Computer Science ›› 2017, Vol. 44 ›› Issue (7): 94-97.doi: 10.11896/j.issn.1002-137X.2017.07.017

Previous Articles     Next Articles

De-jitter Dynamic Slot Allocation Algorithm Based on Cluster Analysis

YU Ming-qiu, ZHOU Chuang-ming and ZHAO Min   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Instantaneity of information transmission is a prominent feature of tactical data link.Data chain communication is requited possessing good delay feature as well as reliable delay jitter performance.The generation of random message flow possesses characteristics of randomness and abruptness,and should dynamically allocate timeslot in accor-dance with demands,which requires a high real-time capability for algorithm.Therefore,a de-jitter dynamic slot allocation algorithm based on cluster analysis was proposed and the clustering method was adopted to divide idle timeslot into slot cluster,which can thus simplify the analysis process of slot allocation.The simulation result shows that timeslot allocated by the algorithm can meet the requirement of delay jitter and the algorithm is of low complexity which can settle timeslot assignment of periodic random message flow efficiently.

Key words: Tactical data link,Periodic random message flow,Delay jitter,Cluster analysis

[1] PAWGASAME W.Self-Organized TDMA Protocol for Tactical Data Links[D].Linkoping:Linkoping University,2011.
[2] BARUAH S,BESTAVROS A.Pinwheel scheduling for fault-tolerant broadcast disks in real-time database systems[C]∥Proceeding of the IEEE International Conference on Data Enginee-ring.1997:543-551.
[3] QIN Y,ZHANG J,ZHANG T.Effect of TDMA Timeslot Assignment on Traffic Delay[J].Acta Electronica Sinica,2009,30(10):2277-2283.(in Chinese) 秦勇,张军,张涛.TDMA时隙分配对业务时延性能的影响分析[J].电子学报,2009,30(10):2277-2283.
[4] LIANG S,MAO Y Q,ZHAO W Q,et al.The Timeslot Assignment Algorithm of Ground-to-Air Data Link[J].Journal of Force Engineering University(Natural Science Edition),2005,6(3):12-15.(in Chinese) 梁爽,毛玉泉,赵伟光,等.地空数据链中的时隙分配算法[J].空军工程大学学报(自然科学版),2005,6(3):12-15.
[5] HUANG K,MAO Y Q,QI Y J.Time-slot Assigning Scheme Used in a New Tactic Network[J].Journal of Xi’an University of Post and Telecommunications,2005,10(3):23-26.(in Chinese) 黄凯,毛玉泉,戚云军.一种新型战术通信网的时隙资源分配策略[J].西安邮电学院学报,2005,10(3):23-26.
[6] DONG L,MELHEM R,MOSSE D.Scheduling Algorithms for Dynamic Message Streams with Distance Constraints in TDMA Protocol [C]∥Proceedings of EuroMicro Conference on Real-Time Systems.2000.
[7] MISIC J,CHAN K L,MISIC V B.Performance of Bluetooth Piconets Under E-limited Scheduling[R].Winnipeg,Manitoba,Canada:University of Manitoba,2003.
[8] LIU X,HE Z X,ZHOU J L.A Mini-jitter Fixed Timeslot Allocation Algorithm for TDMA Tactical Data Link[J].Systems Engineering,2012,30(6):90-94.(in Chinese) 刘星,何肇雄,周经纶.TDMA战术数据链中最小时延抖动的固定时隙分配算法[J].系统工程,2012,30(6):90-94.
[9] CHEN J Y,ZHONG Z D,LIU Q.Time Slot Allocation Algorithm for TDMA Tactical Data Link[J].Fire Control & Command Control,2015,40(8):97-100.(in Chinese) 陈嘉远,钟章队,刘强.基于遗传算法的TDMA战术数据链时隙分配算法[J].火力与指挥控制,2015,40(8):97-100.
[10] LI X F,DONG Y F,LI J,et al.Data Mining and Knowledge Discovery(second edition)[M].Beijing:Higher Education Press,2010:43.(in Chinese) 李雄飞,董元方,李军,等.数据挖掘与知识发现(第2版)[M].北京:高等教育出版社,2010:43.
[11] XIA L Y.Tactical Data Link Technology Research[D].Xi’an:Northwestern Polytechnical University,2007.(in Chinese) 夏林英.战术数据链技术研究[D].西安:西北工业大学,2007.

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .