Please wait a minute...

Current Issue

    25 September 2012, Volume 32 Issue 9
    Academic paper
    Research of constructing trusted virtual execution environment based on trust extension
    Li-na WANG,Han-jun GAO,Rong-wei YU,Zheng-wei REN,Yong-feng DONG
    2011, 32(9):  1-8.  doi:1000-436X(2011)09-0001-08
    Asbtract ( 0 )   HTML ( 1)   PDF (986KB) ( 1304 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A method to build trusted virtual execution environment based on trust extension was proposed to ensure the integrity and security of virtual machine and service software.Firstly,to establish mapping of virtual PCR(vPCR)to hardware TPM's PCR,it would be realized to link the vTPM to its TCB.Secondly,using vTPM to issue certificate,trusted certificate chain could be extended.Because of trust extension from hardware to virtual platform,TPM functions(such as remote attestation,sealed storage,etc)were available to applications running in the virtual computing environment.Finally,a prototype system and the results show the system was effective in realizing sealed storage,remote attestation etc.

    Research on handoff control algorithm based on adaptive cell selection
    Xiu-rong MA,Hui-long ZHANG,Yuan BAI,Yun-xiang CHENG
    2011, 32(9):  9-17.  doi:1000-436X(2011)09-0009-09
    Asbtract ( 0 )   HTML ( 0)   PDF (898KB) ( 262 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at overcoming the shortages of the current handoff control algorithm,a channel reservation for priority handoff algorithm based on adaptive cell selection was proposed.According to the load in cells,it dynamically adjusts the pilot power to achieve the load balance between different cells and takes the system utility maximization for priority handoff based on reserved channels.The system utility was implemented by the model of multi-choice multidimensional knapsack algorithm,and the priority handoff based on reserved channels was implemented by the Markov queuing model.The simulation shows that the proposed algorithm has the better performance than the current channel reservation for priority handoff algorithm in the adjacent cells whose load is imbalance.When the degree of load imbalance is 6,blocking rate of voice calls and packet loss rate of data calls reduce 0.2% and 3% than the current algorithm,and the data packet average maximum waiting time reduces 0.15s than the current algorithm,and the average throughput increases 80kbit/s/cell/MHz in the maximum.

    Mobile agent fault-tolerant method based on ring detection & backup chain
    Yu-jun ZHANG,Hong-mei ZHANG,Chao MA,Zhi-jun XU,Han-wen ZHANG
    2011, 32(9):  18-25.  doi:1000-436X(2011)09-0018-08
    Asbtract ( 0 )   HTML ( 0)   PDF (812KB) ( 86 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The home agent(HA)fault-tolerant method was proposed based on ring detection & backup chain(DBCM)for mobile IPv6(MIPv6)networks.All HA in the same link were formed into the relationship of validation detection and information backup based on the deterministic ordering method.The latency of failure detection was reduced by validation detection among HA.Service transfer was fleetly implemented by the replica of registration information between neighboring home agents.The results of theoretical analysis and simulation show that our method has less service break time.Simulation results also show that our method has less application packets dropping ratio and global signal cost in the scenario that multiple home agents break down continuously.

    Resource allocation in OFDM fixed relay system with one relay multi-source
    Wei-dang LU,Xuan-li WU,Xue-jun SHA,Nai-tong ZHANG
    2011, 32(9):  26-32.  doi:1000-436X(2011)09-0026-07
    Asbtract ( 0 )   HTML ( 2)   PDF (701KB) ( 90 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By exploiting limited feedback from the base station,one fixed relay is able to help forward information of multiple sources in one OFDM symbol which can efficiently utilize the available bandwidth.To further improve the system capacity and reduce the outage probability,firstly the sub-carriers among the relays was adjusted.Then joint sub-carrier matching and power allocation scheme to maximize the channel capacity was proposed.Comparing with random sub-carrier matching algorithm and equal power allocation algorithm,the simulation results show that the scheme will greatly improve the system capacity and reduce the outage probability.

    Calculation of interval vectors of primitive σ-LFSR sequences
    Gang-min TAN,Guang ZENG,Wen-bao HAN,Na ZHANG
    2011, 32(9):  33-37.  doi:1000-436X(2011)09-0033-05
    Asbtract ( 80 )   HTML ( 1)   PDF (806KB) ( 149 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The equivalence between calculation of interval vectors of primitive σ-linear feedback shift register(σ-LFSR)sequences and calculation of discrete logarithms over finite field was proved,at the same time a calculation method for interval vectors of primitive σ-LFSR sequences was given.Then another calculation method for interval vectors of a class of primitive σ-LFSR sequences was obtained,which converted the calculation of discrete logarithms over finite field to its subfield and the complexity was much lower.

    Study on HAPS-CDMA sells up-link capacity with different positions and solution
    Si-qing YOU,Xiao-jun JING,Zhao-qun QI,Song-lin SUN
    2011, 32(9):  38-43.  doi:1000-436X(2011)09-0038-06
    Asbtract ( 114 )   HTML ( 0)   PDF (823KB) ( 273 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The effects of positions on HAPS-CDMA cells' up-link capacity were analyzed.The simulation results show that the far the cell is from the High Altitude Platform,the more interruption it suffers,so the capacity decreases more.Then a novel user access solution was presented to balance the capacities of different cells,namely the mechanisms of the signals from the users in the cells far from the HAPS which need larger capacity received by both of the terrestrial CDMA base station and the HAPS-CDMA base station.From numerical results it is observed that the algorithms can reduce the impact of the cell position on the capacity,and improve the system performance significantly.

    Identity based privacy preservation scheme for ubiquitous computing
    Da-wei LI,Geng YANG,Hong-yi SU,Yan-li CHEN,Zhen YANG
    2011, 32(9):  44-50.  doi:1000-436X(2011)09-0044-07
    Asbtract ( 99 )   HTML ( 0)   PDF (704KB) ( 192 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the privacy preservation of data transmission in ubiquitous computing,a privacy protected scheme based IBE cryptography and Shamir secret sharing was proposed.In the scheme,the public key was the ID of trusted field and the shares could be distributed during the broadcast channel.Any set of nodes satisfies the threshold can rebuilt the key of private session.The proposed scheme is IND-sID-CPA secure under random oracle model.Additionally,the scheme supports secure member expansion and has advantages in computation,storage and communication costs.

    Research on worm propagation model in IPv6 networks
    Fei SU,Zhao-wen LIN,Yan MA,Xiao-ming YANG
    2011, 32(9):  51-60.  doi:1000-436X(2011)09-0051-10
    Asbtract ( 111 )   HTML ( 1)   PDF (796KB) ( 496 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A wide variety of scanning strategies for IPv6 networks when a worm scans across subnets and inside subnets was investigated.A P2P-based mechanism for decreasing the repeated infection and implementing control strategies was discussed,and a new hybrid worm named NHIW,which can form large-scale propagation in IPv6 network,was also constructed.The NHIW can not only scan the worm randomly,but also can quickly obtain IP addresses of susceptible active hosts in the subnet as well.Furthermore,NHIW is able to prevent re-infection of the host.Through analyzing the delay in different stage of NHIW propagation and its propagation rate,a full NHIW propagation model TLWPM was established.Experimental results show that NHIW can form a flooding propagation in the IPv6 network.With respect to the features of NHIW,some relevant defense strategies were discussed finally.

    Multicell cooperative beamforming scheme based on channel correlation statistics and limited feedback
    Shi-wen HE,Yong-ming HUANG,Lv-xi YANG
    2011, 32(9):  61-67.  doi:1000-436X(2011)09-0061-07
    Asbtract ( 67 )   HTML ( 1)   PDF (743KB) ( 260 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to reduce the amount of information exchange between base stations (BS) and user feedback information required by multicell cooperative beamforming systems,an estimation algorithm of channel vector function was proposed by making jointly use of limited feedback channel parameters and channel spatial correlation matrix.Based on the estimated channel vector functions,a multicell cooperative extended zero-forcing beamforming algorithm was developed.Compared with the existing multicell cooperative algorithms,the proposed scheme achieves a better tradeoff between the feedback/backhaul overhead and the rate performance,which was verified by our numerical simulation results.

    Design and analysis of active queue management algorithm based on predictive control
    Ping WANG,Hong CHEN,Xiao-hui LU
    2011, 32(9):  68-76.  doi:1000-436X(2011)09-0068-09
    Asbtract ( 74 )   HTML ( 0)   PDF (905KB) ( 199 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Model predictive control as a novel active queue management(AQM)algorithm was proposed for Internet system with large delay,called MPAQM.Considering the causality of time-delay system,the predicted output was defined.Then,the control requirement was converted to the optimal control objective,and the drop probability was obtained by solving the optimal problem.Furthermore,the delay-independent stability condition of closed-loop system was derived,which gave the guidelines how to select the parameters of MPAQM algorithm to assure the stability and fast convergence of the network system.The performances of MPAQM were evaluated through a series of simulations in NS2 under the single/multiple topology.The simulation results show that the queue length with MPAQM algorithm reaches the desired value with minimal tracking error and lower drop probability.MPAQM algorithm outperforms RED,PI and SPI-RED algorithms in terms of disturbance rejection,stability,and robustness.

    Elimination of pulse-noise from mixed-noise based on fractional lower order ICA
    Tian-shuang QIU,Bing LI,Dai-feng ZHA
    2011, 32(9):  77-81.  doi:1000-436X(2011)09-0077-05
    Asbtract ( 94 )   HTML ( 0)   PDF (806KB) ( 635 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem that traditional denoising methods based on the second order statistics were usually degraded in their performance when the received signal was contaminated by both Gaussian and Alpha stable noises.A fractional lower order statistics based ICA method was introduced.It eliminated the pulse noise from the mixed noise first,and then removed the Gaussian noise with the SVD method.The simulations show that the new method is effective on the noise elimination,and the pure signal in the received signal is not deteriorated.

    Performance research of the T′ algorithm over GF(2)
    Wen-ping GUO,Jin-liang AN
    2011, 32(9):  82-87.  doi:1000-436X(2011)09-0082-06
    Asbtract ( 79 )   HTML ( 0)   PDF (799KB) ( 62 )   Knowledge map   
    References | Related Articles | Metrics

    The XSL algorithm is a method for solving systems of multivariate polynomial equations based on the linearization method on GF(2),and the T ' method is the final stage of the XSL algorithm before linearization.Through analysis revealed that the T'algorithm can not achieve its desired end condition Free=T or Free=T-1.In orde to solve the problem,a real end condition and two variable selection principle was proposed for T' algorithm.Based on probabilistic algorithms and variable values greater probability estimation method to improve performance of the original T 'algorithm.The results show that the improved T 'algorithm can simplify the equations.

    Technical Report
    Insect visual system inspired small target detection for multi-spectral remotely sensed images
    Feng-chen HUANG,Min LI,Ai-ye SHI,Min TANG,Li-zhong XU
    2011, 32(9):  88-95.  doi:1000-436X(2011)09-0088-08
    Asbtract ( 71 )   HTML ( 3)   PDF (1095KB) ( 659 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Most existing target detection algorithms for multi-spectral remotely sensed images dependent on the background model or prior knowledge of spectral,so the false alarm rate of detection algorithms would be enhanced by clutter background and little prior information.Inspired by small target detection neurons of the insect visual system,a bionic small target detection model and its corresponded detection method were proposed for multi-spectral remotely sensed images.Based on the nonlinear filtering characteristic of neural cell which is sensitive to transient signals,target detection was completed by suppressing the local background texture and enhancing target feature.Experimental results showed that the proposed method can detect target with stable low false alarm rate under the condition of complexity background.Meanwhile,the proposed method can balance the contradictory relationship between spatial resolution and background complexity.Compared with existing target detection algorithms,it was simple and easy to be completed.

    Joint design of tuple space and bitmap for two-dimensional packet classification
    Kun XIE,Jiao-jiao ZHAO,Da-fang ZHANG
    2011, 32(9):  96-102.  doi:1000-436X(2011)09-0096-07
    Asbtract ( 65 )   HTML ( 0)   PDF (748KB) ( 576 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on dimension decomposition idea,a high-performance two-dimensional packet classification algorithm by jointing tuple space and bitmap technology,called TB,was designed and implemented.Firstly,TB processes one-dimension matching for SIP and DIP respectively,then it forms tuple space access route by applying the cross-combination method to the matching results in the first step,finally,to reduce the number of required accessing tuple space,TB obtains the multi-dimensional matched rule by adapting bitmap filtering technique to filter tuple space.Compared to traditional tuple space algorithm,the structure of TB is clearer,more concise and easier to update and implement,TB also has better time and space performance.The experimental results show that TB algorithm saves 35.1% of the space requirement than RSFR algorithm and the number of average memory accesses lower than RSFR 26.6%.

    Trajectory clustering algorithm based on structural similarity
    Guan YUAN,Shi-xiong XIA,Lei ZHANG,Yong ZHOU
    2011, 32(9):  103-110.  doi:1000-436X(2011)09-0103-08
    Asbtract ( 388 )   HTML ( 56)   PDF (1026KB) ( 4538 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For current trajectory clustering algorithms,most of them group full trajectories as basic units,and lead the low efficient results.Aiming at this problem,a trajectory clustering algorithm based on structural similarity was proposed.By introducing a new concept of trajectory structure and presenting structural similarity function,the internal and external features of trajectories were analyzed.The algorithm first partitioned trajectories into trajectory segments according to corner; then computed the matching degree between every trajectory segment pairs by comparing their structure features;finally grouped trajectories into clusters.Experiment results on real data set demonstrate not only the efficiency and effectiveness of the algorithm,but also the flexibility that feature sensitivity can be adjusted by different parameters.

    Identity-based cross-domain authentication scheme in pervasive computing environments
    Chang-yuan LUO,Shi-wei HUO,Hong-zhi XING
    2011, 32(9):  111-115.  doi:1000-436X(2011)09-0111-05
    Asbtract ( 114 )   HTML ( 6)   PDF (737KB) ( 420 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An identity-based signature scheme was proposed based on additive elliptic curve group.The verification result of the signature was a constant with respect to the signer's identity.The scheme could guarantee user anonymity in the process of cross-domain authentication and avoided the pairing operation.Then a cross-domain authentication scheme was constructed by combining the proposed signature scheme.During the authentication,a user constructed the signature of timestamp as authentication proof,which realized secure cross-domain authentication and user anonymity.It is shown that the proposed scheme has superiority in both security and efficiency,and is more suitable for pervasive computing.

    Research and design of the protection scheme on bluetooth location privacy
    Bin YU,Shun ZHANG
    2011, 32(9):  116-122.  doi:1000-436X(2011)09-0116-07
    Asbtract ( 70 )   HTML ( 0)   PDF (742KB) ( 292 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The attack mechanism of bluetooth location privacy and the disadvantages of the current protection scheme were analyzed and a model of hierarchical address was established.On the basis of the model,a protection scheme on bluetooth location privacy was designed.Compared with others,this scheme can not only resist eavesdroping,replay attack,frequency hop sequence attack,conversation address tracking attack,dictionary attack and man in the middle attack,but also need little computing and storage.

    Tracking multi-target on image plane for the cone-scanning optical sensor
    Yun-li LONG,Wei-dong SHENG,Hui XU,Wei AN
    2011, 32(9):  123-128.  doi:1000-436X(2011)09-0123-06
    Asbtract ( 55 )   HTML ( 0)   PDF (816KB) ( 190 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Integrated probabilistic multi-hypothesis tracking(IPMHT)for multi-target was an iterative suboptimal Bayesian method based on exception maximum(EM),which was studied for tracking targets on image plane for the cone-scanning optical sensor.In order to improve the algorithm performance and efficiency,probabilistic data association(PDAF)under logical ruler was utilized to estimate the target initial state and IPMHT was optimized as to the target intensity and association gate.To track multi-target under nonlinear observation of the cone-scanning sensor,augmented unscented Kalman filter(AUKF)was introduced to combine the optimized IPMHT for the multi-target initiation,maintenance and termination.As the Monte Carlo experiments show,the presented algorithm successfully tracks the multi-target with better tracking performance and efficiency as well.

    Image quality evaluation method base on digital wavelet transform and vision weighted
    Ming JIANG,Zhao-feng MA,Yu XIN,Xin-xin NIU,Yi-xian YANG
    2011, 32(9):  129-136.  doi:1000-436X(2011)09-0129-08
    Asbtract ( 67 )   HTML ( 1)   PDF (1175KB) ( 652 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new objective method WVWPSNR(wavelet and vision_weighted peak signal noise ratio)was presented.In which the method was based on DWT, and the sensitivity of HVS(human visual system)was weighted using sub-band division. In this method,the assessment valued of the new method accord with MOS(mean opinion score).In order to demonstrate the effectiveness and to verify the reliability of WVWPSNR method,a series of experiment for JPEG、JPEG2000、White Noise、Gaussian Blur and FastFading images were made and tested.The results suggest that the proposed method can provide accurate measures of image quality under JPEG compression.

    Overview
    Video coding in wireless multimedia sensor networks:a survey
    Xiao-ping FAN,Zhe-yuan XIONG,Zhi-jie CHEN,Shao-qiang LIU,Zhi-hua QU
    2011, 32(9):  137-146.  doi:1000-436X(2011)09-0137-10
    Asbtract ( 82 )   HTML ( 2)   PDF (753KB) ( 722 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    There are a large number of video data have to be processed and transmitted in resource-constrained wireless multimedia sensor networks (WMSN).One possible way to achieve the maximum utilization of those resources is to apply an adaptive video coding scheme,which must consider the trade-off among energy consumption,compression ratio and image quality.The state-of-the-art in video coding techniques,the major research challenges and the objectives of video coding for WMSN are discussed.Existing solutions and theoretical explorations of video coding for WMSN are investigated and classified,including single source coding and distributed source coding.Finally,fundamental issues of single source coding are discussed,and future research trends in this area are outlined.

    Academic communication
    Distributed cooperative spectrum sensing based on consensus optimization
    Fan-zi ZENG,Jie LIU,Ren-fa LI,Qing-guang ZENG
    2011, 32(9):  147-152.  doi:1000-436X(2011)09-0147-06
    Asbtract ( 71 )   HTML ( 0)   PDF (802KB) ( 321 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A distributed wideband spectrum compressive sensing approach based on consensus optimization was developed.The cognitive radio users firstly collected the time-domain sampling by compressive sampling and recover the local spectrum.Then the spectrum of primary users is recovered jointly by cooperative cognitive radio users,which utilizes iterative consensus optimization to reach globally sensing outcomes via one-hop local communication only.In particular,a weighted consensus-averaging constraint is introduced to reduce the number of the consensus constraints,which lowers the computation loads and expedites the convergence.The convergence of the proposed distributed cooperative spectrum sensing scheme is proved analytically.Simulations demonstrate that the proposed scheme can effectively sense the spectrum from compressive sample.

    Piecewise histogram equalization based image enhancement
    Wen-fei CHEN,Bin LIAO,Xue-feng XU,Zhi-yong HUANG,ONGWen-yong D
    2011, 32(9):  153-160.  doi:1000-436X(2011)09-0153-08
    Asbtract ( 85 )   HTML ( 1)   PDF (1416KB) ( 1272 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Piecewise histogram equalization (Piecewise HE) was proposed,which combines the benefits of contrast stretching and existing histogram equalization.The swallow of saturation and brightness is avoided in the enhanced image by a piecewise linear mapping function,which combines with the mean and standard deviation of the histogram,and the parameters selection of Piecewise HE is explored when over-enhancement existed.The experimental results have demonstrated that the proposed method can enhance the images effectively,which avoids the swallow and over-enhancement problems of the existing histogram equalization methods.The proposed method not only preserves the original details,but also has a more natural visual effect in the enhanced image.

    Joint time-frequency interference alignment in the frequency-selective Gaussian interference channel
    Zhen-hai JING,Bao-ming BAI,Xiao MA
    2011, 32(9):  161-166.  doi:1000-436X(2011)09-0161-06
    Asbtract ( 52 )   HTML ( 0)   PDF (748KB) ( 504 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To make up for the limitation that the traditional interference alignment can only align the signal in one dimensional domain,a novel joint time-frequency interference alignment scheme was put forward in the frequency-selective Gaussian interference channel(GIC).After the frequency-selective GIC was changed into a set of parallel GICs,a set of time-frequency alignment matrices were employed which aligned the interference signal not only in time domain but also in frequency domain.An algorithm for calculating the time-frequency alignment matrices was presented based on the convex optimization.Computer simulations show that the joint time-frequency interference alignment can obtain the same performance as the traditional interference alignment while the joint time-frequency interference alignment can shorten the decoding time or reduce the occupation of the frequency resource.The joint time-frequency interference alignment scheme is an extension of the traditional interference alignment and provides a more flexible resource allocation approach between time domain and frequency domain.

    New constant modulus algorithm suitable for nonconstant modulus signals
    Wei RAO,Hui SUN,Ye-cai GUO,Cheng-zhi DENG,Sheng-qian WANG,Wei TIAN
    2011, 32(9):  167-173.  doi:1000-436X(2011)09-0167-07
    Asbtract ( 55 )   HTML ( 0)   PDF (766KB) ( 388 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The steady-state mean square error(MSE)of constant modulus algorithm(CMA)can not converge to zero for nonconstant modulus signals.By changing the multimodulus of nonconstant modulus source to single modulus,a new cost function was defined.And the new CMA based on such cost function can lead the steady-state MSE to zero.Theoretic analysis and computer simulation results demonstrate that the proposed algorithm offer high performance.

    Network analytical model of tandem queuing RED and ERED
    Xue-fen CHI,Ying-ying ZHAO
    2011, 32(9):  174-181.  doi:1000-436X(2011)09-0174-08
    Asbtract ( 54 )   HTML ( 1)   PDF (940KB) ( 881 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the tandem queuing network theory,tandem queuing RED and ERED analytical models were established which emprise multiple network nodes.The RED algorithm with exponent packet loss distribution function was derived(ERED).In probability generation function domain,departure process of a node was derived and then fitted for the follow-up node's arriving process,thus,the multiple nodes relayed congestion control sinarios could be depicted.Network performances of three tandem queuing AQM algorithms(RED,ERED and DT)were presented by solving queuing system.The problems of AQM parameter setting and its effect on system performance were analyzed.Considering two types of traffic with different degrees of burst,performance indicators for each node in tandem queuing system are investigated,and specially,system end-to-end performance indicators are derived.

    Hierarchy analysis and modeling on the Internet AS-level topology
    Hong GUO,Bai-wei YANG,Ju-long LAN,Luo-kun LIU
    2011, 32(9):  182-190.  doi:1000-436X(2011)09-0182-09
    Asbtract ( 49 )   HTML ( 0)   PDF (787KB) ( 353 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the in-depth analysis of he massive real AS-level topology data,the multi characteristics describing Internet AS-level topology's hierarchy were abstracted,and a material way about network's hierarchical partition were introduced,and the number of connected edged of adding new nodes and nonlinear probability were gived.Finally,a novel hierarchical dynamic evolution model named IAT-HDEM based on corenness and the k-core decomposition was proposed.The numerical simulations and analysis results showed that most of macroscopic statistics closed to real networks',including power-law degree distribution and negative correlation clustering-degree distribution etc.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: