Yong TIAN Peng WANG Xinyue HOU Junpeng YU Xiaoyan PENG Hongshu LIAO Lin GAO
The electromagnetic environment is increasingly complex and changeable, and radar needs to meet the execution requirements of various tasks. Modern radars should improve their intelligence level and have the ability to learn independently in dynamic countermeasures. It can make the radar countermeasure strategy change from the traditional fixed anti-interference strategy to dynamically and independently implementing an efficient anti-interference strategy. Aiming at the performance optimization of target tracking in the scene where multiple signals coexist, we propose a countermeasure method of cognitive radar based on a deep Q-learning network. In this paper, we analyze the tracking performance of this method and the Markov Decision Process under the triangular frequency sweeping interference, respectively. The simulation results show that reinforcement learning has substantial autonomy and adaptability for solving such problems.
Xiangbin YU Xi WANG Tao TENG Qiyishu LI Fei WANG
In this paper, we study the power allocation (PA) scheme design for energy efficiency (EE) maximization with discrete-rate adaptive modulation (AM) in the downlink distributed antenna system (DAS). By means of the Karush-Kuhn-Tucker (KKT) conditions, an optimal PA scheme with closed-form expression is derived for maximizing the EE subject to maximum transmit power and target bit error rate (BER) constraints, where the number of active transmit antennas is also derived for attaining PA coefficients. Considering that the optimal scheme needs to calculate the PA of all transmit antennas for each modulation mode, its complexity is extremely high. For this reason, a low-complexity suboptimal PA is also presented based on the antenna selection method. By choosing one or two remote antennas, the suboptimal scheme offers lower complexity than the optimal one, and has almost the same EE performance as the latter. Besides, the outage probability is derived in a performance evaluation. Computer simulation shows that the developed optimal scheme can achieve the same EE as the exhaustive search based approach, which has much higher complexity, and the suboptimal scheme almost matches the EE of the optimal one as well. The suboptimal scheme with two-antenna selection is particularly effective in terms of balancing performance and complexity. Moreover, the derived outage probability is in good agreement with the corresponding simulation.
In a wireless sensor network based on the gradient sinking model, unbalanced energy consumption is an inherent problem and can significantly reduce the network lifetime. In this letter, we propose a subcorona-based scheme to analyze the amount of received data and energy consumption of nodes on gradient sinking model. We then design an algorithm to compute the energy consumption of nodes in different subcoronas. Simulation results indicate the correctness of our proposed algorithm.
Lingshu LI Jiangxing WU Wei ZENG Xiaotao CHENG
Existing cyber deception technologies (e.g., operating system obfuscation) can effectively disturb attackers' network reconnaissance and hide fingerprint information of valuable cyber assets (e.g., containers). However, they exhibit ineffectiveness against skilled attackers. In this study, a proactive fingerprint deception method is proposed, termed as Continuously Anonymizing Containers' Fingerprints (CACF), which modifies the container's fingerprint in the cloud resource pool to satisfy the anonymization standard. As demonstrated by experimental results, the CACF can effectively increase the difficulty for attackers.
Chia-Hao KU Hsien-Wen LIU Yu-Shu LIN Kuei-Yi LIN Pao-Jen WANG
A planar miniaturized branch-line coupler with harmonic suppression property for UHF band applications is presented in this paper. By properly synthesizing the LC-tanks that employ artificial transmission lines, two pairs of quarter-wavelength branch-lines to respectively meet characteristic impedances of 35.4 and 50 ohms can be obtained with the coupler. For the operating band, it can achieve good 3 dB power division with a 90° phase difference in the outputs of the through and coupled arms. The coupler also has a small area of 20.5(L)18(W) mm2, corresponding to 0.11 λg0.1 λg at 922 MHz. Compared with conventional couplers, the proposed design not only offers a wide bandwidth of more than 230 MHz within 1° or 1 dB, but also works with additional harmonic suppression for achieving better performance. Therefore, the proposed branch-line coupler with a compact size is well suitable for power division application.
Xiao Lei YUAN Lu GAN Hong Shu LIAO
We address a robust algorithm for the interference-plus-noise covariance matrix reconstruction (RA-INCMR) against random arbitrary steering vector mismatches (RASVMs) of the interferences, which lead to substantial degradation of the original INCMR beamformer performance. Firstly, using the worst-case performance optimization (WCPO) criteria, we model these RASVMs as uncertainty sets and then propose the RA-INCMR to obtain the robust INCM (RINCM) based on the Robust Capon Beamforming (RCB) algorithm. Finally, we substitute the RINCM back into the original WCPO beamformer problem for the sample covariance matrix to formulate the new RA-INCM-WCPO beamformer problem. Simulation results demonstrate that the performance of the proposed beamformer is much better than the original INCMR beamformer when there exist RASVMs, especially at low signal-to-noise ratio (SNR).
Qing TONG Yunfei GUO Hongchao HU Wenyan LIU Guozhen CHENG Ling-shu LI
Software diversity can be utilized in cyberspace security to defend against the zero-day attacks. Existing researches have proved the effectiveness of diversity in bringing security benefits, but few of them touch the problem that whether there is a positive correlation between the security and the diversity. In addition, there is little guidance on how to construct an effective diversified system. For that, this paper develops two diversity metrics based on system attribute matrix, proposes a diversity measurement and verifies the effectiveness of the measurement. Through several simulations on the diversified systems which use voting strategy, the relationship between diversity and security is analyzed. The results show that there is an overall positive correlation between security and diversity. Though some cases are against the correlation, further analysis is made to explain the phenomenon. In addition, the effect of voting strategy is also discussed through simulations. The results show that the voting strategy have a dominant impact on the security, which implies that security benefits can be obtained only with proper strategies. According to the conclusions, some guidance is provided in constructing a more diversified as well as securer system.
Wanchun LI Ting YUAN Bin WANG Qiu TANG Yingxiang LI Hongshu LIAO
In this paper, we explore the relationship between Geometric Dilution of Precision (GDOP) and Cramer-Rao Bound (CRB) by tracing back to the original motivations for deriving these two indexes. In addition, the GDOP is served as a sensor-target geometric uncertainty analysis tool whilst the CRB is served as a statistical performance evaluation tool based on the sensor observations originated from target. And CRB is the inverse matrix of Fisher information matrix (FIM). Based on the original derivations for a same positioning application, we interpret their difference in a mathematical view to show that.
Takuya KOUMOTO Tadao KASAMI Shu LIN
In an iterative decoding algorithm, such as Chase Type-II decoding algorithm and its improvements, candidate codewords for a received vector are generated for test based on a bounded-distance decoder and a set of test error patterns. It is desirable to remove useless test error patterns in these decoding algorithms. This paper presents a sufficient condition for ruling out some useless test error patterns. If this condition holds for a test error patterns e, then e can not produce a candidate codeword with a correlation metric larger than those of the candidate codewords generated already and hence e is useless. This significantly reduces the decoding operations in Chase type-II decoding algorithm or decoding iterations in its improvements.
Tadao KASAMI Toru FUJIWARA Yoshihisa DESAKI Shu LIN
In an earlier paper, we have shown that each section of the L-section minimal trellis diagram for a linear block code consists of parallel and structurally identical (except branch labels) subgraphs without cross connections. These parallel subgraphs are called parallel components of the section. In this paper, it is shown that if the sets of path label sequences of two parallel components have a common sequence, then the parallel components have the same branch labels, and the number of parallel components with the same branch labels in each section and the detail structure of each parallel component up to its branch labels are analyzed and expressed in terms of the dimensions of specific linear codes related to the given code. As an example, the 2i-section minimal trellis diagram for a Reed-Muller code is analyzed. Complexity measures of soft-decision maximum likelihood decoding for binary linear block codes are also discussed.
Guang Kuo LU Man Lin XIAO Ping WEI Hong Shu LIAO
This letter investigates the circularity of fractional Fourier transform (FRFT) coefficients containing noise only, and proves that all coefficients coming from white Gaussian noise are circular via the discrete FRFT. In order to use the spectrum kurtosis (SK) as a Gaussian test to check if linear frequency modulation (LFM) signals are present in a set of FRFT points, the effect of the noncircularity of Gaussian variables upon the SK of FRFT coefficients is studied. The SK of the α th-order FRFT coefficients for LFM signals embedded in a white Gaussian noise is also derived in this letter. Finally the signal detection algorithm based on FRFT and SK is proposed. The effectiveness and robustness of this algorithm are evaluated via simulations under lower SNR and weaker components.
Yao ZHOU Hairui YU Wenjie XU Siyi YAO Li WANG Hongshu LIAO Wanchun LI
In this paper, a passive multiple-input multiple-output (MIMO) radar system with widely separated antennas that estimates the positions and velocities of multiple moving targets by utilizing time delay (TD) and doppler shift (DS) measurements is proposed. Passive radar systems can detect targets by using multiple uncoordinated and un-synchronized illuminators and we assume that all the measurements including TD and DS have been known by a preprocessing method. In this study, the algorithm can be divided into three stages. First, based on location information within a certain range and utilizing the DBSCAN cluster algorithm we can obtain the initial position of each target. In the second stage according to the correlation between the TD measurements of each target in a specific receiver and the DSs, we can find the set of DS measurements for each target. Therefore, the initial speed estimated values can be obtained employing the least squares (LS) method. Finally, maximum likelihood (ML) estimation of a first-order Taylor expansion joint TD and DS is applied for a better solution. Extensive simulations show that the proposed algorithm has a good estimation performance and can achieve the Cramér-Rao lower bound (CRLB) under the condition of moderate measurement errors.
The location of stations on the buses can not be ignored in the analysis of the DQDB protocol, especially when traffic load is heavy. In this paper, we propose a new method to model the DQDB (Distributed Queue Dual Bus) protocol by assuming that the request arrival process depends on both the value of the request counter and the location of a station on the buses. By taking these dependences, we can catch the real behavior of the DQDB stations, which is locationally dependent and unfair under heavy load traffic. Based on this model, we analyze the DQDB system with finite buffer by considering the request counter states and buffer states separately and obtain the throughput, mean packet delay and packet reject probability of individual stations. The throughput in individual stations matches that of simulation very well within the range of traffic up to the channel capacity. Also the delay and packet reject rate performance is good up to moderate traffic load. These numerical results reveal the properties of the location dependence and the unfairness of DQDB system under heavy load condition. The analytic results under heavy load traffic for a general DQDB system has not been reported till now. Therefore we conclude that our model and analysis are valid and effective.
Xiao Lei YUAN Lu GAN Hong Shu LIAO
In this letter, a novel robust adaptive beamforming algorithm is addressed to improve the robustness against steering vector random errors (SVREs), which eliminates the signal of interest (SOI) component from the sample covariance matrix (SCM), based on interference-plus-noise covariance matrix (IPNCM) reconstruction over annulus uncertainty sets. Firstly, several annulus uncertainty sets are used to constrain the steering vectors (SVs) of both interferences and the SOI. Additionally the IPNCM is reconstructed according to its definition by estimating each interference SV over its own annulus uncertainty set via the subspace projection algorithm. Meanwhile, the SOI SV is estimated as the prime eigenvector of the SOI covariance matrix term calculated over its own annulus uncertainty set. Finally, a novel robust beamformer is formulated based on the new IPNCM and the SOI SV, and it outperforms other existing reconstruction-based beamformers when the SVREs exist, especially in low input signal-to-noise ratio (SNR) cases, which is proved through the simulation results.
Lin GAO Jian HUANG Wen SUN Ping WEI Hongshu LIAO
The cardinality balanced multi-target multi-Bernoulli (CBMeMBer) filter has emerged as a promising tool for tracking a time-varying number of targets. However, the standard CBMeMBer filter may perform poorly when measurements are coupled with sensor biases. This paper extends the CBMeMBer filter for simultaneous target tracking and sensor biases estimation by introducing the sensor translational biases into the multi-Bernoulli distribution. In the extended CBMeMBer filter, the biases are modeled as the first order Gauss-Markov process and assumed to be uncorrelated with target states. Furthermore, the sequential Monte Carlo (SMC) method is adopted to handle the non-linearity and the non-Gaussian conditions. Simulations are carried out to examine the performance of the proposed filter.
Tadao KASAMI Takuya KOUMOTO Toru FUJIWARA Hiroshi YAMAMOTO Yoshihisa DESAKI Shu LIN
Subtrellises for low-weight codewords of binary linear block codes have been recently used in a number of trellis-based decoding algorithms to achieve near-optimum or suboptimum error performance with a significant reduction in decoding complexity. An algorithm for purging a full code trellis to obtain a low-weight subtrellis has been proposed by H.T. Moorthy et al. This algorithm is effective for codes of short to medium lengths, however for long codes, it becomes very time consuming. This paper investigates the structure and complexity of low-weight subtrellises for binary linear block codes. A construction method for these subtrellises is presented. The state and branch complexities of low-weight subtrellises for Reed-Muller codes and some extended BCH codes are given. In addition, a recursive algorithm for searching the most likely codeword in low-weight subtrellis-based decoding algorithm is proposed. This recursive algorithm is more efficient than the conventional Viterbi algorithm.
Robert H. Moirelos-ZARAGOZA Nobuyuki UETSUKI Toyoo TAKATA Tadao KASAMI Shu LIN
In this paper, the error performance of block coded 8-PSK modulation systems of length 32, designed for unequal error protection (UEP) of messages transmitted over a Rayleigh fading channel, is investigated. Computer simulation are reported showing that, with transmission over a Rayleigh fading channel, a good improvement in coding gain is obtained by the use of a binary linear UEP (LUEP) code as a constituent code in the multilevel construction, compared with conventional block coded modulation (BCM) of the same length.
Lu GAN Xiao Qing WANG Hong Shu LIAO
In this letter, a new method is proposed to solve the direction-of-arrivals (DOAs) estimation problem of coherently distributed sources based on the block-sparse signal model of compressed sensing (CS) and the convex optimization theory. We make use of a certain number of point sources and the CS array architecture to establish the compressive version of the discrete model of coherently distributed sources. The central DOA and the angular spread can be estimated simultaneously by solving a convex optimization problem which employs a joint norm constraint. As a result we can avoid the two-dimensional search used in conventional algorithms. Furthermore, the multiple-measurement-vectors (MMV) scenario is also considered to achieve robust estimation. The effectiveness of our method is confirmed by simulation results.
Kaixuan LIU Yue LI Peng WANG Xiaoyan PENG Hongshu LIAO Wanchun LI
Under the background of non-homogenous and dynamic time-varying clutter, the processing ability of the traditional constant false alarm rate (CFAR) detection algorithm is significantly reduced, as well as the detection performance. This paper proposes a CFAR detection algorithm based on clutter knowledge (CK-CFAR), as a new CFAR, to improve the detection performance adaptability of the radar in complex clutter background. With the acquired clutter prior knowledge, the algorithm can dynamically select parameters according to the change of background clutter and calculate the threshold. Compared with the detection algorithms such as CA-CFAR, GO-CFAR, SO-CFAR, and OS-CFAR, the simulation results show that CK-CFAR has excellent detection performance in the background of homogenous clutter and edge clutter. This algorithm can help radar adapt to the clutter with different distribution characteristics, effectively enhance radar detection in a complex environment. It is more in line with the development direction of the cognitive radar.
Motohiko ISAKA Robert H. MORELOS-ZARAGOZA Marc P. C. FOSSORIER Shu LIN Hideki IMAI
In this paper, we investigate multilevel coding and multistage decoding for satellite broadcasting with moderate decoding complexity. An unconventional signal set partitioning is used to achieve unequal error protection capabilities. Two possibilities are shown and analyzed for practical systems: (i) linear block component codes with near optimum decoding, (ii) punctured convolutional component codes with a common trellis structure.