Loading...
Home
Journal
Editorial Board
Instruction
Subscription
Solicit
Contact Us
中文
Table of Content
30 March 2015, Volume 33 Issue 2
Previous Issue
Next Issue
Communication Engineering
Joint Decoding Algorithm for IRA Code Combined with Network Coding in Cooperative Communications
DAI Cui-qin, RAN Hai-xia
2015, 33(2): 105-116. doi:
10.3969/j.issn.0255-8297.2015.02.001
Asbtract
(
1233
)
PDF
(2361KB) (
771
)
References
|
Related Articles
|
Metrics
By combining multiple information copies from different source nodes at the destination node in a cooperative relay network, we propose a joint irregular repeat accumulate (IRA) code and network coding modified decoding (JI-NMD) algorithm. We first demodulate the modulation information with soft demodulation information of each link, and extract the information copies from the relay node at the destination. This is done according to the functional relationships between the network coding at relay node and the original information in the direct link. We then update the soft demodulation information of the two copies from the direct and cooperative links in the IRA decoder, and construct a new decoding decision method. We further obtain a simplified log-likelihood ratio (LLR)method. Finally, we analyze the outage probability and spectral efficiency. Simulationresults show that the JI-NMD algorithm has lower bit error rate for QPSK and 16QAM.
Unsupervised Feature Analysis and Classification of Video Streams
YAO Li-tao, DONG Yu-ning
2015, 33(2): 117-128. doi:
10.3969/j.issn.0255-8297.2015.02.002
Asbtract
(
1238
)
PDF
(9812KB) (
533
)
References
|
Related Articles
|
Metrics
For recognition of flow statistical features based on machine learning, the key is to select distinguishable features of different traffic flows. This paper presents several QoSrelated statistical features that can well discriminate video traffics. To make full use of the advantages of hierarchical clustering algorithm, this paper uses a flexible feature selection strategy to mark the network video streaming of different levels. Experiments are performed on a large scale real network video data. The results show that the proposed method can achieve significantly higher classification accuracy compared to existing methods. Keywords: video streaming, statistical features, QoS, traffic classification, hierarchical clustering
Resource Allocation for Machine-to-Machine Communications with Multiple Access in Cellular Networks
LIN Qi-zhong, ZHANG Dong-mei, XU Kui, XIE Wei
2015, 33(2): 129-141. doi:
10.3969/j.issn.0255-8297.2015.02.003
Asbtract
(
1313
)
PDF
(11534KB) (
440
)
References
|
Related Articles
|
Metrics
An increasing number of machine-to-machine (M2M) devices are accessing upstream of the cellular network, while the resource is limited. This paper analyzes the resource allocation problem when M2M devices multiple access upstream with time division multiple access (TDMA) or frequency division multiple access (FDMA). An algorithm is proposed to allow sleep mode to dynamically allocate resource. By dropping a small fraction of arrivals from the devices farther out near the cell edge, the base station can increase its maximum load. While allowing dormancy and relating remaining energy with sleep mode, both the base station centrally dynamically allocating resource and devices’ distributed opportunistic uploading can achieve a network lifetime longevity compared with no sleep mode.
Intensity and Expansion of Partially Coherent Beam Propagating in Slant and Horizontal Atmospheric Turbulence
KE Xi-zheng, WANG Wan-ting
2015, 33(2): 142-154. doi:
10.3969/j.issn.0255-8297.2015.02.004
Asbtract
(
1323
)
PDF
(6334KB) (
831
)
References
|
Related Articles
|
Metrics
Based on the generalized Huygens-Fresnel principle, we derive the cross-spectral density function using the modified von Karmon spectrum and atmospheric refractive-index structure constant issued by ITU-R. We also derive analytic expressions of intensity distribution and beam width of partially coherent Gaussian-Schell beam propagating in the atmosphere along slant and horizontal paths. The impact on the beam propagating in the two ways due to turbulence intensity, zenith, coherence length of the beam and other parameters are discussed. They are compared respectively from the perspective of normalized intensity distribution and relative expansion. The results show that the normalized intensity distribution of the beam in a free space along a horizontal path is the same as that along a slant path. The normalized intensity distribution is more concentrated, with the peak much stronger when zenith is smaller, while the effects of the turbulence become weaker. Impact on the zenith expansion, turbulence, coherence of the beam is almost consistent with the slant path.
Accurate and Low Overhead Mechanism for Measuring Available Bandwidth
ZHOU Yi-qiu1, CHEN Bing1, QIAN Hong-yan1, Lü Zong-lei2
2015, 33(2): 155-166. doi:
10.3969/j.issn.0255-8297.2015.02.005
Asbtract
(
1189
)
PDF
(10311KB) (
560
)
References
|
Related Articles
|
Metrics
The available end-to-end bandwidth is an important specification in network measurement. Most tools need to spend much time in measuring and analyzing before calculating the available bandwidth. This paper proposes a low overhead mechanism for accurate and fast measurement of the available bandwidth by analyzing the cross traffic effect in the Internet. A model is established to reflect the relationship between utilization and the sending rate of probe packets, which is combined with an extended Kalman filter to obtain the new available bandwidth. This mechanism does not require any prior knowledge of the bottleneck link capacity and can reduce the effect of accuracy. Besides, the sending rate of probing packets can be much lower than the available bandwidth. Performance of the mechanism is verified numerically, showing fast response to burst cross traffic, low estimation error, and short convergence time.
Two-Dimensional DOA Estimation for Planar Array via Reduced-Dimension Capon
JIANG Chi|ZHANG Xiao-fei|ZHANG Li-cen
2015, 33(2): 167-177. doi:
10.3969/j.issn.0255-8297.2015.02.006
Asbtract
(
1966
)
PDF
(3338KB) (
1084
)
References
|
Related Articles
|
Metrics
This paper discusses estimation of two-dimensional (2D) direction of arrival (DOA) for a planar array, and derives a reduced-dimension Capon (RD-Capon) algorithm. The first parameter is obtained by searching the spectrum peak of transformation of the covariance matrix, obtained from the received signal. The second parameter is estimated using least squares. The algorithm uses one-dimensional global search to achieve a joint estimation of 2D DOA. This algorithm based on one-dimension local searches can avoid high computational cost within 2D-Capon algorithm by spectrum peak search, with the performance close to the 2D-Capon algorithm. The proposed algorithm can obtain automaticallypaired 2D DOA estimation for planar array. It works well for the sources with the same azimuth (or elevation). Simulation results verify the usefulness of the algorithm.
Blind Recognition of Self-Synchronized Scrambler Based on Linear Block Code
ZHANG Min1,2, Lü Quan-tong1,2, ZHU Yu-xuan3
2015, 33(2): 178-186. doi:
10.3969/j.issn.0255-8297.2015.02.007
Asbtract
(
1423
)
PDF
(6684KB) (
1237
)
References
|
Related Articles
|
Metrics
A blind recognition method of self-synchronous scrambler based on the linear block code with unbiased information source is proposed. Different run characteristics of the linear block code and random sequence are analyzed, leading to the conclusion that the run feature of correctly extracted scrambler sequence differs from that of the wrong one. A polynomial of the scrambler is determined with maximum value search in all possible Euclidean distances between the run ratios of extracted and random sequences. Experiments and simulation results show correctness of the theoretical analysis. Blind recognition of self-synchronous scrambler after the linear block code with unbiased information source can be realized, useful in engineering application.
Adaptive Speech Enhancement for Microphone Array
XU Jin1,2, ZHAO Yi-bo1,2, GUO Ye-cai1,2
2015, 33(2): 187-193. doi:
10.3969/j.issn.0255-8297.2015.02.008
Asbtract
(
1449
)
PDF
(2032KB) (
1259
)
References
|
Related Articles
|
Metrics
In a complex speech environment, microphone array speech enhancement techniques can effectively extract target speech signals and eliminate noise. In a conventional microphone array, the beam forming weighting coefficients are fixed. To flexibly control the beam forming direction of the microphone array and eliminate residual noise due to side-lobes, this paper presents an adaptive enhancement technique for microphone array speech. A microphone array with an adaptive filter is used to form a controllable generalized sidelobe canceller (GSC), followed by improved spectral subtraction with a Chebyshev window function. Simulation results show that the proposed method can effectively remove noise, improving the performance by about 3.5 dB with respect to the ordinary GSC.
ISSR Model of Message Propagation in Microblog Networks
LU Jing1,2,3, YU Xiao-qing1,2, WAN Wang-gen1,2
2015, 33(2): 194-202. doi:
10.3969/j.issn.0255-8297.2015.02.009
Asbtract
(
1726
)
PDF
(7705KB) (
627
)
References
|
Related Articles
|
Metrics
We divide microblog users into three types: uninformed, forwarder and rejecter, and propose an uninformed-spreader-spreader-rejecter (ISSR) model based on the real situation of message propagation in a microblog network and the classical epidemic model susceptible-infectious-removed (SIR). The transmission mechanism is described in detail. We also give a steady-state analysis of the mean-field equations of the model. The network evolution model corresponding to the statistical property of real networks is built based on the crawled information from Sina microblog users in Shanghai’s typical universities. Dynamics of the networks is analyzed. Simulation results show a larger retweeting rate and a smaller rejecting rate may improve the spreading range of the microblog message. Meanwhile, the multiple retweeting rate has a certain influence on the density of spreaders.
Computer Science and Applications
AdaBoost Algorithm with Classification Belief
YAN Chao, WU Yue, YUE Xiao-dong
2015, 33(2): 203-214. doi:
10.3969/j.issn.0255-8297.2015.02.010
Asbtract
(
1517
)
PDF
(6680KB) (
1061
)
References
|
Related Articles
|
Metrics
Ensemble learning is widely accepted and used in machine learning. This paper proposes a multi-class ensemble learning algorithm named AdaBoost belief. The algorithm improves AdaBoost·SAMME by attaching weights to classes in every weak classifier. These weights, called class beliefs, are computed based on class accuracy collected in each round of the iteration. We compare the algorithm with AdaBoost·SAMME in many aspects including learning accuracy, generalization ability, and theory support. Experimental results indicate that the proposed method has a competitive learning ability and high prediction accuracy in Gaussian sets, several UCI sets, anda number of log-based intrusion detection applications. When the class number increases so that prediction of classes becomes more difficult, the prediction error rate of the proposed algorithm increases slower than AdaBoost·SAMME.
Design of Alliance Identity Authentication Scheme in Cloud Computing Environment
WANG Chong-xia1, DING Yan2, LIU Qian2, ZHOU Xian-wei2
2015, 33(2): 215-222. doi:
10.3969/j.issn.0255-8297.2015.02.011
Asbtract
(
1163
)
PDF
(4599KB) (
1241
)
References
|
Related Articles
|
Metrics
This paper presents a “contract”-related certification protocol in a cloud computing alliance environment. With a signature algorithm of combined public and private data, “contract” trust relationship is built among alliance clouds. By taking advantage of the trust relationship, distributed management of user identity information and “contract” related certification are realized in the cloud alliance. The proposed protocol uses bulletin board, time stamp, signature, and anti-collision hash function to reduce information interaction, effectively preventing data tampering, replay, and middle attack. Theoretical analysis shows that the proposed protocol is secure and efficient. It requires less computation and communication overhead, and provides a concise and security solution for alliance identity authentication in a cloud environment.
Office Online
Authors Login
Peer Review
Editorial Work
Editor-in-Chief
Office Work
Journal
Just Accepted
Current Issue
Archive
Advanced Search
Volumn Content
Most Read
Most Download
E-mail Alert
RSS
Download
>
Links
>
JAS E-mail
CNKI-check
SHU
Information
Bimonthly, Founded in 1983
Editor-in-Chief:Wang Tingyun
ISSN 0255-8297
CN 31-1404/N