Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747844
Xiangyang Xu, W. Luo, Huawei Song, Lizhi Zhang
This paper studies physical-layer security without knowing the eavesdropper's channel state information. The use of ill-posed theory to protect wireless transmissions is proposed. Firstly, the problem of randomized transmission is translated to that of solving ill-posed equation to guarantee wireless transmissions with inherent low-probability-of interception (LPI). Secondly, by exploiting the nonunique or instable solutions of an ill-posed problem, two mechanisms are proposed that satisfy the given security requirement while achieving good throughput performance. Our results show that ill-posed problem is not always nasty. We hope that by identifying ill-posed problem inversely, a theoretical framework of enhancing physical-layer security can be constructed eventually.
{"title":"Enhancing wireless security with theory of ill-posed problem: A novel physical-layer encryption mechanism","authors":"Xiangyang Xu, W. Luo, Huawei Song, Lizhi Zhang","doi":"10.1109/ICIST.2013.6747844","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747844","url":null,"abstract":"This paper studies physical-layer security without knowing the eavesdropper's channel state information. The use of ill-posed theory to protect wireless transmissions is proposed. Firstly, the problem of randomized transmission is translated to that of solving ill-posed equation to guarantee wireless transmissions with inherent low-probability-of interception (LPI). Secondly, by exploiting the nonunique or instable solutions of an ill-posed problem, two mechanisms are proposed that satisfy the given security requirement while achieving good throughput performance. Our results show that ill-posed problem is not always nasty. We hope that by identifying ill-posed problem inversely, a theoretical framework of enhancing physical-layer security can be constructed eventually.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"543 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132229518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747830
Mingliang Li, Kaizhi Huang, Zhou Zhong
The projection of the random multi-antenna weighted vector structured with spatial scrambling is of constant modulus on the main channel, Eavesdropper can take the advantage of multi-antenna to intercept private information. To solve this problem, we design a kind of physical-layer secrecy method based on the joint scrambling with spatial and frequency resource. Based on the parallel transmission nature of OFDM, we construct a random multiple antenna weighted vector in the each subcarrier, the projection of which on the main channel is equal to a dynamic reference variable. The legitimate user can correctly demodulate the receive signal by this reference variable obtained from the estimation of the reference subcarrier. Meanwhile, because of the difference between the main channel and eavesdropper channel, eavesdropper can't obtain the useful information. The simulation results show that, when the legitimate users can correctly demodulate the received signal, the eavesdropper can't intercept the private information using whether blind equalization or MUSIC-like method.
{"title":"Physical-layer security based on joint scrambling with spatial and frequency resource","authors":"Mingliang Li, Kaizhi Huang, Zhou Zhong","doi":"10.1109/ICIST.2013.6747830","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747830","url":null,"abstract":"The projection of the random multi-antenna weighted vector structured with spatial scrambling is of constant modulus on the main channel, Eavesdropper can take the advantage of multi-antenna to intercept private information. To solve this problem, we design a kind of physical-layer secrecy method based on the joint scrambling with spatial and frequency resource. Based on the parallel transmission nature of OFDM, we construct a random multiple antenna weighted vector in the each subcarrier, the projection of which on the main channel is equal to a dynamic reference variable. The legitimate user can correctly demodulate the receive signal by this reference variable obtained from the estimation of the reference subcarrier. Meanwhile, because of the difference between the main channel and eavesdropper channel, eavesdropper can't obtain the useful information. The simulation results show that, when the legitimate users can correctly demodulate the received signal, the eavesdropper can't intercept the private information using whether blind equalization or MUSIC-like method.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133483824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747619
Huan Ying, Hao Zhu, Donghui Wang, C. Hou
Memcpy function is invoked frequently by digital signal processor to handle data transfer during encoding and decoding of multimedia. This paper presents a novel scheme to generate optimal memcpy assembly code for a reduced instruction set computer architecture. Based on the ordered binary decision diagram and the concept of data mining, the proposed solution completely exploits the available optimization according to the input parameters of memcpy. Thus, the memcpy function assembly code generated by our proposal accomplishes the directed-optimal data transfer during execution. Experimental results showed that the solution improves the performance of memcpy effectively. It reduced 56.5c/o executed cycles on average. Moreover, the approach of generation for memcpy at assembly level is portable for any other reduced instruction set computer architecture with modification of the customization file.
{"title":"A novel scheme to generate optimal memcpy assembly code","authors":"Huan Ying, Hao Zhu, Donghui Wang, C. Hou","doi":"10.1109/ICIST.2013.6747619","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747619","url":null,"abstract":"Memcpy function is invoked frequently by digital signal processor to handle data transfer during encoding and decoding of multimedia. This paper presents a novel scheme to generate optimal memcpy assembly code for a reduced instruction set computer architecture. Based on the ordered binary decision diagram and the concept of data mining, the proposed solution completely exploits the available optimization according to the input parameters of memcpy. Thus, the memcpy function assembly code generated by our proposal accomplishes the directed-optimal data transfer during execution. Experimental results showed that the solution improves the performance of memcpy effectively. It reduced 56.5c/o executed cycles on average. Moreover, the approach of generation for memcpy at assembly level is portable for any other reduced instruction set computer architecture with modification of the customization file.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133780939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747750
S. Xiong, Changjiang Chen, Jinhua Huang
This paper first introduces the conception of grid community with respect to the existing problems in education resource management and based on its characteristics, the construction and internal structure of a grid community are discussed. Then, according to the resource distribution in grid, the information sharing mechanism among communities is proposed and the procedure realization is also given, all this will result in the effective sharing of education resource in a high degree.
{"title":"The study to realize effective sharing for education resource based on grid technology","authors":"S. Xiong, Changjiang Chen, Jinhua Huang","doi":"10.1109/ICIST.2013.6747750","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747750","url":null,"abstract":"This paper first introduces the conception of grid community with respect to the existing problems in education resource management and based on its characteristics, the construction and internal structure of a grid community are discussed. Then, according to the resource distribution in grid, the information sharing mechanism among communities is proposed and the procedure realization is also given, all this will result in the effective sharing of education resource in a high degree.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747586
Benchi Li, C. Dang, Jinjin Zheng
In this paper, a distributed implementation of Dang's iterative method [1] is proposed to solve the airline disruption problems caused by the airport closures. The problem consists of two subproblems, and the solution domain of the first subproblem is divided into several segments by the initial seeds cluster division method. Dang's method [1] is applied to solve the first subproblem in each segment simultaneously in a distributed computation network, and the obtained feasible flight routes are used to solve the second subproblem. Numerical results show that the proposed method is better than CPLEX and Liu et al. [2].
{"title":"Solving the large airline disruption problems using a distributed computation approach to integer programming","authors":"Benchi Li, C. Dang, Jinjin Zheng","doi":"10.1109/ICIST.2013.6747586","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747586","url":null,"abstract":"In this paper, a distributed implementation of Dang's iterative method [1] is proposed to solve the airline disruption problems caused by the airport closures. The problem consists of two subproblems, and the solution domain of the first subproblem is divided into several segments by the initial seeds cluster division method. Dang's method [1] is applied to solve the first subproblem in each segment simultaneously in a distributed computation network, and the obtained feasible flight routes are used to solve the second subproblem. Numerical results show that the proposed method is better than CPLEX and Liu et al. [2].","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132640776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747825
Yubo Wang, Chenggui Wang, Chao Li, Ducheng Wu
In this paper, we present an improved strategy of channel probing and transmission scheduling in a multi-rate wireless system. We consider a fixed data time model, where time is slotted and channel states do not change within one slot. In a multichannel wireless system, a transmitter can opportunistically use channels with high-quality conditions. In order to make better decisions and find out the channel with the maximum transmission rate, the transmitter should probe individual channels by sending control packets, which will consume time and energy, thus reduce effective time for actual data transmission. In fact, the coherence time of the channel may be much larger than the duration of one slot. We can send multiple back-to-back packets if the channel are always in good conditions. Leveraging the absorbing Markov chain model, we propose a strategy for opportunistic spectral usage, in which both time and frequency domain process are taken into account.
{"title":"Improved strategy of time-frequency opportunistic spectral usage for multi-rate wireless systems","authors":"Yubo Wang, Chenggui Wang, Chao Li, Ducheng Wu","doi":"10.1109/ICIST.2013.6747825","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747825","url":null,"abstract":"In this paper, we present an improved strategy of channel probing and transmission scheduling in a multi-rate wireless system. We consider a fixed data time model, where time is slotted and channel states do not change within one slot. In a multichannel wireless system, a transmitter can opportunistically use channels with high-quality conditions. In order to make better decisions and find out the channel with the maximum transmission rate, the transmitter should probe individual channels by sending control packets, which will consume time and energy, thus reduce effective time for actual data transmission. In fact, the coherence time of the channel may be much larger than the duration of one slot. We can send multiple back-to-back packets if the channel are always in good conditions. Leveraging the absorbing Markov chain model, we propose a strategy for opportunistic spectral usage, in which both time and frequency domain process are taken into account.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132787985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747733
Andrew Lo
Independent innovation is the driving force for the development of enterprises, especially small and medium-sized enterprises (SMEs). This paper studies a small radio and television broadcasting equipment manufacturer called CG's entrepreneurial journey, analyzes the company's “technological innovation + brand internationalization + social capital integration” entrepreneurial model, and finds that this mixed independent innovation model can enhance a company's independent innovation capacity and competitiveness, and thus it quickly occupied the market. The research findings can provide something positive for SMEs in developing countries to draw on.
{"title":"A case study of small and medium-sized enterprises' entrepreneurial models based on independent innovation","authors":"Andrew Lo","doi":"10.1109/ICIST.2013.6747733","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747733","url":null,"abstract":"Independent innovation is the driving force for the development of enterprises, especially small and medium-sized enterprises (SMEs). This paper studies a small radio and television broadcasting equipment manufacturer called CG's entrepreneurial journey, analyzes the company's “technological innovation + brand internationalization + social capital integration” entrepreneurial model, and finds that this mixed independent innovation model can enhance a company's independent innovation capacity and competitiveness, and thus it quickly occupied the market. The research findings can provide something positive for SMEs in developing countries to draw on.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133623367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747582
Youzhi Zhang, Peng Zhang, Ye Li, Wenshuo Zhang, Lin Zhao
This paper presents a method to improve the payload of spread spectrum (SS) based audio watermarking via an M-ary SS modulation technique called code phase shift keying (CPSK), in which the code phase of the spreading sequence is modulated with multiple data bits. Compared with the code division multiple access (CDMA) based watermarking with the same transparency and payload, the proposed scheme provides better robustness against common attacks for large M, and requires lower embedding and extraction complexity.
{"title":"High-payload spread spectrum based audio watermarking via M-ary code phase shift keying","authors":"Youzhi Zhang, Peng Zhang, Ye Li, Wenshuo Zhang, Lin Zhao","doi":"10.1109/ICIST.2013.6747582","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747582","url":null,"abstract":"This paper presents a method to improve the payload of spread spectrum (SS) based audio watermarking via an M-ary SS modulation technique called code phase shift keying (CPSK), in which the code phase of the spreading sequence is modulated with multiple data bits. Compared with the code division multiple access (CDMA) based watermarking with the same transparency and payload, the proposed scheme provides better robustness against common attacks for large M, and requires lower embedding and extraction complexity.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133716420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747595
Qinling Zhang, Yang Liu, Feifei Wen
Combined with the research of the power distribution system structure and the analysis of flight stage priority, modeling and simulation of the electrical load management functions in the helicopter automatic power distribution system were accomplished. The complete digital simulation of distribution system was achieved with MATLAB/SIMULINK. The key models including the Power System Processor (PSP) and the Electric Load Management Center (ELMC) were established based on the electric load equations management theory, which consists of power supply request equation, load state equation and load control equation. Compared the simulation data with the physical experiment platform data, the result validates the effectiveness and accuracy of this modeling approach.
{"title":"Modeling and simulation of helicopter automatic distribution system based on SIMULINK","authors":"Qinling Zhang, Yang Liu, Feifei Wen","doi":"10.1109/ICIST.2013.6747595","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747595","url":null,"abstract":"Combined with the research of the power distribution system structure and the analysis of flight stage priority, modeling and simulation of the electrical load management functions in the helicopter automatic power distribution system were accomplished. The complete digital simulation of distribution system was achieved with MATLAB/SIMULINK. The key models including the Power System Processor (PSP) and the Electric Load Management Center (ELMC) were established based on the electric load equations management theory, which consists of power supply request equation, load state equation and load control equation. Compared the simulation data with the physical experiment platform data, the result validates the effectiveness and accuracy of this modeling approach.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117322121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747556
Jian Cao, S. Sun, X. Duan
In the fault classification process, a flexible SVM classification algorithm is proposed to solve the unreasonable condition that the number of muti-classification decision boundary is stationary when using the traditional support vector machine(SVM). The algorithm is based on support vector data description(SVDD) hypersphere determine the sample distribution characteristics similar class of fusion as a new class, guaranted to produce classifications which are easy to distinguish. Training multi hyperspheres between the new classes and SVM decision boundary within the new class. Using one-to-one vote to choose. Experiments show that this algorithm has a better classification performance, and can reduce training time and determine time which can be well applied to fault classification.
{"title":"A multi-classification algorithm based on support vectors","authors":"Jian Cao, S. Sun, X. Duan","doi":"10.1109/ICIST.2013.6747556","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747556","url":null,"abstract":"In the fault classification process, a flexible SVM classification algorithm is proposed to solve the unreasonable condition that the number of muti-classification decision boundary is stationary when using the traditional support vector machine(SVM). The algorithm is based on support vector data description(SVDD) hypersphere determine the sample distribution characteristics similar class of fusion as a new class, guaranted to produce classifications which are easy to distinguish. Training multi hyperspheres between the new classes and SVM decision boundary within the new class. Using one-to-one vote to choose. Experiments show that this algorithm has a better classification performance, and can reduce training time and determine time which can be well applied to fault classification.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"42 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120914916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}