In order to improve the spectrum efficiency of the high-order polar coded modulation systems, the polar code is used as the component code of the bit-interleave coded modulation(BICM) system, a novel bit mapping schem...In order to improve the spectrum efficiency of the high-order polar coded modulation systems, the polar code is used as the component code of the bit-interleave coded modulation(BICM) system, a novel bit mapping scheme is proposed considering of the channel polarization and successive cancellation(SC) decoding principle of polar codes as well as the unequal protection of equivalent channels by modulator. In this scheme, the frozen bits on the unreliable split channel are allocated to the equivalent channel with the low protection of the modulator, while the equivalent channels with the high protection are used to transmit the information bits. Thus, the error-correcting performance of polar codes is improved. Compared with some bit mapping schemes, the proposed bit mapping scheme only needs to divide and choose the parameters of the split channels reliability measurement, the complexity does not increase obviously, and simulation results show that the proposed scheme has the better performance under the quadrature amplitude modulation(QAM) modulation based on the Gray mapping.展开更多
In this paper we analyse the security of a multiple pseudorandom-bit generator based on the coupled map lattice and suggest an improved model. Utilizing the error function attack, the multiple pseudorandom-bit generat...In this paper we analyse the security of a multiple pseudorandom-bit generator based on the coupled map lattice and suggest an improved model. Utilizing the error function attack, the multiple pseudorandom-bit generators which can be realized by the three digitization methods are analysed and the effective key spaces are estimated. We suggest an improved multiple pseudorandom-bit generator with 128-bit secret key, and analyse the key sensitivity and statistical properties of the system.展开更多
We study the impact of various modulation mapping strategies and signal constellation shapes on the se- crecy rates achievable with bit-interleaved coded modulation (BICM) schemes. Transmission over an ergodic Rayle...We study the impact of various modulation mapping strategies and signal constellation shapes on the se- crecy rates achievable with bit-interleaved coded modulation (BICM) schemes. Transmission over an ergodic Rayleigh fading channel is assumed throughout this work. Various constellations and mapping techniques are considered in this work to maximize the capacity difference between the main channel and the eavesdropper channel, rather than to opti- mize the capacity of both channels. We show that in terms of achievable secrecy rate, Gray and Quasi-Gray mappings only perform Well at low SNR but outperformed by other mapping techniques when SNR increases. The proper design of signal mapping can significantly enhance the achievable secrecy rate in BICM schemes. It is indicated that the key parameter to the secrecy rate of a BICM system is the distance spectrum of Euclidean distances for mappings.展开更多
网络应用的发展,要求路由器必须有能力支持防火墙、入侵检测、提供 QoS、流量计费等一系列功能,这些功能都要求路由器对IP包进行分类来完成对数据包的不同处理。目前的包分类算法不适用于大规模的规则数据库。该文在现有的一种基于位...网络应用的发展,要求路由器必须有能力支持防火墙、入侵检测、提供 QoS、流量计费等一系列功能,这些功能都要求路由器对IP包进行分类来完成对数据包的不同处理。目前的包分类算法不适用于大规模的规则数据库。该文在现有的一种基于位串的包分类算法上做了两个改进,位串的聚合和过滤规则的重排列。从而生成了一种新的包分类机制-ABV(Aggregated Bit Vector)。通过评测可看出这种新的算法可以很好地应用在大规模规则数据库上,性能比原先有很大提升。展开更多
基金supported by the National High Technology and Development Program of China (No.61971079)the Postgraduate Science Research Innovation project of Chongqing Municipal Education Commission (No.CYS20266)。
文摘In order to improve the spectrum efficiency of the high-order polar coded modulation systems, the polar code is used as the component code of the bit-interleave coded modulation(BICM) system, a novel bit mapping scheme is proposed considering of the channel polarization and successive cancellation(SC) decoding principle of polar codes as well as the unequal protection of equivalent channels by modulator. In this scheme, the frozen bits on the unreliable split channel are allocated to the equivalent channel with the low protection of the modulator, while the equivalent channels with the high protection are used to transmit the information bits. Thus, the error-correcting performance of polar codes is improved. Compared with some bit mapping schemes, the proposed bit mapping scheme only needs to divide and choose the parameters of the split channels reliability measurement, the complexity does not increase obviously, and simulation results show that the proposed scheme has the better performance under the quadrature amplitude modulation(QAM) modulation based on the Gray mapping.
基金Project supported by the National Natural Science Foundation of China(Grant No.60973109)
文摘In this paper we analyse the security of a multiple pseudorandom-bit generator based on the coupled map lattice and suggest an improved model. Utilizing the error function attack, the multiple pseudorandom-bit generators which can be realized by the three digitization methods are analysed and the effective key spaces are estimated. We suggest an improved multiple pseudorandom-bit generator with 128-bit secret key, and analyse the key sensitivity and statistical properties of the system.
文摘We study the impact of various modulation mapping strategies and signal constellation shapes on the se- crecy rates achievable with bit-interleaved coded modulation (BICM) schemes. Transmission over an ergodic Rayleigh fading channel is assumed throughout this work. Various constellations and mapping techniques are considered in this work to maximize the capacity difference between the main channel and the eavesdropper channel, rather than to opti- mize the capacity of both channels. We show that in terms of achievable secrecy rate, Gray and Quasi-Gray mappings only perform Well at low SNR but outperformed by other mapping techniques when SNR increases. The proper design of signal mapping can significantly enhance the achievable secrecy rate in BICM schemes. It is indicated that the key parameter to the secrecy rate of a BICM system is the distance spectrum of Euclidean distances for mappings.
文摘网络应用的发展,要求路由器必须有能力支持防火墙、入侵检测、提供 QoS、流量计费等一系列功能,这些功能都要求路由器对IP包进行分类来完成对数据包的不同处理。目前的包分类算法不适用于大规模的规则数据库。该文在现有的一种基于位串的包分类算法上做了两个改进,位串的聚合和过滤规则的重排列。从而生成了一种新的包分类机制-ABV(Aggregated Bit Vector)。通过评测可看出这种新的算法可以很好地应用在大规模规则数据库上,性能比原先有很大提升。