Frequency shift keying (FSK) modulation function in MATLAB without filter function, leading to poor adjacent channel suppression, which causes aliasing after a non-linear device easily. Based on FSK modulation signal ...
详细信息
ISBN:
(纸本)9781467370066
Frequency shift keying (FSK) modulation function in MATLAB without filter function, leading to poor adjacent channel suppression, which causes aliasing after a non-linear device easily. Based on FSK modulation signal generation principle, designing a better adjacent channel suppression function in this paper, which verified by demodulating through Agilent's vector signal analyzer (89600S), this function gets achieved more satisfactory results in the application of semi physical simulation.
Connected component (CC) labeling is time consuming during image segmentation and object identification, especially when input images are large-scale and binary converting uses multi-threshold. So in this paper, we pr...
详细信息
Connected component (CC) labeling is time consuming during image segmentation and object identification, especially when input images are large-scale and binary converting uses multi-threshold. So in this paper, we present a fast multi-level CC labeling by combining online threshold segmentation and a one-pass labeling algorithm, also a detailed architecture for hardware implementation is proposed. During labeling, firstly a gray image is converted to several binary data flows with different thresholds. Then they are marked by run-length code respectively with 2× 2 scanning windows, in the meantime, the equal labels between two adjacent rows are obtained by these windows for CC merging. By executing this process until the end of input image, the CC labels are obtained after one-pass image scanning. Our method is tested on more than 1000 gray images which resolution are 1920×1080. Experimental results show that our algorithm can extract the positions and areas of CC in multi-threshold binary images at least 50 frames per second (fps) on a Stratix IV FPGA platform running at 109.7 MHz.
We report on experimental studies on the beam quality of the 8μm ZGP optical parametric oscillator(OPO). Through conducting a series of comparative experiments, the effects of resonator length, type of phase matching...
详细信息
We report on experimental studies on the beam quality of the 8μm ZGP optical parametric oscillator(OPO). Through conducting a series of comparative experiments, the effects of resonator length, type of phase matching, resonant wavelength and structure of the resonator on the beam quality of ZGP OPO were studied respectively. By using longer resonator length (120mm), type I phase matching, longer resonant wavelength (8μm) and the ring cavity, the output with the beam quality factor of M 2 ~1.20 and 1.22 in the horizontal and vertical direction were achieved respectively. And this is a rather good beam quality level for 8μm ZGP OPO.
Most resource allocation algorithms are based on perfect channel and constant system parameters information in cognitive radio networks (CRNs). In order to adapt real communication environment, a dynamic particle swar...
详细信息
In order to guarantee quality of service (QoS) for secondary users (SUs) and primary users (PUs) in underlay cognitive radio networks (CRNs), the objective of this paper is to obtain minimum interference power to PUs ...
详细信息
In this paper, we explore the problem of multiview subspace clustering. We introduce a low-rank tensor constraint to explore the complementary information from multiple views and, accordingly, establish a novel method...
详细信息
ISBN:
(纸本)9781467383929
In this paper, we explore the problem of multiview subspace clustering. We introduce a low-rank tensor constraint to explore the complementary information from multiple views and, accordingly, establish a novel method called Low-rank Tensor constrained Multiview Subspace Clustering (LT-MSC). Our method regards the subspace representation matrices of different views as a tensor, which captures dexterously the high order correlations underlying multiview data. Then the tensor is equipped with a low-rank constraint, which models elegantly the cross information among different views, reduces effectually the redundancy of the learned subspace representations, and improves the accuracy of clustering as well. The inference process of the affinity matrix for clustering is formulated as a tensor nuclear norm minimization problem, constrained with an additional L2,1-norm regularizer and some linear equalities. The minimization problem is convex and thus can be solved efficiently by an Augmented Lagrangian Alternating Direction Minimization (AL-ADM) method. Extensive experimental results on four benchmark datasets show the effectiveness of our proposed LT-MSC method.
Feistel structure is widely used in the design of block ciphers. With many Feistel-type ciphers being designed, it is likely for some of them to have some similarity which can be shown in their differential characteri...
详细信息
ISBN:
(纸本)9781479987962
Feistel structure is widely used in the design of block ciphers. With many Feistel-type ciphers being designed, it is likely for some of them to have some similarity which can be shown in their differential characteristics or linear characteristics. Noticing two Feistel-type ciphers, LBlock and TWINE, have the same number of impossible differential chains using U-method without considering the details of S-boxes. In this paper, we first introduce a graph model to describe the topological structures of block ciphers, and then we prove the equivalence of LBlock and TWINE in structure using this model. Moreover, we present a matrix model for analyzing the similarity of two Feistel-type block ciphers.
10G Ethernet technology has been widely used in modern high speed communication system. As a result, program design for high-speed data capture on 10G Ethernet, as the first and important step in network monitor and a...
详细信息
The authentication error in Two-Hop wireless networks is considered without knowledge of eavesdropper channels and location. This paper presents an eavesdropper model with authentication error and two eavesdropping wa...
详细信息
ISBN:
(纸本)9781467379533
The authentication error in Two-Hop wireless networks is considered without knowledge of eavesdropper channels and location. This paper presents an eavesdropper model with authentication error and two eavesdropping ways. In the model, the authentication error is expressed a pair(p_1, p_2). Based on the authentication error, a cooperative transmission protocol against impersonation attack is presented. Then, the number of eavesdroppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes. Final, we draw two conclusions for authentication error: 1) the impersonate nodes are chosen as relay is the dominant factor of the transmitted message leakage, and the impersonation attack does seriously decrease the number of eavesdroppers can be tolerated. 2) The Error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated.
An anonymous cluster head election protocol in clustered wireless sensor networks was proposed. The protocol detailed the decision rules and mode of cluster construction while an anonymous veto protocol based on bilin...
详细信息
暂无评论