The Experts below are selected from a list of 321 Experts worldwide ranked by ideXlab platform
Bassam Zantout - One of the best experts on this subject based on the ideXlab platform.
-
The NetCamo Data Communication System
Advanced Science Letters, 2015Co-Authors: Ramzi A. Haraty, Bassam ZantoutAbstract:Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender’s identity, different implementations have proven successful-one of which is the invention of anonymous networks. This paper presents a thorough study of NetCamo-one of the most common and existing techniques used during Data Communication for avoiding traffic analysis as well as assuring Data integrity. The paper discusses its implementation and techniques in details. The paper also presents the benefits and drawbacks of NetCamo.PublishedN/
-
The TOR Data Communication System: A survey
2014 IEEE Symposium on Computers and Communications (ISCC), 2014Co-Authors: Ramzi A. Haraty, Bassam ZantoutAbstract:Since the day the Internet became a common and reliable mechanism for Communication and Data transfer, security officers and enthusiasts rallied to enforce security standards on Data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful - one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during Data Communication for avoiding traffic analysis as well as assuring Data integrity - TOR. The paper also scrupulously presents the benefits and drawbacks of TOR.
-
The TOR Data Communication System
Journal of Communications and Networks, 2014Co-Authors: Ramzi A. Haraty, Bassam ZantoutAbstract:Since the day the Internet became a common and reliable mechanism for Communication and Data transfer, security officers and enthusiasts rallied to enforce security standards on Data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful ¿ one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during Data Communication for avoiding traffic analysis as well as assuring Data integrity ¿ the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.
-
I2P Data Communication System
2011Co-Authors: Bassam Zantout, Ramzi A. HaratyAbstract:As Communication becomes more and more an integral part of our day to day lives, the need to access information increases as well. S ecurity is currently one of the most important factors to consider in our aim to achieve ubiquitous computing, and with it raises the problem of how to manipulate Data while maintaining secrecy and integrity. This paper presents one of the most common widely used Data Communication Systems for avoiding traffic analysis as well as assuring Data integrity - I2P. I2P, just like every other technology aimed at securing Data, has its pros and cons. The paper presents the benefits and drawbacks of I2P.
Mohamad Sawan - One of the best experts on this subject based on the ideXlab platform.
-
Generic Wireless Power Transfer and Data Communication System Based on a Novel Modulation Technique
IEEE Transactions on Circuits and Systems I: Regular Papers, 1Co-Authors: Aref Trigui, Sami Hached, Jean-pierre David, Ahmed Chiheb Ammari, Yvon Savaria, Mohamad SawanAbstract:This paper presents a wireless power and downlink Data transfer System for medical implants operating over a single 10 MHz inductive link. The System is based on a Carrier Width Modulation (CWM) scheme for high-speed Communication and efficient power delivery using a novel modulator circuit design. Unlike conventional modulation techniques, the Data rate of the proposed CWM is not limited by the quality factors of the primary and secondary coils. The functionality of the new modulation method is proven using a hybrid implementation comprising a custom-integrated demodulator circuit and board-level discrete components. The proposed Wireless Power and Data Transfer (WPDT) System is also capable of operating under a wide range of Data rates. It allows a maximum Data rate of 3.33 Mb/s for a maximum power delivery of 6.1 mW at 1 cm coils separation distance. The System can recover more power, reaching 55 mW at 100 kb/s. Due to the System genericity, an operator can select the best compromise between power and Data rates in accordance to application or current need, without reconfiguring the receiver. Another advantage of this modulation technique is the simple implementation and the ultra-low power consumption of the CWM demodulator despite its high-speed demodulation.
Ramzi A. Haraty - One of the best experts on this subject based on the ideXlab platform.
-
The NetCamo Data Communication System
Advanced Science Letters, 2015Co-Authors: Ramzi A. Haraty, Bassam ZantoutAbstract:Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender’s identity, different implementations have proven successful-one of which is the invention of anonymous networks. This paper presents a thorough study of NetCamo-one of the most common and existing techniques used during Data Communication for avoiding traffic analysis as well as assuring Data integrity. The paper discusses its implementation and techniques in details. The paper also presents the benefits and drawbacks of NetCamo.PublishedN/
-
The TOR Data Communication System: A survey
2014 IEEE Symposium on Computers and Communications (ISCC), 2014Co-Authors: Ramzi A. Haraty, Bassam ZantoutAbstract:Since the day the Internet became a common and reliable mechanism for Communication and Data transfer, security officers and enthusiasts rallied to enforce security standards on Data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful - one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during Data Communication for avoiding traffic analysis as well as assuring Data integrity - TOR. The paper also scrupulously presents the benefits and drawbacks of TOR.
-
The TOR Data Communication System
Journal of Communications and Networks, 2014Co-Authors: Ramzi A. Haraty, Bassam ZantoutAbstract:Since the day the Internet became a common and reliable mechanism for Communication and Data transfer, security officers and enthusiasts rallied to enforce security standards on Data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful ¿ one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during Data Communication for avoiding traffic analysis as well as assuring Data integrity ¿ the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.
-
I2P Data Communication System
2011Co-Authors: Bassam Zantout, Ramzi A. HaratyAbstract:As Communication becomes more and more an integral part of our day to day lives, the need to access information increases as well. S ecurity is currently one of the most important factors to consider in our aim to achieve ubiquitous computing, and with it raises the problem of how to manipulate Data while maintaining secrecy and integrity. This paper presents one of the most common widely used Data Communication Systems for avoiding traffic analysis as well as assuring Data integrity - I2P. I2P, just like every other technology aimed at securing Data, has its pros and cons. The paper presents the benefits and drawbacks of I2P.
Tao Tang - One of the best experts on this subject based on the ideXlab platform.
-
dependability analysis of the Data Communication System in train control System
Science China-technological Sciences, 2009Co-Authors: Tianhua Xu, Tao TangAbstract:Communication based train control (CBTC) System is based on mobile Communication and overcomes fixed blocks in order to increase track utilization and train safety. The Data Communication System (DCS) between trains and wayside equipment is a crucial factor for the safe and efficient operation of CBTC System. The dependability under various transmission conditions needs to be modeled and evaluated. In this paper, a stochastic reward net (SRN) model for DCS based IEEE 802.11 standard was developed, which captures all relevant failure and failure recovery behavior System aspects in a concise way. We compared the reliability, availability for DCS with and without access point (AP) and antenna redundant configuration. We also quantitatively evaluated and compared the frame loss probability for three DCS configurations with different train velocities and train numbers in one radio cell. Fixed-point iteration was adopted to simplify the analysis. Numerical results showed the significant improvement of the reliability, availability and the frame loss probability index for the full redundant configuration.
-
A Method for Simulation and Analysis of Trackside Data Communication System in CBTC
2009 WRI International Conference on Communications and Mobile Computing, 2009Co-Authors: Yan Zhang, Lijie Chen, Tao TangAbstract:When simulation aims at evaluating the scalability of new protocols and applications, it is indispensable to work with large scale network topologies. It has important practical significance and benefits for improving the behaviors of network planning and design, System optimized design and project risk reduction. The technique of modeling our safe Communication protocol of Communication based train control (CBTC) and the setup of a research platform using the OPNET modeler are introduced, so that the dynamic performance issues could be studied to guide the CBTC network planning and design.
-
The modeling and Analysis of Data Communication System (DCS) in Communication Based Train Control (CBTC) with Colored Petri Nets
Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07), 2007Co-Authors: Tianhua Xu, Tao TangAbstract:Communication based train control (CBTC) System was based on mobile Communication and overcome fixed blocks in order to increase track utilization and train safety. As an intelligent autonomous decentralized Systems (IADS), Data Communication System (DCS) between trains and zone center (ZC) are crucial factors for the safe and efficient operation of CBTC System. The real-time behavior under various transmission conditions needs to be modeled and evaluated. The paper presents a DCS model and evaluates the influence of Communication collision and message length on the transfer delay. Performance evaluation of the coloured Petri net model shows that the Communication collision caused by two trains in one cell does not result in the unacceptable train operation situations. But the message length may have much influence on the transfer delay
-
ISADS - The modeling and Analysis of Data Communication System (DCS) in Communication Based Train Control (CBTC) with Colored Petri Nets
Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07), 2007Co-Authors: Tianhua Xu, Tao TangAbstract:Communication based train control (CBTC) System was based on mobile Communication and overcome fixed blocks in order to increase track utilization and train safety. As an intelligent autonomous decentralized Systems (IADS), Data Communication System (DCS) between trains and zone center (ZC) are crucial factors for the safe and efficient operation of CBTC System. The real-time behavior under various transmission conditions needs to be modeled and evaluated. The paper presents a DCS model and evaluates the influence of Communication collision and message length on the transfer delay. Performance evaluation of the coloured Petri net model shows that the Communication collision caused by two trains in one cell does not result in the unacceptable train operation situations. But the message length may have much influence on the transfer delay
Aref Trigui - One of the best experts on this subject based on the ideXlab platform.
-
Generic Wireless Power Transfer and Data Communication System Based on a Novel Modulation Technique
IEEE Transactions on Circuits and Systems I: Regular Papers, 1Co-Authors: Aref Trigui, Sami Hached, Jean-pierre David, Ahmed Chiheb Ammari, Yvon Savaria, Mohamad SawanAbstract:This paper presents a wireless power and downlink Data transfer System for medical implants operating over a single 10 MHz inductive link. The System is based on a Carrier Width Modulation (CWM) scheme for high-speed Communication and efficient power delivery using a novel modulator circuit design. Unlike conventional modulation techniques, the Data rate of the proposed CWM is not limited by the quality factors of the primary and secondary coils. The functionality of the new modulation method is proven using a hybrid implementation comprising a custom-integrated demodulator circuit and board-level discrete components. The proposed Wireless Power and Data Transfer (WPDT) System is also capable of operating under a wide range of Data rates. It allows a maximum Data rate of 3.33 Mb/s for a maximum power delivery of 6.1 mW at 1 cm coils separation distance. The System can recover more power, reaching 55 mW at 100 kb/s. Due to the System genericity, an operator can select the best compromise between power and Data rates in accordance to application or current need, without reconfiguring the receiver. Another advantage of this modulation technique is the simple implementation and the ultra-low power consumption of the CWM demodulator despite its high-speed demodulation.