Advanced Search

2004 Vol. 26, No. 12

Display Method:
Articles
Nonparametric Methods for Image Segmentation Using Active Contour
Yang Hong-bo, Shi Yong-gang, Zou Mou-yan
2004, 26(12): 1849-1855.
Abstract:
This paper applies Parzen-window nonparametric estimation of active contour methods for image segmentation which can be performed without regarding image regions as any of typical probability distributions, so it expands the application range of the ...
A Hardware Realization of Order Morphological Image Processor
Zhang Bo, Zhang Huan-chun, Jing Ya-zhi
2004, 26(12): 1856-1862.
Abstract:
Firstly, order morphological transformations on gray image are introduced in this paper, then an image processing system in which order morphological transformation is implemented by hardware is presented. The system is composed of Digital Signal Pro...
Mathematical Morphology Appoach to Face Detection in Complex Background
You Ya-ping, Yuan Bao-zong
2004, 26(12): 1863-1870.
Abstract:
Skin color character is widely used for face detection and face tracking. This paper construct a mixed model in both normalized RGB and HSV color space, which can be used to acquire possible skin regions in original image. It designs a sequential fle...
A Generalized Principal Component Analysis Based on Image Matrix
Chen Cai-kou, Yang Jian, Yang Jing-yu, Gao Xiu-mei
2004, 26(12): 1871-1874.
Abstract:
The classical Principal Component Analysis (PCA) for image feature extraction is usually based on vectors, which makes it very time-consuming, and the class information in the training sample has not been utilized fully also. To overcome these two dr...
Digital Image Watermarking Resisting to Geometrical Attacks
Sang Mao-dong, Zhao Yao
2004, 26(12): 1875-1881.
Abstract:
In this paper a watermarking scheme for digital image that can resist geometrical attacks is proposed. The watermark is a key-dependent random vector according to Gaussian distribution. After preprocessed and periodized, the watermark is embedded int...
FPGA Watermarking Based on Modification of Time Constraints
Lu Jian-feng, Wang Shuo-zhong
2004, 26(12): 1882-1887.
Abstract:
Based on modification of time constraints in the FPGA design, a watermark-embedding scheme is proposed for protection of intellectual property rights of the system designer. A coded binary watermark sequence is used to replace the least significant d...
Reduced Order Model for Solving Linear Inverse Problem
Wen Cheng-lin, Zhou Fu-na, Yang Guo-sheng
2004, 26(12): 1888-1894.
Abstract:
Based on relative error covariarice matrix (RECM) information, a reduced-order model is proposed for solving linear inverse problem. The reduced-order model turns the high order model into an approximate lower order model, which can efficiently allev...
Dynamic Programming Algorithm for Detecting Moving Point Targets
Zhang Bing, Lu Huan-zhang
2004, 26(12): 1895-1900.
Abstract:
The real-time detection algorithm of moving point target in image sequences is one of key algorithms in many real-time processing systems. After the analysis of real background and the demand of the detection algorithm, this paper presents a research...
A Corrected Engineering Estimation Formula of Radiometric Resolution in SAR Images
Dong Ge
2004, 26(12): 1901-1907.
Abstract:
After analyzing the inherence of radiometric resolution in SAR images, this paper points out there is considerable error of radiometric resolution in SAR images using current engineering estimation formula which only suits for the qualitative analysi...
High Resolution Airborne SAR Motion Compensation Based on Echo Data
Lei Wan-ming, Hu Xue-cheng
2004, 26(12): 1908-1914.
Abstract:
This paper amply analyzes the airborne SAR motion compensation mechanism on the range compression data and complex image data, and proposes a motion compen-sation algorithm for the high resolution airborne SAR. This algorithm makes use of the sub-ape...
A Signal Detection Method Based on the Modified Smoothing Pseudo WVD and the Binary Integration of Hough Transform
Su Feng, He You, Qu Chang-wen, Xia Ming-ge
2004, 26(12): 1915-1917.
Abstract:
The Wigner-Ville Distribution (WVD)-Hough transform could effectively detect several Linear Modulated Frequency(LMF) signals in low Signal to Noise Ratio (SNR.) envi-ronment. However, when the energy of these LMF signals diverge greatly, it is quite ...
Immunodominance Clone Algorithms
Du Hai-feng, Jiao Li-cheng, Liu Ruo-chen
2004, 26(12): 1918-1924.
Abstract:
Inspired by the biology immune system, the concept of Immunodominance in immunology is introduced to Artificial Immune System (AIS) in this paper. In AIS, the concept includes two parts, antibody-immunodominance and antigen- immunodominance. Based on...
Performance Analysis of Anti-noise FM Jamming of Pseudo-random Code Fuzes
Liu Ji-bin, Wang Li-jun, Zhao Hui-chang
2004, 26(12): 1925-1932.
Abstract:
The principle of pseudo-random phase modulation fuze, pseudo-random phase modulation and Pulse Amplitude Modulation (PAM) combined fuze, and noise FM jamming are introduced in brief. On this basis, the Signal to Jamming Ratio (SJR) gains of the two f...
A New Math Model of Multiple Independent Correlated Rayleigh Fading: Theory Analysis and Simulation Comparison
Wu Zhan-ji, Zou Zi-ming, Meng De-xiang, Wu Wei-ling
2004, 26(12): 1933-1937.
Abstract:
It is a basic problem for the simulation of correlated Rayleigh. fading to produce the multiple independent Rayleigh fading waveforms. Jakes model has been widely accepted, but it has major shortcoming in the statistical independence. A new math mode...
Selected Transmission of Multiple Antennas Based on Schmidt Orthogonalization
Zhou Hua, Ma Min, Yang Da-cheng
2004, 26(12): 1938-1943.
Abstract:
A new selected transmission scheme of multiple antennas is proposed, named Greedy Search (GS) method. The transmit antennas selected from all antennas can be used as the active transmit antennas. When, used with waterfilling power allocation, GS meth...
The Performance of CDMA Systems withSpace-Time Spreading Approach underthe Conditions of Multi-users and Multipaths
Xiao Yang, Wang Ya-chen, Hu Shao-hai, Lu Ling-yun
2004, 26(12): 1944-1950.
Abstract:
The paper studies the performance of CDMA systems with the space-fcime ap-proach under the conditions of multi-users and multipaths. The space-time spreading scheme with a novel algorithm can improve the downlink performance by using two antenna elem...
On the Feedback Channel of MIMO
Zhang Duo, Wei Guo, Zhu Jin-kang
2004, 26(12): 1951-1957.
Abstract:
The rate-distortion theory is induced to the system model, and the mathematic formula between the feedback channel rate and the closed-loop MIMO capacity are deduced. Through theoretical analysis and simulation results, this paper proposes four impor...
Performance Analysis of a Single User TH-SS PPM UWB System with Synchronization Timing Tracking Ability
Li Yao-min, Zhou Zheng
2004, 26(12): 1958-1964.
Abstract:
It is usually assumed that the perfect propagation delay has been achieved between the receiver and the transmitter, the receiver and the transmitter synchronize per-fectly, actually it is impossible to do this. Because of this, this paper proposes a...
A Traffic-Balanced Energy-Aware Routing Method for Mobile Ad Hoc Networks
Yu Xu-tao, Bi Guang-guo, Zhang Zai-chen
2004, 26(12): 1965-1971.
Abstract:
Ad hoc network is an energy-limited network. How to improve energy efficiency in an Ad hoc network is an important open problem. This paper proposes a new routing metric, which integrates congestion status at the link layer and remaining energy of a ...
Performance Evaluation of Transmission Time Based Admission Control in IEEE 802.11
Gou Ding-yong, Liu Gang, Wu Shi-qi
2004, 26(12): 1972-1977.
Abstract:
In this paper, a transmission time based admission control algorithm in IEEE 802.11 wireless LANs is proposed. When a new real-time flow requests to be admitted to the system, the Access Point (AP) evaluates whether the new flow will overrun the syst...
Uplink Capacity Comparison between LS Code and Walsh Code
Xu Shao-jun, Li Dao-ben
2004, 26(12): 1978-1983.
Abstract:
Firstly, the uplink capacity of CDMA system, in multi-path fading channels with single-user-detection and multi-user detection, is analyzed in this paper. The uplink capacity comparison between LS code and Walsh code is discussed for the above-mentio...
Suppression of Narrowband Interference inthe Improved Multiplex System of SpreadSpectrum Communication and Range Measurement
Sun Zhi-guo, Sun Jia-qi, Guo Li-li
2004, 26(12): 1984-1989.
Abstract:
A novel model of the multiplex system is proposed, which can suppress narrowband interference and white Gaussian noise by using adaptive combination filter and estimation model of SPECCORR_TDOA based on analyses of cyclostationary signals. Finally, t...
A New System of Multivariate Quadratic Equations for Rijndael
Li Na, Chen Wei-hong
2004, 26(12): 1990-1995.
Abstract:
Because the algebraic expression of Rijndael S box is a composition of the converse function with a q-polynomial over GF(28), in this paper the variables of S box are supposed rationally and the relations between these variables are analyzed, then a ...
Nominative Signature and Nominative Proxy Signature
Huang Zhen-jie, Hao Yan-hua, Wang Yu-min
2004, 26(12): 1996-2001.
Abstract:
Analyses of a nominative signature scheme (KPW scheme) and a nominative proxy signature scheme (PL scheme) are given, respectively. The results show that the KPW scheme is not a nominative signature scheme since the nominator not only can verify and ...
Analysis of the Radiation Characteristics of the Doubly Curved Reflector Antenna with Surface Distortion and Holes Using PTD
Dong Tao, Xu Xiao-wen, Xiao Jiang
2004, 26(12): 2002-2005.
Abstract:
The reflector antenna distortion model is built by exploding test results. The radiation characteristics of a kind of distorted shaped reflector antenna are computed by using PO and PTD method, and the radiation characteristics of the reflector anten...
Research and Implementation of Migration Mechanism in MAS
Wang Ru-chuan, Mu Hong, Xu Xiao-long
2004, 26(12): 2006-2012.
Abstract:
This paper surveys some typical approaches to migration models used in Mobile Agent System(MAS) and describes the migration mechanism in MAS which is designed and implemented by authors. Focused on the issues about the agents dynamic routing and migr...