首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this letter, we propose an improved Quasi-orthogonal space-time block code (QOSTBC) with full rate, full diversity, linear decoding and better peak-to-average power ratio (PAPR). Constellation rotation is used to the input symbol vector to ensure full diversity, and then the information symbol vector is interleaved in coordinates and pre-grouped by using a Given rotation matrix. The performance is evaluated by numerical experiments. The PAPR of our proposed QOSTBC is lower than that of CI-QOSTBC in Khan and Rajan (IEEE Trans Inf Theory 52(5):2062–2091, 2006). Meanwhile, the Bit-error-rate versus Signal-to-noise-ratio of our proposed QOSTBC is better than those of OSTBC (Tarokh et al. in IEEE Trans Inf Theory 45(5):1456–1467, 1999) QOSTBC (Jafarkhani in IEEE Trans Wirel Commun 49(1):1–4, 2001), G-QOSTBC (Park et al. in IEEE Commun Lett 12(12):868–870, 2008), slightly better that of the CI-QOSTBC, and as same as that of the recently proposed Minimum Decoding Complexity QOSTBCs (MDC-QOSTBC) in Yuen et al.(IEEE Trans Wirel Commun 4(5):2089–2098, 2005), Wang and Xia (IEEE Trans Inf Theory 55(3):1104–1130, 2009). Compared with MDC-QOSTBC, the proposed QOSTBC has simpler code construct and lower decoding complexity.  相似文献   

2.
We present nontrivial utilization methods of a pair of symbolic algebraic algorithms (Yamada et?al. in IEEE Trans Signal Process 46:1639?C1664, 1998; Yamada and Bose in IEEE Trans Circuits Syst 1 Fundam Theory Appl 49:298?C304, 2002) which were developed originally for multidimensional phase unwrapping and zero-distribution problems. Given the minor subspace of the covariance matrix of the data measured at a uniform linear array of sensors, the proposed methods provide estimates of the Directions-of-Arrival (DOA) distribution of multiple narrowband signals, i.e., the number of DOA in an arbitrarily specified range, without using any numerical search for each direction of arrival. The proposed methods can serve as powerful mathematical tools to extract global information in the high-resolution DOA estimation problems.  相似文献   

3.
Space-time block codes (STBC) using generalized coordinate interleaved orthogonal designs (GCIOD) proposed by Khan and Rajan (IEEE Trans Inf Theory 52(5):2062–2091, 2006) allow single-complex symbol decoding and offer higher data rates than orthogonal STBC. In this paper, we present an exact closed-form formula (i.e., not in integral form) for the average symbol pair-wise error probability of GCIODs derived in quasi-static frequency-nonselective independent identically distributed Nakagami- \(m\) fading channels. By using the formula, a tight union bound (UB) on symbol error rate (SER) is presented. Extensive simulation results show that the curves for the UB are asymptotically tight with the simulated SER curves for various antenna configurations and different modulations. The UB thus can be used to accurately predict and optimize the performance of GCIODs without the need of time-consuming simulations.  相似文献   

4.
Recently, some works have shown that it was possible to obtain quite good bit error rate performances over an additive white Gaussian noise channels with chaotic systems. In this research field, this paper proposes new insights for the chaos-coded modulation (CCM) schemes originally proposed by Kozic et al. (2003; IEEE Trans Circuits Syst Regul Pap 53:2048–2059, 2006). A detailed study of the distance spectrum of such schemes is proposed and an approximation of its distribution by means of Gaussian or Rayleigh mixtures is given. Furthermore, using these approximate distributions, a complete study of the performances of these CCM schemes when they are concatenated with a space–time block code is proposed. Accurate bounds are obtained even in the case of time-selective channels.  相似文献   

5.
An adaptive power control algorithm is proposed to maximize the sum rate of multiple interfering links under minimum rate constraints. The proposed algorithm efficiently minimizes the outage probability of total network system by using an iterative algorithm with complexity of \(O\left( {N^{2}\ln N} \right) \) , where \(N\) is the number of interfering links. By Monte Carlo simulations, it is shown that the proposed algorithm guarantees the optimum outage probability and the system sum rate above 80 %, compared with the geometric programming (Chiang et al in IEEE Trans Wirel Commun 6(7):2640–2651, 2007).  相似文献   

6.
A multiplierless architecture based on algebraic integer representation for computing the Daubechies 4-tap wavelet transform for 1-D/2-D signal processing is proposed. This architecture improves on previous designs in a sense that it minimizes the number of parallel 2-input adder circuits. The algorithm was achieved using numerical optimization based o exhaustive search over the algebraic integer representation. The proposed architecture furnishes exact computation up to the final reconstruction step, which is the operation that maps the exactly computed filtered results from algebraic integer representation to fixed-point. Compared to Madishetty et al. (IEEE Trans Circuits Syst I (Accepted, In Press), 2012a), this architecture shows a reduction of \(10\cdot n-3\) adder circuits, where \(n\) is the number of wavelet decomposition levels. Standard \(512\times 512\) images Mandrill, Lena, and Cameraman were submitted to digital realizations of both proposed algebraic integer based as well as fixed-point schemes, leading to quantifiable comparisons. The design is physically implemented for a 4-level 2-D decomposition using a Xilinx Virtex-6 vcx240t-1ff1156 FPGA device operating at up to a maximum clock frequency of 263.15 MHz. The FPGA implementation is tested using hardware co-simulation using an ML605 board with clock of 100 MHz. A 45 nm CMOS synthesis shows improved clock frequency of better than 500 MHz for a supply voltage of 1.1 V.  相似文献   

7.
Node replication attack possess a higher level of threat in wireless sensor networks. A replicated node takes advantage of having legal identity of the compromised node to control the network traffic and inject malicious information into the network. Several techniques have been proposed to detect node replication in wireless sensor networks. However, in most of these techniques, the responsibility for replica detection lies either with the base station or a few randomly selected witness nodes. In this paper, we propose a technique for detecting replicas without the participation of base station and witness nodes. In the proposed scheme, each node is assigned with a color (value), which is unique within its neighborhood. A color conflict within the neighborhood of a node is detected as a replica. We made a comparison of the proposed scheme with RED (Conti et al. in IEEE Trans Dependable Secure Comput 8(5):685–698, 2011), LSM (Parno et al. in Proceedings of IEEE symposium on security and privacy. IEEE, pp 49–63, 2005), and SET (Choi et al. in Proceedings of third international conference on security and privacy in communications networks and the workshops, SecureComm 2007. IEEE, pp 341–350, 2007). Parameters considered for comparison are detection probability, communication complexity and storage overhead. We observed that the proposed scheme has a higher detection probability, and lower communication and storage overhead.  相似文献   

8.
This paper proposes a palm-dorsal vein recognition method with local Gabor phase features, which includes a second identification for more accuracy. First, we extract quadrant-bit codes from the 2D Gabor transformation of a vein image. Then using the Histogram of the Local Gabor Phase XOR Pattern (HLGPXP) obtains the vein texture features, which combines the global information and the local information. Finally, the chi-square distance is adopted for recognition. Using the texture features based on the local Gabor codes above, the Second Identification (SI) segments the vein images and regards the non-overlap degree between images as a matching criterion. The experimental results show the Error Equation Rate (EER) of our method (HLGPXP-SI) decreases by 11.7 %, 4.8 % respectively than Modified Local Binary Pattern (MLBP) [1], Local Gabor Binary Pattern (LGBP) [2] on Database A (204 high-quality palm-dorsal vein images from 68 hands), and on Database B (400 low-quality palm-dorsal vein images from 100 hands), it decreases by 18.94 %, 15.51 % respectively than Selected Gabor Phase and Amplitude Features (SGPAF) [3], Direct Gabor Phase Coding (DGPC) [4].  相似文献   

9.
We present a positive obfuscation result for a traditional cryptographic functionality. This positive result stands in contrast to well-known impossibility results (Barak et al. in Advances in Cryptology??CRYPTO??01, 2002), for general obfuscation and recent impossibility and implausibility (Goldwasser and Kalai in 46th IEEE Symposium on Foundations of Computer Science (FOCS), pp.?553?C562, 2005) results for obfuscation of many cryptographic functionalities. Whereas other positive obfuscation results in the standard model apply to very simple point functions (Canetti in Advances in Cryptology??CRYPTO??97, 1997; Wee in 37th ACM Symposium on Theory of Computing (STOC), pp.?523?C532, 2005), our obfuscation result applies to the significantly more complex and widely-used re-encryption functionality. This functionality takes a ciphertext for message m encrypted under Alice??s public key and transforms it into a ciphertext for the same message m under Bob??s public key. To overcome impossibility results and to make our results meaningful for cryptographic functionalities, our scheme satisfies a definition of obfuscation which incorporates more security-aware provisions.  相似文献   

10.
Focusing on a large-scale wireless sensor network with multiple base stations (BS), a key management protocol is designed in this paper. For securely relaying data between a node and a base station or two nodes, an end-to-end data security method is adopted by this protocol. Further employing a distributed key revocation scheme to efficiently remove compromised nodes then forms our key management protocol celled multi-BS key management protocol (MKMP). Through performance evaluation, we show that MKMP outperforms LEDS Ren et al. (IEEE Trans Mobile Comput 7(5):585–598, 2008) in terms of efficiency of resilience against the node capture attack. With the analysis of key storage overheads, we demonstrate that MKMP performs better than mKeying Wang et al. (A key management protocol for wireless sensor networks with multiple base stations. In: Procceedings of ICC'08, pp 1625–1629, 2008) in terms of this overhead.  相似文献   

11.
In this paper, we propose a green radio resource allocation (GRRA) scheme for LTE-advanced downlink systems with coordinated multi-point (CoMP) transmission to support multimedia traffic. The GRRA scheme defines a green radio utility function, which is composed of the required transmission power, assigned modulation order, and the number of coordinated transmission nodes. By maximizing this utility function, the GRRA scheme can effectively save transmission power, enhance spectrum efficiency, and guarantee quality-of-service requirements. The simulation results show that when the traffic load intensity is greater than 0.7, the GRRA scheme can save transmission power by more than 33.9 and 40.1 %, as compared with the conventional adaptive radio resource allocation (ARRA) scheme (Tsai et al. in IEEE Trans Wireless Commun 7(5):1734–1743, 2008) with CoMP and the utility-based radio resource allocation (URRA) scheme (Katoozian et al. in IEEE Trans Wireless Commun 8(1):66–71, 2009) with CoMP, respectively. Besides, it enhances the system throughput by approximately 5.5 % and improves Jain’s fairness index for best effort users by more than 155 % over these two ARRA and URRA schemes.  相似文献   

12.
This paper presents the design of a new reduced order observer to estimate the state for a class of linear time-invariant multivariable systems with unknown inputs. The proposed design approach is a combination of the approaches proposed by Hou and Muller (IEEE Trans. Autom. Control 37:871–875, 1992) and Boubaker (Int. J. Autom. Control Syst. Eng. 5:45–51, 2005); matrix decompositions, state transformations, and substitutions based on coordinate changes are used. It is shown that the problem of reduced order observers for linear systems with unknown inputs can be reduced to a standard one (the unknown input vector will not interfere in the observer equations). The effectiveness of the suggested design algorithm is illustrated by a numerical example (aircraft lateral motion), and, for the same aircraft dynamics, we compare our new observer with other already existing observers from the existence conditions and dynamic characteristics point of view; the superiority of the new designed observer is demonstrated.  相似文献   

13.
In this note, we show the existence of constant-round computational zero-knowledge proofs of knowledge for all $\mathcal {NP}$ . The existence of constant-round zero-knowledge proofs was proven by Goldreich and Kahan (Journal of Cryptology, 1996), and the existence of constant-round zero-knowledge arguments of knowledge was proven by Feige and Shamir (CRYPTO, 1989). However, the existence of constant-round zero-knowledge proofs of knowledge for all $\mathcal {NP}$ is folklore, to the best of our knowledge, since no proof of this fact has been published.  相似文献   

14.
The basic bandgap reference voltage generator, BGR, is thoroughly analyzed and relations are reconstructed considering dependency of bandgap energy, Eg, to absolute temperature. The previous works all consider Eg as a constant, independent of temperature variations. However, Eg varies around 25 meV when the temperature is increased from 2 to 92 °C. In this paper the dependence of Eg to absolute temperature, based on HSPICE mosfet models in HSPICE MOSFET Models Manual (Version X-2005.09, 2005), is approximated by a third-order polynomial using Lagrangian interpolating method within the temperature range of 2–92 °C. Accurate analysis on the simplified polynomial reveals that the TC of VBE must be corrected to ?1.72 mV/°K at 27 °C which has been formerly reported about ?1.5 mV/°K in Razavi (Design of analog CMOS integrated circuits, 2001) and Colombo et al. (Impact of noise on trim circuits for bandgap voltage references, 2007), ?2 mV/°K in Gray et al. (Analysis and design of analog integrated circuits, 2001), Leung and Mok (A sub-1-V 15-ppm/°C CMOS bandgap voltage reference without requiring low threshold voltage device, 2002), Banba et al. (A CMOS bandgap reference circuit with sub-1-V operation, 1999), and ?2.2 mV/°K in Jones and Martin (Analog integrated circuit design, 1997), Tham and Nagaraj (A low supply voltage high PSRR voltage reference in CMOS process, 1995). Another important conclusion is that the typical weighting coefficient of TC+ and TC? terms is modified to about 19.84 at 27 °C temperature from otherwise 16.76, when Eg is considered constant, and also 17.2, in widely read literatures, (Razavi in Design of analog CMOS integrated circuits, 2001). Neglecting the temperature dependence of Eg might introduce a relative error of about 20.5 % in TC of VBE. Also, resistance and transistor size ratios, which denote the weighting coefficient of TC+ term, might be encountered to utmost 20.3 % error when the temperature dependence of Eg is ignored.  相似文献   

15.
16.
We take a closer look at several enhancements of the notion of trapdoor permutations. Specifically, we consider the notions of enhanced trapdoor permutation (Goldreich, Foundation of Cryptography: Basic Applications, 2004) and doubly enhanced trapdoor permutation (Goldreich, Computational Complexity: A Conceptual Perspective, 2011) as well as intermediate notions (Rothblum, A Taxonomy of Enhanced Trapdoor Permutations, 2010). These enhancements arose in the study of Oblivious Transfer and NIZK, but they address natural concerns that may arise also in other applications of trapdoor permutations. We clarify why these enhancements are needed in such applications, and show that they actually suffice for these needs.  相似文献   

17.
We provide a more general and, in our eyes, simpler variant of Prabhakaran, Rosen and Sahai’s (FOCS ’02, pp. 366–375, 2002) analysis of the concurrent zero-knowledge simulation technique of Kilian and Petrank (STOC ’01, pp. 560–569, 2001).  相似文献   

18.
Bio-inspired edge detection using fuzzy logic has achieved great attention in the recent years. The bacterial foraging (BF) algorithm, introduced in Passino (IEEE Control Syst Mag 22(3):52–67, 2002) is one of the powerful bio-inspired optimization algorithms. It attempts to imitate a single bacterium or groups of E. Coli bacteria. In BF algorithm, a set of bacteria forages towards a nutrient rich medium to get more nutrients. A new edge detection technique is proposed to deal with the noisy image using fuzzy derivative and bacterial foraging algorithm. The bacteria detect edge pixels as well as noisy pixels in its path during the foraging. The new fuzzy inference rules are devised and the direction of movement of each bacterium is found using these rules. During the foraging if a bacterium encounters a noisy pixel, it first removes the noisy pixel using an adaptive fuzzy switching median filter in Toh and Isa (IEEE Signal Process Lett 17(3):281–284, 2010). If the bacterium does not encounter any noisy pixel then it searches only the edge pixel in the image and draws the edge map. This approach can detect the edges in an image in the presence of impulse noise up to 30%.  相似文献   

19.
A beamforming system based on two-dimensional (2-D) spatially bandpass infinite impulse response (IIR) plane wave filtering is presented in a multi-dimensional signal processing perspective and the implementation details are discussed. Real-time implementation of such beamforming systems requires modeling of computational electromagnetics for the antennas, radio frequency (RF) analog design aspects for low-noise amplifiers (LNAs), mixed-signal aspects for signal quantization and sampling and finally, digital architectures for the spatially bandpass plane wave filters proposed in Joshi et al. (IEEE Trans Very Large Scale Integr Syst 20(12):2241–2254, 2012). Multi-dimensional spatio-temporal spectral properties of down-converted RF plane wave signals are reviewed and derivation of the spatially bandpass filter transfer function is presented. An example of a wideband antipodal Vivaldi antenna is simulated at 1 GHz. Potential RF receiver chains are identified including a design of a tunable combline microstrip bandpass filter with tuning range 0.8–1.1 GHz. The 1st-order sensitivity analysis of the beam filter 2-D $\mathbf z $ -domain transfer function shows that for a 12-bits of fixed-point precision, the maximum percentage error in the 2-D magnitude frequency response due to quantization is as low as $0.3\,\%$ . Monte-Carlo simulations are used to study the effect of quantization on the bit error rate (BER) performance of the beamforming system. 5-bit analog to digital converter (ADC) precision with 8-bit internal arithmetic precision provides a gain of approximately 16 dB for a BER of $10^{-3}$ with respect to the no beamforming case. ASIC Synthesis results of the beam filter in 45 nm CMOS verifies a real time operating frequency of 429 MHz.  相似文献   

20.
The adaptive packet aggregation algorithm (AAM) has been shown to have a superior performance over the first-in first-out (FIFO) algorithm in terms of the throughput and delay (Deng and Davis in International conference on wireless communications and signal processing 2013 (WCSP2013), Hangzhou, China, pp 449–504, 2013; 20th IEEE symposium on communications and vehicular technology in the Benelux 2013 (IEEE SCVT 2013), Namur, 2013). In this paper, we will show that when compared with the FIFO and smallest-size first-served algorithms, the AAM algorithm has the best performances in terms of the trade-off between the overhead saving and the average delay under mixed traffic loads in wireless LANs. The simulation results show that the AAM algorithm produces the largest average aggregate packet size.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号