虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

asymmetric

  • A branch-and-bound algorithm for asymmetric TSP

    A branch-and-bound algorithm for asymmetric TSP

    标签: branch-and-bound asymmetric algorithm TSP

    上传时间: 2014-01-27

    上传用户:zmy123

  • Abstract-The effect of the companding process on QAM signals has been under investigation for the p

    Abstract-The effect of the companding process on QAM signals has been under investigation for the past several years. The compander, included in the PCM telephone network to improve voice performance, has an unusual affect on digital QAM data signals which are transmitted over the same channel. The quantization noise, generated by the companding process which is multiplicative (and asymmetric), degrades the detectability performance of the outermost points of the QAM constellation more than that of the inner points. The combined effect of the companding noise and the inherent white gaussian noise of the system, leads us to a re-examination of signal constellation design. In this paper we investigate the detectability performance of a number of candidates for signal constellations including, a typical rectangular QAM constellation, the same constellation with the addition of a smear-desmear operation, and two new improved QAM constellation designs with two-dimensional warpi

    标签: investigation Abstract-The companding the

    上传时间: 2013-12-20

    上传用户:英雄

  • very simple nonvisual Delphi component useful for shareware program developing. It uses crypted lic

    very simple nonvisual Delphi component useful for shareware program developing. It uses crypted license files containing information about exe file (size and crc), expired date and any additional information. As TArtLicense uses RSA asymmetric algorithm and TArtLicense knows only decryption key, nobody can change information inside license file.

    标签: developing nonvisual component shareware

    上传时间: 2017-04-08

    上传用户:561596

  • Auctions are among the oldest economic institutions in place. They have been used since antiquity to

    Auctions are among the oldest economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent- the value to a particular bidder may depend on information available only to others-and asymmetric. In this setting, it is well known that sealed-bid auctions do not achieve efficient allocations in general since they do not allow the information held by different bidders to be shared.

    标签: institutions antiquity Auctions economic

    上传时间: 2014-07-14

    上传用户:Breathe0125

  • a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded s

    a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers.Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES.

    标签: FPGA-based generator embedded hardware

    上传时间: 2014-01-09

    上传用户:一诺88

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas