首页 > 最新文献

2016 International Conference on Computer, Information and Telecommunication Systems (CITS)最新文献

英文 中文
On the performance of LT codes over BIAWGN channel 基于BIAWGN信道的LT码性能研究
Amrit Kharel, Lei Cao
Luby transform (LT) codes are defined by degree distribution functions of encoded symbols. In erasure channels, good degree distribution functions should prevent the ripple of degree-one symbols from vanishing until the successful termination of decoding process. In this paper, we show that for binary input additive white Gaussian noise (BIAWGN) channels, performance of LT codes also depends on the time at which source nodes in the decoding graph of the codes start receiving non-zero log-likelihood ratio (LLR) values. We show that source nodes can be categorized based on this time, and those in lower categories, i.e., those source nodes updated with non-zero LLR values at earlier iterations have higher probability of being decoded correctly. We theoretically derive formulas that can find the percentages of source nodes in each category for any given degree distribution function. We finally show that by increasing the number of source nodes in the lower categories, the bit error rate (BER) performance of LT codes can be drastically improved. This work provides a new perspective for the performance and design of such codes for BIAWGN channels.
Luby变换(LT)码是由编码符号的度分布函数定义的。在擦除信道中,良好的度分布函数应能防止一级符号的纹波消失,直到译码过程成功结束。在本文中,我们证明了对于二进制输入加性高斯白噪声(BIAWGN)信道,LT码的性能还取决于码的解码图中的源节点开始接收非零对数似然比(LLR)值的时间。我们证明了可以基于这个时间对源节点进行分类,并且那些类别较低的源节点,即在较早的迭代中使用非零LLR值更新的源节点具有更高的正确解码概率。我们从理论上推导出公式,可以找到任意给定度分布函数中每个类别中源节点的百分比。我们最后表明,通过增加较低类别的源节点数量,可以大大提高LT码的误码率(BER)性能。这项工作为BIAWGN信道的编码性能和设计提供了一个新的视角。
{"title":"On the performance of LT codes over BIAWGN channel","authors":"Amrit Kharel, Lei Cao","doi":"10.1109/CITS.2016.7546459","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546459","url":null,"abstract":"Luby transform (LT) codes are defined by degree distribution functions of encoded symbols. In erasure channels, good degree distribution functions should prevent the ripple of degree-one symbols from vanishing until the successful termination of decoding process. In this paper, we show that for binary input additive white Gaussian noise (BIAWGN) channels, performance of LT codes also depends on the time at which source nodes in the decoding graph of the codes start receiving non-zero log-likelihood ratio (LLR) values. We show that source nodes can be categorized based on this time, and those in lower categories, i.e., those source nodes updated with non-zero LLR values at earlier iterations have higher probability of being decoded correctly. We theoretically derive formulas that can find the percentages of source nodes in each category for any given degree distribution function. We finally show that by increasing the number of source nodes in the lower categories, the bit error rate (BER) performance of LT codes can be drastically improved. This work provides a new perspective for the performance and design of such codes for BIAWGN channels.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133748118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A distributed coverage optimization and connectivity maintenance strategy based on unknown sensors in WSAN 基于未知传感器的WSAN分布式覆盖优化与连通性维护策略
Yu Guo, Yun Zhang, Zhenqiang Mi, Yang Yang, M. Obaidat
Wireless sensor and actor network (WSAN) has received growing interests with the rapid development of Internet of things. Multiple function actors are added into the traditional wireless sensor networks to sense the environment, conduct tasks and give feedback. In this paper, an efficient distributed actor deployment strategy is proposed to address the connectivity maintenance and coverage optimization issues in WSAN with the consideration of unknown sensors' locations. In this proposed strategy, an artificial potential force based algorithm is utilized to detect the unknown sensors, and a fully distributed link deletion algorithm is introduced to delete redundant communication links thus expanding the search area. Then, an actor location optimization algorithm is developed based on the Voronoi diagram method to get a better coverage result. The global connectivity of the actors is guaranteed during the entire process. The performances of proposed strategy are validated analytically and experimentally.
随着物联网的快速发展,无线传感器与行动者网络(WSAN)受到越来越多的关注。传统的无线传感器网络中加入了多种功能的行动者来感知环境、执行任务并给出反馈。本文提出了一种有效的分布式参与者部署策略,以解决WSAN中考虑未知传感器位置的连接维护和覆盖优化问题。该策略采用人工势能算法检测未知传感器,采用全分布式链路删除算法删除冗余通信链路,扩大搜索范围。然后,提出了一种基于Voronoi图方法的演员位置优化算法,以获得更好的覆盖效果。在整个过程中,参与者的全局连通性得到了保证。通过分析和实验验证了所提策略的性能。
{"title":"A distributed coverage optimization and connectivity maintenance strategy based on unknown sensors in WSAN","authors":"Yu Guo, Yun Zhang, Zhenqiang Mi, Yang Yang, M. Obaidat","doi":"10.1109/CITS.2016.7546408","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546408","url":null,"abstract":"Wireless sensor and actor network (WSAN) has received growing interests with the rapid development of Internet of things. Multiple function actors are added into the traditional wireless sensor networks to sense the environment, conduct tasks and give feedback. In this paper, an efficient distributed actor deployment strategy is proposed to address the connectivity maintenance and coverage optimization issues in WSAN with the consideration of unknown sensors' locations. In this proposed strategy, an artificial potential force based algorithm is utilized to detect the unknown sensors, and a fully distributed link deletion algorithm is introduced to delete redundant communication links thus expanding the search area. Then, an actor location optimization algorithm is developed based on the Voronoi diagram method to get a better coverage result. The global connectivity of the actors is guaranteed during the entire process. The performances of proposed strategy are validated analytically and experimentally.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132370151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A design method for an improved soft core of ARMv4 instruction set based on FPGA 基于FPGA的ARMv4指令集改进软核设计方法
Qingming Yi, Min Shi, Ming-min Chen, Song Li
The commercial embedded microprocessor requires to be authorized, which increases the cost of the chip. The free embedded microprocessor soft-core is of poor portability, which causes difficulty on system design. In order to solve the above problems, this paper introduces an improved IP core base on ARMv4 instruction set. With an independent architecture, the IP core possesses good portability and compatibility. Firstly, hardware multiplier is used to solve the problem of the delay of multiplier, which can raise the speed of arithmetic. Secondly, taking the place of the three-stage instruction pipeline, a five-stage instruction pipeline is used to solve the problem of low efficiency. Finally, the whole core is implemented on FPGA, the utilization of resource is increased with resource sharing technique. The experiment results show that the ARMv4 instruction set can run correctly on the embedded microprocessor described in this paper. Compared with the similar ARMv4 microprocessor, it not only contains the advantage of high performance and open interface, but also is easy to design. The embedded microprocessor can be used in both the SOC system and the FPGA embedded system.
商用嵌入式微处理器需要获得授权,这增加了芯片的成本。自由嵌入式微处理器软核的可移植性差,给系统设计带来困难。为了解决上述问题,本文介绍了一种基于ARMv4指令集的改进IP核。IP核具有独立的体系结构,具有良好的可移植性和兼容性。首先,采用硬件乘法器解决了乘法器的延迟问题,提高了算法的速度。其次,用五阶段指令管道代替三阶段指令管道,解决了效率低的问题。最后,在FPGA上实现了整个核心,通过资源共享技术提高了资源的利用率。实验结果表明,ARMv4指令集可以在本文描述的嵌入式微处理器上正确运行。与同类的ARMv4微处理器相比,它不仅具有高性能和开放接口的优点,而且易于设计。嵌入式微处理器既可用于SOC系统,也可用于FPGA嵌入式系统。
{"title":"A design method for an improved soft core of ARMv4 instruction set based on FPGA","authors":"Qingming Yi, Min Shi, Ming-min Chen, Song Li","doi":"10.1109/CITS.2016.7546426","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546426","url":null,"abstract":"The commercial embedded microprocessor requires to be authorized, which increases the cost of the chip. The free embedded microprocessor soft-core is of poor portability, which causes difficulty on system design. In order to solve the above problems, this paper introduces an improved IP core base on ARMv4 instruction set. With an independent architecture, the IP core possesses good portability and compatibility. Firstly, hardware multiplier is used to solve the problem of the delay of multiplier, which can raise the speed of arithmetic. Secondly, taking the place of the three-stage instruction pipeline, a five-stage instruction pipeline is used to solve the problem of low efficiency. Finally, the whole core is implemented on FPGA, the utilization of resource is increased with resource sharing technique. The experiment results show that the ARMv4 instruction set can run correctly on the embedded microprocessor described in this paper. Compared with the similar ARMv4 microprocessor, it not only contains the advantage of high performance and open interface, but also is easy to design. The embedded microprocessor can be used in both the SOC system and the FPGA embedded system.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133040643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining causal rules hidden in spatial co-locations based on dynamic spatial databases 基于动态空间数据库的空间共置因果规则挖掘
Junli Lu, Lizhen Wang, Yuan Fang
Spatial co-locations represent the subsets of spatial features which are frequently located together in a geographic space. Spatial co-location mining has been a research hot in recent years. But the research on causal rule discovery hidden in spatial co-locations has not been reported. Maybe the features in a co-location accidentally share the similar environment, and maybe they are competitively living in the same environment, they themselves have no causal relationships. So mining causal rules in amount of prevalent co-locations is more interesting. This paper proposes a novel algorithm to mine causal rules from prevalent co-locations based on dynamic spatial databases. Because of large collections of prevalent co-locations and amount of rules in one co-location, the computational cost for the discovery is high, thus the pruning strategies are presented to solve the problem in an acceptable period of time. The extensive experiments evaluate the proposed algorithms with “real + synthetic” data sets and the results show that causal rules are just about 60% of co-location rules, and which are more powerful.
空间共位是指空间特征的子集,它们经常在一个地理空间中一起出现。空间同位挖掘是近年来的研究热点。但关于空间共置中隐含的因果规则发现的研究尚未见报道。也许共存环境中的特征偶然地共享了相似的环境,也许它们竞争地生活在同一个环境中,它们本身没有因果关系。因此,从普遍共置的数量中挖掘因果规则更有趣。提出了一种基于动态空间数据库的普遍共置因果规则挖掘算法。由于普遍的共址集合大,一个共址中的规则数量多,发现的计算成本高,因此提出了在可接受的时间内解决问题的剪枝策略。用“真实+合成”数据集对所提出的算法进行了广泛的实验评估,结果表明因果规则仅占共定位规则的60%左右,并且更强大。
{"title":"Mining causal rules hidden in spatial co-locations based on dynamic spatial databases","authors":"Junli Lu, Lizhen Wang, Yuan Fang","doi":"10.1109/CITS.2016.7546420","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546420","url":null,"abstract":"Spatial co-locations represent the subsets of spatial features which are frequently located together in a geographic space. Spatial co-location mining has been a research hot in recent years. But the research on causal rule discovery hidden in spatial co-locations has not been reported. Maybe the features in a co-location accidentally share the similar environment, and maybe they are competitively living in the same environment, they themselves have no causal relationships. So mining causal rules in amount of prevalent co-locations is more interesting. This paper proposes a novel algorithm to mine causal rules from prevalent co-locations based on dynamic spatial databases. Because of large collections of prevalent co-locations and amount of rules in one co-location, the computational cost for the discovery is high, thus the pruning strategies are presented to solve the problem in an acceptable period of time. The extensive experiments evaluate the proposed algorithms with “real + synthetic” data sets and the results show that causal rules are just about 60% of co-location rules, and which are more powerful.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129442892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A residual error analysis based secure CS approach for malicious node attack 基于残余误差分析的安全CS方法在恶意节点攻击中的应用
Yangqin Cao, Jun Yan, Weiping Zhu
In this paper, a secure compressive sensing (CS) based localization approach is proposed to cope with the attacked measurements from the malicious node by the residual error analysis. First, the intermediate target positions are estimated by the CS recovery method and then the residual errors are calculated as the indicator to identify each measurement. Second, according to the proposed residual error deviation rule, the suspicious attacked measurements set are obtained. So, based on the proposed largest residual error rule, the final attacked measurements are determined from the suspicious attacked measurements. At last, the final target positions are estimated by the CS approach with the attack-free measurements once again. Extensive simulation results demonstrate that the proposed algorithm can outperform the existing algorithms under malicious node attack environments.
本文提出了一种基于安全压缩感知(CS)的定位方法,通过残差分析来应对来自恶意节点的攻击测量。首先通过CS恢复法估计中间目标位置,然后计算残差作为识别每次测量的指标。其次,根据提出的残差偏差规则,得到可疑攻击的测量集;因此,基于所提出的最大残差规则,从可疑的攻击测量中确定最终的攻击测量。最后,再次利用无攻击测量的CS方法估计最终目标位置。大量的仿真结果表明,该算法在恶意节点攻击环境下的性能优于现有算法。
{"title":"A residual error analysis based secure CS approach for malicious node attack","authors":"Yangqin Cao, Jun Yan, Weiping Zhu","doi":"10.1109/CITS.2016.7546407","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546407","url":null,"abstract":"In this paper, a secure compressive sensing (CS) based localization approach is proposed to cope with the attacked measurements from the malicious node by the residual error analysis. First, the intermediate target positions are estimated by the CS recovery method and then the residual errors are calculated as the indicator to identify each measurement. Second, according to the proposed residual error deviation rule, the suspicious attacked measurements set are obtained. So, based on the proposed largest residual error rule, the final attacked measurements are determined from the suspicious attacked measurements. At last, the final target positions are estimated by the CS approach with the attack-free measurements once again. Extensive simulation results demonstrate that the proposed algorithm can outperform the existing algorithms under malicious node attack environments.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"16 5-6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131691398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time delay estimation of co-frequency signals in TDOA localization based on WSN 基于WSN的TDOA定位中共频信号的时延估计
Pengwu Wan, Zan Li, B. Hao
The time delay estimation of the TDOA is signification in passive source localization systems, and the estimation accuracy may directly affect the source location performance. We address the problem of passive blind estimation of time-delay for uncorrelated co-frequency interference source signal based on wireless sensor network (WSN). The received mixtures are modeled as unknown linear combinations of differently delayed versions of communication signal and interference signal. Two methods of Blind Source Separation (BSS) and Secondary Interference Signal Extracting (SISE) are introduced in the proposed method. The interference signals in the mixed receiving signals of all sensors are extracted effectively and the affection of the mixed communication signals can be significantly reduced. Simulations results demonstrate that the proposed method has a more accurate performance compared to some other time delay estimation methods.
TDOA的时延估计在无源源定位系统中具有重要意义,其估计精度直接影响到系统的定位性能。研究了基于无线传感器网络的非相关共频干扰源信号的无源盲时延估计问题。接收到的混合信号被建模为通信信号和干扰信号的不同延迟版本的未知线性组合。该方法引入盲源分离(BSS)和二次干扰信号提取(SISE)两种方法。有效地提取了各传感器混合接收信号中的干扰信号,显著降低了混合通信信号的影响。仿真结果表明,该方法比其他时延估计方法具有更高的精度。
{"title":"Time delay estimation of co-frequency signals in TDOA localization based on WSN","authors":"Pengwu Wan, Zan Li, B. Hao","doi":"10.1109/CITS.2016.7546399","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546399","url":null,"abstract":"The time delay estimation of the TDOA is signification in passive source localization systems, and the estimation accuracy may directly affect the source location performance. We address the problem of passive blind estimation of time-delay for uncorrelated co-frequency interference source signal based on wireless sensor network (WSN). The received mixtures are modeled as unknown linear combinations of differently delayed versions of communication signal and interference signal. Two methods of Blind Source Separation (BSS) and Secondary Interference Signal Extracting (SISE) are introduced in the proposed method. The interference signals in the mixed receiving signals of all sensors are extracted effectively and the affection of the mixed communication signals can be significantly reduced. Simulations results demonstrate that the proposed method has a more accurate performance compared to some other time delay estimation methods.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127429234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
STRESS: An IPv6 to IPv4 Converter for Sniffing Software STRESS:用于嗅探软件的IPv6到IPv4转换器
Haolin Jin, Chengrong Wu, Shiyong Zhang
IPv4 is now being replaced by IPv6 gradually, which means that a lot of software specific to IPv4, such as sniffing software, need to be upgraded to adjust to IPv6. However, due to the big difference between IPv4 and IPv6, it is expensive and time consuming to upgrade an existed stable product. We design and implement STRESS, an IPv6 to IPv4 converter for sniffing software to make these products keep working during the transition time. STRESS handles received IPv6 packets, rewrite them to IPv4 packets, and send them back to IPv4 based software. After such process, the old IPv4 software can now identify contents in IPv6 packets properly.
IPv4正在逐渐被IPv6所取代,这意味着很多IPv4专用的软件,如嗅探软件,需要升级以适应IPv6。但是,由于IPv4和IPv6之间的差异很大,对现有的稳定产品进行升级既昂贵又耗时。我们设计并实现了STRESS,一个用于嗅探软件的IPv6到IPv4转换器,以使这些产品在过渡期间保持工作。STRESS处理接收到的IPv6数据包,将其重写为IPv4数据包,并将其发送回基于IPv4的软件。经过这样的过程,旧的IPv4软件现在可以正确识别IPv6报文中的内容。
{"title":"STRESS: An IPv6 to IPv4 Converter for Sniffing Software","authors":"Haolin Jin, Chengrong Wu, Shiyong Zhang","doi":"10.1109/CITS.2016.7546415","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546415","url":null,"abstract":"IPv4 is now being replaced by IPv6 gradually, which means that a lot of software specific to IPv4, such as sniffing software, need to be upgraded to adjust to IPv6. However, due to the big difference between IPv4 and IPv6, it is expensive and time consuming to upgrade an existed stable product. We design and implement STRESS, an IPv6 to IPv4 converter for sniffing software to make these products keep working during the transition time. STRESS handles received IPv6 packets, rewrite them to IPv4 packets, and send them back to IPv4 based software. After such process, the old IPv4 software can now identify contents in IPv6 packets properly.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116599817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A flight path planning method based on improved artificial potential field 一种基于改进人工势场的航迹规划方法
Fanrong Sun, Songchen Han
With the increasing number of long range free flight, the flight path planning becomes an important issue. In this paper, the expected path is defined as linear potential field. The trajectory equation to determine maximum likelihood flight heading is established by calculating aircraft potential field gravitation of the trajectory at any space position. The air speed degradation model is built by the analysis of the upper air wind influence, and the distance cost can be defined at any position by taking flight performance constraints into consideration. Finally, an optimization model of flight path is established, which selects distance cost and simplicity as the optimization targets, and an ant colony algorithm is proposed. Many groups of flight paths from the Pareto ant colony algorithm are conducive to collaborative decision scientifically and rationally. Experimental results verify the validity of the method.
随着远程自由飞行次数的增加,飞行路径规划成为一个重要问题。本文将期望路径定义为线性势场。通过计算飞行器在任意空间位置的势场引力,建立了确定最大似然飞行航向的弹道方程。通过分析高空风的影响,建立了空速退化模型,考虑飞行性能约束,可以在任意位置定义距离成本。最后,以距离代价和简单性为优化目标,建立了航迹优化模型,并提出了蚁群算法。Pareto蚁群算法的多组飞行路径有利于科学合理地进行协同决策。实验结果验证了该方法的有效性。
{"title":"A flight path planning method based on improved artificial potential field","authors":"Fanrong Sun, Songchen Han","doi":"10.1109/CITS.2016.7546401","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546401","url":null,"abstract":"With the increasing number of long range free flight, the flight path planning becomes an important issue. In this paper, the expected path is defined as linear potential field. The trajectory equation to determine maximum likelihood flight heading is established by calculating aircraft potential field gravitation of the trajectory at any space position. The air speed degradation model is built by the analysis of the upper air wind influence, and the distance cost can be defined at any position by taking flight performance constraints into consideration. Finally, an optimization model of flight path is established, which selects distance cost and simplicity as the optimization targets, and an ant colony algorithm is proposed. Many groups of flight paths from the Pareto ant colony algorithm are conducive to collaborative decision scientifically and rationally. Experimental results verify the validity of the method.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124546807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Differential distribution properties of the SIMON block cipher family SIMON分组密码族的差分分布性质
Xiang-zhong Dong, Jie Guan
SIMON is a family of the lightweight block ciphers designed by the U.S National Security Agency in 2013 which is a classical Feistel scheme. The round function uses bitwise AND, rotation and XOR operations. This paper studies on differential distribution properties of the general SIMON-like round function F[a, b, c](x) = (x<;<;<;a) ⊙(x<;<;<;b)⊕(x<;<;<;<;c) It gives the relationship between the differential probability and the hamming weight of the input difference, and solves the constructing and counting issue of the corresponding input and output differences when the differential probabilities are 1/2, 1/4, 1/8, 1/16, 1/2(n-1), and also proposes a fast algorithm to compute the combined differential (α→ β)·p(α→ β) of the iterative differential characteristic with a computation complexity of O(2r n3). It provides theoretical guidance for the differential cryptanalysis and design of SIMON family.
SIMON是美国国家安全局在2013年设计的一个轻量级分组密码家族,是一个经典的费斯特尔方案。round函数使用位与、旋转和异或操作。本文研究了一般类simon圆函数F[a, b, c](x) = (x(n-1))的微分分布性质,并提出了一种计算迭代微分特征的组合微分(α→β)·p(α→β)的快速算法,计算复杂度为O(2rn3)。为差分密码分析和SIMON系列的设计提供了理论指导。
{"title":"Differential distribution properties of the SIMON block cipher family","authors":"Xiang-zhong Dong, Jie Guan","doi":"10.1109/CITS.2016.7546391","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546391","url":null,"abstract":"SIMON is a family of the lightweight block ciphers designed by the U.S National Security Agency in 2013 which is a classical Feistel scheme. The round function uses bitwise AND, rotation and XOR operations. This paper studies on differential distribution properties of the general SIMON-like round function F<sub>[a, b, c]</sub>(x) = (x<;<;<;a) ⊙(x<;<;<;b)⊕(x<;<;<;<;c) It gives the relationship between the differential probability and the hamming weight of the input difference, and solves the constructing and counting issue of the corresponding input and output differences when the differential probabilities are 1/2, 1/4, 1/8, 1/16, 1/2<sup>(n-1)</sup>, and also proposes a fast algorithm to compute the combined differential (α→ β)·p(α→ β) of the iterative differential characteristic with a computation complexity of O(2<sup>r</sup> n<sup>3</sup>). It provides theoretical guidance for the differential cryptanalysis and design of SIMON family.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132212559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison results of stochastic resonance effects realized by coherent and non-coherent receiver 相干与非相干接收机实现随机共振效应的比较结果
Linlin Liang, Zan Li, Danyang Wang, Wenchao Zhai, Nina Zhang
This paper studies the parameter-tuned stochastic resonance (PSR) effect in Binary PAM Signal Processing under coherent and non-coherent received by the measure of Bit Error Rate (BER). Based on probability density function of general Gaussian noise, we derive an analytical expression of the BER under coherent and non-coherent received through different types of noise. The theoretical and numerical results demonstrate that the noise-enhanced transmission BER occur for non-coherent received in various noise scenarios. The BER of the signal from a nonlinear system over that of a linear system. For coherent received, whatever background noise is not favorable for the signal processing. The performance of a linear system is best.
本文以误码率为度量指标,研究了在相干和非相干接收条件下,参数调谐随机共振(PSR)效应在二进制PAM信号处理中的应用。基于一般高斯噪声的概率密度函数,导出了不同类型噪声下相干和非相干接收下的误码率解析表达式。理论和数值结果表明,在各种噪声情况下,非相干接收会出现噪声增强传输误码率。非线性系统的信号比线性系统的信号的误码率。对于相干接收,任何背景噪声都不利于信号的处理。线性系统的性能最好。
{"title":"Comparison results of stochastic resonance effects realized by coherent and non-coherent receiver","authors":"Linlin Liang, Zan Li, Danyang Wang, Wenchao Zhai, Nina Zhang","doi":"10.1109/CITS.2016.7546427","DOIUrl":"https://doi.org/10.1109/CITS.2016.7546427","url":null,"abstract":"This paper studies the parameter-tuned stochastic resonance (PSR) effect in Binary PAM Signal Processing under coherent and non-coherent received by the measure of Bit Error Rate (BER). Based on probability density function of general Gaussian noise, we derive an analytical expression of the BER under coherent and non-coherent received through different types of noise. The theoretical and numerical results demonstrate that the noise-enhanced transmission BER occur for non-coherent received in various noise scenarios. The BER of the signal from a nonlinear system over that of a linear system. For coherent received, whatever background noise is not favorable for the signal processing. The performance of a linear system is best.","PeriodicalId":340958,"journal":{"name":"2016 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123225789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 International Conference on Computer, Information and Telecommunication Systems (CITS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1