information transmission
Recently Published Documents


TOTAL DOCUMENTS

2061
(FIVE YEARS 528)

H-INDEX

64
(FIVE YEARS 6)

2022 ◽  
Vol 11 (2) ◽  
pp. 0-0

IoT devices are having many constraints related to computation power and memory etc. Many existing cryptographic algorithms of security could not work with IoT devices because of these constraints. Since the sensors are used in large amount to collect the relevant data in an IoT environment, and different sensor devices transmit these data as useful information, the first thing needs to be secure is the identity of devices. The second most important thing is the reliable information transmission between a sensor node and a sink node. While designing the cryptographic method in the IoT environment, programmers need to keep in mind the power limitation of the constraint devices. Mutual authentication between devices and encryption-decryption of messages need some sort of secure key. In the proposed cryptographic environment, there will be a hierarchical clustering, and devices will get registered by the authentication center at the time they enter the cluster. The devices will get mutually authenticated before initiating any conversation and will have to follow the public key protocol.


2022 ◽  
Vol 2022 ◽  
pp. 1-9
Author(s):  
Xinyi Du ◽  
Haijun Ma

For a long time, the development strategy of remote areas is basically resource-oriented. Large-scale exploitation of resources not only damages the corresponding balance of resource reserves but also causes serious damage to the ecological environment. To this end, this paper has carried out research on the construction of ecological environment civilization in remote areas based on multidata collection and edge computing. Based on the understanding of the connotation, composition, and characteristics of ecological civilization, this paper selects representative indicators to reflect the specific requirements of ecological civilization, constructs an evaluation index system for the construction of ecological civilization in remote areas, and uses the evaluation indicators analysis and sorting. Second, edge computing and sensor technologies are applied to the process of data collection and information transmission and providing solutions for data collection and transmission in remote areas. This paper also presents the security method to protect the information transmission. Through testing, the program has shown good adaptability and can provide ideas for the construction of ecological environment in remote areas.


2022 ◽  
Vol 2022 ◽  
pp. 1-12
Author(s):  
Hang Zhang ◽  
Fanglin Niu ◽  
Ling Yu ◽  
Si Zhang

In traditional wireless sensor networks, information transmission usually uses data encryption methods to prevent information from being stolen illegally. However, once the encryption methods are leaked, eavesdropping nodes can easily obtain information. LT codes are rateless codes; if it is attacked by random channel noise, the decoding process will change and the decoding overhead will also randomly change. When it is used for physical layer communication of wireless sensor networks, it ensures that the destination node recovers all the information without adding the key, while the eavesdropping node can only obtain part of the information to achieve wireless information security transmission. To reduce the intercept efficiency of eavesdropping nodes, a physical layer security (PLS) method of LT codes with double encoding matrix reorder (DEMR-LT codes) is proposed. This method performs two consecutive LT code concatenated encoding on the source symbol, and part of the encoding matrix is reordered according to the degree value of each column from large to small, which reduces the probability of eavesdropping nodes recovering the source information. Experimental results show that compared with other LT code PLS schemes, DEMR-LT codes only increase the decoding overhead by a small amount. However, it can effectively reduce the intercept efficiency of eavesdropping nodes and improve information transmission security.


Author(s):  
Lei Zheng ◽  
Lichuan Jin ◽  
Tianlong Wen ◽  
Yulong Liao ◽  
Xiaoli Tang ◽  
...  

Abstract With the advent of the post-Moore era, researches on beyond-Complementary Metal Oxide Semiconductor (CMOS) approaches have been attracted more and more attention. Magnonics, or spin wave is one of the most promising technology beyond CMOS, which magnons-quanta for spin waves-process the information analogous to electronic charges in electronics. Information transmission by spin waves, which uses the frequency, amplitude and (or) phase to encode information, has a great many of advantages such as extremely low energy loss and wide-band frequency. Moreover, using the nonlinear characteristics of spin waves for information transmission can increase the extra degree of freedom of information. This review provides a tutorial overview over the effects of spin wave propagation and recent research progress in uniform spin wave waveguide. The propagation characteristics of spin waves in uniform waveguides and some special propagation phenomena such as spin wave beam splitting and self-focusing are described by combining experimental phenomena and theoretical formulas. Furthermore, we summarize methods for modulating propagation of spin wave in uniform waveguide, and comment on the advantages and limitations of these methods. The review may promote the development of information transmission technology based on spin waves.


Nanophotonics ◽  
2022 ◽  
Vol 0 (0) ◽  
Author(s):  
Shuncheng Tian ◽  
Xuanming Zhang ◽  
Xin Wang ◽  
Jiaqi Han ◽  
Long Li

Abstract In the last two decades, metamaterials and metasurfaces have introduced many new electromagnetic (EM) theory concepts and inspired contemporary design methodologies for EM devices and systems. This review focuses on the recent advances in metamaterials (MMs) for simultaneous wireless information and power transmission (SWIPT) technology. In the increasingly complex EM world, digital coding and programmable metamaterials and metasurfaces have enabled commercial opportunities with a broad impact on wireless communications and wireless power transfer. In this review, we first introduce the potential technologies for SWIPT. Then, it is followed by a comprehensive survey of various research efforts on metamaterial-based wireless information transmission (WIT), wireless power transmission (WPT), wireless energy harvesting (WEH) and SWIPT technologies. Finally, it is concluded with perspectives on the rapidly growing SWIPT requirement for 6G. This review is expected to provide researchers with insights into the trend and applications of metamaterial-based SWIPT technologies to stimulate future research in this emerging domain.


2022 ◽  
Vol 2022 ◽  
pp. 1-12
Author(s):  
Hengliang Chen ◽  
Zilin Li ◽  
Fei Luo

To provide a basic quantitative mathematical model for data analysis, decision-making support, and application of information systems oriented to emergency research, this paper established an information transmission response model for school students under such system mathematically based on actual school information transmission data during COVID-19 prevention. This paper proposes an emergency information management method—a two-step emergency information management method. It can be referenced for promotion of the development of IT-based school management, enhancement of IT application in school emergency information management, and improvement of the speed and accuracy of information transmission.


Nanoscale ◽  
2022 ◽  
Author(s):  
Huatian Hu ◽  
Wen Chen ◽  
Xiaobo Han ◽  
Kai Wang ◽  
Peixiang Lu

Providing an additional degree of freedom for binary information encoding and nonreciprocal information transmission, chiral single photons have become a new research frontier in quantum optics. Without using complex external...


Author(s):  
Ruslan Raupov ◽  
Vadim Afanas'ev

The paper investigates the features of modeling confidential information transmission systems based on the effects of dynamic chaos in multi-scroll systems. Recommendations for the choice of parameters of a multi-scroll system used in information transmission based on pseudo-random signals of a discrete-nonlinear system according to the Jerk circuit are obtained.


Author(s):  
Robin Schimmelpfennig ◽  
Layla Razek ◽  
Eric Schnell ◽  
Michael Muthukrishna

Human societies are collective brains. People within every society have cultural brains—brains that have evolved to selectively seek out adaptive knowledge and socially transmit solutions. Innovations emerge at a population level through the transmission of serendipitous mistakes, incremental improvements and novel recombinations. The rate of innovation through these mechanisms is a function of (1) a society's size and interconnectedness (sociality), which affects the number of models available for learning; (2) fidelity of information transmission, which affects how much information is lost during social learning; and (3) cultural trait diversity, which affects the range of possible solutions available for recombination. In general, and perhaps surprisingly, all three levers can increase and harm innovation by creating challenges around coordination, conformity and communication. Here, we focus on the ‘paradox of diversity’—that cultural trait diversity offers the largest potential for empowering innovation, but also poses difficult challenges at both an organizational and societal level. We introduce ‘cultural evolvability’ as a framework for tackling these challenges, with implications for entrepreneurship, polarization and a nuanced understanding of the effects of diversity. This framework can guide researchers and practitioners in how to reap the benefits of diversity by reducing costs. This article is part of a discussion meeting issue ‘The emergence of collective knowledge and cumulative culture in animals, humans and machines’.


Sign in / Sign up

Export Citation Format

Share Document