1-15hit |
Xubo ZHAO Hang ZHOU Xiaoping LI
Under random linear coding (RLC) scheme, we present a simple expression of the probability distribution p(D=K) for decoding delay D incurred by the lossy channel, where K is a positive integer. In contrast with the previous contribution, our focus is firstly on deriving the cumulative distribution function of the discrete random variable D over a perfect channel. One benefit of such dispose is that, from the overall viewpoint, computing the cumulative distribution function of delay D can be related with calculating the cardinalities of sets of some special matrices, so that the former can be obtained from the latter. Moreover, our expression of the probability distribution is an explicit form, and is valid for any number of packets M, freewill field size q and arbitrary channel loss rate ε.
Xubo ZHAO Xiaoping LI Tongjiang YAN
In this letter, we present an improved method for the independence test procedure in the convolutional multicast algorithm proposed by Erez and Feder. We employ the linear independence test vectors to check the independence of the partial encoding vectors in the main program of Erez's convolutional multicast algorithm. It turns out that compared with the previous approach of computing the determinants of the correlative matrices, carrying out the independence test vectors can reduce the computational complexity.
Xiaoping LI Wenping MA Tongjiang YAN Xubo ZHAO
In this letter, we first introduce a new generalized cyclotomic sequence of order two of length pq, then we calculate its linear complexity and minimal polynomial. Our results show that this sequence possesses both high linear complexity and optimal balance on 1 s and 0 s, which may be attractive for use in stream cipher cryptosystems.
Bo ZHAO Guangming YU Tao CHEN Pengpeng CHEN Huazhong YANG Hui WANG
A low-power low-noise intermediate-frequency (IF) circuit is proposed for Gaussian frequency shift keying (GFSK) low-IF receivers. The proposed IF circuit is realized by an all-analog architecture composed of a couple of limiting amplifiers (LAs) and received signal strength indicators (RSSIs), a couple of band-pass filters (BPFs), a frequency detector (FD), a low-pass filter (LPF) and a slicer. The LA and RSSI are realized by an optimized combination of folded amplifiers and current subtractor based rectifiers to avoid the process induced depressing on accuracy. In addition, taking into account the nonlinearity and static current of rectifiers, we propose an analytical model as an accurate approximation of RSSIs' transfer character. An active-RC based GFSK demodulation scheme is proposed, and then both low power consumption and a large dynamic range are obtained. The chip is implemented with HJTC 0.18 µm CMOS technology and measured under an intermediate frequency of 200 kHz, a data rate of 100 kb/s and a modulation index of 1. The RSSI has a dynamic range of 51 dB with a logarithmic linearity error of less than 1 dB, and the slope is 23.9 mV/dB. For 0.1% bit error ratio (BER), the proposed IF circuit has the minimum input signal-to-noise ratio (SNR) of 5 dB and an input dynamic range of 55.4 dB, whereas it can tolerate a frequency offset of -3%+9.5% at 6 dB input SNR. The total power consumption is 5.655.89 mW.
Ping LI Feng ZHOU Bo ZHAO Maliang LIU Huaxi GU
This paper presents a large-angle imaging algorithm based on a dynamic scattering model for inverse synthetic aperture radar (ISAR). In this way, more information can be presented in an ISAR image than an ordinary RD image. The proposed model describes the scattering characteristics of ISAR target varying with different observation angles. Based on this model, feature points in each sub-image of the ISAR targets are extracted and matched using the scale-invariant feature transform (SIFT) and random sample consensus (RANSAC) algorithms. Using these feature points, high-precision rotation angles are obtained via joint estimation, which makes it possible to achieve a large angle imaging using the back-projection algorithm. Simulation results verifies the validity of the proposed method.
Weiwei XING Shibo ZHAO Shunli ZHANG Yuanyuan CAI
Crowd modeling and simulation is an active research field that has drawn increasing attention from industry, academia and government recently. In this paper, we present a generic data-driven approach to generate crowd behaviors that can match the video data. The proposed approach is a bi-layer model to simulate crowd behaviors in pedestrian traffic in terms of exclusion statistics, parallel dynamics and social psychology. The bottom layer models the microscopic collision avoidance behaviors, while the top one focuses on the macroscopic pedestrian behaviors. To validate its effectiveness, the approach is applied to generate collective behaviors and re-create scenarios in the Informatics Forum, the main building of the School of Informatics at the University of Edinburgh. The simulation results demonstrate that the proposed approach is able to generate desirable crowd behaviors and offer promising prediction performance.
Chun-e ZHAO Yuhua SUN Tongjiang YAN Xubo ZHAO
Binary sequences with high linear complexity and high 2-adic complexity have important applications in communication and cryptography. In this paper, the 2-adic complexity of a class of balanced Whiteman generalized cyclotomic sequences which have high linear complexity is considered. Through calculating the determinant of the circulant matrix constructed by one of these sequences, the result shows that the 2-adic complexity of this class of sequences is large enough to resist the attack of the rational approximation algorithm (RAA) for feedback with carry shift registers (FCSRs).
Xubo ZHAO Xiaoping LI Runzhi YANG Qingqing ZHANG Jinpeng LIU
In this paper, we study Hermitian linear complementary dual (abbreviated Hermitian LCD) rank metric codes. A class of Hermitian LCD generalized Gabidulin codes are constructed by qm-self-dual bases of Fq2m over Fq2. Moreover, the exact number of qm-self-dual bases of Fq2m over Fq2 is derived. As a consequence, an upper bound and a lower bound of the number of the constructed Hermitian LCD generalized Gabidulin codes are determined.
Qi ZHAO Hongwei DENG Hongbo ZHAO
The Earth's ionosphere can hinder radio propagation with two serious problems: group delay and phase advance. Ionospheric irregularities are significantly troublesome since they make the amplitude and phase of the radio signals fluctuate rapidly, which is known as ionospheric scintillation. Severe ionospheric scintillation could cause loss of phase lock, which would degrade the positioning accuracy and affect the performance of navigation systems. Based on the phase screen model, this paper presents a novel power spectrum model of phase scintillation and a model of amplitude scintillation. Preliminary results show that, when scintillation intensity increases, the random phase and amplitude fluctuations become stronger, coinciding with the observations. Simulations of the scintillation effects on the acquisition of Beidou signals predict acquisition probability. In addition, acquisition probabilities of GPS and Beidou signals under different scintillation intensities are presented. And by the same SNR the acquisition probability decreases when the scintillation intensity increases. The simulation result shows that scintillation could cause the loss of the acquisition performance of Beidou navigation system. According to the comparison of Beidou and GPS simulations, the code length and code rate of satellite signals have an effect on the acquisition performance of navigation system.
Bo ZHAO Guangliang REN Huining ZHANG
Pre-weighting based Contention Resolution Diversity Slotted ALOHA-like (PW-CRDSA-like) schemes with joint multi-user multi-slot detection (JMMD) algorithm are proposed to improve the throughput of random access (RA) in geostationary earth orbit (GEO) satellite networks. The packet and its replicas are weighted by different pre-weighting factors at each user terminal, and are sent in randomly selected slots within a frame. The correlation of channels between user terminals and satellite node in different slots are removed by using pre-weighting factors. At the gateway station, after the decoding processing of CRDSA, the combinations of remained signals in slots that can construct virtual multiple-input multiple-output (MIMO) signal models are found and decoded by the JMMD algorithm. Deadlock problems that can be equivalent to virtual MIMO signal models in the conventional CRDSA-like schemes can be effectively resolved, which improves the throughput of these CRDSA-like schemes. Simulation results show that the PW-CRDSA-like schemes with the JMMD significantly outperform the conventional CRDSA-like schemes in terms of the throughput under equal packet loss ratio (PLR) conditions (e.g. PLR =10-2), and as the number of the transmitted replicas increases, the throughput of the PW-CRDSA-like schemes also increases, and the normalized maximum throughput of the PW-CRDSA-5 (i.e., PW-CRDSA with 5 replicas) scheme can reach 0.95.
In this paper, the correspondence between the weighted line graph and the Mason signal flow graph (MSFG) has been established, which gives an interpretation of a convolutional network code (CNC) over a cyclic network from a different perspective. Furthermore, by virtue of Mason theorem, we present two new equivalent conditions to evaluate whether the global encoding kernels (GEKs) can be uniquely determined by the given complete set of local encoding kernels (LEKs) in a CNC over a cyclic network. These two new equivalent conditions turn out to be more intuitive. Moreover, we give an alternative simple proof of an existing result.
Hang ZHOU Xubo ZHAO Xiaoyuan YANG
In this paper, we further study linear network error correction code on a multicast network and attempt to establish a connection between linear network error correction codes and representable matroids. We propose a similar but more accurate definition of matroidal error correction network which has been introduced by K. Prasad et al. Moreover, we extend this concept to a more general situation when the given linear network error correction codes have different error correcting capacity at different sinks. More importantly, using a different method, we show that a multicast error correction network is scalar-linearly solvable if and only if it is a matroidal error correction network.
Wen-Bo ZHAO Boon-Siong WONG Kaoru SEZAKI Yasuhiko YASUDA
Havihg modified and extended the routing algorithm used in our previously proposed Bidirectional Shuffle Ring Network (BSRN), we here provide some adaptive routing algorithms that can relieve the congestion caused by bottlenecks when nonuniform traffic exists. As to preserve the transmission order of cells associated with a message which may otherwise arrive at the destination out of sequence if they are forwarded along different routing paths, two control schemes are also devised. The BSRN proves to be highly reliable and robust since countermeasures against node or link failure can also easily be realized.
Dual-motor driving servo systems are widely used in many military and civil fields. Since backlash nonlinearity affects the dynamic performance and steady-state tracking accuracy of these systems, it is necessary to study a control strategy to reduce its adverse effects. We first establish the state-space model of a system. To facilitate the design of the controller, we simplify the model based on the state-space model. Then, we design an adaptive controller combining a projection algorithm with dynamic surface control applied to a dual-motor driving servo system, which we believe to be the first, and analyze its stability. Simulation results show that projection algorithm-based dynamic surface control has smaller tracking error, faster tracking speed, and better robustness and stability than mere dynamic surface control. Finally, the experimental analysis validates the effectiveness of the proposed control algorithm.
Xiaoping LI Wenping MA Tongjiang YAN Xubo ZHAO
In this letter we propose a new Whiteman generalized cyclotomic sequence of order 4. Meanwhile, we determine its linear complexity and minimal polynomial. The results show that this sequence possesses both high linear complexity and optimal balance on 1 s and 0 s, which may be attractive for cryptographic applications.