The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Na ZHANG(12hit)

1-12hit
  • Subnets Generation of Program Nets and Its Application to Software Testing

    Biao WU  Xiaoan BAO  Na ZHANG  Hiromu MORITA  Mitsuru NAKATA  Qi-Wei GE  

     
    PAPER-Mathematical Systems Science

      Vol:
    E102-A No:9
      Page(s):
    1303-1311

    Software testing is an important problem to design a large software system and it is difficult to be solved due to its computational complexity. We try to use program nets to approach this problem. As the first step towards solving software testing problem, this paper provides a technique to generate subnets of a program net and applies this technique to software testing. Firstly, definitions and properties of program nets are introduced based on our previous works, and the explanation of software testing problem is given. Secondly, polynomial algorithms are proposed to generate subnets that can cover all the given program net. Finally, a case study is presented to show how to find subnets covering a given program net by using the proposed algorithms, as well as to show the input test data of the program net for software testing.

  • Security Performance Analysis of Joint Multi-Relay and Jammer Selection for Physical-Layer Security under Nakagami-m Fading Channel

    Guangna ZHANG  Yuanyuan GAO  Huadong LUO  Nan SHA  Mingxi GUO  Kui XU  

     
    LETTER-Cryptography and Information Security

      Vol:
    E102-A No:12
      Page(s):
    2015-2020

    In this paper, we investigate a novel joint multi-relay and jammer selection (JMRJS) scheme in order to improve the physical layer security of wireless networks. In the JMRJS scheme, all the relays succeeding in source decoding are selected to assist in the source signal transmission and meanwhile, all the remaining relay nodes are employed to act as friendly jammers to disturb the eavesdroppers by broadcasting artificial noise. Based on the more general Nakagami-m fading channel, we analyze the security performance of the JMRJS scheme for protecting the source signal against eavesdropping. The exact closed-form expressions of outage probability (OP) and intercept probability (IP) for the JMRJS scheme over Nakagami-m fading channel are derived. Moreover, we analyze the security-reliability tradeoff (SRT) of this scheme. Simulation results show that as the number of decode-and-forward (DF)relay nodes increases, the SRT of the JMRJS scheme improves notably. And when the transmit power is below a certain value, the SRT of the JMRJS scheme consistently outperforms the joint single-relay and jammer selection (JSRJS) scheme and joint equal-relay and jammer selection (JERJS) scheme respectively. In addition, the SRT of this scheme is always better than that of the multi-relay selection (MRS) scheme.

  • Weight Distribution of a Class of Linear Codes

    Xina ZHANG  Xiaoni DU  Rong WANG  Fujun ZHANG  

     
    PAPER-Coding Theory

      Vol:
    E104-A No:2
      Page(s):
    399-403

    Linear codes with a few weights have many applications in secret sharing schemes, authentication codes, association schemes and strongly regular graphs, and they are also of importance in consumer electronics, communications and data storage systems. In this paper, based on the theory of defining sets, we present a class of five-weight linear codes over $mathbb{F}_p$(p is an odd prime), which include an almost optimal code with respect to the Griesmer bound. Then, we use exponential sums to determine the weight distribution.

  • Security-Reliability Tradeoff for Joint Relay-User Pair and Friendly Jammer Selection with Channel Estimation Error in Internet-of-Things

    Guangna ZHANG  Yuanyuan GAO  Huadong LUO  Xiaochen LIU  Nan SHA  Kui XU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2020/12/22
      Vol:
    E104-B No:6
      Page(s):
    686-695

    In this paper, we explore the physical layer security of an Internet of Things (IoT) network comprised of multiple relay-user pairs in the presence of multiple malicious eavesdroppers and channel estimation error (CEE). In order to guarantee secure transmission with channel estimation error, we propose a channel estimation error oriented joint relay-user pair and friendly jammer selection (CEE-JRUPaFJS) scheme to improve the physical layer security of IoT networks. For the purpose of comparison, the channel estimation error oriented traditional round-robin (CEE-TRR) scheme and the channel estimation error oriented traditional pure relay-user pair selection (CEE-TPRUPS) scheme are considered as benchmark schemes. The exact closed-form expressions of outage probability (OP) and intercept probability (IP) for the CEE-TRR and CEE-TPRUPS schemes as well as the CEE-JRUPaFJS scheme are derived over Rayleigh fading channels, which are employed to characterize network reliability and security, respectively. Moreover, the security-reliability tradeoff (SRT) is analyzed as a metric to evaluate the tradeoff performance of CEE-JRUPaFJS scheme. It is verified that the proposed CEE-JRUPaFJS scheme is superior to both the CEE-TRR and CEE-TPRUPS schemes in terms of SRT, which demonstrates our proposed CEE-JRUPaFJS scheme are capable of improving the security and reliability performance of IoT networks in the face of multiple eavesdroppers. Moreover, as the number of relay-user pairs increases, CEE-TPRUPS and CEE-JRUPaFJS schemes offer significant increases in SRT. Conversely, with an increasing number of eavesdroppers, the SRT of all these three schemes become worse.

  • Linear Complexity of Quaternary Sequences over Z4 Based on Ding-Helleseth Generalized Cyclotomic Classes

    Xina ZHANG  Xiaoni DU  Chenhuang WU  

     
    LETTER-Information Theory

      Vol:
    E101-A No:5
      Page(s):
    867-871

    A family of quaternary sequences over Z4 is defined based on the Ding-Helleseth generalized cyclotomic classes modulo pq for two distinct odd primes p and q. The linear complexity is determined by computing the defining polynomial of the sequences, which is in fact connected with the discrete Fourier transform of the sequences. The results show that the sequences possess large linear complexity and are “good” sequences from the viewpoint of cryptography.

  • Constacyclic and Cyclic Codes over F2+uF2+u2F2

    Jian-Fa QIAN  Li-Na ZHANG  Shi-Xin ZHU  

     
    LETTER-Coding Theory

      Vol:
    E89-A No:6
      Page(s):
    1863-1865

    A new Gray map between codes over F2+uF2+u2F2 and codes over F2 is defined. We prove that the Gray image of a linear (1-u2)-cyclic code over F2+uF2+u2F2 of length n is a binary distance invariant linear quasi-cyclic code. We also prove that, if n is odd, then every binary code which is the Gray image of a linear cyclic code over F2+uF2+u2F2 of length n is equivalent to a quasi-cyclic code.

  • Channel Estimation and Achievable Rate of Massive MU-MIMO Systems with IQ Imbalance Open Access

    Nana ZHANG  Huarui YIN  Weidong WANG  Suhua TANG  

     
    PAPER

      Pubricized:
    2019/02/20
      Vol:
    E102-B No:8
      Page(s):
    1512-1525

    In-phase and quadrature-phase imbalance (IQI) at transceivers is one of the serious hardware impairments degrading system performance. In this paper, we study the overall performance of massive multi-user multi-input multi-output (MU-MIMO) systems with IQI at both the base station (BS) and user equipments (UEs), including the estimation of channel state information, required at the BS for the precoding design. We also adopt a widely-linear precoding based on the real-valued channel model to make better use of the image components of the received signal created by IQI. Of particular importance, we propose estimators of the real-valued channel and derive the closed-form expression of the achievable downlink rate. Both the analytical and simulation results show that IQI at the UEs limits the dowlink rate to finite ceilings even when an infinite number of BS antennas is available, and the results also prove that the widely-linear precoding based on the proposed channel estimation method can improve the overall performance of massive MU-MIMO systems with IQI.

  • Multi-Access Selection Algorithm Based on Joint Utility Optimization for the Fusion of Heterogeneous Wireless Networks

    Lina ZHANG  Qi ZHU  Shasha ZHAO  

     
    PAPER

      Vol:
    E97-B No:11
      Page(s):
    2269-2277

    Network selection is one of the hot issues in the fusion of heterogeneous wireless networks (HWNs). However, most of previous works only consider selecting single-access network, which wastes other available network resources, rarely take account of multi-access. To make full utilization of available coexisted networks, this paper proposes a novel multi-access selection algorithm based on joint utility optimization for users with multi-mode terminals. At first, the algorithm adopts exponential smoothing method (ESM) to get smoothed values of received signal strength (RSS). Then we obtain network joint utility function under the constraints of bandwidth and number of networks, with the consideration of trade-off between network benefit and cost. At last, Lagrange multiplier and dual optimization methods are used to maximize joint utility. Users select multiple networks according to the optimal association matrix of user and network. The simulation results show that the proposed algorithm can optimize network joint utility, improve throughput, effectively reduce vertical handoff number, and ensure Quality of Service (QoS).

  • Research on the Switch Migration Strategy Based on Global Optimization Open Access

    Xiao’an BAO  Shifan ZHOU  Biao WU  Xiaomei TU  Yuting JIN  Qingqi ZHANG  Na ZHANG  

     
    PAPER-Information Network

      Pubricized:
    2024/03/25
      Vol:
    E107-D No:7
      Page(s):
    825-834

    With the popularization of software defined networks, switch migration as an important network management strategy has attracted increasing attention. Most existing switch migration strategies only consider local conditions and simple load thresholds, without fully considering the overall optimization and dynamics of the network. Therefore, this article proposes a switch migration algorithm based on global optimization. This algorithm adds a load prediction module to the migration model, determines the migration controller, and uses an improved whale optimization algorithm to determine the target controller and its surrounding controller set. Based on the load status of the controller and the traffic priority of the switch to be migrated, the optimal migration switch set is determined. The experimental results show that compared to existing schemes, the algorithm proposed in this paper improves the average flow processing efficiency by 15% to 40%, reduces switch migration times, and enhances the security of the controller.

  • Security Performance Analysis for Relay Selection in Cooperative Communication System under Nakagami-m Fading Channel

    Guangna ZHANG  Yuanyuan GAO  Huadong LUO  Nan SHA  Shijie WANG  Kui XU  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/09/14
      Vol:
    E102-B No:3
      Page(s):
    603-612

    In this paper, we investigate a cooperative communication system comprised of a source, a destination, and multiple decode-and-forward (DF) relays in the presence of a potential malicious eavesdropper is within or without the coverage area of the source. Based on the more general Nakagami-m fading channels, we analyze the security performance of the single-relay selection and multi-relay selection schemes for protecting the source against eavesdropping. In the single-relay selection scheme, only the best relay is chosen to assist in the source transmission. Differing from the single-relay selection, multi-relay selection scheme allows multiple relays to forward the source to the destination. We also consider the classic direct transmission as a benchmark scheme to compare with the two relay selection schemes. We derive the exact closed-form expressions of outage probability (OP) and intercept probability (IP) for the direct transmission, the single-relay selection as well as the multi-relay selection scheme over Nakagami-m fading channel when the eavesdropper is within and without the coverage area of the source. Moreover, the security-reliability tradeoff (SRT) of these three schemes are also analyzed. It is verified that the SRT of the multi-relay selection consistently outperforms the single-relay selection, which of both the single-relay and multi-relay selection schemes outperform the direct transmission when the number of relays is large, no matter the eavesdropper is within or without the coverage of the source. In addition, as the number of DF relays increases, the SRT of relay selection schemes improve notably. However, the SRT of both two relay selection approaches become worse when the eavesdropper is within the coverage area of the source.

  • Enhancing Physical Layer Security Performance in Downlink Cellular Networks through Cooperative Users

    Shijie WANG  Yuanyuan GAO  Xiaochen LIU  Guangna ZHANG  Nan SHA  Mingxi GUO  Kui XU  

     
    LETTER-Graphs and Networks

      Vol:
    E102-A No:12
      Page(s):
    2008-2014

    In this paper, we explore how to enhance the physical layer security performance in downlink cellular networks through cooperative jamming technology. Idle user equipments (UE) are used to cooperatively transmit jamming signal to confuse eavesdroppers (Eve). We propose a threshold-based jammer selection scheme to decide which idle UE should participate in the transmission of jamming signal. Threshold conditions are carefully designed to decrease interference to legitimate channel, while maintain the interference to the Eves. Moreover, fewer UE are activated, which is helpful for saving energy consumptions of cooperative UEs. Analytical expressions of the connection and secrecy performances are derived, which are validated through Monte Carlo simulations. Theoretical and simulation results reveal that our proposed scheme can improve connection performance, while approaches the secrecy performance of [12]. Furthermore, only 43% idle UEs of [12] are used for cooperative jamming, which helps to decrease energy consumption of network.

  • Cyclic Codes over Fp + uFp + + uk-1Fp

    Jian-Fa QIAN  Li-Na ZHANG  Shi-Xin ZHU  

     
    LETTER-Coding Theory

      Vol:
    E88-A No:3
      Page(s):
    795-797

    The ring Fp + uFp + + uk-1Fp may be of interest in coding theory, which have already been used in the construction of optimal frequency-hopping sequence. In this work, cyclic codes over Fp + uFp + + uk-1Fp which is an open problem posed in [1] are considered. Namely, the structure of cyclic code over Fp + uFp + + uk-1Fp and that of their duals are derived.