Mingming JIANG, Yuyan GUO, Lei YU, Wangan SONG, Shimin WEI. Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model[J]. Journal of Electronics & Information Technology, 2019, 41(1): 61-66. doi: 10.11999/JEIT180146
Citation:
Liu Wei, Pu Sheng-Chun, Zhu Han-Hao. An Impulsive Interference Depression Method Based on Polarization Analysis[J]. Journal of Electronics & Information Technology, 2012, 34(11): 2548-2553. doi: 10.3724/SP.J.1146.2012.00411
Mingming JIANG, Yuyan GUO, Lei YU, Wangan SONG, Shimin WEI. Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model[J]. Journal of Electronics & Information Technology, 2019, 41(1): 61-66. doi: 10.11999/JEIT180146
Citation:
Liu Wei, Pu Sheng-Chun, Zhu Han-Hao. An Impulsive Interference Depression Method Based on Polarization Analysis[J]. Journal of Electronics & Information Technology, 2012, 34(11): 2548-2553. doi: 10.3724/SP.J.1146.2012.00411
The impulsive interference occurred in the received signals causes bad performance in signal processing. Thus noise should be suppressed. In this paper, a novel method based on polarization analysis is proposed to reject transient noise. With the polarization parameters of the vector signals, a polarization filter is built up. When the filter is applied to the received signals, the impulsive interferences are wiped off at the same time. The data segments contaminated by the interference are found out via the modulate function of the polarization filter, and then the polarization model is used to reconstruct the signal segments. The validity of the suggested approach is demonstrated by simulation results and experiment data.
Mingming JIANG, Yuyan GUO, Lei YU, Wangan SONG, Shimin WEI. Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model[J]. Journal of Electronics & Information Technology, 2019, 41(1): 61-66. doi: 10.11999/JEIT180146
Mingming JIANG, Yuyan GUO, Lei YU, Wangan SONG, Shimin WEI. Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model[J]. Journal of Electronics & Information Technology, 2019, 41(1): 61-66. doi: 10.11999/JEIT180146