The densities and surface tensions of [Bmim][TFO]/H2SO4, [Hmim][TFO]/H2SO4 and [Omim][TFO]/H2SO4 binary mixtures were measured by pycnometer and Wilhelmy plate method respectively. The results show that densities and ...The densities and surface tensions of [Bmim][TFO]/H2SO4, [Hmim][TFO]/H2SO4 and [Omim][TFO]/H2SO4 binary mixtures were measured by pycnometer and Wilhelmy plate method respectively. The results show that densities and surface tensions of the mixtures decreased monotonously with increasing temperatures and increasing ionic liquid (IL) molar fraction. IL with longer alkyl side-chain length brings a lower density and a smaller surface tension to the ILs/H2SO4 binary mixtures. The densities and surface tensions of the mixtures are fitted well by Jouyban-Acree (JAM) model and LWW model respectively. Redlich-Kister (R-K)equation and modified Redlich-Kister (R-K) equation describe the excess molar volumes and excess surface tensions of the mixtures well respectively. Adding a small amount of ILs (XIL 〈 0.1 ) into sulfuric acid brings an obvious decrease to the density and the surface tension. The results imply that the densities and surface tensions of IL5/H2SO4 binary mixtures can be modulated by changing the IL dosage or tailoring the IL structure.展开更多
Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically th...Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically the potential buffer overflow vulnerabilities in the binary code of software. The binary code was translated into assembly code without the lose of the information of string operation functions. The feature code abstract graph was constructed to generate more accurate constraint statements, and analyze the assembly code using the method of integer range constraint. After getting the elementary report on suspicious code where buffer overflows possibly happen, the control flow sensitive analysis using program dependence graph was done to decrease the rate of false positive. A prototype was implemented which demonstrates the feasibility and efficiency of the new approach.展开更多
Minimizing network coding resources of multicast networks,such as the number of coding nodes or links,has been proved to be NP-hard,and taking propagation delay into account makes the problem more complicated. To reso...Minimizing network coding resources of multicast networks,such as the number of coding nodes or links,has been proved to be NP-hard,and taking propagation delay into account makes the problem more complicated. To resolve this optimal problem,an integer encoding routing-based genetic algorithm( REGA) is presented to map the optimization problem into a genetic algorithm( GA)framework. Moreover,to speed up the search process of the algorithm,an efficient local search procedure which can reduce the searching space size is designed for searching the feasible solution.Compared with the binary link state encoding representation genetic algorithm( BLSGA),the chromosome length of REGA is shorter and just depends on the number of sinks. Simulation results show the advantages of the algorithm in terms of getting the optimal solution and algorithmic convergence speed.展开更多
The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes ...The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes has developed rapidly and been extended to protect quantum information over asymmetric quantum channels, in which phase-shift and qubit-flip errors occur with different probabilities. In this paper, we generalize the construction of symmetric quantum codes via graphs (or matrices) to the asymmetric case, converting the construction of asymmetric quantum codes to finding matrices with some special properties. We also propose some asymmetric quantum Maximal Distance Separable (MDS) codes as examples constructed in this way.展开更多
An adaptive pipelining scheme for H.264/AVC context-based adaptive binary arithmetic coding(CABAC) decoder for high definition(HD) applications is proposed to solve data hazard problems coming from the data dependenci...An adaptive pipelining scheme for H.264/AVC context-based adaptive binary arithmetic coding(CABAC) decoder for high definition(HD) applications is proposed to solve data hazard problems coming from the data dependencies in CABAC decoding process.An efficiency model of CABAC decoding pipeline is derived according to the analysis of a common pipeline.Based on that,several adaptive strategies are provided.The pipelining scheme with these strategies can be adaptive to different types of syntax elements(SEs) and the pipeline will not stall during decoding process when these strategies are adopted.In addition,the decoder proposed can fully support H.264/AVC high4:2:2 profile and the experimental results show that the efficiency of decoder is much higher than other architectures with one engine.Taking both performance and cost into consideration,our design makes a good tradeoff compared with other work and it is sufficient for HD real-time decoding.展开更多
To gain the tradeoff between lower sidelobe and higher power amplifiers efficiency,a transmitting beam shaping scheme with limited amplitude weight values for satellite active phased array antenna is presented. The sc...To gain the tradeoff between lower sidelobe and higher power amplifiers efficiency,a transmitting beam shaping scheme with limited amplitude weight values for satellite active phased array antenna is presented. The scheme is implemented by a dual coding genetic algorithm(GA). Phase and amplitude of array weight vectors for beam shaping are encoded by real coding and finite length binary coding,respectively,which,maintaining accuracy of results,reduces the amplitude dynamic range and improves the efficiency of power amplifiers. The presented algorithm,compared with complex-coded GA,increases the convergence rate due to the search space's decrease. In order to overcome the prematurity and obtain better global optimization or quasi-global optimization,a new dual coding GA based on "species diversity retention" strategy and adaptive crossover and mutation probability are presented.展开更多
In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is con...In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (gig) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the Peak signal-to-noise ratio (PSNR) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.展开更多
The self-orthogonal condition is analyzed with respect to symplectic inner product for the binary code that generated by [B1 I B2 B3],where Bi are the binary n ×n matrices,I is an identity matrix.By the use of th...The self-orthogonal condition is analyzed with respect to symplectic inner product for the binary code that generated by [B1 I B2 B3],where Bi are the binary n ×n matrices,I is an identity matrix.By the use of the binary codes that generated by [B1 I B2 B2B1^T],asymptotic good[[2n ,n ]]additive quantum codes are obtained.展开更多
The extraction of potassium from a tablet mixture of K-feldspar ore and CaSO4by roasting was studied with a focus on the effects of the decomposition behavior of CaSO4on the potassium extraction process.The roasted sl...The extraction of potassium from a tablet mixture of K-feldspar ore and CaSO4by roasting was studied with a focus on the effects of the decomposition behavior of CaSO4on the potassium extraction process.The roasted slags were characterized by X-ray diffraction(XRD),scanning electron microscopy(SEM),energy-dispersive X-ray spectroscopy,and thermogravimetric(TG)analysis.The XRD analysis revealed that hydrosoluble mischcrystal K2Ca2(SO4)3was obtained by ion exchange of Ca^2+ in CaSO4 and K^+ in KAlSi3O8.Meanwhile,the intermediate product,SiO2,separated from KAl Si3O8and reacted with CaSO4to decompose CaSO4.The SEM results showed that some blowholes emerged on the surface of the CaSO4particles when they reacted with SiO2at 1200℃,which indicates that SO2and O2gases were released from CaSO4.The TG curves displayed that pure CaSO4could not be decomposed below 1200℃,while the mixture of K-feldspar ore and CaSO4began to lose weight at 1000℃.The extraction rate of potassium and decomposition rate of CaSO4were 62%and 44%,respectively,at a mass ratio of CaSO4to K-feldspar ore of 3:1,temperature of 1200℃,tablet-forming pressure of6 MPa,and roasting time of 2 h.The decomposition of CaSO4reduced the potassium extraction rate;therefore,the required amount of CaSO4was more than the theoretical amount.However,excess CaSO4was also undesirable for the potassium extraction reaction because a massive amount of SO2and O2gas were derived from the decomposition of CaSO4,which provided poor contact between the reactants.The SO2released from CaSO4decomposition can be effectively recycled.展开更多
Cyclic codes form an important class of codes. They have very interesting algebraic structure. Furthermore, they are equivalent to many important codes, such as binary Hamming codes, Golay codes and BCH codes. Minimal...Cyclic codes form an important class of codes. They have very interesting algebraic structure. Furthermore, they are equivalent to many important codes, such as binary Hamming codes, Golay codes and BCH codes. Minimal codewords in linear codes are widely used in constructing decoding algorithms and studying linear secret sharing scheme. In this paper, we show that in the binary cyclic code all of the codewords are minimal, except 0 and 1. Then, we obtain a result about the number of minimal codewords in the binary cyclic codes.展开更多
In orthogonal frequency division multiplexing (OFDM) based multihop communications, the conventional decodeand-forward (DF) relay scheme severely suffers from the error propagation problem. This drawback is seriou...In orthogonal frequency division multiplexing (OFDM) based multihop communications, the conventional decodeand-forward (DF) relay scheme severely suffers from the error propagation problem. This drawback is serious in multihop networks as errors made by any relay node may fail the decoder at the destination in great chance. In this paper, we propose a bit error rate (BER) modified DF protocol (BMDF) which can be applied to systems where error correction channel coding and M-ary modulation are used. By modeling all links except the last one as a binary symmetric channel (BSC), we derive a log likelihood ratio (LLR) modification function relying only on the accumulated BER of all previous links to be applied to the output of the soft demapper. Furthermore, to reduce the computational complexity and signaling overhead, the modification function is simplified from its original exponential expression and less BERs are delivered between nodes by making successive subcarriers share the same BER. In addition, for situations where the channel state information (CSI) of forward link is available, the proposed BMDF can be further enhanced by combining with subcarrier pairing (SP) and power allocation (PA), where a sorted-channel gain SP scheme and a greedy PA algorithm are proposed. The simulation results verify thesignificant performance improvement to the conventional DF.展开更多
This letter proposes a novel and simple construction of regular Low-Density Parity-Check (LDPC) codes using sparse binary sequences. It utilizes the cyclic cross correlation function of sparse sequences to generate co...This letter proposes a novel and simple construction of regular Low-Density Parity-Check (LDPC) codes using sparse binary sequences. It utilizes the cyclic cross correlation function of sparse sequences to generate codes with girth8. The new codes perform well using the sumproduct decoding. Low encodingcomplexity can also be achieved due to the inherent quasi-cyclic structure of the codes.展开更多
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput...With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the computer specialists know what is stored in the given computer. Binary-based information flow tracking which concerns the changes of control flow is an effective way to analyze the behavior of a program. The existing systems ignore the modifications of the data flow, which may be also a malicious behavior. Thus the function recognition is introduced to improve the information flow tracking. Function recognition is a helpful technique recognizing the function body from the software binary to analyze the binary code. And that no false positive and no false negative in our experiments strongly proves that our approach is effective.展开更多
In this paper, a CMOS image sensor(CIS) is proposed, which can accomplish both decorrelation and entropy coding of image compression directly on the focal plane. The design is based on predictive coding for image deco...In this paper, a CMOS image sensor(CIS) is proposed, which can accomplish both decorrelation and entropy coding of image compression directly on the focal plane. The design is based on predictive coding for image decorrelation. The predictions are performed in analog domain by 2×2 pixel units. Both the prediction residuals and original pixel values are quantized and encoded in parallel. Since the residuals have a peak distribution around zero,the output codewords can be replaced by the valid part of the residuals' binary mode. The compressed bit stream is accessible directly at the output of CIS without extra disposition. Simulation results show that the proposed approach achieves a compression rate of 2. 2 and PSNR of 51 on different test images.展开更多
基金Supported by the National Natural Science Foundation of China(21576168,21276163)
文摘The densities and surface tensions of [Bmim][TFO]/H2SO4, [Hmim][TFO]/H2SO4 and [Omim][TFO]/H2SO4 binary mixtures were measured by pycnometer and Wilhelmy plate method respectively. The results show that densities and surface tensions of the mixtures decreased monotonously with increasing temperatures and increasing ionic liquid (IL) molar fraction. IL with longer alkyl side-chain length brings a lower density and a smaller surface tension to the ILs/H2SO4 binary mixtures. The densities and surface tensions of the mixtures are fitted well by Jouyban-Acree (JAM) model and LWW model respectively. Redlich-Kister (R-K)equation and modified Redlich-Kister (R-K) equation describe the excess molar volumes and excess surface tensions of the mixtures well respectively. Adding a small amount of ILs (XIL 〈 0.1 ) into sulfuric acid brings an obvious decrease to the density and the surface tension. The results imply that the densities and surface tensions of IL5/H2SO4 binary mixtures can be modulated by changing the IL dosage or tailoring the IL structure.
文摘Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically the potential buffer overflow vulnerabilities in the binary code of software. The binary code was translated into assembly code without the lose of the information of string operation functions. The feature code abstract graph was constructed to generate more accurate constraint statements, and analyze the assembly code using the method of integer range constraint. After getting the elementary report on suspicious code where buffer overflows possibly happen, the control flow sensitive analysis using program dependence graph was done to decrease the rate of false positive. A prototype was implemented which demonstrates the feasibility and efficiency of the new approach.
基金Supported by the National Natural Science Foundation of China(No.61473179)Shandong Province Higher Educational Science and Technology Program(No.J16LN20)+1 种基金Natural Science Foundation of Shandong Province(No.ZR2016FM18)the Youth Scholars Development Program of Shandong University of Technology
文摘Minimizing network coding resources of multicast networks,such as the number of coding nodes or links,has been proved to be NP-hard,and taking propagation delay into account makes the problem more complicated. To resolve this optimal problem,an integer encoding routing-based genetic algorithm( REGA) is presented to map the optimization problem into a genetic algorithm( GA)framework. Moreover,to speed up the search process of the algorithm,an efficient local search procedure which can reduce the searching space size is designed for searching the feasible solution.Compared with the binary link state encoding representation genetic algorithm( BLSGA),the chromosome length of REGA is shorter and just depends on the number of sinks. Simulation results show the advantages of the algorithm in terms of getting the optimal solution and algorithmic convergence speed.
基金supported by the National High Technology Research and Development Program of China under Grant No. 2011AA010803
文摘The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes has developed rapidly and been extended to protect quantum information over asymmetric quantum channels, in which phase-shift and qubit-flip errors occur with different probabilities. In this paper, we generalize the construction of symmetric quantum codes via graphs (or matrices) to the asymmetric case, converting the construction of asymmetric quantum codes to finding matrices with some special properties. We also propose some asymmetric quantum Maximal Distance Separable (MDS) codes as examples constructed in this way.
基金Supported by the National Natural Science Foundation of China(No.61076021)the National Basic Research Program of China(No.2009CB320903)China Postdoctoral Science Foundation(No.2012M511364)
文摘An adaptive pipelining scheme for H.264/AVC context-based adaptive binary arithmetic coding(CABAC) decoder for high definition(HD) applications is proposed to solve data hazard problems coming from the data dependencies in CABAC decoding process.An efficiency model of CABAC decoding pipeline is derived according to the analysis of a common pipeline.Based on that,several adaptive strategies are provided.The pipelining scheme with these strategies can be adaptive to different types of syntax elements(SEs) and the pipeline will not stall during decoding process when these strategies are adopted.In addition,the decoder proposed can fully support H.264/AVC high4:2:2 profile and the experimental results show that the efficiency of decoder is much higher than other architectures with one engine.Taking both performance and cost into consideration,our design makes a good tradeoff compared with other work and it is sufficient for HD real-time decoding.
基金The project supported by National Natural Science Foundation of China (No. 60572095)Research Foundation for Doctors of ZZULI
文摘To gain the tradeoff between lower sidelobe and higher power amplifiers efficiency,a transmitting beam shaping scheme with limited amplitude weight values for satellite active phased array antenna is presented. The scheme is implemented by a dual coding genetic algorithm(GA). Phase and amplitude of array weight vectors for beam shaping are encoded by real coding and finite length binary coding,respectively,which,maintaining accuracy of results,reduces the amplitude dynamic range and improves the efficiency of power amplifiers. The presented algorithm,compared with complex-coded GA,increases the convergence rate due to the search space's decrease. In order to overcome the prematurity and obtain better global optimization or quasi-global optimization,a new dual coding GA based on "species diversity retention" strategy and adaptive crossover and mutation probability are presented.
文摘In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (gig) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the Peak signal-to-noise ratio (PSNR) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.
文摘The self-orthogonal condition is analyzed with respect to symplectic inner product for the binary code that generated by [B1 I B2 B3],where Bi are the binary n ×n matrices,I is an identity matrix.By the use of the binary codes that generated by [B1 I B2 B2B1^T],asymptotic good[[2n ,n ]]additive quantum codes are obtained.
基金Supported by the National Key Research and Development Program(2016YFB0600904)Sichuan Province Science and Technology Project(2017GZ0377)Sichuan University Postdoctoral Research and Development Fund(2017SCU12017)
文摘The extraction of potassium from a tablet mixture of K-feldspar ore and CaSO4by roasting was studied with a focus on the effects of the decomposition behavior of CaSO4on the potassium extraction process.The roasted slags were characterized by X-ray diffraction(XRD),scanning electron microscopy(SEM),energy-dispersive X-ray spectroscopy,and thermogravimetric(TG)analysis.The XRD analysis revealed that hydrosoluble mischcrystal K2Ca2(SO4)3was obtained by ion exchange of Ca^2+ in CaSO4 and K^+ in KAlSi3O8.Meanwhile,the intermediate product,SiO2,separated from KAl Si3O8and reacted with CaSO4to decompose CaSO4.The SEM results showed that some blowholes emerged on the surface of the CaSO4particles when they reacted with SiO2at 1200℃,which indicates that SO2and O2gases were released from CaSO4.The TG curves displayed that pure CaSO4could not be decomposed below 1200℃,while the mixture of K-feldspar ore and CaSO4began to lose weight at 1000℃.The extraction rate of potassium and decomposition rate of CaSO4were 62%and 44%,respectively,at a mass ratio of CaSO4to K-feldspar ore of 3:1,temperature of 1200℃,tablet-forming pressure of6 MPa,and roasting time of 2 h.The decomposition of CaSO4reduced the potassium extraction rate;therefore,the required amount of CaSO4was more than the theoretical amount.However,excess CaSO4was also undesirable for the potassium extraction reaction because a massive amount of SO2and O2gas were derived from the decomposition of CaSO4,which provided poor contact between the reactants.The SO2released from CaSO4decomposition can be effectively recycled.
文摘Cyclic codes form an important class of codes. They have very interesting algebraic structure. Furthermore, they are equivalent to many important codes, such as binary Hamming codes, Golay codes and BCH codes. Minimal codewords in linear codes are widely used in constructing decoding algorithms and studying linear secret sharing scheme. In this paper, we show that in the binary cyclic code all of the codewords are minimal, except 0 and 1. Then, we obtain a result about the number of minimal codewords in the binary cyclic codes.
基金The authors would like to thank National Natural Science Foundation of China (No. 61072059).
文摘In orthogonal frequency division multiplexing (OFDM) based multihop communications, the conventional decodeand-forward (DF) relay scheme severely suffers from the error propagation problem. This drawback is serious in multihop networks as errors made by any relay node may fail the decoder at the destination in great chance. In this paper, we propose a bit error rate (BER) modified DF protocol (BMDF) which can be applied to systems where error correction channel coding and M-ary modulation are used. By modeling all links except the last one as a binary symmetric channel (BSC), we derive a log likelihood ratio (LLR) modification function relying only on the accumulated BER of all previous links to be applied to the output of the soft demapper. Furthermore, to reduce the computational complexity and signaling overhead, the modification function is simplified from its original exponential expression and less BERs are delivered between nodes by making successive subcarriers share the same BER. In addition, for situations where the channel state information (CSI) of forward link is available, the proposed BMDF can be further enhanced by combining with subcarrier pairing (SP) and power allocation (PA), where a sorted-channel gain SP scheme and a greedy PA algorithm are proposed. The simulation results verify thesignificant performance improvement to the conventional DF.
基金Supported by Key Project of the National Natural Science Foundation of China (No.60496311).
文摘This letter proposes a novel and simple construction of regular Low-Density Parity-Check (LDPC) codes using sparse binary sequences. It utilizes the cyclic cross correlation function of sparse sequences to generate codes with girth8. The new codes perform well using the sumproduct decoding. Low encodingcomplexity can also be achieved due to the inherent quasi-cyclic structure of the codes.
基金This work is supported by National Natural Science Foundation of China (Grant No.60773093, 60873209, and 60970107), the Key Program for Basic Research of Shanghai (Grant No. 09JC1407900, 09510701600, 10511500100), IBM SUR Funding and IBM Research-China JP Funding, and Key Lab of Information Network Security, Ministry of Public Security.
文摘With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the computer specialists know what is stored in the given computer. Binary-based information flow tracking which concerns the changes of control flow is an effective way to analyze the behavior of a program. The existing systems ignore the modifications of the data flow, which may be also a malicious behavior. Thus the function recognition is introduced to improve the information flow tracking. Function recognition is a helpful technique recognizing the function body from the software binary to analyze the binary code. And that no false positive and no false negative in our experiments strongly proves that our approach is effective.
基金Supported by the National Natural Science Foundation of China(No.61036004)Tianjin Research Program of Application Foundation and Advanced Technology(No.13JCQNJC00600)
文摘In this paper, a CMOS image sensor(CIS) is proposed, which can accomplish both decorrelation and entropy coding of image compression directly on the focal plane. The design is based on predictive coding for image decorrelation. The predictions are performed in analog domain by 2×2 pixel units. Both the prediction residuals and original pixel values are quantized and encoded in parallel. Since the residuals have a peak distribution around zero,the output codewords can be replaced by the valid part of the residuals' binary mode. The compressed bit stream is accessible directly at the output of CIS without extra disposition. Simulation results show that the proposed approach achieves a compression rate of 2. 2 and PSNR of 51 on different test images.