Advanced Search

2006 Vol. 28, No. 3

Display Method:
Articles
Lossless Video Compression System Designation
Xia Jie, Hou Chao-huan
2006, 28(3): 385-389.
Abstract:
It will create the problem of great degradation in video quality, when the digital video is compressed by using lossy video compression algorithm more than once. That will reduce the rate of reusing the digital video. Thus a new lossless video compre...
A New Adaptive Rate Control Algorithm with Spatial Scalability for Video Coding
Zhang Jian-long, Wu Cheng-ke, Xiao Song, Du Jian-chao
2006, 28(3): 390-395.
Abstract:
In the traditional CBR rate control algorithm, the skipping method is adopted to combat the overflow of video buffer , in which the motion compensation error and picture distortion are increased with the number of skipping frame. To deal with the dis...
Blind Rate Detection Applied in the IPR-OFDM System
Liu Sheng-mei, Zhao Chun-ming, Li Can-wei
2006, 28(3): 396-399.
Abstract:
This paper presents a blind detection method for the IPR-OFDM (Interleaving and Phase Rotation- Orthogonal Frequency Division Multiplexing) system. The proposed method is used to recover the interleaving order and detect the received data in the rece...
A Joint Time and Frequency Acquisition Algorithm for OFDM Systems
Lei Jun, Wu Le-nan
2006, 28(3): 400-403.
Abstract:
A combined time and frequency acquisition algorithm for OFDM systems is derived in this paper. The proposed technique estimates the symbol beginning and the fractional frequency offset with the periodicity of Cyclic Prefix (CP), and simultaneously ac...
Fast Arithmetic in Generalized Optimal Extension Fields
Wang Qing-xian, Sun Shi-xin
2006, 28(3): 404-406.
Abstract:
In Elliptic Curves Cryptosystems (ECC), the optimal extension fields is preferable to others method, whether concerns performance or memory request. But, it is very difficult to choose pseudo-Mersenne prime numbers, and satisfy the condition that p j...
A Complete Asymmetric Public-Key Traitor Tracing Scheme
Wang Qing-long, Yang Bo
2006, 28(3): 407-409.
Abstract:
Based on oblivious polynomial evaluation, this paper presents a new asymmetric public-key traitor tracing scheme. Compared with the previous schemes, this proposed scheme can accurately determine a or all traitor(s) from an illegal decoder by full bl...
A Related-Key Attack on Chaotic Stream Ciphers
Jin Chen-hui, Yang Yang, Qi Chuan-da
2006, 28(3): 410-414.
Abstract:
In this paper the authors first present a related-key attack on chaotic stream ciphers. Combining the idea of linear cryptanalysis and divide-and-conquer attack on chaotic ciphers, the attack uses the output sequences created by multiple related keys...
A New Wavelet-Based Denoising Method for OFDM Channel Estimation
Zhang Bao-yu, Zhang Ji -dong
2006, 28(3): 415-418.
Abstract:
In this paper a new method of OFDM channel estimation with noise reduction, based on wavelet transform, is given. The channel estimation algorithm is divided into least-squares estimation and noise reduction. The method does not need any statistical ...
Performance of Wireless Relaying System Based on Selection Diversity Techniques
Zhang Jing-mei, ShaoChun-ju, Wang Ying, Zhang Ping
2006, 28(3): 419-423.
Abstract:
Cooperative relaying can combat multi-path fading and shadowing effect in wireless networks to enhance communication quality and bandwidth efficiency. A two-hop relaying system model is provided in this paper, and the analytical evaluations of non-re...
Performance of an Adaptive DS-UWB Receiver in High-Speed Wireless Indoor Transmission Environments
Liang Zhong-hua, Zhu Shi-hua, Wang Shao-peng
2006, 28(3): 424-428.
Abstract:
An adaptive receiver scheme employing the training sequences of flexible length is proposed for DS-UWB systems. By fully exploiting the NLMS algorithms robust behavior on convergence rate, complexity and stability, the proposed scheme is capable of p...
Analysis of Serial Acquisition of Two Dimensional Spread Spectrum System in Multipath Fading Channels
Cheng Lu, Tang You-xi, Li Shao-qian
2006, 28(3): 429-432.
Abstract:
In this paper, a method of time synchronization of 2D Spread Spectrum (2DSS) system in multipath fading channels is proposed. The detection probability and false-alarm probability are analyzed and also the numerical results on condition of different ...
Performance Analysis of Adaptive MIMO-OFDM System with Imperfect Channel Information
Wang Yong-xue, Chen Fang-jiong, Wei Gang
2006, 28(3): 433-436.
Abstract:
As adaptive MIMO-OFDM system can greatly improve the spectral efficiency, many people are studying it. The imperfect Channel State Information (CSI), which is caused by two major factorschannel estimation error and CSI delay, and their impacts on the...
Noncoherent Antenna Selection Algorithem for MIMO System
Song Gao-jun, Zhou Zheng-zhong
2006, 28(3): 437-439.
Abstract:
This paper presents a NON-coherent Antenna Selection (NON-AS) algorithm for multi-antenna transmission system. The combination of Generalized Likelihood Ratio Test (GLRT) and Antenna Selection (AS) is applied to Unitary (U)signal transmission system,...
Impact of Doppler on BER Performance in TDD Pre-equalization OFDM Systems
Liu Da-wei, Tang You-xi, Li Shao-qian
2006, 28(3): 440-445.
Abstract:
The impact of Doppler on the receivers BER performance of TDD pre-equalized OFDM systems is investigated. The analytic BPSK BER expressions of amplitude and phase pre-equalized OFDM systems in multi-path Rayleigh fading environment are given, which u...
Performance of PRMA-AC: A Congestion Control PRMA Protocol for Satellite Communication
Zhuo Yong-ning, Yan Shao-hu, Wu Shi-qi
2006, 28(3): 446-450.
Abstract:
There is problem of channel congestion caused by the increased channel contention in satellite communication system with Packet Reservation Multiple Access (PRMA) protocol when the payload (amount of user terminals) goes up, and the long propagation ...
Provisioning of Protection for Dynamic Multicast Traffic Against Single Duct Failures in WDM Networks
Cheng Xiao-jun, Ge Ning, Feng Chong-xi
2006, 28(3): 451-454.
Abstract:
Under the construction of optical networks, in order to reduce construction cost, several links may pass through a duct. In many cases, fibers fail due to duct failures. It is required to provide protection against duct failures. The paper investigat...
Bit Soft-Output Algorithm for Dual N-ary Orthogonal Spread Spectrum System
Zhang Yu-ming, Cheng Yun-peng, Wei Sheng-qun, Shen Liang
2006, 28(3): 455-460.
Abstract:
Focusing on Turbo-coded dual N-ary orthogonal spread spectrum system, this paper proposes an algorithm for computing bit soft metric based on Maximum a Posteriori Probability (MAP) criterion, and then presents a simplified MAP algorithm. Meanwhile, t...
Narrow-Band Interference Suppression in Transform Domain Based on Adaptive Multi-threshold Algorithm
Zhang Chun-hai, Xue Li-jun, Zhang Er-yang
2006, 28(3): 461-465.
Abstract:
This paper studies the narrowband interference suppression algorithm based on threshold detection in transform domain, and a novel adaptive multi-threshold narrowband interference detection algorithm is proposed. Theoretical analysis and simulations ...
A Novel Algorithm of Multi-focus Image Fusion Using Adaptive PCNN
Miao Qi-guang, Wang Bao-shu
2006, 28(3): 466-470.
Abstract:
The proposed new fusion algorithm is based on the improved Pulse Coupled Neural network(PCNN) model, the fundamental characteristics of multi-focus images and the properties of human vision system. Compared with the traditional algorithm where the li...
ICA Method Based on 2-D Wavelet Transform and Its Application to Image Separation
Wang Ming-xiang, Fang Yong, Hu Hai-ping
2006, 28(3): 471-475.
Abstract:
In this paper, a kind of new Independent Component Analysis (ICA) method based on 2-dimensional wavelet transform is proposed. According to the research, the steady-state error of the Natural Gradient Algorithm (NGA) is inverse proportional to the qu...
Spatial Spectrum Estimation Using Vector Hydrophone Array in a Reflecting Boundary
Deng Da-xin, Lin Chun-sheng, Huang Bin, Gong Shen-guang
2006, 28(3): 476-479.
Abstract:
The vector hydrophone is composed of three spatially co-located but orthogonal oriented velocity hydrophone plus another co-located pressure hydrophone. To understand the performance of DOA estimation using vector hydrophone array in a reflecting bou...
Nonlinear Statistical Matching for Subband Robust Speech Recognition
Sun Wei, Wu Zhen-yang, Liu Hai-bin
2006, 28(3): 480-484.
Abstract:
The performance of the speech recognition systems is deteriorated dramatically under noise condition for variation of speech signal. According to the auditory tests, this paper proposes a new nonlinear sub-band Maximum A Posteriori (MAP)statistical m...
Watershed Segmentation Based on Morphological Scale-Space and Gradient Modification
Wang Xiao-peng, Hao Chong-yang, Fan Yang-yu
2006, 28(3): 485-489.
Abstract:
A method for watershed image segmentation based on morphological scale-space and gradient modification is proposed to avoid over-segmentation and the drawbacks of some improved watershed segmentations. Firstly, morphological hybrid opening and closin...
Face Recognition Based on Two-Dimensional Gabor Wavelets
Cao Lin, Wang Dong-feng, Liu Xiao-jun, Zou Mou-yan
2006, 28(3): 490-494.
Abstract:
A new approach based on two-dimensional Gabor wavelets transform for face recognition is presented. The Gabor wavelet representation of an image is the convolution of the image with a family of Gabor kernels. A set of vectors called nodes, over a den...
Netted Radar Data Enhancement Based on Detail Entropy Minimization
Wu Chang-ying, Gu Wen-tao, Xu Jia-dong
2006, 28(3): 495-497.
Abstract:
Detail entropy is proposed which can indicate the image clarity much accurately in the case of that image has slowly changed part. A technique based on detail entropy minimization principle is developed for fusing netted radar data. For complex radar...
Optimal Polarization Filtering and Its Performance Analysis
Xu Zhen-hai, Wang Xue-song, Shi Long-fei, Xiao Shun-ping, Zhuang Zhao-wen
2006, 28(3): 498-501.
Abstract:
The optimal polarization filtering is investigated, which can be described as optimization with a nonlinear restriction. The nonlinear restriction is removed through an intermediary variable. According to the extremum necessary condition, the optimiz...
Imaging Algorithms and Analysis of Airborne SAR in Large Squint Mode
Wang Liang, Yu Wei-dong
2006, 28(3): 502-506.
Abstract:
This paper studies image algorithms and analyses imaging quality of air-borne Synthetic Aperture Radar (SAR) in large squint mode. Based on the spatial geometry model of squint mode air-borne SAR and echo response, a method to improve RD algorithm is...
Compression of SAR Raw Data with Normalized Adaptive Predictive Vector Quantization
Guan Zhen-hong, Zhu Dai-yin, Zhu Zhao-da
2006, 28(3): 507-511.
Abstract:
This paper presents a new SAR raw data compression algorithm named Normalized Adaptive Predictive Vector Quantization (NAPVQ). The normalized SAR raw data are firstly processed with vector linear predictor, and then the error vectors are compressed w...
Ambiguity Function of Formation Flying Satellites SAR System
Li Li, Wang Yan-fei, Zhang Bing-chen
2006, 28(3): 512-516.
Abstract:
In this paper, the ambiguity function is defined and derived from the character of formation flying satellites SAR. The results of the computer simulations demonstrate the efficacy of the proposed function. Further, by analyzing the ambiguity functio...
A Statistical Identification Method of Polarimetric High Resolution Rangeprofile
Feng De-jun, Wang Xue-song, Xiao Shun-ping, Wang Guo-yu
2006, 28(3): 517-521.
Abstract:
For the polarimetric and high-resolution radar system, a novel method is proposed, where the polarization and high resolution range profile are integrated for radar target recognition. The physical-statistical non-Gaussian model is used to model for ...
Analysis of Geometry Resolution Characteristics of Distributed Satellites Bistatic SAR
Yan Hong-hui, Wang Yan-fei
2006, 28(3): 522-525.
Abstract:
Distributed satellites bistatic SAR can be considered as a kind of bistatic/multi-static SAR system, whose transmitters and receivers move in parallel. Based on this, in this paper, the geometry resolution of distributed satellites SAR is analyzed us...
Long Distance Source Localization with Passive Synthetic Aperture Sonar
Huang Yong, Li Yu, Liu Ji-yuan
2006, 28(3): 526-531.
Abstract:
In this paper, a new technique about long distance source localization with passive synthetic aperture sonar array is presented. At first, a sound field receiving equation for synthetic aperture sonar is derived. Then, this new method is described in...
Study of Situation Assessment Method Based on Plan Recognition Theory
Li Wei-sheng, Wang San-min, Wang Bao-Shu
2006, 28(3): 532-536.
Abstract:
For the shortage of plan recognition method presented by Kautz(1987) in controlling mechanism, a plan recognition method based on planning knowledge graph is discussed in detail. Using first-order predicate logic as formal language, an instance of ta...
A Quantum Public-Key Cryptosystem and Message Authentication Scheme Based on Quantum CSS Error Correcting Codes
Li Zheng, Ma Zhi, Lü Xin, Feng Deng-guo
2006, 28(3): 537-541.
Abstract:
This paper presents a quantum public-key cryptosystem by using quantum Calderbank-Shor-Steane(CSS) error correcting codes and the NPC problem related with decoding general linear codes. It uses classical key to encrypt quantum message, and its securi...
Research on the Construction of Public-Key Cryptosystems Based on LFSR Residuosity Problem
Jiang Zheng-tao, Liu Yi, Wang Yu-min
2006, 28(3): 542-545.
Abstract:
Further research on the construction of public-key cryptosystem based on Linear Feedback Shift Register (LFSR) is provided, and the LFSR higher (non) residuosity problem is defined. Based on new intractability problems a new public-key encryption pri...
The Security Research of Multiple Mobile AgentSystem Based on Secret Splitting
Wang Hai-yan, Wang Ru-chuan
2006, 28(3): 546-550.
Abstract:
Since the introduction of Mobile Agent (MA), security is always an important issue for its restriction to the MAs wide-application. As the extension of distributed Client/Server computing, the present idea of multiple mobile agents gives a new way fo...
Modeling Click-to-Dial Service with Petri Nets
Zhu Xiao-min, Liao Jian-xin, Wang Peng, Wang Jian-bin
2006, 28(3): 551-556.
Abstract:
A new method combining the protocol conversion methodology and the Petri nets theory is proposed to study application layer protocol conversion. According to the procedure proposed by the protocol conversion methodology, the Click-To-Dial (CTD) servi...
A Scheduling Algorithm for Improved QoS Support of Multiclass Data Service on IP Networks
Guo Xiao-qing, Wu Jie-yi, Zhang Sha-bing
2006, 28(3): 557-561.
Abstract:
QoS supports of multiclass data service in IP network includes generally packet delay, throughput and loss rate, while the majority last research focus on either minimizing packet delay and loss or maximizing user throughput. In this paper, an algori...
A Novel Directed Diffusion Mechanism for Wireless Sensor Networks
Ren Biao, Liu Li-feng, Ma Jian
2006, 28(3): 562-566.
Abstract:
Directed diffusion is a classical data propagation protocol for wireless sensor networks. In directed diffusion routing, the diffusion of exploratory data can inevitably lead to heavy traffic periodically. Then the performance of data propagation may...
Study of Routing Algorithm in Multichip Modules
Chang Yi-feng, Yang Yin-tang
2006, 28(3): 567-569.
Abstract:
Aiming at the uneven routing results and much noise, this paper presents an improved method for multichip module routing that based on the four-via routing algorithm. By using the PST(Priority Search Tree) and LEA(Left Edge Algorithm) algorithms to r...
Simulation-based TCP Performance in Wired/Mobile Ad hoc Networks
Qiao Yan-tao, Jin Yan-liang, Yu Song-yu
2006, 28(3): 570-573.
Abstract:
Mobile Ad hoc NETworks (MANET) are an ideal technology in future civilian and military applications and it will become necessary to communicate across MANET and the wired Internet. In this paper, It is investigated that the effect of some key issues,...
FDTD Analysis of the Crosstalk Reduction with Guard Trace Between Microstrips
Li Li-ping, Li Yu-shan, Wang Chong-jian
2006, 28(3): 574-576.
Abstract:
As the velocity of signal switch becoming fast, the crosstalk in high-speed circuit design is becoming worse than ever. The performance of guard traces in reducing the crosstalk between microstrips is analyzed and simulated with FDTD method in this p...