Due to the civil BeiDou navigation system is open,unauthenticated,and non-encrypted,civilian BeiDou navigation signals may have great security loopholes during transmission or reception.The main security loophole here...Due to the civil BeiDou navigation system is open,unauthenticated,and non-encrypted,civilian BeiDou navigation signals may have great security loopholes during transmission or reception.The main security loophole here is spoofing attacks.Spoofing attacks make the positioning or timing results of BeiDou civilian receivers wrong.Such errors may cause a series of security problems,which lays a serious hidden danger for Bei-Dou satellite information security.This article proposes an anti-spoofing method for BeiDou navigation system based on the combination of SM commercial cryptographic algorithm and Timed Efficient Stream Loss-tolerant Authentication(TESLA)for spoofing attacks.In this solution,we use the SM3 algorithm to generate a TESLA key chain with time information,and then use the key in the key chain to generate the message authentication code for the BeiDou D2 navigation message.The message authentication code is inserted into a reserved bit of the D2 navigation message.In addition,this solution uses the SM2 algorithm to protect and encrypt time information in the TESLA key chain to prevent key replay attacks in TESLA.The experimental results tested on the experimental platform built in this paper show that this scheme reduces the possibility of the BeiDou navigation system being deceived and enhances the safety of the BeiDou navigation system.展开更多
Let Ф(u ×v, k, Aa, Ac) be the largest possible number of codewords among all two- dimensional (u ×v, k, λa, λc) optical orthogonal codes. A 2-D (u× v, k, λa, λ)-OOC with Ф(u× v, k, λ...Let Ф(u ×v, k, Aa, Ac) be the largest possible number of codewords among all two- dimensional (u ×v, k, λa, λc) optical orthogonal codes. A 2-D (u× v, k, λa, λ)-OOC with Ф(u× v, k, λa, λc) codewords is said to be maximum. In this paper, the number of codewords of a maximum 2-D (u × v, 4, 1, 3)-OOC has been determined.展开更多
The area navigation system,discussed in this paper,is composed of ground responders and a navigation terminal and can position a high-velocity aircraft and measure its velocity.This navigation system is silent at ordi...The area navigation system,discussed in this paper,is composed of ground responders and a navigation terminal and can position a high-velocity aircraft and measure its velocity.This navigation system is silent at ordinary times.It sends out a request signal when positioning is required for an aircraft,and then the ground responders send a signal for resolving the aircraft.Combining the direct sequence spread spectrum and frequency hopping,the concealed communication mode is used in the whole communication process,with short communication pulses as much as possible,so the system has strong concealment and anti-interference characteristics.As the transmission delay is apparent in the response communication mode,there is a big error where the common navigation algorithm is used for the positioning and velocity measurement of a high-velocity aircraft.In this paper,a new algorithm is proposed,which can eliminate the influence of response communication delay on the positioning of a high-velocity moving target to realize the precise positioning and velocity measurement of a high-velocity aircraft.展开更多
GNSS( global navigation satellite systems) are unavailable in challenging environments such as urban canyon and indoor locations due to signal blocking and jamming. Camera / IMU( inertial measurement units) integrated...GNSS( global navigation satellite systems) are unavailable in challenging environments such as urban canyon and indoor locations due to signal blocking and jamming. Camera / IMU( inertial measurement units) integrated navigation systems can be alternatives to GNSS. In this paper,a tightly coupled Camera / IMU algorithm modeled by IEKF( iterated extended kalman filter) is presented. This tight integration approach uses image generated pixel coordinates to update the Kalman Filter directly. The developed algorithm is verified by a hybrid simulation,i.e. using inertial data from field test to fuse with simulated image feature measurements. The results show that the tight approach is superior to the loose integration when the image measurements are insufficient( i.e. less than three ground control points).展开更多
The satellite navigation anti-interference technique, especially space anti-interference technique, is subjected to many restrictions, such as cost, energy depletion, and so on, and the satellite signal strength is li...The satellite navigation anti-interference technique, especially space anti-interference technique, is subjected to many restrictions, such as cost, energy depletion, and so on, and the satellite signal strength is limited by the International Radio Advisory Committee, the International Telecommunication Union (ITU) and satellite companies. This paper focuses on satellite navigation systems, especially satellite navigation systems adopting direct sequence spread spectrum (DSSS). The notch filter is used to remove some frequencies from the pseudorandom code frequency spectrum making use of its cyclostationarity first, then the filtered pseudorandom code is modulated by the carrier to attain energy suppression, but the pseudorandom code autocorrelation characteristic stays unchanged. The feasibility of this algorithm is verified by simulation results.展开更多
This paper combines improved Hamming codes and parity codes to assure the reliability of memory in presence of multiple bit upsets with low cost overhead.The redundancy bits of improved Hamming codes will be appended ...This paper combines improved Hamming codes and parity codes to assure the reliability of memory in presence of multiple bit upsets with low cost overhead.The redundancy bits of improved Hamming codes will be appended at the end of data bits,which eliminates the overhead of interspersing the redundancy bits at the encoder and decoder.The reliability of memory is further enhanced by the layout architecture of redundancy bits and data bits.The proposed scheme has been implemented in Verilog and synthesized using the Synopsys tools.The results reveal that the proposed method has about 19% less area penalties and 13% less power consumption comparing with the current two-dimensional error codes,and its latency of encoder and decoder is 63% less than that of Hamming codes.展开更多
The desert plant Rhazya stricta has anticancer and antimicrobial properties, and is widely used in indigenous medicines of Saudi Arabia. However, the therapeutic benefits rely on an accurate identification of this spe...The desert plant Rhazya stricta has anticancer and antimicrobial properties, and is widely used in indigenous medicines of Saudi Arabia. However, the therapeutic benefits rely on an accurate identification of this species. The authenticity of R. stricta and other medicinal plants and herbs procured from local markets can be questionable due to a lack of clear phenotypic traits. DNA barcoding is an emerging technology for rapid and accurate species identification. In this study, six candidate chloroplastid barcodes were investigated for the authentication of R. stricta. We compared the DNA sequences from fifty locally collected and five market samples of R. stricta with database sequences of R. stricta and seven closely related species. We found that the coding regions matK, rbcL, rpoB, and rpoC1 were highly similar among the taxa. By contrast, the intergenic spacers psbK-psbI and atpF-atpH were variable loci distinct for the medicinal plant R. stricta. psbK-psbI clearly discriminated R. stricta samples as an efficient single locus marker, whereas a two-locus marker combination comprising psbK-psbI + atpF-atpH was also promising according to results from the Basic Local Alignment Search Tool and a maximum likelihood gene tree generated using PHyML. Two-dimensional DNA barcodes (i.e., QR codes) for the psbK-psbI and psbK-psbI + atpF-atpH regions were created for the validation of fresh or dried R. stricta samples.展开更多
This paper briefly introduces the characteristics and structure of symbol QR two-dimensional code, a detailed analysis of the image processing method to identify QR code of the whole process, and the bilinear mapping ...This paper briefly introduces the characteristics and structure of symbol QR two-dimensional code, a detailed analysis of the image processing method to identify QR code of the whole process, and the bilinear mapping method is applied to image correction, the final steps of decoding are given. The actual test results show that, the design algorithm has theoretical and practical, this recognition system can correctly read QR code, and has high recognition rate and recognition speed, has practical value and application prospect.展开更多
基金supported in part by the Joint Foundation of National Natural Science Committee of China and Civil Aviation Administration of China under Grant U1933108in part by the Scientific Research Project of Tianjin Municipal Education Commission under Grant 2019KJ117.
文摘Due to the civil BeiDou navigation system is open,unauthenticated,and non-encrypted,civilian BeiDou navigation signals may have great security loopholes during transmission or reception.The main security loophole here is spoofing attacks.Spoofing attacks make the positioning or timing results of BeiDou civilian receivers wrong.Such errors may cause a series of security problems,which lays a serious hidden danger for Bei-Dou satellite information security.This article proposes an anti-spoofing method for BeiDou navigation system based on the combination of SM commercial cryptographic algorithm and Timed Efficient Stream Loss-tolerant Authentication(TESLA)for spoofing attacks.In this solution,we use the SM3 algorithm to generate a TESLA key chain with time information,and then use the key in the key chain to generate the message authentication code for the BeiDou D2 navigation message.The message authentication code is inserted into a reserved bit of the D2 navigation message.In addition,this solution uses the SM2 algorithm to protect and encrypt time information in the TESLA key chain to prevent key replay attacks in TESLA.The experimental results tested on the experimental platform built in this paper show that this scheme reduces the possibility of the BeiDou navigation system being deceived and enhances the safety of the BeiDou navigation system.
基金Supported by the National Natural Science Foundation of China(61071221,10831002)
文摘Let Ф(u ×v, k, Aa, Ac) be the largest possible number of codewords among all two- dimensional (u ×v, k, λa, λc) optical orthogonal codes. A 2-D (u× v, k, λa, λ)-OOC with Ф(u× v, k, λa, λc) codewords is said to be maximum. In this paper, the number of codewords of a maximum 2-D (u × v, 4, 1, 3)-OOC has been determined.
文摘The area navigation system,discussed in this paper,is composed of ground responders and a navigation terminal and can position a high-velocity aircraft and measure its velocity.This navigation system is silent at ordinary times.It sends out a request signal when positioning is required for an aircraft,and then the ground responders send a signal for resolving the aircraft.Combining the direct sequence spread spectrum and frequency hopping,the concealed communication mode is used in the whole communication process,with short communication pulses as much as possible,so the system has strong concealment and anti-interference characteristics.As the transmission delay is apparent in the response communication mode,there is a big error where the common navigation algorithm is used for the positioning and velocity measurement of a high-velocity aircraft.In this paper,a new algorithm is proposed,which can eliminate the influence of response communication delay on the positioning of a high-velocity moving target to realize the precise positioning and velocity measurement of a high-velocity aircraft.
基金Sponsored by the National High Technology Research and Development Program(Grant No.2012AA12A209)the National Natural Science Foundation of China(Grant No.41174028,41374033)+2 种基金the Key Laboratory Development Fund from the Ministry of Education of China(Grant No.618-277176)the LIESMARS Special Research Fund,the Research Start-up Fund from Wuhan Univesity(Grant No.618-273438)the Fundamental Research Funds for the Central Universities(Grant No.201161802020002)
文摘GNSS( global navigation satellite systems) are unavailable in challenging environments such as urban canyon and indoor locations due to signal blocking and jamming. Camera / IMU( inertial measurement units) integrated navigation systems can be alternatives to GNSS. In this paper,a tightly coupled Camera / IMU algorithm modeled by IEKF( iterated extended kalman filter) is presented. This tight integration approach uses image generated pixel coordinates to update the Kalman Filter directly. The developed algorithm is verified by a hybrid simulation,i.e. using inertial data from field test to fuse with simulated image feature measurements. The results show that the tight approach is superior to the loose integration when the image measurements are insufficient( i.e. less than three ground control points).
基金Supported by the National Natural Science Foundation of China(No. 60802018)the National Key Basic Research and Development Technology Plan (No. 2007CB815500)
文摘The satellite navigation anti-interference technique, especially space anti-interference technique, is subjected to many restrictions, such as cost, energy depletion, and so on, and the satellite signal strength is limited by the International Radio Advisory Committee, the International Telecommunication Union (ITU) and satellite companies. This paper focuses on satellite navigation systems, especially satellite navigation systems adopting direct sequence spread spectrum (DSSS). The notch filter is used to remove some frequencies from the pseudorandom code frequency spectrum making use of its cyclostationarity first, then the filtered pseudorandom code is modulated by the carrier to attain energy suppression, but the pseudorandom code autocorrelation characteristic stays unchanged. The feasibility of this algorithm is verified by simulation results.
基金Sponsored by the Opening Project of National Key Laboratory of Science and Technology on Reliability PhysicsApplication Technology of Electrical Component(Grant No.ZHD200903)
文摘This paper combines improved Hamming codes and parity codes to assure the reliability of memory in presence of multiple bit upsets with low cost overhead.The redundancy bits of improved Hamming codes will be appended at the end of data bits,which eliminates the overhead of interspersing the redundancy bits at the encoder and decoder.The reliability of memory is further enhanced by the layout architecture of redundancy bits and data bits.The proposed scheme has been implemented in Verilog and synthesized using the Synopsys tools.The results reveal that the proposed method has about 19% less area penalties and 13% less power consumption comparing with the current two-dimensional error codes,and its latency of encoder and decoder is 63% less than that of Hamming codes.
文摘The desert plant Rhazya stricta has anticancer and antimicrobial properties, and is widely used in indigenous medicines of Saudi Arabia. However, the therapeutic benefits rely on an accurate identification of this species. The authenticity of R. stricta and other medicinal plants and herbs procured from local markets can be questionable due to a lack of clear phenotypic traits. DNA barcoding is an emerging technology for rapid and accurate species identification. In this study, six candidate chloroplastid barcodes were investigated for the authentication of R. stricta. We compared the DNA sequences from fifty locally collected and five market samples of R. stricta with database sequences of R. stricta and seven closely related species. We found that the coding regions matK, rbcL, rpoB, and rpoC1 were highly similar among the taxa. By contrast, the intergenic spacers psbK-psbI and atpF-atpH were variable loci distinct for the medicinal plant R. stricta. psbK-psbI clearly discriminated R. stricta samples as an efficient single locus marker, whereas a two-locus marker combination comprising psbK-psbI + atpF-atpH was also promising according to results from the Basic Local Alignment Search Tool and a maximum likelihood gene tree generated using PHyML. Two-dimensional DNA barcodes (i.e., QR codes) for the psbK-psbI and psbK-psbI + atpF-atpH regions were created for the validation of fresh or dried R. stricta samples.
文摘This paper briefly introduces the characteristics and structure of symbol QR two-dimensional code, a detailed analysis of the image processing method to identify QR code of the whole process, and the bilinear mapping method is applied to image correction, the final steps of decoding are given. The actual test results show that, the design algorithm has theoretical and practical, this recognition system can correctly read QR code, and has high recognition rate and recognition speed, has practical value and application prospect.