Time filter

Source Type

Niu H.,University of Tokyo | Zhu N.,GCI Science and Technology Co. | Sun L.,Xi'an Jiaotong University | Vasilakos A.V.,Lulea University of Technology | Sezaki K.,University of Tokyo
Wireless Networks | Year: 2015

As a promising technique for wireless networks, cooperative communications is coming to maturity in both theory and practice. The main merit of the cooperation technique is its capability in providing additional transmission links to harvest the spatial diversity gain at the physical layer. However, due to the broadcast nature of wireless medium, the diversity gain can be also freely achieved at the potential eavesdropper if the cooperation is performed blindly. To solve this problem, we propose a security-embedded opportunistic user cooperation scheme (OUCS) in this paper. The OUCS first defines a concept called secrecy-providing capability (SPC) for both the source and the cooperative relays. By comparing the values of SPC of these nodes, the OUCS jointly decides whether to cooperate and with whom to cooperate from the perspective of physical layer security. The secrecy outage performance of the OUCS is then derived. From the results we prove that full diversity can be achieved (i.e., the diversity order is N + 1 for N cooperative relays), which outperforms existing alternatives. Finally, numerical results are provided to validate the theoretical analysis. © 2015 Springer Science+Business Media New York

Zhu N.,GCI Science and Technology Co. | Vasilakos A.V.,Lulea University of Technology
Wireless Networks | Year: 2015

Due to reliance on batteries, energy consumption has always been of significant concern for sensor node networks. This work presents the design and implementation of a house-build experimental platform, named Energy Management System for Wireless Sensor Networks (EMrise) for the energy management and exploration on wireless sensor networks. Consisting of three parts, the SystemC-based simulation environment of EMrise enables the HW/SW co-simulation for energy evaluation on heterogeneous sensor networks. The hardware platform of EMrise is further designed to facilitate the realistic energy consumption measurement and calibration as well as accurate energy exploration. In the meantime, a generic genetic algorithm based optimization framework of EMrise is also implemented to automatically, quickly and intelligently fine tune hundreds of possible solutions for the given task to find the best suitable energy-aware tradeoffs. © 2015 Springer Science+Business Media New York

Chen Q.,GCI Science and Technology Co. | Chen Q.,South China Normal University | Pei D.-Y.,Guangzhou University | Zhao G.-S.,South China Normal University | And 2 more authors.
Jisuanji Xuebao/Chinese Journal of Computers | Year: 2012

A black-box secret sharing scheme (BBSSS) differs from an ordinary linear secret sharing scheme over finite field. It works in exactly the same way over any finite Abelian group, as it only requires black-box access to group operations and to random group elements. In particular, there is no dependence on e.g. the structure of the group or its order. Until now, the efficient BBSSS for non-threshold access structure has not been constructed. In this paper, we give an approach to construct BBSSS for some non-threshold over arbitrary Abelian group by making use of the technique of monotone span scheme (MSP). First, we introduce the notation of weak MSPs and give the technique to construct the MSP based on weak MSPs. Then, we construct a pair of coprime weak MSPs by using the MSP over rational field and the MSP over finite field. Finally, we construct an efficient non-threshold BBSSS such as BBSSS for disjunctive multi-level access structure. Our new scheme can be applied to construct the new secure multi-party computation protocol over rings, linear integer secret sharing scheme, and distributed RSA signature for disjunctive multi-level access structure, and new zero-knowledge protocol.

Chen Q.,GCI Science and Technology Co. | Chen Q.,South China Normal University | Pei D.,Guangzhou University | Tang C.,Guangzhou University | Zhao G.,South China Normal University
Information Processing Letters | Year: 2013

Integer span program (ISP) is a monotone span program (MSP) over Z, which is introduced by Cramer and Fehr in CRYPTO 2002. ISP can be used to construct black-box secret sharing scheme (BBSSS) and linear integer secret sharing scheme (LISSS). The efficiency of ISPs is a very important research objective, as efficient ISP can be used to construct efficient BBSSS and efficient LISSS. Until now, only efficient ISPs that realize threshold access structure have been constructed, but not efficient ISPs realizing other access structures. The main contribution of this paper is that we propose an efficient ISP that realizes the hierarchical threshold access structure, to the best knowledge of the authors, which is the first efficient one for non-threshold access structure. Accordingly, with the proposed construction of efficient ISP realizing hierarchical threshold access structure, the construction of efficient non-threshold BBSSSs and LISSSs for a useful family of access structures is presented. © 2013 Published by Elsevier B.V. All rights reserved.

Lei L.,Huaiyin Normal University | Zheng L.,Huaiyin Normal University | Sun G.,GCI Science and Technology Co.
Proceedings of the 2010 2nd International Conference on Future Computer and Communication, ICFCC 2010 | Year: 2010

According to the dependent performance of each antenna in space, the antenna Rayleigh-related influence on channel was analyzed, the symbol error rate(SER) expression of multiple transmit, multiple receive antenna Rayleigh-related was derived. Under the condition that correlation coefficient equals signal to noise ratio (SNR), it was obtained through the Monte-Carol simulation of 2 * 1, 1 * 2, 2 * 2, 4 * 4 system relevant to sending and receiving that the more the transceiver antenna, the smaller the SER, however the less robustness of the system's SNR. ©2010 IEEE.

Jiang S.B.,GCI Science and Technology Co. | Bai C.F.,GCI Science and Technology Co. | Du C.F.,GCI Science and Technology Co.
Advanced Materials Research | Year: 2014

Due to the time sequence has some unique characteristics, problems with the traditional point to point distance method are realized by more and more researchers when measuring the similarity of time series. Therefore, this paper uses a new similarity measure, i.e. global characteristics, extracting values of statistical distribution, seasonal, spectral and other characteristics from time series to construct eigenvector, based on the characteristic vector clustering analysis. By conducting time series clustering of communication base stations in a region, this paper confirms the method is able to deal with global characteristics that has a larger scale of time series, and to calculate effectively large time series. © (2014) Trans Tech Publications, Switzerland.

Du C.F.,GCI Science and Technology Co. | Xu Q.,China Unicom | Li J.H.,China Unicom
Advanced Materials Research | Year: 2014

Using feature selection and neural networks to experiment the data, then we bring a warning model of user complaints. It is the core that using the known information of network index sample to analyze and discriminate. First, the training samples need to be extract, because there are too many features in training data will have an adverse impact on machine learning classification algorithm. Using extraction method to explore the feature subset with feature, feature subset is a set of feature vectors, then the feature vectors are input into the probability neural network prediction, find out the best features quantum set. This model can be achieved using the MATLAB software, and it is operational, and it can be extended to the network quality assessment and monitoring practice. © (2014) Trans Tech Publications, Switzerland.

Du C.F.,GCI Science and Technology Co. | Shen W.M.,GCI Science and Technology Co. | Jiang S.B.,GCI Science and Technology Co.
Advanced Materials Research | Year: 2014

The real-time prediction of micro regional market share provides decision for the analysis of micro regional marketing scheme and micro regional channel planning. More and more increasing complexion mobile network environment require real-time micro area of market share and only mastering micro regional market share can have a more comprehensive understanding of market. To solve this problem, consideration of advantages of real-time aspects of the extended Kalman filtering algorithm in predicting, we propose a real-time prediction algorithm based on the extended Kalman filter Market Share. The algorithm can be real-time prediction of mobile network market share of base station. The simulation results show that the proposed algorithm in this paper is a real-time and good prediction quality. © (2014) Trans Tech Publications, Switzerland.

Jiang S.B.,GCI Science and Technology Co. | Bai C.F.,GCI Science and Technology Co. | Du C.F.,GCI Science and Technology Co.
Advanced Materials Research | Year: 2014

Traffic analysis and forecast are the classic topics of telecommunication research, as they provide strategic ground to address the issues such as mobile network's traffic jam, network coverage planning design, marketing management etc. On the basis of the empirical mode decomposition theory and methods, this article first implements multi-scale analysis of the time series of traffic, then it goes on to executes RBF neural network based on the different compositions, and finally reach the forecast expectation of voice traffics of selected base stations. © (2014) Trans Tech Publications, Switzerland.

Liu F.G.,South China University of Technology | Peng Y.S.,South China University of Technology | He N.,South China University of Technology | Yang Y.Y.,South China University of Technology | And 2 more authors.
Advanced Materials Research | Year: 2013

The innovation and development of software and information technology has stimulated the mature of service-oriented architecture(SOA) platform technology, while the loosely coupled, modular, dynamic loading feature of OSGi service platform has made itself a popular architecture within the SOA community. To emb ody the advantages of the OSGi framework application with a longer lifecycle and ensure the quality of OSGi applications, we need to run a series of rigorous testing, especially integration testing. Existing tools do not support separation of testing and development, testing records playb ack or redundant test cases auto-generation. In this paper, we have analyzed the current OSGi testing techniques and tools as well as their inadequacies. Our research into OSGi testing technology has enlightened us to expand the function of the testing tools on the b asis of Pax-exam and then integrate them into the OSGi testing platform. Finally, we discuss the framework design of our OSGi integration testing platform and demonstrate the correctness and validity of the platform. © (2013) Trans Tech Publications, Switzerland.

Loading GCI Science and Technology Co. collaborators
Loading GCI Science and Technology Co. collaborators