Please wait a minute...

Current Issue

    25 September 2010, Volume 31 Issue 9
    Academic paper
    Energy efficient optimal sink position selection algorithm for wireless sensor networks
    Wei TANG,Wei GUO
    2010, 31(9):  1-7.  doi:1000-436X(2010)09-0001-07
    Asbtract ( 0 )   HTML ( 0)   PDF (282KB) ( 33 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The selection of sink position and the routing optimization for energy efficiency were combined,and the shortest path tree (SPT) tessellation was defined.The structure of the SPT tessellation cells in 2-dimension space was analyzed,and a method to search neighboring cells was presented.Three heuristic algorithms were also designed.Simulation experiments are conducted to analyze and compare the performance of the proposed algorithms,and the results show that the performance of the algorithms is close to or able to converge to the global optimality.

    Linearized distortion model for robust speech recognition in noisy environments
    Yong-jun HE,Ji-qing HAN
    2010, 31(9):  8-14.  doi:1000-436X(2010)09-0008-07
    Asbtract ( 0 )   HTML ( 3)   PDF (280KB) ( 25 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The robustness of speech recognition system in noisy environments was investigated.The distortion model in Mel-frequency cepstral coefficient (MFCC) domain is highly non-linear and difficult to deal with.A new linear distortion model was proposed by replacing the logarithm operation with its piecewise l ear interpolation function.Then the estimation of noise parameters and compensation of acoustic models were provided.The proposed method can avoid model error introduced by utilizing linearization methods based on vector Taylor series (VTS) expansion,and significantly improve the robustness of recognizer in noisy environments.

    Cross-layer scheduling and dynamic resource allocation for MI-MO-OFDMA/SDMA systems with multi-service
    Chong-xian ZHONG,Chun-guo LI,Lv-xi YANG
    2010, 31(9):  15-23.  doi:1000-436X(2010)09-0015-09
    Asbtract ( 0 )   HTML ( 0)   PDF (419KB) ( 10 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cross-layer scheduling and dynamic resource allocation problems were investigated for downlink MI-MO-OFDMA/SDMA systems with multi-service.Firstly,a mathematical formulation of the optimization problem was provided with the objective of maximizing the total system throughput under various constraints.Secondly,a user grouping scheme was proposed utilizing clustering analysis based on the type of services and the spatial compatibility of multiple users with multiple receive antennas.Thirdly,a new cross-layer scheduling and dynamic resource allocation algorithm was developed based on the proposed user grouping scheme combined with the priorities of different service,which maximizes the total system throughput by maximiz ng the throughput of each subcarrier.Simulation results show that compared with the existing schemes,the proposed algorithms obtain reasonable throughput performance while provide better QoS requirement for each user of different services.

    Impossible differential attacks on FOX
    Yue-chuan WEI,Bing SUN,Chao LI
    2010, 31(9):  25-30.  doi:1000-436X(2010)09-0024-06
    Asbtract ( 0 )   HTML ( 0)   PDF (200KB) ( 17 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Some 4-round impossible differentials were found by means of“meet-in-the-middle”.By using impossible differential cryptanalysis methods and time-memory balanced technique,the results of previous attacks on FOX“ ”cipher were improved.The experiment results show that For FOX64,5-round attack needs 239chosen plaintexts and 268 encryptions,6-round attack needs 256chosen plaintexts and 2133encryptions,7-round needs 256and 2213.For FOX128,5-round attack needs 272chosen plaintexts and 2134encryptions.Therefore,7-round FOX64/256 and 5-round FOX128/192/256 are not immune to impossible differential attack.

    Study of topology recovery algorithm based on full Steiner minimum tree problem in underwater wireless sensor networks
    Lin-feng LIU,Ye LIU
    2010, 31(9):  31-38.  doi:1000-436X(2010)09-0030-08
    Asbtract ( 0 )   HTML ( 1)   PDF (341KB) ( 29 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The UWSN (underwater wireless sensor network ) model was constructed,and the topology recovery problem was described formally.The topology recovery problem as mapped into the full Steiner tree problem in mathematics.An approximate topology recovery algorithm was proposed for this problem.The suitable movement of autonomous underwater vehicles can not only recover the topology but also improve the targets of delay and energy consumption.The simulation experiments suggest the algorithm proposed can obtain a well-constructed topology,which has lower delay,less energy consumption,and longer UWSN lifetime.

    Joint symbol detection and channel estimation for MIMO-OFDM systems via the variational Bayes EM algorithm
    Xiao-ying ZHANG,Ji-bo WEI,De-gang WANG,Chun-lin XIONG
    2010, 31(9):  39-46.  doi:1000-436X(2010)09-0038-08
    Asbtract ( 0 )   HTML ( 0)   PDF (362KB) ( 77 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new joint symbol detection and channel estimation algorithm was proposed for MIMO-OFDM systems over the time-varying fading channel based on the variational Bayes expectation maximization algorithm and Turbo principle.The channel estimation error covariance matrix was considered in the soft-input soft-output detector which circumvented the undesirable exhaustive search via list sphere decoder(LSD).In addition,a novel Kalman forward-backward channel estimator was derived based on the posterior distributions of the transmitted symbols which were obtained from the space-time detection.Simulation results show that the proposed algorithm has more robust performance than the conventional EM algorithm and decision-directed technique in the time varying multipath channel.

    Uplink capacity analysis of two-hop-relay CDMA cellular systems
    Wei-feng LU,Meng WU
    2010, 31(9):  47-54.  doi:1000-436X(2010)09-0046-08
    Asbtract ( 0 )   HTML ( 0)   PDF (325KB) ( 8 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the two-hop-relay CDMA cellular systems,two kinds of out-of-band relaying methods were pro-posed to improve the conventional CDMA cellular systems.Then by analyzing the interference power of the non-relaying CDMA cellular systems,the overall interference power to own and neighbor cell could be obtained with using these two relaying methods.Finally,based on a symmetrical cell model,the uplink capacity of two-hop-relay CDMA cellular systems was analyzed by mathematical calculating,and the impact of these two relaying methods on system's performance was discussed.

    Research and implementation of network transmission situation awareness
    Ying ZHUO,Chun-ye GONG,Zheng-hu GONG
    2010, 31(9):  55-64.  doi:1000-436X(2010)09-0054-10
    Asbtract ( 0 )   HTML ( 0)   PDF (369KB) ( 100 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The advanced ideas of situation awareness were introduced to network transmission and NTSA (network transmission situation awareness) model was established based on spatial traffic clustering.Around the key technologies of the model,situation factors were selected according to information gain and mutual information; a high-dimensional data stream clustering algorithm for transmission pattern partition as well as a topology importance analysis method of network element based on graph theory were proposed; furthermore,a NTSA prototype system was designed and implemented.The experiment results on real datasets demonstrate the efficiency,effectiveness and scalability.

    Authorization mechanism based on spatial index
    Ying-jun ZHANG,Deng-guo FENG,Kai CHEN
    2010, 31(9):  65-74.  doi:1000-436X(2010)09-0064-10
    Asbtract ( 0 )   HTML ( 0)   PDF (346KB) ( 19 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Considering the access control of spatial database can not support both vector and raster data,and the efficiency is not high.Based on these insufficiencies,an effective index mechanism was developed,which supported both vector and raster data.Moreover,an authorization method was proposed ,which solved the problem of policy conflict and improved the efficiency of authorization evaluation.At last,some experiments were done.The result shows its validity for vector and raster data.Moreover it can be easily used in most space database to improve their efficiency.

    Event region fault-tolerant detection algorithm based on aggregation tree
    Shu-kui ZHANG,Yi-huai WANG,Zhi-ming CUI,Jian-xi FAN
    2010, 31(9):  75-88.  doi:1000-436X(2010)09-0074-14
    Asbtract ( 0 )   HTML ( 0)   PDF (502KB) ( 20 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the fault-tolerant events'region detection problem of wireless sensor network,an algorithm based on aggregation tree was given.The algorithm builds distributed aggregation tree first,each node reports its own perception of data to the nearest tree node,tree node implementation of multiple linear regression,on single or multiple simultaneous events for fault detection,access to the event area detection estimates.At the same time,aggregation network redundant information and reduce data traffic.Simulation results show that the algorithm has a high error detection accuracy,and can improve the event area boundary node error correction.

    New cyclic-ESPRIT algorithms in impulsive noise environment
    Tian LAN,Tian-shuang QIU,Jiao YANG
    2010, 31(9):  89-94.  doi:1000-436X(2010)09-0088-06
    Asbtract ( 0 )   HTML ( 0)   PDF (265KB) ( 7 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The a -stable distribution was taken as the noise model on the direction of arrival (DOA) estimation problem under the cyclostationary signal and impulsive-noise environment.Since the conventional algorithms based on the classical second order cyclic statistics degenerate severely in the impulsive-noise environment,a new concept referred to as the fractional lower order cyclic correlation matrix was presented and the new algorithms were proposed,referred to as the fractional lower order moment total least squares cyclic ESPRIT with two different forms.Simulation results show that the proposed algorithms can effectually give DOA mation under impulsive-noise conditions,and their performance is superior to the cyclic-ESPRIT based on the second order cyclic correlation.

    Decentralized integration of task scheduling with replica placement strategy
    Kan YI,Ru-chuan WANG
    2010, 31(9):  95-102.  doi:1000-436X(2010)09-0094-08
    Asbtract ( 0 )   HTML ( 0)   PDF (293KB) ( 19 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A decentralized architecture of integration of task scheduling with replication placement was put forward in advance.Based on this architecture,a game theory based decentralized replication placement model and related algorithm,Best-Reply algorithm,were proposed.At last,four compositions of task scheduling and replica placement algorithms were compared by simulations in terms of average job completion time and average network load.The result shows that though the integration of decentralized online task scheduling algorithm with best-reply algorithm,against centralized integration algorithms,is a little worse in average job completion time,its average network load changes a little and it can be substituted for the centralized integration algorithms whatever the size of disk space of storage resources is.

    Two improved attacks on the WEP data encryption protocol
    Si-wei SUN,Lei HU
    2010, 31(9):  103-109.  doi:1000-436X(2010)09-0102-07
    Asbtract ( 0 )   HTML ( 0)   PDF (213KB) ( 38 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the WEP protocol in the IEEE 802.11 wireless LAN standard,the chop-chop attack which sends data frames to probe plaintext information and the FMS attack which uses known plain/cipher-text pairs to recover the WEP key are two important attacks.The original chop-chop attack was improved,with both a speedup of the attack by a factor of 16 and a decrease of the amount of data frames needed to 1/16.An improved attack FMS—FMS+ was also pro-posed.Assuming that an attacker is only capable of passively eavesdropping the network communication and under various typical assumptions on the amount of known plain/cipher-text pairs,the number of WEP data frames that can be used by FMS+ is more than twice of that by FMS,and in general cases,FMS+ achieves an improvement of successful key recovery probability of at least 20%,compared with FMS.

    Technical Report
    Uplink cross-layer design algorithm for on-board switch scheme based on OFDM
    Jun-hong DANG,Jian YAN,Zhi-gang CAO
    2010, 31(9):  110-118.  doi:1000-436X(2010)09-0109-09
    Asbtract ( 0 )   HTML ( 0)   PDF (326KB) ( 20 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An uplink cross-layer design procedure and algorithm for on-board switch scheme based on OFDM was pro-posed.The ultimate objective is to maximize the system uplink throughput subject to QoS of services,every user's transmit power constraint and uplink channel condition.The algorithm can adaptively allocate subcarriers and chose modulation scheme for every subcarrier among different users and services.Simulation results show that the proposed algorithm is able to guarantee consistent degree of QoS for the same service.

    Application of ICA in the output signal separation of mode group diversity multiplexing system
    Guo-ying DIAO,Gui-jun HU,Gong-yu LI,Yun-peng CUI
    2010, 31(9):  119-122.  doi:1000-436X(2010)09-0118-04
    Asbtract ( 0 )   HTML ( 0)   PDF (209KB) ( 7 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem that how to separate the mixed signals from the output,the independent component analysis (ICA) algorithm was applied to separate the mixed signals which created by multi-mode fiber MDGM system.FastICA algorithm based on the method of maximizing negentropy was used to separate the actual output signals of the 2×2 MMF-MGDM system in our experiment.Results show that this technology can separate the output signals effectively.

    Population-based cooperative artificial lymphocyte model for network intrusion detection
    Hui-yao AN,Ze-jun WU,Xin-an WANG,Xiu-yun WANG
    2010, 31(9):  123-131.  doi:1000-436X(2010)09-0122-09
    Asbtract ( 0 )   HTML ( 0)   PDF (283KB) ( 23 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Co-stimulation mechanism of lymphocytes was introdued to artificial immune system.About the application of network intrusion detection,concerning on three types of dangerous signals,including network-level,host-level and process-level,a novel artificial lymphocyte detection model was described for a targeted process of recognizing Deni l of Service attacks,worms and Trojan,and experimental results were obtained.This model verifies cooperative capability of multi-lymphocyted and improved intrusion detection rate of artificial immune system.

    Research of Web service reliability enhancement method based on trust fault tolerant
    Mo YANG,Li-na WANG
    2010, 31(9):  133-140.  doi:1000-436X(2010)09-0131-08
    Asbtract ( 0 )   HTML ( 0)   PDF (305KB) ( 38 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A Web service reliability enhancement method based on trust fault tolerant was proposed.Non-evident errors are detected by using voting protocol.A service trust polling detection mechanism was designed.Trust mechanism was built to measure the reliability of the providers.A fault-tolerant-number calculating formula was deduced according to the characteristic of the required domain and the non-functional requirement and a fault tolerant services selection algorithm was proposed.Experiments show that this method has well resistance to malicious attacks.

    New fast intra-prediction mode selection algorithm based on spatio-temporal predicting for H.264
    Ping XU,Qing-shan SHE,Zhao-yang JIN,Wei-dong XU
    2010, 31(9):  141-147.  doi:1000-436X(2010)09-0139-07
    Asbtract ( 0 )   HTML ( 0)   PDF (235KB) ( 32 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new fast intra-prediction mode selection algorithm based on spatio-temporal predicting for H.264 was presented.Using the correlation of spatial and temproal domain in video sequence and constructing the probability histogram of intra prediction mode in the spatial and temporal domain,Pan's algorithm based on edge direction histogram was improved.Experimental results show that the proposed algorithm can significantly reduce coding time and enhance the performance of H.264 while maintaining same image quality and output rate.

    Academic communication
    Analysis and improvement of the CS-based fair exchange protocol
    Yan-bin SUN,Li-ze GU,Yan SUN,Si-han QING,Yi-xian YANG,Guang-hui CHEN
    2010, 31(9):  148-152.  doi:1000-436X(2010)09-0146-05
    Asbtract ( 0 )   HTML ( 0)   PDF (149KB) ( 7 )   Knowledge map   
    References | Related Articles | Metrics

    Through analysis,the perfect concurrent signature (CS)based fair exchange protocol did not satisfy the property of the abuse-freeness if both parties were honest.Before releasing the secret information (keystone),anyone could identify who was the real signer when two parties had exchanged their two ambiguous signatures and relative items.Then,an improved perfect concurrent signature-based fair exchange protocol was presented which overcame the flaw of the previous scheme and realized the property of the abuse-freeness.Meanwhile,the improved scheme also remains the properties of the previous perfect concurrent signature-based fair exchange protocol,such as fairness,non-repudiation and simple efficiency,and only needs four messages between two parties.

    Fuzzy neural network based access selection algorithm in heterogeneous wireless networks
    Wen-xiao SHI,Shao-shuai FAN,Nan WANG,Chuan-jun XIA
    2010, 31(9):  153-158.  doi:1000-436X(2010)09-0151-06
    Asbtract ( 0 )   HTML ( 0)   PDF (219KB) ( 187 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at working out the problem that fuzzy logic and neural network based access selection algorithm didn't consider the load state reasonably in heterogeneous wireless network,a RBF (radial basis function) fuzzy neural network based access selection algorithm was proposed.The algorithm executed factors reinforcement learning for the fuzzy neural network with the objective of the equal blocking probability of accessible networks to adapt for load state dynamically,and achieved the intelligent access judgment.simulation results show that the algorithm can balance the load of heterogeneous wireless networks effectively and guarantee the QoS of real time and non-real time services,as well as decrease the blocking probability compared to the maximu load balance based algorithm (MLB algorithm).

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: