The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
This paper presents two constructions of Gaussian integer Z-periodic complementary sequence (ZPCS) sets. Construction I employs a ZPCS set as the original sequence set, however, the parameters of the resultant sequence sets cannot be flexibly chosen. Construction II generates Gaussian integer ZPCS sets using an orthogonal matrix, the ZCZ length and the flock size have flexible choices. The sequences...
We present our previous work in [17] in a more generic way to construct q-ary Golay complementary sets and near-complementary sets of size N and sequence length M · Nm by using different seed sequences, where m is an arbitrary non-negative integer, M is the length of seed sequences and N is a power of 2. The boolean functions of these sequences will also be derived with our method. To illustrate it,...
Existing systematic constructions of optimal odd-length binary Z-complementary pairs (OBZCPs) only generate pairs with lengths 2α + 1 (where α is a non-negative integer). In this paper, we propose a new construction of optimal OBZCPs having generic lengths of 2α10β 26γ + 1, α ≥ 1 (where α, β and γ are non-negative integers). This is achieved with the aid of several interesting intrinsic structure...
In this paper, we present a new method of constructing Z-complementary pulse trains from sequences with property of Equal Sums of (like) Powers (called ESP sequences) which are resilient to Doppler shifts. Numerical experiments indicate that the proposed Z-complementary pulse trains obtained from ESP sequences have better Doppler resilience than waveforms constructed from the well-known Prouhet-Thue-Morse...
The existing constructions of Golay complementary sets based on generalized Boolean functions are limited to lengths, which are powers of two. In a recent paper, Chen [3] proposed a new construction of binary and nonbinary complementary sets of non-power-of-two length based on truncated method. In this paper, we proposed a novel construction of ç-ary complementary sets based on the concatenation of...
This paper proposes Raptor codes-structured wireless super-dense networks serving a massive number of users with passive nodes constructing a precode of Raptor codes for future wireless networks. Passive nodes do not have their own information and only forward information from the neighboring nodes to the destination node. Similar to the capability of precode of Raptor coding scheme to protect information...
This work is motivated by the need for the fundamental increase of spectral efficiency with the transmissions on the Transmission Control Protocol and the Internet Protocol (TCP/IP). We define a bit-unit (BU) that is conceptually similar to an IP packet that contains sufficient information for its destination to identify the address and interpret the contents. Armed with these functions, each BU is...
The physical layer security in the up-link of the wireless communication systems is often modeled as the multiple access wiretap channel (MAC-WT), and recently it has received a lot attention. In this paper, the MAC-WT has been re-visited by considering the situation that the legitimate receiver feeds his received channel output back to the transmitters via two noiseless channels, respectively. This...
Indoor visible light communications utilizing LED light that are available for not only the illumination but also data transmission are received interest for future home networks. The dimming control function which the illumination brightness can be controlled should not be compromised by the data transmission function. The bit error rate performance of the indoor visible light communications deteriorates...
This paper proposes a new inverse tone mapping operator (TMO) with only one parameter. The proposed inverse TMO is based on Reinhard's global operator which is a well-known TMO. Inverse TM operations have two applications: generating an HDR image from an existing LDR one, and reconstructing an original HDR image from the mapped LDR image. In this paper, we focus on the latter application and the proposed...
A speeding up robust identification scheme for JPEG images is proposed in this paper. The aim of the identification is to robustly identify JPEG images that are generated from the same original image, under various compression conditions such as differences in compression ratios and initial quantization matrices. The conventional scheme that we focus on uses visually protected features to achieve...
This paper proposes a new method for continuous acoustic adaptive feedback cancelation (AFC) in digital hearing aids. The proposed method employs two adaptive filters working in tandem. The first adaptive filter is excited by the receiver (output) signal of the hearing aid, and uses microphone signal as its desired response. The lattice-predictor based adaptive algorithm is used to updated the coefficients...
Encryption-then-Compression (EtC) systems have been considered for the user-controllable privacy protection of social media like Twitter and Facebook. The aim of this paper is to evaluate the security of block scrambling-based encryption schemes, which have been proposed to construct EtC systems. Even though this scheme has enough key spaces for protecting brute-force attacks, each block in encrypted...
Pseudorandom number generators are required to generate pseudorandom numbers which have not only good statistical properties but also unpredictability in cryptography. A geometric sequence is a sequence given by applying a nonlinear feedforward function to an m-sequence. Nogami, Tada and Uehara proposed a geometric sequence whose nonlinear feedforward function is given by the Legendre symbol, and...
In this paper, we propose a direct construction of disjoint cyclic perfect Mendelsohn difference family (CP-MDF) from Zeng-Cai-Tang-Yang cyclotomy. As we all know, strictly optimal frequency-hopping sequences (FHSs) are a kind of optimal FHSs which has optimal Hamming auto-correlation for any correlation window. As an application of our disjoint CPMDFs, we present more flexible combinatorial constructions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.