Advanced Search

2003 Vol. 25, No. 11

Display Method:
Articles
The joint inerative channel estimation and decoder algorithm for the ofdm system
Ma Zhangyong, Liu Yaran, Zhao Chunming, You Xiaohu
2003, 25(11): 1441-1446.
Abstract:
For the QPSK-modulated OFDM system, the channel estimation accuracy can be improved using of the soft information which is based on the iterative decoder principle of Turbo. Meanwhile, in order to avoid serious error propagation due to the error deci...
A practical pilot-based channel estimation method for space-time coded ofdm system
Qu Daiming, Zhu Guangxi, Chen Zhonglin
2003, 25(11): 1447-1451.
Abstract:
This paper deals with pilot-based channel estimation of space-time coded OFDM system in frequency selective channels. DFT-based LS and LMMSE method are studied. A practical channel estimation method is proposed. In proposed method the complexity of L...
Direct decoding in a space-time block code for frequency-selective fading channels
Zhao Zheng, Yin Qinye, Zhang Hong, Zhang Jianguo
2003, 25(11): 1452-1462.
Abstract:
This paper proposes a decoding scheme in space-time block code system with three transmitting antennas and one receiving antenna for frequency-selective fading channels, which does not require channel estimation at the transmitter or receiver. By app...
A toa estimation method with high resolution
Shen Jianfeng, Wang Zongxin
2003, 25(11): 1463-1468.
Abstract:
A Time-Of-Arrival(TOA) estimation method for CDMA system with high reso-lution is proposed. The integrate-dump circuits are used to sample the received signals while the sampling rate is not raised, then the Discrete-Fourier-Transform(DFT) is used to...
Determining of convergent threshold and step-size for lms and normalized lms algorithm
Zeng Zhaohua, Liu Guizhong, Zhao Jianping
2003, 25(11): 1469-1474.
Abstract:
Based on eigenvalue distributing of input signal, the convergent necessary, condi-tions for LMS and Normalized LMS(NLMS) algorithm are again researched through the accu-rate analysis of the misadjustment. To avoid blindness for applying LMS and NLMS ...
Comparison of performance between chaotic sequences and nonlinear sequences based on shift register
Mi Liang, Zhu Zhongliang
2003, 25(11): 1475-1481.
Abstract:
Both chaotic sequences and nonlinear feed-forward logic (NLFFL) sequences based on linear shift register almost have the same properties: the ease of their generation and various families with a large family size and long sequence period, as well as ...
A novel fragile watermark technique based on image feature
Zhong Hua, Liu Fang, Jiao Licheng
2003, 25(11): 1482-1487.
Abstract:
In this paper, a novel fragile watermark technique is proposed, which is based on the method of Yeung-Mintzers (1997). To resolve the existing security problem, a chaotic key which is based on image feature is used to control the embedding of fragile...
Fingerprint classification using hmm and svm
Wang Chongwen, Li Jianwei, Chen Weimin
2003, 25(11): 1488-1493.
Abstract:
In this paper, a new classification method is proposed that is based on HMM and SVM using FingerCode. This technique uses FingerCode as representation of fingerprint, first, using five HMM classifiers to classify originally, furthermore, basing on th...
Pre-extracting support vector for support vector maching using bi-color voronoi diagrams
Pei Jihong, Yang Xuan
2003, 25(11): 1494-1498.
Abstract:
Support Vector Machines (SVMs) are a new generation learning system based on recent advances in statistical learning theory. SVMs have many well features that make them attractive for small samples, nonlinear and high dimensional pattern recognition....
A new kind of shadow detector based on cnn-ubn
Wang Haiming, Guo Shide, Yu Daoheng
2003, 25(11): 1499-1504.
Abstract:
In this paper, a new kind of two-dimensional Cellular Automata (CA) is studied. Several algorithmic rules are discovered that can be used to design new Cellular Neural Networks (CNN) which can implement shadow detector and overstriking for character ...
Linear modeling methods for cdma network planning
Zhang Jianming, Yang Dacheng
2003, 25(11): 1505-1513.
Abstract:
This paper presents some modeling methods for CDMA network planning applica-tions. Linear equations are used for modeling CDMA multi-cell networks and iterative methods are adopted for solving the equations. The simulation results based on these mode...
Pepeat-pass interferometry with airborne synthetic aperture radar
Shi Ruirong, Jing Linjiao, Song Fuming, Shen Ting, Li Jianxiong
2003, 25(11): 1519-1524.
Abstract:
In this paper, the interferomtric experiments on airborne L-SAR system of IECAS is demonstrated. And data obtained from experiments are processed, and Chinese first DEM with repeat-pass airborne SAR, which nearly accords with the real topographic map...
Sar moving targets detection based on dpca and interferometric processing
Zheng Mingjie, Yang Ruliang
2003, 25(11): 1525-1530.
Abstract:
This paper puts forward a new method of detecting three-aperture Synthetic Aperture Radar (SAR) ground moving targets after studying Displaced Phase Center Antenna (DPCA) and interferometric processing technique. This method can not only discover mov...
A new microwave imaging method for earth observation
Zhao Xiwen, Zhang Shourong, Wang Weiyan
2003, 25(11): 1531-1535.
Abstract:
Microwave imaging techniques which can provide all-weather, day-and-night imag-ing capability have important applications to many scientific fields. It is an active area to ex-plore new microwave imaging ideas, systems and techniques. In this paper, ...
Extremal solution of the target\s brightness temperature in millimeter wave radiometric measurements
Nie Jianying, Li Xingguo, Lou Guowei
2003, 25(11): 1536-1541.
Abstract:
The near sensing techniques with millimeter wave play important role in many fields. To make precise measurements of the radiometric brightness temperature of a target, one must set up model of the interaction between the electromagnetic radiation pr...
Finite element analysis of the waveguide system based on the operator theory of vector wave function space
Xing Feng, Ren Liehui, Xu Cheng, Zhou Bin, Song Wenmiao
2003, 25(11): 1542-1547.
Abstract:
This paper presents a finite element method for the analysis of waveguide system without spurious modes. Prom the operator theory of the vector wave function space, a succinct and complete electromagnetic wave equation set is derived and the electiic...
Performance of ultra-wideband impulse radio wireless communication system in multipath and multiuser environments
Li Haitao, Zhang Jing, Lu Jianhua
2003, 25(11): 1564-1569.
Abstract:
Ultra-wideband impulse radio is a developing high speed wireless access technology. In this paper, the principle of ultra-wideband multiaccess communication is analyzed with the transmitting signal. In order to study the system performance in mulitpa...
A blind audio watermark algorithm base on dwt and dct
Zhao Chunhui, Li Fuchang
2003, 25(11): 1570-1574.
Abstract:
This paper presents a novel blind audio digital watermark algorithm. It makes full use of the multi-resolution of DWT and the energy compression of DCT and embeds binary image watermark in the audio by quantification process. The watermark can be ext...
Target recognition based on multiresolution fractal feature
Fu Xinwei, Yu Qiuxing, Li Zhishun
2003, 25(11): 1575-1577.
Abstract:
In this paper, echoes are decomposed based on wavelet multiresolution analysis. It is shown that the energy of wavelet coefficients is exponential to the decomposed scale in some degree, which is similar to the definition of fractal dimension. Hence,...
A verifiable dynamic secret sharing scheme
Liu Yuan, Yin Qing, Zhang Limin
2003, 25(11): 1578-1580.
Abstract:
In the paper, an improved secret sharing scheme based on elliptic curve cryptography is proposed. It guarantees the mutual identity authentication between the legal dealer and the participating parties and can protect against the cheating action. The...
A new edge-reserve filtering algorithm
Zhao Chenglin
2003, 25(11): 1581-1584.
Abstract:
In this paper, a new edge-reserve filtering algorithm is presented. It adaptively adjusts the size of the filters supporting area according to the local variance of the interested area. The bigger the local variance is, which means the more high freq...
论文
Security property of a class of digital chaotic encryption system
Hu Guojie, Feng Zhengjin
2003, 25(11): 1514-1518.
Abstract:
Under Kirchhoff principle, the security property of digital chaotic encryption system is discussed using chosen-ciphertext attacking. The key of the encryption system can be got by chosen-ciphertext attacking. The digital chaotic encryption system ba...
Reviews
Progress on key techniques of in-band on-channel digital audio broadcast
Yu Yunhua, Liu Yang, Shi Yin
2003, 25(11): 1548-1557.
Abstract:
A Digital Audio Broadcasting(DAB) system, which is based on advanced technique of Coded Orthogonal Frequency Division Multiplexing (COFDM), can provide improved per-formance of high robustness and virtual CD-like quality. In-Band On-Channel(IBOC) dig...
Discussions
The vmsk modulation delusion
Chen Xiaoyi, Yao Qingdong, Liu Xiaocheng
2003, 25(11): 1558-1563.
Abstract:
H. R. Walker presented a high spectral efficiency modulation (VMSK). It can reach 30 bit/(sHz) simply without loss of SNR in his analysis. There are papers introduce this technology in China too. But, through deeply analysis based on the engineering ...