Please wait a minute...

Current Issue

    25 January 2011, Volume 32 Issue 1
    Papers
    Delay-constrained and jitter-optimized traffic allocation for multipath routing in wireless mesh networks
    Zhi-gang CHEN,Feng ZENG,Qing-hua LI
    2011, 32(1):  1-8.  doi:1000-436X(2011)01-0001-08
    Asbtract ( 0 )   HTML ( 2)   PDF (133KB) ( 290 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to improve the QoS for multimedia application,which focused on the delay-constrained and jitter-optimized traffic allocation problem in multipath rout ng.First of all,based on the network calculus theory,a deep analysis on the upper bound of delay in the single route transmission was dore,and deduce the upper bound formulation of delay and jitter in multiple route transmission,and find out the maximum income rate satisfying the delay constraint for a route.Then,based on the upper bound of delay and jitter,a delay-constrained and jitter-optimized traffic allocation algorithm DCJOTA was proposed,which distributes the traffic to a route in proportion to its maximum income rate,and does some adjustment to optimize the jitter.At last,implement methods of DCJOTA were given to run in NS2,and simulation is done.Experimental results show that the DCJOTA embedded multipath ing protocol DCJO-AOMDV outperforms AOMDV at the term of end-to-end delay and jitter.Compared with AOMDV,DCJO-AOMDV has made the end-to-end delay and jitter decreased by 3.9% and 24.5% respectively.But,DCJOTA puts a litter complexity on the routing protocol,which leads to the network throughput decreased by 1.7% in DCJO-AOMDV.

    Management scheme for autonomic load balancing of TD-SCDMA wireless access network
    Heng ZHANG,Xue-song QIU,Luo-ming MENG,Zhi-peng GAO,Xi-dong ZHANG
    2011, 32(1):  9-19.  doi:1000-436X(2011)01-0009-11
    Asbtract ( 0 )   HTML ( 0)   PDF (298KB) ( 49 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new autonomic load balancing management scheme —game theoretic diffluence autonomic load balance scheme (GDALB) was proposed based on autonomic managem techniques and game theory.It is proved that the key algorithms are convergent and the optimum local solution can be gained.Simulation results show that,comparing with existing schemes,GDALB causes larger system capacity,and can address problems such uncontrollable overlap area;held back of balance action caused by handover scheme.

    Performance analysis of uplink CDM A cellular systems based on the large system method
    Kai YU,Ping-zhi FAN,Li HAO
    2011, 32(1):  20-26.  doi:1000-436X(2011)01-0020-07
    Asbtract ( 92 )   HTML ( 0)   PDF (242KB) ( 47 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The performance of uplink of CDMA cellular systems with large and small scale fading was investigated based on the large system analysis.The intra-cell multiple access interference was firstly analyzed as well as the inter-cell interference.Then the signal to interference and noise rat d,the result of which was only dependent on the cell load,user power and channel coefficient.Finally,the bit error rate,throughput and spectrum efficiency were analyzed,which were confirmed by simulations.The simulation results show that as the cell load increases,the bit error rate increases and the throughput decreases.However,the spectrum efficiency increases monotonously.

    Reliable steganalysis of color images based on color gradient sequence
    Ke QI,Da-fang ZHANG,Dong-qing XIE
    2011, 32(1):  27-36.  doi:1000-436X(2011)01-0027-10
    Asbtract ( 83 )   HTML ( 1)   PDF (182KB) ( 490 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the difference between the vibrations of color gradient orientation sequences and color gradient sum sequences of stego images and those of images without iding message,a novel reliable steganalysis of color images was presented which major in the analysis of these two categories of color gradient sequences,which could distill the differences of the vibrations of them.The Hilbert-Huang transform based characteristic vectors were constructed and the SVM classifier was used to classification.The experimenta results have shown that the proposed method realizes the reliable steganalysis of color images with higher correct rate,shorter vectors and lower false positive rate comparing with trad itional color image steganalysis algorithms.

    Service selection approach for enhancing trustworthiness of Web service
    Sheng-hui ZHAO,Guo-xin WU,Gui-lin CHEN,Hai-bao CHEN
    2011, 32(1):  37-45.  doi:1000-436X(2011)01-0037-09
    Asbtract ( 72 )   HTML ( 0)   PDF (149KB) ( 69 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Making use of the game theory,a model of service selection based on Nash bargaining solution was build,and an approach for enhancing Web service trustworthiness was proposed.A bargaining algorithm is designed between service sides of both complete rationality,through adjusting service price,to achieve maximum utility for both service requestor and provider,and increase the success rate of transactions and service trustworthiness.Results of experiments show that,on the basis of the game that according to ity of service,reputation and security between service provider and requestor,the service selection can promote the establishment of trustable service computing environment and enhance credibility of the service.

    New family of binary sequences with 4-valued correlation and large linear span
    Jun CHEN,Xiao-hu TANG,Yun CHEN,Zhen WU
    2011, 32(1):  46-51.  doi:1000-436X(2011)01-0046-06
    Asbtract ( 69 )   HTML ( 0)   PDF (98KB) ( 207 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Let n,m,and r be three positive integers with n=4m and r=2m-1-1.Based on Niho’s sequences set and d-form function,a new family S(r)of binary sequences with 4-valued low correlation was proposed.This new family contains 2nsequences of period 2n-1 with maximal nontrivial correlation value 2(n+2)/2+1.By using key’s method,the linear spans of the sequences family was lower bounded by n(2n/2-3+2).Compared with the best known sequences family constructed by Jiang Wen-feng et al,the new family has not only the same correlation values and family size,but also has much larger linear span.

    Theory and system research of communication with tracking and pointing function for hunter robot
    Yang YU,Fu-hong MIN,Xiao-wu NI,Hong-chao ZHANG
    2011, 32(1):  52-58.  doi:1000-436X(2011)01-0052-07
    Asbtract ( 81 )   HTML ( 0)   PDF (227KB) ( 143 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Eye-hole wave communication frame was proposed first time.Tracking and pointing model of communication was put forward.New era of short distance optical communication was pioneered.Acguisition method of beaconing light was researched and acquisition time was computed.Two dimension pointing error normal distribution and rayleigh distribution were simulated.Dithering Rician distribution of target pointing was simulated.Attenuation losing formula of receiving len’diaphragm detection was calculated and simulated.Three dimension pointing error normal distribution and rayleigh distribution were proposed.Three dimension rayleigh fold dithering distribution was proposed.Simulation results are computed and the results is shown.The concept of eye-hole wave communication is proposed first time.The two dimension and three dimension theory model of tracking/pointing dithering problem of robot are put forward and attenuation model is presented also.

    Research on wormhole attacks in wireless mesh networks
    Ying-fang FU,Xing ZHANG,Ting ZHANG,Liang-yu LUAN
    2011, 32(1):  59-65.  doi:1000-436X(2011)01-0059-07
    Asbtract ( 79 )   HTML ( 2)   PDF (117KB) ( 136 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to detect the wormhole attacks effectively in wireless mesh network,a wormhole attack model according to the MR-LQSR (multi-radio link-quality source routing) protocol proposed by Microsoft was presented.Then,the characteristics of wireless mesh networks and wormhole attack were considered,a wormhole attack detection scheme for wireless mesh networks based on a combination of techniques,such as wormhole attack detection algorithm based on end-to-end,distributed voting,guard detection scheme and identity-based cryptosystem was proposed.Through theory analysis and experiments,the wormhole attack detection scheme not only can detect the wormhole attacker effectively but also improve the security of wireless mesh network.

    Reinforcement learning algorithm based on minimum state method and average reward
    Quan LIU,Qi-ming FU,Sheng-rong GONG,Yu-chen FU,Zhi-ming CUI
    2011, 32(1):  66-71.  doi:1000-436X(2011)01-0066-06
    Asbtract ( 62 )   HTML ( 2)   PDF (141KB) ( 613 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In allusion to the problem that Q-Learning,which was used discount reward as the evaluation criterion,could not show the affect of the action to the next situation,AR-Q-Learning was put forward based on the average rew ard and Q-Learning.In allusion to the curse of dimensionality,which meant that the computational requirement grew exponentially with the number of the state variable.Minimum state method was put forward.AR-Q-Learning and minimum state method were used in reinforcement learning for Blocks World,and the result of the experiment shows that the met hod has the characteristic of aftereffect and converges more faster than Q-Learning,and at the same time,solve the curs e of dimensionality in a certain extent in Blocks World.

    Domain of interests clustering algorithm based on users'preferred topics
    Wei-hua GONG,Liang-huai YANG,Rong JIN,Wei-long DING
    2011, 32(1):  72-78.  doi:1000-436X(2011)01-0072-07
    Asbtract ( 65 )   HTML ( 0)   PDF (160KB) ( 167 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem of users' preferences changing frequently,an iterative computing method was presented to gain the weights of users' preferences as time goes.A bipartite graph was constructed to show the relations of users' interests and topic classes.On this base,a novel topic-based clustering (TBC) algorithm was proposed to group the nearest neighbors according to users' interests,which had changed the usual hard partition method meaning “one or the other” for the clustering items.And the partitioned domains of users' interests based on multiple topics was also established by the algorithm,which not only fully profiled users' interests and the relations of topics indirectly reflected in different domains,but also could adaptively track the changes of users' interests.Experimental results show that TBC method has better declustering outcome of users'interests than both the traditional K-Means algorithm and FCM method belonged to the soft clustering,and the TBC algorithm also has higher recommendat quality and better efficiency in personalized recommender services.

    Researches on role-based middleware in wireless sensor networks
    Juan LUO,Chuan-li GU,Ren-fa LI
    2011, 32(1):  79-86.  doi:1000-436X(2011)01-0079-08
    Asbtract ( 59 )   HTML ( 0)   PDF (145KB) ( 128 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the diversity and difference of the role played by nodes in WSN,the role mapping framework model in WSN was proposed.A role-based middleware for wireless sensor networks(RobMSN) was designed based on that model.From the view of the formal semantics and specifications of the middleware,the role mapping specifications solve the problem of semantic conflicts in role mapping abstract,making the role mapping context fully reflected in the role specifications of middleware.Applications will be mapped as the specific roles of node which played in the wireless sensor networks using RobMSN,it can be cross-platform and implement dynamic application services.Finally,an application development example was used to illustrate the design and development process of RobMSN middleware.

    Improved and efficient EM channel estimation algorithm for MIMO-OFDM systems
    Peng XU,Jin-kuan WANG,Feng QI
    2011, 32(1):  87-93.  doi:1000-436X(2011)01-0087-07
    Asbtract ( 49 )   HTML ( 0)   PDF (254KB) ( 257 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For multiple-input multiple-output with orthogonal frequency division multiplexing (MIMO-OFDM) systems,the error floor (EF) phenomenon at high signal noise rate (SNR) was induced by the expectation maximum (EM) channel estimation algorithm.In addition,the data transmission efficiency was declined obviously with the increasing number of transmit antennas.According to these problems,an improved and efficient EM channel estimation algorithm was proposed.Firstly,an accurate and equivalent signal model was introduced to derive a modified EM algorithm,which improved the estimation performance at high SNR.Next,to enhance the data transmission efficiency and further the estimate performance of the proposed algorithm,phase orthogonal pilots sequences and joint estimation were carried out over multiple OFDM symbols respectively.Simulation results show that the proposed algorithm has better estimation performance and higher data transmission efficiency.

    Research on verification of behavior requirement patterns based on action sequences
    Jun-wei DU,Zhong-wei XU,Feng JIANG
    2011, 32(1):  94-105.  doi:1000-436X(2011)01-0094-12
    Asbtract ( 45 )   HTML ( 1)   PDF (246KB) ( 100 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Function behavior requirements (FBR) and safety behavior requirements (SBR)were described by action sequences. Compared with the traditional logic or graphic form,action sequences can express the temporal relationship among interactive behaviors more exactly.Moreover,FBR pattern and SBR pattern are constructed by action sequences,and the operation semantics of these patterns are also given.To implement the requirement verification based on behavior patterns,the necessary and sufficient conditions as well as the checking algorithm for the satisfiability of FBR pattern and SBR pattern are presented and proven by redefining the property expression and combination operation of LTS's safety and liveness. The framework has been widely applied in the formal verification & validation of component-based CTCS2/3 systems,and has shown great theoretical and practical significance to combinational verification of Component-based safety-critical systems.

    Technical Reports
    Immune computing-based base station location planning in the TD-SCDMA network
    Si-feng ZHU,Fang LIU,Zheng-yi CHAI
    2011, 32(1):  106-110.  doi:1000-436X(2011)01-0106-05
    Asbtract ( 121 )   HTML ( 13)   PDF (123KB) ( 350 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To reduce the cost of TD-SCDMA network construction,a solution of base station location planning problem based on immune computing was proposed.The difficulties of TD-SCDMA base station construction and the principle of location planning were expound,clonal multiplication operator,clonal mutation and clonal selection operator with real-number encoding were designed,the framework of immune memory clonal algorithm for base station location planning problem was given,and simulation experiments were done to validate the proposed algorithm.Experimental result shows that the proposed solution can obtain higher network coverage rate with lower cost of network construction relatively,and has the advantage of good application value.

    ODC:a method for online detecting &classifying network-wide traffic anomalies
    Ye-kui QIAN,Ming CHEN,Qiang HAO,Feng-rong LIU,Wen-zhong SHANG
    2011, 32(1):  111-120.  doi:1000-436X(2011)01-0111-10
    Asbtract ( 93 )   HTML ( 3)   PDF (267KB) ( 713 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A method for online detecting &classifying traffic anomalies (ODC for short) from a network-wide angle of view was put forward.This method constructed traffic matrix with a metric of traffic feature entropy incrementally,detected traffic anomalies online using incremental principal component analysis,and then classified traffic anomalies online using incremental k-means,from which network operators could benefit for taking corresponding countermeasures.Theoretical analysis and experiment analysis show that the method has lower storage and less computing time complexity,which could satisfy the requirements of real-time process.Analysis based on both measurement data from Abilene and simulation experiments demonstrate that the method has very good detection and classification performance.

    Research on intrusion detection based on an improved GHSOM
    Ya-hui YANG,Dian-bo JIANG,Qing-ni SHEN,Min XIA
    2011, 32(1):  121-126.  doi:1000-436X(2011)01-0121-06
    Asbtract ( 79 )   HTML ( 0)   PDF (77KB) ( 357 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel technique based on an improved growing hierarchical self-organizing maps (GHSOM) neural network for intrusion detection was presented.The improved GHSOM could deal with a metric incorporating both numerical and symbolic data,and then improved efficiency of intrusion detection.The validities and feasibilities of the improved GHSOM were confirmed through experiments on KDD Cup 99 datasets and simulated experiment datasets.The experiment results showes that the detection rate has been increased by employing the improved GHSOM.

    Comprehensire Review
    Survey and classification of network-on-chip
    Ya-ming YIN,Shu-ming CHEN
    2011, 32(1):  127-137.  doi:1000-436X(2011)01-0127-11
    Asbtract ( 46 )   HTML ( 1)   PDF (153KB) ( 246 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Formal description of NoC architectures and applications were provided,then enumerated several related research problems and clarified the relationship between them.They are classified as four categories:application modeling and optimizing,communication pattern,communication infrastructure,solution evaluation and verification.Problem description,proposed approaches and open problems of major issues are discussed.Finally,summarized the whole work and presented the perfect of the future.

    Correspondences
    Research on the diameter of bidirectional double-loop networks G(N;±1,±s)in cartesian coordinates
    Hui LIU,Mu-yun FANG,Xiao ZHENG,Ting-ting HANG
    2011, 32(1):  138-143.  doi:1000-436X(2011)01-0138-06
    Asbtract ( 47 )   HTML ( 0)   PDF (165KB) ( 187 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new method to research the diameter of the bidirectional double-loop networks G(N;±1,±s) was presented based on cartesian coordinates.Using this method,the limited bound of diameter of the bidirectional double-loop networks G(N;±1,±s) presented by Boesch and Wang was certified and the limited bound of average diameter was given.At last,the simulation of the graph of bidirectional double-loop networks G(N;±1,±s) for any given N,s was given.Compared whith L-shaped tile simulation which can not be used in the bidirectional double-loop networks directly,this method improved the research level of the bidirectional double-loop networks greatly.

    Research on communication signal modulation recognition based on the generalized second-order cyclic statistics
    Chun-hui ZHAO,Wei-chao YANG,Shuang MA
    2011, 32(1):  144-150.  doi:1000-436X(2011)01-0144-07
    Asbtract ( 58 )   HTML ( 3)   PDF (217KB) ( 151 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the problem that traditional second-order cyclic statistics significantly degenerate in the Alpha stable distribution noise,the concept of generalized second-order cyclic statistics was proposed.On the basis of studying the generalized second-order cyclic statistics of the selected communication gnals,the amplitudes of siganals' generalized second-order cyclic spectrum in specific frequencies and cyclic frequencies were extracted as the feature parameters,and the minimum error criterion was used as a classification a ithm to achieve modulation recognition.Simulation results show that the performance of this method is superior to the method based on traditional second-order cycle statistics in the Alpha stable distribution noise,moreover,this method has good performance in the Gaussian noise.

    Adaptive packet selection scheme and selective retransmission algorithm for Bluetooth
    Xue WANG,Zhi-hong QIAN,Bing LI,Yue LI
    2011, 32(1):  151-158.  doi:1000-436X(2011)01-0151-08
    Asbtract ( 114 )   HTML ( 0)   PDF (222KB) ( 621 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To improve the anti-jamming capability and transmission efficiency of Bluetooth,the retransmission mechanism was worked out for baseband layer and L2CAP layer.In baseband layer,the adaptive packet selection strategy was presented,which utilized the times of retransmission to evaluate the channel quality.The packet that satisfied the biggest throughput of the current channel was chosen dynamically according to the times of retransmission.In L2CAP layer,in view of the shortcomings that data frames su ssfully received need to be transmitted once more,the selective retransmission algorithm was proposed,depending on the unique characteristic that Bluetooth could support a number of logical channels.The algorithm combines the retransmission mode and flow control mode with no redundancy varieties, of the protocol.Simulations and performance analysis indicate that system throughput and transmission efficiency get promoted with decrease of communication delay.It is easy to implement the algorithm.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: