Time filter

Source Type

Zhao X.,State Key Laboratory of Rail Traffic Control and Safety | Zhao X.,University of Jinan | Xu W.,Beijing Jiaotong University
Computational Intelligence and Neuroscience | Year: 2015

Affinity propagation (AP) algorithm, as a novel clustering method, does not require the users to specify the initial cluster centers in advance, which regards all data points as potential exemplars (cluster centers) equally and groups the clusters totally by the similar degree among the data points. But in many cases there exist some different intensive areas within the same data set, which means that the data set does not distribute homogeneously. In such situation the AP algorithm cannot group the data points into ideal clusters. In this paper, we proposed an extended AP clustering algorithm to deal with such a problem. There are two steps in our method: firstly the data set is partitioned into several data density types according to the nearest distances of each data point; and then the AP clustering method is, respectively, used to group the data points into clusters in each data density type. Two experiments are carried out to evaluate the performance of our algorithm: one utilizes an artificial data set and the other uses a real seismic data set. The experiment results show that groups are obtained more accurately by our algorithm than OPTICS and AP clustering algorithm itself. © 2015 XiuLi Zhao and WeiXiang Xu.

Ou B.,Beijing Jiaotong University | Ou B.,Beijing Key Laboratory of Advanced Information Science and Network Technology | Li X.,Beijing Institute of Technology | Zhao Y.,Beijing Jiaotong University | And 4 more authors.
IEEE Transactions on Image Processing | Year: 2013

In prediction-error expansion (PEE) based reversible data hiding, better exploiting image redundancy usually leads to a superior performance. However, the correlations among prediction-errors are not considered and utilized in current PEE based methods. Specifically, in PEE, the prediction-errors are modified individually in data embedding. In this paper, to better exploit these correlations, instead of utilizing prediction-errors individually, we propose to consider every two adjacent prediction-errors jointly to generate a sequence consisting of prediction-error pairs. Then, based on the sequence and the resulting 2D prediction-error histogram, a more efficient embedding strategy, namely, pairwise PEE, can be designed to achieve an improved performance. The superiority of our method is verified through extensive experiments. © 1992-2012 IEEE.

Yang J.,Beijing Jiaotong University | Zhang H.,State Key Laboratory of Rail Traffic Control and Safety | Ling Y.,Beijing Jiaotong University | Pan C.,Beijing Jiaotong University | Sun W.,Beijing Jiaotong University
IEEE Sensors Journal | Year: 2014

Many applications of wireless sensor network (WSN) require the execution of several computationally intense in-network processing tasks. Collaborative in-network processing among multiple nodes is essential when executing such a task due to the strictly constrained energy and resources in single node. Task allocation is essential to allocate the workload of each task to proper nodes in an efficient manner. In this paper, a modified version of binary particle swarm optimization (MBPSO), which adopts a different transfer function and a new position updating procedure with mutation, is proposed for the task allocation problem to obtain the best solution. Each particle in MBPSO is encoded to represent a complete potential solution for task allocation. The task workload and connectivity are ensured by taking them as constraints for the problem. Multiple metrics, including task execution time, energy consumption, and network lifetime, are considered a whole by designing a hybrid fitness function to achieve the best overall performance. Simulation results show the feasibility of the proposed MBPSO-based approach for task allocation problem in WSN. The proposed MBPSO-based approach also outperforms the approaches based on genetic algorithm and BPSO in the comparative analysis. © 2013 IEEE.

Qian X.,State Key Laboratory of Rail Traffic Control and Safety | Wu H.,State Key Laboratory of Rail Traffic Control and Safety
Proceedings - 2012 International Conference on Control Engineering and Communication Technology, ICCECT 2012 | Year: 2012

A handover scheme with the assist of a Mobile Relay Station (MRS) and dual antennas is proposed for high speed railway private cellular network in this paper. After introducing a MRS, the Radio Resource Management (RRM) of the railway wireless communication system, e.g. handover process, should be made corresponding changes. This paper integrates the relative handover signaling, and employs a MRS and dual-antenna mechanism to improve the quality of the received signal and to enhance handover performance. Furthermore, bi-casting is adopted to eliminate data forwarding delay between the serving evolved NodeB (eNB) and the target one. The proposed scheme is evaluated by simulation in terms of handover outage probability and communication interruption probability. The results show the proposed handover scheme can reduce outage probability and provide the seamless experience for users on board compared to the standard LTE handover scheme. © 2012 IEEE.

Liu Y.,China Mobile | Tan Z.,State Key Laboratory of Rail Traffic Control and Safety | Wang H.,China Mobile | Kwak K.S.,Inha University
IEEE Transactions on Vehicular Technology | Year: 2011

In this paper, an order recursive method is proposed to solve the joint estimation of channel impulse response (CIR) and carrier frequency offset (CFO) for orthogonal frequency-division multiplexing (OFDM) transmission. As long as one can obtain the solution for Qth-order Taylor expansion, the solution for (Q + 1)th order can also be obtained via a simple recursive relation. The proposed recursive algorithm actually provides a method to handle any Qth-order Taylor expansion, instead of just the second order adopted in the technical literature. Significant improvement can be observed by adopting higher order approximation. Analytical mean-square-error (MSE) performance results are given, demonstrating the efficiency of the proposed algorithm. © 2011 IEEE.

Shuo T.,State Key Laboratory of Rail Traffic Control and Safety | Zhao K.,State Key Laboratory of Rail Traffic Control and Safety | Wu H.,State Key Laboratory of Rail Traffic Control and Safety
IEEE Vehicular Technology Conference | Year: 2016

Radio-over-fiber (RoF) technology can improve reliability and quality of service (QoS) of railway communication systems effectively. This paper studies directional antenna radiating same direction and intercross base station redundant network these two coverage strategies of RoF in long heavy haul railway tunnels (more than 1 km). As RAUs (remote antenna unit) deployed in long tunnels, according to different coverage strategies, the number of RAUs is different, this will lead various handover mechanisms. Based on the channel modeling of simulator in this paper, coverage efficiency (power consumption of unit distance in tunnel) handover trigger probability and outage probability are adopted to compare the performance of these two coverage strategies. It can be concluded that when using directional antenna radiating same direction, due to the longer radiate distance R, it has better coverage efficiency, and the trigger probability almost reached 100% once entered the overlapping area, and the handover outage probability is clearly lower than using intercross base station antenna network, even if the train is fast. © 2016 IEEE.

Zhang H.,Beijing Jiaotong University | Zhang H.,State Key Laboratory of Rail Traffic Control and Safety | Zhang M.,Beijing Jiaotong University | Sun W.,Beijing Jiaotong University
Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument | Year: 2013

To test whether the performance of security message transmission meets the requirements of vehicular to infrastructure high speed communication based on IEEE802. 11p, the communication between single roadside unit and mobile vehicle flow is simulated using Nakagami and Poisson distributions that accord with actual road characteristics to describe the wireless channel fading and moving vehicular data flow, respectively. The vehicular data sending interval, number of vehicles and vehicular speed are taken as the variables, the relationships between throughput and number of vehicles, data sending interval and packet loss rate, data sending interval and average delay, as well as vehicular speed and number of delivered data bytes for four different access categories of messages are obtained. The results show that, for different access categories of messages, there is an optimal point between the number of vehicles and throughput where both real time transmission and high network capacity are achieved, and maximal number of vehicles and throughput are realized. The packet loss rate and average latency will increase with the increasing of the vehicular data sending interval. The high priority messages can achieve low packet loss rate and low average latency under high vehicular data sending interval. When vehicular speed increases, the number of delivered bytes for security message will decline and is inversely proportional to the vehicle speed. The conclusion from simulation results is that the protocol of IEEE802. 11p is able to ensure communication service quality for high priority security messages.

Cao G.,Beijing Jiaotong University | Cao G.,Communication University of China | Zhao Y.,Beijing Jiaotong University | Zhao Y.,State Key Laboratory of Rail Traffic Control and Safety | And 3 more authors.
IEEE Transactions on Information Forensics and Security | Year: 2014

As a retouching manipulation, contrast enhancement is typically used to adjust the global brightness and contrast of digital images. Malicious users may also perform contrast enhancement locally for creating a realistic composite image. As such it is significant to detect contrast enhancement blindly for verifying the originality and authenticity of the digital images. In this paper, we propose two novel algorithms to detect the contrast enhancement involved manipulations in digital images. First, we focus on the detection of global contrast enhancement applied to the previously JPEG-compressed images, which are widespread in real applications. The histogram peak/gap artifacts incurred by the JPEG compression and pixel value mappings are analyzed theoretically, and distinguished by identifying the zero-height gap fingerprints. Second, we propose to identify the composite image created by enforcing contrast adjustment on either one or both source regions. The positions of detected blockwise peak/gap bins are clustered for recognizing the contrast enhancement mappings applied to different source regions. The consistency between regional artifacts is checked for discovering the image forgeries and locating the composition boundary. Extensive experiments have verified the effectiveness and efficacy of the proposed techniques. © 2005-2012 IEEE.

Chai Y.,Beijing Jiaotong University | Jia L.,State Key Laboratory of Rail Traffic Control and Safety
International Journal of Computational Intelligence and Applications | Year: 2011

In order to solve the defects of consequent part expression in ANFIS model and several shortcomings in FIS, this paper presents a Choquet Integral-OWA based Fuzzy Inference System, known as AggFIS. This model has advantages in consequent part of fuzzy rule, universal expression of fuzzy inference operator and importance factor of each criteria and each rule, which is trying to establish fuzzy inference system that can fully reflect the essence of fuzzy logic and human thinking pattern. If we combine AggFIS with a feed forward-type neural network according to the basic principles of fuzzy neural network, we can obtain Choquet Integral-OWA based Adaptive Neural Fuzzy Inference System, which is named Agg-ANFIS. We apply this Agg-ANFIS model into the evaluation of traffic level of service. The experimental results show that Choquet Integral-OWA based Adaptive Neural Fuzzy Inference System (Agg-ANFIS) is a universal approximator because of its infinite approximating capability by training and can be used in complex systems modeling, analysis and prediction. © 2011 Imperial College Press.

Wang F.,State Key Laboratory of Rail Traffic Control and Safety | Xu R.,State Key Laboratory of Rail Traffic Control and Safety | Zhong Z.,State Key Laboratory of Rail Traffic Control and Safety
2011 IEEE Wireless Communications and Networking Conference, WCNC 2011 | Year: 2011

Kolmogorov-Smirnov (K-S) testa non-parametric method to measure the goodness of fit, is applied for automatic modulation classification (AMC) in this paper. The basic procedure involves computing the empirical cumulative distribution function (ECDF) of some decision statistic derived from the received signal, and comparing it with the CDFs of the signal under each candidate modulation format. The K-S-based modulation classifier is first developed for AWGN channel, then it is applied to OFDM-SDMA systems to cancel multiuser interference. Regarding the complexity issue of K-S modulation classification, we propose a low-complexity method based on the robustness of the K-S classifier. Extensive simulation results demonstrate that compared with the traditional cumulant-based classifiers, the proposed K-S classifier offers superior classification performance and requires less number of signal samples (thus is fast). © 2011 IEEE.

Loading State Key Laboratory of Rail Traffic Control and Safety collaborators
Loading State Key Laboratory of Rail Traffic Control and Safety collaborators