Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

3 ( 1 )

2020 ( 1 )

2019 ( 26 )

2018 ( 27 )

Custom range...

Search Results: 1 - 10 of 22384 matches for " Roberto Cusani "
All listed articles are free for downloading (OA Articles)
Page 1 /22384
Display every page Item
All-Optical Cryptographic Device for Secure Communication  [PDF]
Fabio Garzia, Roberto Cusani
Communications and Network (CN) , 2010, DOI: 10.4236/cn.2010.24034
Abstract: An all-optical cryptographic device for secure communication, based on the properties of soliton beams, is presented. It can encode a given bit stream of optical pulses, changing their phase and their amplitude as a function of an encryption serial key that merge with the data stream, generating a ciphered stream. The greatest advantage of the device is real-time encrypting – data can be transmitted at the original speed without slowing down.
Comparison of 4 Multi-User Passive Network Topologies for 3 Different Quantum Key Distribution  [PDF]
Fabio Garzia, Roberto Cusani
Communications and Network (CN) , 2010, DOI: 10.4236/cn.2010.23025
Abstract: The purpose of this paper is to compare the performance of four passive optical network topologies in implementing multi-user quantum key distribution, using 3 protocols proposed by quantum cryptography (B92, EPR, and SSP). The considered networks are the passive-star network, the optical-ring network based on the Signac interferometer, the wavelength-routed network, and the wavelength-addressed bus network. The quantum bit-error rate and sifted key rate for each of these topologies are analysed to determine their suitability for providing quantum key distribution-service to networks of various sizes. The efficiency of the three considered protocols is also determined.
Optimization of UMTS Network Planning Using Genetic Algorithms  [PDF]
Fabio Garzia, Cristina Perna, Roberto Cusani
Communications and Network (CN) , 2010, DOI: 10.4236/cn.2010.23028
Abstract: The continuously growing of cellular networks complexity, which followed the introduction of UMTS technology, has reduced the usefulness of traditional design tools, making them quite unworthy. The purpose of this paper is to illustrate a design tool for UMTS optimized net planning based on genetic algorithms. In particular, some utilities for 3G net designers, useful to respect important aspects (such as the environmental one) of the cellular network, are shown.
Ad Hoc Network Hybrid Management Protocol Based on Genetic Classifiers  [PDF]
Fabio Garzia, Cristina Perna, Roberto Cusani
Wireless Engineering and Technology (WET) , 2010, DOI: 10.4236/wet.2010.12011
Abstract: The purpose of this paper is to solve the problem of Ad Hoc network routing protocol using a Genetic Algorithm based approach. In particular, the greater reliability and efficiency, in term of duration of communication paths, due to the introduction of Genetic Classifier is demonstrated.
Peak-Shaped-Based Steganographic Technique for MP3 Audio  [PDF]
Raffaele Pinardi, Fabio Garzia, Roberto Cusani
Journal of Information Security (JIS) , 2013, DOI: 10.4236/jis.2013.41003

The aim of this work is the development of a steganographic technique for the MP3 audio format, which is based on the Peak Shaped Model algorithm used for JPEG images. The proposed method relies on the statistical properties of MP3 samples, which are compressed by a Modified Discrete Cosine Transform (MDCT). After the conversion of MP3, it’s possible to hide some secret information by replacing the least significant bit of the MDCT coefficients. Those coefficients are chosen according to the statistical relevance of each coefficient within the distribution. The performance analysis has been made by calculating three steganographic parameters: the Embedding Capacity, the Embedding Efficiency and the PSNR. It has been also simulated an attack with the Chi-Square test and the results have been used to plot the ROC curve, in order to calculate the error probability. Performances have been compared with performances of other existing techniques, showing interesting results.

All-Optical EXOR for Cryptographic Application Based on Spatial Solitons  [PDF]
Mario Marco Corbelli, Fabio Garzia, Roberto Cusani
Journal of Information Security (JIS) , 2013, DOI: 10.4236/jis.2013.43020

The purpose of this paper is to present an all-optical EXOR for cryptographic application based on spatial soliton beams. The device is based on the propagation and interactions properties of spatial soliton in a Kerr nonlinear material. The interaction force between parallel soliton beam is analyzed from the analytical point of view and an exact solution is presented.

Optimal Territorial Resources Placement for Multipurpose Wireless Services Using Genetic Algorithms  [PDF]
Daniele Cacciani, Fabio Garzia, Alessandro Neri, Roberto Cusani
Wireless Engineering and Technology (WET) , 2011, DOI: 10.4236/wet.2011.23026
Abstract: This paper presents a study for finding a solution to the placement of territorial resources for multipurpose wireless services considering also the restrictions imposed by the orography of the territory itself. To solve this problem genetic algorithms are used to identify sites where to place the resources for the optimal coverage of a given area. The used algorithm has demonstrated to be able to find optimal solutions in a variety of considered situations.
Optimization of Security Communication Wired Network by Means of Genetic Algorithms  [PDF]
Fabio Garzia, Natale Tirocchi, Michele Scarpiniti, Roberto Cusani
Communications and Network (CN) , 2012, DOI: 10.4236/cn.2012.43024
Abstract: The realization of security wired network is very critical when the network itself must be installed in an environment full of restrictions and constrains such as historical palaces, characterized by unique architectural features. The purpose of this paper is to illustrate an advanced installation design technique of security wired network based on genetic algorithm optimisation that is capable of ensuring high performances of the network itself and significant reduction of the costs. The same technique can be extended to safety system such as fire signalling.
Text Independent Automatic Speaker Recognition System Using Mel-Frequency Cepstrum Coefficient and Gaussian Mixture Models  [PDF]
Alfredo Maesa, Fabio Garzia, Michele Scarpiniti, Roberto Cusani
Journal of Information Security (JIS) , 2012, DOI: 10.4236/jis.2012.34041
Abstract: The aim of this paper is to show the accuracy and time results of a text independent automatic speaker recognition (ASR) system, based on Mel-Frequency Cepstrum Coefficients (MFCC) and Gaussian Mixture Models (GMM), in order to develop a security control access gate. 450 speakers were randomly extracted from the Voxforge.org audio database, their utterances have been improved using spectral subtraction, then MFCC were extracted and these coefficients were statistically analyzed by GMM in order to build each profile. For each speaker two different speech files were used: the first one to build the profile database, the second one to test the system performance. The accuracy achieved by the proposed approach is greater than 96% and the time spent for a single test run, implemented in Matlab language, is about 2 seconds on a common PC.
Peak-Shaped-Based Steganographic Technique for JPEG Images
Lorenzo Rossi,Fabio Garzia,Roberto Cusani
EURASIP Journal on Information Security , 2009, DOI: 10.1155/2009/382310
Abstract: A novel model-based steganographic technique for JPEG images is proposed where the model, derived from heuristic assumptions about the shape of the DCT frequency histograms, is dependent on a stegokey. The secret message is embedded in DCT domain through an accurate selection of the potentially modifiable coefficients, taking into account their visual and statistical relevancy. A novel block measure, named discrepancy, is introduced in order to select suitable areas for embedding. The visual impact of the steganographic technique is evaluated through PSNR measures. State-of-the-art steganalytical test is also performed to offer a comparison with the original model-based techniques.
Page 1 /22384
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.