In order to improve the spectrum efficiency of the high-order polar coded modulation systems, the polar code is used as the component code of the bit-interleave coded modulation(BICM) system, a novel bit mapping schem...In order to improve the spectrum efficiency of the high-order polar coded modulation systems, the polar code is used as the component code of the bit-interleave coded modulation(BICM) system, a novel bit mapping scheme is proposed considering of the channel polarization and successive cancellation(SC) decoding principle of polar codes as well as the unequal protection of equivalent channels by modulator. In this scheme, the frozen bits on the unreliable split channel are allocated to the equivalent channel with the low protection of the modulator, while the equivalent channels with the high protection are used to transmit the information bits. Thus, the error-correcting performance of polar codes is improved. Compared with some bit mapping schemes, the proposed bit mapping scheme only needs to divide and choose the parameters of the split channels reliability measurement, the complexity does not increase obviously, and simulation results show that the proposed scheme has the better performance under the quadrature amplitude modulation(QAM) modulation based on the Gray mapping.展开更多
In this paper we analyse the security of a multiple pseudorandom-bit generator based on the coupled map lattice and suggest an improved model. Utilizing the error function attack, the multiple pseudorandom-bit generat...In this paper we analyse the security of a multiple pseudorandom-bit generator based on the coupled map lattice and suggest an improved model. Utilizing the error function attack, the multiple pseudorandom-bit generators which can be realized by the three digitization methods are analysed and the effective key spaces are estimated. We suggest an improved multiple pseudorandom-bit generator with 128-bit secret key, and analyse the key sensitivity and statistical properties of the system.展开更多
We study the impact of various modulation mapping strategies and signal constellation shapes on the se- crecy rates achievable with bit-interleaved coded modulation (BICM) schemes. Transmission over an ergodic Rayle...We study the impact of various modulation mapping strategies and signal constellation shapes on the se- crecy rates achievable with bit-interleaved coded modulation (BICM) schemes. Transmission over an ergodic Rayleigh fading channel is assumed throughout this work. Various constellations and mapping techniques are considered in this work to maximize the capacity difference between the main channel and the eavesdropper channel, rather than to opti- mize the capacity of both channels. We show that in terms of achievable secrecy rate, Gray and Quasi-Gray mappings only perform Well at low SNR but outperformed by other mapping techniques when SNR increases. The proper design of signal mapping can significantly enhance the achievable secrecy rate in BICM schemes. It is indicated that the key parameter to the secrecy rate of a BICM system is the distance spectrum of Euclidean distances for mappings.展开更多
网络应用的发展,要求路由器必须有能力支持防火墙、入侵检测、提供 QoS、流量计费等一系列功能,这些功能都要求路由器对IP包进行分类来完成对数据包的不同处理。目前的包分类算法不适用于大规模的规则数据库。该文在现有的一种基于位...网络应用的发展,要求路由器必须有能力支持防火墙、入侵检测、提供 QoS、流量计费等一系列功能,这些功能都要求路由器对IP包进行分类来完成对数据包的不同处理。目前的包分类算法不适用于大规模的规则数据库。该文在现有的一种基于位串的包分类算法上做了两个改进,位串的聚合和过滤规则的重排列。从而生成了一种新的包分类机制-ABV(Aggregated Bit Vector)。通过评测可看出这种新的算法可以很好地应用在大规模规则数据库上,性能比原先有很大提升。展开更多
基金supported by the National High Technology and Development Program of China (No.61971079)the Postgraduate Science Research Innovation project of Chongqing Municipal Education Commission (No.CYS20266)。
文摘In order to improve the spectrum efficiency of the high-order polar coded modulation systems, the polar code is used as the component code of the bit-interleave coded modulation(BICM) system, a novel bit mapping scheme is proposed considering of the channel polarization and successive cancellation(SC) decoding principle of polar codes as well as the unequal protection of equivalent channels by modulator. In this scheme, the frozen bits on the unreliable split channel are allocated to the equivalent channel with the low protection of the modulator, while the equivalent channels with the high protection are used to transmit the information bits. Thus, the error-correcting performance of polar codes is improved. Compared with some bit mapping schemes, the proposed bit mapping scheme only needs to divide and choose the parameters of the split channels reliability measurement, the complexity does not increase obviously, and simulation results show that the proposed scheme has the better performance under the quadrature amplitude modulation(QAM) modulation based on the Gray mapping.
基金Project supported by the National Natural Science Foundation of China(Grant No.60973109)
文摘In this paper we analyse the security of a multiple pseudorandom-bit generator based on the coupled map lattice and suggest an improved model. Utilizing the error function attack, the multiple pseudorandom-bit generators which can be realized by the three digitization methods are analysed and the effective key spaces are estimated. We suggest an improved multiple pseudorandom-bit generator with 128-bit secret key, and analyse the key sensitivity and statistical properties of the system.
文摘We study the impact of various modulation mapping strategies and signal constellation shapes on the se- crecy rates achievable with bit-interleaved coded modulation (BICM) schemes. Transmission over an ergodic Rayleigh fading channel is assumed throughout this work. Various constellations and mapping techniques are considered in this work to maximize the capacity difference between the main channel and the eavesdropper channel, rather than to opti- mize the capacity of both channels. We show that in terms of achievable secrecy rate, Gray and Quasi-Gray mappings only perform Well at low SNR but outperformed by other mapping techniques when SNR increases. The proper design of signal mapping can significantly enhance the achievable secrecy rate in BICM schemes. It is indicated that the key parameter to the secrecy rate of a BICM system is the distance spectrum of Euclidean distances for mappings.
文摘以二进制正交键控(binary orthogonal keying,BOK)为传统方法调制Chirp信号的检测手段日益丰富,针对常用时频分析手段分数阶傅里叶变换和短时傅里叶变换对Chirp信号的高破译性问题,提出了一种将信息映射到Chirp信号时域的新型调制方式,即时变信息映射(time varying-information mapping,TVIM)调制,通过构建时域携带信息的调制模式,解决了周期能量聚敛特性,增加了以BOK为检测思想的信息干扰,加强了波形的低截获概率(low probability of intercept,LPI)。以数学推导和仿真分析的方法,探究了新型调制方式的误码特性、时频分析下LPI特性及先验信息抗破译性。理论分析和仿真验证表明,TVIM调制架构下,可保证比特信噪比在13 dB前误码率达到10-4,并提高了波形LPI性能。
文摘网络应用的发展,要求路由器必须有能力支持防火墙、入侵检测、提供 QoS、流量计费等一系列功能,这些功能都要求路由器对IP包进行分类来完成对数据包的不同处理。目前的包分类算法不适用于大规模的规则数据库。该文在现有的一种基于位串的包分类算法上做了两个改进,位串的聚合和过滤规则的重排列。从而生成了一种新的包分类机制-ABV(Aggregated Bit Vector)。通过评测可看出这种新的算法可以很好地应用在大规模规则数据库上,性能比原先有很大提升。