In this paper, a new image encryption algorithm is proposed by integrating Sine and piecewise linear chaotic maps. In order to realize the effect of encrypted image, the security key and 2D Sine-piecewise linear chaot...
详细信息
In this paper, a new image encryption algorithm is proposed by integrating Sine and piecewise linear chaotic maps. In order to realize the effect of encrypted image, the security key and 2D Sine-piecewise linear chaotic map (SPLCM) are used to encrypt the image by using random sequence and random matrix, and then using the replacement operation and the diffusion operation of the original image. The proposed image encryption algorithm is simple and practical, and the simulation results show that this algorithm is able to encrypt different types of digital images into unidentifiable random images. The security analysis also shows that this algorithm has a higher security level.
By researching on the differential evolution(DE)algorithm and passive localization model of two-station time difference of arrival(TDOA)and frequency difference of arrival(FDOA),a new calculating method based on DE al...
详细信息
By researching on the differential evolution(DE)algorithm and passive localization model of two-station time difference of arrival(TDOA)and frequency difference of arrival(FDOA),a new calculating method based on DE algorithm is proposed for real-time *** precision position estimating employing time cumulate TDOA and FDOA values is also solved by this *** cases using both Instantaneous and multiple measurements are simulated,which show the more excellent performance on realtime effect and location precision comparing with unscented Kalman filter(UKF)*** location precision almost achieves the Cramer-Rao low bound(CRLB).Due to the simple principle and easy realization,this method is suitable for project application.
The large random errors in a typical MEMS gyros under the ranges of relative humidity *** order to solve the large random error under the ranges of relative humidity,a method based on adaptive threshold denoising and ...
详细信息
The large random errors in a typical MEMS gyros under the ranges of relative humidity *** order to solve the large random error under the ranges of relative humidity,a method based on adaptive threshold denoising and neural net work is proposed in this *** relative humidity experiment is carried to test LSM6DS3 MEMS *** the adaptive threshold denoising is used to separate the drift error and drift data modeled with RBF neural *** experimental res ults show the effectiveness of the method,and it is of great significance in improving the performance of MEMS gyros.
作者:
Ran LiZhaoWen LinJie XuYi SunNetwork and Information Center
Institute of Network Technology Beijing University of Posts and Telecommunications Beijing 100876 China 2 Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory Shijiazhuang 050081 China 3 National Engineering Laboratory for Mobile Network Security Beijing 100876 China
In addressing the routing issue in the SDN environment, an improved ant colony algorithm is proposed in this paper, in which the ants tend to balance the path with less pheromone. Besides, the Top-K optimal path algor...
In addressing the routing issue in the SDN environment, an improved ant colony algorithm is proposed in this paper, in which the ants tend to balance the path with less pheromone. Besides, the Top-K optimal path algorithm is used to optimize the evaluation set, speed up the evaluation, collect the status of the link in the network, and dynamically adjust the evaporation speed of the pheromone to ensure the real-time accuracy of the routing strategy. The QoS requirements of the service are also guaranteed according to the collected link QoS requirements. In such a scheme, combining the advantages of probabilistic routing and deterministic routing, path optimization is better achieved. The simulation of the traffic shows that the model can significantly improve the throughput of traffic in the SDN network, reduce the packet loss rate, and effectively guarantee load balancing.
Segmentation of remote sensing image is the key technology of positioning system. Firstly, we transform the remote sensing image from RGB pace to Lab space. Then, three centres are iterated by using K- means algorithm...
Segmentation of remote sensing image is the key technology of positioning system. Firstly, we transform the remote sensing image from RGB pace to Lab space. Then, three centres are iterated by using K- means algorithm. Finally, in order to eliminate the influence, the closed operation of mathematical morphology is used to correct the segmented image. The results show that it can segment the road from the remote sensing image in lab mode, by using K-means clustering algorithm. Moreover, Lab mode is more suitable for k-mean than other modes.
作者:
Chang, RuiLin, ZhaowenSun, YiXu, JieNetwork and Information Center
Institute of Network Technology Beijing University of Posts and Telecommunications Beijing 100876 China Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory National Engineering Laboratory for Mobile Network Security (No. 【2013】 2685) Network and Information Center Institute of Network Technology / Institute of Sensing Technology and Business Beijing University of Posts and Telecommunications. Beijing 100876 China
In SDN (Software Defined Network) environments, for the security considerations of the upper-layer application behaviors, we need to consider adding an access control mechanism to the northbound interface of the SDN c...
In SDN (Software Defined Network) environments, for the security considerations of the upper-layer application behaviors, we need to consider adding an access control mechanism to the northbound interface of the SDN control layer to limit the capabilities of the upper-layer applications, thereby improving the security of the SDN. In addition, considering the performance and management requirements of SDN, access control features including cross-domain support should be considered. In this paper, we proposed an MD-UCON access control model with role mechanism extension based on UCON and role-based access control mechanism. At the same time, we introduced a cross-domain role mapping method to support cross-domain access authorization, thereby enabling the model to be applied to the application of access control for the SDN northbound interface.
The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key...
详细信息
The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key setting has been found yet. In this paper,new state recovery attacks on Grain v1 utilizing the weak normality order of the employed keystream output function in the cipher are proposed. These attacks have remarkable advantages in the offline time,online time and memory complexities,which are all better than exhaustive key search. The success probability of each new attack is 0.632. The proposed attack primarily depends on the order of weak normality of the employed keystream output function. This shows that the weak normality order should be carefully considered when designing the keystream output functions of Grain-like stream ciphers.
Empirical privacy evaluation in OSNs may provide a better under standing of the effectiveness and the efficiency of the default privacy controls and those customized by the users. Proper user perception of the privacy...
详细信息
Based on stochastic geometry, this paper proposes a mathematical method to estimate the traffic in a D2D based cellular network. The purpose is to determine the normal flow of network to exclude heterogeneous Darknet ...
Based on stochastic geometry, this paper proposes a mathematical method to estimate the traffic in a D2D based cellular network. The purpose is to determine the normal flow of network to exclude heterogeneous Darknet flow (Tor network). Different from previous work, we assume there are two different kinds of receivers, cellular receivers and D2D receivers, each D2D receiver with its D2D trunking constitutes a D2D pair. We assume that the traffic can be generated in the transmission between a BS and a cellular receiver and that between a D2D trunking and a D2D receiver if and only if the received power is larger than a threshold and the rate in the transmission is above a specified rate. The framework is tractable and able to help us analyze how different parameters influence the network traffic. What's more, we can give the optimal scheme to achieve the maximal network traffic. At the same time, if the results calculated by this paper proposed or traditional formula is not matched, we think that the flow rate may be heterogeneous traffic, such as darknet flow(Tor).
暂无评论