The first domestic total dose hardened 2μm partially depleted silicon-on-insulator (PDSOI) CMOS 3-line to 8- line decoder fabricated in SIMOX is demonstrated. The radiation performance is characterized by transisto...The first domestic total dose hardened 2μm partially depleted silicon-on-insulator (PDSOI) CMOS 3-line to 8- line decoder fabricated in SIMOX is demonstrated. The radiation performance is characterized by transistor threshold voltage shifts,circuit static leakage currents,and I-V curves as a function of total dose up to 3× 10^5rad(Si). The worst case threshold voltage shifts of the front channels are less than 20mV for nMOS transistors at 3 × 10^5rad(Si) and follow-up irradiation and less than 70mV for the pMOS transistors. Furthermore, no significant radiation induced leakage currents and functional degeneration are observed.展开更多
A novel method for improving the capacity of multi-code multimedia Code Division Mul- tiple Access (CDMA) systems is proposed. By factitiously improving the transmission bit rate of the call, the number of the orthogo...A novel method for improving the capacity of multi-code multimedia Code Division Mul- tiple Access (CDMA) systems is proposed. By factitiously improving the transmission bit rate of the call, the number of the orthogonal codes used by a user is increased which leads to the decreasing of the interference. Simulation results shows that the proposed scheme results in better throughput than traditional multi-code CDMA systems.展开更多
A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the f...A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob.Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss.展开更多
A novel method is proposed to analyze the capacity of future Code Division Multiple Access (CDMA) systems carrying multimedia services. The power level allocation is firstly investigated to meet each call's Bit Err...A novel method is proposed to analyze the capacity of future Code Division Multiple Access (CDMA) systems carrying multimedia services. The power level allocation is firstly investigated to meet each call's Bit Error Rate (BER) requirement, then the system capacity is defined from the conditions lbr the existence of the physical meaning of these power levels. Simulation results have shown that the capacity analyzing methods can be well used in the performance evaluation of the system accommodating heterogeneous services and the spectral efficiency of this scheme is higher than the existing ones.展开更多
Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will ca...Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will causestatistical fluctuations.In this paper,we apply absolutely statistical fluctuation to amend the yield and error rate of thequantum state.The relationship between exchanged number of quantum signals and key generation rate is analyzed inour simulation,which offers a useful reference for experiment.展开更多
The fractional volumetric lattice Boltzmann method with much better stability was used to simulate two-chmensional cavity flows. Because the effective viscosity was reduced by the fraction factor, it is very effective...The fractional volumetric lattice Boltzmann method with much better stability was used to simulate two-chmensional cavity flows. Because the effective viscosity was reduced by the fraction factor, it is very effective for simulating high Reynolds number flows. Simulations were carried out on a uniform grids system. The stream lines and the velocity profiles obtained from the simulations agree well with the standard lattice Boltzmann method simulations. Comparisons of detailed flow patterns with other studies via location of vortex centers are also satisfactory.展开更多
A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical i...A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical information can be encoded on one four-state particle and the transmitted particles can be fully used.展开更多
Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines ...Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines coverage on specified values, and make variances of group distances among N-Window text lines become small. Inspired by the discovery, the research brings out a Support Vector Machine (SVM) based steganalysis algorithm. To avoid the disturbance of large difference among words length from same line, the research only reserves samples whose occurrence-frequencies are ± 10dB of the maximum frequency. The results show that the correct rate of the SVM classifier is higher than 90%.展开更多
The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes ...The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes has developed rapidly and been extended to protect quantum information over asymmetric quantum channels, in which phase-shift and qubit-flip errors occur with different probabilities. In this paper, we generalize the construction of symmetric quantum codes via graphs (or matrices) to the asymmetric case, converting the construction of asymmetric quantum codes to finding matrices with some special properties. We also propose some asymmetric quantum Maximal Distance Separable (MDS) codes as examples constructed in this way.展开更多
Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way f...Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way function and quantum search algorithm is proposed.Depending on the no-cloning theorem and trapdoor one-way functions of the publickey,the eavesdropper cannot extract any private-information from the public-keys and the ciphertext.Introducing key-generation randomized logarithm to improve security of our proposed protocol,i.e.,one privatekey corresponds to an exponential number of public-keys.Using unitary operations and the single photon measurement,secret messages can be directly sent from the sender to the receiver.The security of the proposed protocol is proved that it is informationtheoretically secure.Furthermore,compared the symmetrical Quantum key distribution,the proposed protocol is not only efficient to reduce additional communication,but also easier to carry out in practice,because no entangled photons and complex operations are required.展开更多
This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degr...This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(2^17), and that of 0(2^67) for LILI-128.展开更多
Single nucletide polymorphism(SNP)is an important factor for the study of genetic variation in human families and animal and plant strains.Therefore,it is widely used in the study of population genetics and disease re...Single nucletide polymorphism(SNP)is an important factor for the study of genetic variation in human families and animal and plant strains.Therefore,it is widely used in the study of population genetics and disease related gene.In pharmacogenomics research,identifying the association between SNP site and drug is the key to clinical precision medication,therefore,a predictive model of SNP site and drug association based on denoising variational auto-encoder(DVAE-SVM)is proposed.Firstly,k-mer algorithm is used to construct the initial SNP site feature vector,meanwhile,MACCS molecular fingerprint is introduced to generate the feature vector of the drug module.Then,we use the DVAE to extract the effective features of the initial feature vector of the SNP site.Finally,the effective feature vector of the SNP site and the feature vector of the drug module are fused input to the support vector machines(SVM)to predict the relationship of SNP site and drug module.The results of five-fold cross-validation experiments indicate that the proposed algorithm performs better than random forest(RF)and logistic regression(LR)classification.Further experiments show that compared with the feature extraction algorithms of principal component analysis(PCA),denoising auto-encoder(DAE)and variational auto-encode(VAE),the proposed algorithm has better prediction results.展开更多
A novel Least Squares Constant Modulus (LSCM) beam-forming algorithm in smart antenna Multi-Carrier Code Division Multiple Access (MC-CDMA) system is proposed in this paper. It adaptively beam-forms the multi-carrier ...A novel Least Squares Constant Modulus (LSCM) beam-forming algorithm in smart antenna Multi-Carrier Code Division Multiple Access (MC-CDMA) system is proposed in this paper. It adaptively beam-forms the multi-carrier antenna array signal using the LSCM Algorithm (LSCMA), and in the meantime, the beam-formed signals on every sub-carrier are combined by using Orthogonal Restore Combination (ORC), Equal Gain Combination (EGC) or Maximum Ratio Combination (MRC). Then the decision of the combined signals and the spread-code of the expected user are used to re-construct the signals on every sub-carrier. At last, the difference between the re-constructed signal and the output signal of the beam-former is used to con-trol the coefficients of the beam-former. The bit error probability of the proposed algorithm is analyzed. We simulated and compared it with the conventional LSCM beam-forming algorithm. Simulation results show that the proposed algorithm is superior to the latter in Bit Error Rate (BER).展开更多
A new fractal image compression algorithm based on high frequency energy (HFE) partitioning andmatched domain block searching is presented to code synthetic aperture radar (SAR) imagery. In the hybridcoding algorithm,...A new fractal image compression algorithm based on high frequency energy (HFE) partitioning andmatched domain block searching is presented to code synthetic aperture radar (SAR) imagery. In the hybridcoding algorithm, the original SAR image is decomposed to low frequency components and high frequencycomponents by wavelet transform (WT). Then the coder uses HFE of block to partition and searchthe matched domain block for each range block to code the low frequency components. For the high frequencycomponents, a modified embedded zero-tree wavelet coding algorithm is applied. Experiment resultsshow that the proposed coder obtains about 0. 3dB gain when compared to the traditional fractal coderbased on the quadtree partition. Moreover, the subjective visual quality of the reconstructed SAR imageof the proposed coder outperforms that of the traditional fractal coders in the same compression ratio(CR).展开更多
This paper presents a quantization skipping method for H. 264/AVC video coding standard. In order to reduce the conputational-cost of quantization process coming from integer discrete cosine transform of H. 264/AVC, a...This paper presents a quantization skipping method for H. 264/AVC video coding standard. In order to reduce the conputational-cost of quantization process coming from integer discrete cosine transform of H. 264/AVC, a quantization skipping condition is derived by the analysis of integer transform and quantization procedures. The expeerimental results show that the proposed algorithm has the capability to reduce the computional cost about 10% -2.5%.展开更多
文摘The first domestic total dose hardened 2μm partially depleted silicon-on-insulator (PDSOI) CMOS 3-line to 8- line decoder fabricated in SIMOX is demonstrated. The radiation performance is characterized by transistor threshold voltage shifts,circuit static leakage currents,and I-V curves as a function of total dose up to 3× 10^5rad(Si). The worst case threshold voltage shifts of the front channels are less than 20mV for nMOS transistors at 3 × 10^5rad(Si) and follow-up irradiation and less than 70mV for the pMOS transistors. Furthermore, no significant radiation induced leakage currents and functional degeneration are observed.
基金the Natural Science Fund for Jiangsu Province Universities (No.06kJB510078 and No.06KJA51001) by the Research Open Fund of the National Mobile Communications Key Lab (No.N200507).
文摘A novel method for improving the capacity of multi-code multimedia Code Division Mul- tiple Access (CDMA) systems is proposed. By factitiously improving the transmission bit rate of the call, the number of the orthogonal codes used by a user is increased which leads to the decreasing of the interference. Simulation results shows that the proposed scheme results in better throughput than traditional multi-code CDMA systems.
文摘A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob.Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss.
基金Supported by the open research fund of the National Mobile Communications Key Lab of the Southeast Uni-versity and by the Hong Kong Research Council.
文摘A novel method is proposed to analyze the capacity of future Code Division Multiple Access (CDMA) systems carrying multimedia services. The power level allocation is firstly investigated to meet each call's Bit Error Rate (BER) requirement, then the system capacity is defined from the conditions lbr the existence of the physical meaning of these power levels. Simulation results have shown that the capacity analyzing methods can be well used in the performance evaluation of the system accommodating heterogeneous services and the spectral efficiency of this scheme is higher than the existing ones.
基金Supported by the National Basic Research Program (973) of China under Grant No.2010CB923200Chinese Universities Scientific Fund BUPT2009RC0709
文摘Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will causestatistical fluctuations.In this paper,we apply absolutely statistical fluctuation to amend the yield and error rate of thequantum state.The relationship between exchanged number of quantum signals and key generation rate is analyzed inour simulation,which offers a useful reference for experiment.
文摘The fractional volumetric lattice Boltzmann method with much better stability was used to simulate two-chmensional cavity flows. Because the effective viscosity was reduced by the fraction factor, it is very effective for simulating high Reynolds number flows. Simulations were carried out on a uniform grids system. The stream lines and the velocity profiles obtained from the simulations agree well with the standard lattice Boltzmann method simulations. Comparisons of detailed flow patterns with other studies via location of vortex centers are also satisfactory.
基金The project supported by the National Fundamental Research Program under Grant No. 2006CB0L0106, National Natural Science Foundation of China under Grant Nos. 60433050, 10325521, and 10447106, and the SRFDP Program of Education Ministry of China and Beijing Education Committee under Grant No. XK100270454
文摘A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical information can be encoded on one four-state particle and the transmitted particles can be fully used.
基金the National Natural Science Foundation of China under Grant No.61170269,No.61170272,No.61202082,No.61003285,and the Fundamental Research Funds for the Central Universities under Grant No.BUPT2013RC0308,No.BUPT2013RC0311
文摘Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines coverage on specified values, and make variances of group distances among N-Window text lines become small. Inspired by the discovery, the research brings out a Support Vector Machine (SVM) based steganalysis algorithm. To avoid the disturbance of large difference among words length from same line, the research only reserves samples whose occurrence-frequencies are ± 10dB of the maximum frequency. The results show that the correct rate of the SVM classifier is higher than 90%.
基金supported by the National High Technology Research and Development Program of China under Grant No. 2011AA010803
文摘The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes has developed rapidly and been extended to protect quantum information over asymmetric quantum channels, in which phase-shift and qubit-flip errors occur with different probabilities. In this paper, we generalize the construction of symmetric quantum codes via graphs (or matrices) to the asymmetric case, converting the construction of asymmetric quantum codes to finding matrices with some special properties. We also propose some asymmetric quantum Maximal Distance Separable (MDS) codes as examples constructed in this way.
基金This work was supported in part by the program for Innovation Team Building at Institutions of Higher Education in Chongqing under Grant No.KJTD201310,the Scientific and Technological Research Program of Chongqing Municipal Education Commission of China under Grant KJ120513,Natural Science Foundation Project of CQ CSTC of P.R.China under Grant No.cstc2011jjA40031
文摘Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way function and quantum search algorithm is proposed.Depending on the no-cloning theorem and trapdoor one-way functions of the publickey,the eavesdropper cannot extract any private-information from the public-keys and the ciphertext.Introducing key-generation randomized logarithm to improve security of our proposed protocol,i.e.,one privatekey corresponds to an exponential number of public-keys.Using unitary operations and the single photon measurement,secret messages can be directly sent from the sender to the receiver.The security of the proposed protocol is proved that it is informationtheoretically secure.Furthermore,compared the symmetrical Quantum key distribution,the proposed protocol is not only efficient to reduce additional communication,but also easier to carry out in practice,because no entangled photons and complex operations are required.
基金Supported in part by the National Natural Science Foundation of China (No.60273084)the National Laboratory for Modern Communications Foundation of China (No.51436030105DZ0105).
文摘This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(2^17), and that of 0(2^67) for LILI-128.
基金Lanzhou Talent Innovation and Entrepreneurship Project(No.2020-RC-14)。
文摘Single nucletide polymorphism(SNP)is an important factor for the study of genetic variation in human families and animal and plant strains.Therefore,it is widely used in the study of population genetics and disease related gene.In pharmacogenomics research,identifying the association between SNP site and drug is the key to clinical precision medication,therefore,a predictive model of SNP site and drug association based on denoising variational auto-encoder(DVAE-SVM)is proposed.Firstly,k-mer algorithm is used to construct the initial SNP site feature vector,meanwhile,MACCS molecular fingerprint is introduced to generate the feature vector of the drug module.Then,we use the DVAE to extract the effective features of the initial feature vector of the SNP site.Finally,the effective feature vector of the SNP site and the feature vector of the drug module are fused input to the support vector machines(SVM)to predict the relationship of SNP site and drug module.The results of five-fold cross-validation experiments indicate that the proposed algorithm performs better than random forest(RF)and logistic regression(LR)classification.Further experiments show that compared with the feature extraction algorithms of principal component analysis(PCA),denoising auto-encoder(DAE)and variational auto-encode(VAE),the proposed algorithm has better prediction results.
基金Sponsored by the National Natural Science Fundation of China (No.60472104), Natural Science Research Project of Jiangsu Province (04KJB510094) and Doctoral In-novative Fund of Jiangsu Province (xm04-32).
文摘A novel Least Squares Constant Modulus (LSCM) beam-forming algorithm in smart antenna Multi-Carrier Code Division Multiple Access (MC-CDMA) system is proposed in this paper. It adaptively beam-forms the multi-carrier antenna array signal using the LSCM Algorithm (LSCMA), and in the meantime, the beam-formed signals on every sub-carrier are combined by using Orthogonal Restore Combination (ORC), Equal Gain Combination (EGC) or Maximum Ratio Combination (MRC). Then the decision of the combined signals and the spread-code of the expected user are used to re-construct the signals on every sub-carrier. At last, the difference between the re-constructed signal and the output signal of the beam-former is used to con-trol the coefficients of the beam-former. The bit error probability of the proposed algorithm is analyzed. We simulated and compared it with the conventional LSCM beam-forming algorithm. Simulation results show that the proposed algorithm is superior to the latter in Bit Error Rate (BER).
基金Supported by the National Natural Science Foundation of China (No. 90304003)the President Fund of GUCAS (No. O85101HM03).
文摘A new fractal image compression algorithm based on high frequency energy (HFE) partitioning andmatched domain block searching is presented to code synthetic aperture radar (SAR) imagery. In the hybridcoding algorithm, the original SAR image is decomposed to low frequency components and high frequencycomponents by wavelet transform (WT). Then the coder uses HFE of block to partition and searchthe matched domain block for each range block to code the low frequency components. For the high frequencycomponents, a modified embedded zero-tree wavelet coding algorithm is applied. Experiment resultsshow that the proposed coder obtains about 0. 3dB gain when compared to the traditional fractal coderbased on the quadtree partition. Moreover, the subjective visual quality of the reconstructed SAR imageof the proposed coder outperforms that of the traditional fractal coders in the same compression ratio(CR).
基金supported by the Seoul Future Contents Convergence(SFCC)Cluster established by Seoul R&BD Program
文摘This paper presents a quantization skipping method for H. 264/AVC video coding standard. In order to reduce the conputational-cost of quantization process coming from integer discrete cosine transform of H. 264/AVC, a quantization skipping condition is derived by the analysis of integer transform and quantization procedures. The expeerimental results show that the proposed algorithm has the capability to reduce the computional cost about 10% -2.5%.