The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper considers a novel efficient soft run-length limited (RLL) decoding algorithm in visible light communication (VLC) for efficient secure data transmission. Security transmission over the VLC channel can be achieved by the means of physical-layer security techniques, however, low efficient transmission performance is long-standing issue in VLC. Conventional RLL codes are used for dimming adjustments...
This paper presents a new way to transmit and retrieve an information signal via chaotic systems based on shape synchronization. In contrast to existing schema with chaotic synchronization, the scheme is adopted for the purpose of faster synchronization and high security. Firstly, the drive signals are synthesized chaotic signal instead of drive variables in order to high security. Secondly, the drive...
This paper studies the information-theoretic secrecy performance in large-scale cellular networks based on a stochastic geometry framework. The locations of both base stations and the mobile users are modeled as independent two-dimensional Poisson point processes. We consider a key feature of the cellular network, namely, information exchange between base stations, and characterize its impact on the...
The purpose of this paper is to build an available model and framework from GRNN neural network to evaluation the impact of FDI (Foreign Direct Investment) on China's economy security. The method used in the study is known as factor analysis and GRNN neural network analysis. Examining 20 years' (from 1990 to 2009) data, we set up an index evaluation system. We then analyze Chinese 20 years economy...
Delegation in access control is used to deal with exceptional circumstances, when a regular user is unable to perform their normal job and delegates all or part of it to others. These situations can be anticipated and built into the security design as static delegation; however, unforseen circumstances can still occur requiring dynamic delegation to be specified at runtime. This paper presents both...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.