In the bit-interleaved coded modulation with iterative decoding,it is desired that any two Hamming neighbors,i.e..signal constellation points whose binary labels are at unit Hamming distance,be separated by a large Eu...In the bit-interleaved coded modulation with iterative decoding,it is desired that any two Hamming neighbors,i.e..signal constellation points whose binary labels are at unit Hamming distance,be separated by a large Euclidean distance.This paper determines the mappings for the 32-ary fourdimensional generalized cross constellation(32-4D-GCC) so that the minimum squared Euclidean distance d_(min)~2 between Hamming neighbors is maximized.Among such mappings,those with minimum multiplicity N(d_(min)~2) are selected.To reduce the large search space,a set of "mapping templates," each producing a collection of mappings with the same set partitions of binary labels,is introduced.Via enumeration of mapping templates,it is shown that the optimum d_(min)~2=16and the optimum N(d_(min)~2)=16.Among thousands optimum mappings found by computer search,two of the best performance are presented.展开更多
In this paper,we study the advantages of cooperation in broadcasting systems from a geosynchronous earth orbit(GEO)satellite to mobile terminals(MTs),achieved through a terrestrial complementary ground station(CGS) wi...In this paper,we study the advantages of cooperation in broadcasting systems from a geosynchronous earth orbit(GEO)satellite to mobile terminals(MTs),achieved through a terrestrial complementary ground station(CGS) with fixed installment,which acts as a relay.Moreover and in the context of the digital video broadcasting-satellite-to-handheld(DVB-SH) standard,the performance improvements offered by the rotated constellations method are investigated,where prior transmission,a phase rotation of the transmitted symbols by a fixed angle is applied followed by a random component interleaver.Turbo codes with soft decision decoding and appropriate random channel interleavers are also considered.We present analytical expressions for the bit log-likelihood ratios(LLRs)that are needed for soft decision decoding at the MT turbo decoder,while the code combining technique is adapted to improve the end-to-end(E2E) performance.Then,we obtain through extensive computer simulations the average bit error probability(ABEP) of quadrature phase-shift keying(QPSK) signals received over pure land-mobile satellite(LMS)and pure CGS links for coding rates 1/3 and6/7.Moreover,the optimal rotation angles are obtained for both links.E2 E ABEP results are then presented assuming cooperation between GEO and CGS,while the power allocation issue is investigated under fixed total transmission power.Our performance evaluation results show that by using the constellation rotation technique,a performance gain can be achieved for high coding rates.展开更多
In 1163, Archbishop Gionata, Abbot of the Monastery of San Nicola of Casole in Puglia (Apulia), commissioned Pantaleone, a learned monk and artist from the monastery, to decorate the pavement of the cathedral of Otr...In 1163, Archbishop Gionata, Abbot of the Monastery of San Nicola of Casole in Puglia (Apulia), commissioned Pantaleone, a learned monk and artist from the monastery, to decorate the pavement of the cathedral of Otranto with mosaics. This Italian Romanesque cathedral was dedicated to Santa Maria Annunziata or Saint Mary of The Annunciation. In the interior, the floor design in the shape of a tree contains an elaborate biblical program. The encyclopedic narrative of the mosaic symbolically unveils the meaning of the Tree of Life. The ieonography of the pavement's program combines biblical and pagan narratives evolving from a natural realm into a heavenly realm. The natural realm begins at the church's entrance with the symbolism of the earth-the roots of a tree-expanding through the nave and transept via the tree's trunk and its branches, culminating in the apse, at the end of the church, with the foliage oftbe top of the tree. This natural realm meets with the heavenly realm in two ways: at the crossing of the church or at the sacrificial altar, and at the apse of the church. Before reaching the altar or holy area, between the natural realm and the heavenly realm, the zodiac signs with the labors of the months are depicted.展开更多
In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two...In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two steps. In the first step, MPWFRFT, implemented as the constellation beguiling(CB) method, is applied to change the signal's identity. In the second step the additional pseudo random phase information, regarded as the encryption key, is attached to the original signal to enhance the security. Typically, the pseudo random phase information can be removed effectively by the legitimate receiver. In contrast to the cryptography based encryption algorithms and the conventional PHY secrecy techniques, the main contribution of the proposed scheme is concentrated on the variation in signal's characteristics. Simulation results show that the proposed scheme can prevent the exchanging signal from eavesdroppers' classifi cation or inception. Moreover, the proposed scheme can guarantee the BER performance at a tolerate increasing in computational complexity for the legitimate receivers.展开更多
基金supported by the National Key Basic Research Program of China(973 program) under grant No.2010CB328206NSFC under grants No.60837002+3 种基金60807003and 61102048the Fundamental Research Funds for the Central Universities under grant No.2011JBM208NSF under grant CCF-0952711
文摘In the bit-interleaved coded modulation with iterative decoding,it is desired that any two Hamming neighbors,i.e..signal constellation points whose binary labels are at unit Hamming distance,be separated by a large Euclidean distance.This paper determines the mappings for the 32-ary fourdimensional generalized cross constellation(32-4D-GCC) so that the minimum squared Euclidean distance d_(min)~2 between Hamming neighbors is maximized.Among such mappings,those with minimum multiplicity N(d_(min)~2) are selected.To reduce the large search space,a set of "mapping templates," each producing a collection of mappings with the same set partitions of binary labels,is introduced.Via enumeration of mapping templates,it is shown that the optimum d_(min)~2=16and the optimum N(d_(min)~2)=16.Among thousands optimum mappings found by computer search,two of the best performance are presented.
基金Support to the SatNEx-Ⅲ Network of Experts (SatNEx-Ⅲ) CoO2,2011-2012
文摘In this paper,we study the advantages of cooperation in broadcasting systems from a geosynchronous earth orbit(GEO)satellite to mobile terminals(MTs),achieved through a terrestrial complementary ground station(CGS) with fixed installment,which acts as a relay.Moreover and in the context of the digital video broadcasting-satellite-to-handheld(DVB-SH) standard,the performance improvements offered by the rotated constellations method are investigated,where prior transmission,a phase rotation of the transmitted symbols by a fixed angle is applied followed by a random component interleaver.Turbo codes with soft decision decoding and appropriate random channel interleavers are also considered.We present analytical expressions for the bit log-likelihood ratios(LLRs)that are needed for soft decision decoding at the MT turbo decoder,while the code combining technique is adapted to improve the end-to-end(E2E) performance.Then,we obtain through extensive computer simulations the average bit error probability(ABEP) of quadrature phase-shift keying(QPSK) signals received over pure land-mobile satellite(LMS)and pure CGS links for coding rates 1/3 and6/7.Moreover,the optimal rotation angles are obtained for both links.E2 E ABEP results are then presented assuming cooperation between GEO and CGS,while the power allocation issue is investigated under fixed total transmission power.Our performance evaluation results show that by using the constellation rotation technique,a performance gain can be achieved for high coding rates.
文摘In 1163, Archbishop Gionata, Abbot of the Monastery of San Nicola of Casole in Puglia (Apulia), commissioned Pantaleone, a learned monk and artist from the monastery, to decorate the pavement of the cathedral of Otranto with mosaics. This Italian Romanesque cathedral was dedicated to Santa Maria Annunziata or Saint Mary of The Annunciation. In the interior, the floor design in the shape of a tree contains an elaborate biblical program. The encyclopedic narrative of the mosaic symbolically unveils the meaning of the Tree of Life. The ieonography of the pavement's program combines biblical and pagan narratives evolving from a natural realm into a heavenly realm. The natural realm begins at the church's entrance with the symbolism of the earth-the roots of a tree-expanding through the nave and transept via the tree's trunk and its branches, culminating in the apse, at the end of the church, with the foliage oftbe top of the tree. This natural realm meets with the heavenly realm in two ways: at the crossing of the church or at the sacrificial altar, and at the apse of the church. Before reaching the altar or holy area, between the natural realm and the heavenly realm, the zodiac signs with the labors of the months are depicted.
基金supported by the National Basic Research Program of China under Grant 2013CB329003in part by the National Natural Science Foundation General Program of China under Grant 61171110
文摘In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two steps. In the first step, MPWFRFT, implemented as the constellation beguiling(CB) method, is applied to change the signal's identity. In the second step the additional pseudo random phase information, regarded as the encryption key, is attached to the original signal to enhance the security. Typically, the pseudo random phase information can be removed effectively by the legitimate receiver. In contrast to the cryptography based encryption algorithms and the conventional PHY secrecy techniques, the main contribution of the proposed scheme is concentrated on the variation in signal's characteristics. Simulation results show that the proposed scheme can prevent the exchanging signal from eavesdroppers' classifi cation or inception. Moreover, the proposed scheme can guarantee the BER performance at a tolerate increasing in computational complexity for the legitimate receivers.