期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
ERROR-DETECTING CODES AND UNDETECTED ERROR PROBABILITIES
1
作者 徐大专 《Journal of Electronics(China)》 1994年第1期37-43,共7页
The definition of good codes for error-detection is given. It is proved that a (n, k) linear block code in GF(q) are the good code for error-detection, if and only if its dual code is also. A series of new results abo... The definition of good codes for error-detection is given. It is proved that a (n, k) linear block code in GF(q) are the good code for error-detection, if and only if its dual code is also. A series of new results about the good codes for error-detection are derived. New lower bounds for undetected error probabilities are obtained, which are relative to n and k only, and not the weight structure of the codes. 展开更多
关键词 Information theory Linear BLOCK CODE Dual CODE undetected ERROR PROBABILITY GOOD CODE for error-detection
下载PDF
The undetected error probabilities of combinatorial codes and their dual codes
2
作者 Xia, ST Fu, FW 《Chinese Science Bulletin》 SCIE EI CAS 1997年第23期2017-2018,共2页
IT is known that the average undetected error probability (UEP) of a binary [n, k] code Con a binary symmetric channel with crossover probability p is given byP<sub>e</sub>(p) = sum from i=1 A<sub&g... IT is known that the average undetected error probability (UEP) of a binary [n, k] code Con a binary symmetric channel with crossover probability p is given byP<sub>e</sub>(p) = sum from i=1 A<sub>i</sub>p<sup>i</sup>(1-p)<sup>n-1</sup>, (1)where (A<sub>0</sub>, A<sub>1</sub>,…, A<sub>n</sub>) is the weight distribution of C. If for all 0≤p≤0.5, P<sub>e</sub>(p)≤P<sub>e</sub>(0. 5) = 2<sup>k-n</sup>-2<sup>-n</sup>, then C is called good for error detection. Moreover, if P<sub>e</sub> (p) ismonotonously increasing in the interval [0, 0.5], then C is called proper. Clearly, propercodes are good. 展开更多
关键词 UEP The undetected error probabilities of combinatorial codes and their dual codes CODE
原文传递
An Explanation for the Undetection of Radio Pulsar in Supernova 1987A
3
作者 王双强 王娜 +1 位作者 王德华 尚伦华 《Chinese Physics Letters》 SCIE CAS CSCD 2017年第12期88-90,共3页
Supernova 1987 A is a core collapse supernova in the Large Magellanic Cloud, inside which the product is most likely a neutron star. Despite the most sensitive available detection instruments from radio to γ-ray wave... Supernova 1987 A is a core collapse supernova in the Large Magellanic Cloud, inside which the product is most likely a neutron star. Despite the most sensitive available detection instruments from radio to γ-ray wavebands being exploited in the pass thirty years, there have not yet been any pulse signals detected. By considering the density of the medium plasma in the remnant of 1987 A, we find that the plasma cut-off frequency is approximately7 GHz, a value higher than the conventional observational waveband of radio pulsars. As derived, with the expansion of the supernova remnant, the radio signal will be detected in 2073 A.D. at 3 GHz. 展开更多
关键词 An Explanation for the Undetection of Radio Pulsar in Supernova 1987A RADIO
下载PDF
ERROR DETECTION CAPABILITY OF SHORTENED HAMMING CODES AND THEIR DUAL CODES
4
作者 夏树涛 符方伟 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2000年第3期292-298,共7页
The undetected error probability and error detection capability of shortened Hamming codes and their dual codes are studied in this paper. We also obtain some interesting properties for the shortened Simplex codes.
关键词 Error detection undetected error probability hamming codes simplex codes combinatorial codes
全文增补中
Simple Three-Party Password Authenticated Key Exchange Protocol 被引量:1
5
作者 罗乃维 叶国晖 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期600-603,共4页
Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on pas... Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on passwords. In recent years, researchers focused on developing simple 3PAKE (S-3PAKE) protocol to gain system e?ciency while preserving security robustness for the system. In this study, we first demonstrate how an undetectable on-line dictionary attack can be successfully applied over three existing S-3PAKE schemes. An error correction code (ECC) based S-3PAKE protocol is then introduced to eliminate the identified authentication weakness. 展开更多
关键词 AUTHENTICATION CRYPTANALYSIS error correction code (ECC) simple three-party password authenticated key exchange (S-3PAKE) security undetectable on-line dictionary attack
原文传递
SABATPG-A Structural Analysis Based Automatic Test Generation System
6
作者 李忠诚 潘榆奇 闵应骅 《Science China Mathematics》 SCIE 1994年第9期1104-1114,共11页
A TPG system, SABATPG, is given based on a generic structural model of large circuits. Three techniques of partial implication, aftereffect of identified undetectable faults and shared sensitization with new concepts ... A TPG system, SABATPG, is given based on a generic structural model of large circuits. Three techniques of partial implication, aftereffect of identified undetectable faults and shared sensitization with new concepts of localization and aftereffect are employed in the system to improve FAN algorithm. Experiments for the 10 ISCAS benchmark circuits show that the computing time of SABATPG for test generation is 19.42% less than that of FAN algorithm. 展开更多
关键词 TEST GENERATION SENSITIZATION IMPLICATION undetectable FAULT
原文传递
A Method to Estimate the Steganographic Capacity in DCT Domain Based on MCUU Model
7
作者 MAO Jiafa HUANG Yanhong +3 位作者 NIU Xinxin XIAO Gang ZHU Linan SHENG Weiguo 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第4期283-290,共8页
In order to estimate maximum steganographic capacity of discrete cosine transform(DCT) domain in JPEG image, this paper presents a method based on the maximize capacity under undetectable model(MCUU). We analyze t... In order to estimate maximum steganographic capacity of discrete cosine transform(DCT) domain in JPEG image, this paper presents a method based on the maximize capacity under undetectable model(MCUU). We analyze the relation between steganographic capacity and affecting factors(image size, steganography operator, loading band, embedding intensity and image complexity). Then we design a steganography analyzer architecture and a steganographic algorithm which can dynamically increase the steganographic capacity. Compared with other methods of embedding capacity estimation in DCT domain, the proposed methods utilizes general steganalysis methods rather than one specific steganalysis technique and takes five essential factors into account, which improves the commonality and comprehensiveness of capacity estimation, respectively. The experimental results show that steganographic capacity for quantization index modulation(QIM) is almost twice that of spread spectrum(SS) based on MCUU model. 展开更多
关键词 maximize capacity under undetectable(MCUU) model steganographic capacity steganography steganalysis image complexity
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部