Advanced Search

2003 Vol. 25, No. 9

Display Method:
Articles
Text-independent speaker verification using priority ordered radial basis function networks
Deng Haojiang, Wang Shoujue, Du Limin
2003, 25(9): 1153-1159.
Abstract:
The structure and algorithm of Priority Ordered Radial Basis Function (POR.BF) Networks is introduced. The concrete training algorithm, calculational methods of likelihood score and verification rule, used for text-independent speaker verification, are proposed. To en-hance the generalization ability, the compressing vectors are applied to construct the inhibitory samples set and three methods including sequential selection, nearest neighbor selection and furthest distance selection are presented for the choose of anti-speakers. Moreover, the out-puts of neurons are weighted by a descendent array. Using these algorithms and methods, the performance is examined by a series of experiments. The results show that under the identi-cal experiment conditions, when the inhibitory set is composed of anti-speakers compressing vectors selected using nearest neighbor method, the Equal Error Rate (EER) using PORBF networks can decreased to 6.83% from 10,56% using conventional VQ method. For speaker verification, the PORBF network provides better performance than the VQ classifier.
Automatic face recognition based on neural networks
Yu Dongjun, Xu Weihong, Zhao Haitao, Yang Jingyu
2003, 25(9): 1160-1167.
Abstract:
A complete face recognition system is built based on neural network technologies. Firstly, pure faces are extracted from original face images. Secondly, SOM is utilized to obtain feature reduction. Finally, knowledge-based fuzzy neural networks are used for classification. Experiments on NUSTDBII face database demonstrate the effectiveness of the proposed method and show that it does not sensitive to the variance of pose and expression to a certain extent.
Automatic Segmentation of Chinese using overlaying ambiguity examining method and statistics language model
Wang Xianfang, Du Limin
2003, 25(9): 1168-1173.
Abstract:
In this paper, the question of Chinese automatic segmentation is discussed using overlaying ambiguity examining method and statistics language model. The multi-time iterative method is applied to train language model, which can produce a better model. The process of training language model is described in detail. The result shows that the perplexity of language model is reduced. The accuracy of segmentation changes with different language model and the reason is analyzed.
AN APPROACH OF WATERMARKING BASED ON INDEPENDENT FEATURE DECOMPOSITION OF IMAGE
Liu Ju, Sun Jiande
2003, 25(9): 1174-1179.
Abstract:
Independent Component Analysis (ICA), which is presented in studying the prob-lem of blind source separation, is a novel method of signal processing and data analysis. Using ICA, the source signals can be extracted only from the observations according to the statistic independent characteristics of the input signals, even without the coefficients of the source sig-nals and the transfer channels. In this paper, an image is considered as a mixture of several independent feature causes, and the ICA is used both on the original image and the watermark image respectively, A new approach of embodying digital watermark is proposed. The simu-lation results show that the embedded digital watermark can be extracted correctly, and the robustness exists in the new approach.
Study on new blind beamforming for multitargets
Li Hongsheng, Zhao Junwei, Chen Huawei, Wang Feng, Guo Yecai
2003, 25(9): 1180-1186.
Abstract:
A new blind beamforming algorithm for multitargets is presented in this paper. This method can estimate the weights of beamformers blindly by minimizing a new cost function based on least-squares constant modulus algorithm so as to separate the multitargets and find the direction. At the same time, a developed neural network is used to compute the inverse of a matrix, which not only improve the computing speed but also use easily hardware to carry out the blind beamforming. Simulation proves correctness of this algorithm.
3D reconstruction of targets in interferometeric SAR
Wang Yanping, Peng Hailiang
2003, 25(9): 1187-1193.
Abstract:
3D reconstruction of targets in Interferometric SAR (InSAR) refers to determine targets 3D position based on principal measurements of radar and the InSAR imaging geom-etry. Several algorithms have boon proposed for InSAR. These algorithms rely on simplifying assumptions, such as the; flat oarth approximation and the plane wave approximation. Signifi-cant location errors of targets have been introduced by these approximations. In this paper, a new algorithm is proposed on the models of spherical earth and spherical wave. The solution is given in a closed form only using the measured quantities: orbit, parameters, range time, Doppler shift, and interferomotric phase. This analytical solution demonstrates more exact than the existing algorithms.
Baseline analysis and design for distributed spaceborne interferometric SAR
Xu Huaping, Zhou Yinqing, Li Chunsheng
2003, 25(9): 1194-1199.
Abstract:
Distributed Spaceborne Interferometric SAR(DSI-SAR) can be explored to imple-ment three possibilities of the coherent combination of SAR, images, which are DEM, ocean current imaging and improving resolution in range and azimuth. So the baseline design for DSI-SAR is more complicated than that for INSAR. In this paper, formation flying of small satellites and geometry of DSI-SAR, are discussed and the requirements of three SAR coherent combinations for baselines are analyzed. Furthermore, three performance trade-offs in DSI-SAR baseline design are presented. According to these trade-offs, a method to design baseline is given and applied to an L-band DSI-SAR.
Optimal selection of interferometric SAR phase fringe image with residue
Tao Kun, Yang Ruliang
2003, 25(9): 1200-1205.
Abstract:
In this paper, the intrinsic relationship between registration accuracy and probability of residues referred to in phase unwrapping is investigated. Based on the derived model, it is presented that the number of residues can be used as a criterion to judge the registration results and select the optimal phase fringe image, which will reduce the error caused by misregistration as possible as much. The experiments show the effectiveness of this approach.
A blind channel estimation algorithm for an OFDM system
Shao Huaizong, Peng Qicong
2003, 25(9): 1206-1212.
Abstract:
In this paper, a blind channel estimator based on the aid of Pscudo-Pilot-Symbols (PPS) is proposed in terms of the two characters of OFDM system: the finite alphabet property of information symbols and independent property between subchannels. Unlike pilots which are used for estimation of channel and must waste some useful bandwidth, the PPSs, whose power can be boosted 3dB or 6dB to suppress efficiently the additive noise, is useful data transmitted, thus efficiency of the OFDM has been increased. Performance simulation of the proposed estimator including Mean Squares Error (MSE) of channel and uncoded Bit Error Rate(BER) have been taken, and the results show the estimator is efficient and very flexible.
Measurements set preprocessing for estimation of nonlinear model parameter
Yang Hongwen, Hu Weidong, Wu Jianhui, Yu Wenxian
2003, 25(9): 1213-1217.
Abstract:
Estimation accuracy of nonlinear parameter not only relates to the random measurement noise, but also relates to the system observability, provided that system observability is very low and the parameters intermix. Aiming at this, a preprocessing method based on measurements selection is proposed to strengthen the system observability. As an example, the preprocessed subset is used to estimate the system errors of radar. It is shown that this method can improve the estimation accuracy.
The solution to the inter-symbol interference with the LFM
Wang Zhensong, Zhang Xiaozhen
2003, 25(9): 1218-1224.
Abstract:
The technique of the Linear Frequency Modulation(LFM) is proposed to solve the problems of the inter-symbol interference in this paper. For comparing with other modulation techniques, the BER is analyzed, and the simulation results are given. The theoretical prediction and the simulation results indicate that the LFM is very useful to depress the inter-symbol interference. The high transmitting speed is held in some areas where the average of the multi-path time dispersion is larger. The merits of the LFM are that it is not necessary to have an equalizer or the spread spectrum code modulation.
A fast motion estimation algorithm for MPEG-4 shape coding
Lu Guanming
2003, 25(9): 1225-1229.
Abstract:
This paper proposes a fast motion estimation algorithm for MPEG-4 shape coding. The proposed algorithm takes advantage of inherent properties of shape coding as well as shape information, i.e., context-based motion estimation feature, motion vector correlation between neighboring binary alpha blocks, and binary feature of shape information. Simulation results show that the algorithm can reduce the computational complexity of motion estimation for shape coding and achieve a high processing speed. Therefore, the algorithm is suitable for real-time software implementation of MPEG-4 shape coding.
Remote surveillance system based on wavelet image coding
Qiao Shijie, Zhi Guilian, Wang Guoyu
2003, 25(9): 1230-1236.
Abstract:
The wavelet transform is ideal for image coding due to its capability for multi-resolution representation. This paper presents a remote surveillance system based on the wavelet image coding. The system contains two subsystems, the local monitor and the remote control. The local monitor consists of the image capture module, the wavelet coding module which has two blocks of 2-D wavelet transform and the zerotree coding, and the transmit module. The hardware structure of each module is designed, and the Verilog HDL modules of the local monitor are programmed and simulated. The hardware is then synthesized to FPGA. The receiver program for the remote control is designed, and the remote surveillance system is implemented successfully.
Linear cryptanalysis for a class of feistel ciphers
Lǚ Shuwang, Zhang Ruwen
2003, 25(9): 1237-1242.
Abstract:
In this paper, a new method is proposed for seeking the upper bounds of maximum linear bias for block ciphers, which is especially applicable to a class of Feistel ciphers that key is XORed with data. This technique consists of two steps. Firstly, the mathematical relationship between linear bias of ciphers and linear bias of round function F and S-box respectively is given by carrying out strictly mathematical expression of linear bias for ciphers. Next, the upper bounds of linear bias for ciphers are determined by seeking the solution with minimum weight for linear equation group. Using this method the upper bounds of linear bias within 32 rounds are given.
A modified HMRSVP scheme
Ye Minhua, Liu Yu, Zhang Huimin, Zhu Chunmei
2003, 25(9): 1243-1249.
Abstract:
This paper introduces RSVP, MRSVP and the QoS guarantee mechanism in mobile IP by utilizing the MRSVP. Three HMRSVP schemes are described and compared in detail, especially the HMRSVP with pointer forwarding. A modified one is proposed. In this scheme, MH in a hierarchical region uses pointer forwarding scheme, which can utilize the feature of movement locality. When it moves into a new region, it is required to update the RSVP path and begin the new pointer forwarding process. Also, the feature of locality is discussed thoroughly. The modified scheme is modeled and analyzed in two different cases. The results show that it has better performance.
Admission control policy based on decision theory for multiple class services in CDMA
Yin Zhiming, Xie Jianying
2003, 25(9): 1250-1254.
Abstract:
Admission control is one of the key policies to guarantee Quality of Service (QoS) in cellular CDMA networks. In this paper, an optimal Call Admisition Control (CAC) scheme based on Semi-Markov Decision Processes (SMDP) is presented to support multiple class ser-vices for QoS wireless networks. Linear programming formulation is used to find the optimal solution, which maximizes the channel utilization while guaranteeing requirements of QoS con-straints. In addition, weighted fair blocking constraints are used to implement flexible QoS requirements. The numerical results show that the performance of this scheme is better than that of threshold based scheme.
RCS analysis for anisotropic coating dihedral corner reflectors
Guo Huiping, Liu Xueguan, Yin Hongcheng, Huang Peikang
2003, 25(9): 1255-1260.
Abstract:
The RCS of metal dihedral corner reflector coated with an anisotropic material is investigated by using the PO method combined with multiple reflections in this paper, which is based on the equivalent currents on an anisotropic material backed by an infinite metal surface illuminated by plane wave. The effect of different material parameters on RCS of the reflector is also discussed. Some useful conclusions are pointed out.
Lossless constraint conditions of non-reciprocal networks
Liang Changhong, Li Long, Shi Xiaowei
2003, 25(9): 1261-1267.
Abstract:
The lossless constraint conditions of the non-reciprocal passive networks are studied in this paper. It is shown that the impedance matrix [Z] of a non-reciprocal lossless network has the real part, but it is compatible with the law of conservation of energy. In the non-reciprocal case, the positive resistances of the impedance matrix do not represent the. loss of the network, and the negative resistances do not represent the active gain. In addition, the transmission matrix [A] has the characteristic of |det[/l]|=l, which is called as the quasi- reciprocity. The realistic examples are given hi this paper.
Target detection algorithm of sar image based on local window K-distribution
Chong Jinsong, Zhu Minhui
2003, 25(9): 1276-1280.
Abstract:
The characteristics of two parameter CFAR algorithm and K-distribution CFAR algorithm are analyzed. The local window concept of two parameter CFAR is applied to K-distribution CFAR. This method can adapt to the complicated and strong local sea background of SAR imagery and can obtain better results.
A robust video watermarking scheme of raw frames
Liang Huaqing, Wang Lei, Shuang Kai, Yang Yixian
2003, 25(9): 1281-1284.
Abstract:
In this paper, a frame-based spectrum spread watermarking scheme is presented. The watermark is a binary image, and the watermark information are embedded into each frame with their index; at the same time, the correlation of frames is adopted in the scheme. The experimental results show that the embedded watermark is robust against the attacks such as frame drop, swap and collusion. And the extraction of watermark does not require the original video.
Polyphase based digital downconvertion of random if signals
Zhang Rong, Xiao Xianci
2003, 25(9): 1285-1289.
Abstract:
Polyphase based digital downconvertion is widely used in software electronic system design because it is easy to be realized and also has anti-jamming ability. But this method has blind frequency zone. This paper proposes a new method based on polyphase digital downconvertion which can eliminate the blind frequency zone and realize the receiving of any IF bandpass signal without changing the structure.
Narrow-band interference rejection in PN spread spectrum systems using SVD method
Sun Liping, Hu Guangrui
2003, 25(9): 1290-1293.
Abstract:
When the strong tone interference exists in the Direct Sequence Spread Spec-trum(DSSS) system, the traditional linear prediction filter performs poorly. A system model employing the proposed SVD-based technique to reject the single-tone interference in a DSSS system is presented. Simulation results show that SVD method has strong interference sup-pression ability, especially SVD outperforms conventional LMS by a gain of 3dB at BER=10-2. Also the SVD methods avoids the convergence problem that the LMS algorithm has.
Calculation of the eddy electric field based on electric field summation method of magnetic flux element
Sun Ming, Gong Shenguang, Zhou Jun, Lu Xincheng
2003, 25(9): 1294-1296.
Abstract:
The electric field summation method of magnetic flux element is proposed to calculate eddy electric field. Based on this method, the time domain formula of eddy electric field generated by plane area rotating in constant magnetic is derived. It also indicates that calculation of eddy electric field using electric field summation method of magnetic flux element is correct.
Reviews
The review and prospect of ATM techniques
Chen Xiangning, Wang Jing, Cheng Shixin, Zhou Meng
2003, 25(9): 1268-1275.
Abstract:
In this paper, ATM techniques are introduced and their defects are analyzed, in a view of ATM applications. Advanced Cell Transfer (ACT) technique is one of the Next Generation wideband Networks (NGN) firstly developed in China. Its current progress and its methods to overcome the ATM s defects are introduced and, its future prospected. This paper may help readers to learn in status quo and the comprehensive knowledge of ATM techniques and, understand the trend of network techniques.