首页 > 最新文献

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

英文 中文
A Novel Method for Sorting Radar Radiating-Source Signal Based on Ambiguity Function 基于模糊函数的雷达辐射源信号分选新方法
Jun Han, M. He, Yuan-qing Zhu, Bin-gang Zhu
Sorting rate of current methods is not high and too sensitive to the signal noise ratio (SNR), in order to solve this problem, a novel algorithm for sorting radar radiating-source signal is proposed. The ambiguity function of received signal is extracted and predigested to two-dimension characteristic, then decomposed into eight wavelet package transformation (WPT) characteristic parameters whose  WPT2 and WPT5 have the best separability and be used as the sorting parameters at last. For ambiguity function of different signal is distinguishing and not sensitive to SNR, the 2 WPT and 5 are divisible and steady. The advantage of this new method is validated by simulation result, and the lowest sorting rate is 90% at SNR=10dB.
针对现有方法分选率不高且对信噪比过于敏感的问题,提出了一种新的雷达辐射源信号分选算法。将接收信号的模糊函数提取并简化为二维特征,然后分解为8个小波包变换(WPT)特征参数,其中WPT2和WPT5具有最好的可分性,最后作为分类参数。由于不同信号的模糊函数具有可辨别性,对信噪比不敏感,因此2 WPT和5 WPT可分且稳定。仿真结果验证了该方法的优越性,在信噪比为10dB时,分选率最低可达90%。
{"title":"A Novel Method for Sorting Radar Radiating-Source Signal Based on Ambiguity Function","authors":"Jun Han, M. He, Yuan-qing Zhu, Bin-gang Zhu","doi":"10.1109/NSWCTC.2009.342","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.342","url":null,"abstract":"Sorting rate of current methods is not high and too sensitive to the signal noise ratio (SNR), in order to solve this problem, a novel algorithm for sorting radar radiating-source signal is proposed. The ambiguity function of received signal is extracted and predigested to two-dimension characteristic, then decomposed into eight wavelet package transformation (WPT) characteristic parameters whose  WPT2 and WPT5 have the best separability and be used as the sorting parameters at last. For ambiguity function of different signal is distinguishing and not sensitive to SNR, the 2 WPT and 5 are divisible and steady. The advantage of this new method is validated by simulation result, and the lowest sorting rate is 90% at SNR=10dB.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126753110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Empirical Analysis of Online Consumer Initial Trust Building Based on ELM 基于ELM的网络消费者初始信任构建实证分析
Tao Zhou, Yanjun Sun
Due to perceived high risk in the first transaction and Internet low switching cost, building consumer initial trust is crucial for online vendors. Extant research has often examined determinants of initial trust from the perspectives of TAM and trust transference, and seldom considered the initial trust building from dual-routes. Drawing on ELM, we analyzed the different effect of argument quality via the central route and source credibility via the peripheral route on initial trust. We collected 193 valid papers and conducted data analysis with LISREL. The results show that argument quality, source credibility and self-efficacy have significant effect on initial trust. Moreover, self-efficacy positively moderates the effect of argument quality on initial trust, whereas it negatively moderates the effect of source credibility on initial trust.
由于第一笔交易的高风险和互联网的低转换成本,建立消费者的初始信任对网络供应商来说至关重要。现有的研究大多是从TAM和信任转移的角度考察初始信任的决定因素,很少考虑从双途径建立初始信任。利用ELM理论,分析了中心路径的论证质量和外围路径的信息源可信度对初始信任的不同影响。我们收集了193篇有效论文,使用LISREL进行数据分析。结果表明,论点质量、信息源可信度和自我效能感对初始信任有显著影响。此外,自我效能正向调节论点质量对初始信任的影响,而负向调节来源可信度对初始信任的影响。
{"title":"An Empirical Analysis of Online Consumer Initial Trust Building Based on ELM","authors":"Tao Zhou, Yanjun Sun","doi":"10.1109/NSWCTC.2009.305","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.305","url":null,"abstract":"Due to perceived high risk in the first transaction and Internet low switching cost, building consumer initial trust is crucial for online vendors. Extant research has often examined determinants of initial trust from the perspectives of TAM and trust transference, and seldom considered the initial trust building from dual-routes. Drawing on ELM, we analyzed the different effect of argument quality via the central route and source credibility via the peripheral route on initial trust. We collected 193 valid papers and conducted data analysis with LISREL. The results show that argument quality, source credibility and self-efficacy have significant effect on initial trust. Moreover, self-efficacy positively moderates the effect of argument quality on initial trust, whereas it negatively moderates the effect of source credibility on initial trust.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126989657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Measurement of the Search Charts of Music 音乐搜索图表的测量
Yue Yang, Changjia Chen, Yishuai Chen
Nowadays, more and more singers published various songs. There are about 50,000 songs in the internet. The songs are refreshed everyday, so we need a real-time chart of music. In this paper, our study is based on the real-time search charts of music. We studied the algorithm of the charts and analyzed the ranking of the charts. According to the ranking of the charts, we got some special characters. Those characters can not be seen from other music charts,such as selling charts and other week’s charts of music.While, there are also some problems about the realtime charts, like special users of charts. Those problems need us to solve. We will get more impersonality charts after solving those problems.
如今,越来越多的歌手发表了各种各样的歌曲。互联网上大约有5万首歌曲。歌曲每天都在更新,所以我们需要一个实时的音乐列表。在本文中,我们的研究是基于音乐的实时搜索图表。我们研究了排行榜的算法,分析了排行榜的排名。根据排行榜的排名,我们得到了一些特殊的字符。这些特征在其他音乐排行榜上是看不到的,比如销售排行榜和其他音乐周排行榜。同时,实时图表也存在一些问题,如图表的特殊用户。这些问题需要我们来解决。在解决这些问题后,我们将得到更多的客观图表。
{"title":"The Measurement of the Search Charts of Music","authors":"Yue Yang, Changjia Chen, Yishuai Chen","doi":"10.1109/NSWCTC.2009.295","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.295","url":null,"abstract":"Nowadays, more and more singers published various songs. There are about 50,000 songs in the internet. The songs are refreshed everyday, so we need a real-time chart of music. In this paper, our study is based on the real-time search charts of music. We studied the algorithm of the charts and analyzed the ranking of the charts. According to the ranking of the charts, we got some special characters. Those characters can not be seen from other music charts,such as selling charts and other week’s charts of music.While, there are also some problems about the realtime charts, like special users of charts. Those problems need us to solve. We will get more impersonality charts after solving those problems.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121631425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Distributed Energy-Efficient and Delay-Aware Data Gathering Protocol for Wireless Sensor Networks 一种面向无线传感器网络的分布式节能延迟感知数据采集协议
Z. Fan
High energy-efficiency and low transmission delay are most important for periodical data gathering applications in wireless sensor networks (WSNs). Therefore, the product of energy consumption and transmission delay, EnergyxDelay is a good metric for such performance evaluation. This paper presents a distributed energy-efficient and delay-aware data gathering protocol, which is efficient in the ways that it prolongs the lifetime of network, as well as takes less time to finish a transmission round. The simulation results show that it improves the average EnergyxDelay metric compared to other protocols.
在无线传感器网络中,高能效和低传输延迟是实现周期性数据采集的关键。因此,能量消耗和传输延迟的乘积EnergyxDelay是这种性能评估的一个很好的指标。本文提出了一种分布式的、节能的、延迟感知的数据采集协议,该协议既能有效地延长网络的生命周期,又能有效地缩短传输周期。仿真结果表明,与其他协议相比,该协议提高了平均EnergyxDelay度量。
{"title":"A Distributed Energy-Efficient and Delay-Aware Data Gathering Protocol for Wireless Sensor Networks","authors":"Z. Fan","doi":"10.1109/NSWCTC.2009.73","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.73","url":null,"abstract":"High energy-efficiency and low transmission delay are most important for periodical data gathering applications in wireless sensor networks (WSNs). Therefore, the product of energy consumption and transmission delay, EnergyxDelay is a good metric for such performance evaluation. This paper presents a distributed energy-efficient and delay-aware data gathering protocol, which is efficient in the ways that it prolongs the lifetime of network, as well as takes less time to finish a transmission round. The simulation results show that it improves the average EnergyxDelay metric compared to other protocols.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"340 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124311185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research of Web Mining Technology Based on XML 基于XML的Web挖掘技术研究
Lan Li, Q. Rong
Web Data Mining is a new important research field in data mining. In this paper, the conception and characteristic of data mining based on Web are introduced the process and the general methods of data mining based on Web are expatiated.At present many websites are built with HTML, which is difficult to achieve real effective and accurate web mining. The appearance of XML has brought convenience for it. Based on the research of web mining, XML is used to transform semi-structured data to well structured data, and a model of web mining system which has basic data mining function and faces multi—data on the Web is built .At the same time, the problem in data mining is analyzed and studied. An example is put forward to prove the solution¿
Web数据挖掘是数据挖掘中一个新的重要研究领域。本文介绍了基于Web的数据挖掘的概念和特点,阐述了基于Web的数据挖掘的过程和一般方法。目前很多网站都是用HTML构建的,很难实现真正有效、准确的网页挖掘。XML的出现为它带来了便利。在对web挖掘进行研究的基础上,利用XML将半结构化数据转换为结构化良好的数据,构建了一个具有基本数据挖掘功能、面向web上多数据的web挖掘系统模型,同时对数据挖掘中存在的问题进行了分析和研究。最后通过实例验证了该方法的有效性
{"title":"Research of Web Mining Technology Based on XML","authors":"Lan Li, Q. Rong","doi":"10.1109/NSWCTC.2009.339","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.339","url":null,"abstract":"Web Data Mining is a new important research field in data mining. In this paper, the conception and characteristic of data mining based on Web are introduced the process and the general methods of data mining based on Web are expatiated.At present many websites are built with HTML, which is difficult to achieve real effective and accurate web mining. The appearance of XML has brought convenience for it. Based on the research of web mining, XML is used to transform semi-structured data to well structured data, and a model of web mining system which has basic data mining function and faces multi—data on the Web is built .At the same time, the problem in data mining is analyzed and studied. An example is put forward to prove the solution¿","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124420907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Energy-Efficient AES-CCM Implementation for IEEE802.15.4 Wireless Sensor Networks IEEE802.15.4无线传感器网络的节能AES-CCM实现
Lian Huai, X. Zou, Zhenglin Liu, Yu Han
As the networking technology greatly advanced in past decades, Wireless Sensor Networks (WSN) have been widely deployed and utilized in various areas. Security issues on WSN devices thus draw much attention. In order to ensure the security of IEEE802.15.4 WSN and to fulfill the strict limitations of area and energy, we propose an efficient scheme for AES-CCM architecture. We implement AES-CCM by taking into account the tradeoff among throughput, area and power consumption. Our design employs a full-hardware implementation to offload CPU. Meanwhile, we parallelize CTR and CBC-MAC processing to cut down duty cycles and energy-consumption. An appropriate 8-bit data path AES architecture is chosen to guarantee rigorous requirements of the area and energy. Furthermore, a shared key expansion is applied to reduce the die-size. Experimental results based on the United Microelectronics Corporation (UMC) 0.25 micrometers 1.8 volts technology library show that our implementation is compact and energy-efficient, which would be suitable for resource-constrained WSN devices.
近几十年来,随着网络技术的飞速发展,无线传感器网络(WSN)在各个领域得到了广泛的部署和应用。因此,无线传感器网络设备的安全问题备受关注。为了保证IEEE802.15.4无线传感器网络的安全性,满足严格的面积和能源限制,我们提出了一种高效的AES-CCM架构方案。我们通过考虑吞吐量、面积和功耗之间的权衡来实现AES-CCM。我们的设计采用全硬件实现来卸载CPU。同时,我们并行处理CTR和CBC-MAC,以减少占空比和能耗。选择合适的8位数据路径AES架构,以保证对面积和能量的严格要求。此外,还采用了共享密钥扩展来减小芯片尺寸。基于联合微电子公司(UMC) 0.25微米1.8伏技术库的实验结果表明,我们的实现结构紧凑,节能,适用于资源受限的WSN设备。
{"title":"An Energy-Efficient AES-CCM Implementation for IEEE802.15.4 Wireless Sensor Networks","authors":"Lian Huai, X. Zou, Zhenglin Liu, Yu Han","doi":"10.1109/NSWCTC.2009.246","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.246","url":null,"abstract":"As the networking technology greatly advanced in past decades, Wireless Sensor Networks (WSN) have been widely deployed and utilized in various areas. Security issues on WSN devices thus draw much attention. In order to ensure the security of IEEE802.15.4 WSN and to fulfill the strict limitations of area and energy, we propose an efficient scheme for AES-CCM architecture. We implement AES-CCM by taking into account the tradeoff among throughput, area and power consumption. Our design employs a full-hardware implementation to offload CPU. Meanwhile, we parallelize CTR and CBC-MAC processing to cut down duty cycles and energy-consumption. An appropriate 8-bit data path AES architecture is chosen to guarantee rigorous requirements of the area and energy. Furthermore, a shared key expansion is applied to reduce the die-size. Experimental results based on the United Microelectronics Corporation (UMC) 0.25 micrometers 1.8 volts technology library show that our implementation is compact and energy-efficient, which would be suitable for resource-constrained WSN devices.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126268514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
An Efficient Multi-secret Sharing Scheme with the Quasi-threshold Multipartite Access Structure 一种具有拟阈值多方访问结构的高效多秘密共享方案
Run-hua Shi, Liusheng Huang, Wei Yang, Hong Zhong
In real world, there are many important applications for the secret sharing with the quasi-threshold multipartite access structure. But there was still not a very efficient scheme proposed in the past. In this paper, we combine the multi-secret sharing and the quasi-threshold multipartite access structure, and present an efficient multi-secret sharing scheme with the quasi-threshold multipartite access structure based on Shamir’s secret sharing scheme. In this scheme, the participants of any authorized subset can reconstruct multiple secrets by repeatedly using the Lagrange interpolation formula during a sharing process, but any non-authorized subset cannot recover any secret. In addition, the share is the same size of the single shared secret. Thus, it is an efficient and ideal multi-secret sharing scheme with the quasi-threshold multipartite access structure.
在现实世界中,准阈值多方访问结构的秘密共享有许多重要的应用。但在过去,仍然没有一个非常有效的方案被提出。本文将多秘密共享与准阈值多方访问结构相结合,提出了一种基于Shamir秘密共享方案的准阈值多方访问结构的高效多秘密共享方案。在该方案中,任何授权子集的参与者都可以在共享过程中通过重复使用拉格朗日插值公式来重建多个秘密,而任何未授权子集都不能恢复任何秘密。此外,该共享与单个共享密钥的大小相同。因此,它是一种具有准阈值多方访问结构的高效、理想的多秘密共享方案。
{"title":"An Efficient Multi-secret Sharing Scheme with the Quasi-threshold Multipartite Access Structure","authors":"Run-hua Shi, Liusheng Huang, Wei Yang, Hong Zhong","doi":"10.1109/NSWCTC.2009.263","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.263","url":null,"abstract":"In real world, there are many important applications for the secret sharing with the quasi-threshold multipartite access structure. But there was still not a very efficient scheme proposed in the past. In this paper, we combine the multi-secret sharing and the quasi-threshold multipartite access structure, and present an efficient multi-secret sharing scheme with the quasi-threshold multipartite access structure based on Shamir’s secret sharing scheme. In this scheme, the participants of any authorized subset can reconstruct multiple secrets by repeatedly using the Lagrange interpolation formula during a sharing process, but any non-authorized subset cannot recover any secret. In addition, the share is the same size of the single shared secret. Thus, it is an efficient and ideal multi-secret sharing scheme with the quasi-threshold multipartite access structure.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126364333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application Research on Primary Components Analysis in Assessing Influential Factors of Campus Network Security 主成分分析在校园网安全影响因素评估中的应用研究
Zhiming Qu, Xiaoli Wang
Through mathematical analysis, the primary components analysis (PCA) is used to analyze the effect of influential factors on campus network security (CNS). Based on PCA model and, the results are computed. Through case study, it can be seen that some factors and characteristics play very important role in influencing CNS and all factors should be considered because the effect depends on the factors interaction. Through analysis and discussion, it is concluded that, under the premise of minimizing the information loss, the application of PCA in analyzing effect on CNS is approved to be practicable and applicable.
通过数学分析,采用主成分分析法(PCA)分析影响因素对校园网安全的影响。基于主成分分析模型,对结果进行了计算。通过案例研究可以看出,一些因素和特征在影响中枢神经系统中起着非常重要的作用,由于效果取决于因素的相互作用,因此需要考虑所有因素。通过分析和讨论,得出结论,在信息损失最小化的前提下,主成分分析对中枢神经系统的分析效果是可行和适用的。
{"title":"Application Research on Primary Components Analysis in Assessing Influential Factors of Campus Network Security","authors":"Zhiming Qu, Xiaoli Wang","doi":"10.1109/NSWCTC.2009.46","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.46","url":null,"abstract":"Through mathematical analysis, the primary components analysis (PCA) is used to analyze the effect of influential factors on campus network security (CNS). Based on PCA model and, the results are computed. Through case study, it can be seen that some factors and characteristics play very important role in influencing CNS and all factors should be considered because the effect depends on the factors interaction. Through analysis and discussion, it is concluded that, under the premise of minimizing the information loss, the application of PCA in analyzing effect on CNS is approved to be practicable and applicable.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128062956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lagrange Multiplier Based Fair Resource Allocation for MIMO-OFDMA Systems 基于拉格朗日乘法器的MIMO-OFDMA系统公平资源分配
Dou Ni, Fangjiong Chen, Cunmei Ji
In this paper, we propose a subcarrier and power allocation algorithm for Multiple-Input-Multiple-Output Orthogonal-Frequency-Division-Multiple-Access (MIMO-OFD MA) systems with channel state information available at the transmitter. Fairness constraint is applied to limit the maximum and minimum number of subcarriers for all users. A Lagrange multiplier method is applied to solve the constrained optimization problem. Solving this optimization problem require multi-dimensional searching. A modified searching method is proposed to improve the convergence speed.
在本文中,我们提出了一种多输入多输出正交频分多址(MIMO-OFD MA)系统的子载波和功率分配算法,该系统的信道状态信息在发射器处可用。公平性约束用于限制所有用户的最大和最小子载波数。采用拉格朗日乘子法求解约束优化问题。求解这一优化问题需要多维搜索。为了提高收敛速度,提出了一种改进的搜索方法。
{"title":"Lagrange Multiplier Based Fair Resource Allocation for MIMO-OFDMA Systems","authors":"Dou Ni, Fangjiong Chen, Cunmei Ji","doi":"10.1109/NSWCTC.2009.146","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.146","url":null,"abstract":"In this paper, we propose a subcarrier and power allocation algorithm for Multiple-Input-Multiple-Output Orthogonal-Frequency-Division-Multiple-Access (MIMO-OFD MA) systems with channel state information available at the transmitter. Fairness constraint is applied to limit the maximum and minimum number of subcarriers for all users. A Lagrange multiplier method is applied to solve the constrained optimization problem. Solving this optimization problem require multi-dimensional searching. A modified searching method is proposed to improve the convergence speed.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115776721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Adaptive Beamforming for Cyclostationary Signals in Spectrum Detection of Cognitive Radios 认知无线电频谱检测中周期平稳信号的鲁棒自适应波束形成
Xiaolong Ma, Guican Chen
This paper presents the robust Adaptive Digital Beamforming algorithm used in Cognitive Radios spectrum detection scheme, which is based on worst-case performance optimization criterion for processing the cyclostationary signals. The algorithm theory and its implementation steps are discussed. By simulated results show that this algorithm provides efficient solutions to the robustness problems including the array response mismatch and data nonstationarity problems.
提出了一种基于最坏情况性能优化准则的鲁棒自适应数字波束形成算法,用于认知无线电频谱检测方案。讨论了算法原理和实现步骤。仿真结果表明,该算法有效地解决了阵列响应失配和数据非平稳等鲁棒性问题。
{"title":"Robust Adaptive Beamforming for Cyclostationary Signals in Spectrum Detection of Cognitive Radios","authors":"Xiaolong Ma, Guican Chen","doi":"10.1109/NSWCTC.2009.16","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.16","url":null,"abstract":"This paper presents the robust Adaptive Digital Beamforming algorithm used in Cognitive Radios spectrum detection scheme, which is based on worst-case performance optimization criterion for processing the cyclostationary signals. The algorithm theory and its implementation steps are discussed. By simulated results show that this algorithm provides efficient solutions to the robustness problems including the array response mismatch and data nonstationarity problems.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115913914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1