2017 Vol. 26, No. 4

Display Method:
A Family of P Systems for Solving Linear Equations
GUO Ping, WEI Lijiao, CHEN Haizhu, LIU Ran
2017, 26(4): 667-674. doi: 10.1049/cje.2016.10.018
Abstract(421) PDF(483)
Solving linear equations is one of the fundamental problems in numerical calculation and has a wide application in many science and engineering fields. We present a family of P systems to solve linear equations in which the coefficients are real numbers. An instance is given to illustrate the feasibility and effectiveness of our designed P systems. Our work contributes to make P systems to solve more complicated computation problems effectively.
Intrusion Detection Methods Based on Incomplete RFID Traces
LI Peng, WANG Zhen, XU He, ZHU Feng, WANG Ruchuan
2017, 26(4): 675-680. doi: 10.1049/cje.2017.03.011
Abstract(5063) PDF(427)
According to the Radio frequency identification (RFID) tag cloning attack problems of RFID system and the existing problems of intrusion detection research based on incomplete RFID traces, this paper proposes a method of intrusion detection by combining the Markov chain technology and probability statistics technology. We use this method to calculate the threshold that is used to determine whether the tag event is a cloning tag intrusion one. Current research focuses on RFID intrusion detection under the condition of complete RFID traces, such as encryption algorithm improvement, tag authentication protocol improvement, and track and trace technology in RFID supply chain. RFID traces are occasionally to be incomplete, which causes the above methods to be inefficient. Our method proposed in this paper is the solution to incomplete RFID traces which makes up for the study of RFID intrusion detection research.
Even FIB Decomposition Model Based on Storage and Traffic Balancing
CHEN Wenlong, WANG Shuxian, TANG Xiaolan, LAN Lijing
2017, 26(4): 681-687. doi: 10.1049/cje.2016.06.023
Abstract(358) PDF(306)
The sharp expansion of the FIB table rapidly aggravates the hardware cost of Line cards (LCs) in the high-performance distributed routers. The storage optimization of FIB becomes a research hotspot. The traffic load of each LC is still very different in the current nonfull backup storage, which has a deep impact on the overall forwarding performance of the routers. An even FIB decompositionmodel was proposed, namely FEST, aiming for a two-dimension balance in both storage and traffic. Based on the splitting and distribution filters, FEST starts with splitting the root prefixes and utilizes the optimal adaptation algorithm to evenly distribute the routing entries and the traffic to LCs without the modification of the hardware designs of the current LCs. Eventually FEST uses the location routing to determine the location and the forwarding of every packet. The experiment results show that different LCs get very even numbers of routing entries and relatively even traffic in FEST.
A Compact Implementation of AES S-Box Using Evolutionary Algorithm
LIU Yaoping, WU Ning, ZHANG Xiaoqiang, ZHOU Fang, GE Fen
2017, 26(4): 688-695. doi: 10.1049/cje.2016.08.021
Abstract(612) PDF(411)
S-Box based on Composite field arithmetic (CFA) technology is optimized by Genetic algorithm (GA) and Cartesian genetic programming (CGP) model for reducing the hardware complexity. After using the CFA technique to map Multiplicative inverse (MI) over GF(28) into composite field GF((24)2), the compact MI circuit over GF(24) is selected from 100 evolved circuits, and same design method is applied to the compact multiplication circuit over GF(22). Compared with the direct implementations, the areas of optimized circuits of MI over GF(24) and multiplication over GF((22)2) are reduced by 66% and 57.69%, respectively. The area reductions for MI over GF(28) and the whole of S-Box are up to 59.23% and 56.14%, separately. In 180nm 1.8V COMS technology, compared to previous works, the S-Box proposed in this paper has the minimum area and minimum power, which are 11.27% and 6.65% smaller than that of the smallest area S-Box, respectively.
Efficient Protocols for the General Millionaires' Problem
LI Shundong, GUO Yimin, ZHOU Sufang, DOU Jiawei, WANG Daoshun
2017, 26(4): 696-702. doi: 10.1049/cje.2017.06.014
Abstract(681) PDF(686)
Secure multiparty computation (SMC) is a research focusing in the international cryptographic community. The protocols used to address the millionaires' problem are the basic building blocks of most SMC protocols and their efficiency dominates that of many other SMC protocols. To the best of our knowledge, almost all protocols used to address the millionaires' problem are based on integers, which means that their applications are limited. In this study, we propose precise and efficient protocols for rational numbers based on additively homomorphic encryptions. One of our protocols is inspired by computational geometry and it reduces the millionaires' problem to computing the area of a triangle formed by three private points. This approach can determine whether the relationship between two private inputs is greater than, equal to or less than, and it has a much lower computational complexity compared with existing methods. We proved that these protocols are secure using simulation paradigm. Our approaches can be used in many SMC protocols that involve rational numbers and integers, and they can also be used directly to solve some secure multiparty computational geometry problem in rational number field.
A Hybrid Approach to Maximize the Lifetime of Directional Sensor Networks with Smoothly Varying Sensing Ranges
LIU Shufen, GAO Sihua, BAO Tie, ZHANG Yikun
2017, 26(4): 703-709. doi: 10.1049/cje.2017.06.001
Abstract(424) PDF(369)
The difficulty of maximizing the lifetime in directional sensor networks has gained increasing attention recently. Most of the existing studies are focused on directional sensors with single or several predefined sensing ranges. In the present study, directional sensors can change sensing ranges smoothly. We address the problem of maximizing the lifetime in directional sensor networks with such smoothly varying sensing ranges,and propose a hybrid approach that combines a column generation method with an immune genetic algorithm. We search for attractive columns with the genetic algorithm, and optimize them by designing dynamic vaccines. Computational results demonstrate the performance of the proposed approach. Meanwhile, the advantage of the mentioned sensors in terms of solution quality is also revealed.
Rabbet: Using Layout-Aware Backup for RAID Reconstruction
ZHU Xudong, XU Wei, MAO Yuxin, ZHU Ping
2017, 26(4): 710-719. doi: 10.1049/cje.2017.04.009
Abstract(437) PDF(313)
Once a disk of storage system is failed, RAID mechanism will reconstruct to keep the reliability. The reconstruction leads to a sharp deterioration in I/O performance of RAID, and the storage system cannot provide high performance service for the applications. The Multi-TB disk capacity and high load of the application make the reconstruction last for a very long time. This paper proposes Rabbet, a method accelerating RAID reconstruction using data of backup. Rabbet includes a new RAID reconstruction frame, a RAID layout-aware mapping mechanism for backup, and a reconstruction algorithm. The result of experiments shows that, comparing to the classic DOR methods Rabbet shortens the RAID5 reconstruction process to 13.9%-42.8% and decreases the average response time for applications during reconstruction by 3.2%-14.6%. Rabbet also improves the reliability of storage systems.
A 90nm Passive RFID Tag's Custom Baseband Processor for Subthreshold Operation Below 0.3V
SHI Weiwei, PENG Panfeng, CHOY Chiu-Sing
2017, 26(4): 720-724. doi: 10.1049/cje.2017.04.006
Abstract(564) PDF(671)
In the design of passive Radio frequency (RF) tags' baseband processor, subthreshold timing and wide-range-Process, voltage and temperature (PVT) variation problems are the bottlenecks to extend the tag's working range. A sophisticated processor is presented based on the EPC and ISO protocol. Power-aware ideas are applied to the entire processor, including data link portions. Innovatively, a novel custom ratioed logic style is adopted in critical logic paths to fundamentally speed up the circuit operations at ultra-low-voltage. The proposed baseband processor was fabricated in 90nm CMOS, another baseband processor design by regular standard-cell-based design flow was also fabricated for comparison. In measurement the proposed design indicates good robustness in wide-range supply and frequency variation and much more competent for subthreshold operation. It can operate at minimum 0.28V supply with power consumption of 129nW.
Enhancing Differential Evolution with Commensal Learning and Uniform Local Search
PENG Hu, WU Zhijian, DENG Changshou
2017, 26(4): 725-733. doi: 10.1049/cje.2016.11.010
Abstract(413) PDF(365)
Differential evolution (DE) is a popular and powerful evolutionary algorithm for global optimization problems. However, the combination of mutation strategies and parameter settings of DE is problem dependent and choosing the suitable one is a challenge work and timeconsuming. In addition, the deficiency in local exploitation also has a significant influence on the performance of DE. In order to solve these problems, a DE variant with Commensal learning and uniform local search (CUDE) has been proposed in this paper. In CUDE, commensal learning is proposed to adaptively select optimal mutation strategy and parameter setting simultaneously under the same criteria. Moreover, uniform local search enhances exploitation ability. Comprehensive experiment results on all the CEC 2013 test suite and comparison with the state-of-the-art DE variants indicate that the CUDE is very competitive.
Diffusion and Security Evaluation of Feistel-PG
WANG Yanfeng, WU Wenling, ZHANG Lei
2017, 26(4): 734-739. doi: 10.1049/cje.2017.06.017
Abstract(447) PDF(972)
Feistel-PG structure is a new specific Generalized Feistel structure (GFS) adopted in DBlock and LHash. Its main feature is adding a sbox-size permutation before the round function. Different choices of the permutation may affect the security property of ciphers with Feistel-PG structure but how it effects is not clear. We evaluate the values of diffusion round for all possible parameters and summarize the characteristics of optimum shuffles. The results show that one special kind of Feistel-PG achieves full diffusion in less cost than the improved GFS. This advantage may attract the designers' interests and this kind of Feistel-PG ciphers are suggested to designers. We also evaluate the security of suggested ciphers against various byte-oriented attacks, including differential cryptanalysis, linear cryptanalysis, impossible differential attack and integral attack. Some permutations with optimum diffusion but relatively weaker security are filtered out and these permutations should be avoided by designers.
A Secret Confusion Based Energy-Saving and Privacy-Preserving Data Aggregation Algorithm
ZHANG Jun, ZHU Jianghao, JIA Zongpu, YAN Xixi
2017, 26(4): 740-746. doi: 10.1049/cje.2016.08.031
Abstract(424) PDF(984)
To reduce communication overhead on the premise of privacy protection, this study presents a novel secret Confusion based energy-saving and privacypreserving data aggregation algorithm (CESPT). In confusion phase, CESPT confuses real sensory data and their sources by positive-negative pairs and a confusion factor is introduced to determine the quantity of pairs generated by a sensor, the exchange rounds and the threshold of data exchange, which affect communication overhead and privacy intensity of a Wireless sensor network (WSN). In aggregation phase, CESPT adopts a positive-negative neutralization strategy and a well-designed time slice allocation mechanism to reduce network traffic and message collision. In a word, CESPT can greatly reduce data traffic and energy consumption and obtain accurate statistical results on the basis of data privacy.
New Particle Swarm Optimisation Algorithm with Hénon Chaotic Map Structure
YAN Tao, LIU Fengxian, CHEN Bin
2017, 26(4): 747-753. doi: 10.1049/cje.2017.06.006
Abstract(479) PDF(417)
A new Particle swarm optimisation (PSO) algorithm based on the Hénon chaotic map (hereafter HCPSO algorithm) is presented in this paper to deal with the premature convergence problem of the traditional PSO algorithm. The HCPSO algorithm changes the structure of the traditional PSO algorithm and deviates from the structures of conventional hybrid algorithms that merely introduce chaotic searching into PSO. Based on the convergence condition of PSO, the HCPSO algorithm can improve solution precision and increase the convergence rate by combing using the targeting technique of chaotic mapping. For validation, fourteen benchmark functions were used to compare the proposed algorithm with six other hybrid PSO algorithms. The experimental results indicated that the HCPSO algorithm is superior to the other algorithms in terms of convergence speed and solution accuracy.
Improved Fault Attack on LBlock: Earlier Injection with No Extra Faults
GAO Si, CHEN Hua, FAN Limin, WU Wenling
2017, 26(4): 754-759. doi: 10.1049/cje.2017.04.007
Abstract(385) PDF(384)
As one of the most popular lightweight ciphers in recent years, LBlock has attracted great attention. Researchers have explored the security of LBlock against various attacks. We focus on fault attack—one of the most important implementation attacks. In the past two years, fault attacks under the random fault model have been successfully applied to LBlock, supposing faults were injected at the end of the 24th to the 31st round. If faults are injected at the end of the 23rd round, previous attacks only work under the semi-random fault model. For the first time, we address this issue and propose a 23rd round fault attack under the random fault model. Compared with the previous works, our attack extends the fault injection to earlier round, with reasonable time cost and no extra faults. Experiments show that it only takes 10 faults to recover the secret key.
An Adaptive Time Delay Estimator Based on ETDE Algorithm with Noisy Measurements
XIA Wei, JIANG Wenying, ZHU Lingfeng
2017, 26(4): 760-767. doi: 10.1049/cje.2017.04.011
Abstract(455) PDF(285)
We address the problem of adaptive time delay estimation with noisy measurements. We develop a computationally efficient adaptive time delay estimator based on Explicit time delay estimation (ETDE) algorithm, by applying the unbiased impulse response estimation approach. In this algorithm, a weighted error function is derived, and the time delay is explicitly parameterized in the filter coefficients and iteratively updated directly by utilizing the modified error function. Simulations validate the performance of the proposed algorithm for colored input and low signal-to-noise ratio scenarios.
DOA Estimation Using Block Variational Sparse Bayesian Learning
HUANG Qinghua, ZHANG Guangfei, FANG Yong
2017, 26(4): 768-772. doi: 10.1049/cje.2017.04.004
Abstract(510) PDF(755)
In Direction-of-arrival (DOA) estimation, the real-valued sparse Bayesian algorithm degrades the estimation performance by decomposing the complex value into real and imaginary components and combining them independently.We directly use complex probability density functions to model the noise and complex-valued sparse direction weights. Based on the Multiple measurement vectors (MMV), block sparse structure for the direction weights is integrated into the variational Bayesian learning to provide accurate source direction estimates. The proposed algorithm can be used for arbitrary array geometries and does not need the prior information of the incident signal number. Simulation results demonstrate the better performance of the proposed method compared with the real-valued sparse Bayesian algorithm, the Orthogonal matching pursuit (OMP) and l1 norm based complexvalued methods.
Good Linear Codes from Quadratic Residue Codes over a Finite Non-Chain Ring
GAO Jian, MA Fanghui
2017, 26(4): 773-777. doi: 10.1049/cje.2017.05.001
Abstract(465) PDF(674)
This paper is devoted to the study of quadratics residue codes and their extended codes over a finite non-chain ring. A class of Gray maps preserving the self-duality from the ring to the finite field are introduced. Some structural properties of quadratic residue codes and their extended codes are given. As an interesting application of these families of codes, some good linear codes are obtained by a special Gray map.
A Mixed Non-local Prior Model for Image Super-resolution Reconstruction
ZHAO Shengrong, LYU Zehua, LIANG Hu, Mudar SAREM
2017, 26(4): 778-783. doi: 10.1049/cje.2016.06.024
Abstract(353) PDF(579)
Generating high-resolution image from a set of degraded low-resolution images is a challenge problem in image processing. Due to the ill-posed nature of Super-resolution (SR), it is necessary to find an effective image prior model to make it well-posed. For this purpose, we propose a mixed non-local prior model by adaptively combining the non-local total variation and non-local H1 models, and establish a multi-frame SR method based on this mixed non-local prior model. The unknown Highresolution (HR) image, motion parameters and hyperparameters related to the new prior model and noise statistics are determined automatically, resulting in an unsupervised super-resolution method. Extensive experiments demonstrate the effectiveness of the proposed SR method, which can not only preserve image details better but also suppress noise better.
A Sub-pixel Disparity Refinement Algorithm Based on Lagrange Interpolation
MEN Yubo, ZHANG Guoyin, MEN Chaoguang, LI Xiang, MA Ning
2017, 26(4): 784-789. doi: 10.1049/cje.2017.03.002
Abstract(434) PDF(1016)
A sub-pixel disparity refinement algorithm based on Lagrange interpolation is proposed to calculate the sub-pixel disparity and the elevation of the target construction on the remote sensing image. The accurate integer matching feature points are obtained by improved affine scale invariant feature transform. A series of interpolation samples can be estimated through the three times magnification results of each feature matching point and its close neighbor pixels. The final sub-pixel deviation can be calculated by the interpolation samples. Experiment results show that a more accurate elevation information can be obtained on the remote sensing image with corrective epipolar line, and an accurate sub-pixel disparity result can be estimated without the epipolar line constraint as well.
Skeleton-Based Human Action Recognition via Screw Matrices
DING Wenwen, LIU Kai, XU Biao, CHENG Fei
2017, 26(4): 790-796. doi: 10.1049/cje.2017.06.012
Abstract(401) PDF(1104)
With the recent advent of low-cost acquisition depth cameras, extracting 3D body skeleton has become relatively easier, which significantly lighten many difficulties in 2D videos including occlusions, shadows and background extraction, etc. Directly perceived features, for example points, lines and planes, can be easily extracted from 3D videos such that we can employ rigid motions to represent skeletal motions in a geometric way. We apply screw matrices, acquired by using rotations and translations in 3D space, to model single and multi-body rigid motion. Since screw matrices are members of the special Euclidean group SE(3), an action can be represented as a point on a Lie group, which is a differentiable manifold. Using Lie-algebraic properties of screw algebra, isomorphic to se(3), the classical algorithms of machine learning in vector space can be expanded to manifold space. We evaluate our approached on three public 3D action datasets: MSR Action3D dataset, UCF Kinect dataset and Florence3D-Action Dataset. The experimental results show that our approaches either match or exceed state-of-the-art skeleton-based human action recognition approaches.
Parameter Optimization of a Short Open Optical Path's Oxygen Concentration Detection System Based on WMS
ZHU Gaofeng, ZHU Hongqiu, YANG Chunhua, GUI Weihua
2017, 26(4): 797-802. doi: 10.1049/cje.2017.06.011
Abstract(583) PDF(274)
In Wavelength modulation spectroscopy (WMS) system with a short open optical path to detect the oxygen concentration, the system parameter optimization is the preconditions for the accurate inversion of oxygen concentration. Absorption spectroscopy parameters of oxygen were obtained from the HIRTAN database, and the optimal center wavelength and its wavelength offset were confirmed. The laser's working temperature and direct current were determined according to the absorption peak position of photoelectric detection. Modulation parameters and time constant of lock-in amplifier were determined by analyzing intensity and standard deviation of the second harmonic signal. This method has been applied to detect the oxygen concentration in a glass vial, and the results indicate that the linear correlation coefficient of concentration and the second harmonic intensity is 0.9950. The resolution and stability of the detection system have been improved and it can meet the requirements of industrial field.
Object-Based Classification Method for PolSAR Images with Improved Scattering Powers and Contextual Features
YUAN Zhengwu, CHEN Ran, CHEN Cuiping, LUO Xiaobo, LIU Minghao
2017, 26(4): 803-809. doi: 10.1049/cje.2017.03.017
Abstract(359) PDF(327)
This paper proposes a new object-based classification method for Polarimetric synthetic aperture radar (PolSAR) images, which considers scattering powers from an improved model-based polarimetric decomposition approach, as well as the spatial and textural features.With the decomposition, the scattering ambiguities between oriented buildings and vegetation are reduced. Furthermore, various contextual features are extracted from the object and incorporated into the K-nearest neighbors (k-NN) based classification. To reduce the feature redundancy, a new Supervised locally linear embedding (S-LLE) dimensionality reduction method is introduced to map the high dimensional polarimetric signatures into the most compact low-dimensional structure for classification. Experimental results with Airborne synthetic aperture rada (AIRSAR) C-band PolSAR image demonstrate the superior performance to other methods.
Generating Virtual Images for Multi-view Video
ZHANG Lijun, LI Yue, ZHU Qiuyu, LI Mingqi
2017, 26(4): 810-813. doi: 10.1049/cje.2017.06.008
Abstract(721) PDF(948)
As for the research in the Free view television (FTV) and stereo video areas, the accurate multi-view video capture is a expensive precondition. We present a virtual multi-view video capture system based on OpenGL programming. By using this system, a researcher may create arbitrary 3D scenes, and capture images with depth maps by setting up multiple virtual cameras, whose intrinsic and extrinsic parameters can be imported from or exported to the outside.We conducted several experiments within it to perform camera calibration, depth estimation and view-points synthesis. The system has been demonstrated to be a powerful tool for evaluation of stereo video algorithms.
Greedy Matrix Completion with Fitting Error and Rank Iterative Minimization
WANG Youhua, ZHANG Yiming, ZHANG Jianqiu, HU Bo
2017, 26(4): 814-819. doi: 10.1049/cje.2017.06.013
Abstract(427) PDF(305)
A novel matrix completion algorithm which iteratively minimizes the fitting error and the matrix rank is presented. Unlike conventional matrix completion algorithms, which usually require some relaxation technique to cope with the low rank constraints, the proposed algorithm does not require any such techniques, thus making the selection of the parameter q of the matrix q-norm (0 < q ≤1) or the regularization parameter unnecessary. Simulation results of the random generated data and Jester joke data set verify our algorithm's effectiveness and superiority over the reported algorithms in literature.
Asynchronous Group Authentication
MIAO Fuyou, JIANG Huiwen, JI Yangyang, XIONG Yan
2017, 26(4): 820-826. doi: 10.1049/cje.2016.08.015
Abstract(422) PDF(288)
Group authentication usually checks whether an individual user belongs to a pre-defined group each time but cannot authenticate all users at once without public key system. The paper proposes a Randomized component-based asynchronous (t,m,n) group authentication ((t,m,n)-RCAGA) scheme. In the scheme, each user employs the share of (t,n)-threshold secret sharing as the token, constructs a Randomized component (RC) with the share and verifies whether all users belong to a pre-defined group at once without requiring all users to release randomized components simultaneously. The proposed scheme is simple and flexible because each group member just uses a single share as the token and the scheme does not depend on any public key system. Analyses show the proposed scheme can resist up to t-1 group members conspiring to forge a token, and an adversary is unable to forge a valid token or derive a token from a RC.
CPSec DLP: Kernel-Level Content Protection Security System of Data Leakage Prevention
MA Zhaofeng
2017, 26(4): 827-836. doi: 10.1049/cje.2017.05.002
Abstract(511) PDF(1171)
Data leakage prevention (DLP) is very important for sensitive or unauthorized data protection, however, most current DLP technologies are based on content monitor, detection and filtering, which can be easily bypassed or cheated. We propose a thorough and highlevel Content protection secure scheme of DLP (CPSec DLP) based on kernel-level mandatory encryption, in which we proposed mutual authentication and key agreement method between client and server, and we adopted SM2 algorithm for session key management; and we propose kernel-level mandatory secure middleware for unstructured data protection, in which the secure middleware works in File system driver (FSD) layer supporting for “write-encryption, open-decryption” operation, once the data is written to storage space either in hard-disk or USB disk the data is mandatorily encrypted, while when the data is open the mandatory secure middleware decrypts the data to plain in system memory. Moreover we propose data share and delivery among domain internal users and external customers. In the CPSec DLP scheme, the encryption algorithms, security policy and rules can be dynamically parameterized when necessary, while in the lifecycle the data management can only be used according to its usage control rules, such as read-only, write, save, print, export, backup rights. Upon the proposed CPSec DLP, we implemented the CPSec DLP system in kernel-level driver layer based on FSD, which supports parameterized process and document format for unstructured data leakage protection. Large amount of experiments manifest the proposed scheme is secure, reliable, extendible and efficient for kinds of format unstructured data leakage protection.
A Detection-Switching-Assisted DCF Mechanism for Simulcast WLAN-over-Fiber Based Distributed Antenna Systems
FAN Yuting, LI Jianqiang, XU Kun, DAI Yitang
2017, 26(4): 837-841. doi: 10.1049/cje.2016.06.022
Abstract(438) PDF(1011)
Distributed antenna systems (DASs) using Radio-over-fiber (RoF) links is a promising candidate to provide flexible coverage and high data rates. For simulcast Wireless local-area network (WLAN) use in RoF systems, the stations covered by different Remote antenna units (RAUs) contend for the wireless medium using Media access control (MAC) mechanism. Severe inter-RAU hidden nodes problem will happen due to the stations in different RAUs cannot detect each other very well. In order to alleviate this inter-RAU collision problem, a promising detection-switching-assisted Distributed coordination function (DCF) mechanism is presented using in the uplink. The control delay issues of the proposed mechanism are also discussed in this paper.
SINR Driven Joint Network Selection Policy in the Heterogeneous Internet of Things
LIU Xinyi, JIANG Jian
2017, 26(4): 842-848. doi: 10.1049/cje.2017.05.004
Abstract(464) PDF(309)
In the heterogeneous Internet of things (IoT), the Signal to interference plus noise ratio (SINR) and delay constraint are two important factors that influence the throughput of IoT and the performance of users. Until recently, most network selection policy researches were based on either the Shannon theory or the signal strength, while the combined influence of the delay constraint and the SINR, which has a significant impact on resource utilization, is hardly considered. We therefore propose an SINR driven joint network selection policy, which incorporates the delay constraint and the signal strength into the SINR. This policy permits IoT users to access the network with the maximum of SINR from all the available networks under the delay and signal strength constraints. Theoretical analysis and the simulation results show that the joint network selection policy can obtain the higher throughput of IoT and average SINR comparing with other polices.
Scheduling Rate-Constrained Flows with Dynamic Programming Priority in Time-Triggered Ethernet
ZHANG Yingjing, HE Feng, LU Guangshan, XIONG Huagang
2017, 26(4): 849-855. doi: 10.1049/cje.2017.06.002
Abstract(476) PDF(1048)
Time-triggered (TT), Rate-constrained (RC) and Best-effort (BE) traffics are included in Timetriggered ethernet (TTEthernet). For RC messages transmission is affected by TT messages, traditional scheduling policy cannot be well applied in TTEthernet. Dynamic programming priority (DPP) algorithm combines priority policy and dynamic programming algorithm for scheduling RC flows. The time slice for RC flows transmission is got by SMT solver YICES; RC flows are classified to different groups according to the priorities; Higher priority packets in one time slice are scheduled using First input first output (FIFO) policy and lower priority packets are scheduled by Dynamic programming policy. DPP policy guarantees different real-time requirements of heterogeneous RC flows, and make the best of time slice resource in aviation industries. The upper bound End-End of three methods and algorithm feasibility is analyzed. Simulation in aviation shows that DPP policy can obtain better real-time performance than other scheduling algorithms.
Q-Learning Based Interference-Aware Channel Handoff for Partially Observable Cognitive Radio Ad Hoc Networks
XU Ning, ZHANG Huyin, XU Fang, WANG Zhiyong
2017, 26(4): 856-863. doi: 10.1049/cje.2017.06.015
Abstract(453) PDF(990)
Channel handoff is a crucial function for Cognitive radio ad hoc networks (CRAHNs). The absence of centralized infrastructures and the limited power make the handoff design more challenging. A learningbased interference-aware handoff scheme is proposed for distributed CRAHNs. We model the channel handoff process as a Partially observable Markov decision process (POMDP) and adopt a Q-learning algorithm to find an optimal handoff strategy in a long term. The proposed algorithm obtains an efficient transmission performance by considering the interferences among SUs and PUs. To achieve PU awareness, the handoff scheme predicts the PU activities by using the historical channel usage statistics. In addition, we also propose a refined channel selection rule to compromise between learning speed and cumulative transmission reward. The simulation results show that the proposed handoff scheme can adapt to the PU activities and achieves a better performance in terms of high throughput and low collisions. And the learning process keeps a considerable balance between convergence time and cumulative reward.
A Collision Arbitration Protocol Based on Specific Selection Function
SU Jian, REN Yuqing, YANG Ying, HAN Yu, WEN Guangjun
2017, 26(4): 864-870. doi: 10.1049/cje.2017.06.016
Abstract(344) PDF(305)
Fast and effective identifications of a large number of items are required in many Radio-frequency identification (RFID) applications. Simultaneous responses from multiple tags are corrupted by collisions and thus result in low identification efficiency. To address the problem of low identification efficiency, many existing tag anticollision algorithms try to schedule the identification process to avoid collisions. A novel anti-collision scheme based on specific selection function is presented, in which tags pick a slot according to a selection function instead of being randomly assigned to slots within a frame. If collision occurs, the reader sends the custom command SETBM according to the collision information. When probed by the SETBM, the tags apply the selection function to its partial ID and send the mapped result to the reader. According to the mapped result, the reader assigns the time slot to the tags. All tags collided in the same slot will be identified by the tree traversal scheme. Compared to the most of existing anti-collision algorithms, simulation results show that our proposed algorithm can achieve better performance in terms of identification efficiency, time efficiency, and energy consumption.
A New Adaptive Subsample ETDE for Large-Range Time-Varying Delay Estimation Using Low-Order Interpolators
ZHENG Zhe, ZHOU Yang, WU Siliang
2017, 26(4): 871-875. doi: 10.1049/cje.2016.08.020
Abstract(315) PDF(634)
We present a new adaptive subsample Explicit time delay estimator (ETDE) that is well suitable for determining and tracking the large-range time-varying delay between two noisy bandlimited signals only using low-order interpolators. Unlike conventional ETDE where a Fractional delay filter (FDF) is used, the new ETDE is based on a novel on-line interpolator which has the ability to optimally synthesize any continuously variable nonintegral sample delay. The theoretical derivations for our proposed on-line interpolator and the new ETDE algorithm are provided. Simulations are presented to evaluate the performance of the new estimator and to compare the performance with other estimators. Simulation results show that the new ETDE significantly outperforms FDF-based ETDE when the delay is large or varies in a large range, and the same filter orders are used.
SAR Slow Moving Target Imaging Based on Over-Sampling Smooth Algorithm
SHI Hongyin, YANG Xiaoyan, ZHOU Qiuxiao, LIAN Qiusheng
2017, 26(4): 876-882. doi: 10.1049/cje.2017.06.005
Abstract(547) PDF(925)
A novel Synthetic aperture radar (SAR) signal processing technique has been proposed which refocused slow moving targets based on phase retrieval algorithm. After theoretical derivation, we can get that the raw data Fourier magnitude of slow moving targets is approximate to the stationary ones in the SAR system. By applying the Fourier magnitude of received data to phase retrieval algorithms, the blur and defocusing effect caused by the moving of the targets can be eliminated. The simulated results demonstrate the validity of this algorithm.
A SAR Image Segment Method Using Gray Level Reduction Based on Graph in ICA Space
JI Jian, LYU Xiaojia, YAO Yafeng
2017, 26(4): 883-888. doi: 10.1049/cje.2017.06.018
Abstract(450) PDF(361)
This paper proposes a new SAR image segmentation method based on graph and gray level reduction in Independent component analysis (ICA) space. Firstly, according to the grayscale information of SAR image, effective use of gray level reduction for initial segmentation can group the pixels with same or similar values to the same homogeneous region, which can address the problem of over-segmentation. Secondly, the features of regions are extracted in ICA space, and then the similarity degree can be calculated by Euclidean distance. The initial regions are merged in fully connected graph based on minimum spanning tree in ICA space. The process of region merging is divided into two phases; the first phrase is merging the different regions with the largest similarity degree, the second will focus on updating the fully connected graph for iteration. Finally, experimental and comparative results on synthetic and real SAR images verify the efficiency of the proposed algorithm.