In multimedia conference, the capability of audio processing is basic and requires more for real-time criteria. In this article, we categorize and analyze the schemes, and provide several multipoint speech audio mixin...In multimedia conference, the capability of audio processing is basic and requires more for real-time criteria. In this article, we categorize and analyze the schemes, and provide several multipoint speech audio mixing schemes using weighted algorithm, which meet the demand of practical needs for real-time multipoint speech mixing, for which the ASW and AEW schemes are especially recommended. Applying the adaptive algorithms, the high-performance schemes we provide do not use the saturation operation widely used in multimedia processing. Therefore, no additional noise will be added to the output. The above adaptive algorithms have relatively low computational complexity and good hearing perceptibility. The schemes are designed for parallel processing, and can be easily implemented with hardware, such as DSPs, and widely applied in multimedia conference systems.展开更多
Applying IEEE802.11MAC protocols in baltery-powered devices make power consumption critical demand upon implementation.A statistical study on operator/bit usage,the weight of operator and operator type in the programs...Applying IEEE802.11MAC protocols in baltery-powered devices make power consumption critical demand upon implementation.A statistical study on operator/bit usage,the weight of operator and operator type in the programs has been done,including converting the MAC functions from SDL to C to ASM with tow RISC targts. The study shows that implementing MAC. functions should consider real-time protocol re3quirements by dividing MAC functions into sets. We enhance the set of time-critical functions implemented to dedicated hardwere and the set of non-time-critical functions implemented to software run with embedded processor. This heterogeneous system is proposed in consideration of our study results to reduce popwer consumption.展开更多
Due to complex computation and poor real-time performance of the traditional iris recognition system,iris feature is extracted by using amplitude and phase information of the mean image blocks based on Gabor filtering...Due to complex computation and poor real-time performance of the traditional iris recognition system,iris feature is extracted by using amplitude and phase information of the mean image blocks based on Gabor filtering on image,and the k-nearest neighbor algorithm is combined to complete iris recognition function.The recognition reduces the recognition time and improves the recognition accuracy.At the same time,identification result is transmitted to the cloud server through ZigBee network to solve diffcult wiring problem.The experiment shows the system runs stably and has fast recognition speed.It has been applied to a security system.展开更多
With the increasing importance of cloud services worldwide, the cloud infrastructure and platform management has become critical for cloud service providers. In this paper, a novel architecture of intelligent server m...With the increasing importance of cloud services worldwide, the cloud infrastructure and platform management has become critical for cloud service providers. In this paper, a novel architecture of intelligent server management framework is proposed. In this framework, the communication layer is based on the Extensible Messaging and Presence Protocol (XMPP), which was developed for instant messaging and has been proven to be highly mature and suitable for mobile and large scalable deployment due to its extensibility and efficiency. The proposed architecture can simplify server management and increase flexibility and scalability when managing hundreds of thousands of servers in the cloud era.展开更多
This letter introduces the implementation of H.263 video codec based on multimedia DSP TM1300, and discuses several key problems related to video coding.
This paper studies a routing protocol used in the application of collecting real-time traffic information using mobile vehicles to monitor traffic status. The biggest challenge of vehicular ad hoe network routing prot...This paper studies a routing protocol used in the application of collecting real-time traffic information using mobile vehicles to monitor traffic status. The biggest challenge of vehicular ad hoe network routing protocol lies in the mismatch between the direction of moving vehicles and routed data. In order to deal with this mismatch, a mesh based routing protocol with a two-tier network architecture is proposed. By using mesh nodes deployed at intersections, data can be routed through an optimized path which can improve the delivery ratio and reduce the consumption of network resources. The simulation uses the mobility model processed from the GPS data of taxis mnning in Shanghai urban areas. The result shows that the proposed protocol outperforms the existing flooding protocol.展开更多
We present an efficient two-step entanglement concentration protocol(ECP)for three-level atoms trapped in one-sided optical micro-cavities in an arbitrary three-particle less-entangled W state,using the coherent state...We present an efficient two-step entanglement concentration protocol(ECP)for three-level atoms trapped in one-sided optical micro-cavities in an arbitrary three-particle less-entangled W state,using the coherent state input-output process in low-Q cavity quantum electrodynamics system.In each step of the new proposed protocol,one of the three remote users prepares the auxiliary coherent optical pulses to perform cavity input-output process and then utilizes the standard homodyne measurement to discriminate the final outgoing coherent states.When both of the two steps are successful,remote parties can deterministically concentrate the less-entangled W state atoms to a standard maximally entangled W state.Compared with previous ECPs for W state,this protocol has some advantages and can be widely used in current quantum repeater and some quantum information processing tasks.展开更多
Precise zero-knowledge was introduced by Micali and Pass in STOC06. This notion captures the idea that the view of a verifier can be reconstructed in almost same time. Following the notion, they constructed some preci...Precise zero-knowledge was introduced by Micali and Pass in STOC06. This notion captures the idea that the view of a verifier can be reconstructed in almost same time. Following the notion, they constructed some precise zero-knowledge proofs and arguments, in which the communicated messages are polynomial bits. In this paper, we employ the new simulation technique introduced by them to provide a precise simulator for a modified Kilian's zero-knowledge arguments with poly-logarithmic efficiency (this modification addressed by Rosen), and as a result we show this protocol is a precise zero-knowledge argument with poly-logaxithmic efficiency. We also present an alternative construction of the desired protocols.展开更多
The current massive use of digital communications demands a secure link by using an embedded system(ES) with data encryption at the protocol level. The serial peripheral interface(SPI) protocol is commonly used by...The current massive use of digital communications demands a secure link by using an embedded system(ES) with data encryption at the protocol level. The serial peripheral interface(SPI) protocol is commonly used by manufacturers of ESs and integrated circuits for applications in areas such as wired and wireless communications. We present the design and experimental implementation of a chaotic encryption and decryption algorithm applied to the SPI communication protocol. The design of the chaotic encryption algorithm along with its counterpart in the decryption is based on the chaotic Hénon map and two methods for blur and permute(in combination with DNA sequences). The SPI protocol is configured in 16 bits to synchronize a transmitter and a receiver considering a symmetric key. Results are experimentally proved using two low-cost dsPIC microcontrollers as ESs. The SPI digital-to-analog converter is used to process, acquire, and reconstruct confidential messages based on its properties for digital signal processing. Finally, security of the cryptogram is proved by a statistical test. The digital processing capacity of the algorithm is validated by dsPIC microcontrollers.展开更多
文摘In multimedia conference, the capability of audio processing is basic and requires more for real-time criteria. In this article, we categorize and analyze the schemes, and provide several multipoint speech audio mixing schemes using weighted algorithm, which meet the demand of practical needs for real-time multipoint speech mixing, for which the ASW and AEW schemes are especially recommended. Applying the adaptive algorithms, the high-performance schemes we provide do not use the saturation operation widely used in multimedia processing. Therefore, no additional noise will be added to the output. The above adaptive algorithms have relatively low computational complexity and good hearing perceptibility. The schemes are designed for parallel processing, and can be easily implemented with hardware, such as DSPs, and widely applied in multimedia conference systems.
文摘Applying IEEE802.11MAC protocols in baltery-powered devices make power consumption critical demand upon implementation.A statistical study on operator/bit usage,the weight of operator and operator type in the programs has been done,including converting the MAC functions from SDL to C to ASM with tow RISC targts. The study shows that implementing MAC. functions should consider real-time protocol re3quirements by dividing MAC functions into sets. We enhance the set of time-critical functions implemented to dedicated hardwere and the set of non-time-critical functions implemented to software run with embedded processor. This heterogeneous system is proposed in consideration of our study results to reduce popwer consumption.
文摘Due to complex computation and poor real-time performance of the traditional iris recognition system,iris feature is extracted by using amplitude and phase information of the mean image blocks based on Gabor filtering on image,and the k-nearest neighbor algorithm is combined to complete iris recognition function.The recognition reduces the recognition time and improves the recognition accuracy.At the same time,identification result is transmitted to the cloud server through ZigBee network to solve diffcult wiring problem.The experiment shows the system runs stably and has fast recognition speed.It has been applied to a security system.
文摘With the increasing importance of cloud services worldwide, the cloud infrastructure and platform management has become critical for cloud service providers. In this paper, a novel architecture of intelligent server management framework is proposed. In this framework, the communication layer is based on the Extensible Messaging and Presence Protocol (XMPP), which was developed for instant messaging and has been proven to be highly mature and suitable for mobile and large scalable deployment due to its extensibility and efficiency. The proposed architecture can simplify server management and increase flexibility and scalability when managing hundreds of thousands of servers in the cloud era.
文摘This letter introduces the implementation of H.263 video codec based on multimedia DSP TM1300, and discuses several key problems related to video coding.
基金Supported by the National Basic Research Program of China (No. 2006CB303000)the National Natural Science Foundation of China (No. 60773091, F020303).
文摘This paper studies a routing protocol used in the application of collecting real-time traffic information using mobile vehicles to monitor traffic status. The biggest challenge of vehicular ad hoe network routing protocol lies in the mismatch between the direction of moving vehicles and routed data. In order to deal with this mismatch, a mesh based routing protocol with a two-tier network architecture is proposed. By using mesh nodes deployed at intersections, data can be routed through an optimized path which can improve the delivery ratio and reduce the consumption of network resources. The simulation uses the mobility model processed from the GPS data of taxis mnning in Shanghai urban areas. The result shows that the proposed protocol outperforms the existing flooding protocol.
基金supported by the National Fundamental Research Program of China(Grant No.2010CB923202)the Specialized ResearchFund for the Doctoral Program of Education Ministry of China(GrantNo.20090005120008)the National Natural Science Foundation ofChina(Grant Nos.61177085 and 61205117)
文摘We present an efficient two-step entanglement concentration protocol(ECP)for three-level atoms trapped in one-sided optical micro-cavities in an arbitrary three-particle less-entangled W state,using the coherent state input-output process in low-Q cavity quantum electrodynamics system.In each step of the new proposed protocol,one of the three remote users prepares the auxiliary coherent optical pulses to perform cavity input-output process and then utilizes the standard homodyne measurement to discriminate the final outgoing coherent states.When both of the two steps are successful,remote parties can deterministically concentrate the less-entangled W state atoms to a standard maximally entangled W state.Compared with previous ECPs for W state,this protocol has some advantages and can be widely used in current quantum repeater and some quantum information processing tasks.
基金the National Natural Science Foundation of China (No.60573031)New Century Excellent Talent Program of Education Ministry of China (No.NCET-05-0398)
文摘Precise zero-knowledge was introduced by Micali and Pass in STOC06. This notion captures the idea that the view of a verifier can be reconstructed in almost same time. Following the notion, they constructed some precise zero-knowledge proofs and arguments, in which the communicated messages are polynomial bits. In this paper, we employ the new simulation technique introduced by them to provide a precise simulator for a modified Kilian's zero-knowledge arguments with poly-logarithmic efficiency (this modification addressed by Rosen), and as a result we show this protocol is a precise zero-knowledge argument with poly-logaxithmic efficiency. We also present an alternative construction of the desired protocols.
基金Project supported by the CONACYT,México(No.166654)
文摘The current massive use of digital communications demands a secure link by using an embedded system(ES) with data encryption at the protocol level. The serial peripheral interface(SPI) protocol is commonly used by manufacturers of ESs and integrated circuits for applications in areas such as wired and wireless communications. We present the design and experimental implementation of a chaotic encryption and decryption algorithm applied to the SPI communication protocol. The design of the chaotic encryption algorithm along with its counterpart in the decryption is based on the chaotic Hénon map and two methods for blur and permute(in combination with DNA sequences). The SPI protocol is configured in 16 bits to synchronize a transmitter and a receiver considering a symmetric key. Results are experimentally proved using two low-cost dsPIC microcontrollers as ESs. The SPI digital-to-analog converter is used to process, acquire, and reconstruct confidential messages based on its properties for digital signal processing. Finally, security of the cryptogram is proved by a statistical test. The digital processing capacity of the algorithm is validated by dsPIC microcontrollers.