Advanced Search

2005 Vol. 27, No. 11

Display Method:
Articles
Distributed Power Control in MIMO Cellular System
Zhao Kun, Qiu Ling, Zhu Jin-kang
2005, 27(11): 1681-1685.
Abstract:
In the design of cellular radio systems, power control methods based on signal-to-interference ratio (SIR) measurement have been used widely. This paper proposes distributed power control (DPC) methods based on SIR measurement in Multiple-Input Multi...
Advanced Hybrid ARQ Technique Employing a Signal Constellation Rearrangement Based on 64-QAM
Gu Xin-yu, Wang Yi-chen, Yu Xiao-bo, Niu Kai, Lin Jia-ru, Wu wei-ling
2005, 27(11): 1686-1690.
Abstract:
An advanced Hybrid ARQ (HARQ) technique applicable to QAM is presented in this paper, which employs signal constellation rearrangement to average the variations in bit reliabilities caused by QAM signal constellation. The presented scheme employs 4 c...
An EM Channel Estimation Algorithm for Iterative Detection of MC-CDMA Systems
Wang Peng, Jiang Hua, Liu Hai-tao, Yang Gen-qing
2005, 27(11): 1691-1694.
Abstract:
Iterative multi-user detection with channel decoding is applied to MC-CDMA, the multi-user detector is implemented as successive interference canceller with post-minimum mean squared error filtering. A new channel estimation approach based on expecta...
Diversity Receiving Technique for Synchronous Time Spreading Signal in Time-Varying Fading Channels
Meng De-xiang, Wu Zhan-ji, Liang Hong-yu, Wu Wei-ling
2005, 27(11): 1695-1698.
Abstract:
By Spectrum Spreading, the multi-path signals can be distinguished and received by RAKE receiver, and spectrum spreading is an efficient way to overcome multi-path fading. Time spreading can implement RAKE diversity receiving in frequency domain. But...
A Wiener LMS Channel Tracking Algorithm for OFDM Systems
Bai Bin-feng, Cai Yue-ming, Xu You-yun
2005, 27(11): 1699-1703.
Abstract:
Based on the property of OFDM systems, this paper discusses the feasibility of Wiener LMS algorithm in OFDM systems, and derives the frequency expression of the WLMS channel prediction algorithm for OFDM systems. The performance of the algorithm is g...
An M-ary Spread Spectrum Receiver Based on Orthogonal Cyclic Codes
Chu Zhen-yong, Ying Xiao-fan, Yi Ke-chu, Tian Hong-xin
2005, 27(11): 1703-1709.
Abstract:
This paper proposes a novel M-ary spread spectrum receiver scheme based on time-frequency transform domain. At the transmitter of the system, the M spreading codes of each user are generated by circularly shifting the prototype spreading code. At the...
A Decision-Directed OFDM Carrier Frequency Synchronization Loop
Zheng Lai-bo, Hu Jian-dong
2005, 27(11): 1710-1713.
Abstract:
Further investigation is given to a kind of carrier frequency offset (CFO) blind estimation algorithm based on time domain received signal reconstruction in OFDM systems, and the four aspects that affect the estimation accuracy are analyzed. For mini...
A Deblocking Algorithm Based on HVS
Xu Zhi-liang, Xie Sheng-li
2005, 27(11): 1717-1721.
Abstract:
A major drawback related to the Block-based Discrete Cosine Transform(BDCT) for image and video compression is that the decoded images, especially at very low bit rates,exhibit highly noticeable blocking artifact near the block boundaries. In this pa...
Method of Image Denoising Based on Statistical Mixture Model in Wavelet Domain
Yi Xiang, Wang Wei-ran
2005, 27(11): 1722-1725.
Abstract:
In this paper, a novel image denoising method based on statistical mixture model in wavelet domain is proposed. Firstly, the wavelet coefficients are classified as significant and insignificant coefficients by using interscale statistical model. Seco...
The Characteristic Analysis of Second Order Cyclostationarity of Continuous Phase Modulation Signal
Zhang Zi-bing, Li Li-ping, Xiao Xian-ci
2005, 27(11): 1726-1731.
Abstract:
Continuous Phase Modulated (CPM) signals play a prominent role in modern satellite communication systems and mobile communication systems due to their constant envelope property and bandwidth efficiencies. However, there was no much comprehensive ref...
The Design of Serially Concatenated Space-Time Codes
Li Ying, Guo Xu-dong, Wang Xin-mei
2005, 27(11): 1732-1736.
Abstract:
A class of Convolutional Space-Time Code(CSTC) is designed for Serially Concatenated Space-Time Code(SCSTC) with an arbitrary number of transmit antennas. The most apparent characteristic of the designed SCSTC is that the data rate increases with the...
A Dynamic Anonymous Authentication Scheme with Identity Escrow
Tian Zi-jian, Wang Ji-lin, Wu Yun-xia
2005, 27(11): 1737-1740.
Abstract:
A new anonymous authentication scheme with traceable identity is proposed. This scheme has the following advantages: (1) It is easy for users to dynamically join and leave, the only thing needs to do is manager add or delete the relevant data of user...
The Performance Analysis of Chaotic Frequency-Hopping Sequences
Mi Liang
2005, 27(11): 1741-1744.
Abstract:
The performance analysis of chaotic Frequency-Hopping (FH) sequences, which are generated by quantization function and reshaping operation based on chaotic map, is presented in this paper. Theory analysis and performance experimental at results show ...
A New RSA Threshold Group Signature Scheme Based on Modified Shamirs Secret Sharing Solution
Zhang Wen-fang, He Da-ke, Wang Xiao-min, Zheng Yu
2005, 27(11): 1745-1749.
Abstract:
In order to avoid computing elements inverses in the ring Z(N) since they may not exit, a new RSA threshold group signature scheme based on modified Shamirs secret sharing solution is proposed. Differing from the old schemes based on Lagrange interpo...
A New Method for 2D Adaptive Lifting Wavelet Transform
Ji Hu, Sun Ji-xiang, Cai Lu
2005, 27(11): 1750-1754.
Abstract:
In this paper, a new method for 2D adaptive lifting wavelet transform is proposed, which suite for the task of image compression applications. It is based on a update lifting operator and a nonlinear prediction lifting operator according with certain...
Optimum Design of 2-D Linear-Phase FIR Digital Filters
Wang Xiao-hua, He Yi-gang, Peng Yu-lou
2005, 27(11): 1755-1759.
Abstract:
This paper provides a new design approach based on a Neural Networks Algorithm(NNA). According to the amplitude-frequency response characteristics of 2-D FIR linear-phase filters ,the NNA is established .Using the NNA,the designed filter coefficients...
2-D DOA Estimation of Coherent Wideband FM Signals Based on STFT
Li Li-ping, Hang Ke-ji, Chen Tian-qi
2005, 27(11): 1760-1764.
Abstract:
Wideband FM signal occupies a wide band in frequency domain and has a time-varying direction vector. Therefore it is difficult to estimate its DOA, particularly the method to estimate 2-D DOA of coherent wideband FM signals has not been reported. Thi...
Wavelet Tramsform Prefilter Design Based on Polynomial Interpolation
Wang wei-wei, Shui Peng-lang
2005, 27(11): 1765-1769.
Abstract:
This paper presents a novel method to design prefilters starting from analysis scaling functions and utilizing the algebraic polynomial interpolation. In the case of uniform sampling, the obtained prefilters are time-invariant and its coefficients ar...
An Approach to Airport ROI Detection in Large Remote Sensing Images
Geng Zhen-wei, Jiang Yong-mei, Su yi, Yu Wen-xian
2005, 27(11): 1770-1773.
Abstract:
Object detection has been a difficult problem in remote sensing community for a long time. To process very large image make object detection even more difficult. A method for detecting airport ROI(Region Of Interest) is proposed, which is based on fe...
Image Recognition Using a Projection-Based Wavelet Moment
Cui Pei-ling, Pan Quan, Li Jun-hong, Zhang Hong-cai, Cheng Yong-mei
2005, 27(11): 1774-1777.
Abstract:
In this paper, a new wavelet invariant moment based on image projections is proposed. Firstly, Radon transform is used to project the image to 1-D space. Then, a translation and scaling invariant adaptive 1-D wavelet transform is introduced, and the ...
Skin Extraction Based on Fuzzy Cluster
Kong Xiao, Liu Dang-hui, Shen Lan-sun
2005, 27(11): 1778-1781.
Abstract:
Skin color is an important feature for face detection in color images. Usually by applying a statistical skin model, possible skin region can be segmented. However, the output can not be as accurate as expected. Besides, simple 2D model, e.g. CbCr, c...
The Study on Remote Sensing Data Classification Using Bayesian Network
Dai Qin, Ma Jian-wen, Li Qi-qing, Chen-Xue, Feng Chun
2005, 27(11): 1782-1785.
Abstract:
Because of the complexity in satellite remote sensing imaging system, some uncertainties or mixed spectrum information are contained in the data. By using maximal likelihood classification to process remote sensing data, the result accuracy of the cl...
An ATS Based on VI for Antenna Stabilization Platform of Airborne SAR
Liu Wan-fu, Guo Zhen-yong, Dai Ming-yu, Zhang Ping
2005, 27(11): 1786-1789.
Abstract:
This paper describes the principle of antenna stabilization platform of airborne SAR briefly, and then introduces an ATS(Automatic Test System) for such platform . The core of this system is a PXI VI(Virtual Instrument). The system uses an electro-co...
Research on Clutter Reduction and Synthetic Aperture Imaging of Shallow Subsurface Ground Penetrating Radar Based on Hyperbolic Feature
Zhang Chun-cheng, Kong Ling-jiang, Zhou Zheng-ou
2005, 27(11): 1790-1794.
Abstract:
This paper proposed a new clutter reduction method based on characteristic of Ground Penetrating Radar(GPR) image in detecting shallow subsurface objects. Moreover, a method to realize fast synthetic aperture imaging based on the proposed clutter red...
Theoretic Analysis on the Performance of User-Dependent Perfect-Scheduling Multiple Access Protocol
Liu Jing, Li Jian-dong, Zhou Lei, Zhang Guang-hui
2005, 27(11): 1795-1800.
Abstract:
Based on the idea of contention reservation access and polling transmission, a modified User-dependent Perfect-scheduling Multiple Access (UPMA) protocol is proposed, the bandwidth can be allocated dynamically to the uplink and downlink according to ...
A Deadlock Recovery Based Adaptive Routing Algorithm for Multi-dimensional Switching Fabric
Zhu Xu-dong, Li Le-min, Xu Du
2005, 27(11): 1801-1805.
Abstract:
Scalable switching fabrics can be done on implementing high performance routers by employing multi-dimensional packet switching fabrics. The internal routing algorithm in the switching fabric is a key technology. This paper proposes a new distributed...
Fuzzy Logic QoS Dynamic Source Routing for Mobile Ad Hoc Networks
Zhang Xu, Feng Mei-yu, Cheng Sheng, Ding Wei
2005, 27(11): 1806-1812.
Abstract:
A new QoS routing algorithm for mobile Ad hoc networks, Fuzzy Logic QoS Dynamic Source Routing (FLQDSR), is proposed in this paper. The idea of FLQDSR starts from the fuzzy theory. It integrates the multiple QoS parameters of traffic into one request...
Secure Steganographic Algorithm in JPEG Images
Zhang Xin-peng, Wang Shuo-zhong
2005, 27(11): 1813-1817.
Abstract:
Although it is very meaningful to embed secret messages into a cover image in JPEG format, an analyst can detect the presence of hidden data according to a change of DCT coefficient histogram or an increase of blockiness parameter. In order to improv...
A Fast Learning Algorithm of Feedforward Neural Networks Based on Screening Samples Dynamically
Sheng Shou-zhao, Wang Dao-bo, Huang Xiang-hua
2005, 27(11): 1818-1820.
Abstract:
The learning issue of feedforward neural networks whose activation function of hidden neurons satisfies Mercer condition is discussed in theory. The approach to improving learning speed is investigated. Then a fast learning algorithm of feedforward n...
A New Scheme for Accurate and Efficient Evaluation of Singular Integral of Time-Domain Integral Equation
Zhao Yan-wen, Xu Jian-hua, Nie Zai-ping, Wu Sheng-bo
2005, 27(11): 1821-1824.
Abstract:
In this article, the transformations of the parametric coordinates (i.e. area coordinates) and general Duffycoordinates are employed to transform the singular integrals of the Time-Domain Electric Field Integral Equation (TDEFIE) into non-singular in...
Study of Half-Wavelength Rectangular Coaxial Cavity for L-Band Multiple Beam Klystron
Shen Bin, Ding Yao-gen
2005, 27(11): 1825-1828.
Abstract:
A kind of rectangular coaxial cavity, which is used for low frequency broadband multiple beam klystron, is studied. The 3D electromagnetic code of ISFEL3D is used to calculate the main parameters and field distribution of rectangular coaxial cavity. ...
An FPGA Based Adaptive Genetic Algorithm
Fang Lei, Zhang Huan-chun, Jing Ya-zhi
2005, 27(11): 1829-1833.
Abstract:
A hardware implement Adaptive Genetic Algorithm (AGA) is proposed in this paper. The adaptive algorithm uses three parameters, i. e. fmax , fmin and fave to determine the fc and fm of the whole generation adaptively. The selection , crossover and mut...
Research of 2-5 Mixed-Valued/Ten-Valued Counter Based on Three Essential Circuit Elements
Wang Peng-jun, Yu Jun-jun, Huang Dao
2005, 27(11): 1834-1838.
Abstract:
By analyzing the principle of 2-5 mixed-valued coding, the theory of three essential circuit elements and the theory of N+1-valued algebra, the 2-5 mixed-valued gate circuits, flip-flops and up-down counters with carry/borrow bit are investigated qua...
A New Array Channel Mismatch Model for Simulations
Wang Ying, Wang Fei-xue
2005, 27(11): 1845-1848.
Abstract:
A new array channel mismatch model for simulations is proposed. The model consists of four sub-filters which separately control the four specifications of channels: amplitude variation, bandwidth, group delay variation and absolute delay offset. It i...
Reviews
On Optimization of VWDK Modulated Waveforms
Li Xiao-ping, Wu Le-nan
2005, 27(11): 1714-1716.
Abstract:
The high efficiency in bandwidth and high suppression to sidebands are very meaningful for wireless communications. Based on the composition of its modulated waveforms and power spectra, the optimization to very-minimun waveforms difference keying mo...
Overview of Artificial Immune System and Its Algorithms
Xie Ke-ming, Xie Gang, Guo Hong-bo, Xu Xin-ying
2005, 27(11): 1839-1844.
Abstract:
According to the prototype of living bodys immune system,Artificial Immune System, (AIS) is introduced. Based on the main function of immune system, the typical algorithms are described, such as immune algorithm,negative and clonal selection algorith...