Advanced Search

2005 Vol. 27, No. 1

Display Method:
Articles
A New Two-Dimension-Separated Approach to High Squint SAR Processing
Huang Yuan-bao, Bao Zheng
2005, 27(1): 1-5.
Abstract:
The high squint SAR signal features large range walk and small range curvature, which enable the raw data be compressed in range and azimuth separately. But in case of large azimuth scene size , complex algorithms must be used to cope with the constr...
Image Matching Algorithm and Implementation for SAR Images
Huang Yong, Wang Jian-guo, Huang Shun-ji
2005, 27(1): 6-9.
Abstract:
SAR image matching is important to SAR applications. This paper presents a method to fast match SAR images based on image feature. Edge detection and image segmentation are carried out firstly. Then image matching is performed based on the feature of...
The Applications of Polyphase Filtering in Digital Quadrature Detection of SAR
Huang Guang-min, Yang Ru-liang
2005, 27(1): 10-12.
Abstract:
In a general radar and communication system, the digital quadrature detection is necessary for implementing direct IF or RF sampling. The Digital Product Detection (DPD), applied easily in a real engineering, is a method to implement the digital quad...
A New IMM Method for Tracking Maneuvering Target
Ba Hong-xin, Zhao Zong-gui, Yang fei, Liu Hai-yan
2005, 27(1): 13-16.
Abstract:
A new IMM algorithm for tracking maneuvering target is proposed, which only uses two models that consist of a CS model and an augmented CV model for interaction. The CS model which uses the state variable with normal acceleration and tangent accelera...
Target Location Method Based on Intersection of Lines of Sight in the Netted Passive Sensor System
Liu Zong-xiang, Xie Wei-xin, Yang Xuan
2005, 27(1): 17-20.
Abstract:
Fast and precise location method plays an important role in the data association and the target tracking for the passive sensor system. In order to solve the typical problem of the target location encountered in the netted passive sensor system, the ...
Adaptive Chirplet Signal Expansion Based on Transcendental Estimation
Shu Chang, Song Shu-biao, Li Zhong-qun, Pei Cheng-ming, Tan Shen-gang
2005, 27(1): 21-25.
Abstract:
In this paper, a new time-frequency representation method, adaptive signal expansion algorithm! is presented. The algorithm is based on that essential character of signal space, initial value estimation and precise resolution are obtained simultaneou...
A Novel Overlapping Adaptive Filter with Window
Su Fei, Wang Zhao-hua
2005, 27(1): 26-30.
Abstract:
Based on a novel windowed overlapping adaptive filter, LMS algorithm with overlapping idea is introduced. In terms of the smoothness of signals processed by overlapping, a new Windowed Overlapping LMS algorithm(WO-LMS)is presented that combines the w...
Effective Image Authentication Technique Based on the Interested Region
Zhang Xiao-hua, Meng Hong-yun, Liu Fang, Jiao Li-cheng
2005, 27(1): 31-34.
Abstract:
Information authentication technique is an important inspects of network security, and its motive lies in authentication of the integrity and creditability of information. Based on the analysis of the previous image authentication techniques, a new e...
Incremental Wiener Filter and Space-Adaptive Regularization Based Super-Resolution Image Restoration
Yan Hua, Liu Ju, Li Dao-zhen, Sun Jian-de
2005, 27(1): 35-38.
Abstract:
A new method of super-resolution image restoration is proposed in the paper. In this method, the piecewise smoothness of space-adaptive regularization combines with the rapid convergence of incremental Wiener filter and through an iteration process w...
The Moving Object Detection Based on 2D Spatio-temporal Entropic Thresholding
Liu Yang, Li Yu-shan
2005, 27(1): 39-42.
Abstract:
A method of moving object detection based on two dimensional (2D) spatio-temporal entropic thresholding is proposed in this paper. The characteristics of several common approaches for moving object detection are analyzed, and 2D entropic thresholding...
Detecting Moving Objects from Infrared Image Sequence on Displacing Background
Cao Ju, Tan Yi-hua, Ma Jie, Tian Jin-wen
2005, 27(1): 43-46.
Abstract:
An approach to detecting moving objects from infrared image sequence on displacing background is proposed in this paper. First the correlation matching technique is used for registering five pictures with the sixth one. Then the registered images are...
An Improved Optimal Set of Statistical Uncorrelated Discriminant Vectors
Wu Xiao-Jun, Yang Jing-Yu, Wang Shi-Tong, Josef Kittler, Lu Jie-ping
2005, 27(1): 47-50.
Abstract:
This paper presents a research on the algorithm of optimal set of statistically uncorrelated discriminant vectors. An improved algorithm has been proposed on the basis of the analysis of the conventional algorithm of statistical uncorrelated discrimi...
A Preprocessing Method for Quantitation of Magnetic Resonance Spectroscopy Based on Complex Principal Component Analysis
Zeng Wei-ming, Liang Xiao-yun, Luo Li-min
2005, 27(1): 51-55.
Abstract:
This paper proposes a method that can automatically obtain common lineshape in the spectrum data set based on Complex Principal Component Analysis(CPCA). which can correct frequency shifts and damping factor shifts effectively. This method aligns fre...
Multiscale Edge Detection Image Fusion Algorithm Using Wavelet Transform
Xia Ming-ge, He You, Su Feng, Huang Xiao-dong
2005, 27(1): 56-59.
Abstract:
A novel image fusion algorithm using wavelet transform multiscale edges detection is proposed in this paper. This wavelet analysis image fusion method is feature-based. The source images are fused using their multiscale edges information. In order to...
Embedded Implementation of HMM Speaker-Independent Continuous Speech Recognition System
Du Li-min, Xie Ling-yun, Liu Bin
2005, 27(1): 60-63.
Abstract:
The embedded systems are gradually becoming the first choice of platforms which should be used for real-time speech recognition system. This paper discusses the computation complexity factors of HMM-based continuous speech recognition for embedded sy...
A Robust Dynamic Mouth Feature Based on Visemic LDA for Audio Visual Speech Recognition
Xie Lei, Fu Zhong-hua, Jiang Dong-mei, Zhao Rong-chun, Werner Verhelst, Hichem Sahli, Jan Conlenis
2005, 27(1): 64-68.
Abstract:
This paper presents a robust visual feature based on Visemic LDA for audio visual speech recognition, which captures dynamic lip contour information and reflects the viseme classes of visual speech. The paper also introduces an automatic labeling met...
Performance of MLC/PDL with Convolutional Codes as Component Codes under a New Distance Metric
Zhang Yu-ling, Yuan Dong-feng, Gao Xin-ying
2005, 27(1): 69-71.
Abstract:
A new distance metric for MLC/PDL (MultiLevel Coding/ Parallel Decoding of Levels) with MQAM constellation is proved to be applicable when punctured convolutional code is used as component code over Rayleigh fading channel. The efficiency has been de...
Semi-blind Constant Modulus Algorithm for CDMA System
Liu Sheng-mei, Zhao Chun-min, Li Can-wei
2005, 27(1): 72-74.
Abstract:
The semi-blind Constant Modulus (CM) algorithm which applied in the Multi-User Detection (MUD) of CDMA is studied. This approach fully utilizes all known users information, performs not-blind detector to suppress the interferes within the cell, and e...
The Research of Power Control Combined with Multiuser Detection in DS-CDMA System
Liu shui-sheng, Shen Yuan-long
2005, 27(1): 75-77.
Abstract:
Power control and multiuser detection are two ways to cope with Multiple Access Interference (MAI) and near-far effect. This paper proposed a new scheme for DS-CDMA system combined power control and multiuser detection. This scheme can effectively mi...
New Blind Space-Time Multiuser Receiver and Its Improved Method
Wang Zheng-mao, Ye Wu, Feng Sui-li, Ke Feng
2005, 27(1): 78-81.
Abstract:
In the paper, a varied step length LMS algorithm is adopted in space-time multiuser receiver, in which a new bierror function is used to solve the constrained optimization problem. Furthermore, based on the character of the users signals in fading ch...
An Enhanced CDMA-BLAST System Employed Scrambling Codes
Feng Xing-le, Zhu Shi-hua, Wu Lin-jun
2005, 27(1): 82-85.
Abstract:
A novel CDMA BLAST space-time code technique is proposed in this paper for the down link in a cellular CDMA system. Scrambling codes and orthogonal spreading codes are employed to identify different transmit antennas and different users, respectively...
A Novel Pre-compensation Scheme in Uplink MC-CDMA/TDD Systems
Zheng Kan, Huang Lin, Wang Wen-bo
2005, 27(1): 86-89.
Abstract:
This paper presents a novel power-limited pre-compensation method in MC-CDMA/TDD systems, which can avoid pilot insertion on the uplink and increase the spectral/power efficiency. To keep the transmission power constant, only the phase of signal is p...
A New Scheme for Adaptive Slot Structure in Mobile Communication Systems
Hua Jing-yu, Ma Zhang-yong, Gao Xi-qi, You Xiao-hu
2005, 27(1): 90-94.
Abstract:
A Single Carrier/Frequency Domain Equalization (SC/FDE) system with time multiplexed pilot channel is designed. In this system, the Doppler-shift of the time-varying multi-path channel is estimated by calculating the Level Crossing Rate (LCR) of the ...
An Accurate Scheme for the Doppler Shift Estimation in Mobile Communication Systems
Hua Jing-yu, Ma Zhang-yong, Wang Dong-ming, You Xiao-hu
2005, 27(1): 95-98.
Abstract:
In this paper, the Doppler-shift of the time-varying multi-path channel is estimated by calculating the Level Crossing Rate (LCR) of the signal envelope of the channel coefficient estimates on the effective fingers. The effect of noise is analyzed , ...
Subspace Tracking Channel Estimation for Training-Sequence-Based OFDM Systems with Transmitter Diversity
Xu Xin, Cai Yue-ming, Xu You-yun
2005, 27(1): 99-103.
Abstract:
Since the channel has slowly-varying delays and directions of arrival and fast-varying faded amplitudes, benefits can be obtained by space-time processing base these channel features. In this paper, the space-time subspace and amplitude tracking algo...
Adaptive Rood Pattern Search for Fast Block-Matching Motion Estimation
Wang Xiao-yan, Zheng Jian-hong
2005, 27(1): 104-107.
Abstract:
This paper proposes an adaptive rood pattern search, a new fast block-matching motion estimation algorithm. It combines the advantages of fixed search pattern and spatial correlation search pattern. Compared to the popular diamond search pattern, it ...
Research on an Improved Scalable Video Coding and the Network Transmission
Zhang Fang, Wu Cheng-ke, Cheng Pei-xing, Xiao Song
2005, 27(1): 108-111.
Abstract:
An improved scalable video coding scheme is proposed in this paper. The method generates the base layer including some sub-base layers by DCT coefficients reordering and VLC reshuffling, and the residues between the original DCT coefficients and the ...
Joint Multiple Description and Scalable Coding for Robust Transmission of Video over Internet
Zhu Hong, Wu Cheng-ke, Fang Yong, Wang Yang-li
2005, 27(1): 112-115.
Abstract:
Current Internet video transmission is characterized mainly by variations in throughput and packet loss. Scalable Coding(SC) and Multiple Description Coding(MDC) have been proposed as source coding techniques that are robust to such channel problems....
Minimized Entropy Quantization in Bit-Rate Variable Channel
Xu Jie
2005, 27(1): 116-118.
Abstract:
Taking the normal distribution as an example, this article discusses the problems of minimized entropy quantization in image compression, including single coefficient entropy quantization and multi-coefficients entropy quantization. It provides a qua...
Generalized Vector Bent Functions
Zhang Wen-ying, Wu Chuan-kun, Huang Xiao-ying, Li Shi-qu
2005, 27(1): 119-122.
Abstract:
This paper generalizes the conclusion of Perfect nonlinear S-boxes by Nyberg(1991), and introduces the conception of inverse regular generalized vector Bent function. It shows that for inverse regular generalized vector Bent function f(m) with even v...
A Prioritized Nested DRR Algorithm
Jian Gui-zhou, Ge Ning, Feng Chong-xi
2005, 27(1): 123-126.
Abstract:
As DRR fails to provide strong latency bound, in this paper, a new scheduling discipline named Prioritized Nested DRR (PNDRR) is presented, which introduces a token bucket with virtual allocated token quantum and changes the entering order of the sch...
Dynamic Routing with Minimum Interference for Traffic Engineering
Liu Hong, Bai Dong, Ding Wei
2005, 27(1): 127-130.
Abstract:
Research work on dynamic routing for traffic engineering is investigated. And an improved routing algorithm for optimizing network throughput is proposed. It is characterized by taking into account both network topology and traffic distribution condi...
Study on Transmitting MPEG-4 Video Stream in WLAN
Zou Shi-hong, Lin Hua-Sheng, Cheng Shi-duan
2005, 27(1): 131-135.
Abstract:
The basis of IEEE 802.11 wireless LAN Medium Access Control (MAC) is Distributed Coordination Function (DCF), When network load in WLAN is moderate or even higher, with DCF a station may need to defer several seconds before successful transmission. T...
IPO for Analysis of EM Scattering by Dielectric Coated Electrically Large Cavities
He Xiao-xiang, Xu Jin-ping, Gu Chang-qing
2005, 27(1): 136-138.
Abstract:
A theoretical model of Iterative Physical Optics (IPO) is established for the ElectroMagnetic (EM) scattering problem with imperfectly conducting boundaiy and applied to the analysis of EM scattering by a dielectric coated electrically large cavity. ...
The Coupling Technique for ICs Centering Design and Tolerance Optimization
Jing Ming-e, Hao Yue, Ma Pei-jun
2005, 27(1): 139-142.
Abstract:
A coupling technique is proposed based on parametric yields centering design and tolerance optimization. The technique is convergence to the optimal normal values from given initial design variable and tolerance with little knowledge of circuit, devi...
Adaptive Control of Unknown Chaotic System via Dynamic Neural Networks
Tan Wen, Wang Yao-Nan
2005, 27(1): 143-145.
Abstract:
A new robust adaptive identification-based control of chaotic system with uncertain parameters in view of modeling error is proposed in this paper. The objective is to adjust the unknown chaos to a fixed point. It is fulfilled by taking following two...
System Performances of V-BLAST Combined with Turbo Code
Chang Yong-yu, Fu Jing-xing, Yang Da-cheng
2005, 27(1): 150-152.
Abstract:
Through simulation this paper studies the performance of the system of V-BLAST combined with turbo code. The current methods process the V-BLAST algorithm and turbo decode algorithm independently. So it does not utilize the soft information of the re...
A Fast Kalman Filtering Algorithm and Its Evaluation
Li Yan-peng, Li Xiang, Zhuang Zhao-wen
2005, 27(1): 153-154.
Abstract:
A new fast Kalman filtering algorithm is illustrated in detail. For some filtering courses whose coefficients can not be caculated offline, this way offers high work speed and has certain accuracy, at the same time, it takes less resource. The idea i...
The Hybrid Pipelining Implementation of AES in the Feedback Mode Based on CPLD/FPGA
Peng Gen-peng, Liu Chang-shu, Li Zhi-hua
2005, 27(1): 155-157.
Abstract:
Although using pipelining structure in the hardware implementation can generally provide higher throughput, the application of this structure in current cryptography is limited, because they are not suitable for most common feedback modes. This paper...
An Auto-verification Platform for Schematic Design Based on TCL
Tian Ye, Zhao Bao-hua, Qu Yu-gui
2005, 27(1): 158-160.
Abstract:
In this paper, an auto-verification platform for schematic design is presented based on the extended TCL as a script language. Using the extensible property of the TCL, constructed a set of extended TCL command on the general data structure of the sc...
Reviews
Framework and Researching Content of Distributed Cryptography
Wang Lei, Zhu Yue-fei
2005, 27(1): 146-149.
Abstract:
Framework of distributed cryptography is presented based on its development and relations among its branches. A systematical model of distributed cryptography is described at the same time. And researching content of distributed cryptography is revie...
Info from EIS of NSFS
2005, 27(1): 161-167.
Abstract: