Data deduplication, as a compression method, has been widely used in most backup systems to improve bandwidth and space efficiency. As data exploded to be backed up, two main challenges in data deduplication are the C...Data deduplication, as a compression method, has been widely used in most backup systems to improve bandwidth and space efficiency. As data exploded to be backed up, two main challenges in data deduplication are the CPU-intensive chunking and hashing works and the I/0 intensive disk-index access latency. However, CPU-intensive works have been vastly parallelized and speeded up by multi-core and many-core processors; the I/0 latency is likely becoming the bottleneck in data deduplication. To alleviate the challenge of I/0 latency in multi-core systems, multi-threaded deduplication (Multi-Dedup) architecture was proposed. The main idea of Multi-Dedup was using parallel deduplication threads to hide the I/0 latency. A prefix based concurrent index was designed to maintain the internal consistency of the deduplication index with low synchronization overhead. On the other hand, a collisionless cache array was also designed to preserve locality and similarity within the parallel threads. In various real-world datasets experiments, Multi-Dedup achieves 3-5 times performance improvements incorporating with locality-based ChunkStash and local-similarity based SiLo methods. In addition, Multi-Dedup has dramatically decreased the synchronization overhead and achieves 1.5-2 times performance improvements comparing to traditional lock-based synchronization methods.展开更多
Channel estimation using pilot is common used in OFDM system.The pilot is usually time division multiplexed with the informative sequence.One of the main drawbacks is bandwidth losing.In this paper,a new method was pr...Channel estimation using pilot is common used in OFDM system.The pilot is usually time division multiplexed with the informative sequence.One of the main drawbacks is bandwidth losing.In this paper,a new method was proposed to perform channel estimation in OFDM system.The pilot is arithmetically added to the output of OFDM modulator.Receiver uses the hidden pilot to get an accurate estimation of the channel.Then pilot is removed after channel estimation.The Cramer-Rao lower bound for this method was deprived.The performance of the algorithm is then shown.Compared with traditional methods,the proposed algorithm increases the bandwidth efficiency dramatically.展开更多
Traditional information hiding algorithms cannot maintain a good balance of capacity,invisibility and robustness.In this paper,a novel blind colour image information hiding algorithm based on grey prediction and grey ...Traditional information hiding algorithms cannot maintain a good balance of capacity,invisibility and robustness.In this paper,a novel blind colour image information hiding algorithm based on grey prediction and grey relational analysis in the Discrete Cosine Transform(DCT) domain is proposed.First,this algorithm compresses the secret image losslessly based on the improved grey prediction GM(1,1)(IGM) model.It then chooses the blocks of rich texture in the cover image as the embedding regions using Double-dimension Grey Relational Analysis(DGRA).Finally,it adaptively embeds the compressed secret bits stream into the DCT domain mid-frequency coefficients,which are decided by those blocks' Double-Dimension Grey Correlation Degree(DGCD) and Human Visual System(HVS).This method can ensure an adequate balance between invisibility,capacity and robustness.Experimental results show that the proposed algorithm is robust against JPEG compression(46.724 6 dB when the compression quality factor is 90%),Gaussian noise(45.531 3 dB when the parameter is(0,0.000 5)) etc.,and it is a blind information hiding algorithm that can be extracted without an original carrier.展开更多
A cluster analyzing algorithm based on grids is introduced in this paper,which is applied to data mining in the city emergency system. In the previous applications, data mining was based on the method of analyzing poi...A cluster analyzing algorithm based on grids is introduced in this paper,which is applied to data mining in the city emergency system. In the previous applications, data mining was based on the method of analyzing points and lines, which was not efficient enough in dealing with the geographic information in units of police areas. The proposed algorithm maps an event set stored as a point set to a grid unit set, utilizes the cluster algorithm based on grids to find out all the clusters, and shows the results in the method of visualization. The algorithm performs well when dealing with high dimensional data sets and immense data. It is suitable for the data mining based on geogra-(phic) information system and is supportive to decision-makings in the city emergency system.展开更多
While modeling a power supply system for an electric railway traction, knowing equivalent circuits of locomotives supplied this way is an essential issue. In alternating current traction, it is important to diagnose i...While modeling a power supply system for an electric railway traction, knowing equivalent circuits of locomotives supplied this way is an essential issue. In alternating current traction, it is important to diagnose inter alia processes taking place in transformers installed on electric vehicles. This article presents specific phenomena occurring during the work of mono-phase, multi-winding, multisystem (systems AC: 50 Hz, 16.7 Hz) laboratory traction transformer. It also shows difficulties encountered during the process of identifying multi-port equivalent scheme's elements of the described device, in which a construction defect occurs.展开更多
In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is con...In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (gig) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the Peak signal-to-noise ratio (PSNR) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.展开更多
基金Project(IRT0725)supported by the Changjiang Innovative Group of Ministry of Education,China
文摘Data deduplication, as a compression method, has been widely used in most backup systems to improve bandwidth and space efficiency. As data exploded to be backed up, two main challenges in data deduplication are the CPU-intensive chunking and hashing works and the I/0 intensive disk-index access latency. However, CPU-intensive works have been vastly parallelized and speeded up by multi-core and many-core processors; the I/0 latency is likely becoming the bottleneck in data deduplication. To alleviate the challenge of I/0 latency in multi-core systems, multi-threaded deduplication (Multi-Dedup) architecture was proposed. The main idea of Multi-Dedup was using parallel deduplication threads to hide the I/0 latency. A prefix based concurrent index was designed to maintain the internal consistency of the deduplication index with low synchronization overhead. On the other hand, a collisionless cache array was also designed to preserve locality and similarity within the parallel threads. In various real-world datasets experiments, Multi-Dedup achieves 3-5 times performance improvements incorporating with locality-based ChunkStash and local-similarity based SiLo methods. In addition, Multi-Dedup has dramatically decreased the synchronization overhead and achieves 1.5-2 times performance improvements comparing to traditional lock-based synchronization methods.
基金The National Natural Science Foundation ofChina(No.60332030)The National High Technology Research and Development Pro-gram of China(863Program)(No.2003AA123310)
文摘Channel estimation using pilot is common used in OFDM system.The pilot is usually time division multiplexed with the informative sequence.One of the main drawbacks is bandwidth losing.In this paper,a new method was proposed to perform channel estimation in OFDM system.The pilot is arithmetically added to the output of OFDM modulator.Receiver uses the hidden pilot to get an accurate estimation of the channel.Then pilot is removed after channel estimation.The Cramer-Rao lower bound for this method was deprived.The performance of the algorithm is then shown.Compared with traditional methods,the proposed algorithm increases the bandwidth efficiency dramatically.
基金sponsored by the National Natural Science Foundation of China under Grants No.61170065,No.61003039,No.61202355the Science and Technology Support Project of Jiangsu under Grant No.BE2012183+4 种基金the Natural Science Key Fund for Colleges and Universities in Jiangsu Province under Grant No.12KJA520002the Postdoctoral Fund under Grants No.1101011B,No.2012M511753the Fund for Nanjing University of Posts and Telecommunications under Grant No.NY212047Fund of Jiangsu Computer Information Processing Technology Key Laboratory under Grant No.KJS1022the Priority Academic Program Development of Jiangsu Higher Education Institutions under Grant No.yx002001
文摘Traditional information hiding algorithms cannot maintain a good balance of capacity,invisibility and robustness.In this paper,a novel blind colour image information hiding algorithm based on grey prediction and grey relational analysis in the Discrete Cosine Transform(DCT) domain is proposed.First,this algorithm compresses the secret image losslessly based on the improved grey prediction GM(1,1)(IGM) model.It then chooses the blocks of rich texture in the cover image as the embedding regions using Double-dimension Grey Relational Analysis(DGRA).Finally,it adaptively embeds the compressed secret bits stream into the DCT domain mid-frequency coefficients,which are decided by those blocks' Double-Dimension Grey Correlation Degree(DGCD) and Human Visual System(HVS).This method can ensure an adequate balance between invisibility,capacity and robustness.Experimental results show that the proposed algorithm is robust against JPEG compression(46.724 6 dB when the compression quality factor is 90%),Gaussian noise(45.531 3 dB when the parameter is(0,0.000 5)) etc.,and it is a blind information hiding algorithm that can be extracted without an original carrier.
文摘A cluster analyzing algorithm based on grids is introduced in this paper,which is applied to data mining in the city emergency system. In the previous applications, data mining was based on the method of analyzing points and lines, which was not efficient enough in dealing with the geographic information in units of police areas. The proposed algorithm maps an event set stored as a point set to a grid unit set, utilizes the cluster algorithm based on grids to find out all the clusters, and shows the results in the method of visualization. The algorithm performs well when dealing with high dimensional data sets and immense data. It is suitable for the data mining based on geogra-(phic) information system and is supportive to decision-makings in the city emergency system.
文摘While modeling a power supply system for an electric railway traction, knowing equivalent circuits of locomotives supplied this way is an essential issue. In alternating current traction, it is important to diagnose inter alia processes taking place in transformers installed on electric vehicles. This article presents specific phenomena occurring during the work of mono-phase, multi-winding, multisystem (systems AC: 50 Hz, 16.7 Hz) laboratory traction transformer. It also shows difficulties encountered during the process of identifying multi-port equivalent scheme's elements of the described device, in which a construction defect occurs.
文摘In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (gig) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the Peak signal-to-noise ratio (PSNR) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.