Please wait a minute...

Current Issue

    25 March 2008, Volume 29 Issue 3
    Technical Reports
    Ring based multi-hop clustering routing algorithm for wireless sensor networks
    Zhi LIU,Zheng-ding QIU
    2008, 29(3):  1-116.  doi:1000-436X(2008)03-0104-10
    Asbtract ( 0 )   HTML ( 2)   PDF (2067KB) ( 343 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A ring based multi-hop clustering routing algorithm(RBMC) for wireless sensor networks(WSN) was proposed.The main task of RBMC was to prolong the lifetime of the network,balance energy consumption between nodes.The main idea of RBMC was to divide the WSN field into concentric rings and build unequal size of clusters in different rings.From the objective of minimum energy consumption in first ring and balance of it between first ring and other rings,the optimal choice of cluster numbers for each ring was deduced.Via adoption of different algorithms for cluster head election,RBMC could be applied to homogeneous and heterogeneous energy settings.The simulation results prove the good performance of RBMC in large area WSN scenarios.

    Papers
    Fast crosstalk precoder based on tridiagonal matrix splitting
    You-ming LI,Rang-ding WANG,Wei SHEN,Li-ming FANG
    2008, 29(3):  10-15.  doi:1000-436X(2008)03-0010-06
    Asbtract ( 0 )   HTML ( 2)   PDF (2689KB) ( 111 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel precoder based on tridiagonal matrix splitting for cancellation crosstalk in downstram transmission was proposed.As the new processing does not need direct matrix inversion,the computational complexity is much lower than zero forcing precoder,the same order as diagonal splitting based precoder,but the performance is much better than the later method.Computer simulation results based on real measured data verify the efficiency of the new proposed precoder.

    On the GF(p) linear complexity of legendre sequence
    Xian-mang HE
    2008, 29(3):  16-22.  doi:1000-436X(2008)03-0016-07
    Asbtract ( 0 )   HTML ( 3)   PDF (2021KB) ( 43 )   Knowledge map   
    References | Related Articles | Metrics

    Linear complexity is an important cryptographic criterion of stream ciphers.The sequences over GF(2) can be considered as sequences over GF(p) (p is a small odd prime number),therefore,their linear complexity needs to be studied over GF(p).From this perspective,the linear complexity of legendre sequence over GF(p) was discussed.Its application on cyclotomic polynomial factoring and some extensions are also covered.

    GMW sequences over Galois rings and their linear complexities
    Ni-gang SUN,Lei HU
    2008, 29(3):  23-26.  doi:1000-436X(2008)03-0023-04
    Asbtract ( 103 )   HTML ( 3)   PDF (1268KB) ( 215 )   Knowledge map   
    References | Related Articles | Metrics

    A new family of GMW sequences over an arbitrary Galois ring was defined.This generalizes the concept of GMW sequences over finite fields.Upper and lower bounds on the linear complexities of this family of GMW sequences were investigated and the result shows that such sequences have large linear complexities.

    Path quality and gateway load based intra-domain gateway handoff scheme for Internet-connected ad hoc networks
    Kai-jie ZHANG,Yong XIANG,Mei-lin SHI
    2008, 29(3):  27-33.  doi:1000-436X(2008)03-0027-07
    Asbtract ( 74 )   HTML ( 2)   PDF (943KB) ( 118 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the problem of packet delay and loss when mobile nodes did intra-domain gateway handoffs in Internet-connected multihop wireless ad hoc networks,a handoff scheme using the path quality and gateway load as the metrics of gateway selection and handoff decision was proposed.The path quality was based on the packet round trip time and packet loss.A candidate gateway was introduced to optimize the handoff performance by pre-discovery and pre-registration.Simulation results show that this scheme could efficiently improve the intra-domain handoff performance,and was better than the handoff scheme based on the hopcount metric.The protocol didn’t introduce too much control overhead.

    Study on the delay-constrained P2MP model in VPLS networks
    Xi-ming DONG,Shao-hua YU
    2008, 29(3):  34-39.  doi:1000-436X(2008)03-0034-06
    Asbtract ( 83 )   HTML ( 3)   PDF (1507KB) ( 181 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A P2MP VPLS packet-forwarding model was proposed.The model discussed how the delay-constrained delivery tree would be computed,and how point-to-multipoint(P2MP) services could be carried through this model.It eliminated the need of packet replication and re-encapsulation introduced by legacy point-to-point (P2P) VPLS model.Test and simulation results show that the algorithm in this model is feasible in computing delay-constrained P2MP trees over VPLS domain.Compared with the Steiner tree NP complete problem,the complexity of the proposed algorithm is O(n2).

    Joint optimization in MIMO multiple relay channels
    Fei YU,Lv-xi YANG
    2008, 29(3):  40-46.  doi:1000-436X(2008)03-0040-07
    Asbtract ( 47 )   HTML ( 2)   PDF (1421KB) ( 67 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Joint optimization of cooperative relays in MIMO multiple relay aided communication system is discussed in this paper.A simple linear optimization solution is designed and a multi-user scheduling algorithm is proposed.This new algorithm,which chooses the users with larger cooperation diversity gains from waiting list to serve,can reduce inter-user interference caused by parallel transmission of multiple relays,maintain space diversity introduced by parallel transmission of multiple relays and achieve higher throughput of system.

    Gauss reputation framework for sensor networks
    De-qin XIAO,Jian-zhao FENG,Quan ZHOU,Bo YANG
    2008, 29(3):  47-53.  doi:1000-436X(2008)03-0047-07
    Asbtract ( 97 )   HTML ( 4)   PDF (1182KB) ( 435 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Knowledge from relative domains such as cryptography,economics,statistics,and data analysis was combined together for the development of trustworthy sensor networks,a Gaussian reputation framework for sensor networks (GRFSN) was proposed,which was developed by J?sang’s opinion,with the fitting analyses and test between Gaussian probability distribution and reputation distribution,the possibility to develop reputation model using Gaussian distribution has been proved.Through some preliminary simulation results,this framework is more stabile to describe reputation against other distributions and easier to express the trust directly,and it also has the powerful ability to prevent from malicious attacks or faulty nodes.

    Adaptive clustering routing transition protocol in ad hoc networks
    Jia XU,Zhi LI,Qian-mu LI,Feng-yu LIU
    2008, 29(3):  54-62.  doi:1000-436X(2008)03-0054-09
    Asbtract ( 62 )   HTML ( 3)   PDF (2187KB) ( 210 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the expansibility problem of traditional flat routing protocols in ad hoc networks,an adaptive clustering routing transition protocol (ACRT) was proposed,by using the idea of adaptive clustering,routing transition and profits by the merits of passive clustering and gradual clustering.A series of simulations were made for ACRT,AODV,AODV-clustering and PC with fixed scale networks and dynamic scale networks.Simulation results indicate that ACRT has prominent superiority in expansibility and is a correct and efficient routing scheme.

    Transitively closed undirected graph authentication based on one-way accumulators
    Chun-guang MA,Man-chun CAI,Peng WU
    2008, 29(3):  63-69.  doi:1000-436X(2008)03-0063-07
    Asbtract ( 73 )   HTML ( 10)   PDF (504KB) ( 371 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new approach,based on one-way accumulators,to authenticate a transitively closed undirected graph was proposed.To sign a graph G,the signer accumulates each equivalence class of the vertices set of G and assigns a certification Cert,which is a partially accumulated value,to each vertices of G.To verify whether a pair (u,v) is belong to G or not,given respectively the Certs of u and v,anyone invokes a one-way accumulator to compute the accumulated values.Both two values are equal to the accumulated value of a certain equivalence class means that there is a edge between u and v in G.Thanks to one-way accumulators which replace the standard digital signatures,the signature on edges is eliminated.Compared to classical transitive signature schemes MRTS and RSATS-1,the scheme achieved smaller storage and higher efficiency.Furthermore,the scheme,allowing G to delete and add vertices and edges dynamically,provided an answer to an open question,raised by Micali and Rivest,how to authenticate a graph whose vertices and edges may be deleted dynamically.

    Shape coding algorithm integrated video segmentation
    Sheng-rong GONG,Zhao-hui WANG,Ti-liang LU,Chun-ping LIU,Shu-kui ZHANG
    2008, 29(3):  70-75.  doi:1000-436X(2008)03-0070-06
    Asbtract ( 60 )   HTML ( 2)   PDF (656KB) ( 77 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Baseline-based shape coding algorithm and image-dependent shape coding were researched.By integrating the two methods,a new shape coding algorithm was designed.The video object is segmented based on level set method firstly,and the result called zero level set is coded by the baseline-based coding.The new algorithm can overcome effectively the lacks of the baseline-based shape coding algorithm and image-dependent shape coding.The experimental results have demonstrated that the new algorithm is more effective and suitable for real application.

    Blind SNR estimation in non-cooperative communications
    Liang CHANG,Fu-ping WANG
    2008, 29(3):  76-81.  doi:1000-436X(2008)03-0076-06
    Asbtract ( 57 )   HTML ( 3)   PDF (1850KB) ( 860 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new blind SNR (signal to noise rate) estimation algorithm based on subspace decomposition was proposed.In this algorithm,an autocorrelation matrix of specific dimension was built by using the knowledge of oversampling rate,which can avoid the step of estimating the signal and noise subspace’s dimension in the original subspace based algorithm.A PASTd-based SNR estimation algorithm was proposed to decrease the computational complexity,and to better track the time-varying SNR.Simulation results show that the improved subspace based algorithm has evidently better performance than the typical one,and the PASTd based SNR estimation algorithm has better tracking performance than the subspace based method in time-varying SNR environment.

    Interference avoidance algorithm based on game theory in CR system
    Chun-hui ZHAO,Zhou WU
    2008, 29(3):  82-86.  doi:1000-436X(2008)03-0082-05
    Asbtract ( 44 )   HTML ( 2)   PDF (646KB) ( 216 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Game theory was proposed into the interference avoidance algorithm in the multi-antenna cognitive radio system.Global mutual information was constructed as utility function and genetic algorithm was adopted to obtain Nash equilibrium,which ensured the global optimum of the iterative results.Simulation showed this algorithm could overcome the dependent and interactive characters among systems.It could maximize the global mutual information and did not cause interactive circulation between users and reduced system bit error rate and improved the whole performance of system.

    Semantically secure digital multimedia cryptosystem
    Ze-hui WANG,Zhi-guo ZHANG
    2008, 29(3):  87-92.  doi:1000-436X(2008)03-0087-06
    Asbtract ( 47 )   HTML ( 2)   PDF (583KB) ( 306 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the efficient and provably secure implementation of the digital multimedia information (which is often with huge amount of data and much redundancy) encryption/decryption,a 2-dimension random matrix scrambling permutation and a new magic cube scrambling permutation were proposed with a strategy for enlarging the cipherkey space,and a stochastic filling method based on security hash functions was proposed.Based on these two proposed techniques,a novel cryptosystem was constructed.The analysis shows that the cryptosystem is of certain semantic security and a reduced time complexity of the encryption/decryption.The simulation experiments show the same results.

    Technical Reports
    Experimental investigation on a full-duplex radio-over-fiber system using directly modulated SOA for upstream link
    Jing HE,Hong WEN,Xiao-yan LEI,Lin CHEN,Jian-jun YU,Shuang-chun WEN
    2008, 29(3):  93-97.  doi:1000-436X(2008)03-0093-05
    Asbtract ( 56 )   HTML ( 2)   PDF (976KB) ( 182 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel radio-over-fiber (ROF) system to centralize the light source and optical modulator at the central station was proposed and experimentally demonstrated.At base station,a semiconductor optical amplifier (SOA) was used as a data modulator.At central station,a phase modulator and an interleaver were used to generate optical millimeter wave.The generated optical millimeter wave and the un-modulated optical carrier were transmitted to base station,at which the un-modulated optical carrier can be used for the uplink and a SOA was used to amplify and modulate the uplink data.This ROF system shows unique advantages due to its large dispersion tolerance for both the 2.5 Gbit/s downstream data and 250Mbit/s upstream data after transmission over 40km single-mode fiber.

    Active prefetching algorithm for streaming media based on natural number segmentation
    Zhong DAI,Ge YANG,Jian-xin LIAO,Xiao-min ZHU,Hai HUANG
    2008, 29(3):  98-103.  doi:1000-436X(2008)03-0098-06
    Asbtract ( 48 )   HTML ( 2)   PDF (623KB) ( 125 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An active prefetching algorithm for streaming media based on natural number segmentation was proposed.The proxy prefetched actively the uncached data when the proxy delivered the cached data to the users.It improved the streaming media delivery quality and reduced playback jitter.Theoretical analysis determined the position that determined the prefetching starting time and the needed minimum cache size at proxy server.Simulation results show that natural number segmentation strategy can gain more byte hit ratio and less proxy jitter ratio than exponential segmentation strategy and near to those of uniform segmentation strategy under the circumstance of the same cache space.

    Concise Papers
    Secret sharing protocol based on multi-target quantum teleportation
    Peng HUANG,Nan-run ZHOU,Ye LIU
    2008, 29(3):  114-118.  doi:1000-436X(2008)03-0114-05
    Asbtract ( 58 )   HTML ( 2)   PDF (639KB) ( 241 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel secret sharing protocol based on multi-target quantum teleportation was proposed to reduce the concentration of the secret and enhance the security of the secret sharing protocol.To distribute the secret safely,Alice prepares some entangled photons,after reserving one as his own,he distributes each of the others to each secret sharer.Then Alice transfers the secret quantum information to the photons of the secret sharers through a Bell state measurement between the secret quantum state and his own photon.Only after all the sharers put their photons together can the secret quantum information be reconstructed.Analytical results show the proposed protocol is secure and feasible.

    AM-RLC scheme with adaptive acknowledgement interval
    Jun-feng JIANG,Zhi-gang CAO
    2008, 29(3):  119-122.  doi:1000-436X(2008)03-0119-04
    Asbtract ( 44 )   HTML ( 3)   PDF (1101KB) ( 51 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    AM-RLC (acknowledged mode - radio link control) protocol is one of the most important radio protocols in WCDMA and TD-SCDMA mobile communication systems.A modified AM-RLC scheme with adaptive acknowledgement interval was proposed.At receiver,the acknowledgement interval is dynamically changed according to the channel status.Simulation results show that the proposed AM-RLC scheme outperforms the fixed acknowledgement interval AM-RLC scheme on the performances of frame delivery delay and protocol overhead.

    Correspondences
    New class of ternary two dimensional array sets with a zero correlation zone
    Xin TONG,Qiao-yan WEN
    2008, 29(3):  124-129.  doi:1000-436X(2008)03-0123-06
    Asbtract ( 33 )   HTML ( 2)   PDF (1497KB) ( 67 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel construction method of ternary two dimensional array sets having a zero correlation zone was presented.The new class of array sets can be generated from an arbitrary pair of Hadamard matrices and it has a zero correlation zone for both periodic and aperiodic correlation functions.The member size of the proposed two dimensional array sets is close to the Tang-Fan-Matsufuji bound,and its performance parameter is almost optimal.

    Analytical synthesis method of the digitally programmable voltage-mode universal biquad based on current conveyors
    Chun-hua WANG,Zhi-xing SHE,Chang-yong YANG,Yan ZHAO
    2008, 29(3):  130-135.  doi:1000-436X(2008)03-0129-06
    Asbtract ( 66 )   HTML ( 2)   PDF (868KB) ( 126 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An analytical synthesis of the digitally programmable voltage-mode universal biquad based on current conveyors was proposed.By this method,the five filtering outputs which are lowpass,bandpass,highpass,notch and allpass could be realized with no needs of component matches.The digitally programmable filters were realized using transmission gates.The realized filtering circuits,with the high input impedance,simple circuit structure,grounded passive elements,low sensitivities,can be applied to analogue-digital mixed integrated circuits.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: