In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is con...In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (gig) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the Peak signal-to-noise ratio (PSNR) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.展开更多
The extraction of potassium from a tablet mixture of K-feldspar ore and CaSO4by roasting was studied with a focus on the effects of the decomposition behavior of CaSO4on the potassium extraction process.The roasted sl...The extraction of potassium from a tablet mixture of K-feldspar ore and CaSO4by roasting was studied with a focus on the effects of the decomposition behavior of CaSO4on the potassium extraction process.The roasted slags were characterized by X-ray diffraction(XRD),scanning electron microscopy(SEM),energy-dispersive X-ray spectroscopy,and thermogravimetric(TG)analysis.The XRD analysis revealed that hydrosoluble mischcrystal K2Ca2(SO4)3was obtained by ion exchange of Ca^2+ in CaSO4 and K^+ in KAlSi3O8.Meanwhile,the intermediate product,SiO2,separated from KAl Si3O8and reacted with CaSO4to decompose CaSO4.The SEM results showed that some blowholes emerged on the surface of the CaSO4particles when they reacted with SiO2at 1200℃,which indicates that SO2and O2gases were released from CaSO4.The TG curves displayed that pure CaSO4could not be decomposed below 1200℃,while the mixture of K-feldspar ore and CaSO4began to lose weight at 1000℃.The extraction rate of potassium and decomposition rate of CaSO4were 62%and 44%,respectively,at a mass ratio of CaSO4to K-feldspar ore of 3:1,temperature of 1200℃,tablet-forming pressure of6 MPa,and roasting time of 2 h.The decomposition of CaSO4reduced the potassium extraction rate;therefore,the required amount of CaSO4was more than the theoretical amount.However,excess CaSO4was also undesirable for the potassium extraction reaction because a massive amount of SO2and O2gas were derived from the decomposition of CaSO4,which provided poor contact between the reactants.The SO2released from CaSO4decomposition can be effectively recycled.展开更多
Performance of the Adaptive Coding and Modulation(ACM) strongly depends on the retrieved Channel State Information(CSI),which can be obtained using the channel estimation techniques relying on pilot symbol transmissio...Performance of the Adaptive Coding and Modulation(ACM) strongly depends on the retrieved Channel State Information(CSI),which can be obtained using the channel estimation techniques relying on pilot symbol transmission.Earlier analysis of methods of pilot-aided channel estimation for ACM systems were relatively little.In this paper,we investigate the performance of CSI prediction using the Minimum Mean Square Error(MMSE)channel estimator for an ACM system.To solve the two problems of MMSE:high computational operations and oversimplified assumption,we then propose the Low-Complexity schemes(LC-MMSE and Recursion LC-MMSE(R-LC-MMSE)).Computational complexity and Mean Square Error(MSE) are presented to evaluate the efficiency of the proposed algorithm.Both analysis and numerical results show that LC-MMSE performs close to the wellknown MMSE estimator with much lower complexity and R-LC-MMSE improves the application of MMSE estimation to specific circumstances.展开更多
Based on the analysis on the security mechanism of grid, this paper discusses the advantages of latest techniques of grid security, and presents a secure authentication scheme of grid based on elliptic curve cryptosys...Based on the analysis on the security mechanism of grid, this paper discusses the advantages of latest techniques of grid security, and presents a secure authentication scheme of grid based on elliptic curve cryptosystem (ECC). The secure authentication scheme may provide reference value for the further application of grid.展开更多
In this paper, a novel multiple trellis coded orthogonal transmit scheme is proposed to exploit transmit diversity in fading channels. In this scheme, a unique vector from a set of orthogonal vectors is assigned to ea...In this paper, a novel multiple trellis coded orthogonal transmit scheme is proposed to exploit transmit diversity in fading channels. In this scheme, a unique vector from a set of orthogonal vectors is assigned to each transmit antenna. Each of the output symbols from the multiple trellis encoder is multiplied with one of these orthogonal vectors and transmitted from corresponding transmit antennas. By correlating with corresponding orthogonal vectors, the receiver separates symbols transmitted from different transmit antennas. This scheme can be adopted in coherent/differential systems with any number of transmit antennas. It is shown that the proposed scheme encompasses the conventional trellis coded unitary space-time modulation based on the optimal cyclic group codes as a special case. We also propose two better designs over the conventional trellis coded unitary space-time modulation. The first design uses 8 Phase Shift Keying (8-PSK) constellations instead of 16 Phase Shift Keying (16-PSK) constellations in the conventional trellis coded unitary space-time modulation. As a result, the product distance of this new design is much larger than that of the conventional trellis coded unitary space-time modulation. The second design introduces constellations with multiple levels of amplitudes into the design of the multiple trellis coded orthogonal transmit scheme. For both designs, simulations show that multiple trellis coded orthogonal transmit schemes can achieve better performance than the conventional trellis coded unitarv space-time schemes.展开更多
This paper investigates the medium access control (MAC) stratifies for communication systems. Since the signals are naturally superposed in public medium, we introduce physical layer network coding into MAC system a...This paper investigates the medium access control (MAC) stratifies for communication systems. Since the signals are naturally superposed in public medium, we introduce physical layer network coding into MAC system and propose the physical layer network coded MAC (PNC-MAC) to utilize the collisions occurring in the MAC process. The implicit expressions of the throughput and average delay of the system operated with the new algorithm are derived in an iterative way. To show the performance of the algorithm, we compare the throughput and average delay induced by the new algorithm with current schemes via simulations. The results show that when operated with our proposed PNC-MAC, MAC system can achieve a larger throughput while the frames bear shorter average delay. Moreover, in many users case, the throughput increases slightly while the average delay ascends drastically.展开更多
A novel iterative technique, the phase descent search detection was proposed. This technique constrained the solution (PDS) algorithm, for M-ary phase shift keying (M-PSK) symbols to have a unit magnitude and it w...A novel iterative technique, the phase descent search detection was proposed. This technique constrained the solution (PDS) algorithm, for M-ary phase shift keying (M-PSK) symbols to have a unit magnitude and it was based on coordinate descent iterations where coordinates were the unknown symbol phases. The PDS algorithm, together with a descent local search (also implemented as a version of the PDS algorithm), was used multiple times with different initializations in a proposed multiple phase detector; the solution with the minimum cost was then chosen as the final solution. The simulation results show that for highly loaded multiuser scenarios, the proposed technique has a detection performance that is close to the single-user bound. The results also show that the multiple phase detector allows detection in highly overloaded scenarios and it exhibits near-far resistance. In particular, the detector has a performance that is significantly better, and complexity that is significantly lower, than that of the detector based on semi-definite relaxation.展开更多
A new fair off-line electronic cash scheme on elliptic curve cryptography was presented. The new scheme is more efficient than those by extending fair off-line electronic cash scheme from finite field into elliptic cu...A new fair off-line electronic cash scheme on elliptic curve cryptography was presented. The new scheme is more efficient than those by extending fair off-line electronic cash scheme from finite field into elliptic curve cryptography and introducing a new elliptic curve discrete logarithm assumption. The expiry date and denomination are embedded into the blindly signed coin by integrating partially blind signature with restrictive blind signature. A bank need not use different public keys for different coin values, shops and users need not carry a list of bank’s public keys to verify in their electronic wallet. At the same time, the bank just needs to keep undue electronic coins for double spending check in his database, thus bank’s database can be dramatically reduced.展开更多
2D-to-3D video conversion is a feasible way to generate 3D programs for the current 3DTV industry. However, for large-scale 3D video production, current systems are no longer adequate in terms of the time and labor re...2D-to-3D video conversion is a feasible way to generate 3D programs for the current 3DTV industry. However, for large-scale 3D video production, current systems are no longer adequate in terms of the time and labor required for conversion. In this paper, we introduce a distributed 2D-to-3D video conversion system that includes a 2D-to-3D video conversion module, architecture of the parallel computation on the cloud, and 3D video coding in the system. The system enables cooperation among multiple users in the simultaneous completion of their conversion tasks so that the conversion efficiency is greatly promoted. In the experiments, we evaluate the system based on criteria related to both time consumption and video coding performance.展开更多
In order to guarantee reliable data transmission, powerful channel coding techniques are usually required in noncoherent ultra-wideband(UWB) communication systems. Accordingly, several forward error correction(FEC) co...In order to guarantee reliable data transmission, powerful channel coding techniques are usually required in noncoherent ultra-wideband(UWB) communication systems. Accordingly, several forward error correction(FEC) codes, such as Reed-Solomon and convolutional codes have been used in noncoherent UWB systems to improve the bit error rate(BER) performance. In this paper, low-density parity-check(LDPC) codes are further studied as more powerful FEC candidates for noncoherent UWB systems. Two LDPC codes and the corresponding decoding procedures are presented for noncoherent UWB systems. Moreover, performance comparison between the LDPC codes and other FEC codes are provided for three major noncoherent UWB communication systems, namely, noncoherent pulse position modulation(NC-PPM), transmitted reference(TR) and transmitted reference pulse cluster(TRPC). Both theoretical analysis and simulation results show that the two investigated LDPC codes outperform other existing FEC codes with limited penalty in terms of complexity and therefore they are promising FEC candidates for noncoherent UWB systems with low-cost and low-power consumption.展开更多
Maximum likelihood(ML) noncoherent block detection techniques are investigated for block-coded MPSK modulation in cooperative decode-and-forward relay systems over slow fading channels.A decision-directed iterative Vi...Maximum likelihood(ML) noncoherent block detection techniques are investigated for block-coded MPSK modulation in cooperative decode-and-forward relay systems over slow fading channels.A decision-directed iterative Viterbi algorithm(IVA) is derived for a suboptimal ML noncoherent detection.Simulation results show that the IVA can approach the error performances of the exhaustive detection method but at a lower complexity.展开更多
Call admission control (CAC) and resource reservation (RR) for mobile communication are two important factors that guarantee system efficiency and quality of service (QoS) required for different services in a very sca...Call admission control (CAC) and resource reservation (RR) for mobile communication are two important factors that guarantee system efficiency and quality of service (QoS) required for different services in a very scarce resource as the radio spectrum. A new scheme was proposed which extends the concepts of resource sharing and reservations for wideband code division multiple access (WCDMA) systems with a unique feature of soft capacity. Voice and data traffic were considered. The traffic is further classified into handoff and new requests. The reservation thresholds were dynamically adjusted according to the traffic pattern and mobility prediction in order to achieve the maximum channel utilization, while guaranteeing different QoS constraints. The performance of proposed scheme was evaluated using Markov models. New call blocking probability, handoff call dropping probability, and channel utilization were used as benchmarks for the proposed scheme.展开更多
Error codes induced by M-ary modulation and modulation selection in network-based control systems are studied.It is the first time the issue of error codes induced by M-ary modulation is addressed in control field.In ...Error codes induced by M-ary modulation and modulation selection in network-based control systems are studied.It is the first time the issue of error codes induced by M-ary modulation is addressed in control field.In network-based control systems,error codes induced by noisy channel can significantly decrease the quality of control.To solve this problem,the network-based control system with delay and noisy channel is firstly modeled as an asynchronous dynamic system(ADS).Secondly,conditions of packet with error codes(PEC)loss rate by using M-ary modulation are obtained based on dynamic output feedback scheme.Thirdly,more importantly,the selection principle of M-ary modulation is proposed according to the measured signal-to-noise ratio(SNR)and conditions of PEC loss rate.Finally,system stability is analyzed and controller is designed through Lyapunov function and linear matrix inequality(LMI)scheme,and numerical simulations are made to demonstrate the effectiveness of the proposed scheme.展开更多
Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input info...Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input information in a class of system identification problems with noise and binary-valued observations, presents a cryptography based security protocol, and improves it in the range of allowed errors. During solving the identification problem, the improved security protocol can ensure that the input information is not leaked, and thus, can deal with passive attacks effectively. Besides, a quantitative relationship among the input information, the public key in encryption and the number of partieipailts in the improved protocol is shown. Finally, the simulation results show that, the identification algorithm can still achieve the estimation accuracy by adding the improved security protocol. However, compared with the original identification algorithm, the time complexity of the algorithm with the improved security protocol increases.展开更多
文摘In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (gig) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the Peak signal-to-noise ratio (PSNR) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.
基金Supported by the National Key Research and Development Program(2016YFB0600904)Sichuan Province Science and Technology Project(2017GZ0377)Sichuan University Postdoctoral Research and Development Fund(2017SCU12017)
文摘The extraction of potassium from a tablet mixture of K-feldspar ore and CaSO4by roasting was studied with a focus on the effects of the decomposition behavior of CaSO4on the potassium extraction process.The roasted slags were characterized by X-ray diffraction(XRD),scanning electron microscopy(SEM),energy-dispersive X-ray spectroscopy,and thermogravimetric(TG)analysis.The XRD analysis revealed that hydrosoluble mischcrystal K2Ca2(SO4)3was obtained by ion exchange of Ca^2+ in CaSO4 and K^+ in KAlSi3O8.Meanwhile,the intermediate product,SiO2,separated from KAl Si3O8and reacted with CaSO4to decompose CaSO4.The SEM results showed that some blowholes emerged on the surface of the CaSO4particles when they reacted with SiO2at 1200℃,which indicates that SO2and O2gases were released from CaSO4.The TG curves displayed that pure CaSO4could not be decomposed below 1200℃,while the mixture of K-feldspar ore and CaSO4began to lose weight at 1000℃.The extraction rate of potassium and decomposition rate of CaSO4were 62%and 44%,respectively,at a mass ratio of CaSO4to K-feldspar ore of 3:1,temperature of 1200℃,tablet-forming pressure of6 MPa,and roasting time of 2 h.The decomposition of CaSO4reduced the potassium extraction rate;therefore,the required amount of CaSO4was more than the theoretical amount.However,excess CaSO4was also undesirable for the potassium extraction reaction because a massive amount of SO2and O2gas were derived from the decomposition of CaSO4,which provided poor contact between the reactants.The SO2released from CaSO4decomposition can be effectively recycled.
基金supported by the 2011 China Aerospace Science and Technology Foundationthe Certain Ministry Foundation under Grant No.20212HK03010
文摘Performance of the Adaptive Coding and Modulation(ACM) strongly depends on the retrieved Channel State Information(CSI),which can be obtained using the channel estimation techniques relying on pilot symbol transmission.Earlier analysis of methods of pilot-aided channel estimation for ACM systems were relatively little.In this paper,we investigate the performance of CSI prediction using the Minimum Mean Square Error(MMSE)channel estimator for an ACM system.To solve the two problems of MMSE:high computational operations and oversimplified assumption,we then propose the Low-Complexity schemes(LC-MMSE and Recursion LC-MMSE(R-LC-MMSE)).Computational complexity and Mean Square Error(MSE) are presented to evaluate the efficiency of the proposed algorithm.Both analysis and numerical results show that LC-MMSE performs close to the wellknown MMSE estimator with much lower complexity and R-LC-MMSE improves the application of MMSE estimation to specific circumstances.
文摘Based on the analysis on the security mechanism of grid, this paper discusses the advantages of latest techniques of grid security, and presents a secure authentication scheme of grid based on elliptic curve cryptosystem (ECC). The secure authentication scheme may provide reference value for the further application of grid.
基金Supported by the National Natural Science Foundation of China(No.60390540).
文摘In this paper, a novel multiple trellis coded orthogonal transmit scheme is proposed to exploit transmit diversity in fading channels. In this scheme, a unique vector from a set of orthogonal vectors is assigned to each transmit antenna. Each of the output symbols from the multiple trellis encoder is multiplied with one of these orthogonal vectors and transmitted from corresponding transmit antennas. By correlating with corresponding orthogonal vectors, the receiver separates symbols transmitted from different transmit antennas. This scheme can be adopted in coherent/differential systems with any number of transmit antennas. It is shown that the proposed scheme encompasses the conventional trellis coded unitary space-time modulation based on the optimal cyclic group codes as a special case. We also propose two better designs over the conventional trellis coded unitary space-time modulation. The first design uses 8 Phase Shift Keying (8-PSK) constellations instead of 16 Phase Shift Keying (16-PSK) constellations in the conventional trellis coded unitary space-time modulation. As a result, the product distance of this new design is much larger than that of the conventional trellis coded unitary space-time modulation. The second design introduces constellations with multiple levels of amplitudes into the design of the multiple trellis coded orthogonal transmit scheme. For both designs, simulations show that multiple trellis coded orthogonal transmit schemes can achieve better performance than the conventional trellis coded unitarv space-time schemes.
文摘This paper investigates the medium access control (MAC) stratifies for communication systems. Since the signals are naturally superposed in public medium, we introduce physical layer network coding into MAC system and propose the physical layer network coded MAC (PNC-MAC) to utilize the collisions occurring in the MAC process. The implicit expressions of the throughput and average delay of the system operated with the new algorithm are derived in an iterative way. To show the performance of the algorithm, we compare the throughput and average delay induced by the new algorithm with current schemes via simulations. The results show that when operated with our proposed PNC-MAC, MAC system can achieve a larger throughput while the frames bear shorter average delay. Moreover, in many users case, the throughput increases slightly while the average delay ascends drastically.
文摘A novel iterative technique, the phase descent search detection was proposed. This technique constrained the solution (PDS) algorithm, for M-ary phase shift keying (M-PSK) symbols to have a unit magnitude and it was based on coordinate descent iterations where coordinates were the unknown symbol phases. The PDS algorithm, together with a descent local search (also implemented as a version of the PDS algorithm), was used multiple times with different initializations in a proposed multiple phase detector; the solution with the minimum cost was then chosen as the final solution. The simulation results show that for highly loaded multiuser scenarios, the proposed technique has a detection performance that is close to the single-user bound. The results also show that the multiple phase detector allows detection in highly overloaded scenarios and it exhibits near-far resistance. In particular, the detector has a performance that is significantly better, and complexity that is significantly lower, than that of the detector based on semi-definite relaxation.
文摘A new fair off-line electronic cash scheme on elliptic curve cryptography was presented. The new scheme is more efficient than those by extending fair off-line electronic cash scheme from finite field into elliptic curve cryptography and introducing a new elliptic curve discrete logarithm assumption. The expiry date and denomination are embedded into the blindly signed coin by integrating partially blind signature with restrictive blind signature. A bank need not use different public keys for different coin values, shops and users need not carry a list of bank’s public keys to verify in their electronic wallet. At the same time, the bank just needs to keep undue electronic coins for double spending check in his database, thus bank’s database can be dramatically reduced.
基金supported by the National Key Basic Research Program of China (973 Program) under Grant No. 2009CB320904the National Natural Science Foundation of China under Grants No. 61121002, No. 61231010, 91120004the Key Projects in the National Science and Technology Pillar Program under Grant No. 2011BAH08B03
文摘2D-to-3D video conversion is a feasible way to generate 3D programs for the current 3DTV industry. However, for large-scale 3D video production, current systems are no longer adequate in terms of the time and labor required for conversion. In this paper, we introduce a distributed 2D-to-3D video conversion system that includes a 2D-to-3D video conversion module, architecture of the parallel computation on the cloud, and 3D video coding in the system. The system enables cooperation among multiple users in the simultaneous completion of their conversion tasks so that the conversion efficiency is greatly promoted. In the experiments, we evaluate the system based on criteria related to both time consumption and video coding performance.
基金supported in part by the National Natural Science Foundation of China under Grant 61271262, 61473047 and 61572083Shaanxi Provincial Natural Science Foundation under Grant 2015JM6310the Special Fund for Basic Scientific Research of Central Colleges, Chang’an University under Grant 310824152010 and 00092014G1241043
文摘In order to guarantee reliable data transmission, powerful channel coding techniques are usually required in noncoherent ultra-wideband(UWB) communication systems. Accordingly, several forward error correction(FEC) codes, such as Reed-Solomon and convolutional codes have been used in noncoherent UWB systems to improve the bit error rate(BER) performance. In this paper, low-density parity-check(LDPC) codes are further studied as more powerful FEC candidates for noncoherent UWB systems. Two LDPC codes and the corresponding decoding procedures are presented for noncoherent UWB systems. Moreover, performance comparison between the LDPC codes and other FEC codes are provided for three major noncoherent UWB communication systems, namely, noncoherent pulse position modulation(NC-PPM), transmitted reference(TR) and transmitted reference pulse cluster(TRPC). Both theoretical analysis and simulation results show that the two investigated LDPC codes outperform other existing FEC codes with limited penalty in terms of complexity and therefore they are promising FEC candidates for noncoherent UWB systems with low-cost and low-power consumption.
基金supported by the National Natural Science Foundation of China(61302095,61401165)the Natural Science Foundation of Fujian Province of China(2014J01243,2014J05076,2015J01262)the Huaqiao University Science Foundation(13Y0384)
文摘Maximum likelihood(ML) noncoherent block detection techniques are investigated for block-coded MPSK modulation in cooperative decode-and-forward relay systems over slow fading channels.A decision-directed iterative Viterbi algorithm(IVA) is derived for a suboptimal ML noncoherent detection.Simulation results show that the IVA can approach the error performances of the exhaustive detection method but at a lower complexity.
文摘Call admission control (CAC) and resource reservation (RR) for mobile communication are two important factors that guarantee system efficiency and quality of service (QoS) required for different services in a very scarce resource as the radio spectrum. A new scheme was proposed which extends the concepts of resource sharing and reservations for wideband code division multiple access (WCDMA) systems with a unique feature of soft capacity. Voice and data traffic were considered. The traffic is further classified into handoff and new requests. The reservation thresholds were dynamically adjusted according to the traffic pattern and mobility prediction in order to achieve the maximum channel utilization, while guaranteeing different QoS constraints. The performance of proposed scheme was evaluated using Markov models. New call blocking probability, handoff call dropping probability, and channel utilization were used as benchmarks for the proposed scheme.
基金Project(61172022) supported by the National Natural Science Foundation of ChinaProject(GDW20151100010) supported by the State Administration of Foreign Experts Affairs of China
文摘Error codes induced by M-ary modulation and modulation selection in network-based control systems are studied.It is the first time the issue of error codes induced by M-ary modulation is addressed in control field.In network-based control systems,error codes induced by noisy channel can significantly decrease the quality of control.To solve this problem,the network-based control system with delay and noisy channel is firstly modeled as an asynchronous dynamic system(ADS).Secondly,conditions of packet with error codes(PEC)loss rate by using M-ary modulation are obtained based on dynamic output feedback scheme.Thirdly,more importantly,the selection principle of M-ary modulation is proposed according to the measured signal-to-noise ratio(SNR)and conditions of PEC loss rate.Finally,system stability is analyzed and controller is designed through Lyapunov function and linear matrix inequality(LMI)scheme,and numerical simulations are made to demonstrate the effectiveness of the proposed scheme.
基金supported by the National Key Basic Research Program of China(973 Program)under Grant No.2014CB845301the National Natural Science Foundation of China under Grant No.61227902
文摘Traditional control does not pay much attention to information security problems in system identification enough, which are important in practical applications. This paper focuses on the security problem of input information in a class of system identification problems with noise and binary-valued observations, presents a cryptography based security protocol, and improves it in the range of allowed errors. During solving the identification problem, the improved security protocol can ensure that the input information is not leaked, and thus, can deal with passive attacks effectively. Besides, a quantitative relationship among the input information, the public key in encryption and the number of partieipailts in the improved protocol is shown. Finally, the simulation results show that, the identification algorithm can still achieve the estimation accuracy by adding the improved security protocol. However, compared with the original identification algorithm, the time complexity of the algorithm with the improved security protocol increases.