and coherent data transmission in radar and communication systems with phased array with computing components designed on the principles of FPGA-based reconfigurable computer systems. We developed the coherent gathering methods of digitized data from the phased array antenna elements, and data transmission among the distributed components that perform coherent digital signal processing. To provide coherent data processing and transmission, we use the signal of clock reference signal and the CPU-time, centrally generated and transmitted into all nodes with the same delay. Generation of all control signals in the processing nodes are based on these two signals. For data transmission, we suggest to use high-speed optical links, which are the most reliable in environmental conditions. To transmit the digitized data from phased array antenna elements, we suggested using packet data transmission with data integrity control and time-linked digitized data. Also, we applied a mechanism to monitor the delay mismatch of packets transmitted via different links and to synchronize them in data receivers. The most probable emergency situations for the data transmission system are considered and methods of parrying and minimizing the impact of transmission errors on the formation of the result are proposed. The developed engineering solutions were tested on a real FPGA-based beam-forming device with simulation of emergency situations. Many hours of tests and runs showed that all emergency situations were successfully solved by the data communication system.
APA, Harvard, Vancouver, ISO, and other styles
16

Peng, Sheng, Zhiming Cai, Wenjian Liu, Wennan Wang, Guang Li, Yutin Sun, and Linkai Zhu. "Blockchain Data Secure Transmission Method Based on Homomorphic Encryption." Computational Intelligence and Neuroscience 2022 (April 30, 2022): 1–9. http://dx.doi.org/10.1155/2022/3406228.

Full text
Abstract:
To ensure the security of data transmission and recording in Internet environment monitoring systems, this paper proposes a study of a secure method of blockchain data transfer based on homomorphic encryption. Blockchain data transmission is realized through homomorphic encryption. Homomorphic encryption can not only encrypt the original data, but also ensure that the data result after decrypting the data is the same as the original data. The asymmetric encrypted public key is collected by Internet of things (IoT) equipment to realize the design of blockchain data secure transmission method based on homomorphic encryption. The experimental results show that the accuracy of the first transmission is as high as 88% when using the transmission method in this paper. After several experiments, the transmission accuracy is high by using the design method in this paper. In the last test, the transmission accuracy is still 88%, and the data transmission effect is relatively stable. At the same time, compared to the management method used in this article, the transfer method used in this paper is more reliable than the original transfer method and is not prone to data distortion. It can be seen that this method has high transmission accuracy and short transmission time, which effectively avoids the data tampering caused by too long time in the transmission process.
APA, Harvard, Vancouver, ISO, and other styles
17

Popov, Dmitrii. "Teleoperation of ground-based mobile robotic systems with time delays in data transmission channels." Robotics and Technical Cybernetics 10, no. 3 (September 2022): 213–18. http://dx.doi.org/10.31776/rtcj.10306.

Full text
Abstract:
The paper is devoted to the issues of teleoperation of ground mobile robots. Problems of moving a robot in an un-structured environment by commands of a human operator are considered. A significant problem that reduces a quality of control and often leads to loss of stability is time delays that occur in information channels of the complex. To partially compensate for the negative impact of the time delays, an approach based on the prediction of the local goal of movement, the real position of the robot at the time of commands formation and the model of an operator is proposed. To test the approach, a computer simulation of the robot control process was performed on the basis of a training complex based on the Unity engine. The task was consisted in controlling the movement of the robot along the reference trajectory displayed on the screen. The task execution time and the similarity of the recorded trajectory with the reference one were evaluated. The experimental results confirmed the positive effect of the proposed compensation method on the efficiency of the control system.
APA, Harvard, Vancouver, ISO, and other styles
18

Riyadi, Eko Hadiyono, Agfianto Eko Putra, and Tri Kuntoro Priyambodo. "Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems." PeerJ Computer Science 7 (November 4, 2021): e727. http://dx.doi.org/10.7717/peerj-cs.727.

Full text
Abstract:
Background Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks. This research aims to improve the security of DNP3 data transmissions and protect them from MITM attacks. Methods This research describes a proposed new method of improving DNP3 security by introducing BRC4 encryption. This combines Beaufort encryption, in which plain text is encrypted by applying a poly-alphabetic substitution code based on the Beaufort table by subtracting keys in plain text, and RC4 encryption, a stream cipher with a variable-length key algorithm. This research contributes to improving the security of data transmission and accelerating key generation. Results Tests are carried out by key space analysis, correlation coefficient analysis, information entropy analysis, visual analysis, and time complexity analysis.The results show that to secure encryption processes from brute force attacks, a key of at least 16 characters is necessary. IL data correlation values were IL1 = −0.010, IL2 = 0.006, and IL3 = 0.001, respectively, indicating that the proposed method (BRC4) is better than the Beaufort or RC4 methods in isolation. Meanwhile, the information entropy values from IL data are IL1 = 7.84, IL2 = 7.98, and IL3 = 7.99, respectively, likewise indicating that the proposed method is better than the Beaufort or RC4 methods in isolation. Both results also show that the proposed method is secure from MITM attacks. Visual analysis, using a histogram, shows that ciphertext is more significantly distributed than plaintext, and thus secure from MITM attacks. The time complexity analysis results show that the proposed method algorithm is categorized as linear complexity.
APA, Harvard, Vancouver, ISO, and other styles
19

Obukhov, A. D., and M. N. Krasnyansky. "Neural network method of data processing and transmission in adaptive information systems." Vestnik Udmurtskogo Universiteta. Matematika. Mekhanika. Komp'yuternye Nauki 31, no. 1 (March 2021): 149–64. http://dx.doi.org/10.35634/vm210111.

Full text
Abstract:
The problem of automation of the processes of information transmission and processing in adaptive information systems is considered. An analysis of existing approaches to solving this problem showed the prospects of using neural network technologies. A neural network method for processing and transmitting information in adaptive information systems is formulated. The method includes a formalized description of a neural network data channel - a software tool for analysis, data processing and selection of data transfer protocol. The main stages of the proposed method are outlined: classification of the structures of the source data, their transformation, data processing, selection of the necessary protocol for transmitting information. Each of the stages is implemented through neural networks of various architectures. The theoretical rationale of the possibility of using the neural network method is given, obtained on the basis of the proof of a number of theorems. The novelty of the proposed method consists in the transition from an analytical solution of the problems of classification, processing and data transfer to an automated approach using machine learning technologies. The practical significance of the neural network method is to reduce the complexity of the implementation of information processing and transmission processes, to increase the level of automation in the organization of intermodular interaction. The implementation of the neural network method has been assessed using a number of software complexity assessment metrics. The application, virtues and failings of the developed method are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
20

Kim, Dae-Young, Jihoon Park, and Seokhoon Kim. "Data Transmission in Backscatter IoT Networks for Smart City Applications." Journal of Sensors 2022 (November 18, 2022): 1–9. http://dx.doi.org/10.1155/2022/4973782.

Full text
Abstract:
Backscatter communication is a battery-less data transmission method for massive IoT devices. These backscatter devices receive an incident signal from an RF-source gateway to harvest energy. These devices can be operated to transmit data after harvesting energy. This technology is widely applied to smart city applications. In general, IoT devices in the smart city applications have insufficient resources. They use narrowband communication to transmit small sizes of data. Thus, a simple channel access approach should be considered for data transmission. In addition, network scalability is also important in the backscatter network for smart city applications. According to energy harvesting and data generation, devices participating in data transmission can change frequently. Providing the network scalability by the changing devices can improve the transmission efficiency in the backscatter network. Therefore, we propose a novel media access scheme for the backscatter network in the smart city applications. The proposed scheme is designed by the contention-based approach to support the network scalability. It controls backscattering signal for energy harvesting and distributes contention in multiple access. It allows additional data transmission in backscattering period for harvesting energy to provide fairness of devices. For performance evaluation, extensive computer simulations are carried out and the proposed method is compared to TDMA that is a typical media access scheme in the backscatter network.
APA, Harvard, Vancouver, ISO, and other styles
21

Kataieva, Yevheniia, and Anton Rebrikov. "URGENCY OF USING HIDDEN DATA TRANSMISSION IN VIDEO FILES." Management of Development of Complex Systems, no. 46 (June 24, 2021): 48–54. http://dx.doi.org/10.32347/2412-9933.2021.46.48-54.

Full text
Abstract:
The article examines the problems of protecting information from unwanted access, which have tried to solve throughout the existence of mankind. Nowadays, the widespread use of electronic means of communication, electronic eavesdropping and fraud, a variety of computer viruses and other electronic hazards, electronic systems place high demands on the protection of information. Thus, the study of digital steganography is an urgent task. There are two main areas of hidden data transmission: cryptography and steganography. The purpose of cryptography is to restrict access to information by encrypting it. Unlike cryptography, steganography allows you to hide the very fact of the presence of hidden data. The study examined the main methods of covert data transmission using computer steganography, namely: the method of using system-reserved areas of digital data formats, methods of hiding information by special formatting of text files, which include the use of word, sentence or paragraph shift, selection certain positions of letters in the text or the use of properties of system fields that are not displayed on the screen, the method of using simulation functions, methods of using unused disk sectors, the method of using redundant media files (audio, photo and video). Currently, due to the growth of information and increasing the bandwidth of communication channels, the issue of hiding information in video sequences is becoming increasingly important. The transmission of digital video in recent years is a typical event and does not arouse suspicion. In the course of the research the peculiarities of hiding information in video files are considered, the comparison of existing algorithms of computer video steganography is made. The task is to develop your own algorithm for embedding information in the blue color channel of video files. The object of research is the transfer of hidden data in digital media files. The subject of research is the transmission of hidden data in the video stream. The purpose of research is to review the subject area, to examine the available methods of embedding information in media files in general and specifically in video files, to identify the advantages and disadvantages of existing algorithms, to develop their own algorithm of video steganography based on previously obtained research results. Research methods - methods of information theory, probability theory and mathematical statistics; methods of digital processing of signals, static images and video files; methods of vector analysis. The results of research - an overview of the features of hiding information in video files, compared existing algorithms of computer video steganography.
APA, Harvard, Vancouver, ISO, and other styles
22

Zhao, Huijuan, Jiapeng Xu, and Fangfei Li. "Event-Triggered Extended Kalman Filtering Analysis for Networked Systems." Mathematics 10, no. 6 (March 14, 2022): 927. http://dx.doi.org/10.3390/math10060927.

Full text
Abstract:
In this paper, the filtering problem of nonlinear networked systems with event-triggered data transmission tasks is studied. To reduce the transmission of excessive measurement data in the bandwidth-limited network, a data transmission mechanism with event trigger is introduced to analyze the error behavior of the extended Kalman filter. We prove that the real estimation error and error covariance matrices can be determined by restricting the initial conditions appropriately. Finally, the effectiveness of the filtering algorithm is verified by simulation.
APA, Harvard, Vancouver, ISO, and other styles
23

Chrzan, Marcin. "Effect of uniform time on the transmission of signals in rail open systems." Archives of Transport 1, no. 61 (March 31, 2022): 39–49. http://dx.doi.org/10.5604/01.3001.0015.8150.

Full text
Abstract:
Railroads and the Rail Traffic Control Systems installed on them in Poland have recently been undergoing rapid technological development (Brodzik, 2019). Modern transportation solutions are susceptible to electromagnetic interference (Paś and Rosiński, 2017). Development of modern railroad infrastructure means not only stations and modern rolling stock, but also safe and reliable train traffic control systems based on the latest telecommunication and IT technologies (Ciszewski et al., 2017). In the last century these technologies were still considered dangerous and were introduced with great fear. Today, computerized systems for controlling railway traffic on the track are becoming the norm. Systems are created as "overlays" for existing relay systems or autonomous systems are built based on microprocessor systems (Burdzik et al., 2017). Today it is hard to imagine a modern control room without computer equipment. The introduction of microprocessor technology to railroad traffic control devices took place at the turn of the century. However, the use of modern radio systems in rail transport is the moment when technology based on the appeared in the world LTE (Long-Term evolution) standard. The development of modern data transmission technologies is integrally connected with the mobility of its users. In the presented article the author has tried to determine the impact of transmission synchronization on the basic transmission parameters of LTE signal (Chrzan, 2021). The convenience of using rail communications for its users is the possibility of uninterrupted access to data transmission services along the entire route of the train. Therefore, the research presented in this article was focused on the use of the public radio communication network for passenger data transmission and data transmission for railroad needs. The article presents the influence of synchronisation of data transmission in open railway systems using GPS (Global Positioning System) technology. It presents a description of the physical phenomena associated with synchronisation, and presents the author's method for carrying out measurements on railway line No. 4. For this purpose, a diagnostic station was built and special software for data transmission encryption was prepared. The process of synchronisation of clocks with the use of uniform time was adopted as the basis. General measurement results and conclusions resulting from the use of open transmission in railway radiocommunication systems synchronised by the GPS system signal are presented.
APA, Harvard, Vancouver, ISO, and other styles
24

Kasu, Preethika, Prince Hamandawana, and Tae-Sun Chung. "TPBF: Two-Phase Bloom-Filter-Based End-to-End Data Integrity Verification Framework for Object-Based Big Data Transfer Systems." Mathematics 10, no. 9 (May 7, 2022): 1591. http://dx.doi.org/10.3390/math10091591.

Full text
Abstract:
Computational science simulations produce huge volumes of data for scientific research organizations. Often, this data is shared by data centers distributed geographically for storage and analysis. Data corruption in the end-to-end route of data transmission is one of the major challenges in distributing the data geographically. End-to-end integrity verification is therefore critical for transmitting such data across data centers effectively. Although several data integrity techniques currently exist, most have a significant negative influence on the data transmission rate as well as the storage overhead. Therefore, existing data integrity techniques are not viable solutions in high performance computing environments where it is very common to transfer huge volumes of data across data centers. In this study, we propose a two-phase Bloom-filter-based end-to-end data integrity verification framework for object-based big data transfer systems. The proposed solution effectively handles data integrity errors by reducing the memory and storage overhead and minimizing the impact on the overall data transmission rate. We investigated the memory, storage, and data transfer rate overheads of the proposed data integrity verification framework on the overall data transfer performance. The experimental findings showed that the suggested framework had 5% and 10% overhead on the total data transmission rate and on the total memory usage, respectively. However, we observed significant savings in terms of storage requirements, when compared with state-of-the-art solutions.
APA, Harvard, Vancouver, ISO, and other styles
25

Niu, Ruibin. "Mechanical Vibration Test Based on the Wireless Vibration Monitoring System." Security and Communication Networks 2022 (August 25, 2022): 1–8. http://dx.doi.org/10.1155/2022/9022128.

Full text
Abstract:
In order to apply wireless sensor networks to mechanical vibration monitoring, the author proposes a wireless network topology with multiple data collection points for mechanical vibration monitoring. This structure reduces the transmission load of the data collection point, increases the data transmission rate of the network, balances the energy dissipation in the network, and utilizes the general wireless sensor network hardware platform. The network transmission protocol and related auxiliary mechanisms are designed and implemented, and a wireless vibration monitoring test platform is constructed. The transmission performance of the network structure with multiple data collection points is evaluated through the actual test. The experimental results show that by using the wireless sensor network topology with multiple data collection points, it can meet the requirements of continuous transmission of vibration data obtained by 1 kHz sampling. Conclusion. The system performance of the wireless sensor network based on this network structure has been improved under the condition of general hardware, and the network structure of multiple data collection points shows good performance in the process of high-speed data transmission.
APA, Harvard, Vancouver, ISO, and other styles
26

Vakulenko, S. P., N. K. Volosova, and D. F. Pastukhov. "METHODS OF QR CODE TRANSMISSION IN COMPUTER STEGANOGRAPHY." World of Transport and Transportation 16, no. 5 (October 28, 2018): 14–25. http://dx.doi.org/10.30932/1992-3252-2018-16-5-2.

Full text
Abstract:
For the English full text of the article please see the attached PDF-File (English version follows Russian version).ABSTRACT The article deals with the problems of using steganography methods for transmitting data. The authors justify their approach by arguing that the importance of cryptography in terms of transfer of hidden data i s obvious, however, being cryptographic, coded information maintains potential threat with the mere existence of an encrypted message, that is, an indication that it is necessary to apply cryptanalysis. With the help of steganography, mathematical methods are constructed that deprive the carrier of the potential threat of these prompts. The article proposes to transmit data encoded into a QR code, pre-masking it. In particular, for reliability of restoring the «original», it is proposed to solve the same problem by different methods through iteration using linear systems, the Radon transform, the boundary problem for the Poisson equation, and beyond this, methods based on probability theory. The advantages of this option include the possibility of using modern computer tools and software developed in the field of various types of tomography and in mathematical physics, while slightly modifying them. Keywords: cryptography, steganography, quick response code, information security, Radon transform, Poisson equation, iterative methods.
APA, Harvard, Vancouver, ISO, and other styles
27

Dorward, D. W. "A Low Cost Configuration for Internetwork Telemicroscopy." Microscopy and Microanalysis 6, S2 (August 2000): 1146–47. http://dx.doi.org/10.1017/s1431927600038228.

Full text
Abstract:
Advances in internetwork data transmission rates and reductions in the cost of imaging components and applications have facilitated real-time sharing of video, still images, and microscope operating systems with collaborators or observers at remote locations. Specialized direct and web-based systems for transmission electron microscopy have been described previously. However, in order to develop a generic and flexible means of sharing live images and data from light, scanning electron, and transmission electron microscope instruments, a telemicroscopy system was configured using readily available components and software that can be adapted for use with most common computer operating and networking systems.Figure 1 diagrams the general configuration used in our laboratory. Input devices can include inexpensive desktop digital or analog video cameras, specialized fast or slow scan CCD cameras, and the analog video-screen signal generated by scanning electron microscopes. For transmission through TCP/IP networks, analog signals must be digitized with a frame grabber card.
APA, Harvard, Vancouver, ISO, and other styles
28

Choi, Namki, Hwanhee Cho, and Byongjun Lee. "Development of Floquet Multiplier Estimator to Determine Nonlinear Oscillatory Behavior in Power System Data Measurement." Energies 12, no. 10 (May 14, 2019): 1824. http://dx.doi.org/10.3390/en12101824.

Full text
Abstract:
Measurement-based technology has been developed in the area of power transmission systems with phasor measurement units (PMU). Using high-resolution PMU data, the oscillatory behavior of power systems from general electromagnetic oscillations to sub-synchronous resonances can be observed. Studying oscillations in power systems is important to obtain information about the orbital stability of the system. Floquet multipliers calculation is based on a mathematical model to determine the orbital stability of a system with the existence of stable or unstable periodic solutions. In this paper, we have developed a model-free method to estimate Floquet multipliers using time series data. A comparative study between calculated and estimated Floquet multipliers has been performed to validate the proposed method. The results are provided for a sample three-bus power system network and the system integrated with a doubly fed induction generator.
APA, Harvard, Vancouver, ISO, and other styles
29

Schröter, Tamara, André Richter, Jens Götze, André Naumann, Jenny Gronau, and Martin Wolter. "Substation Related Forecasts of Electrical Energy Storage Systems: Transmission System Operator Requirements." Energies 13, no. 23 (November 25, 2020): 6207. http://dx.doi.org/10.3390/en13236207.

Full text
Abstract:
The growth in volatile renewable energy (RE) generation is accompanied by an increasing network load and an increasing demand for storage units. Household storage systems and micro power plants, in particular, represent an uncertainty factor for distribution networks, as well as transmission networks. Due to missing data exchanges, transmission system operators cannot take into account the impact of household storage systems in their network load and generation forecasts. Thus, neglecting the increasing number of household storage systems leads to increasing forecast inaccuracies. To consider the impact of the storage systems on forecasting, this paper presents a new approach to calculate a substation-specific storage forecast, which includes both substation-specific RE generation and load forecasts. For the storage forecast, storage systems and micro power plants are assigned to substations. Based on their aggregated behavior, the impact on the forecasted RE generation and load is determined. The load and generation are forecasted by combining several optimization approaches to minimize the forecasting errors. The concept is validated using data from the German transmission system operator, 50 Hertz Transmission GmbH. This investigation demonstrates the significance of using a battery storage forecast with an integrated load and generation forecast.
APA, Harvard, Vancouver, ISO, and other styles
30

Xu, Rui, Dan Long, Jia Liu, Wanghong Yu, and Lei Xu. "Intelligent Assistant Decision-Making Method for Power Enterprise Customer Service Based on IoT Data Acquisition." Mobile Information Systems 2021 (August 6, 2021): 1–10. http://dx.doi.org/10.1155/2021/7100610.

Full text
Abstract:
The prevailing era of the Internet of Things (IoT) has renewed all fields of life in general, but, especially with the advent of artificial intelligence (AI), has drawn the attention of researchers into a new paradigm of life standards. This revolution has been accepted around the world for making life comfortable with the use of intelligent devices. AI-enabled machines are more intelligent and capable of completing a specific task which saves a lot of time and resources. Currently, diverse methods are available in the existing literature to handle different issues of real life based on AI and IoT systems. The role of decision-making has its prominence in the AI-enabled and IoT systems. In this article, an AI- and IoT-based intelligent assistant decision-making method is presented for power enterprise customer service. An intelligent model of the customer service data network is designed, and the method of collecting data from IoT to assist decision-making is presented. Then, the semantic relationship of customer service data is defined, and the sharing scope of data transmission and resources are determined to realize intelligent assistant decision-making of customer service in power enterprises. Simulation results show that the proposed method improves the decision data transmission speed and shortens the transmission delay, and the network performance of data interaction is better than that of the existing methods.
APA, Harvard, Vancouver, ISO, and other styles
31

Lin, Chih-Hsueh, Chia-Wei Ho, Guo-Hsin Hu, Baswanth Sreeramaneni, and Jun-Juh Yan. "Secure Data Transmission Based on Adaptive Chattering-Free Sliding Mode Synchronization of Unified Chaotic Systems." Mathematics 9, no. 21 (October 21, 2021): 2658. http://dx.doi.org/10.3390/math9212658.

Full text
Abstract:
This paper is concerned with a novel secure data transmission design based on adaptive synchronization of master and slave unified chaotic systems. First, by introducing an augmented error state, an adaptive continuous sliding mode control (SMC) is derived to guarantee the synchronization of unified chaotic systems. Then, the secret message embedded in the master chaotic system can be transmitted from transmitter to receiver. Different from previous works using discontinuous SMC, the undesired chattering phenomenon can be fully eliminated, and it becomes possible to precisely recover the embedded secret message at the receiver. Last, an example is given to illustrate the success of secure data transmission with the continuous SMC developed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
32

Zakariyya, Rabiu Sale, Khalid Hossen Jewel, Akinwale O. Fadamiro, Oluwole John Famoriji, and Fujiang Lin. "An Efficient Polar Coding Scheme for Uplink Data Transmission in Narrowband Internet of Things Systems." IEEE Access 8 (2020): 191472–81. http://dx.doi.org/10.1109/access.2020.3032636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

You, Xiaodi, Jian Chen, and Changyuan Yu. "Efficient Indoor Data Transmission With Full Dimming Control in Hybrid Visible Light/Infrared Communication Systems." IEEE Access 6 (2018): 77675–84. http://dx.doi.org/10.1109/access.2018.2883750.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Skok, Srđan, Ahmed Mutapčić, Renata Rubesa, and Mario Bazina. "Transmission Power System Modeling by Using Aggregated Distributed Generation Model Based on a TSO—DSO Data Exchange Scheme." Energies 13, no. 15 (August 1, 2020): 3949. http://dx.doi.org/10.3390/en13153949.

Full text
Abstract:
By integrating distributed energy resources (DER, mostly renewable energy sources) in the depth of the distribution network transmission system operators (TSOs), planning and control of transmission systems has been greatly hindered due to the lack of knowledge about the circumstances at the transmission and distribution network’s interface and the lack of coordination with the distribution system operator (DSO). By adopting the Commission Regulation (EU) 2017/1485 (System Operational Guideline—SOGL) establishing a guideline on electricity transmission system operation, harmonized rules on system operation for TSOs, DSOs and significant grid users (SGUs) are set out, inter alia, in order to provide a clear legal framework for the exchange of necessary data and information between the aforementioned subjects. In this paper, the methodology of DER representation at the interface of the transmission and distributed system is presented, with the indicated interactive data exchange between TSO and DSO, for running and analyzing the operation of the entire power system (PS) in real and extended real time. The proposed methodology was tested on a real model of the Croatian transmission PS and with representative DER in the depth of the distribution network.
APA, Harvard, Vancouver, ISO, and other styles
35

Lo Storto, Corrado. "A Nonparametric Economic Analysis of the US Natural Gas Transmission Infrastructure: Efficiency, Trade-Offs and Emerging Industry Configurations." Energies 11, no. 3 (February 28, 2018): 519. http://dx.doi.org/10.3390/en11030519.

Full text
Abstract:
This paper presents a study aimed at measuring the efficiency of the transmission segment of the US natural gas industry from an economic perspective. The gas transmission infrastructure is modeled as an economic production function and a multi-stage modeling approach based on the implementation of Data Envelopment Analysis is employed to obtain an efficiency measure in a two-dimension performance space, i.e., cost and revenue-efficiency. This approach allows taking into account conflicting business goals. The study also performs cluster analysis to uncover homogeneous efficiency profiles relative to the gas transmission systems to explore determinants of efficiency rates, and trade-off situations. A sample containing 80 US gas transmission systems is used in the analysis. Results indicate that the transmission segment of the US gas industry has considerable inefficiencies, while average cost and revenue-efficiency scores are 0.324 and 0.301, and only three transmission systems achieve high scores on both efficiency dimensions. Cluster analysis identified seven configurations. In three of them there are no trade-off situations between cost and revenue efficiencies. However, only in one of them gas transmission systems have high efficiencies. The remaining four configurations exhibit trade-off situations having different intensity. Such trade-offs can be determined by the gas transmission infrastructure size.
APA, Harvard, Vancouver, ISO, and other styles
36

Sathishkumar, A., T. Rammohan, S. Sathish Kumar, J. Uma, K. Srujan Raju, Aarti Sangwan, M. Sivachitra, and M. Prabu. "QoS Constrained Network Coding Technique to Data Transmission Using IoT." Computer Systems Science and Engineering 43, no. 2 (2022): 531–44. http://dx.doi.org/10.32604/csse.2022.021694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

LUKICHEVA, Vera L., Andrey A. PRIVALOV, and Daniil D. TITOV. "A model of the process of package delivering over a data transmission channel in the context of computer attacks by an intruder." Proceedings of Petersburg Transport University 2021, no. 2 (June 2021): 229–41. http://dx.doi.org/10.20295/1815-588x-2021-2-229-241.

Full text
Abstract:
Objective: To analyze the impact of computer attacks on the performance quality of data transmission channels and channeling systems. It is also necessary to take into account the capabilities of an intruder to introduce malware into channeling systems when committing a computer attack. Methods: To determine the required design ratios, several options for setting various distribution functions characterizing the parameters used as input data and types of inbound streams have been considered, taking into account the parameters of the intruder’s computer attack model set by the values of the probability of successful attack. Mathematical modeling is carried out using the method of topological transformation of stochastic networks. The exponential, momentum and gamma distributions are considered as distribution functions of random variables. The solutions are presented for inbound streams corresponding to the Poisson, Weibull, and Pareto models. Results: The proposed approach makes it possible to assess the performance quality of data transmission channels in the context of computer attacks. These assessments make it possible to analyze the state and develop guidelines for improving the performance quality of communication channels against the destructive information impact of the intruder. Various variants of the functions of random variables distribution and various types of the inbound stream were used for modeling, making it possible to compare them, as well as to assess the possibility of using them in channels that provide users with different services. Practical importance: The modeling results can be used to build communication management decision support systems, as well as to detect attempts of unauthorized access to the telecommunications resource of transportation management systems. The proposed approach can be applied in the development of threat models to describe the capabilities of the intruder (the ‘Intruder Model’).
APA, Harvard, Vancouver, ISO, and other styles
38

Zolkin, A. L., V. D. Munister, E. A. Lavrov, K. G. Aygumov, and V. Saradzheva. "Creation of a software and hardware product of a real-time system for collecting, accounting and managing data transmission of an intelligent transport system in context of the IoT." Journal of Physics: Conference Series 2094, no. 5 (November 1, 2021): 052059. http://dx.doi.org/10.1088/1742-6596/2094/5/052059.

Full text
Abstract:
Abstract Some aspects of the functioning of modern microcontrollers of the Internet of Things in conditions that are close to real-time systems are reviewed in the article. Attention is paid to the aspects of the theory of physical data transmission, the significance of the delay metrics in the data transmission path is substantiated and emphasized. These delays (in view of the generalization of measurement results) determine the control accuracy and controllability of the data processing system as a whole, and also affect the reliability of the results. The process of formalization of the architectural template of a data collecting and accounting system for a control device (which is widespread in intelligent transport systems and the Internet of things) is described. The practical application of the approach in synchronous control through the implementation of a web interface and a control language in a microprocessor system (which can be possible at low traffic transmission rates) is substantiated. In conclusion, a generalization of the scope of application of the developed specialized computer system in transport field is given.
APA, Harvard, Vancouver, ISO, and other styles
39

Babchuk, Serhii, Taras Humeniuk, and Iryna Babchuk. "MATHEMATICAL MODEL DEPENDENCIES BAUD RATE FROM THE LENGTH OF THE SPECIALIZED DIGITAL NETWORK CANOPEN." Computer systems and information technologies, no. 3 (September 28, 2022): 31–39. http://dx.doi.org/10.31891/csit-2022-3-4.

Full text
Abstract:
At modern enterprises, the main increase in production occurs due to the increase in labor productivity by automating the processes of managing technological processes. Modern automation systems for the control of technological processes are, as a rule, created on the basis of microprocessor elements and specialized digital networks. Many modern process automation systems for controlling technological processes are based on a specialized CANopen digital network. The maximum length of a CANopen network segment can be 5000 m. The data transfer rate decreases as the segment length increases. However, until now there was no mathematical model of the change in data transmission speed depending on the length of the network segment. Therefore, the developers of the network and the organizations that support it experimentally determined the value of data transmission speed on network segments with a length of: 25, 50, 100, 250, 500, 1000, 2500, 5000 m. This fact complicated the process of analyzing computer systems at the stage their design. During the design of computer systems for control and management of industrial facilities that require a guaranteed reaction to random events in a set period of time, developers, as a rule, in cases where the length of the segment is in the intermediate sections between the specified points, perform calculations on the value of the speed for longer segment length than is real. Considering that there may be tens of thousands of nodes on complex objects, the sum results in a significant deviation from real performance indicators in the direction of increasing costs for unnecessary increase in system performance due to the impossibility of using in calculations the real values ​​of the data transmission speed for the real length of the segment between a node that transmits data and that receives data. A mathematical model of the dependence of the data transfer rate on the length of the CANopen network segment has been developed. Such a mathematical model should ensure the determination of the data transfer rate at any point of the segment of the specialized CANopen digital network. This will contribute to the improvement of the quality of design and will allow to create computer control and management systems that will meet the requirements of the consumer without excessive overspending
APA, Harvard, Vancouver, ISO, and other styles
40

Malmurugan, N., S. Christalin Nelson, Majid Altuwairiqi, Hashem Alyami, Durgaprasad Gangodkar, Musaddak Maher Abdul Zahra, and Simon Atuah Asakipaam. "Hybrid Encryption Method for Health Monitoring Systems Based on Machine Learning." Computational Intelligence and Neuroscience 2022 (July 7, 2022): 1–13. http://dx.doi.org/10.1155/2022/7348488.

Full text
Abstract:
Numerous forms of disasters and vandalism can occur in transmission lines, which makes them vulnerable. As a result, the transmission pipes must be protected by a reliable monitoring system. When a wireless sensor network is built from disparate devices that are positioned at varying distances from one another, it can be used to monitor physical and environmental conditions in the surrounding environment. In addition to the built-in sensor on the exterior of a pipeline and sensors positioned to support bridge structures, wireless sensor networks have a range of other applications. Other uses include robotics, healthcare, environmental monitoring, and a variety of other areas of technology. It is feasible to use wireless sensor networks to monitor temperature and pressure, as well as leak detection and transmission line sabotage, among other applications. There are several different sorts of attacks that can be launched against wireless sensor networks. When it comes to information security in wireless sensor networks, cryptographic approaches play a critical role in ensuring the integrity of the data. Different types of cryptographic algorithms are now available for use in order to maintain network security. Specific difficulties must be addressed, though, and these are as follows: To strengthen the power of these algorithms, a unique hybrid encryption approach for monitoring energy transmission lines and increasing the security of wireless sensor networks is created in this study. While wireless sensor networks are being used to monitor transmission pipelines, the proposed hybrid encryption method ensures that data is transferred securely and promptly. The proposed method must follow three cryptographic principles: integrity, secrecy, and authenticity. All of the subtleties and underlying principles of the algorithm are explained in detail so that the algorithm can be put into action immediately after it is introduced.
APA, Harvard, Vancouver, ISO, and other styles
41

El-Latif, Ahmed A. Abd, Abdullah M. Iliyasu, and Bassem Abd-El-Atty. "An Efficient Visually Meaningful Quantum Walks-Based Encryption Scheme for Secure Data Transmission on IoT and Smart Applications." Mathematics 9, no. 23 (December 4, 2021): 3131. http://dx.doi.org/10.3390/math9233131.

Full text
Abstract:
Smart systems and technologies have become integral parts of modern society. Their ubiquity makes it paramount to prioritise securing the privacy of data transferred between smart devices. Visual encryption is a technique employed to obscure images by rendering them meaningless to evade attention during transmission. However, the astounding computing power ascribed to quantum technology implies that even the best visually encrypted systems can be effortlessly violated. Consequently, the physical realisation quantum hardware portends great danger for visually encrypted date on smart systems. To circumvent this, our study proposes the integration of quantum walks (QWs) as a cryptographic mechanism to forestall violation of the integrity of images on smart systems. Specifically, we use QW first to substitute the original image and to subsequently permutate and embed it onto the reference image. Based on this structure, our proposed quantum walks visually meaningful cryptosystem facilities confidential transmission of visual information. Simulation-based experiments validate the performance of the proposed system in terms of visual quality, efficiency, robustness, and key space sensitivity, and by that, its potential to safeguard smart systems now and as we transition to the quantum era.
APA, Harvard, Vancouver, ISO, and other styles
42

Siamala Devi, S., K. Venkatachalam, Yunyoung Nam, and Mohamed Abouhawwash. "Discrete GWO Optimized Data Aggregation for Reducing Transmission Rate in IoT." Computer Systems Science and Engineering 44, no. 3 (2023): 1869–80. http://dx.doi.org/10.32604/csse.2023.025505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Vidhya, S., and V. Kalaivani. "Secured Health Data Transmission Using Lagrange Interpolation and Artificial Neural Network." Computer Systems Science and Engineering 45, no. 3 (2023): 2673–92. http://dx.doi.org/10.32604/csse.2023.027724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Jialing, Enoch Lu, and I.-Tai Lu. "Joint MMSE Transceiver Designs and Performance Benchmark for CoMP Transmission and Reception." ISRN Communications and Networking 2012 (June 13, 2012): 1–21. http://dx.doi.org/10.5402/2012/682090.

Full text
Abstract:
Coordinated Multipoint (CoMP) transmission and reception has been suggested as a key enabling technology of future cellular systems. To understand different CoMP configurations and to facilitate the configuration selection (and thus determine channel state information (CSI) feedback and data sharing requirements), performance benchmarks are needed to show what performance gains are possible. A unified approach is also needed to enable the cluster of cooperating cells to systematically take care of the transceiver design. To address these needs, the generalized iterative approach (GIA) is proposed as a unified approach for the minimum mean square error (MMSE) transceiver design of general multiple-transmitter multiple-receiver multiple-input-multiple-output (MIMO) systems subject to general linear power constraints. Moreover, the optimum decoder covariance optimization approach is proposed for downlink systems. Their optimality and relationships are established and shown numerically. Five CoMP configurations (Joint Processing-Equivalent Uplink, Joint Processing-Equivalent Downlink, Joint Processing-Equivalent Single User, Noncoordinated Multipoint, and Coordinated Beamforming) are studied and compared numerically. Physical insights, performance benchmarks, and some guidelines for CoMP configuration selection are presented.
APA, Harvard, Vancouver, ISO, and other styles
45

Jaksic, Branimir, Dragisa Miljkovic, Vladimir Maksimovic, Mile Petrovic, and Branko Gvozdic. "Satellite television transmission in the world - broadcasting systems and standards." Acta Scientiarum. Technology 42 (February 28, 2020): e44957. http://dx.doi.org/10.4025/actascitechnol.v42i1.44957.

Full text
Abstract:
This paper considers the characteristics of satellite television transmission in the world. An overview of the development of satellite television is given through the following characteristics: broadcasting systems - analog and digital (SDTV, HDTV, UHDTV), frequency band (C, Ku, Ka), broadcasting standards (DVB-S, DVB-S2, DigiCipher, DSS), as well as the availability of TV services Free-To-Air TV (FTA) and PAY TV. All of these characteristics were considered both at the global and at the regional level: North America, South America, Europe, Africa, Russia, Asia, and Australia. The gathered data are presented in tabular form and presented graphically for the period from 1996 to 2018. Based on the presented results, an analysis of the development of satellite television transmission was carried out in accordance with the characteristics of the broadcast.
APA, Harvard, Vancouver, ISO, and other styles
46

Wydra, Michal, Pawel Kubaczynski, Katarzyna Mazur, and Bogdan Ksiezopolski. "Time-Aware Monitoring of Overhead Transmission Line Sag and Temperature with LoRa Communication." Energies 12, no. 3 (February 5, 2019): 505. http://dx.doi.org/10.3390/en12030505.

Full text
Abstract:
The techniques of Dynamic Line Rating (DLR) for Overhead Transmission Line (OTL)’s are currently dynamically developed. DLR systems typically rely on weather, temperature, inclination, and current measurements to calculate tension and sag, where sensors need to be installed directly on wires. Such systems are very reliable and ensure high accuracy in determining maximum allowable current. However, their installation may require switching off the transmission line from the operation. In order to receive precise values regarding the actual operating conditions of the whole transmission line, DLR sensors measuring wire temperature or tension should be installed at many points of OTL. The minimum number of installation points should cover at least each tension section and critical spans, thereby increasing installation costs. The alternative method that allows for the monitoring of OTL is the use of the vision system based on cameras. Installed on the OTLs’ poles, cameras can take photos which, appropriately processed, can provide data about the sag and temperature of wires, without the necessity of switching OTL from the operation for installation or further maintenance. Such a vision system facilitates also data transmission, because it does not require measurement data to be transmitted from the sensor station installed on the wire to the base station located on the pole (for instance, via radio). This article aims to present the concept of a vision system that monitors sag and temperature of Overhead Transmission Lines (OTLs)’ using Long Range (LoRa) wireless communication and data transmission. The developed system consists of a camera and a microcomputer equipped with LoRa communication module. The whole system monitors OTLs’ spans by taking photos, processing images for wire sag-temperature estimation, and sending results to the operator’s Supervisory Control And Data Acquisition (SCADA). The system communication architecture is also proposed and investigated for data transmission time when monitoring the whole OTL.
APA, Harvard, Vancouver, ISO, and other styles
47

Sugadev, M., Sonia Jenifer Rayen, J. Harirajkumar, R. Rathi, G. Anitha, S. Ramesh, and Kiran Ramaswamy. "Implementation of Combined Machine Learning with the Big Data Model in IoMT Systems for the Prediction of Network Resource Consumption and Improving the Data Delivery." Computational Intelligence and Neuroscience 2022 (July 19, 2022): 1–12. http://dx.doi.org/10.1155/2022/6510934.

Full text
Abstract:
In recent years, health applications based on the internet of medical things have exploded in popularity in smart cities (IoMT). Many real-time systems help both patients and professionals by allowing remote data access and appropriate responses. The major research problems include making timely medical judgments and efficiently managing massive data utilising IoT-based resources. Furthermore, in many proposed solutions, the dispersed nature of data processing openly raises the risk of information leakage and compromises network integrity. Medical sensors are burdened by such solutions, which reduce the stability of real-time transmission systems. As a result, this study provides a machine-learning approach with SDN-enabled security to forecast network resource usage and enhance sensor data delivery. With a low administration cost, the software define network (SDN) design allows the network to resist dangers among installed sensors. It provides an unsupervised machine learning approach that reduces IoT network communication overheads and uses dynamic measurements to anticipate link status and refines its tactics utilising SDN architecture. Finally, the SDN controller employs a security mechanism to efficiently regulate the consumption of IoT nodes while also protecting them against unidentified events. When the number of nodes and data production rate varies, the suggested approach enhances network speed. As a result, to organise the nodes in a cluster, the suggested model uses an iterative centroid technique. By balancing network demand via durable connections, the multihop transmission technique for routing IoT data improves speed while simultaneously lowering the energy hole problem.
APA, Harvard, Vancouver, ISO, and other styles
48

Bhatia, Ajay, and Vikrant Sharma. "Elements of a Fiber Optic Communication System." Journal of Optical Communication Electronics 8, no. 2 (August 31, 2022): 19–25. http://dx.doi.org/10.46610/jooce.2022.v08i02.004.

Full text
Abstract:
Fiber optic connection is the best option for data transmission at gigabit and above rates. Voice, video, telemetry, and data are all transmitted using this method of communication over great distances and over computer networks or local area networks. By converting electronic signals into light, a fibre optic communication system uses light-wave technology to transfer data via fiber. Large bandwidth, smaller diameter, lightweight, long-distance signal transmission, low attenuation, transmission security, and other outstanding characteristics of this type of communication system make it a key component of any telecommunications infrastructure. The characteristic traits, fundamental components, and other aspects of fibre optic communication systems are highlighted in the information that follows.
APA, Harvard, Vancouver, ISO, and other styles
49

Lu, Jiazheng, Jun Guo, Zhou Jian, Yihao Yang, and Wenhu Tang. "Resilience Assessment and Its Enhancement in Tackling Adverse Impact of Ice Disasters for Power Transmission Systems." Energies 11, no. 9 (August 29, 2018): 2272. http://dx.doi.org/10.3390/en11092272.

Full text
Abstract:
Ice disasters have frequently occurred worldwide in recent years, which seriously affected power transmission system operations. To improve the resilience of power grids and minimize economic losses, this paper proposes a framework for assessing the influence of ice disasters on the resilience of power transmission systems. This method considers the spatial–temporal impact of ice disasters on the resilience of power transmission systems, and the contingence set for risk assessment is established according to contingency probabilities. Based on meteorological data, the outage models of power transmission components are developed in the form of generic fragility curves, and the ice load is given by a simplified freezing rain ice model. A cell partition method is adopted to analyze the way ice disasters affect the operation of power transmission systems. The sequential Monte Carlo simulation method is used to assess resilience for capturing the stochastic impact of ice disasters and deriving the contingency set. Finally, the IEEE RTS-79 system is employed to investigate the impact of ice disasters by two case studies, which demonstrate the viability and effectiveness of the proposed framework. In turn, the results help recognize the resilience of the system under such disasters and the effects of different resilience enhancement measures.
APA, Harvard, Vancouver, ISO, and other styles
50

Camps, Oscar, Stavros G. Stavrinides, and Rodrigo Picos. "Stochastic Computing Implementation of Chaotic Systems." Mathematics 9, no. 4 (February 13, 2021): 375. http://dx.doi.org/10.3390/math9040375.

Full text
Abstract:
An exploding demand for processing capabilities related to the emergence of the Internet of Things (IoT), Artificial Intelligence (AI), and big data, has led to the quest for increasingly efficient ways to expeditiously process the rapidly increasing amount of data. These ways include different approaches like improved devices capable of going further in the more Moore path but also new devices and architectures capable of going beyond Moore and getting more than Moore. Among the solutions being proposed, Stochastic Computing has positioned itself as a very reasonable alternative for low-power, low-area, low-speed, and adjustable precision calculations—four key-points beneficial to edge computing. On the other hand, chaotic circuits and systems appear to be an attractive solution for (low-power, green) secure data transmission in the frame of edge computing and IoT in general. Classical implementations of this class of circuits require intensive and precise calculations. This paper discusses the use of the Stochastic Computing (SC) framework for the implementation of nonlinear systems, showing that it can provide results comparable to those of classical integration, with much simpler hardware, paving the way for relevant applications.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography