Combination of 2D chaotic Encryption and Turbo Coding for Secure Image Transmission

Size: px
Start display at page:

Download "Combination of 2D chaotic Encryption and Turbo Coding for Secure Image Transmission"

Transcription

1 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.0 o., ovember Combnaton of D chaotc Encrypton and Turbo Codng for Secure Image Transmsson M. A. El-Isandaran, Saad M. Darwsh, Saad M. Abuguba Insttute of Graduate Studes and Research Unversty of Alexandra Egypt Summary Robust and secure transmsson strategy for hgh-qualty mage through wreless networs s consdered a great challenge. However, majorty of encrypted mage transmsson schemes do not consder well the effect of bt errors occurrng durng transmsson and ths ssue s consdered a problem that should be handled by an effcent codng scheme. In ths paper, a modfed wreless mage transmsson scheme that combnes chaotc encrypton and turbo codng technque nto one processng step s proposed. In the proposed scheme, selectve encrypton algorthm based on two-dmensonal chaotc map s utlzed for data securty. Furthermore, error correcton technque based on turbo codng s employed as channel codng for data communcaton n order to solve the problem of channel s lmted bandwdth and throughput. Smulaton results show that the proposed scheme acheves hgh degree of robustness aganst channel mparments and wde varetes of attacs. In addton, t mproves mage qualty wth acceptable data rates. Keyword Error correcton code, Image transmsson, DWT, Image encrypton. Introducton The wreless communcaton medum, as opposed to the wred counterparts, s nosy and open to ntruders. Hence, addtonal level of error protecton and securty s requred to mae the wreless networ as relable and secure as the wred networ. The ssue of usng cryptographcally secure cphers n wreless nosy channel s that the very same property that gves cphers ther cryptographc strength maes them senstve to channel errors. Ths senstvty causes retransmssons thus reducng the overall throughput. To mprove the throughput n nosy envronments, channel codng s performed after encrypton. Unfortunately, performng both encrypton and codng separately can potentally prove to be too computatonally ntensve for many wreless end devces (e.g., personal data assstants (PDA), moble phones). In fact, as both encrypton and codng can be performed at the ln layer, a sngle operaton whch does both encrypton and error correcton would be preferable [,]. Error control codes (ECC) are mportant ssue n wreless transmsson, and are used to protect data from channel errors. ECC codes wor by addng redundancy to data transmsson to retreve the data n the recever sde. In the lterature, ECC can be classfed nto two categores: convolutonal codes and lnear bloc codes [3]. Convolutonal codes process the nformaton on a bt-by-bt bass and ths s used n stream cpher [4]. Lnear codes process the nformaton on a bloc-by-bloc bass and ths s used n bloc cpher,.e. lnear code operates on a fxed bloc length of data at a tme. The man weaness of lnear bloc code s that a sngle bt flp n the encrypted data can cause a complete decrypton falure. Ths senstvty causes retransmssons thus droppng the overall throughput (avalanche effect) []. Generally, the encrypton can be appled n specal doman or n frequency doman. Spatal doman schemes are manly related to the poston of the pxels n the mage. Encrypton n spatal doman does not satsfy the securty applcaton because they cannot survve most mage processng attacs and geometrc attacs []. In the other hand, frequency doman schemes deal wth the dgtal transformaton of the mage and therefore can resst the mage processng attacs [5]. An example of frequency transform s wavelet transforms, whch have several propertes that mae them good canddates. Frst, the approxmaton coeffcents provde a good low-resoluton estmate of the mage, whle mnmzng alasng artefacts resultng from the reducton n resoluton. Second, the wavelet coeffcents are localzed, so a corrupton of a coeffcent through channel errors has only local effect on the mage [6]. Tradtonally, error correcton and encrypton n communcaton networs have been addressed ndependently such as n Refs.[7-8]. Several researchers have studed the trade-off between encrypton and error correcton by tryng to combne these functonaltes n one unt. For nstance, Glgoros et al. [9] proposed technque for jont error correcton and encrypton, ths technque acheves both securty and error correcton but the decodng procedure s extremely complcated and cannot be used n a wreless envronment because t needs more computaton tme. Another wor of Cam et al. [0] that combne the advanced encrypton standard (AES) and turbo codng nto sngle processng step n order to reduce the processng tme. However, the wor of Asm et al. [] compared between Manuscrpt receved ovember 5, 00 Manuscrpt revsed ovember 0, 00

2 80 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.0 o., ovember 00 AES and chaotc based encrypton. Ther results show that chaotc encrypton scheme s less computatonally ntensve compared to AES, and provdes the same level of securty. The man contrbuton of ths paper s to buld a secure and relable mage transmsson scheme that combne turbo codng based on error correcton code and D chaotc map based encrypton functonalty nto one sngle step n order to reduce the overall processng cost. The advantages of our scheme are achevng better securty by utlzng D chaotc map nstead of D chaotc map used by [] and mprovng the throughput of an mage transmsson system by usng turbo codng. The systematc bloc dagram of the proposed scheme s shown n Fgure, and the followng subsectons brefly outlne each step. Dscrete wavelet transform (DWT) s becomng popular n many mage/vdeo applcatons due to ts multresoluton representaton feature. The basc dea of the DWT for a D mage s descrbed as llustrated n Fgure. Wth the pyramd-structured wavelet transform, the orgnal mage wll encounter dfferent combnatons of a low-pass flter and a hgh-pass flter and then based on the convoluton wth these flters to generate the low-low (LL), low-hgh (LH), hgh-low (HL) and hgh-hgh (HH) sub-bands [3]. Fgure. D forward wavelet transform The most of the prevous wors for DWT [4,5] notced that wth only LL4, a large amount of mage nformaton can be extracted, but encryptng only LL4 may reveal hgher frequency nformaton such as edge components and t can be used to nfer useful nformaton. The expermental results of Seo et al. [4] showed that the encrypton of all the sub-bands n level 4 and HH3 from level 3 gve us the ablty to reduce the computaton tme to mplement the encrypton and therefore preserve wreless energy. The proposed scheme utlzes the same technque n order to meet the requrement of computatonal tme. 3. Cryptographc of Chaotc Map Fgure. Bloc dagram of the proposed scheme. The rest of ths paper s organzed as follows. Secton II, descrbes the DWT data selecton brefly. Secton III, dscuses the selectve mage encrypton based on two dmensonal chaotc maps. An effcent error correcton scheme s presented n secton IV. Secton V dscusses the combnaton of chaotc encrypton and turbo codng. The smulaton results are gven n secton VI and fnally n Secton VII, the concluson.. Partal Data Selecton of DWT Ths secton dscusses the methodcal procedure of the proposed mage encrypton as well as decrypton process usng two chaotc logstc maps []. The basc logstc-map s formulated as: X n + = μ X n ( X n ) () where μ represents the parameter of chaotc map. To satsfy the best encrypton,.e. chaotc sequence s unpredctable, μ must les between 3.569< μ < 4.0 [6]. Consequently the chaotc encrypton and decrypton provdes guaranteed hgh securty. The encrypton usng chaotc sequence produced by -D logstc system as depcted n Fgure 3 s nown to be wea n securty, snce t cannot resst nown/chosen-

3 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.0 o., ovember 00 8 plantext attacs. More nformaton about the mplementaton of -D chaotc map can be found n [7,8]. In order to deal wth the problem of the prevous scheme, the proposed scheme utlzes -D chaotc logstc map as drawn n Fgure 4. Mathematcally, the -D chaotc map s defned as follows: xn+ = 4μxn ( xn ) + γyn () yn+ = 4μ yn ( yn ) + γxn (, ) where x y n n represent mage pxels, γ s smple coupled term and μ, μ are control parameters of chaotc system. See [3] for further detals. P( s = s', u =, y, y, y + )/ P( y ) + u L( u ) = log[ ] (3) P( s = s', u = 0, y, y, y )/ P( y ) u + where and are the summaton over the entre + u u possble transton branch par ( s, s ) at tme K gven nput u =, and nput u = 0 respectvely. At the recever sde, the followng equaton s used to estmate the lost nformaton due to channel errors. P( y / u = ) P( u = ) L ( u ) = log + log (4) P( y / u = 0) P( u = 0) For more detals about turbo codng and decodng, readers can refer to [9]. Fgure 3: D Chaotc mage encrypton 5. Cryptcodng: Combnaton of -D Chaotc Encrypton and Turbo Codng Fgure 5 shows the proposed combnaton between -D chaotc encrypton and turbo codng, whch s mplemented n a synchronous way to mprove both the securty and throughput. The algorthm of the combnaton s as follows: Fgure 4: D chaotc mage encrypton 4. Turbo Channel Codng Error correctve codng s used to enhance the effcency and accuracy of transmtted nformaton. In ths wor, turbo codes are used as channel codng for data communcaton over wreless channels wth burst errors. Turbo-codes consst of partcular concatenaton of two recursve systematc codes lned together by non-unform nterleavng [4]. Formally, the redundancy nformaton for turbo coder s computed as follows: Fgure 5: Combnaton of encrypton and turbo codng Algorthm : at the sender sde. For each row (R) of the selected sub bands Encr(Map,R)= E // encrypton step usng chaotc map.

4 8 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.0 o., ovember 00 T.coder (E) =TC // encodng step usng turbo coder n whch the cpher row s encoded End for. For each column (C) of the TC Encr (Map, C) = E // encrypton step usng chaotc map. T.coder (E) =TC // encodng step usng turbo coder n whch the cpher column s encoded End for encrypton procedure s hghly ey senstve and large enough to resst brute force attac. Algorthm : at the recever sde. For each column (C) of the TC Decr (Map, C) = D // decrypton step usng chaotc map. T.decoder (D) =TD // decodng step usng turbo coder n whch the plan-mage column s decoded End for. For each row (R) of the TD Decr (Map, R) = D // decrypton step usng chaotc map. T.decoder (D) =TD // decodng step usng turbo decoder n whch the Plan-mage row s decoded End for 6. Smulaton Results 6. Key Space Analyss Key space sze s the total number of dfferent eys that can be used n the encrypton. For a secure mage encrypton, the ey space should be large enough to mae brute force attacs nfeasble [0]. The proposed cpher has dfferent combnatons of large set of parameters (eys). An mage cpher wth such a long ey space s suffcent for relable practcal use. Fgure 6 clearly shows that the decrypton wth a slghtly dfferent ey fals completely and hence the proposed 6. Statstcal Analyss Fgure 6: Key space analyss It s well nown that many cphers have been successfully analyzed wth the help of statstcal analyss and several statstcal attacs have been devsed on them. Therefore, an deal cpher should be robust aganst any statstcal attac. To prove the robustness of the proposed cpher, we have performed statstcal analyss by calculatng the hstograms as well as the correlatons of two adjacent pxels n the planmage/cpher-mage. 6.. Hstogram of Encrypted Images To prevent the leaage of nformaton to an opponent, t s also advantageous f the cpher-mage bears lttle or no statstcal smlarty to the planmage. An mage hstogram llustrates how pxels n an mage are dstrbuted by graphng the number of pxels at each ntensty level. We have calculated and analyzed the hstograms of several encrypted mages as well as ts orgnal mages that have wdely dfferent content. One typcal example among them s shown n Fg.7 (b). The hstogram of a plan-mage Fg.7 (a) (Pepper mage of sze 56x56 pxels) contans large spes. From Fg. 7(d), t s clear that the hstogram of the encrypted mage s farly unform and sgnfcantly dfferent from the respectve hstograms of the orgnal mage and hence does not provde any clue to employ any statstcal attac on the proposed mage encrypton procedure.

5 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.0 o., ovember Fgure 7 (a) Orgnal mage Fgure 7 (c) Encrypted mage Fgure 7 (b) Hstogram of orgnal mage Fgure 7(d) Hstogram of encrypted mage here s the number of mage pxels. Fgure 8 and 9 demonstrate the correlaton dstrbuton of two horzontally adjacent pxels n plan-mage/cpher-mage (Baboon mage of sze 56x56) for the modfed cpher. The correlaton coeffcents are and -0.0 respectvely for both plan-mage/cpher-mages, whch are far apart. Smlar results for dagonal and vertcal drectons were obtaned as shown n Table. It s clear that there s neglgble correlaton between the two adjacent pxels n the cphermage. However, the two adjacent pxels n the plan-text are hghly correlated. Table : Correlaton coeffcent of two adjacent pxels n orgnal and Encrypted mage Drecton Plan -mage Cpher-mage Horzontal Vertcal Dagonal Fgure 7: Hstogram analyss 6.. Correlaton of Adjacent Pxels In addton to the hstogram analyss, we have also analyzed the correlaton between two vertcally adjacent pxels, two horzontally adjacent pxels and two dagonally adjacent pxels n plan-mage/cpher-mage respectvely. The procedure s as follows: Frst, randomly select 000 pars of two adjacent pxels from an mage. Then, calculate ther correlaton coeffcent usng the followng two formulas: cov( x, y) = E( x E( x))( y E( y)), r = xy cov( x, y ), D( x ) D( y ) where x and y are grey-scale values of two adjacent pxels n the mage. In numercal computatons, the followng dscrete formulas were used: (5) Fgure 8: Horzontal adjacent pxels Correlaton n plan-mage = = E ( x ) x (6) ( ) = ( ( )), = Dx x Ex (7) cov( x, y ) = ( x E ( x ))( y E ( y )), = (8) Fgure 9: Horzontally adjacent pxels Correlaton n cphermage

6 84 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.0 o., ovember Informaton Entropy Analyss Informaton entropy s the mathematcal theory of data communcaton and storage founded n 949 by C.E. Shannon []. Modern nformaton theory s concerned wth error- correcton, data compresson, cryptography, communcatons systems, and related topcs. To calculate the entropy H (m) of a source m, we have: H ( m ) = P ( m )log bts = 0 P ( m ) (9) P represents the probablty of symbol m and the entropy s expressed n bts.. Actually, gven that a practcal nformaton source seldom generates random messages, n general ts entropy value s smaller than the deal one. However, when the messages are encrypted, ther entropy should deally be 8. If the output of such a cpher emts symbols wth entropy less than 8, there exsts certan degree of predctablty, whch threatens ts securty. It can be noted form Table that the entropy of the encrypted mages (n average usng 50 mages) the proposed scheme are very near to 8 compared the mage encrypton scheme presented n []. Table : Entropes of the encrypted mages Encrypton algorthm Entropy Value (average) Modfed AES [] 7.90 Proposed scheme Dfferental Attac Two common measures, PCR and UACI [3-5], are used to test the nfluence of changng a sngle pxel n the orgnal mage on the whole mage encrypted by the proposed scheme. PCR stands for the number of pxels change rate whle pxel of plan mage are changed. Unfed Average Changng Intensty (UACI) measures the average ntensty of dfference between the plan mage and cpher mage. For calculaton of PCR and UACI, let us assume two cphered mages C and C whose correspondng plan mages have only one-pxel dfference. Defne a bpolar array, D, wth the same sze as mages C and C. Then, D(,j) s determned by C(,j) and C(,j), namely, f C(,j) = C(,j) then D(,j) = ; otherwse, D(,j) = 0. PCR and UACI are defned through the followng formulas: D (, j ), j PCR = 00%, W H (0) UACI C (, j) C (, j) 00%, W H 55 =, j () W and H are the wdth and heght of C or C. Tests have been performed on the proposed algorthm, about one-pxel change nfluence on a 56 gray-scale mage of sze We obtaned PCR=99.44% and UACI=3.63%. The results show that a swftly change n the orgnal mage wll result n a sgnfcant change n the cphered mage, so the algorthm proposed has a good ablty to ant dfferental attac. The results s llustrated n table 3, shows that a swftly change n the orgnal mage wll result n a sgnfcant change n the cphered mage, so the algorthm proposed has a good ablty to ant dfferental attac wth compared to mage encrypton based on 3D chaotc map [6]. Table 3: Comparson of dfferental attac analyss. Experments Gesl et al. scheme [6] Proposed scheme PCR 98.53% 99.44% UACI 3.47% 3.63% 6.4 Encrypton Effect Measurement The pea sgnal to nose rato (PSR) n decbels (db) s defned as: MAX PSR = 0 log () 0 RMSE MAX s the mage depth, n ths study 8 pxels depth mage are used whch s gray scale level, so MAX = 8 = 55, and RMSE s the root mean square error and defned as: RMSE = M f ( x, y ) f ( x, y ) (3) M x y where, and M are the wdth and heght of the mages n pxels. f s the orgnal mage and f s the cpher-mage. As llustrated n Table 4, the PSR values accordng to DWT selected sub-band of the proposed scheme compared to the values n Seo et al. scheme [4]. Table 4: The encrypton effect n terms of PSR (n db) Selected DWT sub-band Seo et al scheme [4] Proposed scheme LL LL4-HH

7 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.0 o., ovember Selected DWT sub-band Seo et al scheme [4] Proposed scheme Level Level 4-HH It s showed that the best mage qualty s obtaned when the all Level 4 sub-bands and HH3 sub-band from level 3 are utlzed for combned encrypton and turbo codng, whch gve us the ablty to reduce the computaton tme to mplement the encrypton and therefore preserve wreless energy. 6.5 Encrypton speed analyss Chuanmu algorthm Proposed algorthm 56X56 5X5 04X04 048X048 Fgure 0: Encrypton speed comparson Apart from the securty consderatons, some other ssues for mage encrypton algorthm are mportant aspect, ncludes the runnng speed, partcularly for real tme mage encrypton n wreless-related applcatons. Some expermental tests are gven to demonstrate the effcency of our scheme compared wth other algorthm wth respect to the fastness ssue for Lena mage wth dfferent szes. The tme analyss has been done on a destop computer has the followng specfcaton: Pentum-dual-core processor wth 04 MB RAM runnng wth Mcrosoft wndows 7 as operatng system. Table 5 shows the test results of encpherng speeds of the proposed encrypton algorthm compared wth Chuanmu et al Algorthm [0] for Lena mage wth dfferent szes. 6.5 Bt Error Rate Performance Addtve Whte Gaussan ose (AWG) channel and Bnary Phase Shft Keyng (BPSK) modulaton are consdered. The bt error rate performance of overall system s nvestgated over moble communcaton channels for varous Sgnals to ose Ratos. The bt error rate (BER) s computed after decodng, as a functon of sgnal to nose rato Eb/o where Eb s the energy receved per nformaton bt and o s the nose power spectral densty. The reconstructed mage for channel wth Eb/o=8 db wthout and wth combnaton of turbo codng and D chaotc encrypton are shown n Fgures (a) and (b), respectvely. Table 5: Performance of encrypton speed analyss Image sze Chuanmu et al. [0] Proposed scheme 56X X X Fgure (a) Reconstructed mage wthout turbo codng, PSR=8.86 Fgure (b) Reconstructed mage wth turbo codng, PSR= X We can see from Fgure 0 the proposed algorthm reduce the computaton tme of encrypton process to the half wth compared to Chuanmu et al. Algorthm [8] and ths serve the requrement of wreless channel. From Fgure (a), t s observed that t s not possble to reconstruct the mage clearly wthout the combnaton of turbo codng. But wth combned encrypton and turbo channel codng ( teraton decodng), the mage s reconstructed wthout dstorton and no addtonal retransmsson therefore ncreases the throughput of the system that s defned as the useful transmsson rate n bts/second accountng for the loss due to channel errors. The Eb/o vs. bt error rate (BER) wth and wthout turbo channel codng (wth sngle teraton decodng) s shown n Fgure,

8 86 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.0 o., ovember 00 whch obvously clears that the proposed scheme s effectve for secure mage communcaton over wreless nosy channel. Fgure : Bt Error Rate (BER) Performance over AWG Channel 7. Conclusons In ths paper, combnaton of mage encrypton and error correcton code has been proposed. Image encrypton based on D chaotc maps and error control codng based on turbo channel codng. Smulaton results show that the proposed scheme s effectve and secure. The proposed scheme has larger ey space. It can resst dfferental attac, plantext attac, chosentext nown attacs and varous brute-force attacs. The proposed scheme s suggested for secure mage communcaton over wreless channels. From the results, t s concluded that the scheme s very effectve for secure mage communcaton over wreless nosy channels. Further wors purpose an optmzaton scheme for the securty ssues and error correcton code for wreless mage transmsson. References [] C. anjunda, M. Haleem and R. Chandramoul, Robust Encrypton for Eecure Image Transmsson over Wreless Channels, IEEE ICC Conference, pp.87 9, Korea, May 005 [] C. Mathur, K. arayan and K. Subbalashm, On the Desgn of Error-Correctng Cphers, EURASIP Journal on Wreless Communcatons and etworng, Vol.006, pp.-, ovember 006. [3] M.Wllams, F. J. and. A. Sloane: The Theory of Error Correctng Codes. I and II. Amsterdam: orth-holland Publshng Co., Vol. 6, 977. [4] W. Stallngs, Cryptography and etwor Securty: Prncples and Practce, Prentce-Hall, USA, nd edton, 999. [5] Stnson, D., Cryptography: Theory and Practce, Second Edton. CRC/C&H., 00. [6] J. Fowler and B. Popescu, An Overvew on Wavelets n Source Codng, Communcatons, and etwors, EURASIP Journal on Image and Vdeo Processng, Vol. 007, pp. -7, Aprl 007. [7] Deergha Rao, A Robust and Secure Scheme for Image Communcaton over Wreless Channels, IEEE CAS on ETW Conference, pp.88-9, 005. [8] A. Padmaja and M. Shameem, Secure Image Transmsson over Wreless Channels, IEEE ICCIMA Conference, Svaas, Taml adu, pp.44-48, January 007. [9] D. Glgoros, S. Knapsog, and S. Andova, Cryptcodng - Encrypton and Error Correcton Codng n a Sngle Step, Internatonal Conference on Securty and Management, pp.-7, June 006. [0] H. Cam, V. Ozduran and O. Ucan, A Combned Encrypton and Error Correcton Scheme: AES-Turbo, Journal of electrcal & electroncs engneerng, Vol., 009, pp [] M. Asm and V. Jeot, On Image Encrypton: Comparson between AES and A ovel Chaotc Encrypton Scheme, IEEE ICSC Conference, 007, pp [] H. Ahmed, H. Kalash, and O. Farag Allah., An Effcent Chaos-Based Feedbac Stream Cpher (ECBFSC) for Image Encrypton and Decrypton, IEEE Informatca, Vol.3, pp. 9, October 007. [3] G. Sheng and G.Qang, The applcaton of Chaos and DWT n Image Scramblng, Informatca Vol.3, pp , October 006. [4] Seo Y., Km D., Yoo J., Dey S. and A. Agrawal, Wavelet Doman Image Encrypton by Subband Selecton and Data Bt Selecton, World Wreless Congress (3G Wreless) Conference, pp.-6, May 003. [5] A. Pommer and A. Uhl, Selectve Encrypton of Wavelet Pacet Subband Structures for Obscured Transmsson of Vsual Data, IEEE Benerux Sgnal Processng Symposum, pp. 5-8, 00. [6] M. El-lsandaran, S. Darwsh and S. Abuguba, A Robust and Secure Scheme for Image Transmsson over Wreless Channels, IEEE ICCST Conference, Prague, Czech Republc, pp. 5 55, October 008. [7] K.Deergha and K.Sudha, Chaotc Image Encrypton and Decrypton A Comparatve Study, Proc. of Internatonal Conference on Systemcs, Cybernetcs and Informatcs, Hyderabad, pp , -5 Feb.004. [8] J. Luo and H. Sh, Research of Chaos Encrypton Algorthm Based on Logstc Mappng, IEEE Internatonal Conference on Intellgent Informaton Hdng and Multmeda, Pasadena, CA, USA pp , December 006. [9] C.Berrou and A. Glaveux,"ear Optmum Error Correctng Codng and Decodng: Turbo Codes."IEEE transactons on communcatons Vol.44, o: 0, pp.6-7, 996. [0] Chuanmu L., Lanx H., A ew Image Encrypton Scheme based on Hyperchaotc Sequences, IEEE IWASID Worshop, 007, pp [] Shannon CE., Communcaton Theory of Secrecy System, Bell Syst Tech. J 949;8: [] M. Zeghd, M. Machhout, And R. Tour, " A Modfed AES Based Algorthm for Image Encrypton", Waset, Vol., 008.

9 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.0 o., ovember [3] S. Behna, A. Ahshan, and A. Ahavan,"A Fast Chaotc encrypton scheme based on pecewse nonlnear chaotc Maps". Physcs Letters A 366 (007) [4] Fuyan S.,Shutang Lu, Zhongqn L, and Zongwang Lü, " A ovel Image Encrypton Algorthm based on Spatal Chaos Map," Chaos Solutons and Fractals 38 (008) [5] Ibrahm F. Elashry, S. El-Rabae, and Fath E. Abd El- Same, "Homomorphc Image Encrypton," J. Electron. Imagng Vol. 8, Jul. 4, 009. [6] Gesl J. and Vlce K., Image Encrypton Based On Strange Attractor, Internatonal Journal on Graphcs, Vson and Image Processng, Vol.9, o., pp.9-6, 009.

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 An Effcent Blnd ng Method based on Sgnfcant Dfference of Wavelet Tree Quantzaton usng Adaptve Threshold Then Huynh The Unversty

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels. Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

Spread Spectrum based M-ary Modulated Robust Image Watermarking

Spread Spectrum based M-ary Modulated Robust Image Watermarking 54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS Journal of Engneerng Scence and echnology Vol. 7, No. 4 ( 55-56 School of Engneerng, aylor s Unversty SECURE COMMUNICAION BY USING MULIPLE KEYS HAVING VARIABLE LENGH IN A REAL IME ENVIRONMEN FOR MULIPLE

More information

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. The Impact of Spectrum Sensng Frequency and Pacet- Loadng

More information

On the Feasibility of Receive Collaboration in Wireless Sensor Networks

On the Feasibility of Receive Collaboration in Wireless Sensor Networks On the Feasblty of Receve Collaboraton n Wreless Sensor Networs B. Bantaleb, S. Sgg and M. Begl Computer Scence Department Insttute of Operatng System and Computer Networs (IBR) Braunschweg, Germany {behnam,

More information

Error Probability of RS Code Over Wireless Channel

Error Probability of RS Code Over Wireless Channel Internatonal Journal of Electroncs Engneerng, 3 (), 11, pp. 99 33 Serals Publcatons, ISS : 973-7383 Error Probablty of RS Code Over Wreless Channel Mohammad Aftab Alam Khan 1 & Mehwash Farooq 1 1 Department

More information

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance.

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance. ANALYTICAL COMPARISON OF THE PERFORMANCE OF ADAPTIVE MODULATION AND CODING IN WIRELESS NETWORK UNDER RAYLEIGH FADING 723 Sab Y.M. BANDIRI, Rafael M.S. BRAGA and Danlo H. SPADOTI Federal Unversty of Itajubá

More information

Estimation of Critical Performance and Optimization of Scalable Joint Source/Channel Coder (SJSCC) For Time Varying Channels

Estimation of Critical Performance and Optimization of Scalable Joint Source/Channel Coder (SJSCC) For Time Varying Channels Proceedngs of the Internatonal MultConference of Engneers and Computer Scentsts 8 Vol II IMECS 8, 9- March, 8, Hong ong Estmaton of Crtcal Performance and Optmzaton of Scalable Jont Source/ Coder (SJSCC)

More information

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM Azura Abdullah, Muhammad Sobrun Jaml Jamal, Khazuran Abdullah, Ahmad Fadzl Ismal and An Lza Asnaw Department of

More information

High Speed ADC Sampling Transients

High Speed ADC Sampling Transients Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.

More information

Electrical Capacitance Tomography with a Square Sensor

Electrical Capacitance Tomography with a Square Sensor Electrcal Capactance Tomography wth a Square Sensor W Q Yang * Department of Electrcal Engneerng and Electroncs, Process Tomography Group, UMIST, P O Box 88, Manchester M60 QD, UK, emal w.yang@umst.ac.uk

More information

Robust Image Transmission Performed by SPIHT and Turbo-Codes

Robust Image Transmission Performed by SPIHT and Turbo-Codes SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 5, No.2, November 2008, 353-360 Robust Image Transmsson Performed by SPIHT and Turbo-Codes Abdelmounam Moulay Lakhdar, Rachda Mélan 2, Malka Kandouc 2 Abstract:

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

A Novel and Secure technique for image. Steganography using DWT

A Novel and Secure technique for image. Steganography using DWT Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A Novel and Secure technque for mage Abstract: Steganography s the art and scence of hdng nformaton

More information

An Efficient Method for PAPR Reduction of OFDM Signal with Low Complexity

An Efficient Method for PAPR Reduction of OFDM Signal with Low Complexity An Effcent Method for PAPR Reducton of OFDM Sgnal wth Low Complety Mahesh Ingle M.E. EXTC MGMCET,Kamothe Nav Mumba-41009 Sachn Nkalje M.E. EXTC MGMCET Kamothe Nav Mumba-41009 Savta Bhosale H.o.D.(EXTC)

More information

Multi-Level Halftoning by IGS Quantization

Multi-Level Halftoning by IGS Quantization Journal of Sgnal and Informaton Processng, 2013, 4, 351-358 Publshed Onlne ovember 2013 (http://www.scrp.org/journal/jsp) http://dx.do.org/10.4236/jsp.2013.44044 351 Mult-Level Halftonng by IGS Quantzaton

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems Hardware Desgn of Flter anased arrowband/deband Interference Canceler for Overlad TDMA/CDMA Systems Toyoau Ktano Kaunor Hayash Htosh Masutan and Shnsue Hara Graduate School of Engneerng Osaa Unversty YamadaOa

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

FFT Spectrum Analyzer

FFT Spectrum Analyzer THE ANNUAL SYMPOSIUM OF THE INSTITUTE OF SOLID MECHANICS SISOM 22 BUCHAREST May 16-17 ----------------------------------------------------------------------------------------------------------------------------------------

More information

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network Progress In Electromagnetcs Research M, Vol. 70, 135 143, 2018 An Alternaton Dffuson LMS Estmaton Strategy over Wreless Sensor Network Ln L * and Donghu L Abstract Ths paper presents a dstrbuted estmaton

More information

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13 A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng

More information

Control of Chaos in Positive Output Luo Converter by means of Time Delay Feedback

Control of Chaos in Positive Output Luo Converter by means of Time Delay Feedback Control of Chaos n Postve Output Luo Converter by means of Tme Delay Feedback Nagulapat nkran.ped@gmal.com Abstract Faster development n Dc to Dc converter technques are undergong very drastc changes due

More information

LSPIHT Algorithm for ECG Data Compression and Transmission for Telemedicine Applications

LSPIHT Algorithm for ECG Data Compression and Transmission for Telemedicine Applications Dhaa Unv. J. Sc. 60(1): 31-36, 2012 (January) LSPIHT Algorthm for ECG Data Compresson and Transmsson for Telemedcne Applcatons Tahmna Zebn, Eramul Faroo, Syeda Znath Aman and Shahda Rafque Department of

More information

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

A thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment

A thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment Crcular Trells based Low Densty Party Check Codes A thess presented to the faculty of the Russ College of Engneerng and Technology of Oho Unversty In partal fulfllment of the requrements for the degree

More information

DC-FREE TURBO CODING SCHEME FOR GPRS SYSTEM

DC-FREE TURBO CODING SCHEME FOR GPRS SYSTEM DC-FREE TURBO CODING SCHEME FOR GPRS SYSTEM Prof. Dr. M. Amr Mokhtar & Eng. A. Refaey-Ahmed Electrcal Engneerng Department, Alexandra Unversty, Egypt. ABSTRACT A useful tool n the desgn of relable dgtal

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES

SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L Laval Unversty, Canada COPL, Physcs department Jl@phy.ulaval.ca KEY WORDS: Image Fuson, Evaluaton, Spatal Qualty, Blur Parameter,

More information

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,

More information

On Channel Estimation of OFDM-BPSK and -QPSK over Generalized Alpha-Mu Fading Distribution

On Channel Estimation of OFDM-BPSK and -QPSK over Generalized Alpha-Mu Fading Distribution Int. J. Communcatons, Network and System Scences, 010, 3, 380-384 do:10.436/jcns.010.34048 Publshed Onlne Aprl 010 (http://www.scrp.org/journal/jcns/) On Channel Estmaton of OFDM-BPSK and -QPSK over Generalzed

More information

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking Tamper Localzaton n Wavelet Doman Usng Sem- Fragle Watermarkng Sandpbha Mangrolya, Ketk Pathak Departement of Electroncs and Communcaton Engneerng Sarvajank College of Engneerng & Technology, Surat Abstract

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research

More information

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution 9th Internatonal Conference on Informaton and Knowledge Technology (IKT 07) October 8 & 9, 07, Amrkabr Unversty of Technology A ew Statstcal Detector for CT-Based Multplcatve Image Watermarkng Usng the

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

Study of the Improved Location Algorithm Based on Chan and Taylor

Study of the Improved Location Algorithm Based on Chan and Taylor Send Orders for eprnts to reprnts@benthamscence.ae 58 The Open Cybernetcs & Systemcs Journal, 05, 9, 58-6 Open Access Study of the Improved Locaton Algorthm Based on Chan and Taylor Lu En-Hua *, Xu Ke-Mng

More information

DISTRIBUTED video coding (DVC) [1] [4] is an attractive

DISTRIBUTED video coding (DVC) [1] [4] is an attractive 1040 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 6, JUNE 2013 Dstrbuted Wreless Vsual Communcaton Wth Power Dstorton Optmzaton Xaopeng Fan, Member, IEEE, Feng Wu, Fellow,

More information

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia. Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,

More information

Multipath Propagation. Outline. What is OFDM? (OFDM) for Broadband Communications and. Orthogonal Frequency Division Multiplexing

Multipath Propagation. Outline. What is OFDM? (OFDM) for Broadband Communications and. Orthogonal Frequency Division Multiplexing Orthogonal Dvson Multplexng (OFDM) for Broadband Communcatons and Dgtal Audo Broadcastng (DAB) Klaus Wtrsal wtrsal@nw.tugraz.at VL: Dgtale Audotechnk, 21. März, 2002 What s OFDM? Modulaton technque Requres

More information

Steganography in JPEG2000 Compressed Images

Steganography in JPEG2000 Compressed Images 824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed

More information

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING Vaslos A. Srs Insttute of Computer Scence (ICS), FORTH and Department of Computer Scence, Unversty of Crete P.O. Box 385, GR 7 Heraklon, Crete,

More information

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power 7th European Sgnal Processng Conference EUSIPCO 29 Glasgow, Scotland, August 24-28, 29 Ergodc Capacty of Block-Fadng Gaussan Broadcast and Mult-access Channels for Sngle-User-Selecton and Constant-Power

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Multiple Error Correction Using Reduced Precision Redundancy Technique

Multiple Error Correction Using Reduced Precision Redundancy Technique Multple Error Correcton Usng Reduced Precson Redundancy Technque Chthra V 1, Nthka Bhas 2, Janeera D A 3 1,2,3 ECE Department, Dhanalakshm Srnvasan College of Engneerng,Combatore, Tamlnadu, Inda Abstract

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information

AN EFFICIENT ITERATIVE DFT-BASED CHANNEL ESTIMATION FOR MIMO-OFDM SYSTEMS ON MULTIPATH CHANNELS

AN EFFICIENT ITERATIVE DFT-BASED CHANNEL ESTIMATION FOR MIMO-OFDM SYSTEMS ON MULTIPATH CHANNELS AN FFICINT ITRATIV DFT-BASD CHANNL STIMATION FOR MIMO-OFDM SYSTMS ON MULTIPATH CHANNLS Jan Hafang Graduate Unversty of the Chnese Academy of Scences Insttute of Semconductors, CAS Beng, Chna hf@sem.ac.cn

More information

SC-FDMA and OFDMA: An Efficient Wireless Image Transmission Schemes

SC-FDMA and OFDMA: An Efficient Wireless Image Transmission Schemes Journal of Control and Systems Engneerng 016, Vol. 4 Iss. 1, PP. 74-83 Frst onlne: 8 July 016 SC-FDMA and OFDMA: An Effcent Wreless Image Transmsson Schemes Fasal S. Al-Kamal 1, Abdullah A. Qasem, Samah

More information

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas Impact of Interference Model on Capacty n CDMA Cellular Networks Robert Akl, D.Sc. Asad Parvez Unversty of North Texas Outlne Introducton to CDMA networks Average nterference model Actual nterference model

More information

In-system Jitter Measurement Based on Blind Oversampling Data Recovery

In-system Jitter Measurement Based on Blind Oversampling Data Recovery RADIOENGINEERING, VOL. 1, NO. 1, APRIL 01 403 In-system Jtter Measurement Based on Blnd Oversamplng Data Recovery Mchal KUBÍČEK, Zdeněk KOLKA Dept. of Rado Electroncs, Brno Unversty of Technology, Purkyňova

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

Topology Control for C-RAN Architecture Based on Complex Network

Topology Control for C-RAN Architecture Based on Complex Network Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Hierarchical Generalized Cantor Set Modulation

Hierarchical Generalized Cantor Set Modulation 8th Internatonal Symposum on Wreless Communcaton Systems, Aachen Herarchcal Generalzed Cantor Set Modulaton Smon Görtzen, Lars Schefler, Anke Schmenk Informaton Theory and Systematc Desgn of Communcaton

More information

Improved Error Detection in the JPEG2000 Codec

Improved Error Detection in the JPEG2000 Codec Improved Error Detecton n the JPEG2000 Codec Farzad Zargar, Member, IEEE, Al Sefdpour, M. Shahram Mon, Member, IEEE, and Mohammad Ghanbar, Fellow, IEEE Abstract the Segmentaton symbol s an error reslence

More information

DETERMINATION OF WIND SPEED PROFILE PARAMETERS IN THE SURFACE LAYER USING A MINI-SODAR

DETERMINATION OF WIND SPEED PROFILE PARAMETERS IN THE SURFACE LAYER USING A MINI-SODAR DETERMINATION OF WIND SPEED PROFILE PARAMETERS IN THE SURFACE LAYER USING A MINI-SODAR A. Coppalle, M. Talbaut and F. Corbn UMR 6614 CORIA, Sant Etenne du Rouvray, France INTRODUCTION Recent mprovements

More information

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain. Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: 67-76 www.jacr.ausar.ac.r Audo Sgnal

More information

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT J.Wang a,b, a *, J.X.Zhang, Z.J.Lu a a Insttute of Photogrammetry & Remote Sensng, CASM, Bejng, Chna - stecsm@publc.bta.net.cn b Department

More information

AN IMPROVED BIT LOADING TECHNIQUE FOR ENHANCED ENERGY EFFICIENCY IN NEXT GENERATION VOICE/VIDEO APPLICATIONS

AN IMPROVED BIT LOADING TECHNIQUE FOR ENHANCED ENERGY EFFICIENCY IN NEXT GENERATION VOICE/VIDEO APPLICATIONS Journal of Engneerng Scence and Technology Vol., o. 4 (6) 476-495 School of Engneerng, Taylor s Unversty A IMPROVED BIT LOADIG TECHIQUE FOR EHACED EERGY EFFICIECY I EXT GEERATIO VOICE/VIDEO APPLICATIOS

More information

DVB-T/H Digital Television Transmission and its Simulation over Ricean and Rayleigh Fading Channels

DVB-T/H Digital Television Transmission and its Simulation over Ricean and Rayleigh Fading Channels DVB-T/H Dgtal Televson Transmsson and ts Smulaton over Rcean and Raylegh Fadng Channels Ladslav Polák, Tomáš Kratochvl Department of Rado Electroncs, Brno Unversty of Technology, Purkyňova 118, 612 Brno,

More information

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features Recognton of Low-Resoluton Face Images usng Sparse Codng of Local Features M. Saad Shakeel and Kn-Man-Lam Centre for Sgnal Processng, Department of Electronc and Informaton Engneerng he Hong Kong Polytechnc

More information

A Novel Soft-Switching Two-Switch Flyback Converter with a Wide Operating Range and Regenerative Clamping

A Novel Soft-Switching Two-Switch Flyback Converter with a Wide Operating Range and Regenerative Clamping 77 Journal of ower Electroncs, ol 9, No 5, September 009 JE 9-5- A Novel Soft-Swtchng Two-Swtch Flybac Converter wth a Wde Operatng Range and Regeneratve Clampng Marn-Go Km and Young-Seo Jung * Dvson of

More information

MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM

MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM XIX IMEKO World Congress Fundamental and Appled Metrology September 6 11, 2009, Lsbon, Portugal MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM Potr Blsk 1,2, Wesław Wneck 2 1 Warsaw

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

Coverage Maximization in Mobile Wireless Sensor Networks Utilizing Immune Node Deployment Algorithm

Coverage Maximization in Mobile Wireless Sensor Networks Utilizing Immune Node Deployment Algorithm CCECE 2014 1569888203 Coverage Maxmzaton n Moble Wreless Sensor Networs Utlzng Immune Node Deployment Algorthm Mohammed Abo-Zahhad, Sabah M. Ahmed and Nabl Sabor Electrcal and Electroncs Engneerng Department

More information

64-QAM Communication System using Three-beam Spatial Power Combining Technology

64-QAM Communication System using Three-beam Spatial Power Combining Technology 9th AIAA Internatonal Communcatons Satellte Systems Conference (ICSSC-) 8 November - December, Nara, Japan AIAA -86 64-QAM Communcaton System usng Three-beam Spatal ower Combnng Technology Masayosh Tanaka

More information

Understanding the Spike Algorithm

Understanding the Spike Algorithm Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst

More information

Graph Method for Solving Switched Capacitors Circuits

Graph Method for Solving Switched Capacitors Circuits Recent Advances n rcuts, ystems, gnal and Telecommuncatons Graph Method for olvng wtched apactors rcuts BHUMIL BRTNÍ Department of lectroncs and Informatcs ollege of Polytechncs Jhlava Tolstého 6, 586

More information