首页 > 最新文献

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

英文 中文
P2P-based E-commerce Trust Model and Strategies 基于p2p的电子商务信任模型与策略
Chen Xin
This article, from the prospect of P2P e-commerce advantages and challenges, discusses the risks of P2P e-commerce issues, and points out that trust is the basis of all business activities. Business organizations should take certain measures against risks from P2P e-commerce. The effective confidence-building mechanism can enable e-commerce more secure, reduce the risk of people's expectations, and enhance confidence in the P2P e-commerce. Taking into account the needs of e-commerce data security, this paper provides P2P-based e-commerce trust model. This model has inherited the advantages of traditional P2P model, combined with confidence-building mechanism to check for the main business in order to provide a highly reliable low-cost application.
本文从P2P电子商务优势与挑战的前景出发,探讨了P2P电子商务存在的风险问题,并指出信任是一切商业活动的基础。商业机构应对P2P电子商务带来的风险采取一定的措施。有效的信任机制可以使电子商务更加安全,降低人们期望的风险,增强人们对P2P电子商务的信心。考虑到电子商务数据安全的需要,本文提出了基于p2p的电子商务信任模型。该模式继承了传统P2P模式的优点,结合建立信任机制对主业进行检查,从而提供高可靠的低成本应用。
{"title":"P2P-based E-commerce Trust Model and Strategies","authors":"Chen Xin","doi":"10.1109/NSWCTC.2009.372","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.372","url":null,"abstract":"This article, from the prospect of P2P e-commerce advantages and challenges, discusses the risks of P2P e-commerce issues, and points out that trust is the basis of all business activities. Business organizations should take certain measures against risks from P2P e-commerce. The effective confidence-building mechanism can enable e-commerce more secure, reduce the risk of people's expectations, and enhance confidence in the P2P e-commerce. Taking into account the needs of e-commerce data security, this paper provides P2P-based e-commerce trust model. This model has inherited the advantages of traditional P2P model, combined with confidence-building mechanism to check for the main business in order to provide a highly reliable low-cost application.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124564737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dynamic Scheduling Model for Real-Time Tasks in Reliable System 可靠系统实时任务的动态调度模型
Zhang Jie, Y. Fumin, Tu Gang
Real-time task now emerges in various reliable systems; however, most existing schedulers of real-time tasks are limited to fixed priority scheduling. A dynamic priority scheduling model is derived for the preemptive earliest deadline first scheduling of periodic real-time tasks in the real-time reliable system. Moreover, a heuristic algorithm is present for the schedulability test, which is effective when the priority inheritance protocol is considered to prevent priority inversion.
实时任务现在出现在各种可靠的系统中;然而,大多数现有的实时任务调度程序仅限于固定优先级调度。针对实时可靠系统中周期性实时任务的抢占式最早截止日期优先调度问题,导出了一个动态优先级调度模型。此外,提出了一种启发式的可调度性测试算法,该算法在考虑优先级继承协议防止优先级反转的情况下是有效的。
{"title":"A Dynamic Scheduling Model for Real-Time Tasks in Reliable System","authors":"Zhang Jie, Y. Fumin, Tu Gang","doi":"10.1109/NSWCTC.2009.207","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.207","url":null,"abstract":"Real-time task now emerges in various reliable systems; however, most existing schedulers of real-time tasks are limited to fixed priority scheduling. A dynamic priority scheduling model is derived for the preemptive earliest deadline first scheduling of periodic real-time tasks in the real-time reliable system. Moreover, a heuristic algorithm is present for the schedulability test, which is effective when the priority inheritance protocol is considered to prevent priority inversion.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125598316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Enhanced Multi-antenna Solution through Beamforming to 3G Long-Term Evolution 通过波束成形实现3G长期演进的增强型多天线解决方案
Ken Long, Weilin Wu
Beam forming has been greatly applied in TD-SCDMA, but in the 3G long-term evolution (LTE), multi-antenna solution aims to use multi-input-multi-output (MIMO). Usually MIMO requires enough large antenna space to ensure uncorrelated multi-channels, whereas beam forming antennas need small antenna space. But this years’ research has shown the combination feasibility of beam forming and MIMO. In this paper, the 3GPP special channel model (SCM) has been researched and the beam forming is added to the LTE. Because of the beam forming combination, the number of transmitted antennas can not be restricted by 3GPP specification about LTE. Simulation results validate the efficiency. This gives a smooth evolution path from TD-SCDMA to LTE, and the advantage of beam forming can be inherited.
波束形成在TD-SCDMA中得到了广泛的应用,但在3G长期演进(LTE)中,多天线解决方案的目标是使用多输入多输出(MIMO)。通常MIMO需要足够大的天线空间来保证多信道不相关,而波束形成天线只需要很小的天线空间。但近年来的研究表明,波束形成与MIMO相结合是可行的。本文研究了3GPP专用信道模型(SCM),并在LTE中加入了波束形成技术。由于采用波束形成的组合方式,发射天线的数量不受3GPP关于LTE规范的限制。仿真结果验证了该方法的有效性。这为从TD-SCDMA到LTE的演进提供了一条平滑的路径,并且可以继承波束形成的优势。
{"title":"An Enhanced Multi-antenna Solution through Beamforming to 3G Long-Term Evolution","authors":"Ken Long, Weilin Wu","doi":"10.1109/NSWCTC.2009.216","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.216","url":null,"abstract":"Beam forming has been greatly applied in TD-SCDMA, but in the 3G long-term evolution (LTE), multi-antenna solution aims to use multi-input-multi-output (MIMO). Usually MIMO requires enough large antenna space to ensure uncorrelated multi-channels, whereas beam forming antennas need small antenna space. But this years’ research has shown the combination feasibility of beam forming and MIMO. In this paper, the 3GPP special channel model (SCM) has been researched and the beam forming is added to the LTE. Because of the beam forming combination, the number of transmitted antennas can not be restricted by 3GPP specification about LTE. Simulation results validate the efficiency. This gives a smooth evolution path from TD-SCDMA to LTE, and the advantage of beam forming can be inherited.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122467422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Object Packaging Based Cache Scheme for GPRS Network 一种基于对象封装的GPRS网络缓存方案
Xiaohui Chen, Weidong Wang, Xiaowei Qin, Guo Wei
In this paper, we proposed an object packaging based cache scheme for GPRS network. Our study demonstrated that better performance can be achieved when packaging utilized. In addition, the scheme can be used for other resource limited networks.
本文提出了一种基于对象封装的GPRS网络缓存方案。我们的研究表明,更好的性能可以实现时,包装利用。此外,该方案还可用于其他资源有限的网络。
{"title":"An Object Packaging Based Cache Scheme for GPRS Network","authors":"Xiaohui Chen, Weidong Wang, Xiaowei Qin, Guo Wei","doi":"10.1109/NSWCTC.2009.139","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.139","url":null,"abstract":"In this paper, we proposed an object packaging based cache scheme for GPRS network. Our study demonstrated that better performance can be achieved when packaging utilized. In addition, the scheme can be used for other resource limited networks.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122935493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Policy-based Access Control Model 基于策略的访问控制模型研究
Lin Zhi, Wang Jing, Chen Xiao-su, Jia Lian-xing
Because of the limitations of condition configuration and execution mechanism, the exiting access control models are not flexible and can not support multi-policy. Focusing on this, the paper presents a policy-based access control model (PBAC). Different from the traditional models which restrict session only with subject authorization, PBAC realizes policy-based access control by defining attribute to describe session property, performing a new policy management method that is free from application logic, and advocating an independent access control decision mechanism. As a consequence, PBAC is more flexible on restricting session, and makes great progress on multi-policy supporting. The comparison analysis indicates that PBAC is superior to the current access control models.
由于条件配置和执行机制的限制,现有的访问控制模型不够灵活,不能支持多策略。为此,本文提出了一种基于策略的访问控制模型(PBAC)。与传统模型仅通过主体授权对会话进行限制不同,PBAC通过定义属性来描述会话属性,实现了一种不受应用逻辑约束的策略管理方法,倡导独立的访问控制决策机制,从而实现了基于策略的访问控制。因此,PBAC在限制会话方面更加灵活,在多政策支持方面也取得了很大进展。对比分析表明,PBAC优于现有的访问控制模型。
{"title":"Research on Policy-based Access Control Model","authors":"Lin Zhi, Wang Jing, Chen Xiao-su, Jia Lian-xing","doi":"10.1109/NSWCTC.2009.313","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.313","url":null,"abstract":"Because of the limitations of condition configuration and execution mechanism, the exiting access control models are not flexible and can not support multi-policy. Focusing on this, the paper presents a policy-based access control model (PBAC). Different from the traditional models which restrict session only with subject authorization, PBAC realizes policy-based access control by defining attribute to describe session property, performing a new policy management method that is free from application logic, and advocating an independent access control decision mechanism. As a consequence, PBAC is more flexible on restricting session, and makes great progress on multi-policy supporting. The comparison analysis indicates that PBAC is superior to the current access control models.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121345015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Study the Logic Invariability in Subroutine's Junk Code Fuzzy Transformation 子程序垃圾代码模糊变换的逻辑不变性研究
Guo-zi Sun, Baobing Wang, Dan-wei Chen, Qiang Cai
Junk code fuzzy transformation (JCFT) is one of the effective approaches of the code obfuscation technology. Based on the analysis of current junk code strategies, this paper presents a new method named junk code encryption algorithm of subroutine, and depicts the algorithm with formalized language. The paper studies how to prove the logic invariability of subroutine’s JCFT with formalized method. After studying the formalized definition of subroutine’s JCFT, some lemmas are extracted. With these lemmas, and from three aspects such as "XOR and CMP Expansion", "False Embranchment Construction" and "JNE Append Junk Code", the paper proves that the procedure which transforms with subroutine’s JCFT has the same logicality with the original procedure.
垃圾代码模糊变换(JCFT)是一种有效的代码混淆技术。在分析现有垃圾码加密策略的基础上,提出了一种新的垃圾码加密子程序算法,并用形式化语言描述了该算法。本文研究了如何用形式化的方法证明子程序的jft的逻辑不变性。在研究了子程序JCFT的形式化定义后,提取了一些引理。利用这些引理,从“异或与CMP展开”、“假分支构造”和“JNE附加垃圾代码”三个方面证明了用子程序的JCFT变换后的程序与原程序具有相同的逻辑性。
{"title":"Study the Logic Invariability in Subroutine's Junk Code Fuzzy Transformation","authors":"Guo-zi Sun, Baobing Wang, Dan-wei Chen, Qiang Cai","doi":"10.1109/NSWCTC.2009.204","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.204","url":null,"abstract":"Junk code fuzzy transformation (JCFT) is one of the effective approaches of the code obfuscation technology. Based on the analysis of current junk code strategies, this paper presents a new method named junk code encryption algorithm of subroutine, and depicts the algorithm with formalized language. The paper studies how to prove the logic invariability of subroutine’s JCFT with formalized method. After studying the formalized definition of subroutine’s JCFT, some lemmas are extracted. With these lemmas, and from three aspects such as \"XOR and CMP Expansion\", \"False Embranchment Construction\" and \"JNE Append Junk Code\", the paper proves that the procedure which transforms with subroutine’s JCFT has the same logicality with the original procedure.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"455 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116410926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Timing Offset Estimation Method for SC-FDE Systems 一种新的SC-FDE系统时序偏移估计方法
Li-jun Sun, L. Huang
In SC-FDE (single carrier with frequency domain equalization) systems, timing offset brings ISI (inter-symbol interference). In order to obtain better timing precision in multi-path, a new timing offset estimation method applied to SC-FDE systems is proposed based on the analysis of Schmidl & Cox’s and Minn’s algorithms. By designing new training symbols and introducing corresponding calculation method, performance of timing synchronization can be improved obviously. Finally, three algorithms are compared by computer simulations and the comparison results confirm the effectiveness of the proposed algorithm.
在单载波频域均衡(SC-FDE)系统中,时序偏移会引起码间干扰(ISI)。为了在多路径下获得更好的定时精度,在分析Schmidl & Cox和Minn算法的基础上,提出了一种新的适用于SC-FDE系统的定时偏移估计方法。通过设计新的训练符号并引入相应的计算方法,可以明显提高定时同步的性能。最后,通过计算机仿真对三种算法进行了比较,结果验证了所提算法的有效性。
{"title":"A New Timing Offset Estimation Method for SC-FDE Systems","authors":"Li-jun Sun, L. Huang","doi":"10.1109/NSWCTC.2009.176","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.176","url":null,"abstract":"In SC-FDE (single carrier with frequency domain equalization) systems, timing offset brings ISI (inter-symbol interference). In order to obtain better timing precision in multi-path, a new timing offset estimation method applied to SC-FDE systems is proposed based on the analysis of Schmidl & Cox’s and Minn’s algorithms. By designing new training symbols and introducing corresponding calculation method, performance of timing synchronization can be improved obviously. Finally, three algorithms are compared by computer simulations and the comparison results confirm the effectiveness of the proposed algorithm.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126911458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Influence of Knowledge Sharing in Virtual Communities on Consumers' Brand Trust: An Empirical Study 虚拟社区知识共享对消费者品牌信任影响的实证研究
D. Zhu, Y. Chang
To reveal the impact of knowledge sharing in virtual communities on consumer behavior is an important work of current. This paper is designed to explore the relationship between knowledge sharing in virtual communities and consumers’ brand trust by empirical methods. A relationship model of content of sharing, sharing degree and consumers’ brand trust was constructed. The results show: sharing degree in virtual community affects consumers’ brand trust by their trust in brand goodwill; the content of sharing in virtual community affects consumers’ brand trust by their trust in brand capability.
揭示虚拟社区中知识共享对消费者行为的影响是当前研究的一项重要工作。本文旨在通过实证方法探讨虚拟社区知识共享与消费者品牌信任之间的关系。构建了分享内容、分享程度与消费者品牌信任的关系模型。结果表明:虚拟社区的分享程度通过消费者对品牌商誉的信任影响消费者的品牌信任;虚拟社区中的分享内容通过消费者对品牌能力的信任影响消费者的品牌信任。
{"title":"The Influence of Knowledge Sharing in Virtual Communities on Consumers' Brand Trust: An Empirical Study","authors":"D. Zhu, Y. Chang","doi":"10.1109/NSWCTC.2009.106","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.106","url":null,"abstract":"To reveal the impact of knowledge sharing in virtual communities on consumer behavior is an important work of current. This paper is designed to explore the relationship between knowledge sharing in virtual communities and consumers’ brand trust by empirical methods. A relationship model of content of sharing, sharing degree and consumers’ brand trust was constructed. The results show: sharing degree in virtual community affects consumers’ brand trust by their trust in brand goodwill; the content of sharing in virtual community affects consumers’ brand trust by their trust in brand capability.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126051277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint Subcarrier and Power Allocation in Uplink OFDMA Systems with Incomplete Channel State Information 信道状态信息不完全的上行OFDMA系统联合子载波与功率分配
Dan Wu, Yueming Cai, Chengkang Pan
A joint subcarrier and power allocation in uplink OFDMA systems with incomplete channel state information is proposed. The subcarrier allocation problem is considered as a multi-player discrete, stochastic and finite strategy game, and equal power is allocated to the subcarriers of each user. Particularly, the utility function is based on the channel capability and adds the pricing scheme to guarantee the fairness. The subcarrier allocation is different from the traditional scheme in which the subcarriers are allocated passively. In our process, each of the subcarriers is viewed as a learning automaton to choose the most satisfying user. We adopt the linear reward-inaction algorithm to obtain the Nash equilibrium. Theoretic analysis is given. Simulation results show our allocation scheme has good convergence, and the performance gap is tolerated compared with the complete channel state case.
针对信道状态信息不完全的上行OFDMA系统,提出了一种联合子载波和功率分配方法。将子载波分配问题视为一个多参与者的离散、随机和有限策略博弈问题,并将相等的功率分配给每个用户的子载波。其中,效用函数以渠道能力为基础,增加了定价方案,保证了公平性。子载波分配不同于传统的被动子载波分配方案。在我们的过程中,每个子载波被视为一个学习自动机,以选择最满意的用户。我们采用线性奖励-不作为算法来获得纳什均衡。给出了理论分析。仿真结果表明,该分配方案具有较好的收敛性,与完全信道状态的情况相比,性能差距是可以容忍的。
{"title":"Joint Subcarrier and Power Allocation in Uplink OFDMA Systems with Incomplete Channel State Information","authors":"Dan Wu, Yueming Cai, Chengkang Pan","doi":"10.1109/NSWCTC.2009.58","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.58","url":null,"abstract":"A joint subcarrier and power allocation in uplink OFDMA systems with incomplete channel state information is proposed. The subcarrier allocation problem is considered as a multi-player discrete, stochastic and finite strategy game, and equal power is allocated to the subcarriers of each user. Particularly, the utility function is based on the channel capability and adds the pricing scheme to guarantee the fairness. The subcarrier allocation is different from the traditional scheme in which the subcarriers are allocated passively. In our process, each of the subcarriers is viewed as a learning automaton to choose the most satisfying user. We adopt the linear reward-inaction algorithm to obtain the Nash equilibrium. Theoretic analysis is given. Simulation results show our allocation scheme has good convergence, and the performance gap is tolerated compared with the complete channel state case.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125250531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Spectral Analysis of UWB Signal Based on Combined Modulation Scheme with Time-Hopping Code 基于跳时码联合调制方案的超宽带信号频谱分析
Lin Zhang, Shu Wang, Taoping Zou, Zhen Qin
This paper present a uniform signal model of two combined modulation schemes in ultra-wideband (UWB) system, which are combined bi-phase shift keying and pulse shape modulation (BPSK-PSM) and combined on-off keying and pulse shape modulation (OOK-PSM). Both analytical expressions and simulation results for the power spectral density (PSD) of the proposed schemes with time hopping code are provided. The contrast analysis between two schemes and the impact of different time hopping code on the PSD are also discussed. Theoretical analyses and simulation results show that designing a set of proper orthogonal pulses is very important in UWB system based on pulse shape modulation (PSM) scheme.
提出了超宽带(UWB)系统中双相移键控与脉冲形状调制(BPSK-PSM)和开关键控与脉冲形状调制(OOK-PSM)两种组合调制方案的均匀信号模型。给出了带跳时码方案的功率谱密度(PSD)的解析表达式和仿真结果。讨论了两种方案的对比分析以及不同跳时码对PSD的影响。理论分析和仿真结果表明,在基于脉冲形状调制(PSM)方案的超宽带系统中,设计一组合适的正交脉冲是非常重要的。
{"title":"Spectral Analysis of UWB Signal Based on Combined Modulation Scheme with Time-Hopping Code","authors":"Lin Zhang, Shu Wang, Taoping Zou, Zhen Qin","doi":"10.1109/NSWCTC.2009.247","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.247","url":null,"abstract":"This paper present a uniform signal model of two combined modulation schemes in ultra-wideband (UWB) system, which are combined bi-phase shift keying and pulse shape modulation (BPSK-PSM) and combined on-off keying and pulse shape modulation (OOK-PSM). Both analytical expressions and simulation results for the power spectral density (PSD) of the proposed schemes with time hopping code are provided. The contrast analysis between two schemes and the impact of different time hopping code on the PSD are also discussed. Theoretical analyses and simulation results show that designing a set of proper orthogonal pulses is very important in UWB system based on pulse shape modulation (PSM) scheme.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127798397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1