Reconfigurable Photonic Generation of Binary Modulated Microwave Signals
A novel photonic scheme of binary modulated microwave signals generation based on a dual-polarization quadrature phase-shift keying (DP-QPSK) modulator is proposed and experimentally demonstrated.
Jialin Ma +4 more
doaj +1 more source
Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM
Encrypting too much data using the same key is a bad practice from a security perspective. Hence, it is customary to perform re-keying after a given amount of data is transmitted.
Orr Dunkelman +2 more
doaj +1 more source
Research Paper: Design and Simulation of All Optical Frequency Shift Keying Demodulator by Using Photonic Crystal based Resonant Cavities [PDF]
Using all optical devices for implementing all optical communication networks is very important. By using all optical frequency shift keying demodulators one can generate binary codes from the frequency of optical waves.
Akram Asghari-Govar, Alireza Andalib
doaj +1 more source
Analysis of modulation and demodulation mode of voice signal in mine through-the-earth communicatio
According to characteristics of various modulation and demodulation modes, bit error rate of modulation modes including binary amplitude shift keying, binary frequency shift keying and binary differential phase shift keying under different demodulation ...
YIN Siyu, TAO Jinyi, LYU Ji, WU Rui
doaj +1 more source
The modulation mode recognition of non-cooperative underwater acoustic (UWA) communication signal faces great challenges due to the influence of the UWA channel and the demand for efficient recognition.
Tao Fang +3 more
doaj +1 more source
Error-bound formulation for multichannel reception of M-DPSK and pilot-aided M-PSK over Rayleigh-fading channels with postdetection combining [PDF]
Upper bounds for symbol-error probability are developed for multichannel reception of M-ary phase-shift keying (M-PSK) over frequency-flat Rayleigh-fading channels.
Chow, YC, McGeehan, JP
core +2 more sources
Re-Keying Scheme Revisited: Security Model and Instantiations
The re-keying scheme is a variant of the symmetric encryption scheme where a sender (respectively, receiver) encrypts (respectively, decrypts) plaintext with a temporal session key derived from a master secret key and publicly-shared randomness.
Yuichi Komano, Shoichi Hirose
doaj +1 more source
KEYING AND ROLE PLAY IN BUSINESS COMMUNICATION: GENDER, AGE AND RACE CUES [PDF]
This study comes as a sequel to other two papers published in this journal in 2010 and 2012 being part of a larger research that approaches business communication from the perspective of Goffman’s theory of the relational dimension of meaning. The paper
GABRIELA DUMBRAVĂ
doaj
KEYING AND ROLE PLAY IN BUSINESS ENCOUNTERS. SPATIAL, TEMPORAL, BEHAVIOR AND LANGUAGE CUES [PDF]
This study proposes an approach business communication based on Erving Goffman’s theory of the relational dimension of meaning, according to which meaning is not attached to the communication process, but generated within the context (frame) of each ...
GABRIELA DUMBRAVĂ
doaj
Near-Capacity Turbo Coded Soft-decision Aided DAPSK/Star-QAM [PDF]
Low-complexity non-coherently detected Differential Amplitude and Phase-Shift Keying (DAPSK) schemes constitute an ideal candidate for wireless communications.
Hanzo, Lajos, Liang, Dandan, Ng, Soon
core +1 more source

