The cross-ambiguity algorithm has been extensively used to detect targets in passive radar. However, this algorithm is affected by range migration and Doppler frequency migration when detecting high-speed and accelerating targets. In this paper, an effective algorithm of compensating the two migrations in passive radar is presented. The presented algorithm combines the fractional Fourier transform and the keystone transform with the cross-ambiguity function algorithm. Based on the cross-ambiguity function, the fractional cross-ambiguity function algorithm is realized by the two-step FFTs, and then the keystone transform is inserted into the two-step FFTs. The presented algorithm can eliminate the effects of range migration and Doppler frequency migration. Simulation results are conducted to demonstrate the validity of the presented algorithm.
{"title":"The CAF-DFRFT-KT Algorithm for High-Speed Target Detection in Passive Radar","authors":"Lei Liu, R. Tao, N. Zhang","doi":"10.1109/IMCCC.2011.190","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.190","url":null,"abstract":"The cross-ambiguity algorithm has been extensively used to detect targets in passive radar. However, this algorithm is affected by range migration and Doppler frequency migration when detecting high-speed and accelerating targets. In this paper, an effective algorithm of compensating the two migrations in passive radar is presented. The presented algorithm combines the fractional Fourier transform and the keystone transform with the cross-ambiguity function algorithm. Based on the cross-ambiguity function, the fractional cross-ambiguity function algorithm is realized by the two-step FFTs, and then the keystone transform is inserted into the two-step FFTs. The presented algorithm can eliminate the effects of range migration and Doppler frequency migration. Simulation results are conducted to demonstrate the validity of the presented algorithm.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115915067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gaining the value of k is a key technology for side-channel attack on DSA. In order to recover the private key of a DSA signature, this paper proposes a method based on data-cache timing attack. That is getting side channel information about a random number k used in a signature first and then recover the private key x from this. We mainly introduces the principle of data-cache timing attack and describe the method of gaining said k.
{"title":"Research on Key Technology for Data Cache Timing Attack on DSA","authors":"Zhou Ping, Kou Ying-zhan, Chen Caisen, Zhang Jilao","doi":"10.1109/IMCCC.2011.148","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.148","url":null,"abstract":"Gaining the value of k is a key technology for side-channel attack on DSA. In order to recover the private key of a DSA signature, this paper proposes a method based on data-cache timing attack. That is getting side channel information about a random number k used in a signature first and then recover the private key x from this. We mainly introduces the principle of data-cache timing attack and describe the method of gaining said k.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130180017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Open Laboratory Management System provides an open virtual experiment environment for students, so that its system performance immediately impacts the quality of students learning. According to analyze the performance requirements of Open Laboratory Management System, the author discovers performance testing points, implements automated performance testing for performance testing points of the system based on Load Runner. In this paper, taking the students login for example, it elaborates testing process and provides the reference for system optimization.
{"title":"Performance Testing of Open Laboratory Management System Based on LoadRunner","authors":"Xiaojiao Yan, Fuan Wen, Chunmei Fan, Xiao Wang","doi":"10.1109/IMCCC.2011.50","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.50","url":null,"abstract":"Open Laboratory Management System provides an open virtual experiment environment for students, so that its system performance immediately impacts the quality of students learning. According to analyze the performance requirements of Open Laboratory Management System, the author discovers performance testing points, implements automated performance testing for performance testing points of the system based on Load Runner. In this paper, taking the students login for example, it elaborates testing process and provides the reference for system optimization.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134295657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multi-domain signal filtering is a perspective technology in both radar and wireless communication systems. To obtain extra benefits compared with conventional methods, a novel joint space-frequency-polarization filter (SFPF) based on vector sensitive array (VSA) is presented in this paper. An orthogonal dual-polarization sensitive array (DPSA) and time delay units are applied to offer frequency, polarization and spatial information. Then the SFPF is constructed with oblique projection operators to suppress the interferences and extract the target signals without introducing any phase amplitude distortion. Performance analysis and simulation are undertaken. It can be concluded that the signal can be recovered more effectively compared with a space-polarization filter (SPF), since more information in multiple domains are utilized in the proposed SFPF.
{"title":"Joint Filtering of Space-frequency-polarization Domain Based on Vector Sensitive Array","authors":"Hong Hong, X. Mao, Cui Hu, H. Hou, Hao-Xian Wang","doi":"10.1109/IMCCC.2011.171","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.171","url":null,"abstract":"Multi-domain signal filtering is a perspective technology in both radar and wireless communication systems. To obtain extra benefits compared with conventional methods, a novel joint space-frequency-polarization filter (SFPF) based on vector sensitive array (VSA) is presented in this paper. An orthogonal dual-polarization sensitive array (DPSA) and time delay units are applied to offer frequency, polarization and spatial information. Then the SFPF is constructed with oblique projection operators to suppress the interferences and extract the target signals without introducing any phase amplitude distortion. Performance analysis and simulation are undertaken. It can be concluded that the signal can be recovered more effectively compared with a space-polarization filter (SPF), since more information in multiple domains are utilized in the proposed SFPF.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133440847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, the problem on sychronization is investigated for two different Chaotic Neural Network with mixed time-varying Delays. The adaptive synchronization of two different chaotic neural networks with fully unknown parameters and mixed time-varying delays is investigated, and as a result, a well-designed method is given to ensure the synchronization of two chaotic neural networks which are of the different structure and fully unknown parameters. Under the action of the adaptive control law, the synchronization and parametric identification can be done simultaneously. The controller designed is simple and easy to implement. Strict theoretical proofs are given by using the method of Lyapunov function. Finally, numerical simulations show the effectiveness of the method.
{"title":"Adaptive Sychronization between Two Different Chaotic Neural Networks with Mixed Time-varying Delays","authors":"Li Jie, Yan Pinghua, Yang Si","doi":"10.1109/IMCCC.2011.199","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.199","url":null,"abstract":"In this paper, the problem on sychronization is investigated for two different Chaotic Neural Network with mixed time-varying Delays. The adaptive synchronization of two different chaotic neural networks with fully unknown parameters and mixed time-varying delays is investigated, and as a result, a well-designed method is given to ensure the synchronization of two chaotic neural networks which are of the different structure and fully unknown parameters. Under the action of the adaptive control law, the synchronization and parametric identification can be done simultaneously. The controller designed is simple and easy to implement. Strict theoretical proofs are given by using the method of Lyapunov function. Finally, numerical simulations show the effectiveness of the method.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"25 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132286009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a light-weighted pipelined serial Viterbi Decoder is implemented for resource saving purpose. The trace back module of the decoder consumes fewer logical resources by employing a RAM-based Register Exchange architecture. All the metric and trace back bits are stored in the RAM to save logical resources. Synthesis results show that, the proposed architecture can save more than half of resource utilization than fabric IP core and has the minimum logic consumption than almost other schemes we can find with nearly no performance loss.
{"title":"A Light-weighted Viterbi Decoder Implemented by FPGA","authors":"Zhenzhi Wu, Shujuan Hou, Hai Li","doi":"10.1109/IMCCC.2011.155","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.155","url":null,"abstract":"In this paper, a light-weighted pipelined serial Viterbi Decoder is implemented for resource saving purpose. The trace back module of the decoder consumes fewer logical resources by employing a RAM-based Register Exchange architecture. All the metric and trace back bits are stored in the RAM to save logical resources. Synthesis results show that, the proposed architecture can save more than half of resource utilization than fabric IP core and has the minimum logic consumption than almost other schemes we can find with nearly no performance loss.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132584274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of Internet technology, network technology has penetrated into every part of the economic society. However, due to the open Internet and anonymity of the inherent characteristics, leading to security has become a major obstacle of web application. How to guarantee the transmission of sensitive information effectively becomes the focus of user. In this case, Secure Sockets Layer(SSL) emerges as the times require. We study the implementation process SSL Handshake Protocol based on analyzes the Secure Sockets Layer SSL protocol implement mechanism [17].
{"title":"A Study of Man-in-the-Middle Attack Based on SSL Certificate Interaction","authors":"Jiang Du, Xing-hua Li, Hua Huang","doi":"10.1109/IMCCC.2011.117","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.117","url":null,"abstract":"With the rapid development of Internet technology, network technology has penetrated into every part of the economic society. However, due to the open Internet and anonymity of the inherent characteristics, leading to security has become a major obstacle of web application. How to guarantee the transmission of sensitive information effectively becomes the focus of user. In this case, Secure Sockets Layer(SSL) emerges as the times require. We study the implementation process SSL Handshake Protocol based on analyzes the Secure Sockets Layer SSL protocol implement mechanism [17].","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132588239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to resolve the carrier phase ambiguity in attitude determination, a new approach is proposed and discussed. A method for static baseline vector estimation is derivate based on the epoch-difference carrier phase and a receiver clock bias model. By using the estimated baseline vector, a float solution of ambiguity is computed. The range of potential integer ambiguity can be obtained with the error of estimated baseline. The implemented algorithm is tested with measurement data collected on static baselines. Experimental results indicate that, the integer ambiguity can be accurately determined after about 40 seconds with the present algorithm.
{"title":"Resolution of Integer Ambiguity in GPS Attitude Determination","authors":"Chuang Liu, Pei Chen","doi":"10.1109/IMCCC.2011.240","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.240","url":null,"abstract":"In order to resolve the carrier phase ambiguity in attitude determination, a new approach is proposed and discussed. A method for static baseline vector estimation is derivate based on the epoch-difference carrier phase and a receiver clock bias model. By using the estimated baseline vector, a float solution of ambiguity is computed. The range of potential integer ambiguity can be obtained with the error of estimated baseline. The implemented algorithm is tested with measurement data collected on static baselines. Experimental results indicate that, the integer ambiguity can be accurately determined after about 40 seconds with the present algorithm.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133122269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The notion of Public Key Encryption with Keyword Search (PEKS), which enables one to search encrypted data in public key setting, was firstly suggested by Boneh et al. in 2004. So far most of presented PEKS schemes were constructed based on bilinear pairing. However, PEKS schemes based on pairing are susceptible to off-line keyword guessing attacks. In ICCSA 2006, Khader proposed a PEKS scheme not using pairing. In this paper, we show that Khader' scheme do not satisfy the consistency which is necessary for a PEKS scheme to fulfill its functionality. Then, we propose a variant of Khader scheme which is not only computationally consistent but also greatly improves efficiency.
{"title":"An Efficient Public Key Encryption with Keyword Scheme Not Using Pairing","authors":"Hao-miao Yang, Chunxiang Xu, Hongjie Zhao","doi":"10.1109/IMCCC.2011.227","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.227","url":null,"abstract":"The notion of Public Key Encryption with Keyword Search (PEKS), which enables one to search encrypted data in public key setting, was firstly suggested by Boneh et al. in 2004. So far most of presented PEKS schemes were constructed based on bilinear pairing. However, PEKS schemes based on pairing are susceptible to off-line keyword guessing attacks. In ICCSA 2006, Khader proposed a PEKS scheme not using pairing. In this paper, we show that Khader' scheme do not satisfy the consistency which is necessary for a PEKS scheme to fulfill its functionality. Then, we propose a variant of Khader scheme which is not only computationally consistent but also greatly improves efficiency.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127629166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the digital communication systems, due to the random interference from the outside, digital code may be distorted during the transmission, so the receiver can't judge correctly, it makes the communication systems' BER increases greatly and affects the quality of communication. The target of this thesis is to design the encoding and decoding of Hamming code by VHDL language to elaborate how hamming code to error detection and correction. So it will enhance the reliability of communication systems.
{"title":"Design of (15, 11) Hamming Code Encoding and Decoding System Based on FPGA","authors":"Tongsheng Zhang, Q. Ding","doi":"10.1109/IMCCC.2011.179","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.179","url":null,"abstract":"In the digital communication systems, due to the random interference from the outside, digital code may be distorted during the transmission, so the receiver can't judge correctly, it makes the communication systems' BER increases greatly and affects the quality of communication. The target of this thesis is to design the encoding and decoding of Hamming code by VHDL language to elaborate how hamming code to error detection and correction. So it will enhance the reliability of communication systems.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131295231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}