首页 > 最新文献

2013 IEEE Third International Conference on Information Science and Technology (ICIST)最新文献

英文 中文
A multi-innovation stochastic gradient parameter estimation algorithm for controlled autoregressive ARMA systems based on the data filtering 一种基于数据滤波的可控自回归ARMA系统多创新随机梯度参数估计算法
Shijun Wang, Ruifeng Ding
This paper decomposes a controlled autoregressive autoregressive moving average (CARARMA) system into two subsystems, uses the data filtering technique to drive a multi-innovation stochastic gradient algorithm for identifying the parameters of each subsystems. The basic idea is to replace the unknown variables in the information vectors with their corresponding estimates. The simulation example shows that the proposed algorithms can work well.
本文将可控自回归自回归移动平均(CARARMA)系统分解为两个子系统,利用数据滤波技术驱动多创新随机梯度算法对每个子系统的参数进行识别。其基本思想是将信息向量中的未知变量替换为其相应的估计。仿真实例表明,所提出的算法具有较好的效果。
{"title":"A multi-innovation stochastic gradient parameter estimation algorithm for controlled autoregressive ARMA systems based on the data filtering","authors":"Shijun Wang, Ruifeng Ding","doi":"10.1109/ICIST.2013.6747536","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747536","url":null,"abstract":"This paper decomposes a controlled autoregressive autoregressive moving average (CARARMA) system into two subsystems, uses the data filtering technique to drive a multi-innovation stochastic gradient algorithm for identifying the parameters of each subsystems. The basic idea is to replace the unknown variables in the information vectors with their corresponding estimates. The simulation example shows that the proposed algorithms can work well.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130623223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vector quantization image coding based on biorthogonal wavelet transform and improved SOFM 基于双正交小波变换和改进SOFM的矢量量化图像编码
Songzhao Xie, Chengyou Wang, Chao Cui
This paper studies the statistical properties and distributed properties of the coefficients after the image is decomposed at different scales by using the wavelet transform. The different quantization and coding scheme for each subimage are carried out in accordance with its statistical properties and distributed properties of the coefficients. The wavelet coefficients in low frequency subimages are compressed by using Differential Pulse Code Modulation (DPCM). The wavelet coefficients in high frequency subimages are compressed and vector quantized by using Kohonen neural network on Self-Organizing Feature Mapping (SOFM) algorithm. In addition, an improved SOFM algorithm is used in vector quantization in order to shorten the encoding and decoding time. Using these compression techniques, we can obtain rather satisfactory compression ratio as well as shorten the encoding and decoding time while achieving superior reconstructed images.
本文研究了用小波变换对图像进行不同尺度分解后系数的统计性质和分布性质。根据子图像的统计特性和系数的分布特性,对每个子图像进行不同的量化和编码方案。采用差分脉冲编码调制(DPCM)对低频子图像进行小波系数压缩。采用基于自组织特征映射(SOFM)算法的Kohonen神经网络对高频子图像中的小波系数进行压缩和矢量量化。此外,矢量量化采用改进的SOFM算法,缩短了编解码时间。利用这些压缩技术,在获得较好的重构图像的同时,可以获得较满意的压缩比,缩短编码和解码时间。
{"title":"Vector quantization image coding based on biorthogonal wavelet transform and improved SOFM","authors":"Songzhao Xie, Chengyou Wang, Chao Cui","doi":"10.1109/ICIST.2013.6747849","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747849","url":null,"abstract":"This paper studies the statistical properties and distributed properties of the coefficients after the image is decomposed at different scales by using the wavelet transform. The different quantization and coding scheme for each subimage are carried out in accordance with its statistical properties and distributed properties of the coefficients. The wavelet coefficients in low frequency subimages are compressed by using Differential Pulse Code Modulation (DPCM). The wavelet coefficients in high frequency subimages are compressed and vector quantized by using Kohonen neural network on Self-Organizing Feature Mapping (SOFM) algorithm. In addition, an improved SOFM algorithm is used in vector quantization in order to shorten the encoding and decoding time. Using these compression techniques, we can obtain rather satisfactory compression ratio as well as shorten the encoding and decoding time while achieving superior reconstructed images.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116939631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Solving the large airline disruption problems using a distributed computation approach to integer programming 基于整数规划的分布式计算方法求解大型航线中断问题
Benchi Li, C. Dang, Jinjin Zheng
In this paper, a distributed implementation of Dang's iterative method [1] is proposed to solve the airline disruption problems caused by the airport closures. The problem consists of two subproblems, and the solution domain of the first subproblem is divided into several segments by the initial seeds cluster division method. Dang's method [1] is applied to solve the first subproblem in each segment simultaneously in a distributed computation network, and the obtained feasible flight routes are used to solve the second subproblem. Numerical results show that the proposed method is better than CPLEX and Liu et al. [2].
本文提出了Dang迭代法[1]的分布式实现,用于解决机场关闭导致的航线中断问题。该问题由两个子问题组成,通过初始种子聚类划分方法将第一个子问题的解域划分为若干段。Dang的方法[1]在分布式计算网络中同时求解每一段的第一个子问题,用得到的可行飞行路线求解第二个子问题。数值结果表明,该方法优于CPLEX和Liu等[2]。
{"title":"Solving the large airline disruption problems using a distributed computation approach to integer programming","authors":"Benchi Li, C. Dang, Jinjin Zheng","doi":"10.1109/ICIST.2013.6747586","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747586","url":null,"abstract":"In this paper, a distributed implementation of Dang's iterative method [1] is proposed to solve the airline disruption problems caused by the airport closures. The problem consists of two subproblems, and the solution domain of the first subproblem is divided into several segments by the initial seeds cluster division method. Dang's method [1] is applied to solve the first subproblem in each segment simultaneously in a distributed computation network, and the obtained feasible flight routes are used to solve the second subproblem. Numerical results show that the proposed method is better than CPLEX and Liu et al. [2].","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132640776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved strategy of time-frequency opportunistic spectral usage for multi-rate wireless systems 多速率无线系统时频机会频谱利用改进策略
Yubo Wang, Chenggui Wang, Chao Li, Ducheng Wu
In this paper, we present an improved strategy of channel probing and transmission scheduling in a multi-rate wireless system. We consider a fixed data time model, where time is slotted and channel states do not change within one slot. In a multichannel wireless system, a transmitter can opportunistically use channels with high-quality conditions. In order to make better decisions and find out the channel with the maximum transmission rate, the transmitter should probe individual channels by sending control packets, which will consume time and energy, thus reduce effective time for actual data transmission. In fact, the coherence time of the channel may be much larger than the duration of one slot. We can send multiple back-to-back packets if the channel are always in good conditions. Leveraging the absorbing Markov chain model, we propose a strategy for opportunistic spectral usage, in which both time and frequency domain process are taken into account.
本文提出了一种改进的多速率无线系统的信道探测和传输调度策略。我们考虑一个固定的数据时间模型,其中时间是分槽的,信道状态在一个槽内不会改变。在多信道无线系统中,发射机可以偶然地使用具有高质量条件的信道。为了做出更好的决策,找出传输速率最大的信道,发射机需要通过发送控制包来探测各个信道,这会消耗时间和能量,从而减少实际数据传输的有效时间。实际上,信道的相干时间可能比一个时隙的持续时间大得多。如果信道一直处于良好状态,我们可以发送多个背靠背数据包。利用吸收马尔可夫链模型,我们提出了一种同时考虑时域和频域过程的机会性频谱利用策略。
{"title":"Improved strategy of time-frequency opportunistic spectral usage for multi-rate wireless systems","authors":"Yubo Wang, Chenggui Wang, Chao Li, Ducheng Wu","doi":"10.1109/ICIST.2013.6747825","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747825","url":null,"abstract":"In this paper, we present an improved strategy of channel probing and transmission scheduling in a multi-rate wireless system. We consider a fixed data time model, where time is slotted and channel states do not change within one slot. In a multichannel wireless system, a transmitter can opportunistically use channels with high-quality conditions. In order to make better decisions and find out the channel with the maximum transmission rate, the transmitter should probe individual channels by sending control packets, which will consume time and energy, thus reduce effective time for actual data transmission. In fact, the coherence time of the channel may be much larger than the duration of one slot. We can send multiple back-to-back packets if the channel are always in good conditions. Leveraging the absorbing Markov chain model, we propose a strategy for opportunistic spectral usage, in which both time and frequency domain process are taken into account.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132787985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient active contour with Gaussian distribution fitting energy 高效主动轮廓高斯分布拟合能量
Hui Wang, Ting-Zhu Huang
In this paper, an efficient active contour with Gaussian distribution fitting energy is proposed for image segmentation. We introduce the Gaussian distribution to construct the fitting energy, which drives the active contour toward the object boundaries. In order to protect the smoothness property and the stability, a reaction diffusion approach is borrowed to design a two-stage scheme, which eliminates the procedure of re-initialization of traditional level set methods and improves the segmentation quality effectively.
本文提出了一种高效的主动轮廓高斯分布拟合能量图像分割方法。我们引入高斯分布来构建拟合能量,从而驱动主动轮廓向物体边界移动。为了保护平滑性和稳定性,我们借用反应扩散方法设计了两阶段方案,省去了传统水平集方法的重新初始化过程,有效提高了分割质量。
{"title":"An efficient active contour with Gaussian distribution fitting energy","authors":"Hui Wang, Ting-Zhu Huang","doi":"10.1109/ICIST.2013.6747720","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747720","url":null,"abstract":"In this paper, an efficient active contour with Gaussian distribution fitting energy is proposed for image segmentation. We introduce the Gaussian distribution to construct the fitting energy, which drives the active contour toward the object boundaries. In order to protect the smoothness property and the stability, a reaction diffusion approach is borrowed to design a two-stage scheme, which eliminates the procedure of re-initialization of traditional level set methods and improves the segmentation quality effectively.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128164416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on RS(255,223) code in concatenated decoder system RS(255,223)码在串联译码系统中的研究
Lei Fang, Yu Zhang, Jun Zhu, Jianxin Yang
RS(255,223) code is used in concatenated code system for its strong error-correcting ability for burst error. The most important problem of the design of RS decoder is the key equation solution (KES). In this paper, BM iterative decoding algorithms for KES is introduced, and its implementation structure is also described. Simulation shows that the designed RS(255,223) has suffi ciently met the requirement of throughput in the concatenated decoder.
RS(255,223)码因其对突发错误的纠错能力强而应用于级联码系统。RS解码器设计中最重要的问题是关键方程的求解。本文介绍了用于KES的BM迭代译码算法,并对其实现结构进行了描述。仿真结果表明,所设计的RS(255,223)能够充分满足串接解码器的吞吐量要求。
{"title":"Research on RS(255,223) code in concatenated decoder system","authors":"Lei Fang, Yu Zhang, Jun Zhu, Jianxin Yang","doi":"10.1109/ICIST.2013.6747764","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747764","url":null,"abstract":"RS(255,223) code is used in concatenated code system for its strong error-correcting ability for burst error. The most important problem of the design of RS decoder is the key equation solution (KES). In this paper, BM iterative decoding algorithms for KES is introduced, and its implementation structure is also described. Simulation shows that the designed RS(255,223) has suffi ciently met the requirement of throughput in the concatenated decoder.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128453782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing wireless security with theory of ill-posed problem: A novel physical-layer encryption mechanism 用不适定问题理论增强无线安全:一种新的物理层加密机制
Xiangyang Xu, W. Luo, Huawei Song, Lizhi Zhang
This paper studies physical-layer security without knowing the eavesdropper's channel state information. The use of ill-posed theory to protect wireless transmissions is proposed. Firstly, the problem of randomized transmission is translated to that of solving ill-posed equation to guarantee wireless transmissions with inherent low-probability-of interception (LPI). Secondly, by exploiting the nonunique or instable solutions of an ill-posed problem, two mechanisms are proposed that satisfy the given security requirement while achieving good throughput performance. Our results show that ill-posed problem is not always nasty. We hope that by identifying ill-posed problem inversely, a theoretical framework of enhancing physical-layer security can be constructed eventually.
本文在不知道窃听者信道状态信息的情况下研究物理层安全。提出了利用不适定理论保护无线传输的方法。首先,将随机传输问题转化为求解病态方程的问题,保证无线传输具有固有的低截获概率(LPI)。其次,利用病态问题的非唯一解或不稳定解,提出了两种满足给定安全要求的机制,同时获得了良好的吞吐量性能。我们的结果表明不适定问题并不总是令人讨厌的。我们希望通过对病态问题的反向识别,最终构建一个增强物理层安全性的理论框架。
{"title":"Enhancing wireless security with theory of ill-posed problem: A novel physical-layer encryption mechanism","authors":"Xiangyang Xu, W. Luo, Huawei Song, Lizhi Zhang","doi":"10.1109/ICIST.2013.6747844","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747844","url":null,"abstract":"This paper studies physical-layer security without knowing the eavesdropper's channel state information. The use of ill-posed theory to protect wireless transmissions is proposed. Firstly, the problem of randomized transmission is translated to that of solving ill-posed equation to guarantee wireless transmissions with inherent low-probability-of interception (LPI). Secondly, by exploiting the nonunique or instable solutions of an ill-posed problem, two mechanisms are proposed that satisfy the given security requirement while achieving good throughput performance. Our results show that ill-posed problem is not always nasty. We hope that by identifying ill-posed problem inversely, a theoretical framework of enhancing physical-layer security can be constructed eventually.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"543 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132229518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bayer patterned image compression based on APIDCBT-JPEG and all phase IDCT interpolation 基于APIDCBT-JPEG和全相位IDCT插值的Bayer模式图像压缩
Songzhao Xie, Chengyou Wang, Zhiqiang Yang
In recent years, the algorithm of Bayer patterned image compression based on “structure separation” has achieved better image quality. On the basis of previous work, the algorithm based on the All Phase Inverse Discrete Cosine Biorthogonal Transform (APIDCBT) and All Phase IDCT (APIDCT) interpolation is proposed in this paper. Instead of the conventional Discrete Cosine Transform (DCT), the APIDCBT is applied to the JPEG image compression (APIDCBT-JPEG), which significantly reduces complex multiplications and makes the quantization table simpler. Two kinds of interpolation methods to the decompressed image data are also discussed in this paper, including bilinear interpolation and the novel interpolation method based on APIDCT. Experimental results show that the proposed algorithm outperforms the algorithm based on “structure separation”; and the APIDCT interpolation performs close to the bilinear interpolation method and behaves better than it at high bit rates.
近年来,基于“结构分离”的拜耳图案图像压缩算法取得了较好的图像质量。在前人研究的基础上,提出了基于全相位逆离散余弦双正交变换(APIDCBT)和全相位IDCT (APIDCT)插值的图像提取算法。代替传统的离散余弦变换(DCT),将APIDCBT应用于JPEG图像压缩(APIDCBT-JPEG),大大减少了复杂的乘法运算,简化了量化表。本文还讨论了解压后图像数据的两种插值方法,即双线性插值和基于APIDCT的新型插值方法。实验结果表明,该算法优于基于“结构分离”的算法;APIDCT插值的性能接近双线性插值方法,且在高比特率下的性能优于双线性插值方法。
{"title":"Bayer patterned image compression based on APIDCBT-JPEG and all phase IDCT interpolation","authors":"Songzhao Xie, Chengyou Wang, Zhiqiang Yang","doi":"10.1109/ICIST.2013.6747780","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747780","url":null,"abstract":"In recent years, the algorithm of Bayer patterned image compression based on “structure separation” has achieved better image quality. On the basis of previous work, the algorithm based on the All Phase Inverse Discrete Cosine Biorthogonal Transform (APIDCBT) and All Phase IDCT (APIDCT) interpolation is proposed in this paper. Instead of the conventional Discrete Cosine Transform (DCT), the APIDCBT is applied to the JPEG image compression (APIDCBT-JPEG), which significantly reduces complex multiplications and makes the quantization table simpler. Two kinds of interpolation methods to the decompressed image data are also discussed in this paper, including bilinear interpolation and the novel interpolation method based on APIDCT. Experimental results show that the proposed algorithm outperforms the algorithm based on “structure separation”; and the APIDCT interpolation performs close to the bilinear interpolation method and behaves better than it at high bit rates.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134105201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Physical-layer security based on joint scrambling with spatial and frequency resource 基于空间和频率资源联合置乱的物理层安全
Mingliang Li, Kaizhi Huang, Zhou Zhong
The projection of the random multi-antenna weighted vector structured with spatial scrambling is of constant modulus on the main channel, Eavesdropper can take the advantage of multi-antenna to intercept private information. To solve this problem, we design a kind of physical-layer secrecy method based on the joint scrambling with spatial and frequency resource. Based on the parallel transmission nature of OFDM, we construct a random multiple antenna weighted vector in the each subcarrier, the projection of which on the main channel is equal to a dynamic reference variable. The legitimate user can correctly demodulate the receive signal by this reference variable obtained from the estimation of the reference subcarrier. Meanwhile, because of the difference between the main channel and eavesdropper channel, eavesdropper can't obtain the useful information. The simulation results show that, when the legitimate users can correctly demodulate the received signal, the eavesdropper can't intercept the private information using whether blind equalization or MUSIC-like method.
通过空间置乱构造的随机多天线加权向量在主信道上的投影具有恒定模量,窃听者可以利用多天线的优势截获私人信息。为了解决这一问题,我们设计了一种基于空间和频率资源联合置乱的物理层保密方法。基于OFDM的并行传输特性,在每个子载波上构造一个随机多天线加权向量,其在主信道上的投影等于一个动态参考变量。合法用户可以通过对参考子载波的估计得到的参考变量来正确解调接收信号。同时,由于主信道与窃听信道的差异,窃听者无法获取有用的信息。仿真结果表明,在合法用户能够正确解调接收信号的情况下,无论采用盲均衡还是MUSIC-like方法,窃听者都无法拦截私人信息。
{"title":"Physical-layer security based on joint scrambling with spatial and frequency resource","authors":"Mingliang Li, Kaizhi Huang, Zhou Zhong","doi":"10.1109/ICIST.2013.6747830","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747830","url":null,"abstract":"The projection of the random multi-antenna weighted vector structured with spatial scrambling is of constant modulus on the main channel, Eavesdropper can take the advantage of multi-antenna to intercept private information. To solve this problem, we design a kind of physical-layer secrecy method based on the joint scrambling with spatial and frequency resource. Based on the parallel transmission nature of OFDM, we construct a random multiple antenna weighted vector in the each subcarrier, the projection of which on the main channel is equal to a dynamic reference variable. The legitimate user can correctly demodulate the receive signal by this reference variable obtained from the estimation of the reference subcarrier. Meanwhile, because of the difference between the main channel and eavesdropper channel, eavesdropper can't obtain the useful information. The simulation results show that, when the legitimate users can correctly demodulate the received signal, the eavesdropper can't intercept the private information using whether blind equalization or MUSIC-like method.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133483824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The study to realize effective sharing for education resource based on grid technology 基于网格技术实现教育资源有效共享的研究
S. Xiong, Changjiang Chen, Jinhua Huang
This paper first introduces the conception of grid community with respect to the existing problems in education resource management and based on its characteristics, the construction and internal structure of a grid community are discussed. Then, according to the resource distribution in grid, the information sharing mechanism among communities is proposed and the procedure realization is also given, all this will result in the effective sharing of education resource in a high degree.
本文首先介绍了网格社区的概念,针对目前教育资源管理中存在的问题,根据网格社区的特点,讨论了网格社区的构建和内部结构。然后,根据资源在网格中的分布,提出了社区间的信息共享机制并给出了实现的步骤,从而实现教育资源的高度有效共享。
{"title":"The study to realize effective sharing for education resource based on grid technology","authors":"S. Xiong, Changjiang Chen, Jinhua Huang","doi":"10.1109/ICIST.2013.6747750","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747750","url":null,"abstract":"This paper first introduces the conception of grid community with respect to the existing problems in education resource management and based on its characteristics, the construction and internal structure of a grid community are discussed. Then, according to the resource distribution in grid, the information sharing mechanism among communities is proposed and the procedure realization is also given, all this will result in the effective sharing of education resource in a high degree.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 IEEE Third International Conference on Information Science and Technology (ICIST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1