688 research outputs found

    Death of a Salesman in Beijing Revisited

    Get PDF

    Death of a Salesman in Beijing Revisited

    Get PDF

    Breaking a novel colour image encryption algorithm based on chaos

    Full text link
    Recently, a colour image encryption algorithm based on chaos was proposed by cascading two position permutation operations and one substitution operation, which are all determined by some pseudo-random number sequences generated by iterating the Logistic map. This paper evaluates the security level of the encryption algorithm and finds that the position permutation-only part and the substitution part can be separately broken with only (log2(3MN))/8\lceil (\log_2(3MN))/8 \rceil and 2 chosen plain-images, respectively, where MNMN is the size of the plain-image. Concise theoretical analyses are provided to support the chosen-plaintext attack, which are verified by experimental results also.Comment: 5 pages, 1 figur

    Multiuser Multihop MIMO Relay System Design Based on Mutual Information Maximization

    Get PDF
    In this paper, we consider multiuser multihop relay communication systems, where the users, relays, and the destination node may have multiple antennas. We address the issue of source and relay precoding matrices design to maximize the system mutual information (MI). By exploiting the linkbetween the maximal MI and the weighted minimal mean-squared error (WMMSE) objective functions, we show that the intractable maximal MI-based source and relay optimization problem can be solved via the WMMSE-based source and relay design through an iterative approach which is guaranteed toconverge to at least a stationary point. For the WMMSE problem, we derive the optimal structure of the relay precoding matrices and show that the WMMSE matrix at the destination node can be decomposed into the sum of WMMSE matrices at all hops. Under a (moderately) high signal-to-noise ratio (SNR) condition, this WMMSE matrix decomposition significantly simplifies the solution to the WMMSE problem. Numerical simulations are performed to demonstrate the effectiveness of the proposed algorithm
    corecore