The majority of existing papers about spectrum sensing have the assumption that secondary users(SUs) are stationary. However,mobility is an essential feature of mobile communications networks. In this paper,the detect...The majority of existing papers about spectrum sensing have the assumption that secondary users(SUs) are stationary. However,mobility is an essential feature of mobile communications networks. In this paper,the detection performance of spectrum sensing by mobile SUs was analyzed. Three performance metrics,i.e.,detection probability,miss detection probability and false alarm probability,were thoroughly investigated. In our analysis,a critical variable was the real-time received primary user signal power by a mobile SU. Its probability distribution and mathematical expectation were analytically derived. Moreover,the three performance metrics in single-node spectrum sensing and multi-node collaborative spectrum sensing systems were also derived. Extensive simulations were performed. The results are consistent with the theoretical analysis. And it is concluded that SU mobility has a significant impact on the detection probability and the miss detection probability,but not on the false alarm probability.展开更多
In order to solve the problem that me traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware detection model (SP-MDM) based on artif...In order to solve the problem that me traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware detection model (SP-MDM) based on artificial immune system, in which static malware analysis and dynamic malware analysis techniques are combined, and antigens are generated by encoding the characteristics extracted from the malware. Based on negative selection algorithm, the mature detectors are generated. By introducing clonal selection algorithm, the detectors with higher affinity are selected to undergo a proliferation and somatic hyper-mutation process, so that more excellent detector offspring can be generated. Experimental result shows that the detection model has a higher detection rate for unknown smartphone malware, and better detection performance can be achieved by increasing the clone generation.展开更多
On basis of two definitions that 1. an induced subgraph by a vertex vi E G and its neighbors in G is defined a vertex adjacent closed subgraph denoted by Qi (=G[V(Nvi)]), with the vertex vi called the hub; 2. A r...On basis of two definitions that 1. an induced subgraph by a vertex vi E G and its neighbors in G is defined a vertex adjacent closed subgraph denoted by Qi (=G[V(Nvi)]), with the vertex vi called the hub; 2. A r(k,1)-1 vertices connected graph is called a (k,l)-Ramsey graph denoted by RG(k,l),if and only if 1. RG(k,l) contains only cliques of degree k-1, and its complement contains only cliques of degree l-l; 2. the intersect Qi∩Qj of any two nonadjacent vertices vi and vj of RG(k,1) contains Kk.2, and the intersect Qi∩Qj of any two nonadjacent vertices vi and vj of its complement RG(l,k) contains KI.2. Two theorems that theoreml : the biggest clique in G is contained in some Qi of G, and theorem2: r(k,l)= [ V(RG(k,I)) I +1 are put forward and proved in this paper. With those definitions and theorems as well as analysis of property of chords a method for quick inspection and building RG(k,I) is proposed. Accordingly, RG(10,3) and its complement are built, which are respectively the strongly 29-regular graph and the strongly 10-regular graph on orders 40. We have tested RG(10,3) and its complement RG(3,10),and gotten r(3,10)=41.展开更多
For solving the difficult problem of leakage detection in city gas pipelines, a method using acoustic technique based on instantaneous energy (IE) distribution and correlation analysis was proposed. Firstly, the basic...For solving the difficult problem of leakage detection in city gas pipelines, a method using acoustic technique based on instantaneous energy (IE) distribution and correlation analysis was proposed. Firstly, the basic theory of leakage detection and location was introduced. Then the physical relationship between instantaneous energy and structural state variation of a system was analyzed theoretically. With HILBERT-HUANG transformation (HHT), the instantaneous energy distribution feature of an unstable acoustic signal was obtained. According to the relative contribution method of the instantaneous energy, the noise in signal was eliminated effectively. Furthermore, in order to judge the leakage, the typical characteristic of the instantaneous energy of signal in the input and output end was discussed using correlative analysis. A number of experiments were carried out to classify the leakage from normal operations, and the results show that the leakages are successfully detected and the average recognition rate reaches 93.3% among three group samples. It is shown that the method using acoustic technique with IED and correlative analysis is effective and it may be referred in other pipelines.展开更多
This paper analyzes performance of optimal channel estimation and multiuser detection(MUD) in a block-fading code-division multiple-access (CDMA) channel on the assumptions of randomspreading and large-system limit,by...This paper analyzes performance of optimal channel estimation and multiuser detection(MUD) in a block-fading code-division multiple-access (CDMA) channel on the assumptions of randomspreading and large-system limit,by using the replica method developed in statistical mechanics.The authors find that the asymptotic spectral efficiency of the linear minimum mean-squared error(LMMSE) MUD which was proposed and analyzed by Evans and Tse in 2000 is indistinguishable fromthat of the optimal MUD for small system loads.Our results imply that performance of MUD scarcelyimproves even if one spends more computational cost than that of the LMMSE MUD,i.e.,at most thecube of the number of users,on the above-described conditions.展开更多
基金supported by National Natural Science Foundation of China under Grand No.61671183
文摘The majority of existing papers about spectrum sensing have the assumption that secondary users(SUs) are stationary. However,mobility is an essential feature of mobile communications networks. In this paper,the detection performance of spectrum sensing by mobile SUs was analyzed. Three performance metrics,i.e.,detection probability,miss detection probability and false alarm probability,were thoroughly investigated. In our analysis,a critical variable was the real-time received primary user signal power by a mobile SU. Its probability distribution and mathematical expectation were analytically derived. Moreover,the three performance metrics in single-node spectrum sensing and multi-node collaborative spectrum sensing systems were also derived. Extensive simulations were performed. The results are consistent with the theoretical analysis. And it is concluded that SU mobility has a significant impact on the detection probability and the miss detection probability,but not on the false alarm probability.
基金This work was supported in part by National Natural Science Foundation of China under Grants No.61101108,National S&T Major Program under Grants No.2011ZX03002-005-01
文摘In order to solve the problem that me traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware detection model (SP-MDM) based on artificial immune system, in which static malware analysis and dynamic malware analysis techniques are combined, and antigens are generated by encoding the characteristics extracted from the malware. Based on negative selection algorithm, the mature detectors are generated. By introducing clonal selection algorithm, the detectors with higher affinity are selected to undergo a proliferation and somatic hyper-mutation process, so that more excellent detector offspring can be generated. Experimental result shows that the detection model has a higher detection rate for unknown smartphone malware, and better detection performance can be achieved by increasing the clone generation.
文摘On basis of two definitions that 1. an induced subgraph by a vertex vi E G and its neighbors in G is defined a vertex adjacent closed subgraph denoted by Qi (=G[V(Nvi)]), with the vertex vi called the hub; 2. A r(k,1)-1 vertices connected graph is called a (k,l)-Ramsey graph denoted by RG(k,l),if and only if 1. RG(k,l) contains only cliques of degree k-1, and its complement contains only cliques of degree l-l; 2. the intersect Qi∩Qj of any two nonadjacent vertices vi and vj of RG(k,1) contains Kk.2, and the intersect Qi∩Qj of any two nonadjacent vertices vi and vj of its complement RG(l,k) contains KI.2. Two theorems that theoreml : the biggest clique in G is contained in some Qi of G, and theorem2: r(k,l)= [ V(RG(k,I)) I +1 are put forward and proved in this paper. With those definitions and theorems as well as analysis of property of chords a method for quick inspection and building RG(k,I) is proposed. Accordingly, RG(10,3) and its complement are built, which are respectively the strongly 29-regular graph and the strongly 10-regular graph on orders 40. We have tested RG(10,3) and its complement RG(3,10),and gotten r(3,10)=41.
基金Project(51004005) supported by the National Natural Science Foundation of ChinaProject supported by Open Research Fund Program of Beijing Engineering Research Center of Monitoring for Construction Safety (Beijing University of Civil Engineering and Architecture), China
文摘For solving the difficult problem of leakage detection in city gas pipelines, a method using acoustic technique based on instantaneous energy (IE) distribution and correlation analysis was proposed. Firstly, the basic theory of leakage detection and location was introduced. Then the physical relationship between instantaneous energy and structural state variation of a system was analyzed theoretically. With HILBERT-HUANG transformation (HHT), the instantaneous energy distribution feature of an unstable acoustic signal was obtained. According to the relative contribution method of the instantaneous energy, the noise in signal was eliminated effectively. Furthermore, in order to judge the leakage, the typical characteristic of the instantaneous energy of signal in the input and output end was discussed using correlative analysis. A number of experiments were carried out to classify the leakage from normal operations, and the results show that the leakages are successfully detected and the average recognition rate reaches 93.3% among three group samples. It is shown that the method using acoustic technique with IED and correlative analysis is effective and it may be referred in other pipelines.
基金support through Grant-in-Aid for Scientific Research on Priority Areas (No. 18079010)from MEXT, Japan
文摘This paper analyzes performance of optimal channel estimation and multiuser detection(MUD) in a block-fading code-division multiple-access (CDMA) channel on the assumptions of randomspreading and large-system limit,by using the replica method developed in statistical mechanics.The authors find that the asymptotic spectral efficiency of the linear minimum mean-squared error(LMMSE) MUD which was proposed and analyzed by Evans and Tse in 2000 is indistinguishable fromthat of the optimal MUD for small system loads.Our results imply that performance of MUD scarcelyimproves even if one spends more computational cost than that of the LMMSE MUD,i.e.,at most thecube of the number of users,on the above-described conditions.