Please wait a minute...

Current Issue

    25 July 2007, Volume 28 Issue 7
    Academic paper
    Differenceless mobility management network
    Xin-rong LV,Jian-xin LIAO,Xiao-min ZHU,Jia-chun WU
    2007, 28(7):  1-7.  doi:1000-436X(2007)07-0001-07
    Asbtract ( 0 )   HTML ( 1)   PDF (699KB) ( 338 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The differenceless mobility management network was proposed to support the mobility of IMS better.This kind of network can provide excel service mobility and user mobility,and it make user use service as local user in where it access the network.The user location management and session creation were analyzed.The result proved its target.It also proved that under this network architecture the cost of user location register and session creation is lower that home control model which IMS nowadays employs.

    Research on the security audit model in intrusion prevention based on write-related support vector data description
    Jun LUO,Zhi-song PAN,Zhi-min MIAO,Gu-yu HU
    2007, 28(7):  8-14.  doi:1000-436X(2007)07-0008-07
    Asbtract ( 0 )   HTML ( 1)   PDF (979KB) ( 78 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The security audit model based on write-related SVDD was designed to resolve the one-class problem.Once the classifier has been trained using the write-related subset,all activities deviated from the normal patterns are classified as potential intrusion.The proposed one-class classification algorithms can be implemented to build up an anomaly detection system by using only normal samples and the algorithms also makes the security audit system detect the new anomaly behaviors.In the experiments,the One-class classifier acquires nearly 100% detection rate and average zero false alarm rate for sequences of system calls based on a small training dataset.

    Bit-allocation and rate-control algorithm for stereo video coding
    Zhong-jie ZHU,Feng LIANG,Gang-yi JIANG,Mei YU
    2007, 28(7):  15-21.  doi:1000-436X(2007)07-0015-07
    Asbtract ( 0 )   HTML ( 1)   PDF (2167KB) ( 5 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new bit-allocation and rate-control algorithm for stereo video coding was proposed to improve its coding efficiency and stream reliability.The conventional quadric rate-distortion model was improved and a new one was introduced by incorporating the human visual system (HVS) characteristics.Experimental results show that the improved new rate-distortion model is more precise than the conventional one and the proposed new algorithm can efficiently implement bit allocation and rate control according to coding parameters.

    Time-frequency differential encoding and detection for cyclic prefix assisted CDMA system
    Zhao-xi FANG,Hang-guan SHAN,Zong-xin WANG
    2007, 28(7):  22-27.  doi:1000-436X(2007)07-0022-06
    Asbtract ( 92 )   HTML ( 1)   PDF (739KB) ( 161 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new differential encoding and detection scheme for cyclic prefix assisted CDMA system was proposed.Considering the correlation between channel impulse response in both time domain and frequency domain,a time-frequency differential encoding scheme and corresponding noncoherent detection and equalization based on MMSE criterion were presented.Computer simulation results show that it outperforms conventional method in fast fading multipath channel significantly,and shows high robustness against Doppler spread.

    Universally composable oblivious transfer protocol based on VSPH
    Feng-hua LI,Tao FENG,Jian-feng MA
    2007, 28(7):  28-34.  doi:1000-436X(2007)07-0028-07
    Asbtract ( 76 )   HTML ( 4)   PDF (643KB) ( 298 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new oblivious transfer protocol was proposed within the framework of universally composable security(UC-DT).The protocol based on the verifiably smooth projective hashing(VSPH) is against adaptive adversaries in a common reference string (CRS) model.The UC-OT protocol improves computational efficiency with non-committing encryptions(NCE)which is based on decisional compounding residuosity,achieves UC-OT,and it saves O(n)-1 rounds in communication efficiency than bit-OT protocols.Compared with Canetti’s scheme in non-erase model,the message reduced once.Compared with Fischlin’s scheme,the message transfers were reduced twice,and the scheme does not rely on the auxiliary party,therefore it is more practical.

    Performance analysis of space-time block-coded multitone CDMA system
    Wei YANG,Xin-sheng WANG
    2007, 28(7):  35-41.  doi:1000-436X(2007)07-0035-07
    Asbtract ( 57 )   HTML ( 1)   PDF (1202KB) ( 52 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A space-time block-coded multitone code-division multiple-access (STBC MT-CDMA) system was proposed.The uplink bit error rate (BER) performance of the proposed system with maximum ratio combining (MRC) was theoretically analyzed in a multipath fading channel and the corresponding BER expressions were derived,which was verified through simulations.Numerical results show that the BER performance,error floor and capacity of the proposed system are improved significantly due to the joint space-time and path gain.

    On a clock-controlled keystream generator and its cryptographic properties
    Wei-ju MA,Deng-guo FENG
    2007, 28(7):  42-47.  doi:1000-436X(2007)07-0042-06
    Asbtract ( 54 )   HTML ( 3)   PDF (1754KB) ( 109 )   Knowledge map   
    References | Related Articles | Metrics

    A new clock-controlled keystream generator was proposed,which was composed of three shift registers:two clock-controlled linear feedback shift registers A,B,and one clock-controlling nonlinear feedback shift register C.Let l1,l2and l3denote the length of A,B and C,respectively.The clock-control information is from two bit strings of feedback shift register C,and the times A and B shift are according to the Hamming weights of the two strings,respectively.The period,the linear complexity and the k error linear complexity of the keystream generator are studied,and its security was analyzed.

    Improved FFT-based alpha-stable density approximation algorithm
    Yun BAI,Li YU,Guang-xi ZHU,Li LI
    2007, 28(7):  48-53.  doi:1000-436X(2007)07-0048-06
    Asbtract ( 42 )   HTML ( 1)   PDF (781KB) ( 323 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Approximation of density of α-stable process is an elementary works in modeling network flow using α-stable process.Combining the mathematical properties of characteristic function of α-stable process with the traditional approximating algorithm,an improved FFT-based algorithm was proposed.The improved algorithm has 2 noticeable features:automatically choosing the sampling space and sampling interval,importing frequency expansion.Experiments show that it can decrease calculation complexity and effectively control computation error.

    Analysis on traveling time of Internet
    Chao LI,Hai ZHAO,Xin ZHANG,Shao-qian YUAN
    2007, 28(7):  54-60.  doi:1000-436X(2007)07-0054-07
    Asbtract ( 55 )   HTML ( 2)   PDF (1082KB) ( 93 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the giant data samples authorized by CAIDA,it found that the Internet traveling time was typically distributed by multi-modal and heavy-tailed when the Internet traveling time was statistically analyzed.Furthermore,a research on the relationship between the traveling diameter and the traveling time from the whole and local data samples supposed that link delay was the leading cause for the great variance of the traveling time,and a revising algorithm was proposed to process the raw data samples to obtain link delay.The statistical analysis of link delay presented that the ratio of the biggest link delay to the traveling time in more than 90% of paths was over 1/4.Then a definition of dominant delay was put forward.The traveling time is affected greatly by dominant delay,which makes the similar diameter’s traveling time distinct.

    Multi-layered based network security defense system
    Zhi-xin SUN,Zhi-guang REN,Xi YANG,Cheng WANG
    2007, 28(7):  61-69.  doi:1000-436X(2007)07-0061-09
    Asbtract ( 59 )   HTML ( 1)   PDF (741KB) ( 145 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology:for the detection of IP layer,aggregate-based congestion control algorithm (ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage; then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.

    Performance analysis of integrated cellular and ad hoc networks system in the dead spots
    Wei-feng LU,Meng WU
    2007, 28(7):  70-79.  doi:1000-436X(2007)07-0070-10
    Asbtract ( 48 )   HTML ( 1)   PDF (1866KB) ( 67 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new architecture of integrated cellular and ad hoc networks system in the dead spots was introduced,and the system’s relay-availability probability under this environment was analyzed.Then by combining with the relay-availability probability,build the analytical model of integrated cellular and ad hoc networks system,and based on this model,get the call dropping probability of the traditional cellular system and integrated cellular and ad hoc networks system respectively by mathematical analyzing.Finally,through numerical simulation,compare the two kinds of system’s performance under the environment of dead spots,and analyze the impact of the various parameters on the integrated cellular and ad hoc networks system’s performance.

    Performance study of streaming services over all-IP wireless networks
    Hai-bo ZHAO,Xing-guo LUO,Xiao-mei TANG
    2007, 28(7):  80-85.  doi:1000-436X(2007)07-0080-06
    Asbtract ( 40 )   HTML ( 1)   PDF (607KB) ( 185 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An end-to-end quality of service (QoS) analytic method for streaming media over an ALL-IP wireless network was proposed,which was applicable to analyze the cumulative performance degradation along the service architecture based on a bottom-up approach.The radio interface of wireless network consisted of a variable-rate multi-user and multi-channel subsystem.By means of both mathematic analysis and simulations,three QoS attributes were evaluated:delay,throughput and loss rate.

    Technical Report
    Dynamic performance of TCP over optical burst-switched networks
    Jiang-tao LUO,Hao CHANG,Da XIA,Zhi-zhong ZHANG
    2007, 28(7):  86-91.  doi:1000-436X(2007)07-0086-06
    Asbtract ( 25 )   HTML ( 1)   PDF (473KB) ( 38 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Performances of different TCP implementations deployed in OBSN under dynamic competing traffic were compared.The elapsed time taken to transfer a fix-sized file was selected as the metric.In addition,the internal mechanisms of burst drops and cause for performance differences were in detail investigated.It is shown that TCP SACK performs best.

    Service chain-based approach for Web service composition
    Yan-ning FU,Lei LIU,Cheng-zhi JIN
    2007, 28(7):  92-97.  doi:1000-436X(2007)07-0092-06
    Asbtract ( 59 )   HTML ( 5)   PDF (393KB) ( 213 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A semantic match-based method was proposed for searching Web service chain by adopting the semantic matching algorithm for service profiles,which is based on the web services ontology and the domain-related ontology.By resorting to this method,a service chain can be found in accordance with the request for service and can be composed in order to serve needs of requests.It shows how to the discovery of the service chain can be done by applying the method mentioned above to a concrete example.

    α-spectrum estimation method for ARMA SαS process based on FLOC
    Shou-yong WANG,Xiao-bo ZHU
    2007, 28(7):  98-103.  doi:1000-436X(2007)07-0098-06
    Asbtract ( 51 )   HTML ( 1)   PDF (2301KB) ( 168 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The drawback of the parameter estimation method for ARMA SαS process based on fractional lower order moments (FLOM) was analyzed,and based on the conception of fractional lower order covariance (FLOC),a new parameter estimation method of ARMA SαS process was proposed based on FLOC coefficient.Then,the α-spectrum estimation of ARMA SαS process was presented.By estimating the α-spectrum of ARMA SαS process and the sinusoidal signals that embedded in the α-stable noise,the α-spectrum estimation performances of ARMA SαS process based on FLOM and FLOC were compared in detail.Simulation results show that,for small values of alpha,the performance of the proposed α-spectrum estimation method for ARMA SαS process based on FLOC provides better performance than the method based on FLOM.

    Short essay
    Hierarchical semi-fragile digital watermarking algorithm for image tamper localization and recovery
    Quan LIU,Xue-mei JIANG
    2007, 28(7):  104-110.  doi:1000-436X(2007)07-0104-07
    Asbtract ( 74 )   HTML ( 2)   PDF (927KB) ( 383 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A hierarchical semi-fragile digital watermarking algorithm was designed for image content integrality authentication,tamper localization and recovery.In the process of embedding watermarking,2 LSB of all pixels of original image was used to embed watermark,where the authentication watermarking was made up of parity check code and comparison of average intensities between block and sub-block,the recovery watermark was average intensity information of Torus autoorphism mapping block.The watermarking detection algorithm based on a hierarchical structure was divided into three levels to carry out tamper localization and tamper recovery.The experiment results show that the proposed semi-fragile watermarking algorithm had good capability of tamper detection,localization and recovery,and can resist against vector quantization attacks.

    Research on the performance of MAC protocols in UWB-ad hoc system
    Ran YUE,Wei-qiang WU,Qin-yu ZHANG,Nai-tong ZHANG
    2007, 28(7):  111-117.  doi:1000-436X(2007)07-0111-07
    Asbtract ( 48 )   HTML ( 2)   PDF (588KB) ( 196 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In general,QoS guarantee is the basic element for a communication system in the real world.Accordingly,the relationship between transmission power and SINR was investigated,as well as the relationship between SINR and data rate.And different QoS requirements correspond to various applications.Then a MAC protocol,named TDQG was presented based on TH-UWB-ad hoc system,which can guarantee QoS requirements in term of material traffics.TDQG reserves resource to the potential links to accommodate the distributed character of ad hoc network,and dynamically assigns the resource to make the best of it.A mass of simulation results gave more proves to the superiority of TDQG in UWB-ad hoc system.

    Academic communication
    Cross-correlation properties between GMW and WG sequences and that of WG sequences
    Xin TONG,Qiao-yan WEN
    2007, 28(7):  118-122.  doi:1000-436X(2007)07-0118-05
    Asbtract ( 71 )   HTML ( 2)   PDF (1239KB) ( 228 )   Knowledge map   
    References | Related Articles | Metrics

    For odd n,the cross-correlations between Gordon-Mills-Welch (GMW) sequences and Welch-Gong (WG) sequences (decimated WG sequences with one particular exponent) and that of WG sequences were investigated.It shows that the calculations of the cross-correlation between GMW sequences and WG sequences (decimated WG sequences with one particular exponent) and that of WG sequences were all related to the cross-correlation of m-sequences and their decimations.Moreover,the cross-correlation of WG sequences can be 3-valued or 5-valued under a certain condition.Furthermore,the maximum magnitude of the cross-correlation between GMW sequences and WG sequences were given.

    Efficient method for DCT-domain image arbitrary downsampling
    Yao-gang DU,An-ni CAI
    2007, 28(7):  123-128.  doi:1000-436X(2007)07-0123-06
    Asbtract ( 71 )   HTML ( 1)   PDF (1090KB) ( 103 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel approach to resize Images with m/n resizing ratio in the DCT domain,was proposed which expoits the relationship of DCT coefficients between m2input blocks and n2output blocks.Experimental results confirm that the scheme performs about 0.5dB better than Park’s method in terms of PNSR of reconstructed image with a comparable computational speed.The proposed method can be used to any DCT-based compressed video transcoding applications.

    Performance study of TCM-8PSK for nonlinear of high power amplifier
    Ai-hong LI,Shan-zhu XIAO,Jing LI,Er-yang ZHANG
    2007, 28(7):  129-134.  doi:1000-436X(2007)07-0129-06
    Asbtract ( 61 )   HTML ( 1)   PDF (1727KB) ( 195 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The performance of error probability for TCM-8PSK with nonlinearity of high power amplifier was derived,firstly.Then,the dynamic simulation tool — Simulink included in Matlab was used to simulate and verify the derivation result.Finally,the equalization algorithm based on LMS was presented and at the same time the performance was simulated.The results of derivation and simulation are shown that the equalization algorithm reduces the effect of nonlinear distortion and keeps the gain of TCM-8PSK under the nonlinearity condition.

    Analysis of the performance of adaptive arrays with autual coupling compensation
    Rong-feng LI,Yong-liang WANG,Ling-yan DAI,Qian-jun DING
    2007, 28(7):  135-140.  doi:1000-436X(2007)07-0135-06
    Asbtract ( 40 )   HTML ( 1)   PDF (759KB) ( 225 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The performance of adaptive arrays with mutual coupling compensation was analyzed in detail.It was indicated that the adaptive array was able to suppress interference thoroughly.The output power of noise,however,was influenced by the direction of beam scanning,which caused the degradation of the output signal-to-interference-plus-noise ratio (SINR) of the adaptive array.Therefore,the thermal noise is responsible for degrading the output SINR of adaptive arrays after mutual coupling compensation.The conclusions were further demonstrated by the simulation results.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: