Advanced Search

2005 Vol. 27, No. 3

Display Method:
Articles
A Priority Supporting Adaptive Routing Algorithm in Direct Interconnection Networks
Zhu Xu-dong, Li Le-min, Xu Du
2005, 27(3): 337-340.
Abstract:
Direct Interconnection Networks (DIN) are considered to build scalable switching fabrics for Internet routers/switches, clue to its easy scalability. Furthermore, QoS (Quality of Service) guarantee is very important in switching systems. In this pape...
A Scheduling Algorithm for Input Queued Switch with Guaranteed Fairness
Zhou Wei-hua, Zhu Xin-ning, Wu Mu-qing, Ding Wei
2005, 27(3): 341-345.
Abstract:
The input queued switch fabric, because of its scalability, has been implemented in more and more high speed switches and routers. Existing scheduling algorithms attempt to get the maximum throughput at the expense of fairness. As the need for Qualit...
A Study on IP Traceback of DDoS Attack Ingress within an Autonomous System
Jin Guang, Zhao Jie-yu, Zhao Yi-ming, Wang Xiao-hong
2005, 27(3): 346-350.
Abstract:
To defend against DDoS attacks on Internet, a new scheme called Ingress Address Marking (IAM) within an Autonomous System (AS) is proposed, with which the IP addresses of the ingress can be embedded into the forwarding packets. A victim can traceback...
Research and Implementation of an Active Network Security System Based on Honeypots
Sun Zhi-xin, Yang Jia-yuan, Shi Liang-hui, Wang Ru-chuan
2005, 27(3): 351-354.
Abstract:
Exploit automation and massive global scanning for vulnerabilities enable adversaries to compromise computer systems shortly after vulnerabilities become known. Traditional honeypots have shortcomings to deal with these problems because their signatu...
AODV-Based Routing Protocol with QoS Support
Zhang Xia, Yu Hong-yi, Yang Jin-ya
2005, 27(3): 355-358.
Abstract:
To guarantee quality of service of real-time traffic, an algorithm based on AODV is presented. In this algorithm, node maintains traffic information of nodes in its neighborhood. Reservable bandwidth is used as the main consult in routing.Simulation ...
A Study of Self-adaptive Transmission for Integrated Voice and Data Services over an IEEE 802.11 WLAN
Li Chang-le, Li Jian-dong, Cai Xue-lian
2005, 27(3): 359-363.
Abstract:
The IEEE 802.11 standard MAC is a hybrid protocol of random access and polling when both DCF (Distributed Coordination Function) and PCF (Point Coordination Function) are used. On the base of the performance analysis of the MAC protocol for integrate...
Frequency Ambiguity Resolution Algorithm for OFDM Systems Based on Phase Differential Modulation between Adjacent Symbols
Zeng Rong, Zhao Chun-ming
2005, 27(3): 364-368.
Abstract:
OFDM systems are sensitive to the frequency offset. In this paper, a novel frequency ambiguity resolution algorithm in OFDM systems based on phase differential modulation between adjacent symbols is proposed to correct the frequency ambiguity. The su...
Peak-to-Average Power Ratio of the Oversampling OFDM Signals
Lei Xia, Li Shao-qian, Tang You-xi
2005, 27(3): 369-372.
Abstract:
The OFDM signal is analyzed as a continuous stochastic processes and the closed form expression of correlation function between any two given time instant is derived. When the sampling rate increases, the correlation increases quickly and the peak-to...
A TOA Based Believable Factor Mobile Location Algorithm
He Yan, Hu Han-ying, Zhou Shan
2005, 27(3): 373-376.
Abstract:
A key obstacle to high accuracy mobile location is the None Line of Sight (NLOS) transmission of signal. This paper presents a new radio location algorithm-believable factor algorithm (BFA), based on the time of arrival (TOA) range measurements, usin...
A Wireless Space-Time Channel Model
Wu Qun-ying, Xiao Xian-ci
2005, 27(3): 377-379.
Abstract:
Space-time reveivers for the third-generation mobile communication systems is important. For a realistic simulation of such systems, a simple statistical space-time vector channel model is proposed, and the space-time-frequency correlation matrix of ...
Chip Equalizer Combined with Pilot Cancellation and Rake
Wu Qi-hui, Chen Yu, Zhao Chun-ming
2005, 27(3): 380-383.
Abstract:
Chip equalization is one of the key technologies for improving the performance of the 3rd generation mobile communication system. In order to enhance the performance of the chip equalizer, a new scheme of chip equalizer jointed with pilot cancellatio...
A Novel Blind Multiuser Detection Based on LMK Criterion for Synchronous DS/CDMA System over Multipath Fading Channels and Its Convergence Analysis
Jiang Xiao-bing, Xue Qiang, Feng Yu-min
2005, 27(3): 384-387.
Abstract:
In this paper, a new linear blind adaptive multiuser detection based on LMK. criterion is proposed for synchronous DS/CDMA system over multipath fading channels, The new algorithm bases on HOS(High Order Statistics) and reduces complexity remarkably....
Direction of Arrival Estimation Based on Chaotic Optimization Algorithm
Chen Yong-qian, Xiao Xian-ci
2005, 27(3): 388-391.
Abstract:
In this paper, a chaotic optimization method is presented for computing the Maximum Likelihood Estimation (MLE) of Direction of Arrivals (DOA) in sensor array processing. Based on the properties of ergodicity, stochastic property and regularity of ch...
Blind Detection of LSB Steganography Based on a Cubic Equation
Lu Pei-zhong, Luo Xiang-yang, Tang Qing-yang, Shen Li, Zou Yan
2005, 27(3): 392-396.
Abstract:
This paper presents a fast algorithm to detect the Least Significant Bit (LSB) steganography. The new approach is inspired by the work of Dumitrescu et al(2003) who detected LSB steganography via sample pair analysis. The new algorithm combines with ...
An Orthogonal Space-Time Block Code Based on Matrix Rotation
Wang Lei, Zhu Shi-hua, Wang Jun
2005, 27(3): 397-401.
Abstract:
According to the theory of orthogonal designs, Tarokh et al.(1999) proved that a complex orthogonal space-time block code that provides full diversity and full transmission rate is not feasible for more than two antennas. Whereas the non-orthogonal s...
ROI-Based Rate Allocation Algorithm for MPEG-4 FGS
Chen Qiang, Zhuo Li, Shen Lan-Sun
2005, 27(3): 402-406.
Abstract:
A ROI-based rate allocation algorithm for the MPEG-4 FGS enhancement layer is proposed in this paper. On the basis of the ROI-oriented rate-distortion model, the proposed algorithm can perform optimal rate allocation for the enhancement layer after s...
MMSE Correlator Based RAKE Receiver for DS-CDMA
Liu Yong-jun, Gou Yan-xin, Cheng Guo-bing, Liu Yong
2005, 27(3): 407-410.
Abstract:
This paper investigates the performance of a reduced rank MMSE correlator for a RAKE receiver in the context of CDMA in frequency selective multipath. The MMSE correlator based on the Correlations Subtractive Architecture (CSA) is very suit for frequ...
Theoretical Comparison of BER Performance between Single-Carrier Frequency-Domain Equalization and Multi-carrier OFDM
Liu Qian-lei, Yang Lu-xi
2005, 27(3): 411-414.
Abstract:
Single-Carrier Frequency-Domain Equalization (SC-FDE) and multi-carrier Orthogonal Frequency Division Multiplexing (OFDM) are two techniques to combat multipath fading in digital communications. This paper compares the BER performances of them for wh...
Performance of Ultra-wide Band Rake Receivers in Dense Multipath Channels
Wang De-qiang, Liu Dan-pu, Yue Guang-xin
2005, 27(3): 415-418.
Abstract:
In indoor environments, ultra-wide band signals suffer from dense multipath propagation and severe time dispersion. Rake reception is an important way to boost the performance of ultra-wide band receivers. With the assumption that BPSK modulation is ...
Denoising by Singularity Detection
Jiang Hong, Wang Jun
2005, 27(3): 419-422.
Abstract:
A signal denoising algorithm based on singularity detection is introduced in this paper, It simplified the complicated linear interpolation operation needed in the 2-D image denoising so that the 2-D denoising is greatly simplified and it can also ge...
Eigenspace-Based Linearly Constrained Minimum Variance Beamformer
Zhao Yong-bo, Zhang Shou-hong
2005, 27(3): 423-426.
Abstract:
By combining the Linearly Constrained Minimum Variance Beamformer(LCMVB) with the eigenspace-based beam former, this pnper presents the Eigenspace-based Linearly Constrained Minimum Variance Beamformer{ELCMVB). The ELCMVB first projects the presumed ...
Study on Spectrum of Nonuniform Sampling Signals Based on Wavelet Transform
Wang An-min, Wang Shu, Chen Ming-xin
2005, 27(3): 427-430.
Abstract:
A novel nonuniform sampling digital spectrum processing method based on wavelet transform is studied in this paper. The fundamental principle of nonuniform sampling wavelet transform is introduced and the processing procedure is presented from the un...
Radio Fuze Signal Reconnaissance Based on Fractional Fourier Transform
Huang Guang-ming, Zhao Hui-chang, Xiong Gang, Wang Li-jun
2005, 27(3): 431-433.
Abstract:
In this paper, LFM signal reconnaissance theory based on fractional Fourier transform is discussed firstly. Compared with bilinear transform, the fractional Fourier transform is a linear operator and it can eliminate the intercross terms. Hence, it h...
AM-FM Interference Excision Using Projection Filtering in Pseudonoise Code Fuzes
Liu Ji-bin, Liu Shun-li, Zhao Hui-chang
2005, 27(3): 434-437.
Abstract:
Based on principle of orthogonal projection filtering, it is introduced firstly, the method of AM-FM interference excision using projection filtering in pseudo-random code fuzes is analyzed in detail. Moreover, the method in some cases is simulated. ...
Calculation and Simulation of the Position Area to Radar Using CEP
Ruan Huai-lin, Luo Jing-qing, Xia Da-yong
2005, 27(3): 438-440.
Abstract:
A new calculated method of the position area to radar is presented. The method is that the Circular Error Probability(CEP) of the smaller area is calculated using the parameters of the place of two and three radar devices. When CEP of some smaller ar...
The Unified Network Model Analysis of the Loaded Antenna Array for Direction Finding
Liu Hai-xia, Li Long
2005, 27(3): 441-444.
Abstract:
This paper first presents the unified network model associated antennas with loaded networks, which shows that the loaded circuit networks and the antennas (field networks) are unified by the generalized matrix Ohm’s law. Based on the theory of the u...
A Remote Sensing Image Compression Algorithm Based on Low-Complexity Embedded Zeroblock Coder
Wu Jia-ji, Wu Cheng-ke
2005, 27(3): 445-448.
Abstract:
In this paper, a new coding approach to remote sensing images is proposed according to the statistical characteristic of remote sensing images data. The approach is based on an improved embedded, zeroblock-based, image wavelet transform coding algori...
Low Power Clock-Gating Method and Its Applications in SAR Real-Time Processor
Chen Bing-bing, Shao Jie, Wang Zhen-song, Zhao Rong-cai
2005, 27(3): 449-453.
Abstract:
Power consumption has to be taken into consideration in an applied SAR real-time processor. The power consumption is measured before and after clock-gating method had been applied to DSP, SBSRAM and FPGA of an air-borne SAR real-time preprocessor boa...
A Wavenumber Domain Algorithm Integrating with the Motion Compensation
Pan Feng-yan, Xing Meng-dao, Liao Gui-sheng
2005, 27(3): 454-457.
Abstract:
The wavenumber domain algorithm (ur-k algorithm for short) has the ability to process wide-beam SAR data because it has the ability to handle the range-azimuth coupling correctly. However, because the traditional nj-k algorithm can not integrate with...
Phase Unwrapping of Noisy SAR Interferograms by Optimizing the Path
Li Wen-qiang, Li Jing-wen
2005, 27(3): 458-461.
Abstract:
Phase unwrapping is so important that it determines the precision of the DEM of INSAR directly. To improve the precision of phase unwrapping, a new method based on method of Goldstein is given. Qualification data are produced with the inconsistent po...
Range Profile Recogniton of Radar Target Based on the Kernel-Based Methods
Meng Ji-cheng, Yang Wan-lin
2005, 27(3): 462-466.
Abstract:
The classification mechanism of the kernel-based methods in pattern recognition, i.e. SVMs, nonPCA, and nonLDA, are analyzed in detail in this paper. The range profiles of radar target are recognized by the kernel-based methods. The results of the si...
Estimation of Distribution Algorithm Based on Generic Gaussian Networks
Zhong Wei-cai, Liu Jing, Liu Fang, Jiao Li-cheng
2005, 27(3): 467-470.
Abstract:
Estimation of Distribution Algorithms (EDAs) available in continuous domains are based on non-generic Gaussian networks. The computational cost for learning this kind of networks is very great, moreover the low accuracy of Ihe joint pdf will be resul...
Tracking Fusion with Dissimilar Sensors for Linear Systems with Correlated Measurement Noises
Zhang An-min, Han Chong-zhao
2005, 27(3): 471-473.
Abstract:
Tracking fusion with dissimilar sensors, which is a challenge work in multisensor fusion, is studied. Under the condition of general correlated measurement noises, the centralized and distributed tracking fusion question is investigated based on line...
An Image Retrieval Method in JPEG2000 Compressed Domain
Ni Lin, Miao Yuan
2005, 27(3): 474-477.
Abstract:
The data structure in JPEG2000 compressed domain is firstly analyzed. The concept of information tree and a novel tree-distance measurement are then proposed. Finally, a new image retrieval method in JPEG2000 compressed domain is proposed. Experiment...
Intelligent Digital Watermarking Technique Based on ICA
Zhang Li, Qian Gong-bin, Ji Zhen
2005, 27(3): 478-482.
Abstract:
A new blind intelligent image watermarking technique proposed in this paper adopts intelligent information disposal-independent component analysis. The characteristics of the human visual system are incorporated into the watermark embedding and a clo...
Application of MAFIA in Three-Dimensional Dynamic PIC Simulation of TWT Multistage Depressed Collector
Liao Ping, Yang Zhong-hai, Li Bing, Lei Wen-qiang, Liao Li, Gao Xun-hong
2005, 27(3): 483-486.
Abstract:
After analyzing the classic 2-D steady-state trajectory method for multistage depressed collectors simulation and design and its limitation, a novel method of full three-dimensional (3-D) dynamic PIC simulation using MAFIA a three dimensional electro...
An Improved K-Nearest Neighbor Algorithm
Wang Xiao-ye, Wang Zheng-ou
2005, 27(3): 487-491.
Abstract:
This paper presents a improved K-NN algorithm. The CURE clustering is carried out to select the subset of the training set. It can reduce the volume of the training set and omit the outlier. Therefore it can lead both to computational efficiency and ...
Wide Bandwidth LFM Signal Generator Based on Double Frequency Chains
Xia Tie-qi, Si Qiang, Xiang jing-cheng
2005, 27(3): 492-494.
Abstract:
Based on Linear Frequency Modulated (LFM) pulse compression signal, a system which has two resolution with 1200MHz carrier and 200MHz and 66.7MHz bandwidth, is designed and implemented. According to the measurement results, the spurious signals invol...
Realization of FIR Filter with Minimum Adders
Yin Min, Tang Yao
2005, 27(3): 495-497.
Abstract:
This paper presents a realization scheme based on shifting and adding operation, sub-expression, and multiplier module. First it gives the definition of partly-common sub-expression. Then it introduces a matrix used for searching proper partly-common...
An Efficient Authentication and Payment Protocol for Mobile Communication
Wan Ren-fu, Li Fang-wei, Zhu Jiang
2005, 27(3): 498-501.
Abstract:
Based on a micro-payment model of Unbalanced One-way Binary Tree (UOBT), this paper proposes an efficient protocol for mutual authentication and electronic payment with the capability of arbitrating disputed bills. This protocal can protect subscribe...
Preconditioning Method Based
Li Lei, Zhang Yu, Xie Yong-jun, Liang Chang-hong
2005, 27(3): 502-504.
Abstract:
A new preconditioning method based on neighbor element which has distinct physical background is presented in this paper. The dominant information of impedance matrix is fully considered in the neighbor element preconditioner. The preconditioner is g...