René Cumplido

Learn More
Current and future communication schemes tend to use OFDM systems in order to provide high baud rates and less inter symbol interference. Some examples are 802.11, 802.16, MC-CDMA, Digital Video Broadcasting, Wireless USB and Wireless Firewire. Trying to provide a solution to the new emerging devices, slow standard adoption and poor spectrum use, Joe Mitola(More)
– Sine and Cosine waves have been used in countless applications; in recent research on Software Defined Radio (SDR), digital modalities of sine and cosine waves have received special attention. SDR involves highly reconfigurable resources and uses digital generated waves for modulation and demodulation of signals. Coordinate Rotation Digital Computer(More)
The target detection process in sea clutter background involves the use of different types of CFAR (constant false alarm rate) algorithms. These algorithms and their parameters should be configured to obtain the maximum detection probability and minimum false alarm probability at the current sea state (Beaufort scale). This paper present an(More)
Applications of wireless communications networks are emerging continuously. To offer a good level of security in these applications, new standards for wireless communications propose solutions based on cryptographic algorithms working on special modes of operation. This work presents a custom hardware architecture for the AES-CCM Protocol (AES-CCMP) which(More)
Software radios are communication devices with different configurations that enable to operate in different communication networks. Considering the OSI model, the main development of these radios is focused on the lower layers, which are implemented in hardware. Security is a key element for using software radios, because they can enter to different(More)
Burrows-Wheeler transform (BWT) has received special attention due to its effectiveness in lossless data compression algorithms. However, implementations of BWT-based algorithms have been limited due to the complexity of the suffix sorting process applied to the input string. Proposed solutions involve data structures combined with hardware architectures(More)
This work presents a hardware architecture of the ConText steganographic technique in a Cyclone II FPGA of the Altera family. The ConText technique takes advantage of noisy regions and those with abrupt gray levels changes in an image where the hidden information is very difficult to detect; the process to locate this region is highly repetitive and(More)
− Real-time performance of adaptive digital signal processing algorithms is required in many applications but it often means a high computational load for many conventional processors. In this paper, we present a configurable hardware architecture for adaptive processing of noisy signals for target detection based on Constant False Alarm Rate (CFAR)(More)
Reconfigurable architectures are important elements on the design of software radios. Nowadays, diverse platforms are being developed to support multiple tasks; these platforms are designed specially for the different layers of the OSI (Open System Interconnection) reference model. Specifically, the security architectures described in the MAC sublayer(More)
a r t i c l e i n f o a b s t r a c t This paper describes a digital watermarking scheme based on fractal codification for 8-bit gray scale images; it replaces range blocks by modified blocks according to the watermark bit being embedded. The main contribution of this work is a decrease in the distortion generated by the watermark embedding in the carrier(More)