Resource Type

Journal Article 42

Year

2023 2

2022 5

2021 4

2020 3

2019 3

2018 2

2017 2

2016 2

2015 1

2013 2

2012 1

2010 1

2008 2

2007 2

2006 2

2005 2

2004 3

2003 2

2002 1

open ︾

Keywords

failure probability 3

Gaussian process 2

Secrecy outage probability 2

probability 2

Air-to-ground channel 1

Anti-jamming 1

Applicable probability matching 1

Artificial intelligence 1

Asymptotical stability in distribution 1

Autonomous driving 1

Average secrecy capacity 1

Bisimulation 1

Black-box optimization 1

Boolean network with impulses 1

Brain–machine interface 1

Buffer occupancy 1

Chebyshev polynomial 1

Cognitive radio networks 1

Complex network 1

open ︾

Search scope:

排序: Display mode:

Secrecy outage performance for wireless-powered relaying systems with nonlinear energy harvesters Article

继亮 张,高峰 潘,宜原 解

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 2,   Pages 246-252 doi: 10.1631/FITEE.1601352

Abstract: 同时,本文还推导了保密中断概率的解析表达式,并用通过仿真验证了分析结果。

Keywords: 解码转发     能量收集     非线性     保密中断概率    

Secure analysis on artificial-noise-aided simultaneous wireless information and power transfer systems

Wei-min Hou, Qing-shan Tang,cstqs001@126.com

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 11,   Pages 1535-1670 doi: 10.1631/FITEE.2000083

Abstract: In this paper, we investigate the secrecy outage performance in (SWIPT) systems taking assistance into account. Multiple antennas in the source and a single antenna in both the legitimate receiver and the eavesdropper are assumed. Specifically, the transmitted signal at the source is composed of two parts, where the first part is the information symbols and the other is the noise for the eavesdropper. To avoid making noise in the legitimate receiver, these two parts in the transmitted signals are modulated into two orthogonal dimensions according to the instantaneous channel state between the source and the legitimate receiver. We derive an approximate closed-form expression for the (SOP) by adopting the Gauss-Laguerre quadrature (GLQ) method, where the gap between the exact SOP and our approximate SOP converges with increase of the summation terms in the GLQ. To obtain the secrecy diversity order and secrecy array gain for the considered SWIPT system, the asymptotic result of the SOP is also derived. This is tight in the high signal-to-noise ratio region. A novel and robust SOP approximation is also analyzed given a small variance of the signal-to-interference-plus-noise ratio at the eavesdropper. Some selected Monte-Carlo numerical results are presented to validate the correctness of the derived closed-form expressions.

Keywords: 人工噪声;多天线系统;保密中断概率;无线携能    

Secrecy performance analysis of single-input multiple-output generalized- Article

Hong-jiang LEI,Imran Shafique ANSARI,Chao GAO,Yong-cai GUO,Gao-feng PAN,Khalid A. QARAQE

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 10,   Pages 1074-1084 doi: 10.1631/FITEE.1601070

Abstract: In this paper, the transmission of confidential messages through single-input multiple-output (SIMO) independent and identically generalized- ( G) fading channels is considered, where the eavesdropper overhears the transmission from the transmitter to the receiver. Both the receiver and the eavesdropper are equipped with multiple antennas, and both active and passive eavesdroppings are considered where the channel state information of the eavesdropper’s channel is or is not available at the transmitter. The secrecy performance of SIMO G systems is investigated. Analytical expressions for secrecy outage probability and average secrecy capacity of SIMO systems are derived via two different methods, in which G distribution is approximated by the Gamma and mixture Gamma distributions, respectively. Numerical results are presented and verified via the Monte-Carlo simulation.

Keywords: Physical-layer security     Generalized-K fading     Average secrecy capacity     Secrecy outage probability     Mixture Gamma distribution    

Forward link outage performance of aeronautical broadband satellite communications Research Articles

Huaicong Kong, Min Lin, Shiwen He, Xiaoyu Liu, Jian Ouyang, Weiping Zhu,linmin@njupt.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 6,   Pages 790-801 doi: 10.1631/FITEE.2000445

Abstract: High-throughput satellites (HTSs) play an important role in future millimeter-wave (mmWave) aeronautical communication to meet high speed and broad bandwidth requirements. This paper investigates the outage performance of an aeronautical broadband satellite communication system’s forward link, where the feeder link from the gateway to the HTS uses and the user link from the HTS to aircraft operates at the mmWave band. In the user link, spot beam technology is exploited at the HTS and a massive antenna array is deployed at the aircraft. We first present a location-based beamforming (BF) scheme to maximize the expected output signal-to-noise ratio (SNR) of the forward link with the amplify-and-forward (AF) protocol, which turns out to be a phased array. Then, by supposing that the FSO feeder link follows Gamma-Gamma fading whereas the mmWave user link experiences shadowed Rician fading, we take the influence of the into account, and derive the closed-form expression of the (OP) for the considered system. To gain further insight, a simple asymptotic OP expression at a high SNR is provided to show the diversity order and coding gain. Finally, numerical simulations are conducted to confirm the validity of the theoretical analysis and reveal the effects of s on the system outage performance.

Keywords: 航空宽带卫星网络;自由空间光传输;高通量毫米波通信;中断概率;相位误差    

A maximum reliable network interdiction model with limited resources

Zhao Jia and Yu Hua

Strategic Study of CAE 2015, Volume 17, Issue 1,   Pages 137-142

Abstract:

This paper proposes a maximum reliable network interdiction model, which is to maximize the reliability of an interdicting network with limited resources by setting sensors in arcs to prevent any flow between given two nodes in a given graph even though some sensors could be failed, i.e., given a directed graph with a source and a sink, several arcs need to be selected such that each path from the source to the sink contains as many arcs in the selected subset as possible. In any given graph, the number of paths between any given two nodes is exponential to the size of this graph, so this model is transferred to a bilevel program. We solve this bilevel integer program by finding out the relationship between the lower level integer program and its linear program relaxation, also using the duality theory because a bilevel program is intractable in common sense. Lastly, we reduce the number of the constraint to one order of the size of the graph from its exponential order. Besides, we also demonstrate an approach to resolve the bilevel program.

Keywords: interdiction model;k-reliability; duality; linear programming relaxation; complementary slackness    

Physical layer security of underlay cognitive radio using maximal ratio combining Article

Hui ZHAO,Dan-yang WANG,Chao-qing TANG,Ya-ping LIU,Gao-feng PAN,Ting-ting LI,Yun-fei CHEN

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 9,   Pages 929-937 doi: 10.1631/FITEE.1500351

Abstract: We investigate the secrecy outage performance of maximal ratio combining (MRC) in cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output wiretap system, we consider a secondary user (SU-TX) that transmits confidential messages to another secondary user (SU-RX) equipped with ( 1) antennas where the MRC technique is adopted to improve its received signal-to-noise ratio. Meanwhile, an eavesdropper equipped with ( 1) antennas adopts the MRC scheme to overhear the information between SU-TX and SU-RX. SU-TX adopts the underlay strategy to guarantee the service quality of the primary user without spectrum sensing. We derive the closed-form expressions for an exact and asymptotic secrecy outage probability.

Keywords: Cognitive radio networks     Maximal ratio combining     Secrecy outage probability     Single-input multiple-output    

Performance analysis of the stop-and-wait automatic repeat request protocol under Markovian interruptions Regular Papers-Research Articles

Dashdondov KHONGORZUL, Yong-Ki KIM, Mi-Hye KIM

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 9,   Pages 1296-1306 doi: 10.1631/FITEE.1700185

Abstract: The performance of an integrated packet voice/data multiplexer using a stop-and-wait (SW) automatic repeat request (ARQ) protocol is discussed. We assume that the input for the data traffic is exponentially distributed in increments via the Poisson process, with each data packet transmitted within an individual slot time. Another assumption is that there is only a single voice signal, which has a higher priority over the data packet, and whose traffic is given via an on-off Markov process. Whenever the voice signal is active, the output link is used and will be blocked for the data packet. We introduce the concept of buffer occupancy to simplify the analysis, and discover that data multiplexers using the SW ARQ protocol exhibit a behavior of queueing delay and buffering when the interruption signal is given via a Markov process. Simulation results verify the validity of the analytical results.

Keywords: Stop-and-wait ARQ protocol     Markovian interruptions     Poisson distribution     Buffer occupancy     Waiting time    

Collapse Probability of Building Caused by Fire

Sun Jinhua,Sun Zhanhui,Lu Shouxiang,Fan Weicheng

Strategic Study of CAE 2003, Volume 5, Issue 11,   Pages 51-55

Abstract:

With the architectonic development, steel structure is used in more and more architectures. Because of the bad fire performance of steel structure, collapse may occur. In the American 911 accidents, the fire caused by airplane crash led to collapse of WTC, mass and personnel loss is huge. Therefore researches of building collapse caused by fire are very necessary. The absence of knowledge regarding fire dynamics linked to the fact that fire can be considered a random phenomenon has led to general use of prescriptive fire regulations all over the world. This paper mainly introduces the research on collapse probability of building.

According to statistical theory and characteristics of building fire, the probability distribution functions of fire load and the fire duration time of office buildings are presented. The influencing factors to the building collapse under the condition of fire are studied. Based on the fire statistic results, fire dynamical theory and characteristics of building fire, an evaluation method of the collapse probability of building caused by fire is developed in this paper.

Keywords: building     fire     fire load     collapse probability    

Lane changing assistance strategy based on an improved probabilistic model of dynamic occupancy grids Research Articles

Zhengcai Yang, Zhenhai Gao, Fei Gao, Xinyu Wu, Lei He,gaozh@jlu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 11,   Pages 1492-1504 doi: 10.1631/FITEE.2000439

Abstract: in autonomous vehicles is a popular research topic. Scene modeling of the driving area is a prerequisite for lane changing decision problems. A road environment representation method based on a dynamic occupancy grid is proposed in this study. The model encapsulates the data such as vehicle speed, obstacles, lane lines, and traffic rules into a form of spatial drivability probability. This information is compiled into a hash table, and the grid map is mapped into a hash map by means of hash function. A vehicle behavior decision cost equation is established with the model to help drivers make accurate vehicle lane changing decisions based on the principle of least cost, while considering influencing factors such as vehicle drivability, safety, and power. The feasibility of the strategy is verified through vehicle tests, and the results show that the system based on a of dynamic can provide to drivers taking into consideration the dynamics and safety.

Keywords: 占用网格;概率模型;换道辅助    

Building Fire Direct Loss Evaluation Based on Fire Dynamics and Probability Statistics Theory

Chu Guanquan,Sun Jinhua

Strategic Study of CAE 2004, Volume 6, Issue 8,   Pages 64-68

Abstract:

Based on fire growth probability and burned area, the method for evaluating burned area in building fire is presented in this paper. According to fire dynamics and different characteristics in fire growth process, the process is divided into four phases. By means of probability theory and event tree analysis, fire growth probability and critical time of every phase are calculated. Average burned area of building can be evaluated.

Keywords: building fire     fire risk evaluation     event tree     probability     burned area    

A knowledge push technology based on applicable probability matching and multidimensional context driving None

Shu-you ZHANG, Ye GU, Xiao-jian LIU, Jian-rong TAN

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 2,   Pages 235-245 doi: 10.1631/FITEE.1700763

Abstract: Actively pushing design knowledge to designers in the design process, what we call ‘knowledge push’, can help im-prove the efficiency and quality of intelligent product design. A knowledge push technology usually includes matching of related knowledge and proper pushing of matching results. Existing approaches on knowledge matching commonly have a lack of intel-ligence. Also, the pushing of matching results is less personalized. In this paper, we propose a knowledge push technology based on applicable probability matching and multidimensional context driving. By building a training sample set, including knowledge description vectors, case feature vectors, and the mapping Boolean matrix, two probability values, application and non-application, were calculated via a Bayesian theorem to describe the matching degree between knowledge and content. The push results were defined by the comparison between two probability values. The hierarchical design content models were built to filter the knowledge in push results. The rules of personalized knowledge push were sorted by multidimensional contexts, which include design knowledge, design context, design content, and the designer. A knowledge push system based on intellectualized design of CNC machine tools was used to confirm the feasibility of the proposed technology in engineering applications.

Keywords: Product design     Knowledge push     Applicable probability matching     Multidimensional context     Personalization    

Machine learning based altitude-dependent empirical LoS probability model for air-to-ground communications Research Article

Minghui PANG, Qiuming ZHU, Zhipeng LIN, Fei BAI, Yue TIAN, Zhuo LI, Xiaomin CHEN

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9,   Pages 1378-1389 doi: 10.1631/FITEE.2200041

Abstract: Line-of-sight (LoS) probability prediction is critical to the performance optimization of wireless communication systems. However, it is challenging to predict the LoS probability of air-to-ground (A2G) communication scenarios, because the altitude of unmanned aerial vehicles (UAVs) or other aircraft varies from dozens of meters to several kilometers. This paper presents an altitude-dependent empirical LoS probability model for A2G scenarios. Before estimating the model parameters, we design a K-nearest neighbor (KNN) based strategy to classify LoS and non-LoS (NLoS) paths. Then, a two-layer back propagation neural network (BPNN) based parameter estimation method is developed to build the relationship between every model parameter and the UAV altitude. Simulation results show that the results obtained using our proposed model has good consistency with the (RT) data, the measurement data, and the results obtained using the standard models. Our model can also provide wider applicable altitudes than other LoS probability models, and thus can be applied to different altitudes under various A2G scenarios.

Keywords: Line-of-sight probability model     Air-to-ground channel     Machine learning     Ray tracing    

Simulation on Hitting Probability of MMW Remote ControllingTrajectory Correction Munition Intercepting Mobile Anti-ship Missile

Hu Ronglin,Li Xingguo

Strategic Study of CAE 2007, Volume 9, Issue 10,   Pages 65-70

Abstract:

The basic principle of millimeter wave remote controlling munitions (MMW-RCTCM) is demonstrated in the introduction.  Then the concept of correctable intercepting flow is proposed.  And the anti-air shooting model of millimeter wave remote controlling munitions (MMW-RCTCM) intercepting mobile anti-ship missile (MACM) is established in section 2 and 3.  Subsequently,  the hitting probability of single MMW-RCTCM vs.  single MACM as well as MMW-RCTCM flow vs.  single MACM and MMW-RCTCM flow vs.  MACM flow are analyzedin detail.  The probabilities of the above are simulated based on the parameters of the two sides of attacking and intercepting in the 5th section.  It is illustrated that comparing with the non-controlling munitions,  the efficiency of MMW-RCTCM is increased remarkably.  At the last,  it is concluded that the MMW-RCTCM can resist the attacking of saturate flow; ultra-sonic MACM.

Keywords: MMW     remote controlling     trajectory correction munitions     correctable intercepting flow     anti-ship missile     hitting probability    

Preliminary application study of performance-based method for seismic design and evaluation of nuclear safety related structure in nuclear power station

Chen Mao,Lu Shi

Strategic Study of CAE 2013, Volume 15, Issue 4,   Pages 57-61

Abstract:

This paper introduces the development of performance-based method (PBM) for seismic design and evaluation of nuclear safety related structure in nuclear power station in U. S., and systematically explains and discusses the PBM. Based on the updated research and available standards and codes, the main content of PBM includes following 5 aspects: Category of systems structures and components(SSC) according to different performance goal, Determination of performance goal of SSC, determination of seismic input based on PSHA, Fragility Analysis of SSC, and ensure sufficient conservatism of fragility safety to reasonably achieve target performance goal. This paper also gives some recommendations on the research and development of PBM in the future.

Keywords: nuclear power plant     nuclear safety     system structure and component     performance-based     seismic safety     fragility    

A Study on Double Bases Cooperating Mechanism in KDD (Ⅱ)

Yang Bingru,Wang Jianxin,Sun Haihong

Strategic Study of CAE 2002, Volume 4, Issue 5,   Pages 34-43

Abstract:

On the basis of paper ( I ) , this paper realized the reduction of the knowledge base and constructed the two coordinators and a component in the double-bases cooperating mechanism. Furthermore, the KDD* , which is the combination of KDD and double-bases cooperating mechanism, is constructed as an open and optimized enlargement of KDD. In the same time, this paper proposes a new association rule mining algorithm——Maradbcm which is based on the study on the inner mechanism, i. e. double base cooperating mechanism, of KDD and explains the algorithm of Maradbcm and Apriori respectively. Through the analysis of the algorithm and examples, it is shown that the main disadvantage of Apriori, overall database searching and deleting meaningful rules by minimum support threshold during creating large item set, can be overcome by Maradbcm algorithm. Then this paper proposed a new clustering method based on double-base cooperating mechanism. It is shown that the study of inner mechanism is important to the KDD mainstream development and it also provides a new path for the research in the area of knowledge discovery system.

Keywords: nowledge discovery     double-base cooperating mechanism     heuristic coordinator     interruptive coordinator     Maradbcm algorithm     numerical domain division algorithm    

Title Author Date Type Operation

Secrecy outage performance for wireless-powered relaying systems with nonlinear energy harvesters

继亮 张,高峰 潘,宜原 解

Journal Article

Secure analysis on artificial-noise-aided simultaneous wireless information and power transfer systems

Wei-min Hou, Qing-shan Tang,cstqs001@126.com

Journal Article

Secrecy performance analysis of single-input multiple-output generalized-

Hong-jiang LEI,Imran Shafique ANSARI,Chao GAO,Yong-cai GUO,Gao-feng PAN,Khalid A. QARAQE

Journal Article

Forward link outage performance of aeronautical broadband satellite communications

Huaicong Kong, Min Lin, Shiwen He, Xiaoyu Liu, Jian Ouyang, Weiping Zhu,linmin@njupt.edu.cn

Journal Article

A maximum reliable network interdiction model with limited resources

Zhao Jia and Yu Hua

Journal Article

Physical layer security of underlay cognitive radio using maximal ratio combining

Hui ZHAO,Dan-yang WANG,Chao-qing TANG,Ya-ping LIU,Gao-feng PAN,Ting-ting LI,Yun-fei CHEN

Journal Article

Performance analysis of the stop-and-wait automatic repeat request protocol under Markovian interruptions

Dashdondov KHONGORZUL, Yong-Ki KIM, Mi-Hye KIM

Journal Article

Collapse Probability of Building Caused by Fire

Sun Jinhua,Sun Zhanhui,Lu Shouxiang,Fan Weicheng

Journal Article

Lane changing assistance strategy based on an improved probabilistic model of dynamic occupancy grids

Zhengcai Yang, Zhenhai Gao, Fei Gao, Xinyu Wu, Lei He,gaozh@jlu.edu.cn

Journal Article

Building Fire Direct Loss Evaluation Based on Fire Dynamics and Probability Statistics Theory

Chu Guanquan,Sun Jinhua

Journal Article

A knowledge push technology based on applicable probability matching and multidimensional context driving

Shu-you ZHANG, Ye GU, Xiao-jian LIU, Jian-rong TAN

Journal Article

Machine learning based altitude-dependent empirical LoS probability model for air-to-ground communications

Minghui PANG, Qiuming ZHU, Zhipeng LIN, Fei BAI, Yue TIAN, Zhuo LI, Xiaomin CHEN

Journal Article

Simulation on Hitting Probability of MMW Remote ControllingTrajectory Correction Munition Intercepting Mobile Anti-ship Missile

Hu Ronglin,Li Xingguo

Journal Article

Preliminary application study of performance-based method for seismic design and evaluation of nuclear safety related structure in nuclear power station

Chen Mao,Lu Shi

Journal Article

A Study on Double Bases Cooperating Mechanism in KDD (Ⅱ)

Yang Bingru,Wang Jianxin,Sun Haihong

Journal Article