The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new method for high-speed generation of pseudo-random code, which is based on sampling and parallel-to-serial conversion. This method can be used in situation that the sampling interval does not equal to , which increases the sampling selectivity and system adaptability. Finally, we verify the algorithm based on FPGA and the result is consistent with our prediction.
This paper focuses on the design and implementation of MMC intelligent controller. MMC intelligent controller can be easily applied to any design and can be operated easily through the MCU software. It provides a variety of interfaces between MMC and MCU.
With the current rapid increase of cloud computing, enterprises outsource their sensitive data for sharing in a cloud. The key problems of this approach include establishing access control for the encrypted data, and revoking the access rights from users when they are no longer authorized to access the encrypted data on cloud servers. This paper aims to solve these problems. Firstly, based on the...
High speed data transmission is the current scenario in networking environment. Cyclic redundancy check (CRC) is essential method for detecting error when the data is transmitted. With challenging the speed of transmitting data, to synchronize with speed, it's necessary to increase speed of CRC generation. Starting from the serial architecture identified a recursive formula from which parallel design...
LFSR based PN Sequence Generator technique is used for various cryptography applications and for designing encoder, decoder in different communication channel. It is more important to test and verify by implementing on any hardware for getting better efficient result. As FPGAs is used to implement any logical function for faster prototype development, it is necessary to implement the existing design...
Stream cipher based on hash function is a good option to reduce hardware complexity of the cryptosystem. For encryption of data, stream ciphers are preferred to block ciphers because it consumes less power and hardware. Hash functions are generally employed in communication devices for integrity verification and authentication of data and control packets. The design of hardware efficient stream cipher...
In this paper, asynchronous cooperative relay systems based on distributed linear convolutional space-time codes are investigated. By utilizing the banded Toeplitz property of the equivalent channel matrix, a block minimum mean square error (MMSE) equalization method employing the Trench algorithm to solve the Toeplitz linear equations is proposed, which avoids the high order matrix inversion operation...
The motion's generation consists in finding an analytic expression of a motion according to time. A « Map road » type planner or « Cell decomposition » provide to the motion generator some possible free crossing points of collision. The global trajectory's interpolation by a polynomial is generally not possible, because the degree of the polynomial increases with the number of crossing points which...
Due to the use of commodity software and hardware, crash-stop and Byzantine failures are likely to be more prevalent in today's large-scale distributed storage systems. Regenerating codes have been shown to be a more efficient way to disperse information across multiple nodes and recover crash-stop failures in the literature. In this paper, we present the design of regeneration codes in conjunction...
The main purpose of this paper is to study the FPGA implementation of two 16 bit PN sequence generator namely Linear Feedback Shift Register (LFSR) and Blum-Blum-Shub (BBS). We have used FPGA to explain how FPGA's ease the hardware implementation part of communication systems. The logic of PN Sequence Generator presented here can be changed any time by changing the seed in LFSR or by changing the...
A novel algorithm transformation method, called term-preserving look-ahead transformation (TePLAT) is proposed to transform the bit-serial linear feedback shift register (LFSR) algorithm into a bit-parallel formulation which promises order of magnitudes improvement of execution speed compared to the traditional look-ahead algorithm transformation approach. TePLAT is applied to 26 commonly used LFSRs...
In a designated verifier proxy signature scheme, the original signer delegates his signing capability to a designated person, called proxy signer. The proxy signer generates a valid signature, called proxy signature on behalf of the original signer. The designated verifier checks the correctness of the signature and convinces the original signer's agreement on the signed message. In this paper, we...
Cyclic Redundancy Check (CRC) is a well-established coding method for error detection and is part of several industrial standards for data transmission and storage. If a second CRC is used on top of an existing standard CRC to provide additional reliability, we call this an embedded CRC. The performance of such CRC combinations has been considered only recently and is not yet well understood. In this...
We consider two methods that construct high rate punctured convolutional codes. First, we present best high rate R = (n−1)/n punctured convolutional codes, for n = 5,6, · · ·, 16, which are found by exhaustive searches. To obtain the best code, we use a regular convolutional code whose weight spectrum is equivalent to that of each punctured convolutional code. We search these regular equivalent codes...
In this paper, we consider the robust output regulation problem with nonlinear exosystems without the assumption that the solution of the regulator equations along the trajectory of the exosystems should be polynomial. Based on the extended concepts of steady-state generator and internal model, a set of sufficient conditions for the solvability of the problem are given. Thus, the result developed...
The following article provides a description of an application of the pseudo random signals generators, based on dynamic linear feedback shift registers, used in the DSSS spread spectrum communication. Due the changes of generator's feedback loop in time, the length of pseudo random sequence is much longer. An implementation of the dynamic linear feedback shift register generator (DLFSR) in VHDL language...
The work presented in this paper focuses on an efficient erasure-only decoding algorithm for Generalized Reed-Solomon (in short, GRS) codes. The underlying principle of previous decoding algorithms for GRS is first to recover the codewords and further to obtain the original messages. Greatly different from the previous solutions, our novel algorithm, referred to as Direct Erasure-only Decoding, can...
Let q be a power of 2, n be a positive integer, Fqn denote a finite field with qn elements. In this paper, we consider the existence of the some specific elements in Fqn. The main results obtained in this paper are listed as follows: There is an element in Fqn such that both and +
In this paper, we propose a method to synthesize infinite-dimensional observer-based controllers for partial-differential systems. To illustrate the approach, we use a one-dimensional model of heat conduction with point observation and boundary control. Our method uses Sum-of-Squares optimization to solve linear operator inequalities in an infinite-dimensional Hilbert space. We use the semigroup framework...
We develop the formal series technique for analysis of the time-optimal control problem. We introduce a concept of equivalence of symmetric control systems in the sense of time optimality. Our approach is based on the consideration of a free algebra of iterated integrals and structures induced in this algebra by control systems. It is close to a homogeneous approximation problem and, in essence, yields...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.