Current IssuePrevious Issue   Next Issue

Volume 16 No. 3
20 March 2011

2011, 16(3): 225-232.   doi:10.1016/S1007-0214(11)70033-5
Abstract ( 130 )  ( 26 )   Save
The number of equivalent keys in multivariate cryptosystem is closely related to the scheme security. This study analyzes the structure of the private key space in some multivariate schemes. The result gives the lower bounds on the number of equivalent keys of some variants of the hidden field equation (HFE) scheme including plus, minus-plus, embedding, and internal perturbation. This method estimates the number of invertible transformations which maintain the form of the central map invariant. ...

2011, 16(3): 233-240.   doi:10.1016/S1007-0214(11)70034-7
Abstract ( 150 )  ( 34 )   Save
Creating realistic virtual humans has been a challenging objective in computer science research for some time. This paper describes an integrated framework for modeling virtual humans with a high level of autonomy. The framework seeks to reproduce human-like believable behavior and movement in virtual humans in a virtual environment. The framework includes a visual and auditory information perception module, a decision network based behavior decision module, and a hierarchical autonomous motion ...

2011, 16(3): 241-246.   doi:10.1016/S1007-0214(11)70035-9
Abstract ( 131 )  ( 41 )   Save
Coupled map lattices (CML) have been recently used to construct ciphers. However, the complicated operations on real numbers make these CML-based ciphers difficult to analyze. This paper presents a new stream cipher with the discretized CML which operates on binary numbers. When discretizing the CML, the effective network structure is explicitly preserved to improve the confusion and diffusion. The proposed cipher can be easily analyzed using proper cryptographic techniques and has good security...

2011, 16(3): 247-255.   doi:10.1016/S1007-0214(11)70036-0
Abstract ( 216 )  ( 70 )   Save
Digital mobile telecommunication systems, such as the global system for mobile (GSM) system, want to further improve speech communication quality without changing the channel encoders and decoders. Speech quality is most affected by residual bit errors in received speech frames. Conventional methods use binary decision strategies for error detection and concealment in frames. This paper presents a multi-level error detection and concealment algorithm for GSM full rate speech codec systems. The a...

2011, 16(3): 256-263.   doi:10.1016/S1007-0214(11)70037-2
Abstract ( 152 )  ( 44 )   Save
This paper describes a parallel fast convolution back-projection algorithm design for radar image reconstruction. State-of-the-art general purpose graphic processing units (GPGPU) were utilized to accelerate the processing. The implementation achieves much better performance than conventional processing systems, with a speedup of more than 890 times on NVIDIA Tesla C1060 supercomputing cards compared to an Intel P4 2.4 GHz CPU. 256×256 pixel images could be reconstructed within 6.3 s, whic...

2011, 16(3): 264-271.   doi:10.1016/S1007-0214(11)70038-4
Abstract ( 170 )  ( 55 )   Save
Analyses of dynamic systems with random oscillations need to calculate the system covariance matrix, but this is not easy even in the linear case if the random term is not a Gaussian white noise. A universal method is developed here to handle both Gaussian and compound Poisson white noise. The quadratic variations are analyzed to transform the problem into a Lyapunov matrix differential equation. Explicit formulas are then derived by vectorization. These formulas are applied to a simple model of...

2011, 16(3): 272-277.   doi:10.1016/S1007-0214(11)70039-6
Abstract ( 190 )  ( 42 )   Save
An immune algorithm-based approach was developed to optimize a feedforward neural network. The network architecture, activation functions, and training method were encoded as individuals with an appropriate method for individual selection. The immune feedforward neural network is then applied to fault detection of water quality monitoring equipment. This gives better performance than a feedforward neural network.

2011, 16(3): 278-284.   doi:10.1016/S1007-0214(11)70040-2
Abstract ( 153 )  ( 30 )   Save
This paper illustrates the importance of the configuration of function units and the change of an application's critical path when using instruction set extension (ISE) with multi-issue architectures. This paper also presents an automatic identification approach for customized instruction without input/output number constraints for multi-issue architectures. The approach identifies customized instructions using multiple attribute decision-making based on the analysis of several attributes for ea...

2011, 16(3): 285-289.   doi:10.1016/S1007-0214(11)70041-4
Abstract ( 204 )  ( 38 )   Save
This paper presents a new combined AC/DC-coupled output averaging technique for input amplifier design of flash analog-to-digital converters (ADC). The new offset averaging design technique takes full advantage of traditional DC-coupled resistance averaging and AC-coupled capacitance averaging techniques to minimize offset-induced ADC nonlinearities. Circuit analysis allows selection of optimum resistance and capacitance averaging factors to achieve maximum offset reduction in ADC designs. The n...

2011, 16(3): 290-294.   doi:10.1016/S1007-0214(11)70042-6
Abstract ( 189 )  ( 37 )   Save
A handwriting input system was developed using three collinear ultrasonic transducers. These collinear polyvinylidene fluoride (PVDF) transducers were specially designed for the handwriting input system to give a large writeable area with writing in any direction. Driver and detection circuits were developed for the handwriting system. This handwriting input system based on 2-dimensional position tracing has large writeable area (A4 paper), low drive voltage (5 V), and is independent of the hand...

2011, 16(3): 295-299.   doi:10.1016/S1007-0214(11)70043-8
Abstract ( 119 )  ( 25 )   Save
This paper considers the distributed estimation of a source parameter using quantized sensor observations in a wireless sensor network with noisy channels. Repetition codes are used to transmit quantization bits of sensor observations and a quasi best linear unbiased estimate is constructed to estimate the source parameter. Simulations show that the estimation scheme achieves a better power and spectral efficiency than the previous scheme.

2011, 16(3): 300-307.   doi:10.1016/S1007-0214(11)70044-X
Abstract ( 112 )  ( 31 )   Save
This paper describes the effect of channel estimation error (CEE) on the performance of distributed estimations of an unknown parameter in a wireless sensor network. Both the classical and Bayesian estimators are derived to mitigate the adverse effects caused by the CEE. Power scheduling among sensors and the power ratio between the training and data transmission at each individual node are optimized by directly minimizing the final average mean squared error to compensate for the CEE. A closed-...

2011, 16(3): 308-314.   doi:10.1016/S1007-0214(11)70045-1
Abstract ( 161 )  ( 45 )   Save
Assembly line balancing involves assigning a series of task elements to uniform sequential stations with certain restrictions. Decision makers often discover that a task assignment which is optimal with respect to a deterministic or stochastic/fuzzy model yields quite poor performance in reality. In real environments, assembly line balancing robustness is a more appropriate decision selection guide. A robust model based on the α worst case scenario is developed to compensate for the dra...

2011, 16(3): 315-319.   doi:10.1016/S1007-0214(11)70046-3
Abstract ( 129 )  ( 58 )   Save
This paper studies the existence and uniqueness of solutions and the stability and convergence of a dynamic system for solving saddle point problems (SPP) in Hilbert spaces. The analysis first converts the SPP into a problem of searching for equilibriums of a dynamic system using a criterion for solutions of the SPP, then shows the existence and uniqueness of the solutions by creating a positive function whose Fréchet derivative is decreasing along any solution. The construction of positi...

2011, 16(3): 320-331.   doi:10.1016/S1007-0214(11)70047-5
Abstract ( 156 )  ( 41 )   Save
The best-effort internet has inherent limitations on the end-to-end performance for interactive multimedia communications. This paper presents a multiple description coding (MDC) and forward error correction (FEC) based multiple path transmission schemes for interactive multimedia (M3FEC), which improves the end users' experience by maximizing a rate-distortion (R-D) based optimization problem. The proposed model considers both the network diversity and the application's stringent requirements, ...

2011, 16(3): 332-336.   doi:10.1016/S1007-0214(11)70048-7
Abstract ( 150 )  ( 49 )   Save
Two characteristics of traffic flows make the vehicle departure headways in Beijing, China different from that in Atlanta, USA. Urban traffic flows in China are often hindered by pedestrians at intersections and queuing vehicles often cannot be totally discharged during the green time, so most signalized intersections are over-saturated in the day time. The first characteristic makes the departure headways of the first and second vehicles in Beijing depend heavily on the start-up situations (wit...