News

Most cited

Baidu Google scholar CSCD Crossref WebOfScience Sciencedirect
Published within: In last 1 yearsIn last 2 yearsIn last 3 yearsAll

Condition: Baidu + All
Please wait a minute...
For Selected: Toggle Thumbnails
Energy-balanced unequal clustering protocol for wireless sensor networks
JIANG Chang-jiang , SHI Wei-ren, XIANG min, TANG Xian-lun
Acta Metallurgica Sinica(English letters)    2010, 17 (4): 94-99.   DOI: 10.1016/S1005-8885(09)60494-5
Abstract4177)      PDF       Save

Clustering provides an effective way to prolong the lifetime of wireless sensor networks. One of the major issues of a clustering protocol is selecting an optimal group of sensor nodes as the cluster heads to divide the network. Another is the mode of inter-cluster communication. In this paper, an energy-balanced unequal clustering (EBUC) protocol is proposed and evaluated. By using the particle swarm optimization (PSO) algorithm, EBUC partitions all nodes into clusters of unequal size, in which the clusters closer to the base station have smaller size. The cluster heads of these clusters can preserve some more energy for the inter-cluster relay traffic and the ‘hot-spots’ problem can be avoided. For inter-cluster communication, EBUC adopts an energy-aware multihop routing to reduce the energy consumption of the cluster heads. Simulation results demonstrate that the protocol can efficiently decrease the dead speed of the nodes and prolong the network lifetime.

Reference | Related Articles | Metrics
Cited: Baidu(220)
On-demand coding-aware routing in wireless Mesh networks
Acta Metallurgica Sinica(English letters)    2010, 17 (5): 80-86.   DOI: 10.1016/S1005-8885(09)60511-2
Abstract2129)            Save

Network coding, which exploits the broadcast nature of wireless medium, is an effective way to improve network performance in wireless multi-hop networks, but the first practical wireless network coding system COPE cannot actively detect a route with more coding opportunities and limit the coding structure within two-hop regions. An on-demand coding-aware routing scheme (OCAR) for wireless Mesh networks is proposed to overcome the limitations specified above by actively detecting a route with more coding opportunities along the entire route rather than within two-hop regions. Utilizing more coding opportunities tends to route multiple flows ‘close to each other’ while avoiding interference requires routing multiple flows ‘away from each other’. OCAR achieves a tradeoff by adopting as routing metric in route discovery, which is not only coding-aware but also considers both inter and intra flow interference. Simulation results show that, compared with Ad-hoc on-demand distance vecfor routing (AODV) and AODV+COPE, OCAR can find more coding opportunities, thus effectively increase network throughput, reduce end to end delay and alleviate network congestion.

Reference | Related Articles | Metrics
Cited: Baidu(161)
Survey of multi-channel MAC protocols for IEEE 802.11-based wireless Mesh networks
Acta Metallurgica Sinica(English letters)    2011, 18 (2): 33-44.   DOI: 10.1016/S1005-8885(10)60042-8
Abstract3577)            Save

This paper reviews multi-channel media access control (MAC) protocols based on IEEE 802.11 in wireless Mesh networks (WMNs). Several key issues in multi-channel IEEE 802.11-based WMNs are introduced and typical solutions proposed in recent years are classified and discussed in detail. The experiments are performed by network simulator version 2 (NS2) to evaluate four representative algorithms compared with traditional IEEE 802.11. Simulation results indicate that using multiple channels can substantially improve the performance of WMNs in single-hop scenario and each node equipped with multiple interfaces can substantially improve the performance of WMNs in multi-hop scenario.

Reference | Related Articles | Metrics
Cited: Baidu(121)
Energy-efficient relay selection and optimal relay location in cooperative cellular networks with asymmetric traffic
Wei YANG
Acta Metallurgica Sinica(English letters)    2010, 17 (6): 80-88.   DOI: 10.1016/S1005-8885(09)60529-X
Abstract1961)            Save

Energy-efficient communication is an important requirement for mobile relay networks due to the limited battery power of user terminals. This paper considers energy-efficient relaying schemes through selection of mobile relays in cooperative cellular systems with asymmetric traffic. The total energy consumption per information bit of the battery-powered terminals, i.e., the mobile station (MS) and the relay, is derived in theory. In the joint uplink and downlink relay selection (JUDRS) scheme we proposed, the relay which minimizes the total energy consumption is selected. Additionally, the energy-efficient cooperation regions are investigated, and the optimal relay location is found for cooperative cellular systems with asymmetric traffic. The results reveal that the MS-relay and the relay-base station (BS) channels have different influence over relay selection decisions for optimal energy-efficiency. Information theoretic analysis of the diversity-multiplexing tradeoff (DMT) demonstrates that the proposed scheme achieves full spatial diversity in the quantity of cooperating terminals in this network. Finally, numerical results further confirm a significant energy efficiency gain of the proposed algorithm comparing to the previous best worse channel selection and best harmonic mean selection algorithms.

Reference | Related Articles | Metrics
Cited: Baidu(115)
New constructions of quaternary low correlation zone sequence sets
Acta Metallurgica Sinica(English letters)    2015, 22 (5): 45-48.   DOI: 10.1016/S1005-8885(15)60679-3
Abstract2166)      PDF       Save
Sequence sets with low correlation have very important applications in modern communication systems. As in quasi-synchronous code-division multiple access (QS-CDMA) system, sequence sets with low correlation zone (LCZ) perform better than other well-known sequence sets. Furthermore, binary or quaternary sequence sets are preferred because of their easy implementation. In this paper, based on the inverse Gray mapping and special binary sequence pairs, new quaternary LCZ sequence sets were constructed. In the LCZ, the maximum of the nontrivial autocorrelation and crosscorrelation values is 1 which show that the QS-CDMA system used the new sequences sets can control the interference in a very low level.
Reference | Related Articles | Metrics
Cited: Baidu(103)
Joint power allocation and subcarrier pairing in OFDM-based cooperative relaying system
Acta Metallurgica Sinica(English letters)    2012, 19 (1): 24-30.   DOI: 10.1016/S1005-8885(11)60223-9
Abstract1863)            Save

This paper proposes rate-maximized (MR) joint subcarrier pairing (SP) and power allocation (PA) (MR-SP&PA), a novel scheme for maximizing the weighted sum rate of the orthogonal-frequency-division multiplexing (OFDM) relaying system with a decode-and-forward (DF) relay. MR-SP&PA is based on the joint optimization of both SP and power allocation with total power constraint, and formulated as a mixed integer programming problem in the paper. The programming problem is then transformed to a convex optimization problem by using continuous relaxation, and solved in the Lagrangian dual domain. Simulation results show that MR-SP&PA can maximize the weighted sum rate under total power constraint and outperform equal power allocation (EPA) and proportion power allocation (PCG).

Reference | Related Articles | Metrics
Cited: Baidu(92)
Timely traffic identification on P2P streaming media
Acta Metallurgica Sinica(English letters)    2012, 19 (2): 67-73.   DOI: 10.1016/S1005-8885(11)60247-1
Abstract1926)            Save

Since the year of 2006, peer-to-peer (P2P) streaming media service has been developing rapidly, the user scale and income scale achieve synchronous growth. However, while people enjoying the benefits of the distributed resources, a great deal of network bandwidth is consumed at the same time. Research on P2P streaming traffic characteristics and identification is essential to Internet service providers (ISPs) in terms of network planning and resource allocation. In this paper, we introduce the current common P2P traffic detection technology, and analyze the payload length distribution and payload length pattern in one flow of four popular P2P streaming media applications. Combining with the deep flow inspection and machine learning algorithm, a nearly real-time identification approach for P2P streaming media is proposed. The experiments proved that this approach can achieve a high accuracy with low false positives.

Reference | Related Articles | Metrics
Cited: Baidu(80)
Performance evaluation of new echo state networks based on complex network
Acta Metallurgica Sinica(English letters)    2012, 19 (1): 87-93.   DOI: 10.1016/S1005-8885(11)60232-X
Abstract1989)            Save

Recently, echo state networks (ESN) have aroused a lot of interest in their nonlinear dynamic system modeling capabilities. In a classical ESN, its dynamic reservoir (DR) has a sparse and random topology, but the performance of ESN with its DR taking another kind of topology is still unknown. So based on complex network theory, three new ESNs are proposed and investigated in this paper. The small-world topology, scale-free topology and the mixed topology of small-world effect and scale-free feature are considered in these new ESNs. We studied the relationship between DR architecture and prediction capability. In our simulation experiments, we used two widely used time series to test the prediction performance among the new ESNs and classical ESN, and used the independent identically distributed (i.i.d) time series to analyze the short-term memory (STM) capability. We answer the following questions: What are the differences of these ESNs in the prediction performance? Can the spectral radius of the internal weights matrix be wider? What is the short-term memory capability? The experimental results show that the proposed new ESNs have better prediction performance, wider spectral radius and almost the same STM capacity as classical ESN’s.

Reference | Related Articles | Metrics
Cited: Baidu(80)
Efficient representation of text with multiple perspectives
Acta Metallurgica Sinica(English letters)    2012, 19 (1): 101-111.   DOI: 10.1016/S1005-8885(11)60234-3
Abstract1850)            Save

An effective text representation scheme dominates the performance of text categorization system. However, based on the assumption of independent terms, the traditional schemes which tediously use term frequency (TF) and document frequency (DF) are insufficient for capturing enough information of a document and result in poor performance. To overcome this limitation, we investigate exploring the relationships between different terms of the same class tendency and the way of measuring the importance of a repetitive term in a document. In this paper, a group of novel term weighting factors are proposed to enhance the category contribution for each term. Then, based on a novel strategy of generating passages from document, we present two schemes, the weighted co-contributions of different terms corresponding to the class tendency and the weighted co-contributions for each term in different passages, to achieve improvements on text representation. The prior scheme works in a dimensionality reduction mode while the second one runs in the conventional way. By employing the support vector machine (SVM) classifier, experiments on four benchmark corpora show that the proposed schemes could achieve a consistent better performance than the conventional methods in both efficiency and accuracy. Further analysis also confirms some promising directions for the future works.

Reference | Related Articles | Metrics
Cited: Baidu(77)
Orthogonal isometric projection for face recognition
Jia-Kuo ZUO
Acta Metallurgica Sinica(English letters)    2011, 18 (1): 91-97.   DOI: 10.1016/S1005-8885(10)60033-7
Abstract1977)            Save

Isometric projection (IsoProjection) is a linear dimensionality reduction method, which explicitly takes into account the manifold structure embedded in the data. However, IsoProjection is non-orthogonal, which makes it extremely sensitive to the dimensions of reduced space and difficult to estimate the intrinsic dimensionality. The non-orthogonality also distorts the metric structure embedded in the data. This paper proposes a new method called orthogonal isometric projection (O-IsoProjection), which shares the same linear character as IsoProjection and overcomes the metric distortion problem of IsoProjection. Similar to IsoProjection, O-IsoProjection firstly constructs an adjacency graph which can reflect the manifold structure embedded in the data and the class relationship between the sample points of face space, and then obtains the projections by preserving such a graph structure. Different from IsoProjection, O-IsoProjection requires the basis vectors to be orthogonal, and the orthogonal basis vectors can be calculated by iterative way. Experimental results on ORL and Yale databases show that O-IsoProjection has better recognition rate for face recognition than Eigenface, Fisherface and IsoProjection.

Reference | Related Articles | Metrics
Cited: Baidu(72)
Resource scheduling in downlink LTE-advanced system with carrier aggregation
Acta Metallurgica Sinica(English letters)    2012, 19 (1): 44-49.   DOI: 10.1016/S1005-8885(11)60226-4
Abstract1996)            Save

In this paper, we focus on the resource scheduling in the downlink of long term evolution advanced (LTE-A) assuming equal power allocation among subcarriers. Considering the backward compatibility, the LTE-A system serves LTE-A and long term evolution (LTE) users together with carrier aggregation (CA) technology. When CA is applied, a well-designed resource scheduling scheme is essential to the LTE-A system. Joint scheduling (JS) and independent scheduling (INS) are two resource scheduling schemes. JS is optimal in performance but with high complexity. Whereas INS is applied, the LTE users will acquire few resources because they can not support CA technology. And the system fairness is disappointing. In order to improve the system fairness without bringing high complexity to the system, an improved proportional fair (PF) scheduling algorithm base on INS is proposed. In this algorithm, we design a weigh factor which is related with the number of the carriers and the percentage of LTE users. Simulation result shows that the proposed algorithm can effectively enhance the throughput of LTE users and improve the system fairness.

Reference | Related Articles | Metrics
Cited: Baidu(70)
Fuzzy Q-learning in continuous state and action space
XU Ming-liang, XU Wen-bo
Acta Metallurgica Sinica(English letters)    2010, 17 (4): 100-109.   DOI: 10.1016/S1005-8885(09)60495-7
Abstract2048)      PDF       Save

An adaptive fuzzy Q-learning (AFQL) based on fuzzy inference systems (FIS) is proposed. The FIS realized by a normalized radial basis function (NRBF) neural network is used to approach Q-value function, whose input is composed of state and action. The rules of FIS are created incrementally according to the novelty of each element of the pair of state-action. Moreover the premise part and consequent part of the FIS are updated using extended Kalman filter (EKF). The action that impacts on environment is the one with maximum output of FIS in the current state and generated through optimization method. Simulation results in the wall-following task of mobile robots and the inverted pendulum balancing problem demonstrate that the superiority and applicability of the proposed AFQL method.

Reference | Related Articles | Metrics
Cited: Baidu(67)
Message redundancy removal of multi-copy routing in delay tolerant MANET
Acta Metallurgica Sinica(English letters)    2011, 18 (1): 42-48.   DOI: 10.1016/S1005-8885(10)60026-X
Abstract2252)            Save

This article puts forward a new scheme to control message redundancy efficiently in delay tolerant mobile Ad-hoc networks (MANET). The class of networks generally lacks end-to-end connectivity. In order to improve the efficiency that messages are delivered successfully, multiple message copies routing protocols are usually used, but the network load is increased due to a large number of message redundancies. In the study, by using counter method, every node adds an encounter counter based on epidemic routing scheme. The counter records the number which the node encounters other nodes with the same message copy. If the counter of a node reaches the installed threshold, the node removes the copy. Theoretical analysis gives a lower bound of threshold in delay tolerant MANET. According to the lower bound of threshold, a rational threshold is installed in real environment. With proposed scheme message copies decrease obviously and are removed completely finally. The successful delivery efficiency is still the same as epidemic routing and the redundant copies are efficiently controlled to a relatively low level. Computer simulations give the variation of message copies concerning different thresholds in fast and slow mobility scenes.

Reference | Related Articles | Metrics
Cited: Baidu(67)
Zero-bit watermarking resisting geometric attacks based on composite-chaos optimized SVR model
Acta Metallurgica Sinica(English letters)    2011, 18 (2): 94-101.   DOI: 10.1016/S1005-8885(10)60050-7
Abstract1892)            Save

The problem to improve the performance of resisting geometric attacks in digital watermarking is addressed in this paper. Based on the optimized support vector regression (SVR), a zero-bit watermarking algorithm is presented. The proposed algorithm encrypts the watermarking image by using composite chaos with large key space and capacity against prediction, which can strengthen the safety of the proposed algorithm. By using the relationship between Tchebichef moment invariants of detected image and watermarking characteristics, the SVR training model optimized by composite chaos enhances the ability of resisting geometric attacks. Performance analysis and simulations demonstrate that the proposed algorithm herein possesses better security and stronger robustness than some similar methods.

Reference | Related Articles | Metrics
Cited: Baidu(66)
Urban scene recognition by graphical model and 3D geometry
Acta Metallurgica Sinica(English letters)    2011, 18 (3): 110-119.   DOI: 10.1016/S1005-8885(10)60072-6
Abstract1792)      PDF       Save

This paper proposes a simple and discriminative framework, using graphical model and 3D geometry to understand the diversity of urban scenes with varying viewpoints. Our algorithm constructs a conditional random field (CRF) network using over-segmented superpixels and learns the appearance model from different set of features for specific classes of our interest. Also, we introduce a training algorithm to learn a model for edge potential among these superpixel areas based on their feature difference. The proposed algorithm gives competitive and visually pleasing results for urban scene segmentation. We show the inference from our trained network improves the class labeling performance compared to the result when using the appearance model solely.

Reference | Related Articles | Metrics
Cited: Baidu(63)
Adaptively secure hierarchical identity-based signature in the standard model
Acta Metallurgica Sinica(English letters)    2010, 17 (6): 95-100.   DOI: 10.1016/S1005-8885(09)60531-8
Abstract1822)            Save

Hierarchical identity-based signature (HIBS) has wide applications in the large network. However, the existing works cannot solve the trade-off between the security and efficiency. The main challenge at present is to construct a high efficient and strong secure HIBS with a low computation cost. In this paper, a new construction of HIBS scheme is proposed. The new scheme achieves the adaptive security which is a strong security in the identity-based cryptography. But our scheme has short public parameters and the private keys size shrinks as the hierarchy depth increases. The signature size is a constant and the cost of verification only requires four bilinear pairings, which are independent of hierarchy depth. Furthermore, under the q-strong computational diffie-Hellman problem (q-SDH) assumption, the scheme is provably secure against existential forgery for adaptive chosen message and identity attack in the standard model.

Reference | Related Articles | Metrics
Cited: Baidu(62)
Unequal clustering algorithm for WSN based on fuzzy logic and improved ACO
Song MAO Zhao Cheng-Lin
Acta Metallurgica Sinica(English letters)    2011, 18 (6): 89-97.   DOI: 10.1016/S1005-8885(10)60126-4
Abstract2178)      PDF       Save

This paper proposes a novel energy efficient unequal clustering algorithm for large scale wireless sensor network (WSN) which aims to balance the node power consumption and prolong the network lifetime as long as possible. Our approach focuses on energy efficient unequal clustering scheme and inter-cluster routing protocol. On the one hand, considering each node’s local information such as energy level, distance to base station and local density, we use fuzzy logic system to determine one node’s chance of becoming cluster head and estimate the corresponding competence radius. On the other hand, adaptive max-min ant colony optimization is used to construct energy-aware inter-cluster routing between cluster heads and base station (BS), which balances the energy consumption of cluster heads and alleviates the hot spots problem that occurs in multi-hop WSN routing protocol to a large extent. The confirmation experiment results have indicated the proposed clustering algorithm has more superior performance than other methods such as low energy adaptive clustering hierarchy (LEACH) and energy efficient unequal clustering (EEUC).

Reference | Related Articles | Metrics
Cited: Baidu(62)
CCI-based link quality estimation mechanism for wireless sensor networks under non-perceived packet loss
SHU Jian, TAO Juan, LIU Lin-lan, CHEN Ye-bin, ZANG Chao
Acta Metallurgica Sinica(English letters)    2013, 20 (1): 1-10.   DOI: 10.1016/S1005-8885(13)60001-1
Abstract2386)            Save

This paper proposes a chip correlation indicator (CCI)-based link quality estimation mechanism for wireless sensor networks under non-perceived packet loss. On the basis of analyzing all related factors, it can be concluded that signal-to-noise rate (SNR) is the main factor causing the non-perceived packet loss. In this paper, the relationship model between CCI and non-perceived packet loss rate (NPLR) is established from related models such as SNR versus packet success rate (PSR), CCI versus SNR and CCI-NPLR. Due to the large fluctuating range of the raw CCI, Kalman filter is introduced to do de-noising of the raw CCI. The cubic model and the least squares method are employed to fit the relationship between CCI and SNR. In the experiments, many groups of comparison have been conducted and the results show that the proposed mechanism can achieve more accurate measurement of the non-perceived packet loss than existing approaches. Moreover, it has the advantage of decreasing extra energy consumption caused by sending large number of probe packets.

Reference | Related Articles | Metrics
Cited: Baidu(62)
Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards
Acta Metallurgica Sinica(English letters)    2012, 19 (5): 104-114.   DOI: 10.1016/S1005-8885(11)60307-5
Abstract1497)            Save

With the broad implementations of the electronic business and government applications, robust system security and strong privacy protection have become essential requirements for remote user authentication schemes. Recently, Chen et al. showed that Wang et al.’s scheme is vulnerable to the user impersonation attack and parallel session attack, and proposed an enhanced version to overcome the identified security flaws. In this paper, however, we show that Chen et al.’s scheme still cannot achieve the claimed security goals and report its following problems: (1) It suffers from the offline password guessing attack, key compromise impersonation attack and known key attack; (2) It fails to provide forward secrecy; (3) It is not easily repairable. As our main contribution, a robust dynamic ID-based scheme based on non-tamper resistance assumption of the smart cards is presented to cope with the aforementioned defects, while preserving the merits of different related schemes. The analysis demonstrates that our scheme meets all the proposed criteria and eliminates several grave security threats that are difficult to be tackled at the same time in previous scholarship.

Reference | Related Articles | Metrics
Cited: Baidu(61)