Proceedings of the 2017 International Conference on Electronic Industry and Automation (EIA 2017)

Session: Session 3: Wireless Communication

12 articles
Proceedings Article

GNSS Automatic Monitoring Wireless Communication Model Building and System Implementation for a Super Long Dam

Yingyi MA, Yangyang ZHANG, Yongsheng CHEN
Taking the wireless automatic monitoring for a super long earth-rock dam on Shifosi Liao River trunk stream as the research background, the GPS dam deformation monitoring system based on the GPRS wireless communication technology is studied and developed. The wireless acquisition of GPS raw data and...
Proceedings Article

Using Topological Potential Method to Evaluate Node Importance in Public Opinion

Rui SUN, Wanbo LUO
The evaluation of node importance is the main research direction in public opinion field, which is much significant to accurately find out the influent nodes for the propagation and evolution of public opinion, furthermore to effective control and predict public opinion situation and in-time guide it....
Proceedings Article

Weighted Centroid Localization Algorithm Based on Normal Distribution in Wireless Sensor Networks

Shaoguo XIE
Localization algorithms continue to be a challenging and important topic in wireless sensor networks (WSNs). To efficiently exploit the normal distribution for range-free localization, we propose two weighted centroid localization algorithms called Positioning Based on Normal Distribution and Positioning...
Proceedings Article

Rumor Propagation Model on Complex Network with Repast Simulation Platform

Rui SUN, Wanbo LUO, Yong ZHONG
Considering propagation characteristics of rumor on complex networks, this paper presents a rumor propagation model on complex network with Repast simulation platform. We introduce the structure and the main class library of Repast simulation platform. Then we build an efficient model based on the multi-agent...
Proceedings Article

Research on Multi-level Gazetteer Services Based on Object Relational Database

Jieyu DONG, Luo CHEN, Mengyu MA, Ning JING
Gazetteer service is one of the basic functions ofÿWeb map services, and the search efficiency and accuracy is very important to the user experience. Traditional approach is based on full-text indexing technology. The ranking of search results is mainly based onÿthe relevance of the search keywords....
Proceedings Article

A Beamforming Scheme with Steering and Nulling Capabilities for Direct Radiating Array Based Satellite Antenna

Xiao GENG, Yong LUO, Yilei SUN, Yuxin CHENG, Jianjun WU
In the current satellite communication systems, the multi-beam satellite system has been widely used. This paper analyses the typical fixed multi-beam system and designs a simulation program called DRA for beam forming. The beam can have any directivity, and can eliminate interference with the null steering...
Proceedings Article

Time-delay Alignment Method of Distributed Phased Array Satellite Terminal Antenna Based on Geometric Model

Jing WANG, Chunyang MA, Jian LI, Yuxin CHENG, Jianjun WU
Satellite terminal distributed phased array antenna system has a lot of advantages such as good reliability and flexibility. The delay of a signal when it arrives at the receiving end is not the same. Thus in order to combine the signals effectively, it is necessary to align the multiplexed signals in...
Proceedings Article

A Minimum Pointing Error Based Beam-Tracking Algorithm for Multi-beam GEO Satellite Antenna

Jian LI, Xu TAN, Jing WANG, Yong LUO, Jianjun WU
In this paper, the traditional LMS algorithm is extended to the real-time multi-reference point algorithm. The adaptive tracking beam is obtained by the mean square error and the minimum optimization criterion. Finally, this paper presents a switching proposal of the tracking beam. In order to better...
Proceedings Article

A Novel Algorithm of Coset Coding for Wiretap Channel in Physical Layer Security

Hui SHI, Jing LEI, Erbao LING
Coset coding is a typical method of secure coding in physical layer security. This paper focuses on coset coding based on the random linear codes in binary symmetric channel. While analyzing system security, we derive the formula of eavesdropper's equivocation and proposed a novel code extending algorithm...
Proceedings Article

An Improved Zero-Forcing Detection Algorithm of Spread OFDM for Underwater Acoustic Communications

Ke WANG, Leiyu SHI, Wei LIU, Jing LEI
The so-called spread OFDM(S-OFDM) system is designed to resist frequency-dependent attenuation by using Walsh-Hadamard (WH) code for spreading the frequency-domain OFDM symbols in the transmitter, and linear detectors, like ZF or MMSE, are usually used to recover the signals in the receiver. In this...
Proceedings Article

A Stream Computing Method for Railway Distribution Network Monitoring Information Based on Storm

Zhijian QU, Qunfeng WANG, Xiang PENG, Ruilin ZHOU
Aiming at the problem of rapid processing of real - time data in intelligent dispatching, a new method for calculating the information flow of distribution network monitoring is proposed. Access the distribution network monitoring data by publishing subscriptions, combining the topology parallel model...
Proceedings Article

Performance Analysis of a Delay-Tolerable Cognitive Radio Network

Shensheng TANG, Chenghua TANG
In this paper, we analyze the performance of a delay-tolerable cognitive radio network at the call level, where secondary users detect and opportunistically access the channel resources when no primary users present. An ongoing secondary user using a channel may switch to another channel with some routing...