To improve the performance of chaotic secure communication,three simplified chaotic systems with one variable parameter were investigated.Basic properties were analyzed including symmetry,dissipation and topological s...To improve the performance of chaotic secure communication,three simplified chaotic systems with one variable parameter were investigated.Basic properties were analyzed including symmetry,dissipation and topological structure.Complex dynamical behaviors of the systems including chaos and periodic orbits were verified by numerical simulations,Lyapunov exponents and bifurcation diagrams.Interestingly,the three systems were integrated in a common circuit,and their dynamical behaviors were easily observed by adjusting regulable resistors R28,R14 and R17,respectively,and the relations between the variable resistor and the system parameter were deduced.The circuit experiment results agree well with the simulation results.Finally,a secure communication scheme based on chaos shift keying(CSK) was presented,which lays an experiment foundation for chaotic digital secure communication.展开更多
The low voltage powerline is becoming a powerful solution to home network, building automation, and internet access as a result of its wide distribution, easy access and little maintenance. The character of powerline ...The low voltage powerline is becoming a powerful solution to home network, building automation, and internet access as a result of its wide distribution, easy access and little maintenance. The character of powerline channel is very complicated because it is an open net. This article analysed the character of the powerline channel,introduced the basics of OFDM(Orthogonal Frequency Division Multiplexing), and studied the OFDM applied into powerline high speed digital communication.展开更多
The urban traffic information manageanent has become an important way of solving traffic jam of cities. With the wider use of the third generation of mobile conmmunication (3G) networks, information management based...The urban traffic information manageanent has become an important way of solving traffic jam of cities. With the wider use of the third generation of mobile conmmunication (3G) networks, information management based on 3G will be a central issue of application. The paper designs a fi-amework of Global Posititoning System (GPS) vehicle navigating and guiding system using 3G mobile network and Glbal Information System (GIS) electronic map according to moving objects. It discusses moving object's time-space attrihltes which will be described by a five-field and a directed graph. It analyzes the GPS mobile apparatus' s software functions and hardware structures. Anti it improves the function of GPS mobile apparatus which provide the guiding function utilizing the shared information of traffic. The navigation based on the shortest path algortithm is been advanced to one based on the real-time traffic flow of moving objects, which help people travelling on roads more convenietly.展开更多
The novel satellite Multiple Access scheme called Combined Free/Demand Assignment Multiple Access-Predictive Request (CFDAMA-PR) is proposed in this paper. In the CFDAMA-PR scheme, the ground station requests the dema...The novel satellite Multiple Access scheme called Combined Free/Demand Assignment Multiple Access-Predictive Request (CFDAMA-PR) is proposed in this paper. In the CFDAMA-PR scheme, the ground station requests the demand assignment slots by predicting the positive varying trend of the traffic source. The delay performances between CFDAMA-PR and CFDAMA-RR (Round Robin request) schemes were compared by computer simulation. Simulations were carried out with the Interrupted Poisson Process (IPP) and the Interrupted Fluid Process (IFP) traffic models. Simulation results demonstrate that compared to CFDAMA-RR protocol, the CFDAMA-PR scheme achieves a better delay/throughput of satellite channel.展开更多
In this paper,the generalized bounds are derived on the partial periodic correlation of complex roots of unity sequence set with zero or low correlation zone(ZCZ/LCZ)as the important criteria of the sequence design an...In this paper,the generalized bounds are derived on the partial periodic correlation of complex roots of unity sequence set with zero or low correlation zone(ZCZ/LCZ)as the important criteria of the sequence design and application.The derived bounds are with respect to family size,subsequence length,maximum partial autocorrelation sidelobe,maximum partial cross-correlation value and the ZCZ/LCZ.The results show that the derived bounds include the previous periodic bounds,such as Sarwate bound,Welch bound,Peng-Fan bound and Paterson-Lothian bound,as special cases.展开更多
An improved scalar Costa scheme (SCS) was proposed by using improved Watson perceptual model to adaptively decide quantization step size and scaling factor. The improved scheme equals to embed hiding data based on an ...An improved scalar Costa scheme (SCS) was proposed by using improved Watson perceptual model to adaptively decide quantization step size and scaling factor. The improved scheme equals to embed hiding data based on an actual image. In order to withstand amplitude scaling attack, the Watson perceptual model was redefined, and the improved scheme using the new definition can insure quantization step size in decoder that is proportional to amplitude scaling attack factor. The performance of the improved scheme outperforms that of SCS with fixed quantization step size. The improved scheme combines information theory and visual model.展开更多
This paper studies statistical multiplexing performance by input of video traffic and data traffic. The inputs have different Qos requirements such as loss and delay jitter. By applying a modified FBM model, we presen...This paper studies statistical multiplexing performance by input of video traffic and data traffic. The inputs have different Qos requirements such as loss and delay jitter. By applying a modified FBM model, we present methods to estimate effective bandwidth of the aggregated traffic. Simulations were performed to evaluate effective bandwidth. The comparison between the estimation and the simulation shows that the estimations can give correct data for the effective bandwidths in terms of our interests. The analysis of gain by using priority multiplexing also addresses proper Qos configuration for the inputs in order to achieve positive gains.展开更多
The computational load is prohibitive for real-time image generation in 3-D sonar systems, particularly when the steering angle approximation is required. In this paper, a novel multiple Chirp Zeta Transforms (MCZT)...The computational load is prohibitive for real-time image generation in 3-D sonar systems, particularly when the steering angle approximation is required. In this paper, a novel multiple Chirp Zeta Transforms (MCZT) beamforming method in frequency domain is being proposed. The single long-length Chirp Zeta Transform (CZT) in the original CZT beamforming is replaced by several CZTs with smaller lengths for different partitions along each dimension. The implementing routine of the algorithm is also optimized. Furthermore, an avenue to evaluate the estimating error for the angle approximation in 3-D imaging applications is presented, and an approach to attain valid partitions for the steering angles is also flhistrated. This paper demonstrates a few advantages of the proposed frequency-domain beamforming method over existing methods in terms of the computatianal complexity.展开更多
We propose the spectrum allocation and resource scheduling algorithms in cognitive point to multipoint (PMP) networks with rapid changes of spectrum opportunities and present a media access control (MAC) protocol base...We propose the spectrum allocation and resource scheduling algorithms in cognitive point to multipoint (PMP) networks with rapid changes of spectrum opportunities and present a media access control (MAC) protocol based on these algorithms. The objective of spectrum allocation is to make efficient use of the spectrum while maintaining the transceiver synchronization on frequency and time in the network. The objective of resource scheduling is to guarantee the quality of service (QoS) requirements of different kinds of connections and to minimize the total energy consumption in the network as well. By sensing only a small set of possible channels in each slot based on the state transition probability of each channel, our spectrum allocation algorithm achieves high spectrum efficiency in the network. The resource scheduling problem is divided into three sub problems and we derive optimal solutions to these problems by greedy algorithm and convex optimization. The simulation results show that our algorithm can make efficient use of the spectrum and the network resources at a cost of low computational complexity.展开更多
In the IEEE g02. 11 protocol, the adoption of the exponential backoff technique leads to throughput performance strongly dependent on the initial contention window size and, most importantly, on the number of contendi...In the IEEE g02. 11 protocol, the adoption of the exponential backoff technique leads to throughput performance strongly dependent on the initial contention window size and, most importantly, on the number of contending stations considered in the network. This paper proposes a simple but accurate method to dynamically estimate the number of contending stations in a wireless local area network ( WLAN ). Based on estimation, all the mobile stations dynamically adjust the initial contention window in medium access control ( MAC ) layer to avoid collisions. The simulation results show that the proposed algorithm can achieve efficient channel utilization, higher system throughput, and better fairness performance.展开更多
There are some problems in the dual-layer satellite MPLs metworks to be composed of LEO and MEO. In order to solve the problems, this paper presents a plan by means of unicast LSP to implement multicast in the dual-la...There are some problems in the dual-layer satellite MPLs metworks to be composed of LEO and MEO. In order to solve the problems, this paper presents a plan by means of unicast LSP to implement multicast in the dual-layer satellite MPLs networks. It has advantages of saving space and reducing extra charge.展开更多
In a direct spectrum (DS) system, the PN code can be estimated by analyzing the singular vectors of the received data matrix in order to blind despread in a non-cooperative context. But as there are informa-tion dat...In a direct spectrum (DS) system, the PN code can be estimated by analyzing the singular vectors of the received data matrix in order to blind despread in a non-cooperative context. But as there are informa-tion data reversions in the analyzed data matrix, some parts of the estimated PN code may be invertible to the original PN code, which may bring about problems in the following despreading process. In order to solve this problem, a method to well reconstruct the PN code is proposed. This method is based on power detection. The combination scheme which has the maximum power is the best combination scheme that is most suitable to the original PN code. Simulation results show that the method can reconstruct the PN code very well,even if the signal-to-noise ratio is low.展开更多
The standardized IEEE ,802. II distributed coordination function ( DCF) provides a contention-based distributed channel access mechanism for mobile stations to share the wireless medium. However, when stations are m...The standardized IEEE ,802. II distributed coordination function ( DCF) provides a contention-based distributed channel access mechanism for mobile stations to share the wireless medium. However, when stations are mobile or portable units, power consumption becomes a primary issue since terminals are usually battery driven. This paper proposes an analytical model that calculates the energy efficiency of both the basic and the RTS/CTS access mechanisms of the IEEE 802. II protocol. The model is validated with simulation results using NS-2 simulation package. The effects of the network size, the average packet length, the initial contention window and maximum backoff stages on the energy efficiency of both access mechanisms are also investigated. Results show that the basic scheme has low energy efficiency at large packet length and large network size, and depends strongly on the number of stations and the backoff procedure parameters. Conversely, the RTS/CTS mechanism provides higher energy efficiency when the network size is large, and is more robust to variations in the backoff procedure parameters.展开更多
Based on the experimental results, a simplified model for low-voltage powerline used as a high frequency communication channel is presented. With this model, the Orthogonal Frequency Division Multiplexing (OFDM) based...Based on the experimental results, a simplified model for low-voltage powerline used as a high frequency communication channel is presented. With this model, the Orthogonal Frequency Division Multiplexing (OFDM) based high rate digital communication over low-voltage powerline is analyzed and simulated. The capability of the signal transmission system in overcoming multi-path interference and selection of the system parameters are discussed. And time-domain simulation is carried out to investigate the transmission capability of the OFDM communication system for different mapping schemes and transmission power levels. Simulation results show that it is possible to realize high rate digital communication over low-voltage powerline using OFDM when the transmitted power is large enough.展开更多
Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment f...Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment for WSNs. It is tempting to use many random and different instances of polynomial based key predistribution scheme for various parts of the WSN to enhance the efficiency of WSN key establishment protocols. This paper indicates that it is not secured in general to use many instances of Blom-Blundo et al. polynomial based key predistribution scheme in a WSN key establishment protocol. Thus the previously constructed group-based type WSN key predistribution schemes using polynomial based key predistribution scheme are insecure. We propose new generalized Bloin-Blundo et al. key predistribution schemes. These new generalized Blom-Blundo et al. key predistribution schemes can be used many times in one WSN key establishment protocol with only a small increase of cost. The application to group-based WSN key predistribution schemes is given.展开更多
This study explores the use of augmented reality smart glasses(ARSGs) by physicians and their adoption of these products in the Turkish medical industry.Google Glass was used as a demonstrative example for the introdu...This study explores the use of augmented reality smart glasses(ARSGs) by physicians and their adoption of these products in the Turkish medical industry.Google Glass was used as a demonstrative example for the introduction of ARSGs. We proposed an exploratory model based on the technology acceptance model by Davis. Exogenous factors in the model were defined by performing semi-structured in-depth interviews, along with the use of an expert panel in addition to the technology adoption literature. The framework was tested by means of a field study, data was collected via an Internet survey, and path analysis was used. The results indicate that there were a number of factors to be considered in order to understand ARSG adoption by physicians.Usefulness was influenced by ease of use, compatibility,ease of reminding, and speech recognition, while ease of use was affected by ease of learning, ease of medical education, external influence, and privacy. Privacy was the only negative factor that reduced the perceived ease of use,and was found to indirectly create a negative attitude.Compatibility emerged as the most significant external factor for usefulness. Developers of ARSGs should pay attention to healthcare-specific requirements for improved utilization and more extensive adoption of ARSGs in healthcare settings. In particular, they should focus on how to increase the compatibility of ARSGs. Further research needs to be conducted to explain the adoption intention of physicians.展开更多
基金Projects(611061006,61073187) supported by the National Nature Science Foundation of China
文摘To improve the performance of chaotic secure communication,three simplified chaotic systems with one variable parameter were investigated.Basic properties were analyzed including symmetry,dissipation and topological structure.Complex dynamical behaviors of the systems including chaos and periodic orbits were verified by numerical simulations,Lyapunov exponents and bifurcation diagrams.Interestingly,the three systems were integrated in a common circuit,and their dynamical behaviors were easily observed by adjusting regulable resistors R28,R14 and R17,respectively,and the relations between the variable resistor and the system parameter were deduced.The circuit experiment results agree well with the simulation results.Finally,a secure communication scheme based on chaos shift keying(CSK) was presented,which lays an experiment foundation for chaotic digital secure communication.
文摘The low voltage powerline is becoming a powerful solution to home network, building automation, and internet access as a result of its wide distribution, easy access and little maintenance. The character of powerline channel is very complicated because it is an open net. This article analysed the character of the powerline channel,introduced the basics of OFDM(Orthogonal Frequency Division Multiplexing), and studied the OFDM applied into powerline high speed digital communication.
文摘The urban traffic information manageanent has become an important way of solving traffic jam of cities. With the wider use of the third generation of mobile conmmunication (3G) networks, information management based on 3G will be a central issue of application. The paper designs a fi-amework of Global Posititoning System (GPS) vehicle navigating and guiding system using 3G mobile network and Glbal Information System (GIS) electronic map according to moving objects. It discusses moving object's time-space attrihltes which will be described by a five-field and a directed graph. It analyzes the GPS mobile apparatus' s software functions and hardware structures. Anti it improves the function of GPS mobile apparatus which provide the guiding function utilizing the shared information of traffic. The navigation based on the shortest path algortithm is been advanced to one based on the real-time traffic flow of moving objects, which help people travelling on roads more convenietly.
文摘The novel satellite Multiple Access scheme called Combined Free/Demand Assignment Multiple Access-Predictive Request (CFDAMA-PR) is proposed in this paper. In the CFDAMA-PR scheme, the ground station requests the demand assignment slots by predicting the positive varying trend of the traffic source. The delay performances between CFDAMA-PR and CFDAMA-RR (Round Robin request) schemes were compared by computer simulation. Simulations were carried out with the Interrupted Poisson Process (IPP) and the Interrupted Fluid Process (IFP) traffic models. Simulation results demonstrate that compared to CFDAMA-RR protocol, the CFDAMA-PR scheme achieves a better delay/throughput of satellite channel.
基金Project supported by the National Natural Science Foundation of China (Nos. 60772087 and 90604035), the 111 Project the Foundation for the Author of National Excellent Doctoral Dissertation of China (No. 200341)
文摘In this paper,the generalized bounds are derived on the partial periodic correlation of complex roots of unity sequence set with zero or low correlation zone(ZCZ/LCZ)as the important criteria of the sequence design and application.The derived bounds are with respect to family size,subsequence length,maximum partial autocorrelation sidelobe,maximum partial cross-correlation value and the ZCZ/LCZ.The results show that the derived bounds include the previous periodic bounds,such as Sarwate bound,Welch bound,Peng-Fan bound and Paterson-Lothian bound,as special cases.
基金The National Basic Research Program (973) of China (No. 2005CB321804)
文摘An improved scalar Costa scheme (SCS) was proposed by using improved Watson perceptual model to adaptively decide quantization step size and scaling factor. The improved scheme equals to embed hiding data based on an actual image. In order to withstand amplitude scaling attack, the Watson perceptual model was redefined, and the improved scheme using the new definition can insure quantization step size in decoder that is proportional to amplitude scaling attack factor. The performance of the improved scheme outperforms that of SCS with fixed quantization step size. The improved scheme combines information theory and visual model.
文摘This paper studies statistical multiplexing performance by input of video traffic and data traffic. The inputs have different Qos requirements such as loss and delay jitter. By applying a modified FBM model, we present methods to estimate effective bandwidth of the aggregated traffic. Simulations were performed to evaluate effective bandwidth. The comparison between the estimation and the simulation shows that the estimations can give correct data for the effective bandwidths in terms of our interests. The analysis of gain by using priority multiplexing also addresses proper Qos configuration for the inputs in order to achieve positive gains.
基金National High Technology Research and Development Program (863 Program) of China (No. 2010AA09Z104)the Fundamental Research Funds for the Central Universities
文摘The computational load is prohibitive for real-time image generation in 3-D sonar systems, particularly when the steering angle approximation is required. In this paper, a novel multiple Chirp Zeta Transforms (MCZT) beamforming method in frequency domain is being proposed. The single long-length Chirp Zeta Transform (CZT) in the original CZT beamforming is replaced by several CZTs with smaller lengths for different partitions along each dimension. The implementing routine of the algorithm is also optimized. Furthermore, an avenue to evaluate the estimating error for the angle approximation in 3-D imaging applications is presented, and an approach to attain valid partitions for the steering angles is also flhistrated. This paper demonstrates a few advantages of the proposed frequency-domain beamforming method over existing methods in terms of the computatianal complexity.
基金Project (No. 2006AA01Z273) supported by the National Hi-TechResearch and Development Program (863) of China
文摘We propose the spectrum allocation and resource scheduling algorithms in cognitive point to multipoint (PMP) networks with rapid changes of spectrum opportunities and present a media access control (MAC) protocol based on these algorithms. The objective of spectrum allocation is to make efficient use of the spectrum while maintaining the transceiver synchronization on frequency and time in the network. The objective of resource scheduling is to guarantee the quality of service (QoS) requirements of different kinds of connections and to minimize the total energy consumption in the network as well. By sensing only a small set of possible channels in each slot based on the state transition probability of each channel, our spectrum allocation algorithm achieves high spectrum efficiency in the network. The resource scheduling problem is divided into three sub problems and we derive optimal solutions to these problems by greedy algorithm and convex optimization. The simulation results show that our algorithm can make efficient use of the spectrum and the network resources at a cost of low computational complexity.
基金Supported by National Natural Science Foundation of China ( No. 60472078) , and Cisco University Research Program Fund at Community Foundation Silicon Valley( No. 20029303 ).
文摘In the IEEE g02. 11 protocol, the adoption of the exponential backoff technique leads to throughput performance strongly dependent on the initial contention window size and, most importantly, on the number of contending stations considered in the network. This paper proposes a simple but accurate method to dynamically estimate the number of contending stations in a wireless local area network ( WLAN ). Based on estimation, all the mobile stations dynamically adjust the initial contention window in medium access control ( MAC ) layer to avoid collisions. The simulation results show that the proposed algorithm can achieve efficient channel utilization, higher system throughput, and better fairness performance.
基金National863 Program for High Technique Research Development Project( 2 0 0 2 AA712 0 3 1)
文摘There are some problems in the dual-layer satellite MPLs metworks to be composed of LEO and MEO. In order to solve the problems, this paper presents a plan by means of unicast LSP to implement multicast in the dual-layer satellite MPLs networks. It has advantages of saving space and reducing extra charge.
文摘In a direct spectrum (DS) system, the PN code can be estimated by analyzing the singular vectors of the received data matrix in order to blind despread in a non-cooperative context. But as there are informa-tion data reversions in the analyzed data matrix, some parts of the estimated PN code may be invertible to the original PN code, which may bring about problems in the following despreading process. In order to solve this problem, a method to well reconstruct the PN code is proposed. This method is based on power detection. The combination scheme which has the maximum power is the best combination scheme that is most suitable to the original PN code. Simulation results show that the method can reconstruct the PN code very well,even if the signal-to-noise ratio is low.
文摘The standardized IEEE ,802. II distributed coordination function ( DCF) provides a contention-based distributed channel access mechanism for mobile stations to share the wireless medium. However, when stations are mobile or portable units, power consumption becomes a primary issue since terminals are usually battery driven. This paper proposes an analytical model that calculates the energy efficiency of both the basic and the RTS/CTS access mechanisms of the IEEE 802. II protocol. The model is validated with simulation results using NS-2 simulation package. The effects of the network size, the average packet length, the initial contention window and maximum backoff stages on the energy efficiency of both access mechanisms are also investigated. Results show that the basic scheme has low energy efficiency at large packet length and large network size, and depends strongly on the number of stations and the backoff procedure parameters. Conversely, the RTS/CTS mechanism provides higher energy efficiency when the network size is large, and is more robust to variations in the backoff procedure parameters.
文摘Based on the experimental results, a simplified model for low-voltage powerline used as a high frequency communication channel is presented. With this model, the Orthogonal Frequency Division Multiplexing (OFDM) based high rate digital communication over low-voltage powerline is analyzed and simulated. The capability of the signal transmission system in overcoming multi-path interference and selection of the system parameters are discussed. And time-domain simulation is carried out to investigate the transmission capability of the OFDM communication system for different mapping schemes and transmission power levels. Simulation results show that it is possible to realize high rate digital communication over low-voltage powerline using OFDM when the transmitted power is large enough.
基金the NSFC Danish National Research Foundation and National Science Foundation of China Joint Grant (No. 11061130539)the National Natural Science Foundation of China (No. 61021004)
文摘Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment for WSNs. It is tempting to use many random and different instances of polynomial based key predistribution scheme for various parts of the WSN to enhance the efficiency of WSN key establishment protocols. This paper indicates that it is not secured in general to use many instances of Blom-Blundo et al. polynomial based key predistribution scheme in a WSN key establishment protocol. Thus the previously constructed group-based type WSN key predistribution schemes using polynomial based key predistribution scheme are insecure. We propose new generalized Bloin-Blundo et al. key predistribution schemes. These new generalized Blom-Blundo et al. key predistribution schemes can be used many times in one WSN key establishment protocol with only a small increase of cost. The application to group-based WSN key predistribution schemes is given.
文摘This study explores the use of augmented reality smart glasses(ARSGs) by physicians and their adoption of these products in the Turkish medical industry.Google Glass was used as a demonstrative example for the introduction of ARSGs. We proposed an exploratory model based on the technology acceptance model by Davis. Exogenous factors in the model were defined by performing semi-structured in-depth interviews, along with the use of an expert panel in addition to the technology adoption literature. The framework was tested by means of a field study, data was collected via an Internet survey, and path analysis was used. The results indicate that there were a number of factors to be considered in order to understand ARSG adoption by physicians.Usefulness was influenced by ease of use, compatibility,ease of reminding, and speech recognition, while ease of use was affected by ease of learning, ease of medical education, external influence, and privacy. Privacy was the only negative factor that reduced the perceived ease of use,and was found to indirectly create a negative attitude.Compatibility emerged as the most significant external factor for usefulness. Developers of ARSGs should pay attention to healthcare-specific requirements for improved utilization and more extensive adoption of ARSGs in healthcare settings. In particular, they should focus on how to increase the compatibility of ARSGs. Further research needs to be conducted to explain the adoption intention of physicians.