Conventional Nyquist sampling and reconstruction of square waves at a finite rate will always result in aliasing because square waves are not band limited. Based on methods for signals with finite rate of innovation (...
详细信息
This paper examines the effects of current and conductance noises in a minimal Hodgkin- Huxley type model of a cold receptor neuron. Current noise enters the membrane equation directly while conductance noise is propa...
详细信息
This paper examines the effects of current and conductance noises in a minimal Hodgkin- Huxley type model of a cold receptor neuron. Current noise enters the membrane equation directly while conductance noise is propagated through the activation variables. Compared with common used interspike interval method, ISI-distance is a simple complementary approach to measure the different effects of current and conductance noises. ISI-distance extracts information from the interspike intervals by evaluating the ratio of instantaneous firing rates, which is parameter-free, time scale-independent and easy to visualize. Simulation results show that the most significant differences between different noise implementations in a pacemaker-like tonic firing regime at the transition to chaotic burst discharges.
Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in the area of information se- curity, such as for group authentication, cloud storage schemes, secure parallel communication and wir...
详细信息
Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in the area of information se- curity, such as for group authentication, cloud storage schemes, secure parallel communication and wireless mul- tipath routing protocols. However, a (t, n) SS cannot de- tect any deceptions among the dealer and shareholders. Veriable secret sharing (VSS) overcomes the weakness of (t, n) SS in such a way that it is able to detect cheaters by verifying the validity of shares or the correctness of the recovered secret under the condition that both shares and the secret are not compromised. Recently, two non- interactive VSSs based on Asmuth-Bloom's SS were pro- posed by Harn et al. and Liu et al., respectively. Both VSSs require shareholders to examine the range of values of some integers related to the secret before recovering the secret, which is a time-consuming operation. In this paper, we propose a novel integratable VSS mechanism that integrates the concepts of the generalized Chinese remainder theorem (GCRT), Shamir's SS and Asmuth- Bloom's SS. Our proposed VSS can verify that the secret reconstructed by any t or more shareholders is the same as the one that the dealer has generated. Analysis shows that our proposed VSS can provide perfect secrecy and better efficiency.
In this paper, we study the secrecy performance of a cellular network, where a device-to-device (D2D) communication shares the spectral resources with a multi-antenna base station (BS). By assuming known the channel s...
详细信息
ISBN:
(纸本)9781509028610
In this paper, we study the secrecy performance of a cellular network, where a device-to-device (D2D) communication shares the spectral resources with a multi-antenna base station (BS). By assuming known the channel state information (CSI) of the legitimate user and using the maximal ratio transmission (MRT) at the BS, we first derive a closed-form expression of the ergodic secrecy capacity (ESC) for the wiretap channel as well as the ergodic capacity (EC) for the D2D link. Then, we present a simple yet efficient power allocation scheme to maximize the secrecy performance while satisfying the D2D transmission requirement. Finally, numerical results are given to demonstrate the merit of our study, concluding that the interference from the D2D communication can be exploited as a friendly jammer to enhance the security transmission in cellular networks.
We propose a sparse hidden Markov model (HMM)-based single-channel speech enhancement method that models the speech and noise gains accurately in both stationary and nonstationary environments. The objective function ...
详细信息
This paper presents a novel approach to categorize multi-view vehicles in complex background using only two dimension characteristic vectors instead of high dimension vectors. Vehicles have large variability of models...
详细信息
Connection management uses hash table. Hash function and data structure are both the bottleneck technology. For balancing computation cost and uniformity of hash function, three new hash functions were devised--the Ra...
详细信息
This paper proposes a method to identify the hybrid modulation signals. Firstly, the method utilizes instantaneous frequency (IF) of signals combined with histogram to classify conventional signals and hybrid modulati...
详细信息
ISBN:
(纸本)9781510822023
This paper proposes a method to identify the hybrid modulation signals. Firstly, the method utilizes instantaneous frequency (IF) of signals combined with histogram to classify conventional signals and hybrid modulation signals. Then an improved signal segmentation method is used to resolve the hybrid modulation signals to conventional signals. Experimental results show that the proposed method can identify seven kinds of typical radar signals, and achieve 94% recognition accuracy when SNR is 3dB.
This paper presents a new intelligent proportional control(i Ps) for trajectory tracking of nonlinear affine-in control systems with unknown internal *** referred proposed controller which is based on an ultra-local m...
详细信息
This paper presents a new intelligent proportional control(i Ps) for trajectory tracking of nonlinear affine-in control systems with unknown internal *** referred proposed controller which is based on an ultra-local model and a time-delay estimation technique has a very simple structure and easily to be *** with the systems output feedback,the proposed controller dose not require any knowledge of nonlinear internal dynamics ensuring the trajectory tracking of systems ***,to validate the proposed method,a nonlinear cart system which includes different kind of frictions have been considered to compare with different model free controls of time delay estimation based control(TDEC) and recursive model free control(RMFC),and illustrates its corresponding performance and robustness.
Multiple-input Multiple-output (MIMO) radar is a new radar system which utilizes multiple antennas at both the transmitting side and the receiving side. In order to suppress the spread-Doppler sea clutter and eliminat...
详细信息
暂无评论