首页 > 最新文献

2009 International Conference on Apperceiving Computing and Intelligence Analysis最新文献

英文 中文
AN application of prediction model in blast furnace hot metal silicon content based on neural network 基于神经网络的高炉铁水硅含量预测模型的应用
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361151
D. Qiu, De-jiang Zhang, W. You, Niaona Zhang, Hui Li
Radial Basis Function (RBF) neural network is used to predict the blast furnace hot metal based on its characteristics such as fast convergence and global optimization. As hot metal silicon content had close relationship with furnace temperature, the change of temperature in furnace was reflected indirectly by hot metal silicon content. Newrbe function in Matlab was applied for function approximation. Normalized data of normal production for a long period was used for training and simulation. The results showed that the hitting rate of prediction for silicon content was improved. The application of RBF neural network prediction model in blast furnace could forecast Si-content, judge the trend of temperature and realize the control of blast furnace temperature, which was advantageous to energy saving. Moreover, the model can monitor multi-objects simultaneously and provide guidance for blast furnace process
径向基函数(RBF)神经网络基于其快速收敛和全局寻优的特点,用于高炉铁水预测。由于铁水硅含量与炉温关系密切,因此铁水硅含量间接反映了炉温的变化。利用Matlab中的Newrbe函数进行函数逼近。采用长时间正常生产的归一化数据进行训练和仿真。结果表明,该方法提高了硅含量预测的准确率。将RBF神经网络预测模型应用于高炉,可以预测高炉硅含量,判断温度变化趋势,实现对高炉温度的控制,有利于节能。该模型能够同时对多目标进行监测,为高炉生产过程提供指导
{"title":"AN application of prediction model in blast furnace hot metal silicon content based on neural network","authors":"D. Qiu, De-jiang Zhang, W. You, Niaona Zhang, Hui Li","doi":"10.1109/ICACIA.2009.5361151","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361151","url":null,"abstract":"Radial Basis Function (RBF) neural network is used to predict the blast furnace hot metal based on its characteristics such as fast convergence and global optimization. As hot metal silicon content had close relationship with furnace temperature, the change of temperature in furnace was reflected indirectly by hot metal silicon content. Newrbe function in Matlab was applied for function approximation. Normalized data of normal production for a long period was used for training and simulation. The results showed that the hitting rate of prediction for silicon content was improved. The application of RBF neural network prediction model in blast furnace could forecast Si-content, judge the trend of temperature and realize the control of blast furnace temperature, which was advantageous to energy saving. Moreover, the model can monitor multi-objects simultaneously and provide guidance for blast furnace process","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129248710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Data aggregation based topology inference for wireless sensor networks 基于数据聚合的无线传感器网络拓扑推理
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361121
Zhi-yong Zhang, Guangming Hu
Knowledge of topology in wireless sensor networks is significant for networkmanagement _and maintenance. In this paper, a conditional probability of data loss theorem is proposedfor wireless sensor networks based on the data aggregation paradigm.al probability of data loss therem iIt reveals the relationship between conditional probabilities of sensor data loss given different conditions. Based on this theorem, we propose a novel algorithm to infer topologies of sensor networks using end-to-end loss measurements. The algorithm does not incur any additional burden toon the network. A large number of networks are simulated in different scenarios with NS-2. The results show that our proposed algorithm can identify more than 95% of topologies within a small data collection rounds.
了解无线传感器网络的拓扑结构对网络管理和维护具有重要意义。本文提出了基于数据聚合范式的无线传感器网络数据丢失的条件概率定理。它揭示了在不同条件下传感器数据丢失的条件概率之间的关系。基于这一定理,我们提出了一种利用端到端损耗测量来推断传感器网络拓扑结构的新算法。该算法不会给网络带来额外的负担。NS-2可以模拟大量不同场景下的网络。结果表明,本文提出的算法可以在一个小的数据收集轮内识别95%以上的拓扑。
{"title":"Data aggregation based topology inference for wireless sensor networks","authors":"Zhi-yong Zhang, Guangming Hu","doi":"10.1109/ICACIA.2009.5361121","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361121","url":null,"abstract":"Knowledge of topology in wireless sensor networks is significant for networkmanagement _and maintenance. In this paper, a conditional probability of data loss theorem is proposedfor wireless sensor networks based on the data aggregation paradigm.al probability of data loss therem iIt reveals the relationship between conditional probabilities of sensor data loss given different conditions. Based on this theorem, we propose a novel algorithm to infer topologies of sensor networks using end-to-end loss measurements. The algorithm does not incur any additional burden toon the network. A large number of networks are simulated in different scenarios with NS-2. The results show that our proposed algorithm can identify more than 95% of topologies within a small data collection rounds.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131360788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A distributed cooperative spectrum sensing based on network code in cognitive radios 认知无线电中基于网络码的分布式协同频谱感知
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361163
Zhanghong Hao, You-xi Tang, Jin-Xiang Xia
In this paper, we develop a distributed cooperative spectrum sensing algorithm based on network code to decrease the need for bandwidth in cognitive radios. The model of the distributed cooperative spectrum sensing is analyzed, and the algorithm of distributed scheme based on network code is described. The simulation results show that compared with the distributed scheme without network code and the non-cooperative one, the throughput of secondary users is increased apparently, and also, the probability of detection of the distributed scheme with network code is improved about 10% and 20%, respectively, further, the optimal sensing time is shorter about 82% and 88%, respectively.
本文提出了一种基于网络编码的分布式协同频谱感知算法,以减少认知无线电对带宽的需求。分析了分布式协同频谱感知模型,描述了基于网络码的分布式方案算法。仿真结果表明,与无网码分布式方案和非合作分布式方案相比,二次用户的吞吐量明显提高,有网码分布式方案的检测概率分别提高了10%和20%左右,最优感知时间分别缩短了82%和88%。
{"title":"A distributed cooperative spectrum sensing based on network code in cognitive radios","authors":"Zhanghong Hao, You-xi Tang, Jin-Xiang Xia","doi":"10.1109/ICACIA.2009.5361163","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361163","url":null,"abstract":"In this paper, we develop a distributed cooperative spectrum sensing algorithm based on network code to decrease the need for bandwidth in cognitive radios. The model of the distributed cooperative spectrum sensing is analyzed, and the algorithm of distributed scheme based on network code is described. The simulation results show that compared with the distributed scheme without network code and the non-cooperative one, the throughput of secondary users is increased apparently, and also, the probability of detection of the distributed scheme with network code is improved about 10% and 20%, respectively, further, the optimal sensing time is shorter about 82% and 88%, respectively.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121788317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An embedded short-range wireless data communication protocol design 一种嵌入式短距离无线数据通信协议设计
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361072
Zheng Qiao, Hu Wei-dong, Liu Li
In the field of embedded wireless data communication system, such as remote measurement and control, wireless meter reading, information appliances, wireless mouse or keyboard, it usually needs to design a small custom protocol to directly access the hardware. To solve this problem, designed an embedded wireless data communication protocol, Using special data frame format to solve unreliable data link problem, Using roll-call polling methods to achieve multi-point access, Using UART to achieve transceiver between MCU and RF chip, Using stop-waiting protocol to achieve the flow and error control.
在嵌入式无线数据通信系统领域,如远程测控、无线抄表、信息电器、无线鼠标或键盘等,通常需要设计一个小的自定义协议来直接访问硬件。针对这一问题,设计了一种嵌入式无线数据通信协议,采用特殊的数据帧格式解决数据链路不可靠问题,采用点名轮询方式实现多点接入,采用UART实现单片机与射频芯片之间的收发,采用停止等待协议实现流量和错误控制。
{"title":"An embedded short-range wireless data communication protocol design","authors":"Zheng Qiao, Hu Wei-dong, Liu Li","doi":"10.1109/ICACIA.2009.5361072","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361072","url":null,"abstract":"In the field of embedded wireless data communication system, such as remote measurement and control, wireless meter reading, information appliances, wireless mouse or keyboard, it usually needs to design a small custom protocol to directly access the hardware. To solve this problem, designed an embedded wireless data communication protocol, Using special data frame format to solve unreliable data link problem, Using roll-call polling methods to achieve multi-point access, Using UART to achieve transceiver between MCU and RF chip, Using stop-waiting protocol to achieve the flow and error control.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115987719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A new fingerprint-based remote user authentication scheme using mobile devices 一种新的基于指纹的移动设备远程用户认证方案
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361152
Desong Wang, Jianping Li
Recently, Khan et al. proposed an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Unfortunately, Yoon-Yoo demonstrated that Khan et al.'s scheme was vulnerable to a privileged insider attack and an impersonation attack by using lost or stolen mobile devices. To isolate such problems, Yoon-Yoo proposed an improvement to Khan et al.'s scheme. However, the two authentication schemes required synchronized clocks between the user and the remote system server because of using timestamps in authentication process. Actually, it is fairly complicated to achieve time concurrency mechanism; and network environment and transmission delay is unpredictable, so some drawbacks exist in their scheme. To overcome those weaknesses, a new fingerprint-based remote user authentication scheme using mobile devices is proposed. The proposed scheme can safely achieve mutual authentication between the users and the remote system. Compared with other related schemes, the proposed scheme not only is secure and efficient but also can provide good characteristics. Hence, our proposed scheme can be easily realized in the practical environment.
最近,Khan等人在移动设备上提出了一种高效实用的基于混沌哈希的指纹生物识别远程用户认证方案。不幸的是,Yoon-Yoo证明了Khan等人的方案很容易受到特权内部攻击和使用丢失或被盗移动设备的冒充攻击。为了隔离这些问题,Yoon-Yoo对Khan等人的方案提出了改进。然而,由于在身份验证过程中使用时间戳,这两种身份验证方案需要在用户和远程系统服务器之间同步时钟。实际上,时间并发机制的实现相当复杂;由于网络环境和传输时延的不可预测性,该方案存在一定的缺陷。为了克服这些缺点,提出了一种基于指纹的移动设备远程用户认证方案。该方案可以安全地实现用户与远程系统之间的相互认证。与其他相关方案相比,该方案不仅安全高效,而且具有良好的特性。因此,我们提出的方案很容易在实际环境中实现。
{"title":"A new fingerprint-based remote user authentication scheme using mobile devices","authors":"Desong Wang, Jianping Li","doi":"10.1109/ICACIA.2009.5361152","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361152","url":null,"abstract":"Recently, Khan et al. proposed an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Unfortunately, Yoon-Yoo demonstrated that Khan et al.'s scheme was vulnerable to a privileged insider attack and an impersonation attack by using lost or stolen mobile devices. To isolate such problems, Yoon-Yoo proposed an improvement to Khan et al.'s scheme. However, the two authentication schemes required synchronized clocks between the user and the remote system server because of using timestamps in authentication process. Actually, it is fairly complicated to achieve time concurrency mechanism; and network environment and transmission delay is unpredictable, so some drawbacks exist in their scheme. To overcome those weaknesses, a new fingerprint-based remote user authentication scheme using mobile devices is proposed. The proposed scheme can safely achieve mutual authentication between the users and the remote system. Compared with other related schemes, the proposed scheme not only is secure and efficient but also can provide good characteristics. Hence, our proposed scheme can be easily realized in the practical environment.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127815420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Peer aggregation using marks with dynamic and multilevel organization 使用具有动态和多层次组织的标记进行对等聚合
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361103
Lei Ming, Li Ren, Zhao Di, Haipeng He
The topology mismatching is one of major factors that cause the low efficiency in P2P system and the consumption of large quantity of network bandwidth, while peer aggregation is a kind of practical way to make topology matching. This paper firstly introduces a multilevel marked system. According to the marked symbol, peers can progressively find theirs neighbor peers in a better way to achieve the goal of aggregation. Then we build a simulation environment to analyze its performance, the experimental results show that this method can implement peer aggregation rapidly and well adapt to the turbulence caused by peer failure.
拓扑不匹配是导致P2P系统效率低下和大量网络带宽消耗的主要因素之一,而对等体聚合是一种实用的拓扑匹配方法。本文首先介绍了一种多级评分系统。根据标记符号,节点可以更好地逐步找到它们的邻居节点,从而达到聚合的目的。然后建立仿真环境对其性能进行了分析,实验结果表明,该方法能够快速实现对等聚合,并能很好地适应由对等失效引起的湍流。
{"title":"Peer aggregation using marks with dynamic and multilevel organization","authors":"Lei Ming, Li Ren, Zhao Di, Haipeng He","doi":"10.1109/ICACIA.2009.5361103","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361103","url":null,"abstract":"The topology mismatching is one of major factors that cause the low efficiency in P2P system and the consumption of large quantity of network bandwidth, while peer aggregation is a kind of practical way to make topology matching. This paper firstly introduces a multilevel marked system. According to the marked symbol, peers can progressively find theirs neighbor peers in a better way to achieve the goal of aggregation. Then we build a simulation environment to analyze its performance, the experimental results show that this method can implement peer aggregation rapidly and well adapt to the turbulence caused by peer failure.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121571885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic driven based load balancing routing scheme in CogMesh network CogMesh网络中基于流量驱动的负载均衡路由方案
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361120
Xiao-tian Xiang, Qi-hui Wu
Traffic driven based load balancing routing scheme in CogMesh network is proposed. SMC (secondary mesh client) accessing to CMR (cognitive mesh router) using Ad Hoc way is considered in the paper. A novel routing metric was proposed to describe the load state of a path, which was suitable for traffic demand. Choosing a light-loaded route and a light-loaded link guarantees a lower end-to-end delay time and a higher data rate with the consideration of different traffic demand. From the simulation, a significant improvement of end-to-end delay and data rate were got compared with OPTIMAL[9] and DORP[10], which are constraint with end-to-end delay.
提出了基于流量驱动的CogMesh网络负载均衡路由方案。本文研究了辅助网格客户端(secondary mesh client)采用Ad Hoc方式访问认知网格路由器(CMR)。提出了一种新的路由度量来描述路径的负载状态,以适应交通需求。考虑到不同的流量需求,选择轻负载路由和轻负载链路可以保证端到端时延时间更低,数据速率更高。仿真结果表明,与具有端到端延迟约束的OPTIMAL[9]和DORP[10]相比,该算法在端到端延迟和数据速率方面有了显著提高。
{"title":"Traffic driven based load balancing routing scheme in CogMesh network","authors":"Xiao-tian Xiang, Qi-hui Wu","doi":"10.1109/ICACIA.2009.5361120","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361120","url":null,"abstract":"Traffic driven based load balancing routing scheme in CogMesh network is proposed. SMC (secondary mesh client) accessing to CMR (cognitive mesh router) using Ad Hoc way is considered in the paper. A novel routing metric was proposed to describe the load state of a path, which was suitable for traffic demand. Choosing a light-loaded route and a light-loaded link guarantees a lower end-to-end delay time and a higher data rate with the consideration of different traffic demand. From the simulation, a significant improvement of end-to-end delay and data rate were got compared with OPTIMAL[9] and DORP[10], which are constraint with end-to-end delay.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130643674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards overlay network in virtual computing environment 面向虚拟计算环境下的覆盖网络
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361102
Yuan Tang, Jian-ping Li
The potential of wide-area distributed computing systems has not been fully exploited. Resource virtualization gradually is used to promote its computing performance. However, the existing of NAT in networks hinders the communication among distributed systems. This paper argues a structure to solve the obscured connectivity problems with combining virtual machines and virtual networks, and presents an idea of overlay structure, which overcomes the NAT limitation in distributed systems. The overlay structure can support a number of links among guest operating systems in virtual machines, even if the virtual machine monitor is configured as NAT network.
广域分布式计算系统的潜力尚未得到充分开发。资源虚拟化逐渐被用于提升其计算性能。然而,网络中NAT的存在阻碍了分布式系统之间的通信。本文提出了一种将虚拟机和虚拟网络结合起来解决模糊连接问题的结构,并提出了一种覆盖结构的思想,克服了分布式系统中NAT的限制。覆盖结构可以支持虚拟机中客户机操作系统之间的许多链接,即使虚拟机监视器配置为NAT网络也是如此。
{"title":"Towards overlay network in virtual computing environment","authors":"Yuan Tang, Jian-ping Li","doi":"10.1109/ICACIA.2009.5361102","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361102","url":null,"abstract":"The potential of wide-area distributed computing systems has not been fully exploited. Resource virtualization gradually is used to promote its computing performance. However, the existing of NAT in networks hinders the communication among distributed systems. This paper argues a structure to solve the obscured connectivity problems with combining virtual machines and virtual networks, and presents an idea of overlay structure, which overcomes the NAT limitation in distributed systems. The overlay structure can support a number of links among guest operating systems in virtual machines, even if the virtual machine monitor is configured as NAT network.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124402304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The operation consistency study for Rijndael algorithm and reed-solonmon algorithm in Galois Field(28) Rijndael算法与reed-solonmon算法在伽罗瓦域的运算一致性研究(28)
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361164
Yanguo Zhang, Xiao-Jun Lu
The consistent proof of operation in finite field is presented by studying mathematical operations in Galois Field(28) and comparing Rijndael algorithm with Reed-Solomon algorithm in this paper. The explanation for various operations is given from the perspective of polynomial multiply, especially paying more attention to multiplication operation. Through analysis of mathematical operations, author proves that the basic operations for different implementation approaches in Galois Field(28) are consistent essentially.
本文通过研究伽罗瓦场中的数学运算(28),并将Rijndael算法与Reed-Solomon算法进行比较,给出了有限域中运算的一致性证明。从多项式乘法的角度对各种运算进行了解释,尤其注重乘法运算。通过对数学运算的分析,作者证明了伽罗瓦场(28)中不同实现方法的基本运算在本质上是一致的。
{"title":"The operation consistency study for Rijndael algorithm and reed-solonmon algorithm in Galois Field(28)","authors":"Yanguo Zhang, Xiao-Jun Lu","doi":"10.1109/ICACIA.2009.5361164","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361164","url":null,"abstract":"The consistent proof of operation in finite field is presented by studying mathematical operations in Galois Field(28) and comparing Rijndael algorithm with Reed-Solomon algorithm in this paper. The explanation for various operations is given from the perspective of polynomial multiply, especially paying more attention to multiplication operation. Through analysis of mathematical operations, author proves that the basic operations for different implementation approaches in Galois Field(28) are consistent essentially.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121277351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A modified speech analysis&synthesis system 一种改进的语音分析与合成系统
Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361083
Jiuhe Zhong, Yi-De Zhang
Speech analysis and synthesis is an important technology in the audio processing. In this paper, a modified speech analysis and synthesis system is proposed. It adopts more abundant excitation signal which include smooth part and compensation impulse. The smooth part is the envelope curve of unvoiced sounds and the compensation impulse is represented by the peaks during pitch period. Compared with the single impulse that repeats with pitch period and the pure white noise, these signals can reflect the tone changes and characters in the period of original speech more accurately. And they make it possible for modified system to synthesize high quality speech by employing less order filter. The experimental result indicates that the modified system has advance in both speech quality and intelligibility without increasing much in code rate. For most speech, it has a good effect on recovery.
语音分析与合成是音频处理中的一项重要技术。本文提出了一种改进的语音分析合成系统。采用了更丰富的激励信号,包括平滑部分和补偿脉冲。平滑部分为非浊音包络曲线,补偿脉冲由音高周期的峰值表示。与基音周期重复的单脉冲和纯白噪声相比,这些信号能更准确地反映原语音周期内的音调变化和特征。它们使得改进后的系统可以通过使用较少阶数的滤波器来合成高质量的语音。实验结果表明,在码率没有明显提高的情况下,改进后的系统在语音质量和可理解性方面都有了提高。对于大多数言语,它对恢复有很好的效果。
{"title":"A modified speech analysis&synthesis system","authors":"Jiuhe Zhong, Yi-De Zhang","doi":"10.1109/ICACIA.2009.5361083","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361083","url":null,"abstract":"Speech analysis and synthesis is an important technology in the audio processing. In this paper, a modified speech analysis and synthesis system is proposed. It adopts more abundant excitation signal which include smooth part and compensation impulse. The smooth part is the envelope curve of unvoiced sounds and the compensation impulse is represented by the peaks during pitch period. Compared with the single impulse that repeats with pitch period and the pure white noise, these signals can reflect the tone changes and characters in the period of original speech more accurately. And they make it possible for modified system to synthesize high quality speech by employing less order filter. The experimental result indicates that the modified system has advance in both speech quality and intelligibility without increasing much in code rate. For most speech, it has a good effect on recovery.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129227984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 International Conference on Apperceiving Computing and Intelligence Analysis
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1