Open Access Open Access  Restricted Access Access granted  Restricted Access Subscription Access

Vol 50, No 4 (2016)

Article

Local optimization of trajectory control of observations for mobile digital direction-finder in the location of discrete sources of radiation system

Khutortsev V.V.

Abstract

The procedure of local optimization of trajectory control of observations is discussed. The solution is obtained in relation to mobile digital direction-finder. The sources of radio emission (SRE), which radiation intensity satisfies to the regularities of the discrete Markov process with two states, as the objects of observation are considered. The sequence of consideration of probabilistic characteristics of the radiation intensity variations in the algorithm of control synthesis is shown. An example is given.

Automatic Control and Computer Sciences. 2016;50(4):211-219
pages 211-219 views

Optimization of the transmitter pulse duration by the criterion of the radiation spectrum maximization at a given frequency

Aristov V.

Abstract

The possibility of achieving the maximum level of the probe pulse spectrum at a fixed frequency when selecting the optimal duration of the excitation pulse of the radar with pulse excitation antenna has been investigated.

Automatic Control and Computer Sciences. 2016;50(4):220-225
pages 220-225 views

Exploiting cyclostationary difference in anti-jamming method based on single channel source separation

Zhu X., Liu Y., Zhang X.

Abstract

Traditional time/frequency domain filter-based methods would fail due to the serious overlapping of the communication signal and jamming in time/frequency domain. In order to solve this problem, an anti-jamming algorithm based on single channel source separation by exploiting cyclostationary difference is proposed for direct sequence spread spectrum (DSSS) communication. Firstly, the cyclostationary difference among source signals is used to establish the single channel source separation model based on partial priori information of the DSSS signal. Secondly, cost function of the algorithm is constructed by the training sequences and the minimum mean square error criterion; after that, the optimal separation matrix of the pilot mixed signal can be calculated based on this cost function. Thirdly, the purpose of anti-jamming for DSSS communication can be achieved by separating the communication signal from the service mixed signal based on the optimal separation matrix calculated before. Simulation results show that, compared with the unseparated signal of high bit error rate (BER) close to 0.5, the proposed antijamming algorithm is more effective in anti-jamming with the BER as low as 10–3, which is not only applicable to narrowband jamming such as the single-tone/multi-tone jamming, but also applicable to broadband jamming such as the sweep-spot jamming.

Automatic Control and Computer Sciences. 2016;50(4):226-232
pages 226-232 views

Wireless channel extraction analyzing based on graph theory

Yao B., Yin J., Li H., Wu W.

Abstract

Wireless channels comprise various signal characteristics that correspond to different features. This research applies digital signal processing to first excavate and categorize various features found in the channel data. Then, borrowing from graph theory, fast clustering analysis and decision tree modeling are introduced to identify unique “fingerprint” characteristics. Finally, two scenarios were tested using artificial neural networks to identify and verify their applicability in different geographical locations.

Automatic Control and Computer Sciences. 2016;50(4):233-243
pages 233-243 views

Performance of multiple access CSK communication system with DF cooperative strategy

Wang M., Zhang H., Li L., He L., Yao Z.

Abstract

A multiple access chaos shift keying cooperative communication (MA-CSK-CC) system over Rayleigh fading channels and in the presence of Gaussian white noise is investigated in depth in this paper. The simplified half-duplex with a single relay decode-and-forward (DF) cooperative strategy is proposed to illustrate and analysis as an example. Exact and approximation bit-error-ratio (BER) performance expressions are derived. Simulation results demonstrate that the proposed system has a prominent advantage of high BER performance over the conventional multiple access CSK systems that have a single path to transmit signal at the same data rate over Rayleigh fading channels with additive Gaussian white noise. Moreover, based on the BER performance analysis, some useful results are also derived such as the relationships between BER versus spread spectrum factors, BER versus the number of users, etc.

Automatic Control and Computer Sciences. 2016;50(4):244-252
pages 244-252 views

Optimization of program recursive function calls analysis method

Shan C., Yu Z., Hu C., Xue J., Wu L.

Abstract

Static analysis can be classified into intra-procedural analysis and inter-procedural analysis-by-analysis objects. Inter-procedural analysis need to analyze the whole program adopting bottom-up parsing algorithms. Inter-procedural analysis can be converted to intra-procedural analysis by logging the context of follower’s function call in bottom-up analysis. However, the existence of recursive function calls in program increases the difficulty of inter-procedural analysis, which affects the detection accuracy of static analysis to some extent. An optimal method for analyzing the recursive function calls of program is presented in this paper. This method can lift the recursive function calls in function call graph of the program to be analyzed on the premise that vital function calls will be preserved. In this way, the false negative rate and false positive rate of program static analysis can be reduced and the accuracy of program security check can be improved.

Automatic Control and Computer Sciences. 2016;50(4):253-259
pages 253-259 views

Services recommended trust algorithm based on cloud model attributes weighted clustering

Yu Z., Wang J., Zhang H., Niu K.

Abstract

There are many different cloud services available, each with different offerings and standards of quality. Choosing a credible and reliable service has become a key issue. To address the shortcomings of existing evaluation methods, we propose a service clustering method based on weighted cloud model attributes. We calculate user-rating similarity with the weighted Pearson correlation coefficient method based on service clustering, and then compute user similarity combined with the user service selection index weight. This method allows us to determine the nearest neighbors. Finally, we obtain the recommended trust of the service for the target user through the recommendation trust algorithm. Simulation results show that the proposed algorithm can more accurately calculate service recommended trust. This method meets the demand of users in terms of service trust, and it improves the success rate of user service selection.

Automatic Control and Computer Sciences. 2016;50(4):260-270
pages 260-270 views

Micro-blog topic detection method based on BTM topic model and K-means clustering algorithm

Li W., Feng Y., Li D., Yu Z.

Abstract

The development of micro-blog, generating large-scale short texts, provides people with convenient communication. In the meantime, discovering topics from short texts genuinely becomes an intractable problem. It was hard for traditional topic model-to-model short texts, such as probabilistic latent semantic analysis (PLSA) and Latent Dirichlet Allocation (LDA). They suffered from the severe data sparsity when disposed short texts. Moreover, K-means clustering algorithm can make topics discriminative when datasets is intensive and the difference among topic documents is distinct. In this paper, BTM topic model is employed to process short texts–micro-blog data for alleviating the problem of sparsity. At the same time, we integrating K-means clustering algorithm into BTM (Biterm Topic Model) for topics discovery further. The results of experiments on Sina micro-blog short text collections demonstrate that our method can discover topics effectively.

Automatic Control and Computer Sciences. 2016;50(4):271-277
pages 271-277 views

Study on the technology of medical image reading based on JPEG2000

Liang B., Zhang Y., Lin Y.

Abstract

Along with the development of health informatization, many hospitals have set up PACS systems for centralized storage of patients’ medical examination images. Due to the large amount of image data, traditional methods such as C-MOVE, have slow upload and download speeds. And they also have security problems. Based on the research and development of medical imaging informatics and PACS, a JPEG2000-based method is described according to the PACS work flow and DICOM standard. This method makes the image storage, transmission and display operating in parallel, providing a good solution to timeliness and security problems of image reading and viewing.

Automatic Control and Computer Sciences. 2016;50(4):278-284
pages 278-284 views

Using Radial Basis Function Neural Networks to identify river water data parameters

Wu W., Du W., Zhong J.

Abstract

The complex conditions of water dynamics create a challenge in selecting an appropriate neuron structure for artificial neural networks to simulate real river parameters. This study proposes an identification model based on Radial Basis Function (RBF) Neural Networks. We applied this identification model to river water quality parameters with different neuron node size scenarios to test network structure characters. Simulation results reveal that the RBF Neural Networks model achieves convergence through neuron iterations and the simulation error is well controlled within a small margin. The adjusting effect is closely related to structure design and the neuron updating strategy.

Automatic Control and Computer Sciences. 2016;50(4):285-292
pages 285-292 views