Computer Science ›› 2015, Vol. 42 ›› Issue (7): 165-169.doi: 10.11896/j.issn.1002-137X.2015.07.036

Previous Articles     Next Articles

Suppression Algorithm of Network Fluctuation Hop Signal Based on Perturbation Characteristic Decomposition and Feedforward Modulation

CHEN Wei-jun and SUI Dan   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In the network switching and data communication,a network time-frequency hop resonant signal can be produced,and such fluctuation hop signal should be suppressed to improve network stability.An improved suppression algorithm of network fluctuation hop signal was proposed based on perturbation characteristic decomposition and feedforward modulation,and the network fluctuation hop signal resonant mathematical model was constructed.The ray model was used to estimate the transmission loss,Doppler frequency shift algorithm was used to extract disturbance characteristics,and slowly varying envelope slice was used to gather the signal energy in the disturbance direction.In the Hilbert space,perturbation characteristic decomposition was obtained,the feedforward filter was designed,and the signal suppression was completed.The simulation results show that this algorithm can effectively suppress the resonant signal in network fluctuation hop,the information loss is avoided,data packet loss rate is reduced,and it has good real-time performance.The problems such as network startup delay,server load,trembling are solved.

Key words: Network,Disturbance feature decomposition,Signal,Feedforward modulation

[1] 靳晓艳,周希元,张琬琳.多径衰落信道中基于自适应 MCMC的调制识别[J].北京邮电大学学报,2014,7(1):31-34 Jin Xiao-yan,Zhou Xi-yuan,Zhang Wan-lin.Modulation Recognition Using Adaptive MCMC in Multipath Fading Channel[J].Journal of Beijing University of Posts and Telecommunications,2014,37(1):31-34
[2] 韩慧鹏,梁红,胡旭娟.自适应IIR陷波器在信号检测中的应用[J].弹箭与制导学报,2008,8(2):315-317 Han Hui-peng,Liang Hong,Hu Xu-juan.Signal Detection Based on Adaptive IIR Notch Filter[J].Journal of Projectiles,Roc-kets,Missiles and Guidance,2008,8(2):315-317
[3] Xie S L,Liu Y,Yang J M,et al.Time-Frequency Approach to Underdetermined Blind Source Separation[J].IEEE Transactions on Neural Networks and Learning Systems,2012,23(2):306-315
[4] 饶雨泰,杨凡.网络入侵搅动下的网络失稳控制方法研究[J].科技通报,2014,0(1):185-188 Rao Yu-tai,Yang fan.Network Intrusion Stir the Network Instability Control Methods of the Research[J].Bulletin of Science and Technology,2014,0(1):185-188
[5] 黎峰,吴春明.基于能量管理的网络入侵防波动控制方法研究[J].计算机仿真,2013,0(12):45-48,335 Li Feng,Wu Chun-ming.Research on Prevention Fluctuation Control method of Network Intrusion Based on Energy Management[J].Computer simulation,2013,0(12):45-48,335
[6] Alfaro V M,Vilanovab R.Robust tuning of 2DoF five-parameter PID controllers for inverse response controlled processes[J].Journal of Process Control,2013,3(4):453-462
[7] 杨明,郝亮,徐殿国.基于自适应陷波滤波器的在线机械谐振抑制[J].哈尔滨工业大学学报,2014,6(4):63-69 Yang Ming,Hao Liang,Xu Dian-guo.Online suppression of mechanical resonance based on adapting notch filter[J].Journal of Harbin Institute of Technology,2014,6(4):63-69
[8] 王瑞,马艳.基于分数阶傅里叶变换的线性调频脉冲信号波达方向估计[J].兵工学报,2014,5(3):421-427 Wang Rui,Ma Yan.DOA Estimation of Wideband Linear Frequency Modulated Pulse Signals Based on Fractional Fourier Transform[J].Acta Armamentarii,2014,5(3):421-427
[9] 欧世峰,高颖,赵晓晖.自适应组合型盲源分离算法及其优化方案[J].电子与信息学报,2011,33(5):1243-1247 Ou Shi-feng,Gao Ying,Zhao Xiao-hui.Adaptive Combination Algorithm and Its Modified Scheme for Blind Source Separation[J].Journal of Electronics & Information Technology,2011,33(5):1243-1247
[10] 刘逻,郭立红,肖辉,等.基于参数动态调整的动态模糊神经网络的软件可靠性增长模型[J].计算机科学,2013,40(2):186-190 Liu Luo,Guo Li-hong,Xiao Hui,et al.Software Reliability Growth Model Based on Dynamic Fuzzy Neural Network with Parameters Dynamic Adjustment[J].Computer Science,2013,40(2):186-190
[11] 方科.高动态扩频信号捕获的多普勒补偿[J].四川兵工学报,2013,34(7):122-124 Fang Ke.Research on Doppler Compensation in Acquisition of High Dynamic Spread Spectrum Signals[J].Journal of Sichuan Ordance,2013,4(7):122-124

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .