Beta Ti−35Nb sandwich-structured composites with various reinforcing layers were designed and produced using additive manufacturing(AM)to achieve a balance between light weight and high strength.The impact of reinforc...Beta Ti−35Nb sandwich-structured composites with various reinforcing layers were designed and produced using additive manufacturing(AM)to achieve a balance between light weight and high strength.The impact of reinforcing layers on the compressive deformation behavior of porous composites was investigated through micro-computed tomography(Micro-CT)and finite element method(FEM)analyses.The results indicate that the addition of reinforcement layers to sandwich structures can significantly enhance the compressive yield strength and energy absorption capacity of porous metal structures;Micro-CT in-situ observation shows that the strain of the porous structure without the reinforcing layer is concentrated in the middle region,while the strain of the porous structure with the reinforcing layer is uniformly distributed;FEM analysis reveals that the reinforcing layers can alter stress distribution and reduce stress concentration,thereby promoting uniform deformation of the porous structure.The addition of reinforcing layer increases the compressive yield strength of sandwich-structured composite materials by 124%under the condition of limited reduction of porosity,and the yield strength increases from 4.6 to 10.3 MPa.展开更多
A central problem in the study of complexity is the measure of nonuniform complexity classes. BPPP/poly has been proved by Aldman, and EXPSPACEP/poly by Kannan. We propose the definition of approximate acceptance with...A central problem in the study of complexity is the measure of nonuniform complexity classes. BPPP/poly has been proved by Aldman, and EXPSPACEP/poly by Kannan. We propose the definition of approximate acceptance with which we discuss the nonuniform complexity of the K sized complete subgraph problem. The method of modal theory is used and the K sized complete subgraph problemP/poly, co NPP/poly and NPP/poly is proved. This paper solves the Karp Lipton′s open problem: “NPP/poly?”展开更多
Based on the variational approach for pile groups embedded in soil modeled using a load-transfer curve method, a practical method was conducted to estimate the settlement of symmetric pile group supported embankments....Based on the variational approach for pile groups embedded in soil modeled using a load-transfer curve method, a practical method was conducted to estimate the settlement of symmetric pile group supported embankments. The working mechanism of composite foundations improved by rigid or semi-rigid columns is analyzed by this method. Under equivalent strain conditions, the pile-soil stress ratio approaches the pile-soil modulus ratio up to a limited value of pile stiffness (Rm〈10); in the subsequent stages of high pile stiffness (Rm〉10), a further increase in the pile-soil modulus ratio cannot lead to a significant increase of stress transferred to the columns in composite foundations. The major influencing factor of the stress concentration from soil to pile in a high pile-soil modulus ratio is the padding stiffness. For the composite foundation improved by cement mixing columns, the effective column length is about 15 to 20 m and it is a more economical and effective design when the column length is less than 15 m.展开更多
This paper shows a calculation model and a method for predicting the tensile strength of the random distributed short fiber composite.On the basis of Renjie Mao's model,the longitudinal tensile strength of the ali...This paper shows a calculation model and a method for predicting the tensile strength of the random distributed short fiber composite.On the basis of Renjie Mao's model,the longitudinal tensile strength of the aligned short fiber composite is formulated.Considering the transverse tensile strength and in plane shear strength of the unidirectional fiber composite,and the stress transformation relations of two couples of axes,the stress of the unidirectional fiber composite when it is loaded at an arbitrary angle is obtained.With the aid of an equivalence relation,the calculation formulation of the tensile strength of the random short fiber reinforced composite is deduced.展开更多
In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two...In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two steps. In the first step, MPWFRFT, implemented as the constellation beguiling(CB) method, is applied to change the signal's identity. In the second step the additional pseudo random phase information, regarded as the encryption key, is attached to the original signal to enhance the security. Typically, the pseudo random phase information can be removed effectively by the legitimate receiver. In contrast to the cryptography based encryption algorithms and the conventional PHY secrecy techniques, the main contribution of the proposed scheme is concentrated on the variation in signal's characteristics. Simulation results show that the proposed scheme can prevent the exchanging signal from eavesdroppers' classifi cation or inception. Moreover, the proposed scheme can guarantee the BER performance at a tolerate increasing in computational complexity for the legitimate receivers.展开更多
Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational complexity.In order to reduce the security overhead of the existing solutions...Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational complexity.In order to reduce the security overhead of the existing solutions for securing network coding,a novel securing network coding paradigm is presented relying on two coding models:intra-generation coding and inter-generation coding.The basic idea to secure network coding using intra-generation coding is to limit the encryption operations for each generation,and then subject the scrambled and the remaining original source vectors to a linear transformation.This method is then generalized seamlessly using inter-generation coding by further exploiting the algebraic structure of network coding.We show that the proposed schemes have properties of low-complexity security,little bandwidth consumption,and high efficiency in integrating with the existing security techniques effectively.展开更多
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant qua...The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc.展开更多
Massive multiple-input multiple-output provides improved energy efficiency and spectral efficiency in 5 G. However it requires large-scale matrix computation with tremendous complexity, especially for data detection a...Massive multiple-input multiple-output provides improved energy efficiency and spectral efficiency in 5 G. However it requires large-scale matrix computation with tremendous complexity, especially for data detection and precoding. Recently, many detection and precoding methods were proposed using approximate iteration methods, which meet the demand of precision with low complexity. In this paper, we compare these approximate iteration methods in precision and complexity, and then improve these methods with iteration refinement at the cost of little complexity and no extra hardware resource. By derivation, our proposal is a combination of three approximate iteration methods in essence and provides remarkable precision improvement on desired vectors. The results show that our proposal provides 27%-83% normalized mean-squared error improvement of the detection symbol vector and precoding symbol vector. Moreover, we find the bit-error rate is mainly controlled by soft-input soft-output Viterbi decoding when using approximate iteration methods. Further, only considering the effect on soft-input soft-output Viterbi decoding, the simulation results show that using a rough estimation for the filter matrix of minimum mean square error detection to calculating log-likelihood ratio could provideenough good bit-error rate performance, especially when the ratio of base station antennas number and the users number is not too large.展开更多
Temporal and three-dimensional(3 D) spatial information is important for the characterization of wireless channels. In this paper, the commonly used array signal processing(ASP) methods to estimate channel parameters ...Temporal and three-dimensional(3 D) spatial information is important for the characterization of wireless channels. In this paper, the commonly used array signal processing(ASP) methods to estimate channel parameters are summarized. Firstly, algorithms that can be used to estimate azimuth angle of arrival(AAo A) and elevation Ao A(EAo A) are introduced. They include multiple signal classification(MUSIC), estimation of signal parameter via rotational invariance techniques(ESPRIT), and Unitary ESPRIT algorithms. Secondly, algorithms that can be used to jointly estimate delay, AAo A, and EAo A are given. They include joint angle and delay estimation(JADE) MUSIC, JADE ESPRIT, shift-invariance(SI) JADE, and space-alternating generalized expectation-maximization(SAGE) algorithms. We also propose an improved SIJADE algorithm to further reduce computation complexity by incorporating with the Unitary ESPRIT algorithm. Performance of the above algorithms to extract only spatial information and to jointly extract temporal and spatial information is compared in both synthetic and 60 GHz real channel environments. Simulation results show that with the inclusion of delay estimation, the joint temporal and spatial estimation algorithms can provide better resolution than algorithms estimating only angles.Measurement data processing results show that MUSIC algorithm can provide comparable results with SAGE algorithm in estimating AAoA and EAoA. SI-JADE and the improved SI-JADE algorithms are also applicable to process 60 GHz channel measurement data.However, MUSIC, SI-JADE, and the improved SI-JADE algorithms can greatly reduce computational burden compared with SAGE algorithm. At last, some future directions are pointed out.展开更多
For reducing the computational complexity of the problem of joint transmit and receive antenna selection in Multiple-Input-Multiple-Output (MIMO) systems, we present a concise joint transmit/receive antenna selection ...For reducing the computational complexity of the problem of joint transmit and receive antenna selection in Multiple-Input-Multiple-Output (MIMO) systems, we present a concise joint transmit/receive antenna selection algorithm. Using a novel partition of the channel matrix, we drive a concise formula. This formula enables us to augment the channel matrix in such a way that the computational complexity of the greedy Joint Transmit/Receive Antenna Selection (JTRAS) algorithm is reduced by a factor of 4n L , where n L is the number of selected antennas. A decoupled version of the proposed algorithm is also proposed to further improve the efficiency of the JTRAS algorithm, with some capacity degradation as a tradeoff. The computational complexity and the performance of the proposed approaches are evaluated mathematically and verified by computer simulations. The results have shown that the proposed joint antenna selection algorithm maintains the capacity perormance of the JTRAS algorithm while its computational complexity is only 1/4n L of that of the JTRAS algorithm. The decoupled version of the proposed algorithm further reduces the computational complexity of the joint antenna selection and has better performance than other decoupling-based algorithms when the selected antenna subset is small as compared to the total number of antennas.展开更多
In this paper a joint timing and frequency synchronization method based on Fractional Fourier Transform (FIFT) is proposed for Orthogonal Frequency-Division Multiplexing (OFDM) system. The combination of two chirp...In this paper a joint timing and frequency synchronization method based on Fractional Fourier Transform (FIFT) is proposed for Orthogonal Frequency-Division Multiplexing (OFDM) system. The combination of two chirp signals with opposite chirp rates are used as the training signal, the received training signal with timing and frequency offset is transformed by FrFT and the two peaks representing two chirps in FrFT domain are detected, then the position coordinates of the two peaks are precisely corrected and substituted into an equation group to calculate timing and frequency offset simultaneously. This method only needs one FrFT calculation to implement synchronization, the computational complexity is equal to that of FFT and less than that of correlation or maximum likelihood calculation of existing methods, and estimation range of frequency offset is Large, greater than half the signal bandwidth, while the simulation results show that even at low SNR it can accurately estimate timing and frequency offset and the estimation error is less than that of existing methods.展开更多
To improve the bit error rate(BER) performance of multiple input multiple output(MIMO) systems with low complexity, a three-branch transmission scheme employing 8-weighted-type fractional Fourier transform(8-WFRFT) mo...To improve the bit error rate(BER) performance of multiple input multiple output(MIMO) systems with low complexity, a three-branch transmission scheme employing 8-weighted-type fractional Fourier transform(8-WFRFT) module is proposed. In the proposed scheme, the original signal is first decomposed into eight sub-signals and then merged into three component signals by the same carrier pattern. The three signals have mathematical constraint relations among themselves that can counteract the channel fading. They are simultaneously transmitted via three independent antennas after delay regulating. At the receiver, an inverse 8-WFRFT module is employed to obtain the estimated original signal by processing the received signal. Then, the bit error rate(BER) performance, transmitting power, transmission rate, power spectrum and computational complexity of the proposed scheme are analysed in detail. Numerical results show that the proposed scheme has a superior performance compared to STBC based three-antenna transmission scheme, in terms of BER performance.展开更多
Forward-backward algorithm, used by watermark decoder for correcting non-binary synchronization errors, requires to traverse a very large scale trellis in order to achieve the proper posterior probability, leading to ...Forward-backward algorithm, used by watermark decoder for correcting non-binary synchronization errors, requires to traverse a very large scale trellis in order to achieve the proper posterior probability, leading to high computational complexity. In order to reduce the number of the states involved in the computation, an adaptive pruning method for the trellis is proposed. In this scheme, we prune the states which have the low forward-backward quantities below a carefully-chosen threshold. Thus, a wandering trellis with much less states is achieved, which contains most of the states with quite high probability. Simulation results reveal that, with the proper scaling factor, significant complexity reduction in the forward-backward algorithm is achieved at the expense of slight performance degradation.展开更多
基金the Hunan Young Scientific Innovative Talents Program,China(No.2020RC3040)Outstanding Youth Fund of Hunan Natural Science Foundation,China(Nos.2021JJ20011,2021JJ40600,2021JJ40590)the National Natural Science Foundation of China(Nos.52001030,52204371)..
文摘Beta Ti−35Nb sandwich-structured composites with various reinforcing layers were designed and produced using additive manufacturing(AM)to achieve a balance between light weight and high strength.The impact of reinforcing layers on the compressive deformation behavior of porous composites was investigated through micro-computed tomography(Micro-CT)and finite element method(FEM)analyses.The results indicate that the addition of reinforcement layers to sandwich structures can significantly enhance the compressive yield strength and energy absorption capacity of porous metal structures;Micro-CT in-situ observation shows that the strain of the porous structure without the reinforcing layer is concentrated in the middle region,while the strain of the porous structure with the reinforcing layer is uniformly distributed;FEM analysis reveals that the reinforcing layers can alter stress distribution and reduce stress concentration,thereby promoting uniform deformation of the porous structure.The addition of reinforcing layer increases the compressive yield strength of sandwich-structured composite materials by 124%under the condition of limited reduction of porosity,and the yield strength increases from 4.6 to 10.3 MPa.
文摘A central problem in the study of complexity is the measure of nonuniform complexity classes. BPPP/poly has been proved by Aldman, and EXPSPACEP/poly by Kannan. We propose the definition of approximate acceptance with which we discuss the nonuniform complexity of the K sized complete subgraph problem. The method of modal theory is used and the K sized complete subgraph problemP/poly, co NPP/poly and NPP/poly is proved. This paper solves the Karp Lipton′s open problem: “NPP/poly?”
文摘Based on the variational approach for pile groups embedded in soil modeled using a load-transfer curve method, a practical method was conducted to estimate the settlement of symmetric pile group supported embankments. The working mechanism of composite foundations improved by rigid or semi-rigid columns is analyzed by this method. Under equivalent strain conditions, the pile-soil stress ratio approaches the pile-soil modulus ratio up to a limited value of pile stiffness (Rm〈10); in the subsequent stages of high pile stiffness (Rm〉10), a further increase in the pile-soil modulus ratio cannot lead to a significant increase of stress transferred to the columns in composite foundations. The major influencing factor of the stress concentration from soil to pile in a high pile-soil modulus ratio is the padding stiffness. For the composite foundation improved by cement mixing columns, the effective column length is about 15 to 20 m and it is a more economical and effective design when the column length is less than 15 m.
文摘This paper shows a calculation model and a method for predicting the tensile strength of the random distributed short fiber composite.On the basis of Renjie Mao's model,the longitudinal tensile strength of the aligned short fiber composite is formulated.Considering the transverse tensile strength and in plane shear strength of the unidirectional fiber composite,and the stress transformation relations of two couples of axes,the stress of the unidirectional fiber composite when it is loaded at an arbitrary angle is obtained.With the aid of an equivalence relation,the calculation formulation of the tensile strength of the random short fiber reinforced composite is deduced.
基金supported by the National Basic Research Program of China under Grant 2013CB329003in part by the National Natural Science Foundation General Program of China under Grant 61171110
文摘In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two steps. In the first step, MPWFRFT, implemented as the constellation beguiling(CB) method, is applied to change the signal's identity. In the second step the additional pseudo random phase information, regarded as the encryption key, is attached to the original signal to enhance the security. Typically, the pseudo random phase information can be removed effectively by the legitimate receiver. In contrast to the cryptography based encryption algorithms and the conventional PHY secrecy techniques, the main contribution of the proposed scheme is concentrated on the variation in signal's characteristics. Simulation results show that the proposed scheme can prevent the exchanging signal from eavesdroppers' classifi cation or inception. Moreover, the proposed scheme can guarantee the BER performance at a tolerate increasing in computational complexity for the legitimate receivers.
基金supported by the National Natural Science Foundation of China(Grant No.11371290,No.61271174,No. 61301178)the Science and Technology Innovation Foundation of Xi'an(Grant No. CXY1352WL28)
文摘Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational complexity.In order to reduce the security overhead of the existing solutions for securing network coding,a novel securing network coding paradigm is presented relying on two coding models:intra-generation coding and inter-generation coding.The basic idea to secure network coding using intra-generation coding is to limit the encryption operations for each generation,and then subject the scrambled and the remaining original source vectors to a linear transformation.This method is then generalized seamlessly using inter-generation coding by further exploiting the algebraic structure of network coding.We show that the proposed schemes have properties of low-complexity security,little bandwidth consumption,and high efficiency in integrating with the existing security techniques effectively.
基金the National Natural Science Foundation of China,the State Key Program of National Natural Science of China,the Major Research Plan of the National Natural Science Foundation of China,Major State Basic Research Development Program of China (973 Program),the Hubei Natural Science Foundation of China
文摘The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc.
文摘Massive multiple-input multiple-output provides improved energy efficiency and spectral efficiency in 5 G. However it requires large-scale matrix computation with tremendous complexity, especially for data detection and precoding. Recently, many detection and precoding methods were proposed using approximate iteration methods, which meet the demand of precision with low complexity. In this paper, we compare these approximate iteration methods in precision and complexity, and then improve these methods with iteration refinement at the cost of little complexity and no extra hardware resource. By derivation, our proposal is a combination of three approximate iteration methods in essence and provides remarkable precision improvement on desired vectors. The results show that our proposal provides 27%-83% normalized mean-squared error improvement of the detection symbol vector and precoding symbol vector. Moreover, we find the bit-error rate is mainly controlled by soft-input soft-output Viterbi decoding when using approximate iteration methods. Further, only considering the effect on soft-input soft-output Viterbi decoding, the simulation results show that using a rough estimation for the filter matrix of minimum mean square error detection to calculating log-likelihood ratio could provideenough good bit-error rate performance, especially when the ratio of base station antennas number and the users number is not too large.
基金support from the Natural Science Foundation of China (Grant No. 61210002, 61371110)EU H2020 ITN 5G Wireless project (No. 641985)+1 种基金EU H2020 RISE TESTBED project (No. 734325)EPSRC TOUCAN project (Grant No. EP/L020009/1)
文摘Temporal and three-dimensional(3 D) spatial information is important for the characterization of wireless channels. In this paper, the commonly used array signal processing(ASP) methods to estimate channel parameters are summarized. Firstly, algorithms that can be used to estimate azimuth angle of arrival(AAo A) and elevation Ao A(EAo A) are introduced. They include multiple signal classification(MUSIC), estimation of signal parameter via rotational invariance techniques(ESPRIT), and Unitary ESPRIT algorithms. Secondly, algorithms that can be used to jointly estimate delay, AAo A, and EAo A are given. They include joint angle and delay estimation(JADE) MUSIC, JADE ESPRIT, shift-invariance(SI) JADE, and space-alternating generalized expectation-maximization(SAGE) algorithms. We also propose an improved SIJADE algorithm to further reduce computation complexity by incorporating with the Unitary ESPRIT algorithm. Performance of the above algorithms to extract only spatial information and to jointly extract temporal and spatial information is compared in both synthetic and 60 GHz real channel environments. Simulation results show that with the inclusion of delay estimation, the joint temporal and spatial estimation algorithms can provide better resolution than algorithms estimating only angles.Measurement data processing results show that MUSIC algorithm can provide comparable results with SAGE algorithm in estimating AAoA and EAoA. SI-JADE and the improved SI-JADE algorithms are also applicable to process 60 GHz channel measurement data.However, MUSIC, SI-JADE, and the improved SI-JADE algorithms can greatly reduce computational burden compared with SAGE algorithm. At last, some future directions are pointed out.
文摘For reducing the computational complexity of the problem of joint transmit and receive antenna selection in Multiple-Input-Multiple-Output (MIMO) systems, we present a concise joint transmit/receive antenna selection algorithm. Using a novel partition of the channel matrix, we drive a concise formula. This formula enables us to augment the channel matrix in such a way that the computational complexity of the greedy Joint Transmit/Receive Antenna Selection (JTRAS) algorithm is reduced by a factor of 4n L , where n L is the number of selected antennas. A decoupled version of the proposed algorithm is also proposed to further improve the efficiency of the JTRAS algorithm, with some capacity degradation as a tradeoff. The computational complexity and the performance of the proposed approaches are evaluated mathematically and verified by computer simulations. The results have shown that the proposed joint antenna selection algorithm maintains the capacity perormance of the JTRAS algorithm while its computational complexity is only 1/4n L of that of the JTRAS algorithm. The decoupled version of the proposed algorithm further reduces the computational complexity of the joint antenna selection and has better performance than other decoupling-based algorithms when the selected antenna subset is small as compared to the total number of antennas.
文摘In this paper a joint timing and frequency synchronization method based on Fractional Fourier Transform (FIFT) is proposed for Orthogonal Frequency-Division Multiplexing (OFDM) system. The combination of two chirp signals with opposite chirp rates are used as the training signal, the received training signal with timing and frequency offset is transformed by FrFT and the two peaks representing two chirps in FrFT domain are detected, then the position coordinates of the two peaks are precisely corrected and substituted into an equation group to calculate timing and frequency offset simultaneously. This method only needs one FrFT calculation to implement synchronization, the computational complexity is equal to that of FFT and less than that of correlation or maximum likelihood calculation of existing methods, and estimation range of frequency offset is Large, greater than half the signal bandwidth, while the simulation results show that even at low SNR it can accurately estimate timing and frequency offset and the estimation error is less than that of existing methods.
基金supported by the National Basic Research Program of China (2013CB329003)the National Natural Science Foundation Program of China (No. 61671179)Funds for Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory (EX156410046)
文摘To improve the bit error rate(BER) performance of multiple input multiple output(MIMO) systems with low complexity, a three-branch transmission scheme employing 8-weighted-type fractional Fourier transform(8-WFRFT) module is proposed. In the proposed scheme, the original signal is first decomposed into eight sub-signals and then merged into three component signals by the same carrier pattern. The three signals have mathematical constraint relations among themselves that can counteract the channel fading. They are simultaneously transmitted via three independent antennas after delay regulating. At the receiver, an inverse 8-WFRFT module is employed to obtain the estimated original signal by processing the received signal. Then, the bit error rate(BER) performance, transmitting power, transmission rate, power spectrum and computational complexity of the proposed scheme are analysed in detail. Numerical results show that the proposed scheme has a superior performance compared to STBC based three-antenna transmission scheme, in terms of BER performance.
基金supported in part by National Natural Science Foundation of China (61101114, 61671324) the Program for New Century Excellent Talents in University (NCET-12-0401)
文摘Forward-backward algorithm, used by watermark decoder for correcting non-binary synchronization errors, requires to traverse a very large scale trellis in order to achieve the proper posterior probability, leading to high computational complexity. In order to reduce the number of the states involved in the computation, an adaptive pruning method for the trellis is proposed. In this scheme, we prune the states which have the low forward-backward quantities below a carefully-chosen threshold. Thus, a wandering trellis with much less states is achieved, which contains most of the states with quite high probability. Simulation results reveal that, with the proper scaling factor, significant complexity reduction in the forward-backward algorithm is achieved at the expense of slight performance degradation.