Please wait a minute...

Current Issue

    25 October 2017, Volume 38 Issue Z1
    Papers
    Minimum delay algorithm based on time aggregated graph in DTN network
    Peng WANG,Hong-yan LI,Tao ZHANG,Peng-yun LI
    2017, 38(Z1):  1-8.  doi:10.11959/j.issn.1000-436x.2017228
    Asbtract ( 474 )   HTML ( 18)   PDF (1311KB) ( 749 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The DTN network has the characteristics of dynamic topology change,thus the routing algorithm of static network can not solve the routing problem of time-varying network,and can not support fast transmission of given tasks.The existing time-variant routing algorithm CGR (contact graph routing) uses the earliest contact to obtain the shortest path,but because of the influence of the order of the connectivity period,the CGR algorithm has low link utilization.To solve this problem,the method of finding the shortest path was proposed.Besides,in order to characterize the relation between the different connect periods of the same link,the time series of node cache was added to the time aggregated graph.Based on this,the end-to-end multi-path shortest delay routing algorithm for the known task requirements was proposed.Finally,the feasibility of the algorithm was proved by an example.

    TCCL:secure and efficient development of desktop cloud structure
    Bin WANG,Wei-min LI,Jin-fang SHENG,Si-nuo XIAO
    2017, 38(Z1):  9-18.  doi:10.11959/j.issn.1000-436x.2017229
    Asbtract ( 434 )   HTML ( 3)   PDF (912KB) ( 469 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A secure and efficient development of desktop cloud structure:TCCL (transparent computing-based cloud),which was designed under the guidance of transparent computing,was proposed.TCCL applied the method,separating calculation and storage,loading in a block streaming way which was proposed in the transparent computing theory,to the cloud desktop system,and deployed the defense module of security threats under the cloud VM (virtual machine).As a result,the TCCL could improve the security level on the cloud VMs’ system files and data files,and could optimize the cloud virtual machines' storage efficiency.

    Web plug-in paradigm for anti-DoS attack based on end hopping
    Le-yi SHI,Hui SUN,Yu-wen CUI,Hong-bin GUO,Jian-lan LI
    2017, 38(Z1):  19-24.  doi:10.11959/j.issn.1000-436x.2017230
    Asbtract ( 334 )   HTML ( 17)   PDF (733KB) ( 596 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The end hopping technology is a proactive network defense technology proposed to mitigate the network attack.By changing the IP address,port and other information in the communication pseudo-randomly to achieve the purpose of confusing the attacker.The plug-in mechanism based on the end hopping technology was introduced,and it was applied to the field of Web protection.This plug-in was designed to confuse and interfere with attackers.The plug-in model was divided into two working modes,which are non-end-hopping mode and end hopping mode.The plug-in according to the instructions of the UDP spokesman to switch its own work mode and when the communication link is safe and reliable,it choose the fist mode which can reduce the cost of services.Another,when the network is attacked,the plug-in switches to the end hopping mode to ensure the safety of communications.The experimental results show that the plug-in mechanism based on end hopping has high service and security performance under SYN Flood attack and UDP Flood attack.

    Multifactor task allocation problem in wireless sensor and actuator networks
    Lei MU,Jian-ying CHEN,Xiao-mei QU,Tao LIU
    2017, 38(Z1):  25-31.  doi:10.11959/j.issn.1000-436x.2017232
    Asbtract ( 219 )   HTML ( 9)   PDF (730KB) ( 275 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Task allocation is an essential part of many military applications of WSAN such as intelligent minefield.The key problem of task allocation decision in these systems for the optimal scheme on task allocation is how to obtain the node-target assignment.Combing with the factors of target’s parameters and node’s own status,the various influence factors of task efficiency were analyzed and the positive and negative indicators were processed by range normalization method separately.The linear-weighted task efficiency function was proposed in the applications of WSAN such as intelligent minefield.It can be utilized as the evaluation index of assignment schemes since it reflected the integrated impact of target’s threat and node’s value on the system more comprehensively.Task efficiency function can be constructed flexibly based on the demand of different multifactor task allocation application.The essence of the problem was how to make node-target assignment to achieve the maximum task efficiency of the whole system.This problem turned into assignment problem and can be solved.Finally,an application was implemented to demonstrate this scheme.The results show that the model is suitable for small-scale multifactor task allocation problem in intelligent minefield system.

    Improved SpaceTwist privacy protection method based on anchor optimization algorithm
    Zhen-peng LIU,Xuan ZHAO,Ya-wei DONG,Bin ZHANG
    2017, 38(Z1):  32-38.  doi:10.11959/j.issn.1000-436x.2017231
    Asbtract ( 230 )   HTML ( 5)   PDF (1184KB) ( 522 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With location-based services worldwide used,private location data appealed easily in query process which caused serious security problems.So the introduction of SpaceTwist incremental nearest neighbor query algorithm,proposes protection of privacy method combined with improved SpaceTwist location optimization algorithm.The anchor point authentication server added to distributed system structure,user generate a k anonymous area according to their privacy preference and actual environment,using optimization algorithm to generate the anchor point.Forwarding users use the incremental nearest neighbor query throught the anchor point and accurate.Experiments in road network environment with different data sets show that the privacy protection works well in the algorithm,and own high work efficiency.

    Study on AdaBoost-based link quality prediction mechanism
    Jian SHU,Man-lan LIU,Wei ZHENG
    2017, 38(Z1):  39-45.  doi:10.11959/j.issn.1000-436x.2017233
    Asbtract ( 257 )   HTML ( 6)   PDF (2324KB) ( 653 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The link quality was vulnerable to the complexity environment in wireless sensor network.Obtaining link quality information in advance could reduce energy consumption of nodes.After analyzing the existing link quality prediction methods,AdaBoost-based link quality prediction mechanism was put forward.Link quality samples in deferent scenarios were collected.Density-based unsupervised clustering algorithm was employed to classify training samples into deferent link quality levels.The AdaBoost with SVM-based component classifiers was adopted to build link quality prediction mechanism.Experimental results show that the proposed mechanism has better prediction precision.

    Relay-based cooperative MAC protocol with rate adaptation
    Fang-min LI,Tao ZHANG,Shuang-yin HU,Xin-hua LIU
    2017, 38(Z1):  46-52.  doi:10.11959/j.issn.1000-436x.2017234
    Asbtract ( 267 )   HTML ( 7)   PDF (812KB) ( 497 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The existing wireless cooperative MAC protocols rarely consider the impact of channel condition and node energy consumption.To this issue,a new wireless cooperative MAC protocol was proposed,which used the random linear network coding,and introduced a mechanism of request relay frame to solve the hidden terminal problem.Specifically,the proposed method adaptively adjusted the node rate according to RSSI,and determined the relay node based on the requirements of cooperative transmission.The simulation results show that the network performance can be improved through deploying the proposed protocol.

    Research of sub-channel filter technique in the digital channelization
    Di HE,Fei WEN,Ren-dong YING,Wen-quan WU,Chen HE,Ling-ge JIANG
    2017, 38(Z1):  53-57.  doi:10.11959/j.issn.1000-436x.2017235
    Asbtract ( 358 )   HTML ( 19)   PDF (942KB) ( 839 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the satellite communications,there were very high performance requirements for the satellite transponder due to the restrictions of the volume and weight of the load,and the satellite channelization technique was an important means to solve this problem.The overall implementation structure and the sub-channel filter design method which played a serious role in the system were discussed.It has important practical significance to the overall implementation of the digital channelization.

    Model of human body influence on UWB ranging error
    Jie HE,Ya-nan WU,Shi-hong DUAN,Li-yuan XU,Jia-hui LYU,Cheng XU,Yue QI
    2017, 38(Z1):  58-66.  doi:10.11959/j.issn.1000-436x.2017236
    Asbtract ( 543 )   HTML ( 29)   PDF (2239KB) ( 869 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on UWB channel,in which human body occlusion application scenarios,the influence of human body on TOA range error by measurement and analysis of TOA ranging error was studied.The TOA ranging error model caused by single side of human body through building a suitable measuring platform and dealing with test result was established.Then Matlab software simulation was used to verify the accuracy of TOA ranging error in human occlusion application scenarios,and the influence of creeping surface wave on TOA ranging was analyzed.

    Ocean parameter adaptive time synchronization algorithm for ocean sensor network
    Ying GUO,Jin-xin WANG
    2017, 38(Z1):  67-72.  doi:10.11959/j.issn.1000-436x.2017237
    Asbtract ( 329 )   HTML ( 17)   PDF (712KB) ( 660 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An ocean parameter adaptive time synchronization (OPA-Sync) algorithm was proposed,which based on the influence of ocean parameters in different conditions.It improved the adaptation of time synchronization algorithm by adjusting the ocean parameters in the complex and varied environment.And the algorithm was optimized to improve the operation efficiency.Simulation results show that OPA-Sync can be adapted to different ocean environments,which is better than other existing time synchronization algorithms on the synchronization precision and efficiency.

    Penetration test method using blind SQL injection based on second-order fragment and reassembly
    De-guang LE,Sheng-rong GONG,Shao-gang WU,Feng XU,Wen-sheng LIU
    2017, 38(Z1):  73-82.  doi:10.11959/j.issn.1000-436x.2017238
    Asbtract ( 389 )   HTML ( 10)   PDF (810KB) ( 784 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    How to get rid of the blindness of current SQL injection penetration test,produce the optimized attack pattern of SQL injection,enhance the effectiveness in the phase of attack generation,and improve the accuracy of vulnerability detection of SQL injection using penetration test,is a big challenge.In order to resolve these problems,a new penetration test method using blind SQL injection was proposed based on second-order fragment and reassembly.In this method,the SQL injection attack model was built firstly and then the multiform and multi-type attack patterns of SQL injection penetration test driven by the SQL injection attack model was produced,which can reduce the blindness of SQL injection penetration test and improve the accuracy of SQL injection vulnerability detection.The experiments of SQL injection vulnerability detection was conducted through the actual Web applications by using proposed method in comparison with current methods.The analysis results of test show the proposed method is better compared with other methods,which not only proves the effectiveness of proposed method,but also improve the accuracy of SQL injection vulnerability detection by reducing false negative in the defensive environment.

    Study of key technology for reconfigurable satellite platform supporting network interconnection
    Chao WANG,Xiao-dong HAN,Rui WANG,Xi ZHOU,Lin-lu YANG,Ya-ping LIU
    2017, 38(Z1):  83-87.  doi:10.11959/j.issn.1000-436x.2017239
    Asbtract ( 383 )   HTML ( 11)   PDF (860KB) ( 828 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Reconfigurable satellite platform is a new spacecraft design concept.The application of distributed computing in reconfigurable integrated satellite platform was studied,the standard mechanical interface,electrical interface for the separation or separation between main platform and a variety of payloads to form a new combination and achieve the expansion of platform functions and efficient use was proposed.Including the security control protocol,scalable design,distributed computing and management models and other aspects of a detailed design,the key technologies of reconfigurable integrated satellite platforms supporting network interconnection were studied to meet the existing communications,remote sensing and navigation satellites’ needs.It will be promoted for the spacecraft design to the integrated business and in the orbit reconfiguration direction of continuous development,which will enhance the stability of the orbit operation,survivability and maintainability and provide a reliable technical foundation for the world of integrated network research.

    Research on cloud storage systems supporting secure sharing
    Yan SONG,Zhen HAN,Jian-jun LI,Lei HAN
    2017, 38(Z1):  88-96.  doi:10.11959/j.issn.1000-436x.2017240
    Asbtract ( 322 )   HTML ( 15)   PDF (854KB) ( 548 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A practical scheme for the cloud storage system was proposed to ensure security and efficiency during data sharing.The scheme which combine attribute-based encryption,proxy encryption with symmetric encryption,could integrate access control,efficient search with encryption well together.The scheme archived conjunctive-keyword non-field subset search by using bilinear mapping and polynomial equation.The scheme reduced the cost of decryption by outsourcing most of the decryption operations from the terminal to the cloud.At last,the performance was analyzed and an experiment was made for verification.

    New correlative algorithm and its fast implementation for the acquisition of Y-code without the use of W-code
    Zhu WANG
    2017, 38(Z1):  97-103.  doi:10.11959/j.issn.1000-436x.2017242
    Asbtract ( 255 )   HTML ( 4)   PDF (1071KB) ( 284 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    GPS military positioning system uses P/Y-code to capture signals and then go through tracking and navigation solution.The feasibility research on the acquisition of Y-code was given without the use of W-code.First the basis of the acquisition method was presented.Then,comparison with the standard correlative algorithm the simulation of the algorithm was given to show the characteristics of the new algorithm.At last a segment FFT-based fast implementation of the algorithm was proposed.The correctness of the fast implementation method was proved and Matlab was used to compare the fast implementation with the basic algorithm to show the high efficiency of the former method.

    Resources scheduling and cooperative management of space-based information networks
    Rui WANG,Xiao-dong HAN,Chao WANG,Xi ZHOU,Jun LONG
    2017, 38(Z1):  104-109.  doi:10.11959/j.issn.1000-436x.2017255
    Asbtract ( 478 )   HTML ( 35)   PDF (1807KB) ( 751 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Along with the expansion of the range and space of space-based information networks,and the enhancement of network cognitive ability,real-time,reliability and safety were needed to satisfy higher requirements.The demands of space-based information network designing referred to different platforms and users,random access in anytime,heterogeneous network architecture,cooperative management of different type of resource,and so on.Space-based network operation had the characteristic of high-dynamic,multi-type and big data.The realization of efficient resource management was discussed,and the analysis of multiple dimensions to objects in space-based information networks was realized,the design of dynamic space-based resource virtualization was further mentioned,scheduling and cooperative management was mentioned.

    Tasking planning based on task splitting and merging in relay satellite network
    Run-zi LIU,Min SHENG,Cheng-yuan TANG,Jian-dong LI,Kai DU,Yong-an YANG
    2017, 38(Z1):  110-117.  doi:10.11959/j.issn.1000-436x.2017243
    Asbtract ( 381 )   HTML ( 12)   PDF (950KB) ( 660 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To handle the low planning efficiency of the tasks with too long or too short service time,a task planning scheme was proposed based on task splitting and merging for relay satellite systems.First,a task splitting and merging was developed to transfer the task requirements of user to task units which could be planned with high efficiency.Secondly,based on the parallel machine scheduling model,the optimization problem of the task unit planning to maximize the number of completed tasks in the network was built.Further,a heuristic polynomial time scheduling algorithm was proposed.Simulation results show that compared to the traditional scheme,the task planning scheme perform better in terms of completed task number,resource utilization and fairness.

    Mining and utilization of network protocol’s stealth attack behavior
    Yan-jing HU,Qing-qi PEI
    2017, 38(Z1):  118-126.  doi:10.11959/j.issn.1000-436x.2017244
    Asbtract ( 356 )   HTML ( 5)   PDF (2439KB) ( 491 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The survivability,concealment and aggression of network protocol’s stealth attack behaviors were very strong,and they were not easy to be detected by the existing security measures.In order to compensate for the shortcomings of existing protocol analysis methods,starting from the instructions to implement the protocol program,the normal behavior instruction sequences of the protocol were captured by dynamic binary analysis.Then,the potential stealth attack behavior instruction sequences were mined by means of instruction clustering and feature distance computation.The mined stealth attack behavior instruction sequences were loaded into the general executing framework for inline assembly.Dynamic analysis was implemented on the self-developed virtual analysis platform HiddenDisc,and the security of stealth attack behaviors were evaluated.Excepting to mining analysis and targeted defensive the stealth attack behaviors,the stealth attack behaviors were also formally transformed by the self-designed stealth transformation method,by using the stealth attack behaviors after transformation,the virtual target machine were successfully attacked and were not detected.Experimental results show that,the mining of protocol stealth attack behaviors is accurate,the transformation and use of them to increase information offensive and defensive ability is also feasible.

    FGBC-iDistance:fine-grained bit-code filter based high-dimensional index
    Xin-pan YUAN,Can-fei WANG,Jun LONG,Cheng-yuan ZHANG,Jun-feng MAN
    2017, 38(Z1):  127-134.  doi:10.11959/j.issn.1000-436x.2017245
    Asbtract ( 686 )   HTML ( 16)   PDF (1549KB) ( 759 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In the high-dimensional vector retrieval,distance computation is a very time-consuming operation,the current research trend is to reduce the distance computation using divide and conquer algorithm.iDistance algorithm divides the vector space into subspace of clustering by pivot,BC-iDistance algorithm divides the subspace into 2 partitions in each dimension.A more fine-grained partition algorithm and index structure was proposed,each part corresponded with a unique FGBC code (fine-grained bit code),which realized the candidate sets filtered more precisely.The distance computation times of FGBC-iDistance can be reduced to 1 2 2d of iDistance.The distance computation frequency comparison:FGBC-iDistance≤BC-iDistance≤iDistance.The experiment results show that when the scope radius of the range query is 0.08,FGBC-iDistance distance computation times is about 20,000,which is far less than other algorithms,the running time is also reduced.

    Load balancing multipath routing protocol for mass remote sensing data downlink in LEO satellite network
    Pei-long LIU,Hong-yu CHEN,Song-jie WEI,Hao CHENG,Shuai LI,Jun-yong WANG
    2017, 38(Z1):  135-142.  doi:10.11959/j.issn.1000-436x.2017246
    Asbtract ( 1078 )   HTML ( 24)   PDF (1639KB) ( 1032 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    LEO satellite networks can provide seamless real-time data communication for all kinds of users,which developed rapidly in recent years.At the mean time,the massive payload data down-link system of space data sources,such as remote sensing satellites,still make use of traditional storage and forward mode.The real-time performance of space mission data will be improved effectively,if such satellites are connected to LEO satellite networks equipped with inter satellite links.However,it is necessary to design a specialized satellite network load balancing routing algorithm.Satellite parallel edge-disjoint multipath routing protocol (SPEMR) was designed for remote sensing satellite real-time down-link applications.OPNET simulation results indicate that the performance degradation index(DI) of the multipath scheme implemented by SPEMR is 0.32,which is only 32% of the TLR and 21% of the traditional DSP scheme.It is demonstrated that SPEMR has the better capability of transmitting massive data in real time.

    Research on distributed mobile management of satellite network based on software define network
    Heng-zhi LI,Chun-feng WANG,Wei-zhong WANG,Jie ZHANG
    2017, 38(Z1):  143-150.  doi:10.11959/j.issn.1000-436x.2017247
    Asbtract ( 544 )   HTML ( 21)   PDF (2059KB) ( 1052 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Distributed mobility management (DMM) was an effective method to solve the mobile address handover.Therefore,it was considered to be a technology that can be applied to satellite network mobility management.A distributed mobile management scheme which based on software definition network (SDN) was proposed to solve the traffic redirection problem in satellite network.Different from the traditional DMM application scenario which was network-based or terminal-based,the SDN-DMM scheme implements location management and address handover in SDN controllers.Therefore,SDN-based satellite network distributed mobile management scheme can realize packet forwarding path optimization compared with traditional scheme,and it shows significant advantages in managementcost and traffic management.

    Survey on differential privacy and its progress
    Zhi-qiang GAO,Yu-tao WANG
    2017, 38(Z1):  151-155.  doi:10.11959/j.issn.1000-436x.2017241
    Asbtract ( 1004 )   HTML ( 102)   PDF (770KB) ( 3473 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the arrival of the era of big data sharing,data privacy protection issues will be highlighted.Since its introduction in 2006,differential privacy technology has been widely researched in data mining and data publishing.In recent years,Google,Apple and other companies have introduced differential privacy technology into the latest products,and differential privacy technology has become the focus of academia and industry again.Firstly,the traditional centralized model of differential privacy was summarized,from the perspective of analysis of data mining and data released in the differential privacy way.Then the latest local differential privacy regarding data collection and data analysis based on the local model was described,involving crowdsourcing with random response technology,BloomFilter,statistical inference techniques.Finally,the main problems and solutions of differential privacy technology were summarized.

    Deployment strategy for static chargers in WRSN
    Hao HE,Yong-rui CHEN,Wei-dong YI,Ming LI
    2017, 38(Z1):  156-164.  doi:10.11959/j.issn.1000-436x.2017248
    Asbtract ( 629 )   HTML ( 25)   PDF (768KB) ( 606 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The traditional deployment strategy of static chargers in wireless rechargeable sensor networks (WRSN) covers all the area.The basic idea is to cover all the positions of nodes.A mathematical model of distance between a charger and the farthest node was established,the relationship between the number of nodes and the mathematical expectation of minimum radius of charging was analyzed,and deployment strategy for static chargers was proposed.The method based on the locations of all nodes that need to be charged in the area,used the smallest enclosing circle (SEC) algorithm and finds the optimal location of the charger through Euclidean delivery boy algorithm.It will decrease charging radius,reduce the minimum required transmitted power,thereby saving the average charging energy consumption.The experimental results demonstrated that the less the number locations that the nodes existed,the more energy will be saved.

    DaaC:an architecture modeling of space information network
    Shao-bo YU,Ling-da WU,Xi-tao ZHANG
    2017, 38(Z1):  165-170.  doi:10.11959/j.issn.1000-436x.2017249
    Asbtract ( 391 )   HTML ( 9)   PDF (726KB) ( 598 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As a key to ensure the victory in the future high-tech war and seize the power of heaven,space information network (SIN) has important mission status and military value.The concept,connotation and operation mechanism were introduced,and the overall topology structure of SIN was discussed.The research status of SIN architecture and several typical architecture design methods were described,and the scientific issues and solutions were brought out.Combining the thought of DaaC (data as a center),an architecture model of SIN was explored.Furthermore,DaaC provides a new way for the architecture design of SIN,and the aim of the architecture modeling approach is to provide architectural support for the basic theory and key technical research of SIN.

    Improved least mean square algorithm based in satellite multi-beamforming
    Yu-meng ZHANG,Ming-chuan YANG,Xiao-feng LIU,Zhong-zhao ZHANG
    2017, 38(Z1):  171-178.  doi:10.11959/j.issn.1000-436x.2017251
    Asbtract ( 409 )   HTML ( 23)   PDF (983KB) ( 687 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    High-throughput satellites use multi-beam technology to achieve polarization isolation and spatial isolation to reuse frequency resources,resulting in increased traffic capacity,but this presents a higher demand for fast adaptive beamforming algorithms.In order to solve the shortcoming that the convergence rate and steady-state error can not be satisfied simultaneously when using the LMS algorithm,an improved least mean square algorithm was proposed,which used the statistical average gradient update to solve the problem of the formation of beam instability caused by the instantaneous gradient,which can speed up at the beginning of the beamforming and maintain a small error value after the convergence has reached a steady state.The use of 61-element hexagonal array phased array antenna to form a 7-point beam in an environment where high-throughput satellites have a strong rainfall attenuation was considered.The results show that the improved algorithm can greatly improve the convergence speed and obtain better steady state performance under the condition of only a small increase in complexity,which can be applied to high-throughput satellite beamforming technology with severe inter-beam co-channel interference in emergency communication scenarios.

    The key technologies of millimeter wave MIMO communication system in space information network
    Xin-ying MA,Zhi CHEN,Si MA,Jun FANG
    2017, 38(Z1):  179-185.  doi:10.11959/j.issn.1000-436x.2017250
    Asbtract ( 380 )   HTML ( 21)   PDF (894KB) ( 881 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of space information network and the increasing expansion of mankind activity,the requirements of communication quality become higher between mobile satellites and earth stations.In order to meet the demands of high data rate,large capacity and broadband real-time communication,applying millimeter wave frequency band to mobile satellite communication system has attracted great attention.Beamforming,tracking and channel estimation were introduced in millimeter wave MIMO system to fully understand the challenges of space information network which will face in the future.

    Image deblurring method for satellite platform caused by jitter
    Xiao-lin SONG,Zhong-hao FANG,Jun PAN
    2017, 38(Z1):  186-192.  doi:10.11959/j.issn.1000-436x.2017252
    Asbtract ( 439 )   HTML ( 8)   PDF (1980KB) ( 738 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    TDI CCD camera with its multi-level integral imaging features has become the mainstream sensor of current high-resolution optical remote sensor imaging system,but if there is platform tremor in its imaging process,it will produce images blur,affecting image quality.The influence of platform tremor on imaging quality based on the imaging principle of TDI CCD camera was analyzed.According to the jitter image trajectory obtained by jitter detection,a method was proposed to eliminate image degradation caused by jitter.ZY-3 multi-spectral images were experimented.The experimental results show that the quantitative evaluation index of the image after the jitter image is improved,and the validity of the method is verified.

    Capacity analysis of the MEO satellite constellation
    Ya-hui WANG,Hong-feng KUANG,Li-dong ZHU
    2017, 38(Z1):  193-199.  doi:10.11959/j.issn.1000-436x.2017253
    Asbtract ( 354 )   HTML ( 20)   PDF (1461KB) ( 664 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming to calculate the system capacity of a given satellite constellation,a time-varying traffic model based on varying traffic with varying time zone was proposed.Focusing on a MEO satellite constellation with global coverage,using a load balanced routing algorithm,the system capacity in different time slices was analyzed and the effect of inter-satellite link (ISL) capacity on the system capacity was investigated.The time-varying traffic model makes analysis more reliable and effective via comparison with equal traffic model.Application of time slices reduces complexity of calculation.

    Design of event-triggered state estimator with unknown input in wireless sensor networks
    Cheng-han XIE,Sai-jie LU,Yun-ji LI,Li PENG
    2017, 38(Z1):  200-206.  doi:10.11959/j.issn.1000-436x.2017254
    Asbtract ( 300 )   HTML ( 8)   PDF (875KB) ( 395 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the development of sensors and wireless network technology,a series of new applications based on the wireless sensor has been merged in the past decades.Too much energy consumption and over-abundant occupancy rates of bandwidth are great challenges in these new applications,thus,it is of great practical significance to study the energy saving of the data transmission among these nodes.An estimator with the corresponding event-triggered transmission scheme was investigated for a class of discrete-time stochastic systems subject to unknown input.Its features satisfied the characteristic of unbiased and minimum variance was designed and then the proposed event-triggered strategy,which decided the transfer time of the data packet,can be used to reduce the number of data transmission.Furthermore,an upper bound of system performance was derived for obtaining the parameters of event scheme in details.Finally,a numerical example was given to verify the potential and effectiveness of the proposed theoretical result.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: