期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
基于并行计算的全息图快速生成 被引量:2
1
作者 付胜豪 王元庆 +1 位作者 鲍绪良 范科峰 《电光与控制》 北大核心 2013年第3期61-64,共4页
全息图的快速生成是当前计算机制全息的重点与难点,为提高全息图的生成速度,提出一种基于Cuda并行计算的全息图快速生成方案。首先利用OpenGL的深度缓存对空间物体进行离散取样,获得空间离散物点集,再对传统的查表算法进行优化处理,大... 全息图的快速生成是当前计算机制全息的重点与难点,为提高全息图的生成速度,提出一种基于Cuda并行计算的全息图快速生成方案。首先利用OpenGL的深度缓存对空间物体进行离散取样,获得空间离散物点集,再对传统的查表算法进行优化处理,大大减小查找表的空间大小,离线制作查找表,存入GPU纹理内存,合理设计并行计算方案,将Cuda并行计算的方法应用于全息图的快速生成。实验表明该方法有效可行,并行计算可将全息图的生成速度提高40倍左右,同时,OpenGL的使用给交互式全息图的计算机生成提供一种研究思路。 展开更多
关键词 计算机全息 并行计算 OPENGL 相息 菲涅耳衍射
在线阅读 下载PDF
Dynamics models of soil organic carbon 被引量:8
2
作者 杨丽霞 潘剑君 《Journal of Forestry Research》 SCIE CAS CSCD 2003年第4期323-330,共8页
As the largest pool of terrestrial organic carbon, soils interact strongly with atmosphere composition, climate, and land change. Soil organic carbon dynamics in ecosystem plays a great role in global carbon cycle and... As the largest pool of terrestrial organic carbon, soils interact strongly with atmosphere composition, climate, and land change. Soil organic carbon dynamics in ecosystem plays a great role in global carbon cycle and global change. With development of mathematical models that simulate changes in soil organic carbon, there have been considerable advances in understanding soil organic carbon dynamics. This paper mainly reviewed the composition of soil organic matter and its influenced factors, and recommended some soil organic matter models worldwide. Based on the analyses of the developed results at home and abroad, it is suggested that future soil organic matter models should be developed toward based-process models, and not always empirical ones. The models are able to reveal their interaction between soil carbon systems, climate and land cover by technique and methods of GIS (Geographical Information System) and RS (Remote Sensing). These models should be developed at a global scale, in dynamically describing the spatial and temporal changes of soil organic matter cycle. Meanwhile, the further researches on models should be strengthen for providing theory basis and foundation in making policy of green house gas emission in China. 展开更多
关键词 Soil carbon Soil organic carbon Dynamic model
在线阅读 下载PDF
MP-WFRFT and Constellation Scrambling Based Physical Layer Security System 被引量:29
3
作者 FANG Xiaojie SHA Xuejun LI Yue 《China Communications》 SCIE CSCD 2016年第2期138-145,共8页
In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two... In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two steps. In the first step, MPWFRFT, implemented as the constellation beguiling(CB) method, is applied to change the signal's identity. In the second step the additional pseudo random phase information, regarded as the encryption key, is attached to the original signal to enhance the security. Typically, the pseudo random phase information can be removed effectively by the legitimate receiver. In contrast to the cryptography based encryption algorithms and the conventional PHY secrecy techniques, the main contribution of the proposed scheme is concentrated on the variation in signal's characteristics. Simulation results show that the proposed scheme can prevent the exchanging signal from eavesdroppers' classifi cation or inception. Moreover, the proposed scheme can guarantee the BER performance at a tolerate increasing in computational complexity for the legitimate receivers. 展开更多
关键词 weighted fractional Fourier transform(WFRFT) physical layer (PHY) security secrecycapacity
在线阅读 下载PDF
An Optimized Cross Correlation Power Attack of Message Blinding Exponentiation Algorithms 被引量:1
4
作者 WAN Wunan YANG Wei CHEN Jun 《China Communications》 SCIE CSCD 2015年第6期22-32,共11页
The message blinding method is the most efficient and secure countermeasure against first-order differential power analysis(DPA).Although cross correlation attacks(CCAs) were given for defeating message blinding metho... The message blinding method is the most efficient and secure countermeasure against first-order differential power analysis(DPA).Although cross correlation attacks(CCAs) were given for defeating message blinding methods,however searching for correlation points is difficult for noise,misalignment in practical environment.In this paper,we propose an optimized cross correlation power attack for message blinding exponentiation algorithms.The attack method can select the more correlative power points of share one operation in the modular multiplication by comparing variances between correlation coefficients.Further we demonstrate that the attack method is more efficient in experiments with hardware implementation of RSA on a crypto chip card.In addition to the proposed CCA method can recovery all 1024 bits secret key and recognition rate increases to 100%even when the recorded signals are noisy. 展开更多
关键词 side channel attack correlationpower analysis cross correlation attacks module exponentiation.
在线阅读 下载PDF
A Novel Masking Scheme for SM3 Based MAC
5
作者 QU Kaige WU Liji +2 位作者 WANG An REN Yanting ZHANG Xiangmin 《China Communications》 SCIE CSCD 2015年第6期11-21,共11页
The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authen... The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authentication Code(MAC).Our scheme was implemented in hardware,which utilizes hardware oriented secure conversion techniques between boolean and arithmetic masking.Security evaluation based on SAKURA-G FPGA board has been done with 2000 power traces from 2000 random plaintexts with random plaintext masks and random key masks.It has been verified that the masked SM3 hardware implementation shows no intermediate value leakage as expected.Our masked SM3 hardware can resist first-order correlation power attack(CPA) and collision correlation attack. 展开更多
关键词 SM3 algorithm masking scheme hardware implementation power analysis boolean and arithmetic masking conversion
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部