Performance of different SAC-OCDMA detection schemes with NRZ and RZ data formats

Author(s):  
M. Z. Norazimah ◽  
S. A. Aljunid ◽  
Hamza M. R. Al-Khafaji ◽  
Hilal A. Fadhil ◽  
M. S. Anuar
Author(s):  
A. L. Stempkovskiy ◽  
◽  
D. V. Telpukhov ◽  
A. I. Demeneva ◽  
T. D. Zhukova ◽  
...  

2020 ◽  
Vol 16 (2) ◽  
pp. 280-289
Author(s):  
Ghalib H. Alshammri ◽  
Walid K. M. Ahmed ◽  
Victor B. Lawrence

Background: The architecture and sequential learning rule-based underlying ARFIS (adaptive-receiver-based fuzzy inference system) are proposed to estimate and predict the adaptive threshold-based detection scheme for diffusion-based molecular communication (DMC). Method: The proposed system forwards an estimate of the received bits based on the current molecular cumulative concentration, which is derived using sequential training-based principle with weight and bias and an input-output mapping based on both human knowledge in the form of fuzzy IFTHEN rules. The ARFIS architecture is employed to model nonlinear molecular communication to predict the received bits over time series. Result: This procedure is suitable for binary On-OFF-Keying (Book signaling), where the receiver bio-nanomachine (Rx Bio-NM) adapts the 1/0-bit detection threshold based on all previous received molecular cumulative concentrations to alleviate the inter-symbol interference (ISI) problem and reception noise. Conclusion: Theoretical and simulation results show the improvement in diffusion-based molecular throughput and the optimal number of molecules in transmission. Furthermore, the performance evaluation in various noisy channel sources shows promising improvement in the un-coded bit error rate (BER) compared with other threshold-based detection schemes in the literature.


Neuroforum ◽  
2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Michael Denker ◽  
Sonja Grün ◽  
Thomas Wachtler ◽  
Hansjörg Scherberger

Abstract Preparing a neurophysiological data set with the aim of sharing and publishing is hard. Many of the available tools and services to provide a smooth workflow for data publication are still in their maturing stages and not well integrated. Also, best practices and concrete examples of how to create a rigorous and complete package of an electrophysiology experiment are still lacking. Given the heterogeneity of the field, such unifying guidelines and processes can only be formulated together as a community effort. One of the goals of the NFDI-Neuro consortium initiative is to build such a community for systems and behavioral neuroscience. NFDI-Neuro aims to address the needs of the community to make data management easier and to tackle these challenges in collaboration with various international initiatives (e.g., INCF, EBRAINS). This will give scientists the opportunity to spend more time analyzing the wealth of electrophysiological data they leverage, rather than dealing with data formats and data integrity.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3257
Author(s):  
Arne Bochem ◽  
Benjamin Leiding

Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and manipulate its behavior according to the attacker’s goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities, and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications.


2021 ◽  
pp. 2104879
Author(s):  
Carmelita Rodà ◽  
Mauro Fasoli ◽  
Matteo L. Zaffalon ◽  
Francesca Cova ◽  
Valerio Pinchetti ◽  
...  

2021 ◽  
Author(s):  
Jason R. Swedlow ◽  
Pasi Kankaanpää ◽  
Ugis Sarkans ◽  
Wojtek Goscinski ◽  
Graham Galloway ◽  
...  
Keyword(s):  

2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
I Patias ◽  
V Georgiev

Abstract Issue Given the importance, of cloud environments for mobile telemedicine information systems, focus is given in this paper on the challenges rising. We discuss the pros of the access to computing services and resources on demand without having own infrastructures, and the need of advanced interoperability data formats and application program interfaces (APIs) to facilitate the usage of the infrastructure. Description of the problem Cloud-Oriented Architecture (COA) describes the architecture, where applications act as services and serve other applications in the cloud environment. The aim is IT infrastructure and software applications to be optimized for their use in cloud computing environments. But what happens in the specific field of health as data interoperability for mobile telemedicine information systems? Results Two architectures were presented using a patient's compliance and engagement solution. A simple Representational State Transfer (REST) based architectural style was implemented in a three-layered architecture first and then compared to a cloud federation model. In the second the interaction goes through the federation via a middleware layer. Internal operations of cloud providers in the federation are still transparent to the cloud users. The middleware layer aims to coordinate the interaction with cloud users and providers in the federation. But, to avoid delays in those interactions interoperability of data formats and APIs. Lessons A Fast Healthcare Interoperability Resources (FHIR) based application was developed. Mobile telemedicine information systems are a strong instrument in patients' compliance. Many systems have proved that the used resources combined can solve clinical and administrative problems in a secure environment. Key messages The use of cloud is wide spread in the health sector. The challenge is to combine this infrastructure into one federated platform and maximize the added value by using advanced interoperability data formats and APIs.


Sign in / Sign up

Export Citation Format

Share Document