This paper investigates the encryption efficiency of RC6 block cipher application to digital images, introducing a mathematical measure for encryption efficiency, which we will call the encryption quality instead of v...
详细信息
ISBN:
(纸本)142440892X
This paper investigates the encryption efficiency of RC6 block cipher application to digital images, introducing a mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection, The encryption quality of RC6 block cipher is investigated among its several design parameters such as word size, number of rounds, and secret key length and the optimal choices for the best values of such design parameters are given. Also, the security analysis of RC6 block cipher for digital images is investigated from strict cryptographic viewpoint. The security estimations of RC6 block cipher for digital images against brute-force, statistical, and differential attacks are explored. Experiments are made to test the security of RC6 block cipher for digital images against all aforementioned types of attacks. Experiments and results verify and prove that RC6 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC6 block cipher algorithm. So, RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images.
Coherence multiplexing is a potentially inexpensive form of optical code-division multiple access, which is particularly suitable for short-range applications with moderate bandwidth requirements, such as access netwo...
详细信息
A problem to make a graph strongly connected is one of the most fundamental problems in graph theory. The known parallel algorithm[1] solves this problem in O(log n) time using O(n3) processors on a CRCW PRAM model. I...
详细信息
This paper concerns a swing-up control problem for a 3-link gymnastic planar robot in a vertical plane, whose first joint is passive (unactuated) and the rest are active (actuated). The objectives of this paper are: 1...
详细信息
ISBN:
(纸本)9781424414970;1424414970
This paper concerns a swing-up control problem for a 3-link gymnastic planar robot in a vertical plane, whose first joint is passive (unactuated) and the rest are active (actuated). The objectives of this paper are: 1) to design a controller under which the robot can be brought into any arbitrarily small neighborhood of the upright equilibrium point, where all three links of the robot remain in their upright positions;2) to attain a global analysis of the motion of the robot under the controller. To tailor the energy based control approach to achieve the above objectives, first, this paper considers the links 2 and 3 as a virtually composite link and proposes a coordinate transformation of the angles of active joints. Second, this paper constructs a novel Lyapunov function based on the transformation, and devises an energy based swing-up controller. This paper presents a necessary and sufficient condition for nonexistence of any singular points in the controller for the robot starting from any initial state. Third, this paper carries out a global analysis of the motion of the robot under the controller, and establishes some conditions on control parameters for achieving the swing-up control objective. To validate the theoretical results obtained, this paper provides simulation results for a 3-link robot whose mechanical parameters are obtained from a human gymnast.
In this paper, we propose a method-of-moments (MoM) analysis that includes the borehole effects on crosshole borehole radar, and we verify that the MoM represents the crosshole borehole radar data correctly. We derive...
详细信息
This paper describes a novel performance evaluation technique of combined Code Division Multiple Access (CDMA) and Space Division Multiple Access (SDMA) multiuser receiver. The receiver detects users based on their co...
详细信息
ISBN:
(纸本)9781424407781
This paper describes a novel performance evaluation technique of combined Code Division Multiple Access (CDMA) and Space Division Multiple Access (SDMA) multiuser receiver. The receiver detects users based on their code and spatial signatures. Exact calculation of the MAI interference is considered in this paper for a single sector cell that adopts combined CDMA-SDMA system, and accommodates an arbitrary K number of users transmitting their data. The Bit Error Rate (BER) expressions of any arbitrary user have been derived. Parallel Interference Canceller (PIC) is adopted as a suboptimum multiuser detector. Comparison between the performance of a CDMA system and Combined CDMA-SDMA system with and without PIC receivers are investigated. Our results show that the BER of a system with PIC is noticeably improved compared to the one without PIC (conventional multiuser receiver). Finally, the combined system enhances the system capacity by means of improving the BER performance.
In this work, we investigate the characteristics of the 2004 major storm events based on GPS-TEC measurement at Scott Base station Antarctica (77.9S, 166.8E). The F2 layer critical frequencies and peak height during t...
详细信息
Random Testing (RT) is a fundamental technique of software testing. Adaptive Random Testing (ART) has recently been developed as an enhancement of RT that has better fault detection effectiveness. Several methods (alg...
详细信息
暂无评论