10,661 research outputs found

    4-Weighted Fractional Fourier Transform based Multiple Image Encryption Approach with PAN

    Get PDF
    In this manuscript, a new encryption approach for multiple images is proposed based on 4-weighted fractionalfrequency transform (4-WFRFT) domain. First, the low frequency-components of all the images are obtained byapplying Fourier Transform on each image, which positioned at corner position of image, shifted to the centralposition. Low-frequency component of each individual image is then scrambled with help of Arnold cat mapwith its parameters and combined all scrambled image to form a single image with the same size that of originalimage which is now ready for encryption process. Here, parameters of Arnold cat map and transform order of 4-WFRFT treated as secret keys which are converted from Permanent Account Number (PAN) of authorize person.The encrypted image information generated by authorize person can be recovered by applying PAN at receiverside

    Estimation, Analysis and Smoothing of Self-Similar Network Induced Delays in Feedback Control of Nuclear Reactors

    Get PDF
    This paper analyzes a nuclear reactor power signal that suffers from network induced random delays in the shared data network while being fed-back to the Reactor Regulating System (RRS). A detailed study is carried out to investigate the self similarity of random delay dynamics due to the network traffic in shared medium. The fractionality or selfsimilarity in the network induced delay that corrupts the measured power signal coming from Self Powered Neutron Detectors (SPND) is estimated and analyzed. As any fractional order randomness is intrinsically different from conventional Gaussian kind of randomness, these delay dynamics need to be handled efficiently, before reaching the controller within the RRS. An attempt has been made to minimize the effect of the randomness in the reactor power transient data with few classes of smoothing filters. The performance measure of the smoothers with fractional order noise consideration is also investigated into.Comment: 6 pages, 6 figure

    Band Limited Signals Observed Over Finite Spatial and Temporal Windows: An Upper Bound to Signal Degrees of Freedom

    Full text link
    The study of degrees of freedom of signals observed within spatially diverse broadband multipath fields is an area of ongoing investigation and has a wide range of applications, including characterising broadband MIMO and cooperative networks. However, a fundamental question arises: given a size limitation on the observation region, what is the upper bound on the degrees of freedom of signals observed within a broadband multipath field over a finite time window? In order to address this question, we characterize the multipath field as a sum of a finite number of orthogonal waveforms or spatial modes. We show that (i) the "effective observation time" is independent of spatial modes and different from actual observation time, (ii) in wideband transmission regimes, the "effective bandwidth" is spatial mode dependent and varies from the given frequency bandwidth. These findings clearly indicate the strong coupling between space and time as well as space and frequency in spatially diverse wideband multipath fields. As a result, signal degrees of freedom does not agree with the well-established degrees of freedom result as a product of spatial degrees of freedom and time-frequency degrees of freedom. Instead, analogous to Shannon's communication model where signals are encoded in only one spatial mode, the available signal degrees of freedom in spatially diverse wideband multipath fields is the time-bandwidth product result extended from one spatial mode to finite modes. We also show that the degrees of freedom is affected by the acceptable signal to noise ratio (SNR) in each spatial mode.Comment: Submitted to IEEE Transactions on Signal Processin

    Advanced signal processing methods in dynamic contrast enhanced magnetic resonance imaging

    Get PDF
    Tato dizertační práce představuje metodu zobrazování perfúze magnetickou rezonancí, jež je výkonným nástrojem v diagnostice, především v onkologii. Po ukončení sběru časové sekvence T1-váhovaných obrazů zaznamenávajících distribuci kontrastní látky v těle začíná fáze zpracování dat, která je předmětem této dizertace. Je zde představen teoretický základ fyziologických modelů a modelů akvizice pomocí magnetické rezonance a celý řetězec potřebný k vytvoření obrazů odhadu parametrů perfúze a mikrocirkulace v tkáni. Tato dizertační práce je souborem uveřejněných prací autora přispívajícím k rozvoji metodologie perfúzního zobrazování a zmíněného potřebného teoretického rozboru.This dissertation describes quantitative dynamic contrast enhanced magnetic resonance imaging (DCE-MRI), which is a powerful tool in diagnostics, mainly in oncology. After a time series of T1-weighted images recording contrast-agent distribution in the body has been acquired, data processing phase follows. It is presented step by step in this dissertation. The theoretical background in physiological and MRI-acquisition modeling is described together with the estimation process leading to parametric maps describing perfusion and microcirculation properties of the investigated tissue on a voxel-by-voxel basis. The dissertation is divided into this theoretical analysis and a set of publications representing particular contributions of the author to DCE-MRI.

    Secrecy Capacity Analysis of 4-WFRFT Based Physical Layer Security in MIMO System

    Full text link
    The traditional information security based on cryptosystem is seriously threatened due to the exponential growth of computing capacity. In order to improve for the upper cryptosystem security, the secure transmission at the physical layer is introduced into the wireless communication system. However, considering the openness of wireless channel, the performance analysis of security wireless communication systems has become a hot issue in recent years. Due to the existence of the upper layer cryptosystem being cracked and the openness of wireless channel security problems, the Multiple-Input Multiple-Output (MIMO) technology increases the difference between channels, the development of its rich spatial degrees of freedom can greatly improve the channel capacity and achieve the purpose of enhancing the Physical layer security (PLS); On this basis, Weighted Type Fractional Fourier Transform (WFrFT) technology rotates and splits the constellation points of signals, it is equivalent to increasing the artificial noise to enhance the PLS. The Average security capacity is an important index to measure the PLS, Therefore, this paper deduces the Average security capacity in MIMO scenario and gives a specific closed expression when considering the channel correlation. By analyzing the expression, the increase of the number of MIMO antennas will improve the Average security capacity. When the estimated bias is 1 in 4-WFRFT, the Average security capacity will be significantly improved; the Average security capacity will reach the maximum value, thus enhancing the PLS.Comment: This article consists of 10 pages, 11 figure

    An Experimental Approach for Encryption and Decryption of Image using Canonical Transforms & Scrambling Technique

    Get PDF
    Data security is a prime objective of various researchers & organizations. Because we have to send the data from one end to another end so it is very much important for the sender that the information will reach to the authorized receiver & with minimum loss in the original data. Data security is required in various fields like banking, defense, medical etc. So our objective here is that how to secure the data. This study is performed on MATLAB R2016b with standard databasegrey scale images like Barbara, Cameraman and Lenna or by using the personalize images in standard format. First of all, the images are scrambled and then the generation of a new complex image took place. Initially phase mask is applied on the complex image by using RPM 1, and then the complex image is encrypted by using LCT of first order. Again the phase mask RPM 2 is applied on the encrypted image followed by the LCT of second order to get the encrypted image finally. Reverse process is applied to get the original image. Various parameters are calculated which shows various aspects. Like Change in the value of MSE with change in order of transform tells the quality of encrypted image. Correlation coefficient of encrypted and decrypted image also shows the difference between the encrypted and decrypted image. The original image is then reconstructed and histogram of all these images analyzed. Robustness and imperceptibility of images increases by the proposed method

    High efficiency, low distortion 3D diffusion tensor imaging with variable density spiral fast spin echoes (3D DW VDS RARE)

    Get PDF
    We present an acquisition and reconstruction method designed to acquire high resolution 3D fast spin echo diffusion tensor images while mitigating the major sources of artifacts in DTI-field distortions, eddy currents and motion. The resulting images, being 3D, are of high SNR, and being fast spin echoes, exhibit greatly reduced field distortions. This sequence utilizes variable density spiral acquisition gradients, which allow for the implementation of a self-navigation scheme by which both eddy current and motion artifacts are removed. The result is that high resolution 3D DTI images are produced without the need for eddy current compensating gradients or B_0 field correction. In addition, a novel method for fast and accurate reconstruction of the non-Cartesian data is employed. Results are demonstrated in the brains of normal human volunteers
    corecore