Showing 681 - 700 results of 1,322 for search '"bit"', query time: 0.05s Refine Results
  1. 681

    Quantum cryptanalysis of lightweight block cipher Piccolo by Xiaoni DU, Xiangyu WANG, Lifang LIANG, Kaibin LI

    Published 2023-06-01
    “…By taking the characteristics of the structure of Piccolo algorithm RP permutation into consideration, a 3-round quantum distinguisher was proposed.Based on Grover meets Simon algorithm, the 6-round of quantum key recovery attack was given.The results show that the key can be recovered 56 bit with the time complexity 2 <sup>28</sup> and the occupation of 464 qubit.Moreover, if attack rounds r>6,the time complexity is 2 <sup>28+16(r-6)</sup>, which is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mrow> <msup> <mn>2</mn> <mrow> <mn>68</mn></mrow> </msup> </mrow> </mfrac> </math></inline-formula> of Grover quantum brute-force search.The time complexity of the proposed attack method is significantly reduced compared with Grover search and is also better than that of traditional cryptanalysis, which lays a foundation for the subsequent research on quantum attacks of lightweight block ciphers.…”
    Get full text
    Article
  2. 682

    A New Combination of RAKE Receiver and Adaptive Antenna Array Beamformer for Multiuser Detection in WCDMA Systems by Shahriar Shirvani-Moghaddam, Hajar Sadeghi

    Published 2011-01-01
    “…We illustrate the comparison of bit error rate (BER) of the proposed receiver with simple correlator and also 1D-RAKE receiver in multiuser detection (MUD) WCDMA. …”
    Get full text
    Article
  3. 683

    The CFS Choux Questionnaire by Lenore Newman

    Published 2024-12-01
    “…(And yes, some questions have a bit more craquelin than others.) Straightforward on their own, the queries combined start to form a celebratory pyramid of extravagance. …”
    Get full text
    Article
  4. 684

    Fast Block Partitioning Algorithm for HEVC Based on Spatial Correlation and Image Texture by Yingbiao Yao, Xiaojuan Li

    Published 2015-01-01
    “…Compared with HM13.0, experimental results reveal that the proposed algorithm can save about 20% computational complexity on average whereas the average bit rate increment is 0.84% and the decrement of PSNR is 0.04 dB.…”
    Get full text
    Article
  5. 685

    Vibration and Deflection Behavior of a Coal Auger Working Mechanism by Songyong Liu, Huifu Ji, Xinxia Cui

    Published 2016-01-01
    “…Because coal auger working mechanism faces problems such as excessive vibration, serious deflection, and low drilling efficiency, a new five-bit coal auger working mechanism test model was established to explore the influence factor on vibration and deflection under different conditions. …”
    Get full text
    Article
  6. 686

    A massive MIMO-OTFS robust transmission scheme for vehicular networks using sensing-assisted communication by Weidong WANG, Hui GAO, Xin SU, Limin XIAO, Shiqiang SUO, Qiusha GONG

    Published 2023-12-01
    “…For a multi-user integrated sensing and communication system in the network of vehicles, a robust sensing-assisted communication massive multiple-input multiple-output (MIMO) orthogonal time frequency space (OTFS) transmission scheme was proposed.Due to the limited sensing accuracy of the radar, errors existed in the channel state information (CSI) reconstructed based on sensing parameters.The transmission performance decreased as a result.To address this issue, the CSI in the delay doppler domain was reconstructed based on the sensing parameters by the transmitter firstly.And a robust beam forming scheme was designed considering the CSI error.Secondly, the channel estimation error and inter user interference were perceived by receivers based on sensing parameters.Then the robust receiver was designed by incorporating the perceived interference errors into the signal detector in an analytical way.Finally, numerical simulation results show that the proposed method effectively reduces the system bit error rate and increases the data reception rate of users.The proposed method improves the overall system performance in this situation.…”
    Get full text
    Article
  7. 687

    Basis expansion model-based improved regularized orthogonal matching pursuit channel estimation for V2X fast time-varying SC-FDMA by Yong LIAO, Zhirong CAI

    Published 2021-04-01
    “…In order to further improve the vehicle-to-everything (V2X) communication performance of the Internet of vehicles, a basis expansion model (BEM) was adopted and suitable for high-speed mobile scenarios to transform the channel estimation into a sparse signal reconstruction.Furthermore, it was proved that the BEM coefficients were sparse, and an improved regularized orthogonal matching pursuit (iROMP) channel estimation algorithm based on BEM (BEM-iROMP) was proposed.BEM coefficients were acquired by the iROMP, and finally the feedback results were iterated to achieve the optimal channel estimation.Simulation results show that in comparison with the least square (LS), linear minimum mean squared error (LMMSE), and BEM-LS channel estimation algorithms, the proposed algorithm can effectively improve the normalized mean square error (NMSE) and bit error rate (BER) performance.…”
    Get full text
    Article
  8. 688
  9. 689

    Fourier Rotman Lens Enabled Directional Modulation Transmitter by Yuan Ding, Yunhua Zhang, Vincent Fusco

    Published 2015-01-01
    “…A 10 GHz Fourier Rotman lens enabled dynamic directional modulation (DM) transmitter is experimentally evaluated. Bit error rate (BER) performance is obtained via real-time data transmission. …”
    Get full text
    Article
  10. 690

    HEVC information hiding approach based on intra prediction modes modulation by Jie YANG, Song-bin LI, Hao-jiang DENG

    Published 2016-09-01
    “…For further improving the embedding efficiency in the processing of HEVC information hiding,a method for HEVC information hiding based on intra prediction models modulation was proposed.The space lattice dimen-sion N(N = 2,3,4)of each CTU was generated according to the key.The selection rule of intra prediction mode was utilized to select N modes which were located at vertex angle.The N modes were mapped to the value F through the space lattice mapping algorithm.Then N bits secret information were read from the bit file and converted to a deci-mal number D.In this way,N secret information bits were embedded in N intra prediction modes by modifying at most one mode.The experimental results approve that the proposed method has high embedding efficiency,small rate increase and minimal influence on the video quality and the anti-steganalysis experiment confirms that the pro-posed method has high concealment.…”
    Get full text
    Article
  11. 691

    Application of BO-BiGRU based post equalizer in high-speed underwater visible light communication system by Haoyu ZHANG, Li YAO, Chaoxu CHEN, Jianyang SHI, Chao SHEN, Nan CHI

    Published 2023-05-01
    “…Signals are susceptible to nonlinear effects in the process of underwater visible light communication (UVLC) channel transmission.In order to improve the communication performance of the system, it is very important to recover the received signals.A bidirectional gated recurrent unit model based on Bayesian optimization algorithm (BO-BiGRU) was proposed as post equalizer in UVLC system, which could automatically find the optimal hyperparameters.BO-BiGRU model was applied to the 1.2 m underwater experimental platform.64 quadrature amplitude modulation (QAM)-carrierless amplitude-and-phase modulation (CAPM) was adopted, and 3.10 Gbit/s rate of data transfer was achieved under the condition that the bit error ratio (BER) of the system was less than 3.8×10<sup>-3</sup>7% forward error correction (FEC), which is 128 Mbit/s higher than the traditional post equalization method.…”
    Get full text
    Article
  12. 692

    Pseudo 4D projective coordinate-based multi-base scalar multiplication by Ming XU, Liang SHI

    Published 2018-05-01
    “…In order to address the problem of elliptic curve cryptosystem (ECC) for the expensive cost in scalar multiplication and the vulnerability to the power analysis attacks,a pseudo 4D projective coordinate-based multi-base scalar multiplication was proposed to optimize group operation layer and scalar multiplication operation layer,which aimed at increasing the performance of ECC and resisting common power analysis attacks.Experimental results show that compared with the state-of-the-art algorithms,the proposed algorithm decreases 5.71% of point doubling cost,3.17% of point tripling cost,and 8.74% of point quintupling cost under discrete group operations.When the key length is 160 bit,the proposed algorithm decreases 36.32% of point tripling cost,17.42% of point quintupling cost,and 8.70% of the system cost under continuous group operations.The analyzing of power consumption wave shows that the proposed algorithm can resist SPA and DPA attack.…”
    Get full text
    Article
  13. 693

    Trellis orthogonal reconstruction algorithm based on orthogonal space-time block code for wireless communication system in high-speed railway by Wan-tuan LUO, Xu-ming FANG, Meng CHENG

    Published 2014-07-01
    “…When the train moves at a fantastic speed, the fast time-varying channel destroys the orthogonality of OSTBC reducing the diversity gain which would severely degrade the bit error rate (BER) perform-ance. The trellis orthogonal reconstruction algorithm (TORA), in which the intra-code orthogonality is reconstructed through givens transformation and the transmit beamforming direction can be changed as well is proposed. …”
    Get full text
    Article
  14. 694

    Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps by LIU Jian-dong, FU Xiu-li

    Published 2007-01-01
    “…A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution and desired diffusion and confusion properties.Based on the coupled discrete tent spatiotemporal chaotic maps,a cryptographic Hashing function is constructed to generate 128-bit Hash value from a message with arbitrary length.The approach uses the initial value of coupled discrete tent chaotic dynamical system iteration as the secret key.The key space is very large.There is a high sensitivity and complex and strongly nonlinear coupling relation between the Hash value and the corresponding message and secret key.Theoretic analysis and simulation results are shown that the approach possess not only extremely high security in comparison with earlier chaotic Hash functions,but also the high execution speed.Therefore,the approach can satisfy all the performance requirements of Hash function,such as one-way,key sensitivity and collision resistance.…”
    Get full text
    Article
  15. 695

    Asymptotic characterisation of regularised zero‐forcing receiver for imperfect and correlated massive multiple‐input multiple‐output systems by Ayed M. Alrashdi

    Published 2022-06-01
    “…Abstract In this work, the authors present an asymptotic high‐dimensional analysis of the regularised zero‐forcing receiver in terms of its mean‐squared error (MSE) and bit error rate (BER) when used for the recovery of binary phase‐shift keying (BPSK) modulated signals in a massive multiple‐input multiple‐output communication system. …”
    Get full text
    Article
  16. 696

    Analysis of MSK jamming effectiveness based on effective jamming coefficient by Zengmao CHEN, Qian YAN, Zhiguo SUN, Rongchen SUN

    Published 2022-11-01
    “…For the problem of communication jamming effectiveness, an effective jamming coefficient was proposed as an evaluation metric based on the correlation between jamming and communication signals, and the impact of orthogonal receivers was analyzed.Specially, minimum shift keying (MSK) and several typical binary modulation signals were chosen as the target communication and jamming signals, respectively.Jamming effectiveness evaluation was performed for the above mentioned scenario by deriving its theoretical bit error rate (BER) formulas.Moreover, for coherent jamming scenario with MSK being the jamming signal, the impact of its phase difference, frequency difference and delay on the jamming effectiveness were also systematically analyzed.The analysis suggests that to achieve better jamming effectiveness, different jamming modulation scheme should be chosen according to the signal-to-noise (SNR) of the jamming communication signal.Simulation has also shown that there is a good match between the derived theoretical analysis and numerical simulation of the proposed method effectiveness, which has proven its accuracy and validity.…”
    Get full text
    Article
  17. 697

    High spectral efficiency SSB-PAM-DD scheme with high linewidth tolerance by Dongxu LU, Xian ZHOU, Fei LIU, Jiahao HUO, Jinhui YUAN, Keping LONG

    Published 2022-05-01
    “…For low-cost and high chromatic dispersion (CD) robustness single sideband (SSB) with direct detection (DD), three schemes of SSB with pulse amplitude modulation (PAM) were investigated.Among that, the highest spectral efficiency was achieved by the scheme of adding the frequency down-conversion at the transmitter.However, that scheme reduces the tolerance for laser linewidth.Hence, based on the character of the SSB-PAM signal, a DSP scheme was proposed, including a modified equalization algorithm with phase distortion immunity and blind phase search algorithm.The simulation results show that the modified scheme can tolerate 1 MHz linewidth for 112 Gbit/s SSB-PAM-DD, while the original scheme for SSB-PAM was only 100 kHz at the same bit error rate (BER) threshold.Therefore, the proposed scheme can achieve a high frequency efficiency, high linewidth tolerance, and low-cost SSB-PAM signaling transmission.…”
    Get full text
    Article
  18. 698

    Shaping the future of commercial quantum computer and the challenge for information security by Chao WANG, Yun-jiang WANG, Feng HU

    Published 2016-03-01
    “…The progress on universal quantum computer devices is show, so that attacking the 1 024 bit RSA by Shor algorithm is impractical currently. …”
    Get full text
    Article
  19. 699

    Variable Transmission Range Routing Protocol Based on Vehicle Density in VANET by Rong Cai, Guoan Zhang, Yuebo Wu

    Published 2015-03-01
    “…In order to solve the problem of unstable connectivity and high bit error rate,which are caused by rapid changes in the density of vehicles on the road,while the transmission radius remained unchanged,a variable transmission range routing protocols based on vehicle density in vehicular Ad-Hoc network was proposed.According to different vehicle density,node could adjust the farthest transmission distance and reduce the transmission latency of the message,which could ensure high connection probability of the network.Based on homogeneous poisson point process model,the change conditions of transmission range with different vehicle density were deduced,and its feasible was proved.Furthermore,mathematical calculate formula of average latency was obtained according to the theoretical analysis.At last,variable transmission range routing protocol based on vehicle density and fixed transmission range routing protocol were compared by simulation.The simulated results show that the proposed protocol can be applied in actual environments,and the message can be transmitted fast from source node to destination node under the condition of high connection probability.…”
    Get full text
    Article
  20. 700