RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure t...
O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert,...
Reconfigurable computing systems have already shown their abilities to accelerate embedded hardware/ software systems. Since standard processor-based embedded applications have co...
M-commerce has shown up as e-commerce in mobile and wireless communication, and now deals with on-line banking, stock trading, auctions, transactions, and mobile media. M-commerce...
Abstract--This work presents a channel model for the broadband characterization of power lines in presence of time variation of the loads. The model is characterized by taking into...
In this paper, we present a novel non-data aided method for phase recovery in both square and cross quadrature amplitude modulation (QAM) communication systems, based on character...