The optimal plane for measurement of the right ventricular (RV) volumes by real-time three-dimensional echocardiography (RT3DE) was determined and the feasibility and accuracy of RT3DE in studying RV systolic function...The optimal plane for measurement of the right ventricular (RV) volumes by real-time three-dimensional echocardiography (RT3DE) was determined and the feasibility and accuracy of RT3DE in studying RV systolic function was assessed. RV “Full volume” images were acquired by RT3DE in 22 healthy subjects. RV end-diastolic volumes (RVEDV) and end-systolic volumes (RVESV) were outlined using apical biplane, 4-plane, 8-plane, 16-plane offline separately. RVSV and RVEF were calculated. Meanwhile tricuspid annual systolic excursion (TASE) was measured by M-mode echo. LVSV was outlined by 2-D echo according to the biplane Simpson's rule. The results showed: (1) There was a good correlation between RVSV measured from series planes and LVSV from 2-D echo (r=0.73; r=0.69; r=0.63; r=0.66, P<0.25—0.0025); (2) There were significant differences between RVEDV in biplane and those in 4-, 8-, 16-plane (P<0.001). There was also difference between RV volume in 4-plane and that in 8-plane (P<0.05), but there was no significant difference between RV volume in 8-plane and that in 16-plane (P>0.05); (3) Inter-observers and intro-observers variability analysis showed that there were close agreements and relations for RV volumes (r=0.986, P<0.001; r=0.93, P<0.001); (4) There was a significantly positive correlation of TASE to RVSV and RVEF from RT3DE (r=0.83; r=0.90). So RV volume measures with RT3DE are rapid, accurate and reproducible. In view of RV's complex shape, apical 8-plane method is better in clinical use. It may allow early detection of RV systolic function.展开更多
When developing programs or websites, it is very convenient to use relational databases, which contain powerful and convenient tools that allow to work with data very flexibly and get the necessary information in a ma...When developing programs or websites, it is very convenient to use relational databases, which contain powerful and convenient tools that allow to work with data very flexibly and get the necessary information in a matter of milliseconds. A relational database consists of tables and records in these tables, each table must have a primary key, in particular, it can be a number of BIGINT type, which is a unique index of a record in the table, which allows to fetch operation with maximum speed and O (1) complexity. After the operation of writing a row to the table of database, the program receives the row identifier ID in the form of a number, and in the future this ID can be used to obtain this record. In the case of a website, this could be the GET method of the http protocol with the entry ID in the request. But very often it happens that the transmission of an identifier in the clear form is not safe, both for business reasons and for security reasons of access to information. And in this case, it is necessary to create additional functionality for checking access rights and come up with a way to encode data in such a way that it would be impossible to determine the record identifier, and this, in turn, leads to the fact that the program code becomes much more complicated and also increases the amount of data, necessary to ensure the operation of the program. This article presents an algorithm that solves these problems “on the fly” without complicating the application logic and does not require resources to store additional information. Also, this algorithm is very reliable since it is based on the use of hash functions and synthesized as a result of many years of work related to writing complex systems that require an increased level of data security and program performance.展开更多
Voluntary participation of hemiplegic patients is crucial for functional electrical stimulation therapy.A wearable functional electrical stimulation system has been proposed for real-time volitional hand motor functio...Voluntary participation of hemiplegic patients is crucial for functional electrical stimulation therapy.A wearable functional electrical stimulation system has been proposed for real-time volitional hand motor function control using the electromyography bridge method.Through a series of novel design concepts,including the integration of a detecting circuit and an analog-to-digital converter,a miniaturized functional electrical stimulation circuit technique,a low-power super-regeneration chip for wireless receiving,and two wearable armbands,a prototype system has been established with reduced size,power,and overall cost.Based on wrist joint torque reproduction and classification experiments performed on six healthy subjects,the optimized surface electromyography thresholds and trained logistic regression classifier parameters were statistically chosen to establish wrist and hand motion control with high accuracy.Test results showed that wrist flexion/extension,hand grasp,and finger extension could be reproduced with high accuracy and low latency.This system can build a bridge of information transmission between healthy limbs and paralyzed limbs,effectively improve voluntary participation of hemiplegic patients,and elevate efficiency of rehabilitation training.展开更多
The volume-time curve change in patients with normal left ventricular (LV) diastolic function and diastolic dysfunction was evaluated by real-time three-dimensional echocardiography (RT3DE). LV diastolic dysfuncti...The volume-time curve change in patients with normal left ventricular (LV) diastolic function and diastolic dysfunction was evaluated by real-time three-dimensional echocardiography (RT3DE). LV diastolic dysfunction was defined by E'〈A' in pulse-wave tissue Doppler for inter-ventricular septal (IVS) of mitral annulus. In 24 patients with LV diastolic dysfunction, including 12 patients with delayed relaxation (delayed relaxation group) and 12 patients with pseudo-normal function (pseudo-normal group) and 24 normal volunteers (control group), data of full-volume image were acquired by real-time three-dimensional echocardiography and subjected to volume-time curve analysis. EDV (end-diastolic volume), ESV (end-systolic volume), LVEF (left ventricular ejection fraction), PER (peak ejection rate), PFR (peak filling rate) from RT3DE were examined in the three groups. Compared to the control group, PFR (diastolic filling index of RT3DE) was significantly reduced in the delayed relaxation group and pseudo-normal group (P〈0.05). There were no significant differences in EDV, ESV, LVEE PER (P〉0.05). It is concluded that PFR, as a diastolic filling index of RT3DE, can reflect the early diastolic function and serve as a new non-invasive, quick and accurate tool for clinical assessment of LV diastolic function.展开更多
Objective:To analyze the correlation between real-time three-dimensional ultrasound in diagnosis of left ventricular function, portal hemodynamics and severity of liver function in patients with liver cirrhosis.Method...Objective:To analyze the correlation between real-time three-dimensional ultrasound in diagnosis of left ventricular function, portal hemodynamics and severity of liver function in patients with liver cirrhosis.Methods: 90 patients with cirrhosis admitted to our hospital from January 2017 to December 2018 were enrolled in the cirrhosis group, and the cirrhosis components were group A, B and C according to the Child-Pauh classification criteria. During the same period, 90 healthy subjects who underwent physical examination were selected as the control group;real-time three-dimensional ultrasonography was performed to examine left ventricular function and portal hemodynamic parameters;Pearson correlation was used to analyze left ventricular function, portal hemodynamics and liver. Functional severity relationship.Results: The left heart E and E/A levels in the cirrhosis group were significantly lower than those in the control group (P<0.05), and the A level was significantly higher than the control group (P<0.05). The Dpv and Q levels in the cirrhosis group were significantly higher than those in the healthy control group. The difference was statistically significant (P<0.05), and the level of Vpv was significantly lower than that of healthy controls (P<0.05). There were significant differences in E, A and E/A levels between different Child-Paugh patients (P<0.05). There were significant differences in portal hemodynamics Dpv, Vpv and Q between the different Child-Paugh grades, and the difference was statistically significant (P<0.05);left heart function E and E/A and liver function severity There was a significant negative correlation (P<0.05). There was a significant positive correlation between left cardiac function A and liver function severity (P<0.05). Portal vein hemodynamics Dpv, Vpv and QE were significantly associated with liver function severity. Positive correlation (P<0.05). Conclusion: Real-time three-dimensional ultrasound can effectively detect left ventricular function and portal hemodynamics changes in patients with cirrhosis, and left heart function, portal hemodynamics and liver function severity are significantly correlated.展开更多
Based on the hybrid numerical method (HNM) combining with a reduced-basis method (RBM), the real-time transient response of a functionally graded material (FGM) plates is obtained. The large eigenvalue problem in wave...Based on the hybrid numerical method (HNM) combining with a reduced-basis method (RBM), the real-time transient response of a functionally graded material (FGM) plates is obtained. The large eigenvalue problem in wavenumber domain has been solved through real-time off-line/on-line calculation. At off-line stage, a reduced-basis space is constructed in sample wavenumbers according to the solved eigenvalue problems. The matrices independent of parameters are projected onto the reduced-basis spaces. At on-line stage, the reduced eigenvalue problems of the arbitrary wavenumbers are built. Subsequently, the responses in wavenumber domain are obtained by the approximated eigen-pairs. Because of the application of RBM, the computational cost of transient displacement analysis of FGM plate is decreased significantly, while the accuracy of the solution and the physics of the structure are still retained. The efficiency and validity of the proposed method are demonstrated through a numerical example.展开更多
In order to meet the needs of higher operation speed and lower energy consumption an optimized SHA-1 algorithm is proposed.It combines two methods loop-unfolding and pre-processing.In the process intermediate variable...In order to meet the needs of higher operation speed and lower energy consumption an optimized SHA-1 algorithm is proposed.It combines two methods loop-unfolding and pre-processing.In the process intermediate variables are introduced in the iterations and pre-calculated so that the original single-threading operation can perform in a multi-threading way.This optimized algorithm exploits parallelism to shorten the critical path for hash operations.And the cycles of the original algorithm are reduced from 80 to 41 which greatly improves the operation speed.Therefore the shortened iterations of the optimized design require a smaller amount of hardware resource thus achieving a lower energy consumption. The optimized algorithm is implemented on FPGA field programmable gate array .It can achieve a throughput rate of 1.2 Gbit /s with the maximum clock frequency of 91 MHz reaching a fair balance between operation speed and throughput rate.The simulation results show that compared with other optimized SHA-1 algorithms this algorithm obtains higher operation speed and throughput rate without compromising the security of the original SHA-1 algorithm.展开更多
Based on the spatiotemporal chaotic system, a novel algorithm for constructing a one-way hash function is proposed and analysed. The message is divided into fixed length blocks. Each message block is processed by the ...Based on the spatiotemporal chaotic system, a novel algorithm for constructing a one-way hash function is proposed and analysed. The message is divided into fixed length blocks. Each message block is processed by the hash compression function in parallel. The hash compression is constructed based on the spatiotemporal chaos. In each message block, the ASCII code and its position in the whole message block chain constitute the initial conditions and the key of the hash compression function. The final hash value is generated by further compressing the mixed result of all the hash compression vulues. Theoretic analyses and numerical simulations show that the proposed algorithm presents high sensitivity to the message and key, good statistical properties, and strong collision resistance.展开更多
The collision and statistical properties of a one-way hash function based on spatiotemporal chaos are investigated. Analysis and simulation results indicate that collisions exist in the original algorithm and, therefo...The collision and statistical properties of a one-way hash function based on spatiotemporal chaos are investigated. Analysis and simulation results indicate that collisions exist in the original algorithm and, therefore, the original algorithm is insecure and vulnerable. An improved algorithm is proposed to avoid the collisions.展开更多
The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos ...The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. First, the chaos sequence is gotten by iterating cellular neural network with Runge Kutta algorithm, and then the chaos sequence is iterated with the message. The hash code is obtained through the corre- sponding transform of the latter chaos sequence. Simulation and analysis demonstrate that the new method has the merit of convenience, high sensitivity to initial values, good hash performance, especially the strong stability.展开更多
Hash functions are often used in the authentication of information security field. With the development of electronic commerce, the reliability of authentication is paid more and more attention to. This paper describe...Hash functions are often used in the authentication of information security field. With the development of electronic commerce, the reliability of authentication is paid more and more attention to. This paper describes an N - LFSR which combined nonlinear S - box with the LF-SR, and substitutes it for CLS operator in hash function. The efficiency of new hash function is not drop and the ability of defence attack is strengthened.展开更多
A new one-way hash function based on the unified chaotic system is constructed. With different values of a key parameter, the unified chaotic system represents different chaotic systems, based on which the one-way has...A new one-way hash function based on the unified chaotic system is constructed. With different values of a key parameter, the unified chaotic system represents different chaotic systems, based on which the one-way hash function algorithm is constructed with three round operations and an initial vector on an input message. In each round operation, the parameters are processed by three different chaotic systems generated from the unified chaotic system. Feed-forwards are used at the end of each round operation and at the end of each element of the message processing. Meanwhile, in each round operation, parameter-exchanging operations are implemented. Then, the hash value of length 160 bits is obtained from the last six parameters. Simulation and analysis both demonstrate that the algorithm has great flexibility, satisfactory hash performance, weak collision property, and high security.展开更多
A novel scheme to construct a hash function based on a weighted complex dynamical network (WCDN) generated from an original message is proposed in this paper. First, the original message is divided into blocks. Then...A novel scheme to construct a hash function based on a weighted complex dynamical network (WCDN) generated from an original message is proposed in this paper. First, the original message is divided into blocks. Then, each block is divided into components, and the nodes and weighted edges are well defined from these components and their relations. Namely, the WCDN closely related to the original message is established. Furthermore, the node dynamics of the WCDN are chosen as a chaotic map. After chaotic iterations, quantization and exclusive-or operations, the fixed-length hash value is obtained. This scheme has the property that any tiny change in message can be diffused rapidly through the WCDN, leading to very different hash values. Analysis and simulation show that the scheme possesses good statistical properties, excellent confusion and diffusion, strong collision resistance and high efficiency.展开更多
A new Hash function based on the generalized Henon map is proposed. We have obtained a binary sequence with excellent pseudo-random characteristics through improving the sequence generated by the generalized Henon map...A new Hash function based on the generalized Henon map is proposed. We have obtained a binary sequence with excellent pseudo-random characteristics through improving the sequence generated by the generalized Henon map, and use it to construct Hash function. First we divide the message into groups, and then carry out the Xor operation between the ASCII value of each group and the binary sequence, the result can be used as the initial values of the next loop. Repeat the procedure until all the groups have been processed, and the final binary sequence is the Hash value. In the scheme, the initial values of the generalized Henon map are used as the secret key and the messages are mapped to Hash values with a designated length. Simulation results show that the proposed scheme has strong diffusion and confusion capability, good collision resistance, large key space, extreme sensitivity to message and secret key, and it is easy to be realized and extended.展开更多
The multi-resolution adaptive grids method is proposed to solve the problems of inefficiency in the previous grid-based methods,and it can be used in clouds simulation as well as the interactive simulation between obj...The multi-resolution adaptive grids method is proposed to solve the problems of inefficiency in the previous grid-based methods,and it can be used in clouds simulation as well as the interactive simulation between objects and clouds.Oriented bounding box(OBB)hierarchical trees of objects are established,and the resolutions of global and local grids can be selected automatically.The motion equations of fluid dynamics are simplified.Upwind difference is applied to ensure the stability of the simulation process during the discrete process of partial differential equations.To solve the speed problem of existed phase functions,the improved phase function is applied to the illumination calculation of clouds.Experimental results show that the proposed methods can promote the simulation efficiency and meet the need for the simulation of large-scale clouds scene.Real-time rendering of clouds and the interaction between clouds and objects have been realized without preprocessing stage.展开更多
To ensure the security during the communication,we often adopt different ways to encrypt the messages to resist various attacks.However,with the computing power improving,the existing encryption and authentication sch...To ensure the security during the communication,we often adopt different ways to encrypt the messages to resist various attacks.However,with the computing power improving,the existing encryption and authentication schemes are being faced with big challenges.We take the message authentication as an example into a careful consideration.Then,we proposed a new message authentication scheme with the Advanced Encryption Standard as the encryption function and the new quantum Hash function as the authentication function.Firstly,the Advanced Encryption Standard algorithm is used to encrypt the result of the initial message cascading the corresponding Hash values,which ensures that the initial message can resist eavesdropping attack.Secondly,utilizing the new quantum Hash function with quantum walks can be much more secure than traditional classical Hash functions with keeping the common properties,such as one-wayness,resisting different collisions and easy implementation.Based on these two points,the message authentication scheme can be much more secure than previous ones.Finally,it is a new way to design the message authentication scheme,which provides a new thought for other researchers in the future.Our works will contribute to the study on the new encryption and authentication functions and the combination of quantum computing with traditional cryptology in the future.展开更多
A new algorithm for a novel hash function, based on chaotic tent map with changeable parameter, is proposed and analyzed. The one dimensional and piecewise tent map with changeable parameters decided by the position i...A new algorithm for a novel hash function, based on chaotic tent map with changeable parameter, is proposed and analyzed. The one dimensional and piecewise tent map with changeable parameters decided by the position index of blocked messages is chosen, and blocked massages translated into ASCII code values are employed as the iteration time of the chaotic tent map. The final 128-bit hash value is generated by logical XOR operation on intermediate hash values. Theoretical analysis and computer simulation indicate that the proposed algorithm can satisfy the performance requirements of hash function.展开更多
Message integrity is found to prove the transfer information of patient in health care monitoring system on the human body in order to collect and communicate the human personal data. Wireless body area network (WBAN)...Message integrity is found to prove the transfer information of patient in health care monitoring system on the human body in order to collect and communicate the human personal data. Wireless body area network (WBAN) applications are the fast growing technology trend but security and privacy are still largely ignored, since they are hard to achieve given the limited computation and energy resources available at sensor node level. In this paper, we propose simple hash based message authentication and integrity code algorithm for wireless sensor networks. We test the proposed algorithm in MATLAB on path loss model around the human body in two scenarios and compare the result before and after enhancement and show how sensors are connected with each other to prove the message integrity in monitoring health environment.展开更多
文摘The optimal plane for measurement of the right ventricular (RV) volumes by real-time three-dimensional echocardiography (RT3DE) was determined and the feasibility and accuracy of RT3DE in studying RV systolic function was assessed. RV “Full volume” images were acquired by RT3DE in 22 healthy subjects. RV end-diastolic volumes (RVEDV) and end-systolic volumes (RVESV) were outlined using apical biplane, 4-plane, 8-plane, 16-plane offline separately. RVSV and RVEF were calculated. Meanwhile tricuspid annual systolic excursion (TASE) was measured by M-mode echo. LVSV was outlined by 2-D echo according to the biplane Simpson's rule. The results showed: (1) There was a good correlation between RVSV measured from series planes and LVSV from 2-D echo (r=0.73; r=0.69; r=0.63; r=0.66, P<0.25—0.0025); (2) There were significant differences between RVEDV in biplane and those in 4-, 8-, 16-plane (P<0.001). There was also difference between RV volume in 4-plane and that in 8-plane (P<0.05), but there was no significant difference between RV volume in 8-plane and that in 16-plane (P>0.05); (3) Inter-observers and intro-observers variability analysis showed that there were close agreements and relations for RV volumes (r=0.986, P<0.001; r=0.93, P<0.001); (4) There was a significantly positive correlation of TASE to RVSV and RVEF from RT3DE (r=0.83; r=0.90). So RV volume measures with RT3DE are rapid, accurate and reproducible. In view of RV's complex shape, apical 8-plane method is better in clinical use. It may allow early detection of RV systolic function.
文摘When developing programs or websites, it is very convenient to use relational databases, which contain powerful and convenient tools that allow to work with data very flexibly and get the necessary information in a matter of milliseconds. A relational database consists of tables and records in these tables, each table must have a primary key, in particular, it can be a number of BIGINT type, which is a unique index of a record in the table, which allows to fetch operation with maximum speed and O (1) complexity. After the operation of writing a row to the table of database, the program receives the row identifier ID in the form of a number, and in the future this ID can be used to obtain this record. In the case of a website, this could be the GET method of the http protocol with the entry ID in the request. But very often it happens that the transmission of an identifier in the clear form is not safe, both for business reasons and for security reasons of access to information. And in this case, it is necessary to create additional functionality for checking access rights and come up with a way to encode data in such a way that it would be impossible to determine the record identifier, and this, in turn, leads to the fact that the program code becomes much more complicated and also increases the amount of data, necessary to ensure the operation of the program. This article presents an algorithm that solves these problems “on the fly” without complicating the application logic and does not require resources to store additional information. Also, this algorithm is very reliable since it is based on the use of hash functions and synthesized as a result of many years of work related to writing complex systems that require an increased level of data security and program performance.
基金supported by the National Natural Science Foundation of China,No.90307013,90707005,61534003the Science&Technology Pillar Program of Jiangsu Province in China,No.BE2013706
文摘Voluntary participation of hemiplegic patients is crucial for functional electrical stimulation therapy.A wearable functional electrical stimulation system has been proposed for real-time volitional hand motor function control using the electromyography bridge method.Through a series of novel design concepts,including the integration of a detecting circuit and an analog-to-digital converter,a miniaturized functional electrical stimulation circuit technique,a low-power super-regeneration chip for wireless receiving,and two wearable armbands,a prototype system has been established with reduced size,power,and overall cost.Based on wrist joint torque reproduction and classification experiments performed on six healthy subjects,the optimized surface electromyography thresholds and trained logistic regression classifier parameters were statistically chosen to establish wrist and hand motion control with high accuracy.Test results showed that wrist flexion/extension,hand grasp,and finger extension could be reproduced with high accuracy and low latency.This system can build a bridge of information transmission between healthy limbs and paralyzed limbs,effectively improve voluntary participation of hemiplegic patients,and elevate efficiency of rehabilitation training.
基金This project was supported by a grant from Guangdong Provincial Natural Sciences Foundation (No 05300738)
文摘The volume-time curve change in patients with normal left ventricular (LV) diastolic function and diastolic dysfunction was evaluated by real-time three-dimensional echocardiography (RT3DE). LV diastolic dysfunction was defined by E'〈A' in pulse-wave tissue Doppler for inter-ventricular septal (IVS) of mitral annulus. In 24 patients with LV diastolic dysfunction, including 12 patients with delayed relaxation (delayed relaxation group) and 12 patients with pseudo-normal function (pseudo-normal group) and 24 normal volunteers (control group), data of full-volume image were acquired by real-time three-dimensional echocardiography and subjected to volume-time curve analysis. EDV (end-diastolic volume), ESV (end-systolic volume), LVEF (left ventricular ejection fraction), PER (peak ejection rate), PFR (peak filling rate) from RT3DE were examined in the three groups. Compared to the control group, PFR (diastolic filling index of RT3DE) was significantly reduced in the delayed relaxation group and pseudo-normal group (P〈0.05). There were no significant differences in EDV, ESV, LVEE PER (P〉0.05). It is concluded that PFR, as a diastolic filling index of RT3DE, can reflect the early diastolic function and serve as a new non-invasive, quick and accurate tool for clinical assessment of LV diastolic function.
文摘Objective:To analyze the correlation between real-time three-dimensional ultrasound in diagnosis of left ventricular function, portal hemodynamics and severity of liver function in patients with liver cirrhosis.Methods: 90 patients with cirrhosis admitted to our hospital from January 2017 to December 2018 were enrolled in the cirrhosis group, and the cirrhosis components were group A, B and C according to the Child-Pauh classification criteria. During the same period, 90 healthy subjects who underwent physical examination were selected as the control group;real-time three-dimensional ultrasonography was performed to examine left ventricular function and portal hemodynamic parameters;Pearson correlation was used to analyze left ventricular function, portal hemodynamics and liver. Functional severity relationship.Results: The left heart E and E/A levels in the cirrhosis group were significantly lower than those in the control group (P<0.05), and the A level was significantly higher than the control group (P<0.05). The Dpv and Q levels in the cirrhosis group were significantly higher than those in the healthy control group. The difference was statistically significant (P<0.05), and the level of Vpv was significantly lower than that of healthy controls (P<0.05). There were significant differences in E, A and E/A levels between different Child-Paugh patients (P<0.05). There were significant differences in portal hemodynamics Dpv, Vpv and Q between the different Child-Paugh grades, and the difference was statistically significant (P<0.05);left heart function E and E/A and liver function severity There was a significant negative correlation (P<0.05). There was a significant positive correlation between left cardiac function A and liver function severity (P<0.05). Portal vein hemodynamics Dpv, Vpv and QE were significantly associated with liver function severity. Positive correlation (P<0.05). Conclusion: Real-time three-dimensional ultrasound can effectively detect left ventricular function and portal hemodynamics changes in patients with cirrhosis, and left heart function, portal hemodynamics and liver function severity are significantly correlated.
文摘Based on the hybrid numerical method (HNM) combining with a reduced-basis method (RBM), the real-time transient response of a functionally graded material (FGM) plates is obtained. The large eigenvalue problem in wavenumber domain has been solved through real-time off-line/on-line calculation. At off-line stage, a reduced-basis space is constructed in sample wavenumbers according to the solved eigenvalue problems. The matrices independent of parameters are projected onto the reduced-basis spaces. At on-line stage, the reduced eigenvalue problems of the arbitrary wavenumbers are built. Subsequently, the responses in wavenumber domain are obtained by the approximated eigen-pairs. Because of the application of RBM, the computational cost of transient displacement analysis of FGM plate is decreased significantly, while the accuracy of the solution and the physics of the structure are still retained. The efficiency and validity of the proposed method are demonstrated through a numerical example.
基金The Project of Wireless Intelligence Terminal Inspection Services(No.6704000084)the Special Program of the NationalDevelopment and Reform Committee
文摘In order to meet the needs of higher operation speed and lower energy consumption an optimized SHA-1 algorithm is proposed.It combines two methods loop-unfolding and pre-processing.In the process intermediate variables are introduced in the iterations and pre-calculated so that the original single-threading operation can perform in a multi-threading way.This optimized algorithm exploits parallelism to shorten the critical path for hash operations.And the cycles of the original algorithm are reduced from 80 to 41 which greatly improves the operation speed.Therefore the shortened iterations of the optimized design require a smaller amount of hardware resource thus achieving a lower energy consumption. The optimized algorithm is implemented on FPGA field programmable gate array .It can achieve a throughput rate of 1.2 Gbit /s with the maximum clock frequency of 91 MHz reaching a fair balance between operation speed and throughput rate.The simulation results show that compared with other optimized SHA-1 algorithms this algorithm obtains higher operation speed and throughput rate without compromising the security of the original SHA-1 algorithm.
基金Project supported by the National Natural Science Foundation of China (Grant No. U0735004)the Natural Science Foundation of Guangdong Province,China (Grant No. 05006593)
文摘Based on the spatiotemporal chaotic system, a novel algorithm for constructing a one-way hash function is proposed and analysed. The message is divided into fixed length blocks. Each message block is processed by the hash compression function in parallel. The hash compression is constructed based on the spatiotemporal chaos. In each message block, the ASCII code and its position in the whole message block chain constitute the initial conditions and the key of the hash compression function. The final hash value is generated by further compressing the mixed result of all the hash compression vulues. Theoretic analyses and numerical simulations show that the proposed algorithm presents high sensitivity to the message and key, good statistical properties, and strong collision resistance.
基金Project supported by the National Natural Science Foundation of China (Grant No.60973109)
文摘The collision and statistical properties of a one-way hash function based on spatiotemporal chaos are investigated. Analysis and simulation results indicate that collisions exist in the original algorithm and, therefore, the original algorithm is insecure and vulnerable. An improved algorithm is proposed to avoid the collisions.
基金supported by Key Program of Natural Science Fund of Tianjin of China (Grant No 07JCZDJC06600)
文摘The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. First, the chaos sequence is gotten by iterating cellular neural network with Runge Kutta algorithm, and then the chaos sequence is iterated with the message. The hash code is obtained through the corre- sponding transform of the latter chaos sequence. Simulation and analysis demonstrate that the new method has the merit of convenience, high sensitivity to initial values, good hash performance, especially the strong stability.
文摘Hash functions are often used in the authentication of information security field. With the development of electronic commerce, the reliability of authentication is paid more and more attention to. This paper describes an N - LFSR which combined nonlinear S - box with the LF-SR, and substitutes it for CLS operator in hash function. The efficiency of new hash function is not drop and the ability of defence attack is strengthened.
基金Project supported by the Natural Science Foundation of Hunan Province,China (Grant No 08JJ4020)
文摘A new one-way hash function based on the unified chaotic system is constructed. With different values of a key parameter, the unified chaotic system represents different chaotic systems, based on which the one-way hash function algorithm is constructed with three round operations and an initial vector on an input message. In each round operation, the parameters are processed by three different chaotic systems generated from the unified chaotic system. Feed-forwards are used at the end of each round operation and at the end of each element of the message processing. Meanwhile, in each round operation, parameter-exchanging operations are implemented. Then, the hash value of length 160 bits is obtained from the last six parameters. Simulation and analysis both demonstrate that the algorithm has great flexibility, satisfactory hash performance, weak collision property, and high security.
基金Project supported by the Natural Science Foundation of Jiangsu Province, China (Grant No. BK2010526)the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20103223110003)The Ministry of Education Research in the Humanities and Social Sciences Planning Fund, China (Grant No. 12YJAZH120)
文摘A novel scheme to construct a hash function based on a weighted complex dynamical network (WCDN) generated from an original message is proposed in this paper. First, the original message is divided into blocks. Then, each block is divided into components, and the nodes and weighted edges are well defined from these components and their relations. Namely, the WCDN closely related to the original message is established. Furthermore, the node dynamics of the WCDN are chosen as a chaotic map. After chaotic iterations, quantization and exclusive-or operations, the fixed-length hash value is obtained. This scheme has the property that any tiny change in message can be diffused rapidly through the WCDN, leading to very different hash values. Analysis and simulation show that the scheme possesses good statistical properties, excellent confusion and diffusion, strong collision resistance and high efficiency.
基金supported by the National Natural Science Foundation of China (Grant No 60372061)
文摘A new Hash function based on the generalized Henon map is proposed. We have obtained a binary sequence with excellent pseudo-random characteristics through improving the sequence generated by the generalized Henon map, and use it to construct Hash function. First we divide the message into groups, and then carry out the Xor operation between the ASCII value of each group and the binary sequence, the result can be used as the initial values of the next loop. Repeat the procedure until all the groups have been processed, and the final binary sequence is the Hash value. In the scheme, the initial values of the generalized Henon map are used as the secret key and the messages are mapped to Hash values with a designated length. Simulation results show that the proposed scheme has strong diffusion and confusion capability, good collision resistance, large key space, extreme sensitivity to message and secret key, and it is easy to be realized and extended.
基金supported by the National Natural Science Foundation of China(No.61102167)
文摘The multi-resolution adaptive grids method is proposed to solve the problems of inefficiency in the previous grid-based methods,and it can be used in clouds simulation as well as the interactive simulation between objects and clouds.Oriented bounding box(OBB)hierarchical trees of objects are established,and the resolutions of global and local grids can be selected automatically.The motion equations of fluid dynamics are simplified.Upwind difference is applied to ensure the stability of the simulation process during the discrete process of partial differential equations.To solve the speed problem of existed phase functions,the improved phase function is applied to the illumination calculation of clouds.Experimental results show that the proposed methods can promote the simulation efficiency and meet the need for the simulation of large-scale clouds scene.Real-time rendering of clouds and the interaction between clouds and objects have been realized without preprocessing stage.
基金Project supported by NSFC(Grant Nos.U1836205,61702040)the Major Scientific and Technological Special Project of Guizhou Province(Grant No.20183001)+2 种基金the Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant No.2018BDKFJJ016)the Foundation of State Key Laboratory of Public Big Data(Grant No.2018BDKFJJ018)Beijing Natural Science Foundation(Grant No.4174089).
文摘To ensure the security during the communication,we often adopt different ways to encrypt the messages to resist various attacks.However,with the computing power improving,the existing encryption and authentication schemes are being faced with big challenges.We take the message authentication as an example into a careful consideration.Then,we proposed a new message authentication scheme with the Advanced Encryption Standard as the encryption function and the new quantum Hash function as the authentication function.Firstly,the Advanced Encryption Standard algorithm is used to encrypt the result of the initial message cascading the corresponding Hash values,which ensures that the initial message can resist eavesdropping attack.Secondly,utilizing the new quantum Hash function with quantum walks can be much more secure than traditional classical Hash functions with keeping the common properties,such as one-wayness,resisting different collisions and easy implementation.Based on these two points,the message authentication scheme can be much more secure than previous ones.Finally,it is a new way to design the message authentication scheme,which provides a new thought for other researchers in the future.Our works will contribute to the study on the new encryption and authentication functions and the combination of quantum computing with traditional cryptology in the future.
基金Supported by the National Natural Science Foundation of China (No. 61173178, 61003247, 61070246) and the Fundamental Research Funds for the Central University (No. COJER1018002,cdjerl018003).
文摘A new algorithm for a novel hash function, based on chaotic tent map with changeable parameter, is proposed and analyzed. The one dimensional and piecewise tent map with changeable parameters decided by the position index of blocked messages is chosen, and blocked massages translated into ASCII code values are employed as the iteration time of the chaotic tent map. The final 128-bit hash value is generated by logical XOR operation on intermediate hash values. Theoretical analysis and computer simulation indicate that the proposed algorithm can satisfy the performance requirements of hash function.
文摘Message integrity is found to prove the transfer information of patient in health care monitoring system on the human body in order to collect and communicate the human personal data. Wireless body area network (WBAN) applications are the fast growing technology trend but security and privacy are still largely ignored, since they are hard to achieve given the limited computation and energy resources available at sensor node level. In this paper, we propose simple hash based message authentication and integrity code algorithm for wireless sensor networks. We test the proposed algorithm in MATLAB on path loss model around the human body in two scenarios and compare the result before and after enhancement and show how sensors are connected with each other to prove the message integrity in monitoring health environment.