首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Preneel, Govaerts, and Vandewalle (1993) considered the 64 most basic ways to construct a hash function $H{:\;\:}\{0,1\}^{*}\rightarrow \{0,1\}^{n}Preneel, Govaerts, and Vandewalle (1993) considered the 64 most basic ways to construct a hash function H:   {0,1}*? {0,1}nH{:\;\:}\{0,1\}^{*}\rightarrow \{0,1\}^{n} from a blockcipher E:   {0,1}n×{0,1}n? {0,1}nE{:\;\:}\{0,1\}^{n}\times \{0,1\}^{n}\rightarrow \{0,1\}^{n}. They regarded 12 of these 64 schemes as secure, though no proofs or formal claims were given. Here we provide a proof-based treatment of the PGV schemes. We show that, in the ideal-cipher model, the 12 schemes considered secure by PGV really are secure: we give tight upper and lower bounds on their collision resistance. Furthermore, by stepping outside of the Merkle–Damg?rd approach to analysis, we show that an additional 8 of the PGV schemes are just as collision resistant (up to a constant). Nonetheless, we are able to differentiate among the 20 collision-resistant schemes by considering their preimage resistance: only the 12 initial schemes enjoy optimal preimage resistance. Our work demonstrates that proving ideal-cipher-model bounds is a feasible and useful step for understanding the security of blockcipher-based hash-function constructions.  相似文献   

2.
In the past five years, many energy-efficient medium access protocols for all kinds of wireless networks (WSNs) have been proposed. Some recently developed protocols focus on sensor networks with low traffic requirements are based on so-called preamble sampling or low-power listening. The WiseMAC protocol is one of the first of this kind and still is one of the most energy-efficient MAC protocols for WSNs with low or varying traffic requirements. However, the high energy-efficiency of WiseMAC has shown to come at the cost of a very limited maximum throughput. In this paper, we evaluate the properties and characteristics of a WiseMAC implementation in simulation and on real sensor hardware. We investigate on the energy-consumption of the prototype using state-of-the-art evaluation methodologies. We further propose and examine an enhancement of the protocol designed to improve the traffic-adaptivity of WiseMAC. By conducting both simulation and real-world experiments, we show that the WiseMAC extension achieves a higher maximum throughput at a slightly increased energy cost both in simulation and real-world experiments.  相似文献   

3.
A localized algorithm for bi-connectivity of connected mobile robots   总被引:2,自引:0,他引:2  
Teams of multiple mobile robots may communicate with each-other using a wireless ad-hoc network. Fault-tolerance in communication can be achieved by making the communication network bi-connected. We present the first localized protocol for constructing a fault-tolerant bi-connected robotic network topology from a connected network, in such a way that the total movement of robots is minimized. The proposed distributed algorithm uses p-hop neighbor information to identify critical head robots that can direct two neighbors to move toward each other and bi-connect their neighborhood. Simulation results show that the total distance of movement of robots decreases significantly (e.g. about 2.5 times for networks with density 10) with our localized algorithm when compared to the existing globalized one. Proposed localized algorithm does not guarantee bi-connectivity, may partition the network, and may even stop at connected but not bi-connected stage. However, our algorithm achieved 100% success on all networks with average degrees ≥10, and over 70% success on sparse networks with average degrees ≥5.  相似文献   

4.
In this paper we introduce a general framework of related-key attack on block-wise stream ciphers which are suitable for the protection of multimedia and ubiquitous systems. As a case study, we show how our cryptanalytic framework is applied to a block-wise stream cipher TWOPRIME: we construct various related-key differentials of TWOPRIME and use them to show that recovering related keys of TWOPRIME can be performed with a data complexity of 214 known plaintext blocks and a time complexity of 232 8-bit table lookups. We expect that our general framework for a related-key attack would be useful tool for analyzing many of block-wise stream ciphers.  相似文献   

5.
Unified Modeling Language (UML) is widely used as a system level specification language in embedded system design. Due to the increasing complexity of embedded systems, the analysis and validation of UML specifications is becoming a challenge. UML activity diagram is promising to modeling the overall system behavior. However, lack of techniques for automated test case generation is one major bottleneck in the UML activity diagram validation. This article presents a methodology for automatically generating test cases based on various model checking techniques. It makes three primary contributions: First, we propose coverage-driven mapping rules that can automatically translate activity diagram to formal models. Next, we present a procedure for automatic property generation according to error models. Finally, we apply various model checking based test case generation techniques to enable efficient test case generation. Our experimental results demonstrate that our approach can reduce the validation effort drastically by reducing both test case generation time and required number of test cases to achieve a functional coverage goal.  相似文献   

6.
The fourth-order complex-lag polynomial Wigner–Ville distribution (PWVD) is extended to generate a high resolution time–frequency distribution for multicomponent signals in this paper. For signals with polynomial phase up to order four, the interferences between different components are reduced by the convolution in the frequency domain of the complex-lag PWVD. The complex-lag PWVD can achieve optimal energy concentration, and it is used in the inverse synthetic aperture radar (ISAR) imaging of maneuvering targets, where high quality instantaneous ISAR images are obtained. Simulated results demonstrate the effectiveness of the method.  相似文献   

7.
The development of the information systems should answer more and more to the problems of federated data sources and the problems with the heterogeneous distributed information systems. The assurance of data access security realized in the cooperative information systems with loose connection among local data sources is hard to achieve mainly for two reasons: the local data sources are heterogeneous (i.e. data, models, access security models, semantics, etc.) and the local autonomy of systems does not allow to create a global integrated security schema. The paper proposes to use one common set of access control concepts to support the access control management in security of heterogeneous information systems. The UML (Unified Modeling Language) concepts can be used to define and implement the most popular access control models, such as DAC, MAC or RBAC. Next, the concepts derived from different models can be joined to use one common approach comprehensible for each administrator of each cooperative information system in the federation.  相似文献   

8.
A beam tunnel for a 42 GHz, 200 kW gyrotron for an Indian TOKAMAK system has been designed. The initial design of the beam tunnel has been carried out on the basis of the required electron beam parameters at the interaction cavity and the electron beam simulation of the magnetron injection gun. The design optimization of the beam tunnel has been done with the help of 3-D simulation software CST-Microwave Studio. In the simulation, the absorption, the reflection and the transmission of RF power by the beam tunnel have been analyzed. Three different lossy ceramics, Al2O3–SiC, AlN–SiC and BeO–SiC have been investigated during the simulation. The simulation results obtained with CST-Microwave Studio have been validated with another 3-D simulation software HFSS. The Q value of the beam tunnel for different ceramic material has also been analyzed to investigate the parasitic mode excitation in the beam tunnel.  相似文献   

9.
Several routing structures have been proposed for data gathering in a wireless sensor network. They are considered to be near-optimal with respect to energy efficiency or delivery delay, but they overlook the construction cost of a routing tree which may make trouble in implementation. Our primary goal in this work is to construct a routing tree with negligible cost, which performs as well as those near-optimal schemes. First, we propose a distributed and localized framework for tree construction called Local Parent Designation (LPD), where the node status information is exchanged locally and decision based on the local information leads us to construct a routing tree. Secondly, we extend LPD to so called LPD-Local Fix (LPD-LF) to reduce further the construction cost with less local information exchange. Simulation results validate that our goal is achieved.  相似文献   

10.
Based on the important role of optical switching in all-optical communications, a novel 3 × 3 optical switch is proposed using Phase Spatial Light Modulators (PSLM), Polarizing Beam-Splitters (PBS), mirrors, and Quarter-Wave Plates (QWP). This new configuration of optical switch has the advantages of being compact in structure, efficient in performance, and insensitive to polarization of the signal beam. Moreover, the functions of the 3 × 3 optical switch have been implemented bidirectionally in free-space. According to the routing-state table of the polarization-independent 3 × 3 optical switch, its operational processes are analyzed, and the results show that the experimental module of the 3 × 3 optical switch can connect an arbitrary output port to any input port beams. Simultaneously, the module is scalable to large array sizes and has the capability of reconfiguration. Therefore, it should be helpful in the design of a large-scale switching matrix.
Jun-Bo YangEmail:
  相似文献   

11.
In this paper, a synthesized design of the magnetron injection gun (MIG) for a 200 kW, 42 GHz gyrotron is presented. The synthesis steps involve the selection of the type of the MIG, the development of the design criteria, the selection of initial design parameters and the development of a program for the estimation of the synthesized parameters for the MIG design. The presented approach estimates the cathode, the beam and the anode parameters, enabling one to build a synthesis model of a complete MIG system.  相似文献   

12.
Wireless sensor nodes span a wide range of applications. This paper focuses on the biomedical area, more specifically on healthcare monitoring applications. Power dissipation is the dominant design constraint in this domain. This paper shows the different steps to develop a digital signal processing architecture for a single channel electrocardiogram application, which is used as an application example. The target power consumption is 100 μW as that is the power energy scavengers can deliver. We follow a bottleneck-driven approach: first the algorithm is tuned to the target processor, then coarse grained clock-gating is applied, next the static as well as the dynamic dissipation of the digital processor is reduced by tuning the core to the target domain. The impact of each step is quantified. A solution of 11 μW is possible for both radio and DSP running the electrocardiogram algorithm.
Jef Van MeerbergenEmail:
  相似文献   

13.
A method is presented to synthesize wideband linear-phase finite-impulse-response (FIR) filters with a piecewise-polynomial-sinusoidal impulse response. The method is based on merging the earlier synthesis scheme proposed by the authors to design piecewise-polynomial filters with the method proposed by Chu and Burrus. The method uses an arbitrary number of separately generated center coefficients instead of only one or none as used in the method by Chu–Burrus. The desired impulse response is created by using a parallel connection of several filter branches and by adding an arbitrary number of center coefficients to form it. This method is especially effective for designing Hilbert transformers by using Type 4 linear-phase FIR filters, where only real-valued multipliers are needed in the implementation. The arithmetic complexity is proportional to the number of branches, the common polynomial order for each branch, and the number of separate center coefficients. For other linear-phase FIR filter types the arithmetic complexity depends additionally on the number of complex multipliers. Examples are given to illustrate the benefits of this method compared to the frequency-response masking (FRM) technique with regard to reducing the number of coefficients as well as arithmetic complexity.  相似文献   

14.
In this paper, we first investigate the power spectral densities (PSD) of bipolar modulated Direct Sequence Ultra Wide Band (DS-UWB) signals using various pulse shapes under the FCC UWB emission mask. Considered pulse shapes are the first five derivatives of the Gauss pulse (p1, p2, p3, p4 and p5), the first four orthogonal modified Hermite waveforms, and Daubechies wavelets (db-q). It is observed in the PSD results that p4 and p5 Gauss pulses, the Daubechies (db-q) for q>4 comply with the FCC UWB rule by selecting proper values for the pulse duration. Then, we derive the pulse shape dependent probability of error expression for bipolar DS-UWB signals over the standard UWB channel. The five pulse shapes (p4, p5, db-5, db-6 and db-7) complying with the FCC emission mask are numerically compared by using the derived probability of error expression over the CM1 model of the Standard UWB channel. Results reveal that the Daubechies have better performance than those of the two Gauss pulses.  相似文献   

15.
In this paper, we study time-parallel simulation of wireless networks based upon the concept of the perturbation induced by a networking event and present a layer-by-layer analysis of the impact of perturbations on the wireless network. This analysis allows us to propose several methods to improve the accuracy of time-parallel simulation. We describe an implementation based on the widely used ns-2 simulator and on the iterative extension of the warmup period. We introduce a method for initial state approximation which can improve the accuracy of the simulation for table-driven ad hoc routing protocols. A series of experiments show that on typical scenarios time-parallel simulation leads to a significant speedup while maintaining a high level of accuracy.  相似文献   

16.
A gain enhancement technique for a pseudo differential OTA based on voltage combiner, suitable for sub-1 V supply is presented in this letter. The proposed technique uses a G m boosted voltage combiner. Unlike the typical voltage combiner which has an approximated gain of \(2\,\frac{{\text{V}}}{{\text{V}}}\), this voltage combiner can produce gain more than \(5\,\frac{{\text{V}}}{{\text{V}}}\). So it help us achieve nearly 60 dB DC gain with 250 kHz UGB for the pseudo differential OTA at a capacitive load of 10 pF. Power dissipation is very low i.e. 716 nW at supply of 0.5 V. So as to facilitate maximum swing at 0.5 V supply and lower the power consumption, MOS transistors are biased in weak/moderate inversion. The OTA is designed in standard 45 nm CMOS process. Phase margin of is more than \(55^{\circ }\) for a typical load of 10 pF. The input referred noise is \(150\,\upmu {\text{V}}{/}\sqrt{{\text{Hz}}}\) at 10 Hz and slew rate \(0.02\,{\text{V}}{/}\upmu{\text{s}}\) for 10 pF load.  相似文献   

17.
A causal realization of an inverse system can be unstable, and an anti-causal realization is used to deal with this problem to provide a numerically stable procedure to realize the inverse system and compute its input signal. In this paper, we consider the anti-causal realization of the inverse of discrete-time linear periodic systems obtained by an outer-inner factorization approach. It presents an analysis and understanding of the inverse system error caused by different parts of the system components. The analysis shows that the inverse system error due to the mismatching of the system initial state in the anti-causal inverse system is inevitable in practical computations.  相似文献   

18.
A perturbation-based Fourier series model is proposed to approximate the nonlinear distortion in weakly nonlinear circuits. This general model is applicable to any set of multi-variable state equations that completely describe a nonlinear circuit. This model is applied to a common emitter amplifier circuit wherein the transistor is represented by Ebers–Moll nonlinear current equations. Appropriate state variables are defined, then the linear and nonlinear parts of the Ebers–Moll current equations are separated, and a small perturbation parameter is incorporated into the nonlinear part. Now these current equations are incorporated into the set of KCL, KVL equations defined for the circuit and the state variables are perturbatively expanded. Hence, multi-variable state equations are obtained from these equations. The state variables are approximated up to first order through Fourier series expansion, as described in the proposed model. The main advantage of the proposed model is that it is simple and straightforward approach to analyze weakly nonlinear circuits, as it involves matrix computations and the calculations of exponential Fourier coefficients.  相似文献   

19.
The design and the numerical simulation of the 95 GHz, 2 MW gyrotron for various kinds of communication, sensing and security applications is presented. The gyrotron is designed for the TE24,8 operating mode. Various in-house developed and commercially available computer codes are used for the design purpose. A 4.25 MW electron gun is designed for the 2 MW of output power. The mode selection, cold cavity and the beam–wave interaction analysis are discussed for the design of weakly tapered open resonator type of interaction cavity. The parametric analysis of the interaction cavity and the electron gun is also presented.  相似文献   

20.
This paper presents simulation results for a sliding-IF SiGe E-band transmitter circuit for the 81–86 GHz E-band. The circuit was designed in a SiGe process with f T  = 200 GHz and uses a supply of 1.5 V. The low supply voltage eliminates the need for a dedicated transmitter voltage regulator. The carrier generation is based on a 28 GHz quadrature voltage oscillator (QVCO). Upconversion to 84 GHz is performed by first mixing with the QVCO signals, converting the signal from baseband to 28 GHz, and then mixing it with the 56 GHz QVCO second harmonic, present at the emitter nodes of the QVCO core devices. The second mixer is connected to a three-stage power amplifier utilizing capacitive cross-coupling to increase the gain, providing a saturated output power of +14 dBm with a 1 dB output compression point of +11 dBm. E-band radio links using higher order modulation, e.g. 64 QAM, are sensitive to I/Q phase errors. The presented design is based on a 28 GHz QVCO, the lower frequency reducing the phase error due to mismatch in active and passive devices. The I/Q mismatch can be further reduced by adjusting varactors connected to each QVCO output. The analog performance of the transmitter is based on ADS Momentum models of all inductors and transformers, and layout parasitic extracted views of the active parts. For the simulations with a 16 QAM modulated baseband input signal, however, the Momentum models were replaced with lumped equivalent models to ease simulator convergence. Constellation diagrams and error vector magnitude (EVM) were calculated in MATLAB using data from transient simulations. The EVM dependency on QVCO phase noise, I/Q imbalance and PA compression has been analyzed. For an average output power of 7.5 dBm, the design achieves 7.2% EVM for a 16 QAM signal with 1 GHz bandwidth. The current consumption of the transmitter, including the PA, equals 131 mA from a 1.5 V supply.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号