首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到12条相似文献,搜索用时 0 毫秒
1.
With the increasing requirement of military and security, the technology of information hiding for speech becomes a hotspot and difficulty in the fields of speech signal processing and information security, which is developing rapidly. In order to stand against the stegano-analysis, the paper proposed an optimal information hiding algorithm for speech in the Fractional Fourier Transform (FrFT) domain based on the Minimum Mean Square Error (MMSE) criterion. The results of simulation and experiments show that speech modified by the proposed algorithm has no remarkable changes both in time and frequency domains, which can effectively resist the time and frequency analysis, Otherwise, the algorithm is robust to general signal process attack, and the difference is imperceptible between the original and modified speech.  相似文献   

2.
该文基于Clenshaw递归公式以及离散余弦自身的对称性提出任意长离散余弦变换(DCT)的一种并行递归快速算法,给出了该算法的滤波器实现结构;与现有的其它递归算法以及基于算术傅里叶变换的余弦变换算法进行了计算复杂度的比较分析,结果表明该文算法运算量大大减少。该递归计算的滤波器结构使算法非常适合大规模集成电路(VLSI)实现。  相似文献   

3.
This research illustrates a precise linear and elliptical antenna array design for synthesising the optimal far-field radiation pattern in the fifth-generation (5G) communication spectrum using a meta-heuristic optimisation technique known as black widow optimisation (BWO). 5G communication is an emerging technology with revolutionary changes in the wireless communication system with ultra-high data rate, enhanced capacity, low latency and good quality of service. An accurate antenna array design for an ideal far-field radiation pattern synthesis with a suppressed side lobe level (SLL) value and half power beam width (HPBW) is the most crucial aspect of 5G communications. A suppressed SLL is necessary to reduce interference in the entire side lobe region, whereas a low HPBW is required for long-distance communication. Here, the BWO is employed to find the optimal feeding current to each array element to lower the SLL and the HPBW value. The BWO algorithm sustains impeccable equity between the exploration and exploitation stages to impact different potential regions of the search space and generate new solutions to attain the global optima by evading the trap of local optima. The design examples of the linear antenna array (LAA) and elliptical antenna array (EAA) are illustrated in this article by applying the optimal feeding currents to each array element. Compared to the uniform antenna array and methodologies described in the recently published literature, the results obtained utilising the BWO algorithm for designing the LAAs and EAAs demonstrate a substantial development in the reduction of SLL and HPBW.  相似文献   

4.
Safety message dissemination is crucial in vehicular ad hoc networks (VANETs) for road safety applications. Vehicles regularly transmit safety messages to surrounding vehicles to prevent road accidents. However, changing vehicle mobility and density can cause unstable network conditions in VANETs, making it inappropriate to use a fixed contention window (CW) for different network densities. It has been proposed a 1-D Markov model under unsaturation conditions to analyze the performance of the system with varying CWs under changing vehicle densities. Additionally, it introduces the use of cooperative communication (CoC) to relay failed safety messages. In CoC, two control packets, namely, negative acknowledge (NACK) and enable to cooperate (ETC), are utilized. The proposed analytical model named cooperative communication for safety message dissemination (CoC-SMD) is used to calculate throughput and average packet delay for varying CW and different packet size. The simulation confirms the validity of the analytical results and show significant improvement in the metrics through the use of varying CW sizes and CoC compared with existing techniques.  相似文献   

5.
Recently, Liu et al came up with an authentication with key agreement scheme for securing communication over the low‐earth‐orbit satellite communication systems. However, this paper demonstrates that this scheme cannot provide perfect forward secrecy or defend against the smart card stolen attack, and has some very bad design defects, making it unpractical. Thus, to design a truly secure authentication scheme for satellite communication systems, this paper presents a new scheme, making use of the advantages of elliptic curve cryptography and symmetric cryptography. The security analyses by the widely used BAN logic and heuristic discussions demonstrate that our new scheme possesses perfect security properties and can defend against various well‐known malicious attacks. Moreover, our new scheme allows users to update passwords locally in accordance with their wishes, achieving a good user experience.  相似文献   

6.
A wireless type of chip-to-chip communication (WCC) technology is proposed as the next generation of 3D semiconductor technology. To demonstrate the feasibility of this technology, we designed a coil, transmitter and receiver for wireless chip-to-chip communication using a 50-nm digital CMOS process. The coil is designed using inductive coupling with design parameters that include the number of turns, the metal width, and the space between adjacent metal lines. A differential transceiver structure is proposed for the WCC technology. The transmitter of the transceiver acts as a termination and bias circuit for the receiver while the transceiver is operating as a receiver. The receiver is designed with a typical differential amplifier and a latch to recover the transmitted original digital signal. The proposed transceiver and coil for the proposed WCC technology is implemented using commercial 50-nm digital CMOS technology. Experimental results successfully demonstrate the feasibility of the WCC technology.  相似文献   

7.
Underwater wireless sensor networks (UWSNs) contain quite a lot of components such as vehicles and sensors that are deployed in a specific acoustic area to perform collaborative monitoring and data collection errands. These networks are adopted interactively between diverse nodes and ground‐based stations. Currently, UWSNs face problems and challenges that pertain to limited bandwidth, media access control, high propagation delay, 3D topology, spectrum sensing, resource utilization, routing, and power constraints. This proposal deals with the intelligent spectrum sensing in underwater cognitive sonar communication networks (CSCN). Here, the improved performance of spectrum sensing in underwater communication is attained by optimizing the cooperative spectrum sensing and data transmission. The parameters of system like subchannel allocation and transmission power is optimized by a new hybrid meta‐heuristic algorithm by integrating the concepts of deer hunting optimization algorithm (DHOA) and lion algorithm (LA) termed as lion‐enabled DHOA (L‐DHOA). The main intention of optimizing these parameters is to maximize the spectrum efficiency (SE) and energy efficiency (EE) of the underwater channel communication system. From the analysis, with respect to convergence rate, minimum detection probability, and local sensing time, it is proved that the novel hybrid optimization algorithm keeps a great role in making the trade‐off between the SE and EE in underwater channel modeling.  相似文献   

8.
基于级数反演的弹载SAR下降段CZT成像算法   总被引:1,自引:0,他引:1  
导弹下降段飞行速度快、飞行轨迹复杂,并且弹上成像实时性要求较高,给弹载SAR成像算法提出了新的要求。针对上述问题,该文提出了基于级数反演的CZT成像算法。文中首先给出了下降段点目标斜距表达式,并用泰勒级数对斜距进行高阶展开,接着用级数反演法得到了信号2维频谱高阶近似表达式,然后详细分析了频谱中各项的空变性对成像的影响,并在此基础上推导了改进的CZT成像算法并分析了其运算量。该算法能够精确校正空变的距离徙动,所有操作都由快速傅里叶变换和相位点乘完成,具有较高的效率。仿真结果证明,该文算法能够在下降段实现全孔径高精度成像。  相似文献   

9.
In this paper, we propose an anti-noise modem based on the improved M-ary position phase shift keying (MPPSK) for visible light communication (VLC) systems. The line spectral interferences in the original MPPSK are theoretically analyzed and approximately mitigated by adopting a set of improved waveform samples. Then, within one symbol duration, the peak envelopes of the received signals are captured at each of synchronization bit with a quantity of sampling offsets to improve the proportion of the reliable data tones. In addition, a novel demodulation scheme using an amplitude-position detector based on soft decision is proposed to recover the MPPSK symbols, which can minimize the contamination influence of channel noise on symbol decision. With this scheme, the false alarm error and wrong slot error caused by the multipath fading in VLC channel can be effectively corrected and the bit error rate (BER) performance of the system is significantly improved. Simulation results demonstrate that the proposed scheme reduce the required signal-to-noise ratio (SNR) at least by 2 dB for BER = 10−4, which show the feasibility and validity of this anti-noise modem.  相似文献   

10.
蒋文丰 《电讯技术》2016,56(3):284-289
天线跟踪功能是车载动中通系统( SOTM)提供无线通信能力的前提,相控阵天线能提供较好的跟踪性能,但是存在波束扫描范围有限的问题。为实现相控阵天线全方位跟踪能力,提出了一种相控阵+伺服辅助的方法。给出了算法数据处理流程,并完成了原理样机设计。根据原理样机工作原理给出了跟踪角误差计算公式,测试结果与计算结果相符。测试结果表明:在(57.88~115.76)。/s角速度下,通信链路信噪比损失小于0.5 dB。  相似文献   

11.
Multihop device-to-device (D2D) communication is a promising advancement since it allows wireless users in close proximity to communicate directly with one another without using base stations (BSs). With two nearby users, this technology intends to keep up with the accelerating development of mobile devices and the rising demands of local traffic loads. High-data-rate short-range transmission is made possible by this paradigm, which also lowers network backhaul expenses while improving end-user experience, spectral efficiency (SE) and network coverage. In order to maximize the cell's overall sum rates, this article examines the problem of selecting the optimal M-D2D linkages and cellular users (CUs) to form spectrum-sharing partners while taking quality of service (QoS) and energy efficiency (EE) needs into consideration. This study examines the use of a channel assignment system and a power allocation technique to manage interference in D2D communication scenarios involving many hops (more than one hop). The suggested channel assignment approach is based on the Hungarian method, but the power allocation system is based on the time-efficient enhanced Harris hawks optimization (HHO) and red fox (RF) algorithms. A genetic algorithm (GA)-based methodology and various baseline approaches are used to compare the effectiveness of the suggested system. Because it combines exploitation and exploration using a memory-based local search methodology and a perturbation mechanism, the suggested approach outperforms the GA in simulations. The results clearly demonstrate that the suggested method increases EE by up to 13% by producing the appropriate channel and power assignment for CUs and M-D2D users.  相似文献   

12.
在分析大气衰减效应对无线光(FSO)通信性能影响 时,获取及时准确的能见度数据是关键。首先,分析了 目前获取能见度方法的不足之处,提出由激光雷达(LADAR)反演得到的数据可以更好地满足 FSO通信性能分析的 需求;其次,在介绍了利用LADAR观测数据反演水平能见度方法的基础上,以烟台1月18日典型天气为 例,获取了全天的能见度数据,并结合80%的相对湿度阈值对雾霾的转化过程进行分析 ;最后,结合 实测数据,通过设置适当的通信系统参数,对该日天气条件下的误码率(BE R)进行了实时分析,并得出雾比霾更 容易引起通信系统性能的降低。本文所得结论,将为建立实际的FSO通信链路提供 指导。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号