Loading...

Table of Content

    26 January 2011, Volume 29 Issue 1
    Communication Engineering
    Cooperative Spectrum Sharing Game in Cognitive Radio Systems
    MA Liang1;2, ZHU Qi1;2;3
    2011, 29(1):  1-8.  doi:10.3969/j.issn.0255-8297.2011.01.001
    Asbtract ( 2260 )   PDF (704KB) ( 2227 )  
    Related Articles | Metrics

     Spectrum allocation in cognitive radio systems is investigated in this paper. Based on the Nash bargaining in cooperative game, an improved utility function is proposed to maximize the profit product of all secondary users. The cooperative game algorithm for spectrum allocation in cognitive radio is used, and the priority of secondary users introduced. We show existence and uniqueness of Nash bargaining solution (NBS) for the new utility in cooperative game. Simulation results indicate that the new algorithm can reflect the secondary users’ priority of spectrum allocation by setting the parameters and make the spectrum allocation more effective and fair.

    SIR Calculation for Fast Iterative ICI Cancellation in STBC Cooperative OFDM System
    PENG Zhang-you1;2, LIU Yan-yan1;2, ZHANG Xing1;2
    2011, 29(1):  27-32.  doi:10.3969/j.issn.0255-8297.2011.01.005
    Asbtract ( 2069 )   PDF (729KB) ( 1624 )  
    Related Articles | Metrics

     Based on the space time block coding (STBC) cooperative orthogonal frequency division multiplexing (OFDM) system, a method for calculating signal-to-interference ratio (SIR) is proposed to cancel inter-carrier interference (ICI) iteratively. By using the initial value of each iteration step instead of the transmitted signal, the method can calculate SIR of the received signal. For large frequency offset, a frequency compensation scheme is used. Error analysis and simulation results show that, when SIR is above 10 dB, difference between the SIR obtained with the proposed method and the theoretical results is below 10?2.

    Heterogeneous Cluster-Based Topology Control Algorithms for Wireless Sensor Networks
    ZHANG Xue-fan
    2011, 29(1):  39-43.  doi:10.3969/j.issn.0255-8297.2011.01.007
    Asbtract ( 1673 )   PDF (649KB) ( 1763 )  
    Related Articles | Metrics

     In wireless sensor networks in which the topology change is small, to reduce energy consumption in cluster head selection, a cluster-based topology control algorithms is proposed. The cluster head is made much more powerful, partitioning a cluster into two rings. The outer ring is further divided into smaller sectors. This algorithm has advantages of both high efficiency in controlling cluster head center, and flexibility of multi-hop
    nodes. A system based on HCTCA can reduce the average transmission radius of nodes and inter-cluster interferences, and improve the network throughput.

    Signal and Information Processing
    Adaptive Despeckling Filter with Edge-Preservation for SAR Image
    XUE Cun-jin1;2, WEN Xiao-yang1;2, DONG Qing1;2
    2011, 29(1):  44-50.  doi:10.3969/j.issn.0255-8297.2011.01.008
    Asbtract ( 2489 )   PDF (7838KB) ( 3099 )  
    Related Articles | Metrics

    To deal with the conflict between speckle removal and edge preservation in the SAR despeckling operations, we propose an adaptive despeckling filter that can preserve edges based on noise identification and edge detection oriented to SAR images. In the filter, the template’s size and shape are adaptively changed according to the noise characteristics, and the edge position and direction in homogeneous and edge regions.
    This way, noise in the SAR image is reduced, while edges are sharpened, and texture and fine structures preserved. RADARSAT-2 SAR HH images covering the North Arctic Pole obtained on August 25, 2010 are used in the experiment. The results show validation and practicability of the method.

    Cepstrum Coefficient Based on Human Auditory Model with Application to Recognition of Acoustic Targets
    LIU Hui1;2, YANG Jun-an1;2, ZHOU Zhi-zeng3
    2011, 29(1):  51-55.  doi:10.3969/j.issn.0255-8297.2011.01.009
    Asbtract ( 1805 )   PDF (790KB) ( 1607 )  
    Related Articles | Metrics

     This paper proposes a cepstrum coefficient model to overcome deficiency in the classic Mel-frequency cepstral coefficients (MFCC). Based on the human auditory model, two improvements are made in computing the new cepstrum features for acoustic target recognition. First, by allowing variable time-frequency resolution and to be immune to noise, wavelet packet transform (WPT) is used instead of FFT in the computation of classic MFCC. This overcomes deficiency of single resolution and reduces sensitivity to complicated battlefield environments. Second, based on the human auditory model, compression with the exponential-law is used instead of the fixed logarithm amplitude spectrum used in the classic MFCC. Experimental results show that the new algorithm can achieve significant advancement over the former method in accuracy and robustness.

    Identification of Scripts in Document Images Using Basic Image Features
    GUO Long, PING Xi-jian, ZHOU Lin, TONG Li
    2011, 29(1):  56-60.  doi:10.3969/j.issn.0255-8297.2011.01.010
    Asbtract ( 1896 )   PDF (893KB) ( 2121 )  
    Related Articles | Metrics

    In this paper, a novel script identification method based on basic image features (BIF) is proposed to resolve the conflict between the speed of feature extraction and accuracy of identification. According to the concept of structural approach to texture analysis, texture basic units are divided into seven types. Support vector machine (SVM) is used to train and classify the features, which describe the structure and distribution of texture basic units, to identify scripts in different languages. Experiments have been performed upon degraded document images including ten languages including Chinese, Russian, English, Japanese, Korean, Arabic, etc. Experimental results confirm that the proposed method can identify scripts accurately and efficiently. It is robust against image degradation.

    Computer Science and Applications
    Routing Table Adaptation Mechanism for Kademlia Protocol
    XU Qiang1, SUN Le-chang1, ZHANG Min2, LIU Hai-tao3
    2011, 29(1):  66-72.  doi:10.3969/j.issn.0255-8297.2011.01.012
    Asbtract ( 1771 )   PDF (689KB) ( 1956 )  
    Related Articles | Metrics

    To improve performance of distribute Hash table (DHT) networks under churn, we study an adaptive mechanism of the routing table for Kademlia protocol. Based on a quantitative analysis, we propose an algorithm for the K value to adjust the routing table size to adapt to the churn rate. The churn rate is estimated from the available data in the routing table. Simulations show that the proposed algorithm can significantly reduce lookup latency under churn and raise the network’s crash point by nearly 10%. Even when the churn rate fluctuates severely, the network still has a satisfactory performance.

    Early TCP Traffic Classification
    PENG Jian-fen1;2, ZHOU Ya-jian1;2, WANG Cong1;2, YANG Yi-xian1;2, PING Yuan1;2
    2011, 29(1):  73-77.  doi:10.3969/j.issn.0255-8297.2011.01.013
    Asbtract ( 2109 )   PDF (605KB) ( 2133 )  
    Related Articles | Metrics

    In order to identify classification quickly and accurately, an early traffic classification method (ETCM) is proposed. The method uses the payload size of three early packets and the server port number obtained from the TCP flow as flow feature, and classifies the traffic based on support vector machine (SVM). The results show that ETCM meets the following conditions: extracted features used, training samples selected without bias, Internet traffic related to WEB, MAIL, BitTorrent and eMule can be identified efficiently and quickly.

    Test of Multiple Scan Chain Grafting Using Test Vector Merging
    LIU Jie1;2, LIANG Hua-guo1, YI Mao-xiang1
    2011, 29(1):  78-82.  doi:10.3969/j.issn.0255-8297.2011.01.014
    Asbtract ( 1586 )   PDF (537KB) ( 1514 )  
    Related Articles | Metrics

     Although multiple scan chains can effectively decrease test time and reduce the test data, it requires more input channels so that the test cost is increased. To solve the problem, a grafting mechanism with multiple scan chains is proposed, which generates base vectors using a dislocation method in order to merge as many driving ends as possible based on correlation in the test vector. Experimental results show that the proposed
    scheme uses fewer channels for the test data input and provides a higher compression ratio while maintaining high-speed testing for multiple scan chains.

    Threat-Driven On-The-Fly Verification of Navigation Model for Web Applications
    HU Li-li1;2, MIAO Huai-kou1;2, CHEN Sheng-bo1;2, MEI Jia1, GAO Hong-hao1
    2011, 29(1):  83-92.  doi:10.3969/j.issn.0255-8297.2011.01.015
    Asbtract ( 1981 )   PDF (692KB) ( 1905 )  
    Related Articles | Metrics

    Security of network software such as Web applications has drawn much attention in the industry.Modeling and verifying Web applications involving intricate interactions are a challenge to software developers.In this paper, we propose a threaten-driven approach to model and verify the on-the-fly navigation model of Web applications. Security properties are extracted from the model based on the threaten-driven method. Using the model checking tool NuSMV, we have verified the model. The experimental results indicate that the proposed approach can avoid state space explosion to a certain extent.

    Control and System
    Quadratic Stability Guaranteed Cost Control for Linear Discrete-Time Switched Systems with Multiple State Time-Delays  
    SUN Wen-an1, YANG Yin1, PEI Bing-nan1, ZHANG Qiang2
    2011, 29(1):  97-104.  doi:10.3969/j.issn.0255-8297.2011.01.017
    Asbtract ( 2029 )   PDF (507KB) ( 1277 )  
    Related Articles | Metrics

    This paper addresses quadratic stability guaranteed cost control for a class of linear discrete-time switched systems with uncertain multiple time-delays in state and input based on LMI theory. By using multiple Lyapunov functions and constructing linear matrix inequalities, several sufficient conditions for the problem under study is derived with a state-based switching law. Controllers of the subsystems are designed and the switching law obtained simultaneously. A numerical example shows effectiveness of the method.

    Platform Framework of Complex Hybrid System Simulation Based on Colored Petri Nets
    FANG Zhe-mei, WANG Ming-zhe, YANG Cui-rong
    2011, 29(1):  105-110.  doi:10.3969/j.issn.0255-8297.2011.01.018
    Asbtract ( 1814 )   PDF (588KB) ( 2141 )  
    Related Articles | Metrics

    This paper proposes a cross-platform framework for hybrid simulation based on the interaction between colored Petri net (CPN) and Matlab, using Petri net as a tool for simulation process control. Utilizing and extending the concept of substitution transition, with the function of fusion place and folding, this framework can accomplish complex logical modeling and establishment of imbedded continuous process for hybrid systems. Besides, the analytical function of CPN reduces difficulty in logical verification for hybrid systems with complex logical behaviors. Finally, by modeling, simulation and analysis of a simple instance, feasibility of the platform and validity of the logic are shown. It provides a new method of modeling and simulation for large and complicated hybrid systems.