Research Article | Open Access
Xuan Huang, Lingfeng Liu, Xiangjun Li, Minrong Yu, Zijie Wu, "A New Pseudorandom Bit Generator Based on Mixing Three-Dimensional Chen Chaotic System with a Chaotic Tactics", Complexity, vol. 2019, Article ID 6567198, 9 pages, 2019. https://doi.org/10.1155/2019/6567198
A New Pseudorandom Bit Generator Based on Mixing Three-Dimensional Chen Chaotic System with a Chaotic Tactics
In this paper, a new chaotic system is proposed based on mixing three-dimensional Chen chaotic system with a chaotic tactics. This new system is proved to be chaotic under Wiggins’ chaos definition and can generate chaotic sequences with high complexity. Furthermore, we propose a new pseudorandom bit generator (PRBG) based on this new system. A coding algorithm is used to make the sequences uniform. Both statistical and security tests are provided to show the generated sequences are with good randomness and high complexity to withstand attacks.
Chaos is an interesting nonlinear physical phenomenon which exists in the natural world. The first mathematical definition of chaos was proposed by Li and York in , which is widely used for one-dimensional iterative map. After then, for different kinds of systems, some other chaos definitions have been proposed. Among them, the most widely used definitions are Devaney’s chaos, Wiggins’ chaos, and Smale’s chaos. All these definitions focus on the different performances of chaos; e.g., Li-York’s chaos focuses on the diffusion of chaotic trajectories, while Devaney’s chaos focuses on the topological properties. Till now, there is still no accurate mathematical definition which can cover all the performances of chaos. However, the lack of general definition does not hinder the application of chaos. On the contrary, chaos has been widely used in almost all fields of science, engineering, and even humanities [2–6].
Pseudorandom bit sequence (PRBS) plays an important role in many fields, such as spread spectrum communication, numerical simulation, and cryptography [7, 8]. Recently, chaotic systems are regarded as effective nonlinear sources in generating PRBS for their wonderful properties, including sensitivity on initial conditions and parameters, ergodicity, long-term unpredictability, and pseudorandomness [9–11]. Overall, the one-dimensional chaotic map is the most widely used chaotic system for designing PRBG. Addabbo proposed a random bit generator based on one-dimensional piecewise-linear chaotic map . In , a new pseudorandom number generator on graphics processing units is presented, which is based on the chaotic iterations. Szczepanski presented a method of generating pseudorandom numbers by applying discrete chaotic dynamical systems which are ergodic or preferably mixing . However, some studies show that the one-dimensional chaotic system is not secure enough, which may be attacked by the phase space reconstruction technology [15, 16].
Comparatively speaking, PRBG based on high-dimensional chaotic system is more secure in this sense and can offer a wider key space. In , the statistics and complexity of chaotic pseudorandom sequences generated by Lorenz system are analyzed. Shrestha presented an ultra-low-power, biologically inspired pseudo-random number generator based on the Hodgkin-Huxley silicon neuron circuit . This kind of high-dimensional chaos-based PRBG is based on only one-dimensional chaotic orbit. In , Hu proposed a PRBG based on three-dimensional Chen chaotic system. This PRBG is based on a combination of three coordinates of chaotic orbit. However, due to the combination strategy being quite simple,  points out that this PRBG is still not secure enough.
Motivated by the idea of , in this paper, we induce a chaotic tactics to select different dimensional coordinates of the three-dimensional Chen chaotic orbit. This chaotic tactics changes the three-dimensional chaotic orbit into one-dimensional orbit. This chaotic mixing tactics is obviously more secure than the fixed mixing tactics in . We prove that the generated new system is still chaotic mathematically and show that the sequence generated by this new system is more complex than any dimensional variable of original Chen system numerically. Furthermore, we proposed a PRBG based on this new chaotic system. Both statistical and security analysis show that the generated PRBS is with good statistical characteristics and strong capacity to withstand attacks.
In the numerical tests, we use the fourth-order Runge-Kutta method for the numerical simulations of the Chen chaotic system to keep the numerical results as near as possible to the original system behavior. Our PRBG has several advantages. The generated sequence has a more complex behavior than any dimensional variables of original Chen system, which complicates the revealing of information from the orbits. Since we do not utilize any particular properties of Chen chaotic system, many other differential equation-based chaotic systems can also be used, which means that this method is not limited by the choice of system. Furthermore, our generated PRBG can pass the TestU01 statistical test suite, which is better than many other proposed chaotic PRBGs.
The rest of this paper is organized as follows. In Section 2, we present a new chaotic system based on Chen chaotic system with chaotic tactics. We prove that the proposed system is strict chaotic under Wiggins’ chaos definition and analyze its complexity numerically in Section 3. In Section 4, we propose a PRBG based on this new system. The statistical and security tests are presented in Sections 5 and 6, respectively. Finally, Section 7 concludes the whole paper.
2. New System Based on Chen Chaotic System with Chaotic Tactics
The mathematical equation of Chen system can be described as follows :where a, b, and c refer to the control parameters. Equation (1) will be chaotic with some suitable parameters. For example, letting a = 35, b = 3, and c = 28, the chaotic attractor of this system is shown in Figure 1.
The dynamical complexity of Chen chaotic system is rather high. The Lyapunov exponent of Chen system is about 2.168, which is larger than other most widely used chaotic systems. However, the complexity of each dimensional variable is rather low. Some numerical tests will be taken in the next section. Therefore, in order to generate one-dimensional sequences with high complexity from Chen system, in this paper, we present a chaotic tactics. Actually, this chaotic tactics is used to mix the three-dimensional state variables of Chen chaotic system by using chaotic number sequences. The following zero-mean Logistic chaotic map is used here.where pi is the state variable. By setting an initial value p0, we can generate a real-valued sequence: p0, p1, …, pm…. All these values locate in the interval if the initial value p0 is selected in this domain as well.
Divide the interval into N subintervals τi, i = 0, 1,..., N - 1. Denote τi = [ti, ti+1), i = 0, 1, …, N - 2, and τN-1 = [tN-1, tN], where
Let α = , τ1, …, be a finite measurable partition of . If pj is located in the subinterval τi, we change this real value into integer i. Then, the real-valued sequence: p0, p1, …, pm… will be changed into an integer sequence as follows:
From  we know, the integer sequence is uniformly distributed. In this paper, we choose N = 3, and the interval is divided into three subintervals. The output signals of (1) can be mixed into one-dimensional sequence by the integer sequence aswhere T is the sampling interval of Chen chaotic system. We always set T = 0.01 through this paper. Denote x(iT) ≔ xi, y(iT) ≔ yi, z(iT) ≔ zi in this paper. The sequence can be considered as the output signal of system G, whose schematic is briefly illustrated in Figure 2.
3. Chaos and Complexity Performances
In this section, we first prove that the system G is chaotic under Wiggins’ chaos definition and then evaluate the complexity of this new system by using approximate entropy (ApEn) and permutation entropy (PE).
A system is chaotic under Wiggins’ chaos definition if and only if this system has sensitive dependence on initial conditions and transitivity, which can be defined as follows.
Definition 1 (sensitive dependence on initial conditions, ). F: S → S is said to have sensitive dependence on initial conditions if there exists ε > 0, such that for any x∈S and any neighborhood U of x, there exists y∈U and an integer n > 0 such thatwhere Fn refers to the trajectory of the system after n time iterations.
Definition 2 (transitivity, ). F: S → S is topological transitive; i.e., for any open subsets U, V∈S, there exists an integer k > 0 such that
Assumption 3. The sequence is with good independence.
In order to prove this assumption, we numerically calculated the correlation function of sequence , as shown in Figure 3. From Figure 3 we know that the sequence has a good independence and Assumption 3 holds.
Theorem 4. The new system G has sensitive dependence on initial conditions.
Proof. As the Chen system F is chaotic, then, for its initial condition (x0, y0, z0) and its neighbor V, there exist (x0’, y0’, z0’)∈V, n1, n2,..., nk∈Z+ and ε > 0; we haveHere, denotes the Euclidean norm, j = 1, 2,..., k. Therefore, at least one equation holds in the following three equations for different j:Without loss of generality, we assume (9) holds for j = j1, j2,..., jl, where j1, j2,..., jl are selected from 1 to k and are different from each other.
As we known, the integer sequence is uniformly distributed. Therefore, the probability of bi = 0 equals 1/3 approximately. As k and l approach infinity, according to the uniform distribution of and Assumption 3, we haveThen, there exists a value , 1 ≦ p ≦ l, which satisfiesThus, we havewhich concludes our proof.
Theorem 5. The new system G has transitivity.
Proof. The above theorem is equivalent to the following: for any s0∈U and an open subset V, there exists a natural number k such that Gk(s0)=sk∈V.
F is a chaotic system, so F is transitive. Then, for its initial condition (x0, y0, z0)∈UF (UF is the attractor of system F), there exist infinite number of natural numbers ki, i=1, 2,..., n, where VF can be any subset of UF,. Then, for i=1, 2,..., n, we havewhere VF = Vx × Vy × Vz. Without loss of generality, set b0 = 0. As n can approach to infinity, according to the uniform distribution of and Assumption 3, we haveThen, there exists a value kj, 1 ≦ j ≦ n, which satisfiesThus, for any s0∈U, we haveFor the arbitrariness of subset VF, the subset Vx is arbitrary as well, which concludes our proof.
Next, we use ApEn and PE to analyze the complexity of . The results show that our mixed sequence is more complex than the original x, y, z-dimensional state variables of Chen chaotic system.
ApEn is a complexity measure of time-series, which is introduced by Pincus in . ApEn measures the probability of the new pattern generated in the sequences with the embedding dimension growing. The larger the probability is, the more complex the sequence is. Here, we calculate the ApEn of the sequence and then compare with the ApEn of x-dimensional, y-dimensional, and z-dimensional state variables of Chen chaotic system. The results are shown in Figure 4(a). From Figure 4(a) we can find that the ApEn of sequence is much larger than the ApEn of any dimensional variable of Chen system, which indicates that the sequence is much more complex in this sense.
PE is a complexity measure which is introduced in  by Bandt and Pompe. PE compared the size of some consecutive values in the sequence and summed up different order types and then used Shannon’s entropy to measure the uncertainty of this ordering. As mentioned, PE is easily implemented and robust to noise, which has received wide attentions . In this test, we select order m = 6 and embedding delay D = 2 as suggested in . The test results of sequence and its comparison to x-dimensional, y-dimensional, and z-dimensional state variables of Chen chaotic system are shown in Figure 4(b). The results also show that the sequence has greatly improved the complexity of each dimensional variable of Chen system.
4. The New PRBG
As shown in Section 3, the system G is chaotic and with high complexity. In this section, we propose a new PRBG based on system G.
The distribution of the Chen chaotic system is not uniform . Therefore, we first make some effective changes to enhance the statistical properties of sequence . Based on a large number of experiments, we propose the following coding algorithm:By using this algorithm, the output sequence is coded to be uniform integer sequence . The sequence is in the finite field F256, where F256 = , 1, 2,..., . Finally, change ti into 8-bit binary number, (e.g., 0 is encoded into 00000000 and 255 is encoded into 11111111), and then, we can get our PRBS.
The main frame of our PRBG is shown in Figure 5. This PRBG is based on mixing three-dimensional state variables of Chen chaotic system. The mixture method is based on the zero-mean Logistic chaotic map. Furthermore, (20) improves its statistical characteristics. We will show that our PRBG is with good randomness in Section 5. Furthermore, for a sample integer T, this PRBG will generate 8-bit data, which is much faster than the original method with 1 b/T.
5. Statistical Tests
Statistical tests are essential for PRBG which is proposed in cryptographic applications. In this section, we will make some famous statistical tests to evaluate our PRBS. In these tests, the parameters of Chen system are selected as a = 35, b = 3, and c = 28, the initial value are selected as p0 = 0.4231, (x0, y0, z0) = (1.3452, 4.2134, 6.7368).
5.1. Frequency Spectral Analysis
For an ideal pseudorandom sequence, there is no center frequency. While for a period sequence, a center frequency exists. The frequency spectral analysis of our PRBS is plotted in Figure 6. Obviously, there is no center frequency in the spectrum, which indicates that our PRBG is not periodic.
5.2. Beker and Piper’s Statistical Tests
Beker and Piper’s statistical tests include the frequency test, serial test, poker test, runs test, and correlation test . These five tests are famous and can be found in many different works, e.g., . The test results of the first four tests are shown in Table 1, where M refers to the threshold. The correlation tests are shown in Figure 7. Both results show that our PRBS are with good randomness.
5.3. NIST Statistical Tests
Besides the Beker and Piper’s statistical test suite, the NIST test suite may be the most widely used statistical tests . The NIST test suite includes 16 tests which cover almost all the features of random sequences. In this test, the significance level of each test in NIST is set to 0.01, which means that 99% of test samples pass the tests if the random numbers are truly random. Here, we generate 1000 different binary sequences randomly with different initial values; the NIST test results are shown in Table 2. From Table 2 we can find that our PRBS have passed all the test suite and can be regarded with good randomness.
5.4. TestU01 Statistical Tests
In all the statistical test suites for random sequences, the TestU01 test is the most stringent testing. It is very difficult to pass all the tests successfully for PRBGs. In the TestU01 tests, three different crush type batteries are provided: there are Small-Crush, Crush, and Big-Crush, which evaluate sequences with 229 bit, 235 bit, and 238 bit, respectively. Based on the storage space of our computer, we only use Small-Crush and Crush batteries to evaluate the randomness of our PRBG. The test results are shown in Table 3. From Table 3, we can find that all the test suites have been passed, which performs better than other proposed chaotic PRBGs in [30–33].
6. Security Analysis
Besides statistical tests, some other indexes are still required for a secure PRBG.
6.1. Key Space
In this PRBG, the initial values p0 and (x0, y0, z0), as well as the control parameters of Chen system a, b, and c, can be commonly used as the secret keys. Let the greatest accuracy be 2−64. The key space size is approximately equal to 2448 >> 2128. Therefore, the key space of our PRBG is large enough to resist brute-force attack. Furthermore, when comparing to other studies, our method is still superior. Under the same accuracy, the key spaces of the PRBG proposed in [19, 34–36] are 2384, 2400, 2199, and 2128, respectively, which are all smaller than ours.
6.2. Key Sensitivity
Chaotic system is greatly sensitive to the initial values. In this test, we change the initial value slightly to generate new binary sequences and then compare the difference between them. Denote H to be the number of differences between the new sequence and the primary one by each bit. The results are shown in Tables 4–7, where Table 4 shows the differences when p0 changes; Tables 5, 6, and 7 show the differences when x0, y0, and z0 change, respectively. All the results show that the variance ratio of each bit is near 50%, which means that the PRBG is extremely sensitive to the secret key.
6.3. Linear Complexity
For an ideal random sequence, its linear complexity should be n/2, where n is the sequence length. We test the linear complexity of our PRBS, and the result is shown in Figure 8. From Figure 8 we have that the linear complexity curve of our PRBS is approximately equal to the ideal line n/2, which indicates that our PRBG is with high linear complexity.
6.4. Resistance to Differential Attack
Differential attack, or chosen-plaintext attack, is to analyze the effects of a small difference in input keys on the difference of corresponding output sequences. A PRBG is said to resist differential attack if the output sequences are completely different for tiny difference on secret keys. As the results in Section 6.2, we can have that our PRBG is extremely sensitive to the secret keys and can effectively resist differential attacks.
6.5. Algorithm Speed Analysis
In this paper, the algorithms are simulated by Matlab R2014a on the 64-bit computer with 3.3GHz CPU and 4GB memory. The computation precision is 2−64. The mean speed of our PRBG algorithm is about 21.5054 MB/s, which is equivalent to the algorithm in  and is much faster than the algorithms in [37, 38], as seen in Table 8. These results indicate that our PRBG is competitive for practical use.
In this paper, firstly, we propose a new system based on mixing three-dimensional Chen chaotic system with a chaotic tactics and prove that this new system is chaotic under Wiggins’ chaos definition. Complexity tests show that the output of this new system is more complex than any dimensional variable of Chen system. Then, we propose a new PRBG based on this new system. A coding algorithm is used to make the sequences uniform. Furthermore, we do several numerical simulations to prove that the generated PRBS is with good randomness characteristics and strong capacity to withstand different attacks, as well as high speed for practical use.
The [DATA TYPE] data used to support the findings of this study are available from the corresponding author upon request.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
The contributions of this research are the following: National Natural Science Foundation of China (No. 61862042, 61601215, 61762062, 61862044); Science and Technology Innovation Platform Project of Jiangxi Province (No. 20181BCD40005); Major Discipline Academic and Technical Leader Training Plan Project of Jiangxi Province (No. 20172BCB22030); Primary Research & Development Plan of Jiangxi Province (No. 20181ACE50033, No. 20171BBE50064, 2013ZBBE50018, 20111BBE50008); Jiangxi Province Natural Science Foundation of China (No. 20171BAB202027, No. 20142BAB207011); and Science & Technology Research Project of Education Department of Jiangxi Province (No. GJJ150104, GJJ161387).
- T. Y. Li and J. A. Yorke, “Period three implies chaos,” The American Mathematical Monthly, vol. 82, no. 10, pp. 985–992, 1975.
- X.-F. Zhang, L. Wen, X.-B. Luo, and Z.-W. Xie, “Exact solutions of the generalized nonlinear schroinger equation with time- and space-modulated coefficients,” Physics Letters A, vol. 376, no. 4, pp. 465–468, 2012.
- Z. Jabeen and N. Gupte, “The dynamical origin of the universality classes of spatiotemporal intermittency,” Physics Letters A, vol. 374, no. 44, pp. 4488–4495, 2010.
- S. Banerjee, A. P. Misra, and L. Rondoni, “Spatiotemporal evolution in a (2 + 1)-dimensional chemotaxis model,” Physica A: Statistical Mechanics and its Applications, vol. 391, no. 1-2, pp. 107–112, 2012.
- J. H. Park, “Synchronization of Genesio chaotic system via backstepping approach,” Chaos, Solitons & Fractals, vol. 27, no. 5, pp. 1369–1375, 2006.
- C.-S. Chen, “Quadratic optimal synchronization of uncertain chaotic systems,” Applied Mathematics and Computation, vol. 217, no. 24, pp. 10377–10386, 2011.
- N. Kalouptsidis, Signal Processing Systems, in Telecommunications and Signal Processing Series, Wiley, New York, NY, USA, 1996.
- X. Wang, W. Zhang, W. Guo, and J. Zhang, “Secure chaotic system with application to chaotic ciphers,” Information Sciences, vol. 221, pp. 555–570, 2013.
- L. Liu, S. Miao, M. Cheng, and X. Gao, “A pseudorandom bit generator based on new multi-delayed Chebyshev map,” Information Processing Letters, vol. 116, no. 11, pp. 674–681, 2016.
- L. Liu and S. Miao, “Delay-introducing method to improve the dynamical degradation of a digital chaotic map,” Information Sciences, vol. 396, pp. 1–13, 2017.
- X. Huang, L. Liu, X. Li, M. Yu, and Z. Wu, “A new two-dimensional mutual coupled logistic map and its application for pseudorandom number generator,” Mathematical Problems in Engineering, vol. 2019, Article ID 7685359, 10 pages, 2019.
- T. Addabbo, M. Alioto, A. Fort, S. Rocchi, and V. Vignoli, “A feedback strategy to improve the entropy of a chaos-based random bit generator,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 53, no. 2, pp. 326–337, 2006.
- C. Guyeux, R. Couturier, P.-C. Héam, and J. M. Bahi, “Efficient and cryptographically secure generation of chaotic pseudorandom numbers on GPU,” The Journal of Supercomputing, vol. 71, no. 10, pp. 3877–3903, 2015.
- J. Szczepański and Z. Kotulski, “Pseudorandom number generators based on chaotic dynamical systems,” Open Systems and Information Dynamics, vol. 8, no. 2, pp. 137–146, 2001.
- K. M. Short, “Steps toward unmasking secure communications,” International Journal of Bifurcation and Chaos, vol. 04, no. 04, pp. 959–977, 1994.
- F. Xiao and X.-P. Gao, “An approach for short-term prediction on time series from parameter-varying systems,” Journal of Software , vol. 17, no. 5, pp. 1042–1050, 2006.
- L. Nian-sheng, “Pseudo-randomness and complexity of binary sequences generated by the chaotic system,” Communications in Nonlinear Science and Numerical Simulation, vol. 16, no. 2, pp. 761–768, 2011.
- V. L. Shrestha, Q. Ma, M. R. Haider, and Y. Massoud, “An ultra-low-power pseudo-random number generator based on biologically inspired chaotic silicon neuron circuit,” IEICE Electronics Express, vol. 9, no. 22, pp. 1756–1761, 2012.
- H. Hu, L. Liu, and N. Ding, “Pseudorandom sequence generator based on the Chen chaotic system,” Computer Physics Communications, vol. 184, no. 3, pp. 765–768, 2013.
- F. Özkaynak and S. Yavuz, “Security problems for a pseudorandom sequence generator based on the Chen chaotic system,” Computer Physics Communications, vol. 184, no. 9, pp. 2178–2181, 2013.
- J. Lü and G. Chen, “A new chaotic attractor coined,” International Journal of Bifurcation and Chaos, vol. 12, no. 3, pp. 659–661, 2002.
- H. P. Hu, S. H. Liu, Z. X. Wang, and X. G. Wu, “A chaotic polyphase pseudorandom sequence,” Mathematica Physics, vol. 24, no. 2, pp. 251–256, 2004 (Chinese).
- S. Wiggins, Chaotic Transport in Dynamical Systems, Springer-Verlag, New York, NY, USA, 1992.
- S. M. Pincus, “Approximate entropy as a measure of system complexity,” Proceedings of the National Acadamy of Sciences of the United States of America, vol. 88, no. 6, pp. 2297–2301, 1991.
- C. Bandt and B. Pompe, “Permutation entropy: a natural complexity measure for time series,” Physical Review Letters, vol. 88, no. 17, Article ID 174102, 2002.
- J. P. Toomey and D. M. Kane, “Mapping the dynamic complexity of a semiconductor laser with optical feedback using permutation entropy,” Optics Express, vol. 22, no. 2, pp. 1713–1725, 2014.
- H. Beker and F. C. Piper, Cipher Systems: The Protection of Commnications, Wiley, New York, NY, USA, 1982.
- L. Liu, S. Miao, H. Hu, and Y. Deng, “Pseudorandom bit generator based on non-stationary logistic maps,” IET Information Security, vol. 10, no. 2, pp. 87–94, 2016.
- A. Rukhin, J. Sota, J. Nechvatal et al., “A statistical test suite for random and pseudorandom number generators for cryptographic applications,” Special Publication NIST 800-22, National Institute of Standards and Technology, 2010.
- T. Addabbo, M. Alioto, A. Fort, and A. Pasini, “A class of maximum-period nonlinear congruential generators derived from the Renyi chaotic map,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 54, no. 4, pp. 816–828, 2007.
- X. Wang, X. Qin, and L. Teng, “A novel true random number generator based on mouse movement and a one-dimensional chaotic map,” Mathematical Problems in Engineering, vol. 2012, Article ID 931802, 9 pages, 2012.
- X.-Y. Wang and X. Qin, “A new pseudo-random number generator based on CML and chaotic iteration,” Nonlinear Dynamics, vol. 70, no. 2, pp. 1589–1592, 2012.
- Y. Deng, H. Hu, W. Xiong, N. N. Xiong, and L. Liu, “Analysis and design of digital chaotic systems with desirable performance via feedback control,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 45, no. 8, pp. 1197–1200, 2015.
- M. Francois, T. Grosges, D. Barchiesi, and R. Erra, “Pseudo-random number generator based on mixing of three chaotic maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 4, pp. 887–895, 2014.
- Y. Wang, Z. Liu, J. Ma, and H. He, “A pseudorandom number generator based on piecewise logistic map,” Nonlinear Dynamics, vol. 83, no. 4, pp. 2373–2391, 2016.
- M. A. Murillo-Escobar, C. Cruz-Hernandez, L. Cardoza-Avendano, and R. Mendez-Ramirez, “A novel pseudorandom number generator based on pseudorandomly enhanced logistic map,” Nonlinear Dynamics, vol. 87, no. 1, pp. 407–425, 2017.
- Y. Liu and X. J. Tong, “A new pseudorandom number generator based on complex number chaotic equation,” Chinese Physics B, vol. 21, no. 9, Article ID 090506, 2012.
- X. Tong and M. Cui, “Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation,” Science China Information Sciences, vol. 53, no. 1, pp. 191–202, 2010.
Copyright © 2019 Xuan Huang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.