首页 > 最新文献

2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control最新文献

英文 中文
The CAF-DFRFT-KT Algorithm for High-Speed Target Detection in Passive Radar 无源雷达高速目标检测的caff - dfrft - kt算法
Lei Liu, R. Tao, N. Zhang
The cross-ambiguity algorithm has been extensively used to detect targets in passive radar. However, this algorithm is affected by range migration and Doppler frequency migration when detecting high-speed and accelerating targets. In this paper, an effective algorithm of compensating the two migrations in passive radar is presented. The presented algorithm combines the fractional Fourier transform and the keystone transform with the cross-ambiguity function algorithm. Based on the cross-ambiguity function, the fractional cross-ambiguity function algorithm is realized by the two-step FFTs, and then the keystone transform is inserted into the two-step FFTs. The presented algorithm can eliminate the effects of range migration and Doppler frequency migration. Simulation results are conducted to demonstrate the validity of the presented algorithm.
交叉模糊度算法在被动雷达目标检测中得到了广泛的应用。然而,该算法在检测高速加速目标时受到距离偏移和多普勒频率偏移的影响。本文提出了一种有效的无源雷达二次偏移补偿算法。该算法将分数阶傅里叶变换和梯形变换与交叉模糊函数算法相结合。在交叉模糊函数的基础上,通过两步快速傅里叶变换实现分数阶交叉模糊函数算法,然后在两步快速傅里叶变换中插入梯形变换。该算法可以消除距离偏移和多普勒频率偏移的影响。仿真结果验证了该算法的有效性。
{"title":"The CAF-DFRFT-KT Algorithm for High-Speed Target Detection in Passive Radar","authors":"Lei Liu, R. Tao, N. Zhang","doi":"10.1109/IMCCC.2011.190","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.190","url":null,"abstract":"The cross-ambiguity algorithm has been extensively used to detect targets in passive radar. However, this algorithm is affected by range migration and Doppler frequency migration when detecting high-speed and accelerating targets. In this paper, an effective algorithm of compensating the two migrations in passive radar is presented. The presented algorithm combines the fractional Fourier transform and the keystone transform with the cross-ambiguity function algorithm. Based on the cross-ambiguity function, the fractional cross-ambiguity function algorithm is realized by the two-step FFTs, and then the keystone transform is inserted into the two-step FFTs. The presented algorithm can eliminate the effects of range migration and Doppler frequency migration. Simulation results are conducted to demonstrate the validity of the presented algorithm.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115915067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research on Key Technology for Data Cache Timing Attack on DSA DSA数据缓存定时攻击关键技术研究
Zhou Ping, Kou Ying-zhan, Chen Caisen, Zhang Jilao
Gaining the value of k is a key technology for side-channel attack on DSA. In order to recover the private key of a DSA signature, this paper proposes a method based on data-cache timing attack. That is getting side channel information about a random number k used in a signature first and then recover the private key x from this. We mainly introduces the principle of data-cache timing attack and describe the method of gaining said k.
获取k值是实现DSA侧信道攻击的关键技术。为了恢复DSA签名的私钥,本文提出了一种基于数据缓存定时攻击的方法。这就是首先获取关于签名中使用的随机数k的侧信道信息,然后从中恢复私钥x。本文主要介绍了数据缓存定时攻击的原理和获取k的方法。
{"title":"Research on Key Technology for Data Cache Timing Attack on DSA","authors":"Zhou Ping, Kou Ying-zhan, Chen Caisen, Zhang Jilao","doi":"10.1109/IMCCC.2011.148","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.148","url":null,"abstract":"Gaining the value of k is a key technology for side-channel attack on DSA. In order to recover the private key of a DSA signature, this paper proposes a method based on data-cache timing attack. That is getting side channel information about a random number k used in a signature first and then recover the private key x from this. We mainly introduces the principle of data-cache timing attack and describe the method of gaining said k.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130180017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Testing of Open Laboratory Management System Based on LoadRunner 基于LoadRunner的开放式实验室管理系统性能测试
Xiaojiao Yan, Fuan Wen, Chunmei Fan, Xiao Wang
Open Laboratory Management System provides an open virtual experiment environment for students, so that its system performance immediately impacts the quality of students learning. According to analyze the performance requirements of Open Laboratory Management System, the author discovers performance testing points, implements automated performance testing for performance testing points of the system based on Load Runner. In this paper, taking the students login for example, it elaborates testing process and provides the reference for system optimization.
开放实验室管理系统为学生提供了一个开放的虚拟实验环境,其系统性能直接影响到学生的学习质量。在分析开放式实验室管理系统性能需求的基础上,发现了性能测试点,并基于Load Runner对系统的性能测试点进行了自动化性能测试。本文以学生登录为例,详细阐述了测试过程,为系统优化提供参考。
{"title":"Performance Testing of Open Laboratory Management System Based on LoadRunner","authors":"Xiaojiao Yan, Fuan Wen, Chunmei Fan, Xiao Wang","doi":"10.1109/IMCCC.2011.50","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.50","url":null,"abstract":"Open Laboratory Management System provides an open virtual experiment environment for students, so that its system performance immediately impacts the quality of students learning. According to analyze the performance requirements of Open Laboratory Management System, the author discovers performance testing points, implements automated performance testing for performance testing points of the system based on Load Runner. In this paper, taking the students login for example, it elaborates testing process and provides the reference for system optimization.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134295657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Joint Filtering of Space-frequency-polarization Domain Based on Vector Sensitive Array 基于矢量敏感阵列的空频极化域联合滤波
Hong Hong, X. Mao, Cui Hu, H. Hou, Hao-Xian Wang
Multi-domain signal filtering is a perspective technology in both radar and wireless communication systems. To obtain extra benefits compared with conventional methods, a novel joint space-frequency-polarization filter (SFPF) based on vector sensitive array (VSA) is presented in this paper. An orthogonal dual-polarization sensitive array (DPSA) and time delay units are applied to offer frequency, polarization and spatial information. Then the SFPF is constructed with oblique projection operators to suppress the interferences and extract the target signals without introducing any phase amplitude distortion. Performance analysis and simulation are undertaken. It can be concluded that the signal can be recovered more effectively compared with a space-polarization filter (SPF), since more information in multiple domains are utilized in the proposed SFPF.
多域信号滤波是雷达和无线通信系统中的一项重要技术。为了获得比传统滤波方法更优越的性能,本文提出了一种基于矢量敏感阵列的联合空频偏振滤波器。采用正交双极化敏感阵列(DPSA)和延时单元提供频率、极化和空间信息。然后利用斜投影算子构造SFPF来抑制干扰,在不引入相位幅度畸变的情况下提取目标信号。进行了性能分析和仿真。与空间偏振滤波器(SPF)相比,该滤波器利用了更多的多域信息,可以更有效地恢复信号。
{"title":"Joint Filtering of Space-frequency-polarization Domain Based on Vector Sensitive Array","authors":"Hong Hong, X. Mao, Cui Hu, H. Hou, Hao-Xian Wang","doi":"10.1109/IMCCC.2011.171","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.171","url":null,"abstract":"Multi-domain signal filtering is a perspective technology in both radar and wireless communication systems. To obtain extra benefits compared with conventional methods, a novel joint space-frequency-polarization filter (SFPF) based on vector sensitive array (VSA) is presented in this paper. An orthogonal dual-polarization sensitive array (DPSA) and time delay units are applied to offer frequency, polarization and spatial information. Then the SFPF is constructed with oblique projection operators to suppress the interferences and extract the target signals without introducing any phase amplitude distortion. Performance analysis and simulation are undertaken. It can be concluded that the signal can be recovered more effectively compared with a space-polarization filter (SPF), since more information in multiple domains are utilized in the proposed SFPF.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133440847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive Sychronization between Two Different Chaotic Neural Networks with Mixed Time-varying Delays 两种混合时变时滞混沌神经网络的自适应同步
Li Jie, Yan Pinghua, Yang Si
In this paper, the problem on sychronization is investigated for two different Chaotic Neural Network with mixed time-varying Delays. The adaptive synchronization of two different chaotic neural networks with fully unknown parameters and mixed time-varying delays is investigated, and as a result, a well-designed method is given to ensure the synchronization of two chaotic neural networks which are of the different structure and fully unknown parameters. Under the action of the adaptive control law, the synchronization and parametric identification can be done simultaneously. The controller designed is simple and easy to implement. Strict theoretical proofs are given by using the method of Lyapunov function. Finally, numerical simulations show the effectiveness of the method.
本文研究了两种具有混合时变时滞的混沌神经网络的同步问题。研究了具有完全未知参数和混合时变时滞的两种不同混沌神经网络的自适应同步问题,给出了一种结构不同、参数完全未知的混沌神经网络的自适应同步设计方法。在自适应控制律的作用下,可以同时进行同步和参数辨识。该控制器设计简单,易于实现。利用李亚普诺夫函数的方法给出了严格的理论证明。最后,通过数值仿真验证了该方法的有效性。
{"title":"Adaptive Sychronization between Two Different Chaotic Neural Networks with Mixed Time-varying Delays","authors":"Li Jie, Yan Pinghua, Yang Si","doi":"10.1109/IMCCC.2011.199","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.199","url":null,"abstract":"In this paper, the problem on sychronization is investigated for two different Chaotic Neural Network with mixed time-varying Delays. The adaptive synchronization of two different chaotic neural networks with fully unknown parameters and mixed time-varying delays is investigated, and as a result, a well-designed method is given to ensure the synchronization of two chaotic neural networks which are of the different structure and fully unknown parameters. Under the action of the adaptive control law, the synchronization and parametric identification can be done simultaneously. The controller designed is simple and easy to implement. Strict theoretical proofs are given by using the method of Lyapunov function. Finally, numerical simulations show the effectiveness of the method.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"25 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132286009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Light-weighted Viterbi Decoder Implemented by FPGA 一种基于FPGA的轻型维特比译码器
Zhenzhi Wu, Shujuan Hou, Hai Li
In this paper, a light-weighted pipelined serial Viterbi Decoder is implemented for resource saving purpose. The trace back module of the decoder consumes fewer logical resources by employing a RAM-based Register Exchange architecture. All the metric and trace back bits are stored in the RAM to save logical resources. Synthesis results show that, the proposed architecture can save more than half of resource utilization than fabric IP core and has the minimum logic consumption than almost other schemes we can find with nearly no performance loss.
为了节省资源,本文实现了一种轻量级的流水线串行维特比解码器。通过采用基于ram的寄存器交换体系结构,解码器的跟踪回退模块消耗更少的逻辑资源。所有的度量和回溯位都存储在RAM中以节省逻辑资源。综合结果表明,该架构比fabric IP核节省了一半以上的资源利用率,并且具有最小的逻辑消耗,几乎没有性能损失。
{"title":"A Light-weighted Viterbi Decoder Implemented by FPGA","authors":"Zhenzhi Wu, Shujuan Hou, Hai Li","doi":"10.1109/IMCCC.2011.155","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.155","url":null,"abstract":"In this paper, a light-weighted pipelined serial Viterbi Decoder is implemented for resource saving purpose. The trace back module of the decoder consumes fewer logical resources by employing a RAM-based Register Exchange architecture. All the metric and trace back bits are stored in the RAM to save logical resources. Synthesis results show that, the proposed architecture can save more than half of resource utilization than fabric IP core and has the minimum logic consumption than almost other schemes we can find with nearly no performance loss.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132584274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Study of Man-in-the-Middle Attack Based on SSL Certificate Interaction 基于SSL证书交互的中间人攻击研究
Jiang Du, Xing-hua Li, Hua Huang
With the rapid development of Internet technology, network technology has penetrated into every part of the economic society. However, due to the open Internet and anonymity of the inherent characteristics, leading to security has become a major obstacle of web application. How to guarantee the transmission of sensitive information effectively becomes the focus of user. In this case, Secure Sockets Layer(SSL) emerges as the times require. We study the implementation process SSL Handshake Protocol based on analyzes the Secure Sockets Layer SSL protocol implement mechanism [17].
随着Internet技术的飞速发展,网络技术已经渗透到经济社会的各个环节。然而,由于互联网的开放性和匿名性的固有特点,导致安全性问题成为web应用的一大障碍。如何有效地保证敏感信息的传输成为用户关注的焦点。在这种情况下,安全套接字层(SSL)应运而生。我们在研究SSL握手协议实现过程的基础上,分析了安全套接字层SSL协议的实现机制[17]。
{"title":"A Study of Man-in-the-Middle Attack Based on SSL Certificate Interaction","authors":"Jiang Du, Xing-hua Li, Hua Huang","doi":"10.1109/IMCCC.2011.117","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.117","url":null,"abstract":"With the rapid development of Internet technology, network technology has penetrated into every part of the economic society. However, due to the open Internet and anonymity of the inherent characteristics, leading to security has become a major obstacle of web application. How to guarantee the transmission of sensitive information effectively becomes the focus of user. In this case, Secure Sockets Layer(SSL) emerges as the times require. We study the implementation process SSL Handshake Protocol based on analyzes the Secure Sockets Layer SSL protocol implement mechanism [17].","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132588239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Resolution of Integer Ambiguity in GPS Attitude Determination GPS姿态确定中整数模糊度的解决
Chuang Liu, Pei Chen
In order to resolve the carrier phase ambiguity in attitude determination, a new approach is proposed and discussed. A method for static baseline vector estimation is derivate based on the epoch-difference carrier phase and a receiver clock bias model. By using the estimated baseline vector, a float solution of ambiguity is computed. The range of potential integer ambiguity can be obtained with the error of estimated baseline. The implemented algorithm is tested with measurement data collected on static baselines. Experimental results indicate that, the integer ambiguity can be accurately determined after about 40 seconds with the present algorithm.
为了解决姿态确定中载波相位模糊的问题,提出并讨论了一种新的姿态确定方法。提出了一种基于历差载波相位和接收机时钟偏差模型的静态基线矢量估计方法。利用估计的基线向量,计算模糊度的浮点解。利用估计基线的误差,可以得到潜在整数模糊度的范围。用静态基线上采集的测量数据对实现的算法进行了测试。实验结果表明,该算法可以在40秒左右的时间内准确地确定整数模糊度。
{"title":"Resolution of Integer Ambiguity in GPS Attitude Determination","authors":"Chuang Liu, Pei Chen","doi":"10.1109/IMCCC.2011.240","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.240","url":null,"abstract":"In order to resolve the carrier phase ambiguity in attitude determination, a new approach is proposed and discussed. A method for static baseline vector estimation is derivate based on the epoch-difference carrier phase and a receiver clock bias model. By using the estimated baseline vector, a float solution of ambiguity is computed. The range of potential integer ambiguity can be obtained with the error of estimated baseline. The implemented algorithm is tested with measurement data collected on static baselines. Experimental results indicate that, the integer ambiguity can be accurately determined after about 40 seconds with the present algorithm.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133122269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Public Key Encryption with Keyword Scheme Not Using Pairing 一种不使用配对关键字方案的高效公钥加密
Hao-miao Yang, Chunxiang Xu, Hongjie Zhao
The notion of Public Key Encryption with Keyword Search (PEKS), which enables one to search encrypted data in public key setting, was firstly suggested by Boneh et al. in 2004. So far most of presented PEKS schemes were constructed based on bilinear pairing. However, PEKS schemes based on pairing are susceptible to off-line keyword guessing attacks. In ICCSA 2006, Khader proposed a PEKS scheme not using pairing. In this paper, we show that Khader' scheme do not satisfy the consistency which is necessary for a PEKS scheme to fulfill its functionality. Then, we propose a variant of Khader scheme which is not only computationally consistent but also greatly improves efficiency.
2004年,Boneh等人首先提出了公钥加密关键字搜索(PEKS)的概念,它使人们能够在公钥设置中搜索加密的数据。目前提出的大多数PEKS方案都是基于双线性配对构造的。然而,基于配对的PEKS方案容易受到离线关键字猜测攻击。在ICCSA 2006中,Khader提出了一个不使用配对的PEKS方案。本文证明了Khader方案不满足PEKS方案实现其功能所必需的一致性。然后,我们提出了一种Khader方案的变体,它不仅在计算上一致,而且大大提高了效率。
{"title":"An Efficient Public Key Encryption with Keyword Scheme Not Using Pairing","authors":"Hao-miao Yang, Chunxiang Xu, Hongjie Zhao","doi":"10.1109/IMCCC.2011.227","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.227","url":null,"abstract":"The notion of Public Key Encryption with Keyword Search (PEKS), which enables one to search encrypted data in public key setting, was firstly suggested by Boneh et al. in 2004. So far most of presented PEKS schemes were constructed based on bilinear pairing. However, PEKS schemes based on pairing are susceptible to off-line keyword guessing attacks. In ICCSA 2006, Khader proposed a PEKS scheme not using pairing. In this paper, we show that Khader' scheme do not satisfy the consistency which is necessary for a PEKS scheme to fulfill its functionality. Then, we propose a variant of Khader scheme which is not only computationally consistent but also greatly improves efficiency.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127629166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design of (15, 11) Hamming Code Encoding and Decoding System Based on FPGA 基于FPGA的(15,11)汉明码编解码系统设计
Tongsheng Zhang, Q. Ding
In the digital communication systems, due to the random interference from the outside, digital code may be distorted during the transmission, so the receiver can't judge correctly, it makes the communication systems' BER increases greatly and affects the quality of communication. The target of this thesis is to design the encoding and decoding of Hamming code by VHDL language to elaborate how hamming code to error detection and correction. So it will enhance the reliability of communication systems.
在数字通信系统中,由于外界的随机干扰,数字码在传输过程中可能发生失真,使接收机无法正确判断,使得通信系统的误码率大大增加,影响通信质量。本文的目标是用VHDL语言设计汉明码的编码和解码,阐述如何对汉明码进行错误检测和纠错。从而提高通信系统的可靠性。
{"title":"Design of (15, 11) Hamming Code Encoding and Decoding System Based on FPGA","authors":"Tongsheng Zhang, Q. Ding","doi":"10.1109/IMCCC.2011.179","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.179","url":null,"abstract":"In the digital communication systems, due to the random interference from the outside, digital code may be distorted during the transmission, so the receiver can't judge correctly, it makes the communication systems' BER increases greatly and affects the quality of communication. The target of this thesis is to design the encoding and decoding of Hamming code by VHDL language to elaborate how hamming code to error detection and correction. So it will enhance the reliability of communication systems.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131295231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1