Please wait a minute...

Current Issue

    25 March 2013, Volume 34 Issue 3
    academic paper
    Robust beamforming based on the worst-case performance optimization with positive semi-definite constraints
    Ding-jie XU,Rui HE,Feng SHEN
    2013, 34(3):  1-5.  doi:10.3969/j.issn.1000-436x.2013.03.001
    Asbtract ( 154 )   HTML ( 1)   PDF (247KB) ( 268 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the robust adaptive beamforming problem of the gen l signal models, a robust beamforming algorithm based on the worst-case performance optimization with positive semi-definite constraints was proposed. A simple robust adaptive beamformer was derived by modeling and transforming. Not only an approximate closed-form solution to the optimal weight vector was derived with low complexity, but also the performance improvement could be obtained. The final simulation attests its effectiveness and correctness.

    Construction and count of resilient rotation symmetric Boolean functions with prime number variables
    Jiao DU,Qiao-yan WEN,Jie ZHANG,Shan-qi PANG
    2013, 34(3):  6-13.  doi:10.3969/j.issn.1000-436x.2013.03.002
    Asbtract ( 147 )   HTML ( 2)   PDF (263KB) ( 331 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The characteristic matrix of the resilient rotation symmetric Boolean functions(RSBF) with prime number va-riables were explored. Some properties about character ic matrix of them were given. A necessary and sufficient condi-tion on the construction of resilient RSBF with prime number variables was derived. So construction and count formula of all the resilient RSBF with prime number variables were determined by this way. At last, all the resilient RSBF with 3, 5 or 7 variables were given.

    Local density-based similarity matrix construction for spectral clustering
    Jian WU,Zhi-ming CUI,Yu-jie SHI,Sheng-li SHENG,Sheng-rong GONG
    2013, 34(3):  14-22.  doi:10.3969/j.issn.1000-436x.2013.03.003
    Asbtract ( 282 )   HTML ( 6)   PDF (350KB) ( 758 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to local and global consistency characterist points'distribution, a spectral cluster-ing algorithm using local density-based similarity matrix construction was proposed. Firstly, by analyzing distribution characteristics of sample data points, the definition of local density was given, sorting operation on sample point set from dense to sparse according to sample points'local density was did, and undirected graph in accordance with the designed connection strategy was constructed; then, on the basis of GN algorithm's thinking, a calculation method of weight matrix using edge betweenness was given, and similarity matrix of spectral clustering via data conversion was got; lastly, the class number by appearing position of the first eigengap maximum was determined, and the classification of sample point set in eigenvector space by means of classical cluster g method was realized. By means of artificial simulative data set and UCI data set to carry out the experimental tests, show that the proposed spectral algorithm has better cluster-ing capability.

    Network traffic prediction based on FARIMA-GARCH model
    Shuang-mao YANG,Wei GUO,Wei TANG
    2013, 34(3):  23-31.  doi:10.3969/j.issn.1000-436x.2013.03.004
    Asbtract ( 281 )   HTML ( 8)   PDF (357KB) ( 272 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The volatility and self-similarity features of network traffic poses great cha lenge to network traffic prediction. For this purpose, a novel network traffic prediction scheme based on FARIMA-GARCH model was formulated. A novel method was used to get a zero-mean traffic series by a piecewise two-way CUSUM detection algorithm. Then the fraction difference order was evaluated with precision by the presented bounded search method. After obtaining the model para-meters, the prediction algorithm was conducted by using FARIMA-GARCH model. Compared with the traditional me-thod, the limited search method reduces the evaluated error despite a slight computational cost. Then simulation was car-ried out to verify the accuracy of proposed algorithm with real network traffic. The proposed prediction method keeps the same time complexity with the FARIMA model prediction method, and the simulation result shows that the root mean-square error and relative root mean-square error, which closely resemble the RBF prediction method, is less than FARIMA model prediction method. And the interval estimation and volatility prediction performance is excellent.

    Trustworthy component model supporting networks reconfiguration
    Bo YUAN,Bin-qiang WANG,Dong-chao MA
    2013, 34(3):  32-43.  doi:10.3969/j.issn.1000-436x.2013.03.005
    Asbtract ( 254 )   HTML ( 0)   PDF (528KB) ( 257 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on principles of the separation of concerns and the dynamic software architecture (DSA) technology, a component model named TCM(trustworthy component model)was proposed. Formation and assemblage of components were analyzed, then a trustworthy data security sealing mechanism was proposed. By sealed the data, the TCM not only support reconfiguring components, but also prevent component hostility operation, which can destroy the data transmis-sion. A container prototype was implemented, and experimental applications were implemented to validate this approach. The results show that this model can change the topology of components and find out the hostility components, which improve the trustworthy of reconfigurable flexible network node.

    Connection status aware cost efficient message transmission mechanism in opportunistic networks
    Da-peng WU,Pu-ning ZHANG,Ru-yan WANG
    2013, 34(3):  44-52.  doi:10.3969/j.issn.1000-436x.2013.03.006
    Asbtract ( 235 )   HTML ( 6)   PDF (321KB) ( 372 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel connection status aware cost efficient message transmission mechanism (CSAMT) was proposed. The presented mechanism constructed a dynamic temporal graph matrix based on historical data stored in the cache of the peers to estimate the connection status. Furthermore, the delay, delivery ratio and overhead together were selected as ob-ject optimizing parameters, and then the preferable relay peers could be distributively chosen by adopting equalization and quantification schemes proposed. Numerical results show that CSAMT mechanism can efficiently reduce overhead for more than 48% while the message delivery ratio and latency are improved also.

    Direction-of-arrival estimation performance analysis of the rank reduction estimator in the presence of finite samples
    Ding WANG,Hui YAO,Ying WU
    2013, 34(3):  53-67.  doi:10.3969/j.issn.1000-436x.2013.03.007
    Asbtract ( 213 )   HTML ( 0)   PDF (708KB) ( 181 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The DOA estimation performance of the rank reduction estimator(RARE) in the case of finite samples was studied. Based on the perturbation theorem associated with the orthogonal projection matrix of the signal (or noise) sub-space, the first-order and second-order formulas for the DOA estimation errors of the RARE wer derived. Then, the closed-form expressions for mean square error (MSE), bias and direction finding (DF)success probability of the RARE were presented. A variety of numerical experiments concerning some important RARE are conducted to verify the theo-retical analysis.

    Occluded building height estimation from single HR SAR image based on an iterative model matching technique
    Li-bing JIANG,Zhuang WANG,Lin LEI,Wen-xian YU
    2013, 34(3):  68-75.  doi:10.3969/j.issn.1000-436x.2013.03.008
    Asbtract ( 243 )   HTML ( 6)   PDF (188KB) ( 229 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the analysis of occluded buildings in high resolution SAR images, a novel method for occluded building height estimation was proposed. First, a projection model for SAR building signature prediction from a 3D pa-rametric model was constructed. Second, a likelihood function for SAR building signature evaluation was formulated. Finally, the parametric models with different height parameters were evaluated with the actual SAR image by the likelih-ood function. The estimated building height corresponded to the parametric model which reached a maximum likelihood value. Comparative experimental results show that the proposed method is more effective in estimating building height even under partial occlusion.

    Research on routing protocol of vehicular delay-tolerant networks
    Hai-tao JIANG,Hong ZHANG,Qian-mu LI
    2013, 34(3):  76-84.  doi:10.3969/j.issn.1000-436x.2013.03.009
    Asbtract ( 206 )   HTML ( 1)   PDF (329KB) ( 408 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the movement model similarity evaluation scheme (MMSE), a movement range oriented forwarding and dynamic multi-copies routing protocol (MROFDM) was proposed in vehicular delay-tolerant networks. With the si-milarity among the movement models and the local real-time information of vehicles, this protocol sended packets to the movement scope of destination node. At the same time, copy equilibrium strategy was used to dynamically adjust copy number of different types of packets. MROFDM with some existing multi-copies routing protocols were compare in simulation. The simulation results verify the performance advantage of MROFDM, and show the adaptability of MROFDM with different proportions of movement models.

    Breaking the HFEM public key scheme
    Chun-sheng GU
    2013, 34(3):  85-89.  doi:10.3969/j.issn.1000-436x.2013.03.010
    Asbtract ( 249 )   HTML ( 0)   PDF (212KB) ( 322 )   Knowledge map   
    References | Related Articles | Metrics

    To design post-quantum public key cryptography, Zhao,et al presented a novel public key scheme based on the BMQ problem. An equivalent secret key could directly be solved from the public key of their scheme by applying the property of the ergodic matrix over finite field. Thus, the HFEM public key scheme was broken.

    Transmission scheme and capacity analysis of onboard multi-antenna system in high-speed train
    Wan-tuan LUO,Xu-ming FANG,Meng CHENG,Xiang-juan ZHOU
    2013, 34(3):  90-98.  doi:10.3969/j.issn.1000-436x.2013.03.011
    Asbtract ( 226 )   HTML ( 0)   PDF (481KB) ( 621 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the three-dimensional modeling of line-of-sight SIMO (single-input multiple-output) channel for high-speed railway, which adopts uniform linear receiving array, the channel capacity of N -group receiving arrays was analyzed. The combining capacity grows but vibrates near base station and falls to Shannon capacity quickly. Instead of increasing group numbers of receiving arrays simply, stable capacity can be obtained by adjusting array parameters, grouping arrays and changing array weights among groups. The computer simulation results illustrate that proper setting would get stable channel capacity and avoid oscillation when the train is passing through the base stations.

    Frequency domain channel estimation and equalization for distri-buted STBC-SC-FDE systems with amplify-and-forward relaying
    Yong-chuan WANG,Zi-li CHEN
    2013, 34(3):  99-104.  doi:10.3969/j.issn.1000-436x.2013.03.012
    Asbtract ( 268 )   HTML ( 1)   PDF (319KB) ( 149 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Frequency domain channel estimation and equalization w ied for D-STBC-SC-FDE systems with ampl-ify-and-forward relaying over frequency-selective fading channels, and a training-based least-squares channel estima-tion algorithm was proposed. The proposed algorithm ca estimate simultaneously both the direct channel S? D and the cascaded channel S? R? D at destination terminal assisted by Chu sequences, and can achieve the minimum mean square error. Monte Carlo simulation results confirm the proposed gorithm is correct and the available channel transmitting power allocation strategy affects the performance of channel estimation and equalization to a certain ex-tent.

    IDS alert clustering algorithm based on chaotic particle swarm optimization
    Xiao-bo XU,Qin-qin JIANG,Kang-feng ZHENG,Bin WU,Yi-xian YANG
    2013, 34(3):  105-110.  doi:10.3969/j.issn.1000-436x.2013.03.013
    Asbtract ( 261 )   HTML ( 1)   PDF (196KB) ( 582 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the quality of alerts in intrusion detection system (IDS) and reduce the large number of redundant alarms, an IDS alerts clustering algorithm based on chaotic particle swarm optimization was proposed.It made the motion of particles with characteristics of chaos,so as to make particles move between the state of chaos and stable, and gradually close to the optimal value. The CPSO algorithm could overcome the problem of premature and local opti-mization, and take the center of cluster to find the global optimal solution. The analysis and experiment show that the al-gorithm can significantly reduce the number of alerts improve its quality, and has a high detection rate and low false detection rate.

    Constructing fair-exchange protocols for cloud computing
    Cai-hui LAN,Cai-fen WANG
    2013, 34(3):  111-118.  doi:10.3969/j.issn.1000-436x.2013.03.014
    Asbtract ( 203 )   HTML ( 0)   PDF (262KB) ( 387 )   Knowledge map   
    References | Related Articles | Metrics

    The existing fair-exchange protocols can't be run in cloud servers, because the user's data aren't stored in local computers, but be escrowed to ‘clound'. An anonymous conditional proxy re-encryption scheme was constructed and its security was proved in random oracle model based on modified decisional bilinear Diffie-Hellman problem. At the same time, a fair-exchange protocol based on their scheme was designed, it can be employed when two users exchange their data information in cloud.

    Technical Report
    Agent-based dynamic spectrum trading algorithm in cognitive radio network
    Shi-bing ZHANG,Guo-dong ZHANG,Zhi-hua BAO
    2013, 34(3):  119-125.  doi:10.3969/j.issn.1000-436x.2013.03.015
    Asbtract ( 223 )   HTML ( 2)   PDF (293KB) ( 570 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the benefits generated by spectrum sharing, the spectrum management was studied and the agent-based dynamic spectrum trading algorithm was proposed. In the algorithm, the agent was used as a medium for spectrum trading, which reduced the huge system overhead among multi-primary service providers (PSP) and mul-ti-secondary users (SU). All PSP competed or cooperated with each other to achieve the maximum self-profit or total profit respectively, and come to terms with the agents on the final transaction price and quantity of spectrum. And then, the agent auctioned the spectrum among all SU. Each SU submitted a bid to the agent, then the agent allocated corres-ponding spectrum quantity to the SU. All SU adaptively adjusted the bids to achieve the maximum self-profit. Nash equi-librium was considered as the solution to both the game among PSP and the auction among SU. Simulation results show that the proposed algorithm performs well.

    Design and implementation: an open and reconfigurable router architecture with different network system supported
    Ze-xin LU,Xiao-zhe ZHANG,Shi-cong MA,Bao-sheng WANG
    2013, 34(3):  126-133.  doi:10.3969/j.issn.1000-436x.2013.03.016
    Asbtract ( 210 )   HTML ( 0)   PDF (265KB) ( 221 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Targeted the problems of current network device on supporting reconfigurable functions and multiple new network architectures, a novel open and reconfigurable router architecture was proposed to support the coexistence of multiple network architecture in one router. virtualization and hardware partition technology were used to divide a router hardware into multiple logical router instances, assured logical router instances that did not effect each other.

    Jointed LDPC codes design for half-duplex relay channels
    Zi-qiang CHEN,Shan OUYANG,Hai-lin XIAO,Yue-lei XIE
    2013, 34(3):  134-140.  doi:10.3969/j.issn.1000-436x.2013.03.017
    Asbtract ( 215 )   HTML ( 0)   PDF (282KB) ( 153 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to increase the coding gain of decode-and-forward half-duplex relay channel, a jointed LDPC coding structure and its corresponding optimization scheme was proposed. Novel structure made the subcodes of both source and relay nodes as parts of the overall code. Using the messages from the source and the relay, the destination could decode the information of the source and relay nodes simultaneously. To analyze the asymptotic coding gain of jointed LDPC codes, the iterative decoding convergence condition was derived in AWGN channel. Combining the iterative decoding convergence condition and the degree distribution constraint, the optimization problem of the jointed LDPC code degree distribution was presented. The simulation results show that jointed LDPC codes outperform both BE-LDPC codes and SP codes.

    Automatic generating regular expression signatures for real network worms
    Yong TANG,Jian-wei ZHUGE,Shu-hui CHEN,Xi-cheng LU
    2013, 34(3):  141-147.  doi:10.3969/j.issn.1000-436x.2013.03.018
    Asbtract ( 291 )   HTML ( 3)   PDF (284KB) ( 426 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A practical worm regular expression of automatic extraction method was presented,which involves four steps:sample collection from worm propagation, signature tre generation, removal of high false-positive signatures, and sig-nature merging. The advantage of this method is that it can directly output expression signature with the rich syntax of“.*”, “.{k}”, “|”, “(c){k}”. Based on the honeypot system Honeybow deployed in Internet, the method was implemented and evaluated by several in-wild worms under real Internet environment. The experiment results show that the method can generate accurate regular expression signatures for real worms and is promising for the applications of automatic analysis of worms and malwares.

    Perfectly blind image watermarking scheme with multi-purpose based on region segment for sub-block and self-embedding technology
    Tian-yu YE
    2013, 34(3):  148-156.  doi:10.3969/j.issn.1000-436x.2013.03.019
    Asbtract ( 250 )   HTML ( 4)   PDF (305KB) ( 428 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A perfectly blind image watermarking scheme with multi-purpose was proposed through region segment for sub-block and self-embedding technology, which could achieve copyright identification and content authentication only with the help of an attacked image. The original image was split into non-overlapping blocks, and each block was con-ducted with discreet cosine transformation. Each block's discreet cosine transformation matrix was divided into region 1 and region 2. Then, after the region 1 was conducted with singular value decomposition,a feature watermark was derived from judging the parity of the first digit from average of singular values. Moreover, the feature watermark was self-embedded into region 2 by adjusting two discreet cosine transformation alternative current coefficients. Finally, a watermarked image was obtained after conducting inverse discrete cosine transformation on each block. The proposed algorithm achieved perfectly blind detection and multi-purpose by combining self-embedding feature watermark from re-gion 1 into region 2 and blindly extracting authentication watermark n region 2. Experimental results show that the pro-posed algorithm can achieve both copyright protection and content authentication, and has the ability to distinguish mali-cious tamper and unintentional tamper.

    Representation and termination analysis for ECA rules based on extended Petri net
    Li-chen ZHANG,Xiao-ming WANG,Wen-yang DOU
    2013, 34(3):  157-164.  doi:10.3969/j.issn.1000-436x.2013.03.020
    Asbtract ( 229 )   HTML ( 1)   PDF (229KB) ( 315 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the accuracy of the termination an lysis on ECA rules, a novel representation model (EPN, extended Petri net) of ECA rules was built. Based on the EPN, an effective termination decision algorithm was discussed and proposed. By using plenty of information about the rule characteristics in EPN, the proposed termination algorithm could comprehensively analyze the influence on the termination analysis. The theoretical analysis and experimental re-sults show that the proposed algorithm has higher accuracy and lower time complexity.

    Academic communication
    Lossless sharing visual cryptography
    Bin YU,Zheng-xin FU
    2013, 34(3):  165-170.  doi:10.3969/j.issn.1000-436x.2013.03.021
    Asbtract ( 236 )   HTML ( 1)   PDF (204KB) ( 472 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the information loss during the secret image sharing process, the lossless sharing visual crypto-graphy was proposed. The optimizations of two parameters were simplified into one parameter. The matrices translation algorithm and the integer programming model were designed. Furthermore, the pixel expansion optimization algorithm was realized. The experimental results show that the algorithm achieves the optimal pixel expansion under lossless shar-ing, and can be used in general access structure.

    Two open problems about the liner structure of rotation symmetric Boolean functions
    Ya-qun ZHAO,Xu LI
    2013, 34(3):  171-174.  doi:10.3969/j.issn.1000-436x.2013.03.022
    Asbtract ( 208 )   HTML ( 3)   PDF (148KB) ( 187 )   Knowledge map   
    References | Related Articles | Metrics

    One open problem that the balanced rotation symmetric Boolean functions with degree n? 1 on even number of variables have no non-zero linear structure was proved. A sufficient and a necessary condition were respectively given when another open problem that the rotation symmetric ean functions with degree n? 2 on odd number of va-riables have no non-zero linear structure succeed or not.

    Novel restructuring method for CP-based LS channel estimation in OFDM system
    Wang-xing ZHAO,Qun WAN,Zhang-xin CHEN
    2013, 34(3):  175-182.  doi:10.3969/j.issn.1000-436x.2013.03.023
    Asbtract ( 399 )   HTML ( 11)   PDF (444KB) ( 316 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A restructuring method for least square (LS) channel est ation using cyclic-prefix frequency sequences (CPFS) in orthogonal frequency division multiplexing (OFDM) system was proposed. The restructuring method was based on the relationship of CPFS and comb-pilots which made a higher LS channel estimation precision. Specifically, the relationship used a convex optimization model, the model was set up using total sub carriers as variable and mi-nimized mean square error (MSE) as the principle to generate constraint, where further the optimized restructuring result using Lagrange method was derived. Simulations verify that under the restructured total sub carriers CPFS can enhance the LS channel estimation precision.

    Three-dimensional spherical model based XML communication protocols security evaluation method
    Hong-yu YANG,Jin-bo YU,Li-xia XIE
    2013, 34(3):  183-191.  doi:10.3969/j.issn.1000-436x.2013.03.024
    Asbtract ( 230 )   HTML ( 0)   PDF (335KB) ( 206 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problems of security assessment in XML communication protocols, a novel three-dimensional spherical model based protocol security evaluation method was proposed. Firstly, a three-dimensional security evaluation index system was constructed through positions of indexes on the spherical shell. Secondly, by using the coordinate's projection area as a measure criterion, evaluation indexes' weights of the first level and the second level were obtained with the analytic hierarchy process (AHP), the sphere and the sector angle. Thirdly, security components values of XML communication protocol were calculated in the aspects of XML's content, communication load and security vulne-rability. Finally, the security evaluation result of XML communication protocol was achieved through quantization calcu-lation and further comprehensive analysis. Experimental results show that this method is competent for the protocol secu-rity evaluation and meets security evaluating requirem L communication protocols effectively.

    Light intensity, spectrum and polarization information fusion based underwater object detection
    Zhe CHEN,Hui-bin WANG,Jie SHEN,Li-zhong XU
    2013, 34(3):  192-198.  doi:10.3969/j.issn.1000-436x.2013.03.025
    Asbtract ( 307 )   HTML ( 3)   PDF (243KB) ( 696 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Difficulties and high computational costs in the model establishmen and parameter estimation seriously de-graded the efficiency of the underwater object detection system, making them too cumbersome to the practical work. A noval light intensity, spectrum and polarization feature fusion method was proposed. This method directly introduces the prior underwater knowledge into the system for feature fusion, getting rid of the harassment of the image preprocessing. Experiments prove that this method by comparison can achieve more reliable results at the lower computational cost.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: