Please wait a minute...

Current Issue

    25 June 2008, Volume 29 Issue 6
    Academic paper
    Frame erasure concealment method used for wideband embedded speech codecID-based signature without trusted PKG
    Heng ZHU,Chang-chun BAO,Rui LI
    2008, 29(6):  1-7.  doi:1000-436X(2008)06-0001-07
    Asbtract ( 0 )   HTML ( 1)   PDF (1641KB) ( 5 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An efficient frame erasure concealment(FEC)method for wideband embedded speech codec was proposed.The erased speech frame was classified as voiced,unvoiced,silence,unvoiced transit to voiced and voiced transit to unvoiced at decoder.The energy of excitations was carefully controlled based on the classification of the speech.To match with the configuration of the embedded speech codec,the adaptive codebook for erased frame was recovered with the last frame's bit-stream.For increasing the robustness of the codec,the contribution of adaptive codebook was prop-erly constrained at encoder.The proposed FEC method is very simple and has a good performance without extra delay and bits requirements in codec.This method has been applied to an embedded variable bits rate codec submitted to ITU-T as a candidate.

    ID-based signature without trusted PKG
    Liang ZHOU,Da-peng LI,Yi-xian YANG
    2008, 29(6):  8-12.  doi:1000-436X(2008)06-0008-05
    Asbtract ( 0 )   HTML ( 1)   PDF (914KB) ( 4 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    PKG (private key generater) scheme was presented to overcome Chen-Zhang-Kim's scheme drawback about a large amount of computation and Gorantla-Saxena's scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery on adaptively chosen message and ID attack,assuming CDHP is intractable.The scheme not only is traceable that the arbiter can use Trace algorithm to de-tect deceiver but also eliminates the inherent key escrow problem.As compared with the typical signatures schemes to date,the proposed scheme achieves the higher efficiency.

    New approach against Sybil attack in wireless sensor networks
    Tao FENG,Jian-feng MA
    2008, 29(6):  13-19.  doi:1000-436X(2008)06-0013-07
    Asbtract ( 0 )   HTML ( 2)   PDF (727KB) ( 9 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A particularly harmful attack against many sensor network applications is known as the Sybil attack.A novel approach which is sensor node identity witness information validation for random secret information predistribution to defend against the Sybil attack was proposed,and their comprehensive performance was analyzed.In random secret in-formation predistribution,new secret information assignment schemes were proposed and assign a random set of key-related information to each sensor node based on one-way accumulators.In the common keys set-up phase,node-to-node identity witness authentication and key exchange protocols (IDW-AKE)which are provably secure against the active adversaries in universally composable model was proposed.Using IDW-AKE protocols,each node can com-pute the unique common keys it shares with its neighbors.

    Keeping confidentiality of sensitive attributes in credential during trust negotiation
    Jun-guo LIAO,Fan HONG,Jun LI,Mu-xiang YANG
    2008, 29(6):  20-25.  doi:1000-436X(2008)06-0020-06
    Asbtract ( 0 )   HTML ( 1)   PDF (914KB) ( 6 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The scheme,called SDSA (selectively disclosing sensitive attributes),was proposed to keep confidentiality of sensitive attributes in credential,which had the following characteristics,such as selectively disclosing sensitive attributes in credential,simple key management,no need of the secure third party.The security of SDSA is proved.The application and implementation of SDSA is illuminated through a typical example.

    Pseudo gossip routing algorithm based link stability in mobile ad hoc networks
    Bai-long XIAO,Wei GUO,Jun LIU,Si-lu ZHU
    2008, 29(6):  26-33.  doi:1000-436X(2008)06-0026-08
    Asbtract ( 127 )   HTML ( 3)   PDF (2084KB) ( 373 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The statistic results of link and path availability properties in mobile ad hoc network (MANET)were derived,and a pseudo gossip routing algorithm based on the link stability was proposed.This routing algorithm can select a reli-able path that can last longer by using fewer routing messages.Simulations show that adding the scheme to AODV results in significant performance improvement.

    Long-term prediction for VBR video traffic based on wavelet packet decomposition
    Jian CHEN,Ying-you WEN,Da-zhe ZHAO,Ji-ren LIU
    2008, 29(6):  34-43.  doi:1000-436X(2008)06-0034-09
    Asbtract ( 94 )   HTML ( 1)   PDF (1697KB) ( 77 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Long-term prediction is one of the most difficult problems in the area of VBR video traffic prediction.As to the time variation,non-linearity and long range dependence in VBR video traffic trace,a novel method of feature based on multi-scale decomposition was proposed.On the analysis of the time-frequency distribution characteristics of the video trace,the wavelet packets which have the trait of arbitrary distinction and decomposition are selected.After space partition of wavelet packets,the best wavelet packet basis for feature extraction is picked out.Based on the best basis,it can do fast arbitrary multi-scale WPT (wavelet packet transform),and obtain each higher dimension wavelet coefficients matrix.And then wavelet coefficients prediction is proposed based on LS-SVM and LMS algorithms.The long-term pre-diction of VBR video traffic is obtained through reverse wavelet transforms on the predicted wavelet coefficients.Nu-merical and simulation results are provided to validate the claims.

    Workflow execution mechanism in grid workflow generation
    Shao-hua ZHANG,Yong XIANG,Yu-zhu SHEN,Mei-lin SHI
    2008, 29(6):  44-51.  doi:1000-436X(2008)06-0043-08
    Asbtract ( 68 )   HTML ( 1)   PDF (741KB) ( 189 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Current workflow generation researches often focus on automatic process construction and rarely discuss re-lated execution mechanism.Hence,they often lack of the support for workflow dynamic generation,activity just-in-time resource binding and manual activities.Based on pattern-oriented workflow generation planning,a synthesis execution mechanism in workflow generation was proposed It provides an abstract activity planning approach to support workflow runtime refinement and uses participant servicization approach to facilitate activity-resource just-in-time binding.It minimizes possible runtime exceptions and provides a unified support for manual and automated activities.

    SINR performance analysis of DFT spread generalized multi-carrier system
    Yun RUI,Ming-qi LI,Qin-ying ZHOU,Xiao-dong ZHANG,Hui-yue YI,Hong-lin HU
    2008, 29(6):  52-57.  doi:1000-436X(2008)06-0051-06
    Asbtract ( 105 )   HTML ( 1)   PDF (1615KB) ( 69 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A signal-to-interference-plus-noise ratio (SINR)performance analysis method of discrete fourier transform spread generalized multi-carrier (DFT-S-GMC)system was proposed.The closed-form SINR expression based on simpli-fied frequency-domain equivalent implementation structure and MMSE equalization for receiver is derived by channel frequency response and noise variance,considering inter-block (IFBT symbol)residual interference multiplexed in time domain.Moreover,it can be easily extended to multi-receive antenna.By simulation results,it is shown that with pro-posed equivalent SINR,the BLock error rate (BLER)performance of DFT-S-GMC over slow fading channel is well matched with that over AWGN channel.

    Distributed locating algorithm for wireless sensor networks- MDS-MAP(D)
    Zhen MA,Yun LIU,Bo SHEN
    2008, 29(6):  58-63.  doi:1000-436X(2008)06-0057-06
    Asbtract ( 174 )   HTML ( 10)   PDF (1398KB) ( 420 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new distributed locating algorithm MDS-MAP(D)was proposed,which attempted to improve the perform-ance of node localization in wireless sensor networks.The process of the computation about node relative coordinates and the aggregation from local network to global network are introduced explicitly.Further,the analyses to computational complexity and the simulations of the algorithm are also present.MDS-MAP(D),which is based on node clustering mechanism and uses connectivity of nodes to estimate the coordinates of nodes,reduces the complexity and energy con-sumption of node localization on the absence of distance measurement with high precision.The simulation and analysis results indicate that the complexity of node localization algorithm falls to O(Nm<sub>2</sub>),m<N from O(N<sub>3</sub>)and the accu-racy is improved 1%~3%.

    Reliable transmission control protocol for spatial information networks
    Min ZHANG,Guang-chun LUO,Jun-feng WANG,Lei HUANG
    2008, 29(6):  64-69.  doi:1000-436X(2008)06-0063-06
    Asbtract ( 102 )   HTML ( 1)   PDF (1786KB) ( 523 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A TCP-compatible reliable transmission protocol for spatial information networks SIN (i.e.,STP)was pro-posed.Compared with TCP,STP improves the transmission capability via enhanced algorithms of slow start,congestion avoidance,fast retransmission and recovery.Experiments validate the considerable performance improvements of STP against TCP and prove its adaptability in SIN.

    Gene expression programming function mining based upon grid
    Song Deng,Ru-chuan Wang
    2008, 29(6):  70-75.  doi:1000-436X(2008)06-0069-06
    Asbtract ( 69 )   HTML ( 1)   PDF (1003KB) ( 283 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The concepts of success rate of function mining,weak correlation and merger of function consistency were proposed.On the basis of these,gene expression programming function mining based on grid (GEPFM-Grid)was put forward.By extensive experiment of GEPFM-grid and other traditional algorithms,the results show that success rate of function mining and convergent speed of GEPFM-grid is obviously improved,and that consumptive time is less.

    Public key cryptosystem based on algebraic geometric codes
    Ying ZHANG,Dian-wu YUE
    2008, 29(6):  76-82.  doi:1000-436X(2008)06-0075-07
    Asbtract ( 97 )   HTML ( 3)   PDF (1234KB) ( 697 )   Knowledge map   
    References | Related Articles | Metrics

    A public-key cryptosystem based on algebraic geometric codes was proposed.The cryptosystem is a pub-lic-key system combined with error correcting.Compared with M public-key system and some variants,the performance of the public-key cryptosystem was analyzed.It is shown that the security,information rate,error correcting,and prob-ability of correct decipher were improved.

    Technical Report
    Proved wireless sensor networks time synchronization algorithm based on RBS
    Wen-feng LI,Ru-chuan WANG,Li-juan SUN
    2008, 29(6):  83-87.  doi:1000-436X(2008)06-0082-05
    Asbtract ( 145 )   HTML ( 10)   PDF (1111KB) ( 134 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    IRBS algorithm was proposed on RBS.According to receiver node time,IRBS estimate its real time.During its calculation of two nodes time difference,it realizea time synchronization by the estimating time.Simulation result shows IRBS algorithm can reduce time error and improve time synchronization precision.

    Research on the performance of low-rate DoS attack
    Zhi-jun WU,Meng YUE
    2008, 29(6):  88-94.  doi:1000-436X(2008)06-0087-07
    Asbtract ( 121 )   HTML ( 3)   PDF (1879KB) ( 144 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Low-rate denial of service (LDoS) is a new breed of DoS attack with periodic pulse.LDoS attacks appear pe-riodically in low volume,thereby damaging the victim servers for a long time without being detected.The LDoS attack traffic was simulated and generated by estimating the retransmission time out (RTO) of normal TCP flow based on the analysis of LDoS attack features,and the performance of targets under the attacking of LdoS was tested.Experiments fo-cus on the thoughtout testing of Web and FTP server when LDoS attacks launched.Test results show that LDoS could be even more detrimental to network resources than the flooding type of DDoS attacks,because it is harder to be detected by available method.A lot of useful experimental data for future LDoS detection and defense research were presernted.

    Control and media distribution server for wireless video streaming systems adopting TCP transmission mode
    Yin-yin CHEN,Ying CHAI,De-jian YE
    2008, 29(6):  95-100.  doi:1000-436X(2008)06-0094-06
    Asbtract ( 73 )   HTML ( 2)   PDF (1190KB) ( 128 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To meet high concurrency requirement of streaming service and overcome the high loss ratio of the wireless channel,a wireless video streaming server system was proposed with hybrid centralized-distributed architecture which adopts TCP transmission mode.Theoretical analysis and experimental evaluation results show that the proposed scheme exhibits reasonable scalability,high concurrency and reliable transmit quality.Therefore,the proposed scheme is able to provide good service for one kind of wireless streaming applications.

    Applied quasi-cyclic LDPC codes from doubly-extended RS code and cyclic MDS code
    Guo-hua ZHANG,Xin-mei WANG
    2008, 29(6):  101-106.  doi:1000-436X(2008)06-0100-06
    Asbtract ( 63 )   HTML ( 2)   PDF (1330KB) ( 285 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on doubly-extended RS codes and cyclic MDS codes,two construction schemes were proposed for ap-plied quasi-cyclic LDPC codes whose Tanner graph is free of 4-cycles.In the first approach,all the nonzero codewords within a doubly-extended RS code were employed,and hence provided more flexible parameters than the original or sin-gly-extended RS codes.Equivalent to the method from doubly-extended RS code,a straightforward procedure was de-rived,by which given generator polynomial of an RS code,LDPC codes could be constructed directly without pretreat-ment such as double extension and classification of codewords.In the second method,generator polynomials of cyclic MDS codes were utilized in a straightforward manner to build quasi-cyclic LDPC codes with its Tanner graph free of 4-cycles.Experimental results showed that the constructed codes from the two methods perform well over AWGN channels.

    Concise Papers
    Overlay multicast strategy based on utility optimization for wireless mesh networks
    Cui-tao ZHU,Zong-kai YANG,Wen-qing CHENG,Di WU,He YAN
    2008, 29(6):  108-114.  doi:1000-436X(2008)06-0106-07
    Asbtract ( 51 )   HTML ( 2)   PDF (1290KB) ( 53 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Multicast support is a critical and desirable feature of wireless mesh network (WMN).A distributed algorithm was presented based on pricing scheme by using Lagrange dual decomposition technique.According to the algorithm to joint optimizing rate allocation of flows and power consumption of links for forwarding data flows,to maximize the net utility.The price is associated with each individual network link,which reflects the traffic load on this link.The flow in turn collects the prices of all links on its multicast path and calculates the overall network price,then adjusts the stream-ing rate.The validity and effectiveness of the approach are demonstrated in simulations.

    Differential space-frequency codes with linear constellation precoding
    Yi ZHANG,Can ZHANG
    2008, 29(6):  115-120.  doi:1000-436X(2008)06-0113-06
    Asbtract ( 81 )   HTML ( 1)   PDF (1664KB) ( 233 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at impact on the coding gain by the constant modulus modulated symbols of the tradition- ally differ-ential space-frequency codes,the differential space-frequency codes with linear constellation precoding were proposed.They increased the minimum product distance of codewords and improved the system coding gain.The design method and design principle of linear constellation preorder were described.And normalized differential modulation and differ-ential decoding were introduced.Through analyzing the average pairwise symbol error probability,the improved coding gains compared with traditionally differential space-frequency codes were given in theory.The simulation results also show that the proposed differential space-frequency codes can achieve full diversity and larger coding gain.

    Novel data-aided SNR estimation algorithm for QPSK signal in AWGN channel
    Zheng-bo JIANG,Wei HONG,Jin LIU,Ling TIAN
    2008, 29(6):  121-127.  doi:1000-436X(2008)06-0119-07
    Asbtract ( 141 )   HTML ( 10)   PDF (1970KB) ( 445 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Novel data-aided SNR estimation algorithm for QPSK signal in AWGN channel was presented.The analytical and simulated results show that the new SNR estimator performs better than ML-DA estimators,especially in the condi-tion of low SNR,it is more precise and more reliable,and is not sensitive to phase errors of the receiver.Finally,the ori-gin of the new estimator's error was explored and some suggestions were made on its application.

    Correspondences
    Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
    Fen YAN,Yi-qun CHEN,Hao HUANG,Xin-chun YIN
    2008, 29(6):  128-134.  doi:1000-436X(2008)06-0126-07
    Asbtract ( 86 )   HTML ( 7)   PDF (844KB) ( 195 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An effective DDoS attack detection method on target-end network was proposed.The main goal was to detect attack in early stages with few expenditure,and record the suspicious packets in the same time.For DDoS attacks which based on TCP,many unacknowledged segments will be observed in victim end.In every time period ? t,calculated the ratio of the number of unacknowledged segments and the number of all segments.Then,the statistical sequence based on time came into being.After that,an improved non-parameter recursive CUSUM algorithm was used to detect attack effi-ciently on line.In this procedure,the suspicious packets were also recorded.Experiments prove that this algorithm is fast and efficient.It has low false-positive rate and could adapt to more complex network environments.In addition,it is helpful to attack analysis and tracing.

    Transform coding of DCT coefficients in video encoder
    Zhong-yuan WANG,Rui-min HU,Gang TIAN,Ming LI
    2008, 29(6):  135-138.  doi:1000-436X(2008)06-0133-04
    Asbtract ( 73 )   HTML ( 2)   PDF (517KB) ( 408 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The redundancy among discrete cosine transform(DCT)coefficients in video encoder was found very strong,a method for subband decomposition and transform coding was proposed.Each 8×8 DCT spectrum date of macroblock was regrouped to gather the same frequency bands.The Hadamard transform function was used and orthogonal integer Ha-damard transform formula was derived.Simulation results shows that the proposed approach reduces the spectrum redun-dancy and improves the compression efficiency further compared with conventional DCT coder,however the PSNR loss are almost invisible.This work is expected to contribute to the under drafted international video compression standard H.265.

    The study of intelligence wireless sensor array to monitor parameter of air
    Yuan-chang ZHONG,Bao-ping TANG,Chun-lu TAN,Xuan DING
    2008, 29(6):  139-142.  doi:1000-436X(2008)06-0137-04
    Asbtract ( 103 )   HTML ( 5)   PDF (815KB) ( 389 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A multiple target air parameters monitoring scheme with the help of the wireless intelligence sensor network which is built up with multiple sensors was proposed.The design of the wireless intelligence array sensor was considered,the method to configure the wireless intelligence sensor network was introduced,and the information combination arith-metic of sensor network was provided.Then,a kind of mini-type wireless multiple target air parameters monitoring sys-tem was built up.Experiment result clearly indicates that the system can accomplish the mission of monitoring multiple targets at the same time and the efficiency and reliability,make the air parameter monitoring arrives at a higher level.So the system proposed should be widely used in the domain of air parameter and toxic and harmful gas leakage monitoring.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: