Advanced Search

2005 Vol. 27, No. 4

Display Method:
Articles
Optimal Design of Novel UWB SSCI Synthesis Pulse Signal
Zhang Lu-yong, Wang Xiao-yu, Zhou Zheng
2005, 27(4): 505-508.
Abstract:
A Spread Spectrum CI(SSCI) synthesized narrow pulse technique is put forward based on UWB CI pulse, a narrow pulse signal synthesized by several coherent carriers. The power spectrum density is decreased, the frequency usage efficiency is improved an...
Research on Performance of LDPC Coded BICM Schemes Using Pre-decision Message
Zhang Hai-gang, Li Chang-chun, Ma Pi-ming, Yuan Dong-feng
2005, 27(4): 509-513.
Abstract:
Low-Density Parity Check(LDPC) coded Bit-Interleaved Coded Modulation (BICM) schemes are analyzed in this paper. The schemes using decoding method without iteration between demodulator and decoder are first simulated. Then a novel method using pre-ha...
Performance Analysis of Golomb Codes and Extended Gamma Codes for Arbitrary Probability Distributions
Yang Sheng-tian, Qiu Pei-liang
2005, 27(4): 514-518.
Abstract:
The upper and lower bounds of the average codeword length of Golomb codes for arbitrary probability distributions as well as an optimal rule for choosing parameters are given in terms of the mean of sources. Furthermore, a class of extended gamma cod...
An Improved Belief-Propagation Algorithm with Channel Estimation of LDPC under Block Fading Channels
Deng Jian-min, Yin Chang-chuan, Ji Hong, Yue Guang-xin
2005, 27(4): 519-522.
Abstract:
Firstly it is proved by simulation that the Low Density Parity Check(LDPC) code has sound performance under block fading channel when decoded by general belief-propagation algorithm. Then based on its special iterative nature, the improved belif-prop...
Phase Estimation Accuracy Based on Piecewise Polynomial-Phase Modeling Method with Short Sequences
Lu Kun, Liu Xing-zhao
2005, 27(4): 523-526.
Abstract:
In this paper, the performance of polynomial phase coefficient estimation algorithm based on High-order iguity Function (HAF) for non-polynomial phase signal with short sequences is discussed in detail. Further, ntaneous phase estimation method is de...
On the Maximum-Likelihood SNR Estimation Algorithm for MPSK Signals
Xu Hua, Zheng Hui
2005, 27(4): 527-531.
Abstract:
The data-aimed (DA) Signal-to-Noise Ratio (SNR) estimation algorithm, Decision-Directed (DD) SNR estimation algorithm and a new blind SNR estimation algorithm for MPSK signals are presented in this paper with maximum-likelihood principle. The detail ...
Blind Source Separation of Underwater Signals Using Single Frequency Bin
Jiang Wei-dong, Lu Ji-ren, Zhang Hong-tao
2005, 27(4): 532-535.
Abstract:
A new blind signal separation method, where only one frequency bin is used, is presented to separate the underwater signals. Using this method, the indeterminacy in amplitude and permutation can be eliminated, and the validity of this method is confi...
Bias, Variance and Risk Analysis of Uniform Threshod Function in Wavelet Shrinkage
Zhao Zhi-dong, Pan Min, Chen Yu-quan
2005, 27(4): 536-539.
Abstract:
In this paper, the uniform threshold function of waveshrink is build.Cornputationally efficient formulas for computing bias, variance and risk of uniform threshold function are derived. These formulas provide a new way of understanding how waveshrink...
Tracking of the Facial Region in Color Video Sequences Using an Improved Narrow Band Algorithm
Chen Wei-gang, Qi Fei-hu
2005, 27(4): 540-543.
Abstract:
A novel method based on geometric active contour model for face tracking is presented. After performing the chromatic histogram backprojection, facial region appears as a homogeneous region in the backprojected image. An improved narrow band algorith...
A Hybrid Method for Face Recognition Based on Fractal Coding and Singular Value Decomposition
Cao Lin, Liu Xiao-jun, Zou Mou-yan
2005, 27(4): 544-547.
Abstract:
In this paper, a new face recognition method based on fractal coding is proposed. Fractal singular value neighbor distance is brought forward based on fractal neighbor distance. Fractal coding and local singular value decomposition are used to improv...
Text Fuzzy Clustering Algorithm Based on Rough Set and Genetic Algorithm
Wang Ming-chun, Wang Zheng-ou
2005, 27(4): 548-551.
Abstract:
This paper presents a text fuzzy clustering algorithm which combines rough set and genetic algorithm fully. In the clustering process, the weight parameters are also described by genetic algorithm, thus it makes parameters more reasonable and operati...
Research on Model Selection Based on Function Set Information Quantity
Sheng Shou-zhao, Wang Dao-bo, Wang Zhi-sheng, Huang Xiang-hua
2005, 27(4): 552-555.
Abstract:
The concepts of the Subspace Information Quantity(SIQ) and Function Set Information Quantity(FSIQ) are presented; Then the problem of model selection based on FSIQ are discussed explicitly, and the approximate method of model selection based on limit...
An Improved Sticker Model of the Minimal Covering Problem
Dong Ya-fei, Zhang Jia-xiu, Yin Zhi-xiang, Xu Jin
2005, 27(4): 556-560.
Abstract:
DNA computing is a new computation method with simulating molecular biology structure of DNA and by means of molecular biology technology. This method has been widely used in many respects. Simply reviewed the progress of DNA computing, the paper int...
Targets Peak Extraction from High-Resolution SAR Image and Peaks Stability Analysis
Gao Gui, Ji Ke-feng, Kuang Gang-yao, Li De-ren
2005, 27(4): 561-565.
Abstract:
Peak sequence matching is a important approach to SAR ATR. A general Gaussian model for peak is given in this paper and the extraction method is designed based on this model. Utilizing actual target database, the variability of targets peaks with tar...
Application of Rayleigh Quotient-Desampling FIR Filter in Passive Location System Using the FM Broadcast Signals
Zhao Hong-li, Wu Tie-ping, Bao Zheng
2005, 27(4): 566-569.
Abstract:
According to the characteristic of coherent pulse compression in the passive location system using the FM broadcast signals, the desampling FIR filter is necessary and feasible. The maximum of SNR after coherent pulse compression is defined as the pr...
Design of Two-Channel Signal-Adapted FIR Filterbanks without Perfect Reconstruction Constraints
Wang Lan-mei, Shui Peng-lang, Liao Gui-sheng, Wang Gui-bao
2005, 27(4): 570-573.
Abstract:
This paper investigates the time-domain design method of two-channel signal-adapted FIR alias-free filterbanks without Perfect Reconstruction (PR) constraints. For subband coders based on filterbanks without PR constraints, the total distortion is co...
Zero-Antisymmetrical Dyadic Wavelet-Based Oil Spill Detection Method in SAR Images
Xue Hao-jie, Chong Jin-song
2005, 27(4): 574-576.
Abstract:
Oil spill detection is one of the very important application fields in Synthetic Aperture Radar (SAR) images. Wavelet method is an edge detection method broadly researched in resent years. Normal oil spill detection uses the first and second derivati...
Efficient Wideband Jammer Nulling in Large Scanning Angle
Cao Yun-he, Zhang Shou-hong, Wang Sheng-hua, Luo Yong-jian
2005, 27(4): 577-579.
Abstract:
Phased array radar combined with wideband technique is the development trend in radar, while technology of restraining wideband interference must be resolved in wideband phased array radar. A new wideband transmitting beamforming method is presented ...
Analysis of Exponentially Forgetting Distribution
Li Tao, Tang Jian-long, Yang Shao-quan
2005, 27(4): 580-583.
Abstract:
The analysis of exponentially forgetting transform (EFT) is made in this paper. The application of a sliding single-sided exponential window, make it possible the iterative operation in EFT which greatly raises computation efficiency. Compared with o...
A Joint Power and Rate Allocation Scheme for MMSE Receiver in WCDMA Systems
Liu Jia-bin, Zhu Shi-hua, Li Wen-yuan
2005, 27(4): 584-587.
Abstract:
A combined power control and data rate adjustment scheme with Minimum Mean Square Error (MMSE) receiver for the 3GPP Wideband Code Division Multiple Access (WCDMA) reverse link is proposed. It can guarantee target SIR while keeps transmit power at th...
On Channel Capacity of MIMO Systems
Wang Jun, Zhu Shi-hua, Wang Lei
2005, 27(4): 588-591.
Abstract:
The paper studies the capacity of a Multiple Input Multiple Output (MIMO) system with correlated fading under the constrain of fixed space for the receiver UCA antennas. The fading correlation model is established and the impacts of the number of ant...
Interpolation in Symbol Synchronization and Its Implementation
Liu Ning
2005, 27(4): 592-594.
Abstract:
The sampling time of the receiver might miss the best decision point when sampling clock is fixed and rate of sampling is limited. Under this circumstances, symbol decision is affected badly by ISI. In this paper, a method of enhancing the precision ...
Adaptive Non-linear LTJ Filter Techniques for Interference Suppression in CDMA Communication Systems
Liang Ji-ye, Wang Hai-jiang, Liang Xu-wen, Yang Gen-qing
2005, 27(4): 595-598.
Abstract:
In this paper, a LTJ-based adaptive nonlinear filter and the application for narrowband interference suppression in satellite CDMA communication systems is researched. The filter based on LTJ structure used both Lattice and LMS adaptive structures, h...
Peak-to-Average Power Ratio Reduction in MC-CDMA Systems by Using Partial Transmit Sequence Schemes
Wu Lin-jun, Zhu Shi-hua, Feng Xing-le
2005, 27(4): 599-602.
Abstract:
The un-uniform adjacent subcarrier partition method is proposed in order to reduce the Peak-to-Average power Ratio (PAR) of the signal in MultiCarrier-CDMA(MC-CDMA) systems by using Partial Transmit Sequence (PTS) scheme. That is reducing the number ...
A Two Dimensional Processing Based Channel Estimation Method for Wireless OFDM Systems
Shang Zheng, Zhu Jin-kang
2005, 27(4): 603-607.
Abstract:
This paper proposes a novel channel estimation method for wireless Orthogonal Frequency Division Multiplexing (OFDM) systems. The method can significantly reduce the Inter-Carrier Interference (ICI) and additive white Gaussian noise by processing the...
Publicly Verifiable Encryption for ElGamal/RSA Encryption
Wu Qian-hong, Wang Ji-lin, Yuan Su-chun, Wang Yu-min
2005, 27(4): 608-611.
Abstract:
A publicly verifiable encryption scheme allows any entity to verify that a cipher-text hides the same message as committed before without revealing it. It is important to construct fair exchange scheme, publicly verifiable secret sharing and cheater-...
Chosen Ciphertext Security of Hybrid Schemes of Symmetric and Asymmetric Encryption
Chen Yuan, Dong Qing-kuan, Xiao Guo-zhen
2005, 27(4): 612-616.
Abstract:
The definition and related conclusions of chosen ciphertext security IND-CCA (INDistinguishability against adaptive-Chosen Ciphertext Attack) of hybrid encryption of symmetric and asymmetric encryption are discussed. Having studied two kinds of hybri...
Density Evolution Method and Threshold Decision for Irregular LDPC Codes
Xiao Juan, Wang Lin, Deng Li-zhao
2005, 27(4): 617-620.
Abstract:
In this paper, the principle of density evolution combined with decoding process is explained firstly. Two algorithms discretized density evolution and Gaussian approximation to program the evolution proceeding are discussed. Simulation results of so...
An Efficient Encryption Scheme with Choosable Process of Verifying Integrity and Source of Messages
Jiang Zheng-tao, Pang Liao-jun, Wang Yu-min
2005, 27(4): 621-624.
Abstract:
The efficiency of a public-key encryption scheme proposed by P. Paillier et al. is improved. The equivalence of security of the improved encryption scheme and that of the original encryption scheme is proved. Without increasing the size of the cipher...
Auto-correlation Function of Generalized Jacobi Sequences
Zhou Xuan, Li Chao
2005, 27(4): 625-628.
Abstract:
Correlation function is the important parameter for studying the security of sequence cipher. This paper discusses the auto-correlation of two classes of generalized Jacobi sequences and gives their values of auto-correlation. The results show that t...
Study on the Application of Distributed Wireless Token Ring Protocol in Wireless Ad Hoc Networks
Peng Yi, Zhao Dong-feng, Zhou Zheng-zhong, Zha Guang-ming
2005, 27(4): 629-633.
Abstract:
This paper presents an uncontested Distributed Wireless Token Ring Protocol(DWTRP), based on the Wireless Token Ring Protocol(WTRP). The simulation results show that the average delay and average queue length in DW.TRP system are much more lower than...
Study of an Efficient Distributed QoS Routing Algorithm
Shi Yan, Liu Zeng-ji, Sheng Min
2005, 27(4): 634-637.
Abstract:
A novel distributed QoS routing algorithm, the metric of which is bandwidth, is presented in this paper. It not only keeps the merits of simplicity and low link overhead in traditional distributed QoS routing algorithm, but also can reduce resource f...
An Advanced Algorithm for Fast Lower-Cost Shortest Path Tree
Liu Shu, Li Wei-sheng, Wang Tao
2005, 27(4): 638-641.
Abstract:
Lower-cost shortest path tree is a commonly-used multicast tree type, which can minimize end-to-end delay and at the same time reduce bandwidth as possible. This article presents an algorithm for lower cost shortest path tree. The algorithm adjusts t...
Explanation of Slowly Decreasing Wave in Frequency Domain
Jin Long, Ruan Cheng-li
2005, 27(4): 642-646.
Abstract:
The character of radiation of disk radiator is analyzed with transfer function in frequency domain. Near or far field and law of energy propagation are presented at axes of disk. Time domain electromagnetic waves are analyzed in detail by defining a ...
Study of Parallel MoM on PC Clusters
Zhang Yu, Wang Meng, Liang Chang-hong, Xie Yong-jun
2005, 27(4): 647-650.
Abstract:
Prohibitive computation resources and too much time are needed for EMC analysis of complicated EM environment. To overcome this drawback, a parallel algorithm that combined MoM with MPI functions is studied in this paper. The tessellation scheme is e...
Using Boolean Satisfiability for Combinational Equivalence Checking
Zheng Fei-jun, Yan Xiao-lang, Ge Hai-tong, Yang Jun
2005, 27(4): 651-654.
Abstract:
In this paper, a new combinational equivalence checking approach using Boolean Satisfiability is proposed. The algorithm uses several methods to reduce the space of the SAT reasoning first, those methods are AND/INVERTER graph transformation, BDD pro...
A Blind Equalization Algorithm Adapt to the QAM Communication System
Pan Li-jun, Liu Ze-min
2005, 27(4): 663-665.
Abstract:
In this paper, a new blind equalization algorithm adapt to the QAM communication system is proposed, which overcomes conventional General Sato Algorithm (GSA), Gonstant Modulus Algorithm. (CMA), etc. algorithms larger residual error after convergence...
A Highly Efficient Secure Electronic Auction Protocol with Full Anonymity and Fairness
Xiao Qing-hua, Ping Ling-di, Pan Xue-zeng
2005, 27(4): 666-669.
Abstract:
The protection of bidder privacy and the prevention of bidder default are the keys in the designing of secure auction protocol. But up to now, the research on both of them is still very weak. Aiming at this drawback, this paper designed a new secure ...
Multisensor Information Fusion Steady-State Optimal Wiener Deconvolution Filter
Deng Zi-li, Gao Yuan, Li Yun, Wang Xin
2005, 27(4): 670-672.
Abstract:
By the modern time series analysis method, based on the AutoRegressive Moving Average(ARMA) innovation model and Lyapunov equation, a mulisensor information fusion Wiener deconvolution filter is presented for single channel ARMA signals. It avoids th...
Reviews
Clustering Algorithms Used in Data Mining
Jiang Yuan, Zhang Zhao-yang, Qiu Pei-liang, Zhou Dong-fang
2005, 27(4): 655-662.
Abstract:
Data mining is used to draw interesting information from Very Large DataBases (VLDB). Clustering plays an outstanding role in data mining applications. Clustering is a division of databases into groups of similar objects based on the similarity. From...