Entity

Time filter

Source Type


Zou X.,Zhejiang Institute of Communications | Liu W.,Jiangsu City Vocation College | Feng G.,Nanjing University of Posts and Telecommunications
Science in China, Series F: Information Sciences | Year: 2010

Bit-interleaved coded modulation with iterative decoding (BICM-ID) is a bandwidth efficient transmission scheme which is well suitable for next-generation mobile communications. The interleaver design is critical to the high performance of BICM-ID. In this paper we investigate the application of the chaos theory to the interleaver design to further improve the performance of BICM-ID. A new interleaving scheme based on the chaos theory is proposed. Compared with the random interleaver, the proposed approach has the advantages including lower system delay and higher transmission efficiency. Simulation results in both additive white Gaussian noise (AWGN) channel and Rayleigh fading channel are provided, which demonstrates that the new interleaver is better than the random interleaver and exhibits excellent performance when applied to the BICM-ID system. © 2010 Science China Press and Springer-Verlag Berlin Heidelberg. Source


Cheng H.,Nanjing University | Cheng H.,Jiangsu City Vocation College | Rong C.,University of Stavanger | Tan Z.,University of Aalborg | Zeng Q.,Nanjing University
Chinese Journal of Electronics | Year: 2012

Cloud computing will be a main information infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing. Source


Wei C.,Jiangsu City Vocation College
Applied Mechanics and Materials | Year: 2012

This paper presents several novel schemes on product texture bionic design and applications. The paper is organized as follow: It starts on concept of bionics design, methods and models, analyzed the process of bionic design. Several modern texture bionic designs will be followed. With these designs product texture may enhance its weight feeling, enrich its expression as well as conveys language. The floor, leather products, and beverage packaging boxes are applications in texture bionic design. With texture bionic design, which states as natural biological form, directly impacts on people's vision, to give a more intuitive, intimate, beautiful feeling. It also plays a pivotal role to modern environmental protection. © (2012) Trans Tech Publications, Switzerland. Source


Zou X.,Zhejiang University of Media and Communications | Liu W.A.,Jiangsu City Vocation College | Feng G.,Nanjing University of Posts and Telecommunications
Chinese Journal of Electronics | Year: 2010

Bit-Interleaved coded modulation with Iterative decoding (BICM-ID) is a bandwidth efficient transmission scheme which is suitable for next-generation wireless communication systems. In this paper we focused on the interleaver design based on the chaotic maps to further improve the performance of BICM-ID. We used the dispersion and correlation to analyze the performance of the interleavers. The chaotic interleaving schemes generated from the Logistic map, the Henon map and the Lozi map are provided which have better performance than the random interleaver when applied to BICM-ID. It shows that the inclusion of a chaotic vector increases the dispersion of the golden interleaver and improves the system performance. Simulation results in both Additive white Gaussian noise (AWGN) channel and Rayleigh fading channel are provided which demonstrate the effectiveness of the proposed approaches. Source


Cai J.,China Communications Construction Company Ltd. | Cai J.-F.,Jiangsu City Vocation College
Yantu Gongcheng Xuebao/Chinese Journal of Geotechnical Engineering | Year: 2011

In order to investigate the relation between the shear strength and the effective normal stress of soil under the same water content, according to the methods for unloading shear strength of soil, the variation rules of shear strength of the soil under loading and unloading conditions are analyzed considering the stress relation between over-consolidated soil and normally consolidated soil. Formulas for the two true strength parameters of the true strength theory based on the tests by Hvorslev are proposed. Finally, the formula of shear strength with the same structure in a real sense for over-consolidated soil, normally consolidated soil, and under-consolidated soil is deduced by solving the limit and derivation according to the Hvorslev's true strength theory for over-consolidated soil. Source

Discover hidden collaborations