Please wait a minute...

Current Issue

    25 May 2008, Volume 29 Issue 5
    Papers
    New transferable electronic cash scheme
    Guo-sheng XU,Li-ze GU,Yi-xian YANG,Zhong-xian LI
    2008, 29(5):  1-5.  doi:1000-436X(2008)05-0001-05
    Asbtract ( 0 )   HTML ( 2)   PDF (1124KB) ( 406 )   Knowledge map   
    References | Related Articles | Metrics

    A new transferable off-line e-cash scheme was proposed.By an introduction of a new restrictive blind signature,restrictive blindness of user’s identity is implemented,by an introduction of ID-based public key system,a multi-proxy signature,and then the untraceability of user’s e-cash,is implemented.Otherwise,the scheme has an advantage of the detection of double spending,in which double spender can be revealed directly.

    Robust time-delay estimation in highly adverse acoustic environments
    Yi ZHANG,Fu-liang YIN
    2008, 29(5):  6-12.  doi:1000-436X(2008)05-0006-07
    Asbtract ( 0 )   HTML ( 2)   PDF (1594KB) ( 263 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A robust time-delay estimation algorithm in situations where a large amount of additive colored noise and reverberation was presented.This algorithm estimates TDE through blind identification of room impulse response in order to eliminate the effect of reverberation,and uses eigenvalue decomposition of a lagged correlated matrix to avoid the effect of colored noise.Simulation results show that the proposed algorithm can give robust time-delay estimation when colored noise and reverberation exist.

    Conjugate propagator method for direction finding
    Jian LIU,Yan-wei WANG,Zhi-tao HUANG,Yi-yu ZHOU
    2008, 29(5):  13-18.  doi:1000-436X(2008)05-0013-06
    Asbtract ( 0 )   HTML ( 1)   PDF (1517KB) ( 75 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new direction finding algorithm called conjugate propagator method (COP) for one-dimension signals was proposed.The new algorithm uses the array output and its conjugate form to extend the array aperture so that it can detect more signals than sensors and has better performance (in terms of resolution and angular precision) than OPM (orthonormal-PM) and MUSIC algorithms.The mean square error (MSE) performance of COP was analyzed and the analytical expression of MSE was given.The computational complexity of COP was analyzed also.Simulation results show the better performance of COP than OPM and MUSIC algorithms and the accordance between the theoretical results and the simulation results.

    Adaptive transmission scheme with delayed channel state information for multiuser MIMO-OFDM systems
    Min LIU,Xiao-fei ZHANG,Da-zhuan XU
    2008, 29(5):  19-25.  doi:1000-436X(2008)05-0019-07
    Asbtract ( 0 )   HTML ( 1)   PDF (1857KB) ( 603 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An adaptive transmission scheme combining orthogonal space-time block code and eigen-beamforming was proposed for multiuser MIMO-OFDM downlinks.The scheme uses delayed channel state information from receivers to maximize the throughput.An adaptive subcarrier allocation criterion and corresponding bit-loading algorithm were presented.Simulation results show that the scheme can make full use of delayed channel state information to achieve much more throughput than non-adaptive schemes.A sub-optimal bit-loading algorithm was also presented,which is non-iterative and requires small computation.Simulation results demonstrate that the incurred throughput loss is negligible.

    Encryption based on reversible cellular automata
    Ping PING,Yao ZHOU,Hong ZHANG,Feng-yu LIU
    2008, 29(5):  26-33.  doi:1000-436X(2008)05-0026-08
    Asbtract ( 116 )   HTML ( 3)   PDF (1678KB) ( 1143 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The reversible cellular automata is featured by its no information loss and parallel information processing.A new block cipher based on reversible second-order toggle cellular automata was proposed.Instead of using the whole rules space as the keys space,the new algorithm introduces a parameter λ to partition the rules space and proves that rules with λ=0.5 are becoming to encrypt.Compared with the general irreversible toggle cellular automata cryptosystem,the proposed method greatly improves the speed of encryption and has large keys space,it can resist bruce attack and differential cryptanalysis.

    Novel model on self-organized P2P network using mobile agent
    Yang WANG,Ru-chuan WANG,Xiao-long XU
    2008, 29(5):  34-42.  doi:1000-436X(2008)05-0034-09
    Asbtract ( 87 )   HTML ( 3)   PDF (2004KB) ( 91 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to reduce large of redundant P2P traffic due to mismatched topology,a self-organized P2P network model with Multi-Mobile agents was proposed.At first,constructed different AS,then promoted some peers as master server agent and candidate server agent,common peers were self-organized into ad hoc network in the AS.Additionally,mobile agent infrastructures were deployed on peers,which were used to partition subnet topology and help user achieve search task.Theoretical analysis and simulation result indicate that the P2P model can reduce redundant P2P traffic to some degree and search efficiency in AS which reinforce P2P system’s robustness furtherly.

    Probability updating-based adaptive hybrid coding
    Shi-lin XU,Li YU,Guang-xi ZHU
    2008, 29(5):  43-49.  doi:1000-436X(2008)05-0043-07
    Asbtract ( 68 )   HTML ( 1)   PDF (510KB) ( 91 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A probability updating mechanism was proposed for entropy coding.To achieve the best coding efficiency,probability updating based huffman code and structured code were jointly used,and the best context model was selected according as the correlation of adjacent syntax elements.Experiment results demonstrate that both of the coding efficiency and computational complexity of this probability updating-based adaptive hybrid coding (PUAHC) were between UVLC and CABAC.

    Proportional fairness based resource allocation algorithm for dirty-paper coded multi-user MIMO-OFDM systems
    Yi ZHAO,Yuan-an LIU,Ling-kang ZENG,Gang XIE,Fang XIONG
    2008, 29(5):  50-55.  doi:1000-436X(2008)05-0050-06
    Asbtract ( 88 )   HTML ( 2)   PDF (1198KB) ( 91 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel resource allocation algorithm was proposed for dirty-paper coded multi-user multiple-input multiple-output (MIMO)-orthogonal frequency division multiplexing (OFDM) systems.The new algorithm can guarantee the proportional fairness among users while achieving large system throughput by local search.Simulation results show that the proposed algorithm provides great fairness among users,with less overall system throughput loss.

    Reputation mechanism based on multi-path routing protocol in ad hoc networks
    Guo-hua CUI,She-jie LU,Zhi-yuan LIU,Yong-jun GENG
    2008, 29(5):  56-64.  doi:1000-436X(2008)05-0056-09
    Asbtract ( 49 )   HTML ( 1)   PDF (1951KB) ( 252 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the multi-routing protocols and the reed-solomon error-correcting coding scheme,a data transmission method was presented,in which,round-encryption and round-signature were not needed.Data packets were all encoded by RS codes and cut into pieces before sending in different paths.After receive all the pieces of a data packet,the destination node could judge whether a malicious modification had been occurred,if so,the malicious node would be found out or be located in a malicious-node-group by a detecting process.Then by fully using the information gotten from detecting process,a reputation mechanism was proposed to resist the modification attacks.When implement it,the Bayesian approach was used to evaluate a node’s reputation.The simulation results show that it can react to the attacks more quickly and accurately.

    Hybrid genetic simulated annealing algorithm based on niching for QoS multicast routing
    Yi-ming FAN,Jian-jun YU,Zhi-min FANG
    2008, 29(5):  65-71.  doi:1000-436X(2008)05-0065-07
    Asbtract ( 82 )   HTML ( 1)   PDF (1353KB) ( 238 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem of multicast routing with multiple QoS constraint,a new genetic algorithm(GA) was brought up based on the simulated annealing(SA) mechanism.The algorithm combined the capability of local optimization of SA with global optimization of GA,and used of independent evolutionary mechanism of isolation niche.It can effectively enhance the operating efficiency and improve the solution quality.The simulation experiment indicated that,compares with the traditional genetic algorithm,the performance of this algorithm has remarkable improvement.

    Research on communication network system model oriented to the new communication services
    Ai-bao WANG,Guang-zhao ZHANG
    2008, 29(5):  72-80.  doi:1000-436X(2008)05-0072-09
    Asbtract ( 51 )   HTML ( 1)   PDF (1055KB) ( 290 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Through the analysis of the capabilities of new communication network taking Internet as representative,the STL system model of new communication network was put forward,which has three dimensions including space domain,time domain and language domain,and was comprised of three elements including transmission capability,memorization capability and computation capability,on the basic of the STL mode,the principle of transformation between the communication capabilities was proved.From the interpretation of the current Internet application services,it can be said that the STL mode has certain use for the development of communication theory and network technology.

    New techniques of intra-satellite communication and ranging/time synchronization for autonomous formation flyer
    Xue LI,Qi-shan ZHANG,Yong XU,Ce WANG
    2008, 29(5):  81-87.  doi:1000-436X(2008)05-0081-07
    Asbtract ( 70 )   HTML ( 1)   PDF (1491KB) ( 234 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The technique of intra-satellite communication networking and asynchronous ranging for autonomous formation flyer(AFF) were researched.The hybird FDMA/CDMA mode was developed for AFF communication networking,and precisely ranging &time synchronization was performed by bidirection Asynchronous transfer frame of CCSDS proximity-1 protocol via intra-satallite microwave link in AFF.The principle of two-way noncoherent ranging mode about direct sequence spread spectrum(DSSS) was presented for intersatallite ranging/time synchronization in AFF FDMA/ CDMA networks,concerned equations were constructed and two iteration compupting algorithms were derived.Then,the ground experimenting systems for studying and testing the performance of intra-satallite communication and two-way noncoherent ranging/time synchronization were presented with many experiment results and analyzing.Experiment results show that the satisfied performance is obtained.

    Cryptanalysis and improvement of several certificateless digital signature schemes
    Hua-qun WANG,Ming-hai XU,Xian-jiu GUO
    2008, 29(5):  88-92.  doi:1000-436X(2008)05-0088-05
    Asbtract ( 74 )   HTML ( 10)   PDF (1096KB) ( 716 )   Knowledge map   
    References | Related Articles | Metrics

    The security flaws of the certificateless digital signature schemes proposed by Liu-Au-Susilo (2007), Goranlta-Saxena (2005),Cao-Paterson-Kou(2006),Yap-Heng-Goi(2006) and Je Hong Park(2006)were analyzed.It pointed that the schemes couldn’t resist the public key substitution attack.The attack methods were presented.The security flaws are pointed out,and the attack methods are presented.Then,the flaws that exist in the original digital signatures security proof were enumerated.In order to avoid these flaws,made use of the general certificateless digital signature scheme and the corresponding forking lemmas from Castro-Dahab(2007) to improve the original digital signature schemes.The improved digital signature schemes are provably secure.

    Research on load-adaptive slotted priority queue scheduling providing telecomm-grade IP QoS
    Qiang XUE,Guang-zhao ZHANG
    2008, 29(5):  93-99.  doi:1000-436X(2008)05-0093-07
    Asbtract ( 64 )   HTML ( 1)   PDF (1184KB) ( 255 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the problem between the high QoS requirement and bandwidth impartiality when the real-time traffic transmitted in IP network,load-adaptive slotted priority queue(LASPQ) was introduced.According to the load of the real-time traffic,it was transferred with an appropriate triggering period τ.LASPQ keep real-time traffic’s delay,jitter in need,while improving the transferring efficiency of non-real-time traffic.It is proven from theory and simulation that LASPQ is better than traditional queue schemes such as PQ,WFQ,when transmitting real-time traffic.

    Technical Reports
    Double-mode model about distributions of network traffic
    Ming CHEN,Ling-bo PEI,Wen LIANG
    2008, 29(5):  100-106.  doi:1000-436X(2008)05-0100-07
    Asbtract ( 81 )   HTML ( 20)   PDF (1553KB) ( 115 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Three propositions about distribution of network traffic were put forward and analyzed.The shaping process of the high bandwidth-low bandwidth-high bandwidth network structures which are prevalent in Internet was pointed out and then the novel concept of shaping operator was proposed.The forming mechanism of Poisson distribution for sub-second time scales on major backbone link was analyzed and a double-mode transition model between self-similarity distribution and Poisson distribution was put forward.Finally,the validity of the double-mode transition model was verified by simulation experiments.The research results give a universal explain about current traffic distributions and have important effects on many research fields such as design of network structure,congestion control mechanism,admission control and QoS.

    Design and hardware implementation of a CAN communication protocol
    Jiang-qun NI,Cheng-pei TANG,Dong ZHANG,Guo-cong FENG
    2008, 29(5):  107-113.  doi:1000-436X(2008)05-0107-07
    Asbtract ( 62 )   HTML ( 1)   PDF (1565KB) ( 318 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An ongoing space experiment and its data communication protocol were briefly introduced.Based on the TTCS sub-system,the design and FPGA based hardware implementation of space oriented CAN communication protocol were presented in detail.Finally the simulation and test results were given to demonstrate the feasibility and reliability of the design.

    Concise Papers
    Reliable scheme for the cluster-based communication protocol in wireless sensor networks
    Zu-de ZHOU,Peng HU,Fang-min LI
    2008, 29(5):  114-121.  doi:1000-436X(2008)05-0114-08
    Asbtract ( 76 )   HTML ( 6)   PDF (1964KB) ( 286 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Since the data-centric sensing task focuses more on the data reliability,many cluster-based communication protocols were failed to analyze the reliability of the sensing task.The RBD (reliability block diagram) was used to model the data reliability of cluster-based wireless sensor networks (WSN).The value of reliability was adopted into the cluster formation scheme.Then the malfunctioning node (MN) that could affect the data reliability is defined and analyzed.A detecting scheme was proposed to detect the MN and the friendly node (FN) is used to mitigate its negative effects.Based on the above analysis,the REECP (reliable energy-efficient cluster-based protocol) was proposed.Simulation results demonstrate REECP can prolong the effective lifetime of the network and mitigate the error propagation in data aggregation of sensing tasks,reinforcing the reliability of WSNs with cluster-based communication protocols.

    Stepped annealing chaotic neural network model for the channel assignment problem
    Xiao-jin ZHU,Yan-chun CHEN,Yong SHAO,Jian WANG
    2008, 29(5):  122-127.  doi:1000-436X(2008)05-0122-06
    Asbtract ( 60 )   HTML ( 3)   PDF (1115KB) ( 554 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the stepped annealing method used in transient chaotic neural network,a chaotic neural network model had been improved.The dividing point in the new model was chosen according to the change of the corresponding Lyapunov exponent,and made sure the network take good advantage of the property of chaos to search the global minimum and accelerate the convergence process.Various scales of the channel assignment problems had been simulated and researched based on channel assignment problem in mobile communication system.Kunz benchmark test problem was also used for the emulation of the channel assignment problem based on 25-district model.Simulation results show that compared with other transient chaotic neural networks,the new stepped annealing method decreases the computing time and enhances the searching ability,and has a better performance in the larger scale of network.

    Corresporndences
    Best performance of the UNB modulation VMSK in AWGN channel
    Dong-kai YANG,Hua-sen WU,Qi-shan ZHANG
    2008, 29(5):  128-132.  doi:1000-436X(2008)05-0128-05
    Asbtract ( 60 )   HTML ( 0)   PDF (1244KB) ( 156 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    VMSK (very minimum shift keying) was taken into account as UNB example.Its performance in AWGN (added white Gaussian noise) channel is analyzed based on the classifier model for signal processing.The detecting method with the lowest bit error rate is analyzed according to the Bayesian criterion using the basic probability method.Then the comparison with correlation detection,optimal performance is given.The analysis shows that the VMSK needs higher SNR (signal noise ratio) than BPSK to get the same BER performance.And the conclusion can be extended to other UNB modulation methods.

    Parameters estimation of vector-sensor array in colored noise based on quaternion-MUSIC
    Fei WANG,Shu-xun WANG,Kun-lei ZHANG
    2008, 29(5):  133-139.  doi:1000-436X(2008)05-0133-08
    Asbtract ( 57 )   HTML ( 0)   PDF (2711KB) ( 602 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Parameters of vector-sensor array was estimated based on Hamilton quaternion.First,the theory and computation method of right eigenvalue decomposition of Hamilton quaternion matrix was introduced in detail.Then,duplicate relation function (relation function of related function) of Hamilton quaternion was defined;it could not only express signal parameters but also restrain colored noise.Finally,Toeplitz matrix of duplicate relation function was constructed,and right eigenvalue decomposition was used to part signal subspace and noise subspace of this Toeplitz matrix.Signal parameters were estimated with quaternion-MUSIC method taking advantage of orthogonality between signal subspace and noise subspace.Some simulations illustrated the idea.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: