160 results on '"Shaojing Su"'
Search Results
52. Application of MIMO-OFDM Technology in UAV Communication Network
- Author
-
Xiaopeng Tan, Shaojing Su, Xiaoyong Sun, and Xiaojun Guo
- Subjects
Data link ,Computer science ,Orthogonal frequency-division multiplexing ,Real-time computing ,MIMO ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,MIMO-OFDM ,Communications system ,ComputingMethodologies_ARTIFICIALINTELLIGENCE ,Multiple input ,Telecommunications network ,Data transmission - Abstract
With the application of various new mission loads in unmanned aerial vehicle (UAV), how to improve the communication quality of UAV data link has become a widespread concern. With the rapid development of UAV, multi UAVs cooperative self-organizing network can accomplish tasks more reliably, efficiently and economically than a single large UAV. This paper analyzes the characteristics of mobile self-organizing network composed of multiple UAVs, and focuses on how to improve the communication quality of UAV network. After analyzing the technical principles and system models of multiple input multiple output (MIMO) and orthogonal frequency division multiplexing (OFDM) technologies, a MIMO-OFDM communication system is constructed. The simulation results show that the application of MIMO-OFDM technology in UAV communication network can effectively improve the data transmission ability.
- Published
- 2020
53. Modulation Classification Using Compressed Sensing and Decision Tree–Support Vector Machine in Cognitive Radio System
- Author
-
Shaojing Su, Zhen Zuo, Xiaoyong Sun, Xiaojun Guo, and Xiaopeng Tan
- Subjects
Computer science ,Decision tree ,02 engineering and technology ,lcsh:Chemical technology ,modulation classification ,Biochemistry ,Article ,cyclic spectrum ,Analytical Chemistry ,0202 electrical engineering, electronic engineering, information engineering ,Nyquist–Shannon sampling theorem ,lcsh:TP1-1185 ,Detection theory ,Electrical and Electronic Engineering ,Instrumentation ,Cumulant ,compressed sensing ,business.industry ,high-order cumulant ,020206 networking & telecommunications ,Pattern recognition ,021001 nanoscience & nanotechnology ,Atomic and Molecular Physics, and Optics ,Support vector machine ,Compressed sensing ,Cognitive radio ,decision tree–support vector machine ,Artificial intelligence ,0210 nano-technology ,business ,Classifier (UML) - Abstract
In this paper, a blind modulation classification method based on compressed sensing using a high-order cumulant and cyclic spectrum combined with the decision tree&ndash, support vector machine classifier is proposed to solve the problem of low identification accuracy under single-feature parameters and reduce the performance requirements of the sampling system. Through calculating the fourth-order, eighth-order cumulant and cyclic spectrum feature parameters by breaking through the traditional Nyquist sampling law in the compressed sensing framework, six different cognitive radio signals are effectively classified. Moreover, the influences of symbol length and compression ratio on the classification accuracy are simulated and the classification performance is improved, which achieves the purpose of identifying more signals when fewer feature parameters are used. The results indicate that accurate and effective modulation classification can be achieved, which provides the theoretical basis and technical accumulation for the field of optical-fiber signal detection.
- Published
- 2020
- Full Text
- View/download PDF
54. Research on Narrowband Interference Suppression Technology of UAV Network Based on Spread Spectrum Communication
- Author
-
Shaojing Su, Xiaoyong Sun, and Xiaopeng Tan
- Subjects
Spread spectrum ,0209 industrial biotechnology ,020901 industrial engineering & automation ,Computer science ,Electromagnetic environment ,Reliability (computer networking) ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Narrowband interference ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,020201 artificial intelligence & image processing ,02 engineering and technology ,Interference (wave propagation) - Abstract
With the rapid development of information technology and the increasing application of unmanned aerial vehicle (UAV) in various fields, UAV network is facing many challenges, such as complex electromagnetic environment, serious environmental interference and human interference. Therefore, higher requirements are put forward for its safety, reliability and adaptability in complex environment. In order to improve the anti-narrowband interference capability of UAV network, this paper proposes a narrowband interference suppression technology based on spread spectrum communication. The simulation results show that the method has a good effect on narrowband interference suppression, and provides an effective solution to the problem of narrowband interference suppression in UAV network.
- Published
- 2020
55. Blind Chromatic Dispersion Estimation Using Fractional Fourier Transformation in Coherent Optical Communications
- Author
-
Zhen Zuo, Shaojing Su, Xiaopeng Tan, and Xiaoyong Sun
- Subjects
0209 industrial biotechnology ,Fiber chromatic dispersion ,business.industry ,Computer science ,Optical communication ,Single-mode optical fiber ,02 engineering and technology ,Signal ,Fractional Fourier transform ,symbols.namesake ,020901 industrial engineering & automation ,Optics ,Fourier transform ,Transmission (telecommunications) ,Dispersion (optics) ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,020201 artificial intelligence & image processing ,business ,Energy (signal processing) - Abstract
In this paper, we propose and demonstrate a blind chromatic dispersion (CD) estimation method based on fractional Fourier transformation (FrFT). When FrFT acts on linear frequency modulated (LFM) signal with energy convergence, it is compared to fiber chromatic dispersion signal, and the best order can be obtained by scanning or search method. Through numerical simulations, reliable CD estimation is demonstrated for 28 GBaud PM-QPSK and PM-16QAM signals with a range of (-70,45) ps/nm. The average estimation error of CD estimation is 0.15% and 0.5% when the transmission distance over 100km~2000km standard single mode fiber (SSMF).
- Published
- 2020
56. Automatic Modulation Classification Based on Deep Learning for Software-Defined Radio
- Author
-
Shaojing Su, Xudong Wen, Bei Sun, Peng Wu, Jinhui Zhao, and Junyu Wei
- Subjects
Artificial neural network ,Article Subject ,Computer science ,business.industry ,General Mathematics ,Deep learning ,General Engineering ,020206 networking & telecommunications ,02 engineering and technology ,Software-defined radio ,Engineering (General). Civil engineering (General) ,Residual neural network ,Identification (information) ,Computer engineering ,Rate of convergence ,Modulation ,Kernel (statistics) ,0202 electrical engineering, electronic engineering, information engineering ,QA1-939 ,020201 artificial intelligence & image processing ,Artificial intelligence ,TA1-2040 ,business ,Mathematics - Abstract
With the development of artificial intelligence technology, deep learning has been applied to automatic modulation classification (AMC) and achieved very good results. In this paper, we introduced an improved deep neural architecture for implementing radio signal identification tasks, which is an important facet of constructing the spectrum-sensing capability required by software-defined radio. The architecture of the proposed network is based on the Inception-ResNet network by changing the several kernel sizes and the repeated times of modules to adapt to modulation classification. The modules in the proposed architecture are repeated more times to increase the depth of neural network and the model’s ability to learn features. The modules in the proposed network combine the advantages of Inception network and ResNet, which have faster convergence rate and larger receptive field. The proposed network is proved to have excellent performance for modulation classification through the experiment in this paper. The experiment shows that the classification accuracy of the proposed method is highest with the varying SNR among the six methods and it peaks at 93.76% when the SNR is 14 dB, which is 6 percent higher than that of LSTM and 13 percent higher than that of MentorNet, Inception, and ResNet purely. Besides, the average accuracy from 0 to 18 dB of the proposed method is 3 percent higher than that of GAN network. It will provide a new idea for modulation classification aiming at distraction time signal.
- Published
- 2020
57. Application of BOPPPS Model in the Course of Embedded System Design
- Author
-
Xiaojun Guo, Chunwu Liu, Shaojing Su, and Zhiping Huang
- Subjects
Computer science ,business.industry ,Embedded system design ,Software engineering ,business ,Course (navigation) - Published
- 2018
58. Exploration and Practice in Innovative Training of Part-Time Engineering Master in Instrument and Meter Engineering
- Author
-
Xiaojun Guo and Shaojing Su
- Subjects
Engineering ,business.industry ,Training (meteorology) ,Metre ,business ,Manufacturing engineering - Published
- 2018
59. Feature Fusion Methods in Deep-Learning Generic Object Detection: A Survey
- Author
-
Deng, Jiang, primary, Bei, Sun, additional, Shaojing, Su, additional, and Zhen, Zuo, additional
- Published
- 2020
- Full Text
- View/download PDF
60. Gender Recognition via Fused CNN of Separated GEI
- Author
-
Deng, Jiang, primary, Bei, Sun, additional, Shaojing, Su, additional, Xiaopeng, Tan, additional, and Zhen, Zuo, additional
- Published
- 2020
- Full Text
- View/download PDF
61. An improved CMA for dispersion compensation in 100 Gbps DP-QPSK optical signal transmission system
- Author
-
Chunwu Liu, Yimeng Zhang, Jiangyi Qin, Zhiping Huang, and Shaojing Su
- Subjects
Mean squared error ,business.industry ,Computer science ,Optical communication ,02 engineering and technology ,Polarization (waves) ,01 natural sciences ,Multiplexing ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,010309 optics ,020210 optoelectronics & photonics ,Optics ,Rate of convergence ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Electrical and Electronic Engineering ,business ,Dispersion compensation ,Phase-shift keying - Abstract
An improved constant modulus algorithm (CMA) for dispersion compensation in 100 Gbps Dual Polarization-Quadrature Phase Shift Keying (DP-QPSK) optical signal transmission system is proposed to achieve better reliability receiving performances. In the receiver, we combine variable step size and Mean-Square Error (MSE) to improve the conventional CMA. Compared to conventional CMA, the proposed algorithm has a better performance in adapting the time varying channel and the strong noise. Meanwhile, the proposed algorithm has a faster convergence rate than the previous one. Simulation results show that the improved CMA can achieve the dispersion and polarization demultiplexing of 100 Gbps DP-QPSK optical signal transmission system efficiently.
- Published
- 2017
62. Simulation model validation of autonomous unmanned vehicle based on gray box identification and bayesian statistics
- Author
-
Shaojing Su, Xiaojun Guo, and Zhen Zuo
- Subjects
Bayesian statistics ,Gray box testing ,Identification (information) ,Sample size determination ,Computer science ,Control system ,Credibility ,Simulation modeling ,Data mining ,Underwater ,computer.software_genre ,computer - Abstract
Autonomous underwater vehicles (AUV) play an important role in human activities. They are different from of the vehicles other areas (such as air, ground). Movement, communication, target detection all involve complex hydrology and climatic condition. For special application fields it's even more complex. Due to the limitation of experimental conditions, simulation tests are adopted to assist with the increase in the sample size. The credibility of the simulation models need to be evaluated, especially for dynamic models such as control systems. This paper studies the application of several dynamic model validation methods, such as gray-Box identification and Bayesian statistics, in the AUV motion simulation model. And comparison of the methods above and some other validation methods is given, which validates the performance of the proposed methods.
- Published
- 2019
63. A Policy for Optimizing Sub-Band Selection Sequences in Wideband Spectrum Sensing
- Author
-
Shaojing Su, Yangyi Chen, and Junyu Wei
- Subjects
Computer science ,non-stationary multi-armed bandit ,02 engineering and technology ,lcsh:Chemical technology ,Biochemistry ,Article ,Analytical Chemistry ,Set (abstract data type) ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Wireless ,lcsh:TP1-1185 ,Electrical and Electronic Engineering ,Wideband ,Instrumentation ,Selection (genetic algorithm) ,Sequence ,Signal processing ,business.industry ,020206 networking & telecommunications ,Atomic and Molecular Physics, and Optics ,Cognitive radio ,020201 artificial intelligence & image processing ,sub-band selection ,business ,wideband spectrum sensing - Abstract
With the development of wireless communication technology, cognitive radio needs to solve the spectrum sensing problem of wideband wireless signals. Due to performance limitation of electronic components, it is difficult to complete spectrum sensing of wideband wireless signals at once. Therefore, it is required that the wideband wireless signal has to be split into a set of sub-bands before the further signal processing. However, the sequence of sub-band perception has become one of the important factors, which deeply-impact wideband spectrum sensing performance. In this paper, we develop a novel approach for sub-band selection through the non-stationary multi-arm bandit (NS-MAB) model. This approach is based on a well-known order optimal policy for NS-MAB mode called discounted upper confidence bound (D-UCB) policy. In this paper, according to different application requirements, various discount functions and exploration bonuses of D-UCB are designed, which are taken as the parameters of the policy proposed in this paper. Our simulation result demonstrates that the proposed policy can provide lower cumulative regret than other existing state-of-the-art policies for sub-band selection of wideband spectrum sensing.
- Published
- 2019
64. Time Difference of Arrival (TDoA) Localization Combining Weighted Least Squares and Firefly Algorithm
- Author
-
Xudong Wen, Peng Wu, Xiaojun Guo, Shaojing Su, Zhen Zuo, and Bei Sun
- Subjects
Mean squared error ,Computation ,Distance error ,firefly algorithm ,020206 networking & telecommunications ,02 engineering and technology ,Multilateration ,lcsh:Chemical technology ,hybrid-FA ,Biochemistry ,Atomic and Molecular Physics, and Optics ,Article ,Analytical Chemistry ,TDoA ,Position (vector) ,Genetic algorithm ,0202 electrical engineering, electronic engineering, information engineering ,weighted least squares ,020201 artificial intelligence & image processing ,Firefly algorithm ,lcsh:TP1-1185 ,Electrical and Electronic Engineering ,Instrumentation ,Algorithm ,Mathematics - Abstract
Time difference of arrival (TDoA) based on a group of sensor nodes with known locations has been widely used to locate targets. Two-step weighted least squares (TSWLS), constrained weighted least squares (CWLS), and Newton&ndash, Raphson (NR) iteration are commonly used passive location methods, among which the initial position is needed and the complexity is high. This paper proposes a hybrid firefly algorithm (hybrid-FA) method, combining the weighted least squares (WLS) algorithm and FA, which can reduce computation as well as achieve high accuracy. The WLS algorithm is performed first, the result of which is used to restrict the search region for the FA method. Simulations showed that the hybrid-FA method required far fewer iterations than the FA method alone to achieve the same accuracy. Additionally, two experiments were conducted to compare the results of hybrid-FA with other methods. The findings indicated that the root-mean-square error (RMSE) and mean distance error of the hybrid-FA method were lower than that of the NR, TSWLS, and genetic algorithm (GA). On the whole, the hybrid-FA outperformed the NR, TSWLS, and GA for TDoA measurement.
- Published
- 2019
65. Optimized Non-Cooperative Spectrum Sensing Algorithm in Cognitive Wireless Sensor Networks
- Author
-
Liyin Zhang, Shaojing Su, Junyu Wei, Zhen Zuo, Yangyi Chen, Xiaojun Guo, and Huiwen Yin
- Subjects
Cognitive wireless sensor networks ,Computer science ,singular spectrum entropy ,02 engineering and technology ,multi-resolution analysis ,lcsh:Chemical technology ,Biochemistry ,Article ,Analytical Chemistry ,cognitive wireless sensor networks ,Narrowband ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science::Networking and Internet Architecture ,Wireless ,Entropy (information theory) ,lcsh:TP1-1185 ,Electrical and Electronic Engineering ,Spectrum sharing ,Instrumentation ,business.industry ,spectrum sensing ,Detector ,020302 automobile design & engineering ,020206 networking & telecommunications ,Atomic and Molecular Physics, and Optics ,business ,Algorithm ,Wireless sensor network - Abstract
The cognitive wireless sensor network (CWSN) is an important development direction of wireless sensor networks (WSNs), and spectrum sensing technology is an essential prerequisite for CWSN to achieve spectrum sharing. However, the existing non-cooperative narrowband spectrum sensing technology has difficulty meeting the application requirements of CWSN at present. In this paper, we present a non-cooperative spectrum sensing algorithm for CWSN, which combines the multi-resolution technique, phase space reconstruction method, and singular spectrum entropy method to sense the spectrum of narrowband wireless signals. Simulation results validate that this algorithm can greatly improve the detection probability at a low signal-to-noise ratio (SNR) (from &minus, 19dB to &minus, 12dB), and the detector can quickly achieve the best detection performance as the SNR increases. This algorithm could promote the development of CWSN and the application of WSNs.
- Published
- 2019
66. Wireless Sensor Networks Intrusion Detection Based on SMOTE and the Random Forest Algorithm
- Author
-
Xiaopeng Tan, Shaojing Su, Xiaojun Guo, Longqing Li, Zhen Zuo, Xiaoyong Sun, and Zhiping Huang
- Subjects
Computer science ,intrusion detection ,020206 networking & telecommunications ,02 engineering and technology ,Intrusion detection system ,computer.software_genre ,Biochemistry ,Atomic and Molecular Physics, and Optics ,Article ,Analytical Chemistry ,Random forest ,Intrusion ,class imbalance ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Data mining ,Electrical and Electronic Engineering ,wireless sensor networks ,Instrumentation ,Classifier (UML) ,Wireless sensor network ,computer ,SMOTE ,random forest - Abstract
With the wide application of wireless sensor networks in military and environmental monitoring, security issues have become increasingly prominent. Data exchanged over wireless sensor networks is vulnerable to malicious attacks due to the lack of physical defense equipment. Therefore, corresponding schemes of intrusion detection are urgently needed to defend against such attacks. Considering the serious class imbalance of the intrusion dataset, this paper proposes a method of using the synthetic minority oversampling technique (SMOTE) to balance the dataset and then uses the random forest algorithm to train the classifier for intrusion detection. The simulations are conducted on a benchmark intrusion dataset, and the accuracy of the random forest algorithm has reached 92.39%, which is higher than other comparison algorithms. After oversampling the minority samples, the accuracy of the random forest combined with the SMOTE has increased to 92.57%. This shows that the proposed algorithm provides an effective solution to solve the problem of class imbalance and improves the performance of intrusion detection.
- Published
- 2018
67. ASCU-Net: Attention Gate, Spatial and Channel Attention U-Net for Skin Lesion Segmentation
- Author
-
Bei Sun, Xiaozhong Tong, Shaojing Su, Junyu Wei, Peng Wu, and Zhen Zuo
- Subjects
Spatial correlation ,Channel (digital image) ,Computer science ,Clinical Biochemistry ,skin lesion segmentation ,U-Net ,attention mechanism ,deep convolutional neural networks ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,02 engineering and technology ,Article ,030218 nuclear medicine & medical imaging ,03 medical and health sciences ,0302 clinical medicine ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,Segmentation ,lcsh:R5-920 ,business.industry ,Deep learning ,Pattern recognition ,Image segmentation ,020201 artificial intelligence & image processing ,Noise (video) ,Artificial intelligence ,lcsh:Medicine (General) ,business ,Decoding methods - Abstract
Segmentation of skin lesions is a challenging task because of the wide range of skin lesion shapes, sizes, colors, and texture types. In the past few years, deep learning networks such as U-Net have been successfully applied to medical image segmentation and exhibited faster and more accurate performance. In this paper, we propose an extended version of U-Net for the segmentation of skin lesions using the concept of the triple attention mechanism. We first selected regions using attention coefficients computed by the attention gate and contextual information. Second, a dual attention decoding module consisting of spatial attention and channel attention was used to capture the spatial correlation between features and improve segmentation performance. The combination of the three attentional mechanisms helped the network to focus on a more relevant field of view of the target. The proposed model was evaluated using three datasets, ISIC-2016, ISIC-2017, and PH2. The experimental results demonstrated the effectiveness of our method with strong robustness to the presence of irregular borders, lesion and skin smooth transitions, noise, and artifacts.
- Published
- 2021
68. Efficient compression algorithm for ternary content addressable memory‐based regular expression matching
- Author
-
Mingyan Xiao, Zhiping Huang, Desheng Liu, Shaojing Su, and Liu Shu
- Subjects
Hardware_MEMORYSTRUCTURES ,Matching (graph theory) ,business.industry ,Computer science ,Data compression ratio ,Deep packet inspection ,Parallel computing ,Content-addressable memory ,Compression (functional analysis) ,Content-addressable storage ,Regular expression ,Electrical and Electronic Engineering ,business ,Computer hardware ,Data compression - Abstract
Deep packet inspection in modern networking and security devices use ternary content addressable memory (TCAM) to match regular expressions. TCAM has its advantage in search speed but disadvantages in limited storage and high power consumption. The hierarchical encoding algorithm to save TCAM space is proposed and the codes divided into four layers. The proposal and the results are tested showing that the new algorithm has higher compression efficiency and the compression rate can reach 95–99%.
- Published
- 2017
69. Research of Security Routing Protocol for UAV Communication Network Based on AODV
- Author
-
Xiaojun Guo, Xiaopeng Tan, Zhen Zuo, Xiaoyong Sun, and Shaojing Su
- Subjects
Routing protocol ,Computer Networks and Communications ,Computer science ,lcsh:TK7800-8360 ,Throughput ,security ,02 engineering and technology ,routing protocol ,Ad hoc On-Demand Distance Vector Routing ,0202 electrical engineering, electronic engineering, information engineering ,performance analysis ,Electrical and Electronic Engineering ,business.industry ,Network packet ,Node (networking) ,lcsh:Electronics ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,Telecommunications network ,Distance-vector routing protocol ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,020201 artificial intelligence & image processing ,UAV communication network ,business ,Computer network - Abstract
With the rapid development of information technology and the increasing application of UAV in various fields, the security problems of unmanned aerial vehicle (UAV) communication network have become increasingly prominent. It has become an important scientific challenge to design a routing protocol that can provide efficient and reliable node to node packet transmission. In this paper, an efficient Digital Signature algorithm based on the elliptic curve cryptosystem is applied to routing protocol, and an improved security method suitable for on-demand routing protocol is proposed. The UAV communication network was simulated through the NS2 simulation platform, and the execution efficiency and safety of the improved routing protocol were analyzed. In the simulation experiment, the routing protocols of ad-hoc on demand distance vector (AODV), security ad-hoc on demand distance vector (SAODV), and improved security ad-hoc on demand distance vector (ISAODV) are compared in terms of the performance indicators of packet delivery rate, throughput, and end-to-end delay under normal conditions and when attacked by malicious nodes. The simulation results show that the improved routing protocol can effectively improve the security of the UAV communication network.
- Published
- 2020
70. Intrusion Detection of UAVs Based on the Deep Belief Network Optimized by PSO
- Author
-
Zhen Zuo, Xiaoyong Sun, Xiaojun Guo, Shaojing Su, and Xiaopeng Tan
- Subjects
Computer science ,Network security ,intrusion detection ,02 engineering and technology ,Intrusion detection system ,computer.software_genre ,Biochemistry ,Article ,Analytical Chemistry ,Deep belief network ,Genetic algorithm ,0202 electrical engineering, electronic engineering, information engineering ,parameter optimization ,AdaBoost ,Electrical and Electronic Engineering ,Instrumentation ,deep belief network ,Artificial neural network ,business.industry ,PSO ,Particle swarm optimization ,020206 networking & telecommunications ,Atomic and Molecular Physics, and Optics ,Support vector machine ,ComputingMethodologies_PATTERNRECOGNITION ,Simulated annealing ,020201 artificial intelligence & image processing ,Data mining ,business ,computer - Abstract
With the rapid development of information technology, the problem of the network security of unmanned aerial vehicles (UAVs) has become increasingly prominent. In order to solve the intrusion detection problem of massive, high-dimensional, and nonlinear data, this paper proposes an intrusion detection method based on the deep belief network (DBN) optimized by particle swarm optimization (PSO). First, a classification model based on the DBN is constructed, and the PSO algorithm is then used to optimize the number of hidden layer nodes of the DBN, to obtain the optimal DBN structure. The simulations are conducted on a benchmark intrusion dataset, and the results show that the accuracy of the DBN-PSO algorithm reaches 92.44%, which is higher than those of the support vector machine (SVM), artificial neural network (ANN), deep neural network (DNN), and Adaboost. It can be seen from comparative experiments that the optimization effect of PSO is better than those of the genetic algorithm, simulated annealing algorithm, and Bayesian optimization algorithm. The method of PSO-DBN provides an effective solution to the problem of intrusion detection of UAV networks.
- Published
- 2019
71. Simulation-based analysis of bounding box localization algorithm for wireless sensor network
- Author
-
Shaojing Su, Xiaojun Guo, and Peng Wu
- Subjects
Minimum bounding box ,Computer science ,Real-time computing ,Simulation based ,Wireless sensor network - Published
- 2018
72. Gender Recognition via Fused Silhouette Features Based on Visual Sensors
- Author
-
Bei, Sun, primary, Deng, Jiang, additional, Zhen, Zuo, additional, and Shaojing, Su, additional
- Published
- 2019
- Full Text
- View/download PDF
73. Chromatic Dispersion Estimation for Optical PDM-QPSK Communication System without Symbol Rate Limitation
- Author
-
Jing Zhou, Huang Zhiping, Shaojing Su, Junyu Wei, and Yimeng Zhang
- Subjects
Computer science ,Electronic engineering ,Communications system ,Symbol rate ,Phase-shift keying - Published
- 2017
74. Design and Implementation of Non - base Station Multi - level Communication Network Based on Link16
- Author
-
Shaojing Su and Junhao Ouyang
- Subjects
Base station ,business.industry ,Computer science ,Base station identity code ,business ,Telecommunications network ,Computer network - Published
- 2017
75. A secure transmission scheme on link level for optical fiber communication systems
- Author
-
Jing Zhou, Yimeng Zhang, Shaojing Su, Zhen Zuo, and Zhiping Huang
- Subjects
Password ,Computer science ,business.industry ,Network packet ,Cryptography ,Frame synchronization ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,law.invention ,Secure communication ,law ,Military communications ,Link level ,Electrical and Electronic Engineering ,Cryptanalysis ,business ,Secure transmission ,Computer network - Abstract
In secure communication systems, a very important problem is how to prevent wiretapping. Lots of researches on cryptography give good solutions on secure communications. But if a wire tapper can detect the existence of the transmitted information and get enough eavesdropped frames, cryptanalysis techniques can help to blindly recover the frame structures, error-control coding parameters and passwords. In this paper we propose a novel secure transmission scheme on the link level for optical fiber communication systems. Based on the blind frame synchronization technique, we propose to drop the traditionally strict frame structures in fiber communications and conceal the error-correcting-encoded blocks among random data, so that wire tappers cannot get enough coded packets to analyze and recover the transmitted information. Therefore, the proposed method is very suitable for secure communications and military communications.
- Published
- 2014
76. IP Over SONET/SDH Link-Layer Processing with Multiprocessor
- Author
-
Jiangyi Qin, Shaojing Su, Desheng Liu, Zhen Zuo, and Zhiping Huang
- Subjects
Computer science ,business.industry ,Synchronous optical networking ,Fiber (computer science) ,Multiprocessing ,Internet traffic ,Artificial Intelligence ,Link layer ,Computer Vision and Pattern Recognition ,Artificial intelligence ,business ,Field-programmable gate array ,Software ,Computer network - Abstract
With the recent increase in IP traffic owing to fiber communication, previous schemes have become inadequate for link-layer processing of IP over SONET/SDH(POS). In this study, a proposal based on [Formula: see text] processors to provide mapping or demapping of IP datagrams from or into SONET/SDH is presented, and the value of [Formula: see text] is decided based on the link layer rate of POS. Further, the mathematic model of proposed architecture are presented in detail. Then the realization procedures are implemented in a Field-Programmable Gate Array (FPGA). Both theoretical analysis and experimental test prove that the proposed scheme is efficient, portable, cost-efficient and has a lower hardware resources consumption.
- Published
- 2019
77. A First-Order Differential Data Processing Method for Accuracy Improvement of Complementary Filtering in Micro-UAV Attitude Estimation
- Author
-
Zhiping Huang, Xiaojun Guo, Shaojing Su, Xudong Wen, Chunwu Liu, Hao Qu, and Zhen Zuo
- Subjects
0209 industrial biotechnology ,Inertial frame of reference ,Mean squared error ,Computer science ,02 engineering and technology ,lcsh:Chemical technology ,Biochemistry ,Article ,Analytical Chemistry ,law.invention ,symbols.namesake ,020901 industrial engineering & automation ,law ,0202 electrical engineering, electronic engineering, information engineering ,lcsh:TP1-1185 ,Electrical and Electronic Engineering ,Instrumentation ,sensor fusion ,Data processing ,020208 electrical & electronic engineering ,Gyroscope ,Filter (signal processing) ,Sensor fusion ,attitude estimation ,micro-UAV ,Atomic and Molecular Physics, and Optics ,Euler angles ,Nonlinear system ,nonlinear complementary filtering (NCF) ,symbols ,Algorithm ,data processing - Abstract
There are many algorithms that can be used to fuse sensor data. The complementary filtering algorithm has low computational complexity and good real-time performance characteristics. It is very suitable for attitude estimation of small unmanned aerial vehicles (micro-UAVs) equipped with low-cost inertial measurement units (IMUs). However, its low attitude estimation accuracy severely limits its applications. Though, many methods have been proposed by researchers to improve attitude estimation accuracy of complementary filtering algorithms, there are few studies that aim to improve it from the data processing aspect. In this paper, a real-time first-order differential data processing algorithm is proposed for gyroscope data, and an adaptive adjustment strategy is designed for the parameters in the algorithm. Besides, the differential-nonlinear complementary filtering (D-NCF) algorithm is proposed by combine the first-order differential data processing algorithm with the basic nonlinear complementary filtering (NCF) algorithm. The experimental results show that the first-order differential data processing algorithm can effectively correct the gyroscope data, and the Root Mean Square Error (RMSE) of attitude estimation of the D-NCF algorithm is smaller than when the NCF algorithm is used. The RMSE of the roll angle decreases from 1.1653 to 0.5093, that of the pitch angle decreases from 2.9638 to 1.5542, and that of the yaw angle decreases from 0.9398 to 0.6827. In general, the attitude estimation accuracy of D-NCF algorithm is higher than that of the NCF algorithm.
- Published
- 2019
78. Breaking Chaotic Direct Sequence Spreading Spectrum Signals Under the Multipath Fading Channel
- Author
-
Ting Li, Zhiping Huang, Shaojing Su, Chunwu Liu, Zhen Zuo, and Dexin Zhao
- Subjects
Applied Mathematics ,Transmitter ,Chaotic ,Binary number ,Signal ,Nonlinear Sciences::Chaotic Dynamics ,Signal Processing ,Electronic engineering ,Initial value problem ,Particle filter ,Algorithm ,Multipath propagation ,Computer Science::Information Theory ,Communication channel ,Mathematics - Abstract
In order to break chaotic direct sequence spreading spectrum (CD3S) signals under the multipath fading channel, a particle filter based algorithm combining blind channel equalization with chaos fitting is proposed. To implement this algorithm, the intruder substitutes a different chaotic equation into the state-space equations of the channel and the chaos fitting, and then multiple particle filters are used for blind channel equalization and chaos fitting simultaneously by implementing them in reciprocal interaction. As a result, the impact brought about by the multipath fading channel and additive noises can be overcome. Furthermore, the range-differentiating factor is used to make the inevitable chaos fitting error advantageous based on the chaos fitting method. Thus, the CD3S signals can be broken according to the range of the estimated message. Simulations show that the binary message signal can be extracted from the CD3S signals without any knowledge of the chaotic transmitter’s structure, parameters, initial value, or the channel characteristics.
- Published
- 2013
79. Matched-field Source Localization with a Mobile Short Horizontal Linear Array in Offshore Shallow Water
- Author
-
Zhiping Huang, Shaojing Su, Ting Li, and Dexin Zhao
- Subjects
Waves and shallow water ,Test case ,Acoustics and Ultrasonics ,Sampling (signal processing) ,Position (vector) ,Computer science ,Acoustics ,Process (computing) ,Underwater ,Signal ,Stability (probability) ,Simulation - Abstract
Passive source localization in shallow water has always been an important and challenging problem. Implementing scientific research, surveying, and monitoring using a short, less than ten meter long, horizontal linear array has received considerable attention in the recent years. The short array can be conveniently placed on autonomous underwater vehicles and deployed for adaptive spatial sampling. However, it is usually difficult to obtain a sufficient spatial gain for localizing long-range sources due to its limited physical size. To address this problem, a localization approach is proposed which is based on matched-field processing of the likelihood of the passive source localization in shallow water, as well as inter-position processing for the improved localization performance and the enhanced stability of the estimation process. The ability of the proposed approach is examined through the two-dimensional synthetic test cases which involves ocean environmental mismatch and position errors of the short array. The presented results illustrate the localization performance for various source locations at different signal- to-noise ratios and demonstrate the build up over time of the positional parameters of the estimated source as the short array moves at a low speed along a straight line at a certain depth.
- Published
- 2013
80. Efficient Deterministic Finite Automata Minimization Based on Backward Depth Information
- Author
-
Yimeng Zhang, Shaojing Su, Zhiping Huang, Xiaojun Guo, and Desheng Liu
- Subjects
Computer and Information Sciences ,Computer science ,Imaging Techniques ,Finite Element Analysis ,Information Theory ,lcsh:Medicine ,Social Sciences ,0102 computer and information sciences ,02 engineering and technology ,Image Analysis ,Information theory ,Research and Analysis Methods ,01 natural sciences ,Topology ,Set (abstract data type) ,Automation ,DFA minimization ,0202 electrical engineering, electronic engineering, information engineering ,Speech ,lcsh:Science ,Time complexity ,Topological complexity ,Grammar ,Multidisciplinary ,Directed Graphs ,Applied Mathematics ,Simulation and Modeling ,lcsh:R ,Computational Biology ,Linguistics ,Directed graph ,Hash table ,Automaton ,Deterministic finite automaton ,010201 computation theory & mathematics ,Partition refinement ,Graph Theory ,Physical Sciences ,Engineering and Technology ,020201 artificial intelligence & image processing ,lcsh:Q ,Algorithm ,Computer Science::Formal Languages and Automata Theory ,Algorithms ,Mathematics ,Research Article - Abstract
Obtaining a minimal automaton is a fundamental issue in the theory and practical implementation of deterministic finite automatons (DFAs). A minimization algorithm is presented in this paper that consists of two main phases. In the first phase, the backward depth information is built, and the state set of the DFA is partitioned into many blocks. In the second phase, the state set is refined using a hash table. The minimization algorithm has a lower time complexity O(n) than a naive comparison of transitions O(n2). Few states need to be refined by the hash table, because most states have been partitioned by the backward depth information in the coarse partition. This method achieves greater generality than previous methods because building the backward depth information is independent of the topological complexity of the DFA. The proposed algorithm can be applied not only to the minimization of acyclic automata or simple cyclic automata, but also to automata with high topological complexity. Overall, the proposal has three advantages: lower time complexity, greater generality, and scalability. A comparison to Hopcroft’s algorithm demonstrates experimentally that the algorithm runs faster than traditional algorithms.
- Published
- 2016
81. Sample capacity for autonomous underwater vehicle range accreditation
- Author
-
Zhiping Huang, Shaojing Su, Yimeng Zhang, Chunwu Liu, and Xiaojun Guo
- Subjects
Computer science ,020208 electrical & electronic engineering ,Bayesian probability ,Sample (statistics) ,02 engineering and technology ,01 natural sciences ,Test (assessment) ,010104 statistics & probability ,Prior probability ,0202 electrical engineering, electronic engineering, information engineering ,Range (statistics) ,0101 mathematics ,Algorithm ,Bootstrapping (statistics) ,Simulation ,Statistical hypothesis testing ,Accreditation - Abstract
In this paper we are interested in the hypothesis test (HT) solution in the presence of prior information and conjugated prior distribution. Truncated Bayesian sequential posterior odd test (SPOT) is introduced to predict the required test sample size in autonomous underwater vehicle (AUV) range accreditation. We focus on the connection between risks (type I and type II) and truncated threshold, required test sample size. And the computational approach based on numerical approaching is given in steps. Supported by prior information after fusion on credibility, we deeply analyzed the effect of risk base value on SPOT performance, and an array of random bootstrapping data is generated to validate the conclusion. A mature solution to small-size-sample test accreditation is proposed in this paper, which provides vital suggestions for test sample size prediction in small-size-sample parameter hypothesis test.
- Published
- 2016
82. Validation of Dynamic Simulation Models on Uncertainty
- Author
-
Shaojing Su and Xiaojun Guo
- Subjects
Dynamic simulation ,Computer science ,Credibility ,Simulation - Published
- 2016
83. Using Multidimensional ADTPE and SVM for Optical Modulation Real-Time Recognition
- Author
-
Zhi-Ping Huang, Jun-Yu Wei, Zhen Zuo, and Shaojing Su
- Subjects
Computer science ,Speech recognition ,SVM ,Feature extraction ,General Physics and Astronomy ,lcsh:Astrophysics ,02 engineering and technology ,Multiclass classification ,Optical Transport Network ,lcsh:QB460-466 ,0202 electrical engineering, electronic engineering, information engineering ,Entropy (information theory) ,lcsh:Science ,Digital signal processing ,optical modulation recognition ,real time ,business.industry ,multidimensional ADTPE ,Response time ,020206 networking & telecommunications ,Pattern recognition ,lcsh:QC1-999 ,Support vector machine ,Asynchronous communication ,020201 artificial intelligence & image processing ,lcsh:Q ,Artificial intelligence ,business ,lcsh:Physics - Abstract
Based on the feature extraction of multidimensional asynchronous delay-tap plot entropy (ADTPE) and multiclass classification of support vector machine (SVM), we propose a method for recognition of multiple optical modulation formats and various data rates. We firstly present the algorithm of multidimensional ADTPE, which is extracted from asynchronous delay sampling pairs of modulated optical signal. Then, a multiclass SVM is utilized for fast and accurate classification of several widely-used optical modulation formats. In addition, a simple real-time recognition scheme is designed to reduce the computation time. Compared to the existing method based on asynchronous delay-tap plot (ADTP), the theoretical analysis and simulation results show that our recognition method can effectively enhance the tolerance of transmission impairments, obtaining relatively high accuracy. Finally, it is further demonstrated that the proposed method can be integrated in an optical transport network (OTN) with flexible expansion. Through simply adding the corresponding sub-SVM module in the digital signal processer (DSP), arbitrary new modulation formats can be recognized with high recognition accuracy in a short response time.
- Published
- 2016
84. AR model whitening and signal detection based on GLD algorithm in the non-Gaussian reverberation
- Author
-
Shaojing Su, Ye Liu, Chunwu Liu, and Zhiping Huang
- Subjects
symbols.namesake ,Reverberation ,Alpha (programming language) ,Distribution (mathematics) ,Acoustics and Ultrasonics ,Autoregressive model ,Computer science ,Gaussian ,Monte Carlo method ,symbols ,Detection theory ,Algorithm ,Stable distribution - Abstract
The paper analyzes the characteristics of shallow sea reverberation such as divergent variance and heavy tails in probability density distribution and matches it to symmetric alpha stable (SαS) distribution. After analyzing the AR model whitening method based on Gaussian distribution and Levinson–Durbin algorithm, the paper proposes and derives the generalized Levinson–Durbin (GLD) algorithm based on covariation theory of alpha stable distribution. The GLD algorithm can estimate the order and parameters of AR SαS model by iterations which are fast and effective in calculating, and then the performance tests by simulations are given. The AR model whitening method using GLD algorithm has a faster speed and a better detection performance than AR Gaussian whitening method in impulsive reverberation. At last the Monte Carlo simulating tests are used to validate the validity of the new method.
- Published
- 2012
85. Design and achievement of an efficient low-order pointer multiplexing and mapping scheme
- Author
-
Shaojing Su, Yimeng Zhang, Yangyi Chen, Zhen Zuo, and Zhiping Huang
- Subjects
Backbone network ,business.industry ,Time-division multiplexing ,Computer science ,Network communication ,Distributed computing ,Pointer (computer programming) ,Lower order ,Statistical time division multiplexing ,business ,Multiplexing ,Networking hardware ,Computer network - Abstract
With the improvement of people’s living standard, the requirement of network is higher and higher. The rate and capacity of network communication are rising all the time, it ’s outstanding on the backbone networks. The rate of backbone network had improved from 10G to 100G in recent years. This change also put forward new requirement for optical network equipment . The key technologies of lower order cross-connect equipment is discussing in this passage. This passage mainly discusses the following aspects: time division multiplexing of STM-1 lower-order pointer interpretation and lower -order pointer generation. By using the technologies discussed in this passage, the lower -order cross-connect devices has the higher cross-connect capacity under consuming the same logic resource, and the equipment will meet the requirement of the backbone network transmission capacity.
- Published
- 2015
86. The effects and inhibition of frequency offset on differential phase-shift keying detection
- Author
-
Shaojing Su, Zhongming Pan, Hao Guo, and Jing Zhou
- Subjects
Signal-to-noise ratio ,Duty cycle ,Modulation ,Computer science ,Control theory ,Electronic engineering ,Frequency offset ,Keying ,Interference (wave propagation) ,Differential phase ,Phase-shift keying - Abstract
Differential phase-shift keying (DPSK) has been widely implemented and developed in high-speed optical communication systems. The low error rate detection at high access rate is one of the considerable issues in practical engineering application. Balanced detection based on fiber Mach-Zehnder delay interferometer (MZDI) is the typical optical DPSK signal detecting method. It requires that the free spectrum range (FSR) of the MZDI equals the reciprocal of symbol period of the DPSK signal. For the reasons of ambient temperature variation and nonlinear phase noise, a dynamic frequency offset always exists between the FSR and the reciprocal of symbol period. That may introduce some optical signal-to-noise ratio (OSNR) costs and fault detections. Therefore, it is significant to inhibit the frequency offset on DPSK detection. In this paper, firstly, we discuss the effects of frequency offset on DPSK detection, and realize the conclusion that frequency offset is virtually equivalent to an additional phase difference between adjacent symbols. Secondly, through simulation, we analyze the feasibility of DPSK detection in the presence of a definite range of frequency offset, and present the quantitative computation of effective coverage, duty cycle, and optimal sampling time of symbol interference. Some issues which should be considered in practical implementation are also discussed. Finally, according to the relationship among phase difference, temperature and voltage, we propose a phase difference compensation scheme which can automatically adjust the voltage for optimal detections, and dynamically track the changing of ambient temperature and nonlinear phase noise. Furthermore, we ascertain the performance of the voltage requested for implementing the scheme. The scheme can be also developed to quadrature phase-shift keying (QPSK) and differential QPSK (DQPSK) modulation situations.
- Published
- 2015
87. Design and realization of a test system for 50Gbit/s optical transmission
- Author
-
Shaojing Su and Shu Liu
- Subjects
Software ,Gigabit ,Modulation ,Computer science ,business.industry ,Optical communication ,Electronic engineering ,Software development ,Software design ,Field-programmable gate array ,business ,Phase-shift keying - Abstract
There are varies modulation formats such as ASK, OOK, BPSK, QPSK, DP-QPSK. The DP-QPSK modulation format appears as the best performing 50 Gbit/s modulation format solution with higher transmission efficiency and stronger anti-interference ability. Therefore, this topic has great significance for the study of a test system of DP-QPSK optical transmission. There is hardware and software design of the test system. Hardware design is the basis and prerequisite for the design of the test system, requiring further understanding of the composition of the test system. The software which completes the work of data processing is a crucial part of the whole test system.
- Published
- 2015
88. Simulation-based analysis of Bounding Box localization algorithm for Wireless Sensor Network.
- Author
-
Peng Wu, Shaojing Su, and Xiaojun Guo
- Published
- 2018
- Full Text
- View/download PDF
89. Optimization simulation of aeromagnetic detection based on COMSOL Multiphysics.
- Author
-
Xiaoyong SUN, Shaojing SU, Xiaojun GUO, and Yangyi CHEN
- Published
- 2018
- Full Text
- View/download PDF
90. Spectrofluorimetric studies on the binding of salicylic acid to bovine serum albumin using warfarin and ibuprofen as site markers with the aid of parallel factor analysis
- Author
-
Yongnian Ni, Shaojing Su, and Serge Kokot
- Subjects
Chromatography ,Resolution (mass spectrometry) ,biology ,Warfarin ,Ibuprofen ,Biochemistry ,Fluorescence ,Analytical Chemistry ,Matrix (chemical analysis) ,chemistry.chemical_compound ,chemistry ,biology.protein ,medicine ,Environmental Chemistry ,Binding site ,Bovine serum albumin ,Spectroscopy ,Salicylic acid ,medicine.drug - Abstract
The interactions of salicylic acid (SL) and two different site markers (warfarin for site I and ibuprofen for site II) with bovine serum albumin (BSA) in pH 7.4 Tris–HCl buffer have been investigated with the use of spectrofluorimetry. An equilibrium solution of BSA and SA was titrated separately with the two markers. This initial work showed that the binding of SL with BSA could be quite complex, and that there was probably a competitive interaction occurring between ibuprofen and SL. However, the spectral results were difficult to interpret clearly for the interaction of warfarin and SL in similar circumstances. To extract more information from the resolution of fluorescence excitation-emission spectra, the contour plots of the fluorescence spectra indicated that the optimal excitation wavelengths for BSA, SL, warfarin and ibuprofen were different, and were found to be at 278, 295, 306 and 218 nm, respectively. The spectral information was arranged into three-way excitation-emission fluorescence matrix (EEM) stack arrays, and was submitted for analysis by the parallel factor analysis (PARAFAC) algorithm. Firstly, it was demonstrated that the estimated excitation and emission spectral responses for SL, BSA and the site markers, warfarin and ibuprofen, agreed well with the measured spectra. Then, the interpretation of the plots of simultaneously extracted (by PARAFAC) equilibrium concentrations for the above four reactants, showed that: (i) the SL primarily appears to bind in site I but at a different location from the high-affinity binding site (HAS) for warfarin, and the interaction partially overlaps with the low-affinity binding site (LAS) for warfarin. (ii) The SL may have two LAS—one in site II where the HAS for ibuprofen is located, and the other in site I at the LAS for ibuprofen. Thus, application of the PARAFAC method for the study of competitive interaction of SL and BSA with the aid of two different site markers has extracted information unobtainable by traditional methods such as the Scatchard plot, and provided useful means of data visualization.
- Published
- 2006
91. Design and implementation of ATCA-based 100Gbps DP-QPSK optical signal test instrument
- Author
-
Shaojing Su, Jiangyi Qin, Chenwu Liu, and Zhiping Huang
- Subjects
Data acquisition ,Computer science ,business.industry ,Gigabit Ethernet ,Computer data storage ,Bit error rate ,Electronic engineering ,Demodulation ,business ,Field-programmable gate array ,Data transmission ,Phase-shift keying - Abstract
In order to achieve the receiving task of 100Gbps Dual Polarization-Quadrature Phase Shift Keying (DP-QPSK) optical signal acquisition instrument, improve acquisition performance of the instrument, this paper has deeply researched DP-QPSK modulation principles, demodulation techniques and the key technologies of optical signal acquisition. The theories of DP-QPSK optical signal transmission are researched. The DP-QPSK optical signal transmission model is deduced. And the clock and data recovery in high-speed data acquisition and offset correction of multi-channel data are researched. By reasonable hardware circuit design and software system construction, the utilization of high performance Advanced Telecom Computing Architecture (ATCA), this paper proposes a 100Gbps DP-QPSK optical signal acquisition instrument which is based on ATCA. The implementations of key modules are presented by comparison and argumentation. According to the modularization idea, the instrument can be divided into eight modules. Each module performs the following functions. (1) DP-QPSK coherent detection demodulation module; (2) deceleration module; (3) FPGA (Field Programmable Gate Array); (4) storage module; (5) data transmission module; (6) clock module; (7) power module; (8) JTAG debugging, configuration module; What is more, this paper has put forward two solutions to test optical signal acquisition instrument performance. The first scenario is based on a standard STM-256 optical signal format and exploits the SignalTap of QuartusII software to monitor the optical signal data. Another scenario is to use a pseudo-random signal series to generate data, acquisition module acquires a certain amount of data signals, and then the signals are transferred to a computer by the Gigabit Ethernet to analyze. Two testing results show that the bit error rate of optical signal acquisition instrument is low. And the instrument fully meets the requirements of signal receiving system. At the same time this design has an important significance in practical applications.
- Published
- 2014
92. 40-Gbps optical backbone network deep packet inspection based on FPGA
- Author
-
Zhiping Huang, Yuan Zuo, and Shaojing Su
- Subjects
Data stream ,Engineering ,Backbone network ,Transmission (telecommunications) ,business.industry ,Network packet ,Payload (computing) ,Computer data storage ,Real-time computing ,Deep packet inspection ,business ,Computer hardware ,Data transmission - Abstract
In the era of information, the big data, which contains huge information, brings about some problems, such as high speed transmission, storage and real-time analysis and process. As the important media for data transmission, the Internet is the significant part for big data processing research. With the large-scale usage of the Internet, the data streaming of network is increasing rapidly. The speed level in the main fiber optic communication of the present has reached 40Gbps, even 100Gbps, therefore data on the optical backbone network shows some features of massive data. Generally, data services are provided via IP packets on the optical backbone network, which is constituted with SDH (Synchronous Digital Hierarchy). Hence this method that IP packets are directly mapped into SDH payload is named POS (Packet over SDH) technology. Aiming at the problems of real time process of high speed massive data, this paper designs a process system platform based on ATCA for 40Gbps POS signal data stream recognition and packet content capture, which employs the FPGA as the CPU. This platform offers pre-processing of clustering algorithms, service traffic identification and data mining for the following big data storage and analysis with high efficiency. Also, the operational procedure is proposed in this paper. Four channels of 10Gbps POS signal decomposed by the analysis module, which chooses FPGA as the kernel, are inputted to the flow classification module and the pattern matching component based on TCAM. Based on the properties of the length of payload and net flows, buffer management is added to the platform to keep the key flow information. According to data stream analysis, DPI (deep packet inspection) and flow balance distribute, the signal is transmitted to the backend machine through the giga Ethernet ports on back board. Practice shows that the proposed platform is superior to the traditional applications based on ASIC and NP.
- Published
- 2014
93. Blind Identification of Convolutional Encoder Parameters
- Author
-
Yimeng Zhang, Jing Zhou, Chunwu Liu, Shaojing Su, and Zhiping Huang
- Subjects
Data stream ,Article Subject ,lcsh:T ,Computer science ,Speech recognition ,lcsh:R ,lcsh:Medicine ,General Medicine ,Models, Theoretical ,Communications system ,lcsh:Technology ,General Biochemistry, Genetics and Molecular Biology ,Cognitive radio ,Adaptive coding ,Convolutional code ,lcsh:Q ,lcsh:Science ,Correlation attack ,Encoder ,Algorithms ,General Environmental Science ,Coding (social sciences) ,Research Article - Abstract
This paper gives a solution to the blind parameter identification of a convolutional encoder. The problem can be addressed in the context of the noncooperative communications or adaptive coding and modulations (ACM) for cognitive radio networks. We consider an intelligent communication receiver which can blindly recognize the coding parameters of the received data stream. The only knowledge is that the stream is encoded using binary convolutional codes, while the coding parameters are unknown. Some previous literatures have significant contributions for the recognition of convolutional encoder parameters in hard-decision situations. However, soft-decision systems are applied more and more as the improvement of signal processing techniques. In this paper we propose a method to utilize the soft information to improve the recognition performances in soft-decision communication systems. Besides, we propose a new recognition method based on correlation attack to meet low signal-to-noise ratio situations. Finally we give the simulation results to show the efficiency of the proposed methods.
- Published
- 2014
- Full Text
- View/download PDF
94. Design of the multi-channel data acquisition system based on YL-5000
- Author
-
Mingyan, Xiao, primary and Shaojing, Su, additional
- Published
- 2016
- Full Text
- View/download PDF
95. The Design and Implementation of Multi-level Communication Network without Bases Stations
- Author
-
Nan, Yin, primary, Shaojing, Su, primary, Xiaojun, Guo, primary, Shu, Liu, primary, and Junhao, Ouyang, primary
- Published
- 2016
- Full Text
- View/download PDF
96. Grey Particle Filter (GPF) for Self-Estimating Depth of Maneuvering Autonomous Underwater Vehicle (AUV)
- Author
-
Shaojing Su, Zhiping Huang, Ting Li, and Dexin Zhao
- Subjects
Engineering ,Noise ,Underwater vehicle ,Dynamic models ,Control theory ,business.industry ,Wavelet transform ,business ,Particle filter ,Degeneracy (mathematics) - Abstract
This paper presents a grey particle filter (GPF) that incorporates the grey prediction algorithm into the particle filter (PF). The GPF self-estimates the depth of maneuvering autonomous underwater vehicle (AUV) using the data measured by the depth sensor equipped in the AUV under the condition that the prior maneuvering information is unknown and the measurement noise is time-varying. The principle of the GPF is that the particles are sampled by grey prediction algorithm and the likelihood probabilities of the grey particles are calculated by wavelet transform in real time, which only uses the historical measurement without establishing prior dynamic models. Therefore, the GPF can effectively alleviate the sample degeneracy problem which is common in the multiple model particle filter (MMFP). The performance of the MMPF and GPF are both evaluated through the experimental data. The results show that GPF has the better estimation accuracy than the MMPF.
- Published
- 2013
97. An adaptive particle filter (APF) for estimating states of nonlinear system with unknown parameters
- Author
-
Zhiping Huang, Ting Li, Shaojing Su, and Dexin Zhao
- Subjects
Analysis of covariance ,Adaptive filter ,Nonlinear system ,Mathematical optimization ,Control theory ,Prior probability ,Covariance ,Logistic map ,Degeneracy (mathematics) ,Particle filter ,Mathematics - Abstract
This paper presents an adaptive particle filter (APF) for estimating the states of the nonlinear system with unknown parameters. To implement this algorithm, the process noise covariance is adjusted according to the innovation-based adaptive estimation (IAE) approach, which only takes advantage of one state model without the requirement of knowing the parameters. In addition, the Maximum-A-Posterior (MAP) method is used to estimate the parameters to improving the performance of APF. Therefore, the APF can modify the prior distribution of the particles, and then alleviate the sample degeneracy problem which is common in particle filter (PF). Numerical simulations of Logistic map are conducted to demonstrate the effectiveness of our proposed method.
- Published
- 2013
98. Design of Digital Channelizer Based on Source Number Estimation
- Author
-
Jing Zhou, Chunwu Liu, Shaojing Su, Junpeng Hu, and Zhiping Huang
- Subjects
0209 industrial biotechnology ,Engineering ,business.industry ,Value (computer science) ,020206 networking & telecommunications ,02 engineering and technology ,General Medicine ,Filter (signal processing) ,Perfect reconstruction ,Signal ,020901 industrial engineering & automation ,Intermediate frequency ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Trigonometric functions ,Electrical and Electronic Engineering ,Wideband ,business ,Energy (signal processing) - Abstract
Digital channelizer is used to separate the sub-band signals contained within a wideband intermediate frequency (IF) received signal. This paper presents a structure of digital channelizer which is built upon estimation of the sub-band signal number. The proposed structure is designed by employing nonuniform filter banks (NUFBs), which are implemented by merging the adjacent sub-branches of the perfect reconstruction (PR) cosine modulated filter banks (CMFBs). Using source number estimation algorithm, the estimated value of sub-band number can be obtained. By energy detection, the energy characteristic of the analysis filter banks (AFBs) can be acquired and another value of sub-band number is calculated. Comparing the estimated value and the calculated one, we can evaluate whether the design of the AFB is suitable for the received signal. The structure of digital channelizer proposed by this paper provides a potential way to channelize the unknown signal and suggests a solution for the dynamic channelizaiton. A design example is also presented to demonstrate the feasibility and simplicity of this method.
- Published
- 2015
99. Influence Analysis of HDLC Frame Alignment and ESC on Link Transport Efficiency of POS Signal
- Author
-
Xizai Lv, Shaojing Su, and Zhiping Huang
- Subjects
Backbone network ,High-Level Data Link Control ,Transmission (telecommunications) ,Computer science ,business.industry ,Transmission network ,Frame (networking) ,Influence analysis ,Link (knot theory) ,business ,Signal ,Computer network - Abstract
With the ever improvement of SDH backbone network at home and abroad and the exponential growth of IP services, more and more attention are paid to POS signal. POS technology not only is the most important IP transmission way of backbone network, but also will be one of the core technologies in the next generation optical transmission network. In this paper the formulas for influence of HDLC frame alignment and ESC on link transport efficiency of POS signal are educed, on the basis of deeply study of POS technology and HDLC protocol. The results of this paper can offer many references to lucubrating POS technology.
- Published
- 2010
100. Simulation of reverberation time series based on multipath propagation theory
- Author
-
Yueke Wang, Shaojing Su, and Xiye Guo
- Subjects
Reverberation ,Series (mathematics) ,Computer Science::Sound ,Computer science ,Acoustics ,Marine mammals and sonar ,Time series ,Sonar signal processing ,Sonar ,Multipath propagation - Abstract
It is necessary to simulate seafloor reverberation time series for testing and evaluation of active sonar signal-processing algorithms and active sonar system-performance models. Traditionally, for an isovelocity sound-speed profile, consider simulating only the reverberation arising from direct-path propagation from the source to a scattering patch on the seafloor and back to a receiver. Actually, the effect of multipath propagation can't be ignored. Therefore, the reverberation model based on multipath propagation theory is proposed, and a method for simulating reverberation time series is presented with the seafloor is divided into range-azimuth cell. The simulation data will be useful in the evaluation of active sonar system.
- Published
- 2009
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.