传输控制协议(transport control protocol,TCP)发送窗口的大小由拥塞窗口和接收方确认窗口中较小的值来确定。在高速网络中,通过合理地增加拥塞窗口,可以提高TCP的性能。然而,一个相对较小的接收方确认窗口将限制发送窗口的增加,如果根...传输控制协议(transport control protocol,TCP)发送窗口的大小由拥塞窗口和接收方确认窗口中较小的值来确定。在高速网络中,通过合理地增加拥塞窗口,可以提高TCP的性能。然而,一个相对较小的接收方确认窗口将限制发送窗口的增加,如果根据TCP接收方的数据变化率恰当地增加接收方确认窗口赋予发送方的信用量,就能减少这种限制。提出一种增强的TCP算法,命名为接收方信用量调整传输控制协议(receiver creditadjustment transport control protocol,RCA-TCP),该算法根据TCP接收方缓冲区的动态数据变化率和TCP连接的最小往返时间之间的乘积的估计值来获得信用量增量。在ns-2(network simulator,version 2)下仿真表明,该算法能获得更好的性能。展开更多
The theoretical lower bounds on mean squared channel estimation errors for typical fading channels are presented by the infinite-length and non-causal Wiener filter and the exact closed-form expressions of the lower b...The theoretical lower bounds on mean squared channel estimation errors for typical fading channels are presented by the infinite-length and non-causal Wiener filter and the exact closed-form expressions of the lower bounds for different channel Doppler spectra are derived. Based on the obtained lower bounds on mean squared channel estimation errors, the limits on bit error rate (BER) for maximal ratio combining (MRC) with Gaussian distributed weighting errors on independent and identically distributed (i. i. d) fading channels are presented. Numerical results show that the BER performances of ideal MRC are the lower bounds on the BER performances of non-ideal MRC and deteriorate as the maximum Doppler frequency increases or the SNR of channel estimate decreases.展开更多
By the use of cross-correlation measures, the response of a symmetric Schmitt trigger (ST) driven by a random binary signal and white Gaussian noise is investigated. The results show that the information transmission...By the use of cross-correlation measures, the response of a symmetric Schmitt trigger (ST) driven by a random binary signal and white Gaussian noise is investigated. The results show that the information transmission can be enhanced when a certain amount of noise is presented, i.e., aperiodic stochastic resonance (ASR). Then, the influence of signal amplitude and the ST threshold on ASR is examined, the applicability of the ST in reducing the noise level of random signal transmission and improving the quality of output signal via ASR effect is illustrated. This research is of great interest in the field of digital communications.展开更多
To study the measurement of distance under the condition of the frequency modulation (FM) multi component signal of a short range radar, the multi points scattering model of a target, the TLS ESPRIT (total least sq...To study the measurement of distance under the condition of the frequency modulation (FM) multi component signal of a short range radar, the multi points scattering model of a target, the TLS ESPRIT (total least square estimation of signal parameters via rotational invariance techniques) and the mathematical statistics methods were used. The method of computing single frequency signal's instantaneous frequency (IF) is unsuitable to the multi component signal. By using the method of the TLS ESPRIT combined with the mathematical statistics, the multi component signal's IF can be obtained. The computer simulation has shown that the method has the high accuracy for measuring the distance.展开更多
The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficien...The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently.展开更多
Based on stakeholder analysis, this paper analyzed influence of stakehold- ers on construction and operation of agricultural information network (AIN) in the Greater Mekong Sub-region (GMS). It elaborated and anal...Based on stakeholder analysis, this paper analyzed influence of stakehold- ers on construction and operation of agricultural information network (AIN) in the Greater Mekong Sub-region (GMS). It elaborated and analyzed stakeholders such as China, Asian Development Bank, other GMS state government agricultural depart- ments and users. Finally, it came up with pertinent recommendations for develop- ment of GMS-AIN.展开更多
A new method uses a linear array that takes advantage of underwater physical sound fields to estimate the velocity of an underwater moving target. The mathematical model was established by considering the geometric re...A new method uses a linear array that takes advantage of underwater physical sound fields to estimate the velocity of an underwater moving target. The mathematical model was established by considering the geometric relationship between the moving target installed with only two transducers to radiate sound of different frequencies and the linear array. In addition, deterministic maximum likelihood and signal phase matching algorithms were introduced to effectively find the directions of arrival (DOAs) of the sound sources of the two transducers installed on the target. Factors causing velocity measurement errors were considered. To track the target, a linear array with a compass, a pressure transducer, a signal conditioner and a digital recorder was configured. Relevant requirements for the array parameters were derived. The simulation showed that a 16-element array with an aperture of less than lm can measure velocity with relative error of no more', than 4% when including typical system errors. Anechoic pool and reservoir experiments confirmed these results.展开更多
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system...Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.展开更多
文摘传输控制协议(transport control protocol,TCP)发送窗口的大小由拥塞窗口和接收方确认窗口中较小的值来确定。在高速网络中,通过合理地增加拥塞窗口,可以提高TCP的性能。然而,一个相对较小的接收方确认窗口将限制发送窗口的增加,如果根据TCP接收方的数据变化率恰当地增加接收方确认窗口赋予发送方的信用量,就能减少这种限制。提出一种增强的TCP算法,命名为接收方信用量调整传输控制协议(receiver creditadjustment transport control protocol,RCA-TCP),该算法根据TCP接收方缓冲区的动态数据变化率和TCP连接的最小往返时间之间的乘积的估计值来获得信用量增量。在ns-2(network simulator,version 2)下仿真表明,该算法能获得更好的性能。
文摘The theoretical lower bounds on mean squared channel estimation errors for typical fading channels are presented by the infinite-length and non-causal Wiener filter and the exact closed-form expressions of the lower bounds for different channel Doppler spectra are derived. Based on the obtained lower bounds on mean squared channel estimation errors, the limits on bit error rate (BER) for maximal ratio combining (MRC) with Gaussian distributed weighting errors on independent and identically distributed (i. i. d) fading channels are presented. Numerical results show that the BER performances of ideal MRC are the lower bounds on the BER performances of non-ideal MRC and deteriorate as the maximum Doppler frequency increases or the SNR of channel estimate decreases.
文摘By the use of cross-correlation measures, the response of a symmetric Schmitt trigger (ST) driven by a random binary signal and white Gaussian noise is investigated. The results show that the information transmission can be enhanced when a certain amount of noise is presented, i.e., aperiodic stochastic resonance (ASR). Then, the influence of signal amplitude and the ST threshold on ASR is examined, the applicability of the ST in reducing the noise level of random signal transmission and improving the quality of output signal via ASR effect is illustrated. This research is of great interest in the field of digital communications.
基金Doctoral Programme Foundation of Institution of Higher Education of China.
文摘To study the measurement of distance under the condition of the frequency modulation (FM) multi component signal of a short range radar, the multi points scattering model of a target, the TLS ESPRIT (total least square estimation of signal parameters via rotational invariance techniques) and the mathematical statistics methods were used. The method of computing single frequency signal's instantaneous frequency (IF) is unsuitable to the multi component signal. By using the method of the TLS ESPRIT combined with the mathematical statistics, the multi component signal's IF can be obtained. The computer simulation has shown that the method has the high accuracy for measuring the distance.
文摘The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently.
文摘Based on stakeholder analysis, this paper analyzed influence of stakehold- ers on construction and operation of agricultural information network (AIN) in the Greater Mekong Sub-region (GMS). It elaborated and analyzed stakeholders such as China, Asian Development Bank, other GMS state government agricultural depart- ments and users. Finally, it came up with pertinent recommendations for develop- ment of GMS-AIN.
基金Supported by the National Science Foundation of China under Grant No.60672136
文摘A new method uses a linear array that takes advantage of underwater physical sound fields to estimate the velocity of an underwater moving target. The mathematical model was established by considering the geometric relationship between the moving target installed with only two transducers to radiate sound of different frequencies and the linear array. In addition, deterministic maximum likelihood and signal phase matching algorithms were introduced to effectively find the directions of arrival (DOAs) of the sound sources of the two transducers installed on the target. Factors causing velocity measurement errors were considered. To track the target, a linear array with a compass, a pressure transducer, a signal conditioner and a digital recorder was configured. Relevant requirements for the array parameters were derived. The simulation showed that a 16-element array with an aperture of less than lm can measure velocity with relative error of no more', than 4% when including typical system errors. Anechoic pool and reservoir experiments confirmed these results.
基金partially supported by grants from the China 863 High-tech Program (Grant No. 2015AA016002)the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20131103120001)+2 种基金the National Key Research and Development Program of China (Grant No. 2016YFB0800204)the National Science Foundation of China (No. 61502017)the Scientific Research Common Program of Beijing Municipal Commission of Education (KM201710005024)
文摘Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.