Since regular expressions (abbrev. regexes) are difficult to understand and compose, automatically generating regexes has been an important research problem. This paper introduces TRANSREGEX, for automatically constru...
详细信息
With the development of avionics system, the demand of health metrics of integrated system is getting stronger and stronger. By describing the requirements and resources of an integrated system logically, a requiremen...
详细信息
With the development of avionics system, the demand of health metrics of integrated system is getting stronger and stronger. By describing the requirements and resources of an integrated system logically, a requirement-oriented health metrics method of integrated system is proposed in this paper, then a reconstruction model of system resources is proposed depend upon the method. Furthermore, the decision-making method based on health metrics of integrated system is discussed.
Because of inherent characteristics of mobile ad hoc networks (MANETs), security attacks have pronounced effect on performance of the network. JellyFish Delay Variance (JFDV) attack is a kind of protocol compliant, cr...
详细信息
ISBN:
(纸本)9781450330336
Because of inherent characteristics of mobile ad hoc networks (MANETs), security attacks have pronounced effect on performance of the network. JellyFish Delay Variance (JFDV) attack is a kind of protocol compliant, cross layer attack that reduces throughput of network by delaying data packets during forwarding them. In this paper, we propose a non-cryptography approach which is resilient against JFDV attack for Optimized Link State Routing (OLSR) protocol. Proposed approach labels a node as misbehaving node after comparing its performance against Delay Threshold. Process of re-routing is initiated to route the data packet through the path consisting of non-attacking nodes. We analyze the performance of our approach on Packet Delivery Ratio (PDR) of network with different fraction of JF nodes and system size. Through extensive simulation and result, we show that proposed approach provides a secure architecture to thwart JFDV attack in MANET. Copyright 2014 ACM 978-1-4503-3033-6/14/09. $15.00.
A new digital predistortion (DPD) technique for multi-band signals is proposed. The transmitter considered in this paper has multi-band signals, and those signals are combined and amplified by a single wideband power ...
详细信息
A new digital predistortion (DPD) technique for multi-band signals is proposed. The transmitter considered in this paper has multi-band signals, and those signals are combined and amplified by a single wideband power amplifier (PA). In this case, the PA output is distorted by the nonlinear crossproducts between different-band signals as well as their own nonlinear self-products. To linearize the PA and remove those nonlinear products, we propose a PD structure, which has multiple predistorters (one predistorter (PD) for one band). Each PD removes the nonlinear cross-products and self-products to mitigate the spectral regrowth for the corresponding band. Since the PD parameters for different bands are linked together, it is difficult to find the PD parameters separately. As an alternative method, we propose an iterative method for finding the PD parameters. The simulation results show that the iterative method converges well, and the proposed PD can effectively linearize the PA and remove spectral regrowth at each signal band.
The basic ideas of the signal encryption algorithms can be classified into three major types: position permutation, value transformation and the combination form. In this paper, a new signal security system and its VL...
详细信息
ISBN:
(纸本)0780374487
The basic ideas of the signal encryption algorithms can be classified into three major types: position permutation, value transformation and the combination form. In this paper, a new signal security system and its VLSI architecture are proposed. The encryption algorithm belongs to the combination form. Based on two bit-circulation functions with parameters controlled by a chaotic binary sequence, every eight pixels are value-transformed and then position-permuted in each bit plane. The scheme is analyzed and shown to have high security. In order to implement the system, its VLSI architecture with low hardware cost, high computing speeds, high modularity, regularity, and locality is designed.
An extremely efficient MPEG-2 video transcoding method is proposed, which has a low buffer requirement and results in a low-delay. Most importantly, the proposed method does not need the computational intensive motion...
详细信息
ISBN:
(纸本)0780343719
An extremely efficient MPEG-2 video transcoding method is proposed, which has a low buffer requirement and results in a low-delay. Most importantly, the proposed method does not need the computational intensive motion estimation. Simulation results demonstrate that the proposed approach results in very consistent video quality and maintains the buffer level effectively.
This paper describes an approach to minimize multiple-valued logic expressions by genetic algorithms. We encode a multiple-valued logic expression as a "chromosome" whose length allows to change and correspo...
详细信息
This paper describes an approach to minimize multiple-valued logic expressions by genetic algorithms. We encode a multiple-valued logic expression as a "chromosome" whose length allows to change and corresponds to the number of implicants of the expression. Our fitness function evaluates the following three items. 1. How may outputs does the logic expression represent correctly? 2. How many implicants does the logic expression require? 3. How many connections does the logic expression require? Our method employs the fitness function and minimizes sum-of-products expressions, where sum refers to TSUM or MAX and product refers to MIN of set literals or window literals. The simulation results show that our method derives good results for some arithmetic functions and intends to avoid the local minimal solution, compared to neural-computing-based method.
暂无评论