The nonlinear Fourier transform (NFT), a powerful tool in soliton theory and exactly solvable models, is a method for solving integrable partial differential equations governing wave propagation in ...certain nonlinear media. The NFT decorrelates signal degrees-of-freedom in such models, in much the same way that the Fourier transform does for linear systems. In this three-part series of papers, this observation is exploited for data transmission over integrable channels, such as optical fibers, where pulse propagation is governed by the nonlinear Schrödinger equation. In this transmission scheme, which can be viewed as a nonlinear analogue of orthogonal frequency-division multiplexing commonly used in linear channels, information is encoded in the nonlinear frequencies and their spectral amplitudes. Unlike most other fiber-optic transmission schemes, this technique deals with both dispersion and nonlinearity directly and unconditionally without the need for dispersion or nonlinearity compensation methods. This paper explains the mathematical tools that underlie the method.
A spectrum-sliced elastic optical path network (SLICE) architecture has been recently proposed as an efficient solution for a flexible bandwidth allocation in optical networks. In SLICE, the problem ...of Routing and Spectrum Assignment (RSA) emerges. In this letter, we both formulate RSA as an Integer Linear Programming (ILP) problem and propose an effective heuristic to be used if the solution of ILP is not attainable.
Fibre-optic communications systems have traditionally carried data using binary (on-off) encoding of the light amplitude. However, next-generation systems will use both the amplitude and phase of the ...optical carrier to achieve higher spectral efficiencies and thus higher overall data capacities. Although this approach requires highly complex transmitters and receivers, the increased capacity and many further practical benefits that accrue from a full knowledge of the amplitude and phase of the optical field more than outweigh this additional hardware complexity and can greatly simplify optical network design. However, use of the complex optical field gives rise to a new dominant limitation to system performance - nonlinear phase noise. Developing a device to remove this noise is therefore of great technical importance. Here, we report the development of the first practical ('black-box') all-optical regenerator capable of removing both phase and amplitude noise from binary phase-encoded optical communications signals.
The Internet of Things (IoT) is comprised of numerous devices connected through wired or wireless networks, including sensors and actuators. Recently, the number of IoT applications has increased ...dramatically, including smart homes, vehicular ad hoc network (VANETs), health care, smart cities, and wearables. As reported in IHS Markit (see https://technology.ihs.com), the number of connected devices is projected to jump from approximately 27 billion in 2017 to 125 billion in 2030, an average annual increment of 12%. Security is a critical issue in today's IoT field because of the nature of the architecture, the types of devices, different methods of communication (mainly wireless), and the volume of data being transmitted over the network. Security becomes even more important as the number of devices connected to the IoT increases. To overcome the challenges of securing IoT devices, we propose a new deep learning–based intrusion detection system (DL‐IDS) to detect security threats in IoT environments. There are many IDSs in the literature, but they lack optimal features learning and data set management, which are significant issues that affect the accuracy of attack detection. Our proposed module combines the spider monkey optimization (SMO) algorithm and the stacked‐deep polynomial network (SDPN) to achieve optimal detection recognition; SMO selects the optimal features in the data sets and SDPN classifies the data as normal or anomalies. The types of anomalies detected by DL‐IDS include denial of service (DoS), user‐to‐root (U2R) attack, probe attack, and remote‐to‐local (R2L) attack. Extensive analysis indicates that the proposed DL‐IDS achieves better performance in terms of accuracy, precision, recall, and F‐score.
The paper proposes a novel DL‐IDS to identify severe anomalies. An SMO algorithm is used to extract the most relevant features from the data set. An SDPN is then applied to identify the optimal features and classify the data as normal or anomalous in different attack categories (eg, DoS, U2R, R2L, and probe). DL‐IDS system achieved superior results; in accuracy (99.02%), precision (99.38%), recall (98.91%), and F1‐score (99.14%) using the NSL‐;KDD data set.
The performance of free-space optical (FSO) communication systems is compromised by atmospheric fading and pointing errors. The pointing errors are widely considered as a combination of two ...components: boresight and jitter. A statistical model is investigated for pointing errors with nonzero boresight by taking into account the laser beamwidth, detector aperture size, and jitter variance. A novel closed-form probability density function (PDF) is derived for this new nonzero boresight pointing error model. Furthermore, we obtain closed-form PDF for the composite lognormal turbulence channels and finite series approximate PDF for the composite Gamma-Gamma turbulence channels, which is suitable for terrestrial FSO applications impaired by building sway. We conduct error rate analysis of on-off keying signaling with intensity modulation and direct detection over the lognormal and Gamma-Gamma fading channels. Asymptotic error rate analysis and outage probability of such a system are also presented based on the derived composite PDFs. It is shown that the boresight can only affect the coding gain, while the diversity order is determined by the atmospheric fading effect as well as the pointing error effect.
Theory, design, realization and measurements of an X-band isoflux circularly polarized antenna for LEO satellite platforms are presented. The antenna is based on a metasurface composed by a dense ...texture of sub-wavelength metal patches on a grounded dielectric slab, excited by a surface wave generated by a coplanar feeder. The antenna is extremely flat (1.57 mm) and light (less than 1 Kg) and represents a competitive solution for space-to-ground data link applications.
Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Consequently, user ...authentication is a primary concern in this resource-constrained environment before accessing data from the sensor/gateway nodes. In this letter, we present a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.
Central to the cluster-based routing protocols is the cluster head (CH) selection procedure that allows even distribution of energy consumption among the sensors, and therefore prolonging the ...lifespan of a sensor network. We propose a distributed CH selection algorithm that takes into account the distances from sensors to a base station that optimally balances the energy consumption among the sensors. NS-2 simulations show that our proposed scheme outperforms existing algorithms in terms of the average node lifespan and the time to first node death.
Today's smartphone operating systems frequently fail to provide users with visibility into how third-party applications collect and share their private data. We address these shortcomings with ...TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data. TaintDroid enables realtime analysis by leveraging Android's virtualized execution environment. TaintDroid incurs only 32% performance overhead on a CPU-bound microbenchmark and imposes negligible overhead on interactive third-party applications. Using TaintDroid to monitor the behavior of 30 popular third-party Android applications, in our 2010 study we found 20 applications potentially misused users' private information; so did a similar fraction of the tested applications in our 2012 study. Monitoring the flow of privacy-sensitive data with TaintDroid provides valuable input for smartphone users and security service firms seeking to identify misbehaving applications.
Smart cities have brought significant improvements in quality of life and services to citizens and urban environments. They are fully enabled to control the physical objects in real time and provide ...intelligent information to citizens in terms of transport, healthcare, smart buildings, public safety, smart parking, and traffic system and smart agriculture, and so on. The applications of smart cities are able to collect sensitive information. However, various security and privacy issues may arise at different levels of the architecture. Therefore, it is important to be aware of these security and privacy issues while designing and implementing the applications. This paper highlights main applications of smart cities and addresses the major privacy and security issues in the architecture of the smart cities' applications. It also reviews some of the current solutions regarding the security and privacy of information‐centric smart cities' applications and presents future research challenges that still need to be considered for performance improvement.
This paper highlights main applications of smart cities and addresses the major privacy and security issues in the architecture of the smart cities' applications. This paper also reviews some current solutions regarding the security and privacy of smart cities' applications and presents future research challenges that still need to be considered for performance improvement.