Advanced Search

2009 Vol. 31, No. 11

Display Method:
Articles
Three-Dimensional Microwave Imaging Algorithm for the Surface of the Human Body Based on Wavenumber Domain Integration
Tan Wei-xian, Hong Wen, Wang Yan-ping, Wu Yi-rong
2009, 31(11): 2541-2545. doi: 10.3724/SP.J.1146.2008.01671
Abstract:
This paper presents the sampling criteria for the three-Dimensional (3-D) microwave imaging of the surface of the human body. Then the algorithm based on the wavenumber domain integration along the wave propagation direction at the given ground-range...
Specific Emitter Identification Based on Ambiguity Function
Li Lin, Ji Hong-bing
2009, 31(11): 2546-2551. doi: 10.3724/SP.J.1146.2008.01406
Abstract:
Specific emitter identification is the key research fields of modern electronic intelligence systems and electronic support measurement systems. Based on the analysis of individual features of radar emitter, a specific emitter identification algorith...
Sorting Unknown Radar Emitter Signal Based on the Complexity Characteristics
Han Jun, He Ming-hao, Zhu Zhen-bo, Wang Jie
2009, 31(11): 2552-2556. doi: 10.3724/SP.J.1146.2008.01505
Abstract:
Radar emitter sorting rate of current methods is not high and they are sensitive to the Signal Noise Ratio (SNR). In this paper, complexity characteristics are applied to sorting unknown complicated radar signal and a high sorting rate is got. The re...
SAR Image Segmentation Based on Multiscale AutoRegressive and Markov Random Field Models
Liu Ai-ping, Fu Kun, You Hong-jian, Liu Zhong
2009, 31(11): 2556-2562. doi: 10.3724/SP.J.1146.2008.01543
Abstract:
A method of SAR image segmentation based on Multiscale AutoRegressive and Markov Random Field (MAR-MRF) models is presented. MAR models is used to establish mathematic relationship among different image layers, and is combined with Markov Random Fiel...
Range Doppler Algorithm Based Missile-Borne SAR Imaging with Diving Maneuver
Qin Yu-liang, Wang Jian-tao, Wang Hong-qiang, Li Xiang
2009, 31(11): 2563-2568. doi: 10.3724/SP.J.1146.2008.01449
Abstract:
The general relative range model for non-linear trajectory is built firstly, followed by the maneuver induced phase errors analysis. The quantitative conditions of ignoring these errors are deduced later. Then this paper concerns on the issue of miss...
Analysis and Improvement of Regularization Based on lk Norm in SAR Complex-Imagery Domain
Tao Yong, Hu Wei-dong
2009, 31(11): 2569-2574. doi: 10.3724/SP.J.1146.2008.01412
Abstract:
Regularization technique can accomplish super-resolution and noise suppression by imposing prior information, which provides high quality image for target recognition. The iterative process of SAR complex imagery domain regularization based on lk nor...
Detection of Weak Ship Target Based on Taper Scale Transform
Liu Ya-bo, Li Ya-chao, Xing Meng-dao, Bao Zheng
2009, 31(11): 2575-2580. doi: 10.3724/SP.J.1146.2008.01447
Abstract:
In this paper, a new approach based on Taper Scale Transform (TST) is presented for weak ship target detection in the circumstance of strong clutter and noise. By scaling the coordinate of signal instantaneous correlation function, the coupling betwe...
SAR Target Recognition Method Based on Orthogonal Subspace of Samples
Han Zheng, Su Zhi-gang, Han Ping, Wu Ren-biao
2009, 31(11): 2581-2584. doi: 10.3724/SP.J.1146.2008.01510
Abstract:
To identify with the target images obtained by Synthetic Aperture Radar (SAR), those subspace-based methods for Automatic Target Recognition (ATR) are usually based on the range subspace of the samples. When some similar targets need to be distinguis...
A Method of Waveform Design for the Recognition of Radar Targets
Jiu Bo, Liu Hong-wei, Hu Li-ping, Wu Shun-jun
2009, 31(11): 2585-2590. doi: 10.3724/SP.J.1146.2008.01400
Abstract:
Aiming at the problems of the target-aspect sensitivities, the time-shift sensitivities and the initial phase uncertainty in the waveform design for the recognition of broadband radar targets, a novel method termed GASC (Genetic Algorithm and Slide C...
Traffic Information Radar Design Based on Phase Noise Analysis
Yang Ming-hui, Xu Jie, Sun Xiao-wei
2009, 31(11): 2591-2595. doi: 10.3724/SP.J.1146.2008.01598
Abstract:
In order to meet the needs of traffic information collection in Intelligent Transportation System (ITS), a design of K-band dual mode traffic information collection radar which can work in both Frequency Modulate Continual Wave (FMCW) mode and Contin...
Doppler Compensation for Phase-Coded Signals
Hu Ying-hui, Zheng Yuan, Geng Xu-pu, Deng Yun-kai
2009, 31(11): 2596-2599. doi: 10.3724/SP.J.1146.2008.01540
Abstract:
Phase-coded signals suffer from Doppler mismatch in pulse compression due to the characteristics of the ideal thumbtack ambiguity function. In this paper, a novel model of measuring velocity-and-range and the corresponding Doppler compensation algori...
Motional Characteristics of Exo-atmospheric Active Decoys
Rao Bin, Xiao Shun-ping, Zhao Zhi-chao, Zhao Yan-li, Wang Xue-song
2009, 31(11): 2600-2605. doi: 10.3724/SP.J.1146.2008.01476
Abstract:
In the process of ballistic missile penetration, modern active jamming systems can generate decoys resembling true target echoes in aspects of energy, waveform, or even phase modulation. These decoys can share the radar signal processors coherent pro...
Step-Size Control for the Normalized Subband Adaptive Filter
Ni Jin-gen, Shang Hui-liang, Li Feng
2009, 31(11): 2606-2609. doi: 10.3724/SP.J.1146.2008.01708
Abstract:
Fixed step-size Subband Adaptive Filters (SAFs) must carry out a trade-off between fast convergence rate and low steady-state misadjustment. According to the functional relationship between the Mean-Square Deviation (MSD) of the coefficient vector of...
Orthogonal Approximation Algorithm for Parameter Model Optimization
Yang Dan, You Lei, Zhang Xiao-hong
2009, 31(11): 2610-2613. doi: 10.3724/SP.J.1146.2008.01585
Abstract:
Image registration is transformed an unconstrained optimization problem in image mosaic. Parameter optimization model algorithm is proposed by means of quadratic form theory-- orthogonal approximation algorithm. According to properties of best-functi...
Color Optical Flow Estimation Based on Quaternion Homogeneity Differential
Pei Ji-hong, Ye Pei-ling, Xie Wei-xin
2009, 31(11): 2614-2619. doi: 10.3724/SP.J.1146.2008.01469
Abstract:
Due to representing 3-dimensional color vectors as quaternion hypercomplex numbers, a color image sequences is mapped as a quaternion hypercomplex function in 3-dimensional spatial-temporal space. By underlying hypothesis of Color Constant Model (CCM...
Matching of Interesting Points Based on Improved SIFT Algorithm
Zhang Liang, Wang Hai-li, Wu Ren-biao
2009, 31(11): 2620-2625. doi: 10.3724/SP.J.1146.2008.01440
Abstract:
This paper presents an improved SIFT(Scale Invariant Feature Transform) descriptor for local feature detection and matching in object tracking. Only the local maxima in DOG scale space are detected as candidate interesting points to improve the stabi...
Automatic Multi-categorical Objects Recognition Using Shape Statistical Models
Sun Xian, Wang Hong-qi, Yang Zhi-feng
2009, 31(11): 2626-2631. doi: 10.3724/SP.J.1146.2008.01422
Abstract:
Contour features are powerful cues for human vision system to analyze and identify objects. A new method for automatic multi-categorical objects recognition using shape statistical models is proposed to improve the disadvantages existing in most of t...
Theoretical Analysis of Direct LDA in Small Sample Size Problem
Zhao Wu-feng, Shen Hai-bin, Yan Xiao-lang
2009, 31(11): 2632-2636. doi: 10.3724/SP.J.1146.2008.01629
Abstract:
Direct LDA (DLDA) is an extension of Linear Discriminant Analysis (LDA) to deal with the small sample size problem, which is previously claimed to take advantage of all the information, both within and outside of the within-class scatter's null space...
A Blind Estimation Algorithm of the Frequency-Shaping Pulse of CPM-Signal
Zhou Jia-xi, Xu Xiao-dong, Xu Pei-xia, Dai Xu-chu
2009, 31(11): 2637-2642. doi: 10.3724/SP.J.1146.2008.01560
Abstract:
Frequency-shaping pulse is one of the essential modulation parameters for the demodulation of Continuous Phase Modulation (CPM), and it is determined by the pulse shape and pulse length. In this paper, based on the features of the auto-correlation of...
A Multi-stage FastICA Algorithm to Remove Error Propagation
Yao Jun-liang, Yang Xiao-niu, Li Jian-dong, Zhang Yan, Han Wei-jia
2009, 31(11): 2643-2648. doi: 10.3724/SP.J.1146.2008.01546
Abstract:
This paper proposes a Multi-Stage FastICA Algorithm(MSFICA) to solve the problem of error propagation in the traditional successive FastICA algorithm. MSFICA removes the error propagation effect through a two-stage structure. In order to reduce the c...
Studying on Reconstruction Sampling in Shift-Invariant Subspace with Multiplicity r from Least Squares Method
Zhu Zhao-xuan, Wang Hou-jun, Wang Zhi-gang
2009, 31(11): 2649-2652. doi: 10.3724/SP.J.1146.2008.01604
Abstract:
According to the model of sampling in shift-invariant subspace with multiplicity r, this paper proposes a reconstruction method of sampling in shift-invariant subspace with multiplicity r based on least squares method, moreover, obtains the reconstru...
Fuzzy Fisher Criterion Based Adaptive Dimension Reduction Fuzzy Clustering Algorithm
Zhi Xiao-bin, Fan Jiu-lun
2009, 31(11): 2653-2658. doi: 10.3724/SP.J.1146.2008.01550
Abstract:
The derivation mistake in Caos Fuzzy Fisher Criterion (FFC) based Semi-Fuzzy Clustering Algorithm (FFC-SFCA) is pointed out. Combining Fuzzy Compactness and Separation (FCS) clustering algorithm, a new clustering algorithm, FFC-FCS, is proposed in th...
Multiuser Carrier Frequency Offset Estimation for WiMAX Initial Ranging Based on OFDMA
Fan Da, Cao Zhi-gang, Yi Zhi-ling
2009, 31(11): 2659-2664. doi: 10.3724/SP.J.1146.2008.01413
Abstract:
Ranging is one of the most important processes in the mobile WiMAX standard, for resolving the uplink synchronization and near/far problems. In this paper, under WiMAX OFDMA framework, two Carrier-Frequency Offset (CFO) estimation methods for multius...
Robust Efficient MIMO Detector
Hu Jun-feng, Zhang Hai-lin, Yang Yuan
2009, 31(11): 2665-2670. doi: 10.3724/SP.J.1146.2008.01416
Abstract:
The unbiased Minimum Mean-Square Error-Iterative Tree Search (MMSE-ITS) detector, which is known to be one of the most efficient Multi-Input Multi-Output (MIMO) detectors available, is improved by selectively augmenting partial length paths and by ad...
Investigation of Synchronization for Software Receivers on Unmanned Aerial Vehicles(UAVs)
Xiong Hai-liang, Xiao Zhu, Yang Hong, Tian Hong-xin, Yi Ke-chu
2009, 31(11): 2671-2676. doi: 10.3724/SP.J.1146.2008.01564
Abstract:
To ensure the reliability of the data transmitting for the Unmanned Aerial Vehicles (UAVs) in dynamic environment, a novel class of fast acquisition algorithm based on Partial Matched Filters and Two-Leveled FFT(PMF-TLFFT) is proposed, which is capab...
Optimum Zero-Forcing Detection of a Modified V-BLAST System with Delay Offsets
Lin Hua-jiong, Tang You-xi, Shao Shi-hai
2009, 31(11): 2677-2681. doi: 10.3724/SP.J.1146.2008.01421
Abstract:
A modified Vertical-Bell Labs layered space-time (V-BLAST) system is proposed by Shao(2007). However, the ZF detection algorithm proposed by Shao is not the optimum under ZF criterion. In this paper, the optimum ZF detector is directly derived from t...
Energy Detection Algorithm Investigation Based on Cooperative in Cognitive Radio Systems
Yu Gui-cai, Luo Tao, Yue Guang-xin
2009, 31(11): 2682-2686. doi: 10.3724/SP.J.1146.2008.01562
Abstract:
In this paper, detection performance and detection sensitivity with detection duration and noise average power fluctuation in short time is investigated firstly. Performance accuracy and detection sensitivity drop quickly with noise average power flu...
An Admission Control Strategy of Mobile Satellite System Based on Utility and Resource Borrowing
Zhang Yu-gang, Zhang Jun, Zhang Tao
2009, 31(11): 2687-2691. doi: 10.3724/SP.J.1146.2008.00594
Abstract:
This paper proposes a Utility-Based and Channel-resource Borrowing (UBCB) call admission control strategy of mobile satellite system. In order to improve resource utilization probability and integrated performance of satellite system, the borrowing w...
SINR-Based Antenna Combining for Limited Feedback SDMA
Wang Jing, Shi Zhi-hua, Wang Yan, You Xiao-hu
2009, 31(11): 2692-2696. doi: 10.3724/SP.J.1146.2008.00362
Abstract:
The channel feedback requirement of the MISO-SDMA using Zero-Forcing (ZF) precoding in multi- antenna broadcast channels can be considerably reduced by employing more antennas at user terminals and using the related antenna combining technique. In th...
Fast Cell Selection Algorithm Based on Extension Theory and Fuzzy AHP
Zhang Hui, Xu Xiao-dong, Tao Xiao-feng, Li Jing-ya, Zhang Ping
2009, 31(11): 2697-2702. doi: 10.3724/SP.J.1146.2008.01481
Abstract:
In cellular communications, the criteria for Fast Cell Selection (FCS) usually depend on single factor, which is lack of flexibility and fairness. In order to improve FCS performance, a novel algorithm is proposed. Based on extension theory, a flexib...
An Inter-cell Power Control Method Based on IoT
Li Zhong-nian, Zheng Yi, Wang Ya-feng, Yang Da-cheng
2009, 31(11): 2703-2707. doi: 10.3724/SP.J.1146.2008.01511
Abstract:
Considering the uplink inter-cell interference in the OFDMA cellular system, an inter-cell power control method based on IoT is proposed. This method gives an amendment on the traditional power control through the exchange of the interference of the ...
Differential Characteristic Probability of Added Key on Modulo 2n Operation
Zheng Bin, Guan Jie
2009, 31(11): 2708-2712. doi: 10.3724/SP.J.1146.2008.01448
Abstract:
Added key on modulo 2n operation-Y=X+Kmod2n is a code link which is often used in cipher algorithms, as SAFER++, RC6, Phelix and so on. In this paper, the Y=X+Kmod2n is analyzed with differential cryptanalysis. And the characters of structure, counti...
R-ate Extended to Fqm
Li Bin, Wang Xin-mei, Li Xiang-jun
2009, 31(11): 2713-2715. doi: 10.3724/SP.J.1146.2008.00699
Abstract:
In order to solve the troubles of incomplete reduction tumbled in the realization of R-ate and efficient compute the R-ate, a new technique named m-R-ate, which extend R-ate from Fq to Fqm , is proposed. Furthermore, in m-R-ate a very efficient algor...
Efficient Password-Based Authenticated Key Exchange Protocol under Standard Model
Shu Jian, Xun Chun-xiang
2009, 31(11): 2716-2719. doi: 10.3724/SP.J.1146.2008.01548
Abstract:
The goal of password-based authenticated exchange protocol is established secure key by using pre- shared human-memorable password. Most of existing schemes either have computation burden or rely on the random oracle model. A new scheme without rando...
Improved One-Round Key Exchange Protocol in the Standard Model
Hu Xue-xian, Liu Wen-fen, Lan Ju-long
2009, 31(11): 2720-2724. doi: 10.3724/SP.J.1146.2008.01533
Abstract:
In this paper, a new authenticated key exchange protocol is proposed and its security is proved in the stronger version of the well-known CK model revised by Krawczyk. The analysis of the protocol is under standard model instead of Random Oracle Mode...
An Information Hiding Algorithm Based on Double Text Segments
Chen Zhi-li, Huang Liu-sheng, Yu Zhen-shan, Yang Wei, Chen Guo-liang
2009, 31(11): 2725-2730. doi: 10.3724/SP.J.1146.2008.01503
Abstract:
Information hiding is a technique that hides secret messages in some carrier during transmission or storage. Carriers in common use include image, audio, video, text documents and so on. Since there is little redundancy in text documents, particularl...
An Adaptive Optimization Scheme for IEEE 802.11 to Improve Throughput and Fairness Performance
Mao Jian-bing, Mao Yu-ming, Leng Su-peng
2009, 31(11): 2731-2737. doi: 10.3724/SP.J.1146.2008.01012
Abstract:
In this paper, an adaptive optimization scheme for IEEE 802.11 DCF is proposed to enhance the throughput and fairness performance. The scheme is based on channel sensing result for network state information and thus it is called CSCC (Channel Sensing...
Study of Probabilistic Logging Based on Bloom Filter for Source Tracing
Xue Kai-ping, Hong Pei-lin, Guo Chan, Lu Han-cheng, Luo Lian-he
2009, 31(11): 2738-2743. doi: 10.3724/SP.J.1146.2008.01586
Abstract:
This papar presents a probabilistic logging scheme based on Bloom filter for source tracing. The scheme makes probabilistic sampling of all packets through each router, and uses efficient Bloom filter for storage. The sampling information can stored ...
Research on the Impact of Node Failure on the Reliability of Coverage and Connection for Wireless Sensor Networks
Fu Zhi-xin, Xu Zhi-liang, Huang Cheng, Wu Xiao-bei
2009, 31(11): 2744-2750. doi: 10.3724/SP.J.1146.2008.01525
Abstract:
In this paper, we consider the impact of node failure on the monitoring reliability of wireless sensor networks. The quantitative criterions of two basic network monitoring performance, coverage and connection, are proposed from the perspective of no...
A Robust Adjustable Topology Algorithm with Steady Links in Wireless Sensor Network
Liu Hao-ran, Yin Rong-rong, Hao Xiao-chen, Dou Jing-jing, Bi Wei-hong
2009, 31(11): 2751-2756. doi: 10.3724/SP.J.1146.2008.01419
Abstract:
In order to solve the problem of wireless link instability in sensor network, based on the r-neighborhood graph model, this paper puts forward a robust adjustable topology control algorithm with steady links, named RAWSL. RAWSL algorithm sets the rec...
A Proxy-Caching Scheduler Based on P2P Cooperation
Tang Rui-chun, Wei Qing-lei, Liu Bin
2009, 31(11): 2757-2761. doi: 10.3724/SP.J.1146.2008.01144
Abstract:
Lack of cache and service time-delay in the media streaming system are considered. PCSPC (Proxy- Caching Scheduler based on P2P Cooperation) is proposed. First according to the principle that more popular data are assigned more cache, corresponding c...
A Selective Registering Technique for Design of an Embedded Programmable Memory
Cai Gang, Yang Hai-gang
2009, 31(11): 2762-2766. doi: 10.3724/SP.J.1146.2008.01544
Abstract:
A selective registering method is proposed to solve the problem of data loss in readout caused by simultaneously accessing both the read and write ports at the same address of a synchronous dual-port memory IP. Using this method to design an embedded...
Statistical RLC Interconnect Delay Considering Process Variations
Li Jian-wei, Dong Gang, Yang Yin-tang, Wang Zeng
2009, 31(11): 2767-2771. doi: 10.3724/SP.J.1146.2009.00031
Abstract:
Analysis of RLC Statistical delay considering process fluctuation is presented in this paper. Construction of parasitic parameters and moments with process variation is first given, and then a statistical delay model based on Weibull distribution is ...
Fast Solutions of Wide-Band RCS Pattern of Objects Using MLFMA with the Best Uniform Approximation
Tian Chao, Xie Yong-jun, Wang Yuan-yuan, Jiang Yong-hui
2009, 31(11): 2772-2775. doi: 10.3724/SP.J.1146.2008.01631
Abstract:
MultiLevel Fast Multipole Algorithm (MLFMA) in conjugation with the best uniform approximation is applied to the scattering analysis of an arbitrary shaped perfect electric conductor over a wide frequency band in this paper. The nodes of Chebyshev wi...
Electric Field Micro-sensor with a Closed-loop Autonomous Driving Circuit
Xiong You-ya, Peng Chun-rong, Xia Shan-hong
2009, 31(11): 2776-2780. doi: 10.3724/SP.J.1146.2008.01527
Abstract:
A new micromechanical electric field sensor system with a closed-loop autonomous driving circuit is designed and simulated. The closed-loop autonomous driving circuit, which uses the principle of auto-gain-control, keeps the micro sensor working in t...
Multicomponent LFM Signals Detection Based on Multi-scale Chirplet Sparse Signal Decomposition
Luo Jie-si, Yu De-jie, Peng Fu-qiang
2009, 31(11): 2781-2785. doi: 10.3724/SP.J.1146.2008.01528
Abstract:
A multicomponent LFM signals detection method based on multi-scale chirplet sparse signal decomposition is proposed to overcome the problems of cross-interference and cross-decomposition existed in the multicomponent LFM signals processing based on t...
A New Trust Management Model for P2P Network with Time Self-Decay and Subjective Expect
Li Jia-lun, Gu Li-ze, Yang Yi-xian
2009, 31(11): 2786-2790. doi: 10.3724/SP.J.1146.2008.01563
Abstract:
This paper presents a novel decentralized trust management model with reputation. In P2P (peer to peer) network, there is no trusted authority. Trust relations between peers should be established with peers behaviors. There are three main contributio...
Acoustic Energy Based Scheme for Target Tracking in Wireless Sensor Networks
Chen Ji-ming, Zhang Yan-ping, Cao Xiang-hui, Shen Xing-fa, Sun You-xian
2009, 31(11): 2791-2794. doi: 10.3724/SP.J.1146.2008.00493
Abstract:
To solve the tracking problem of maneuver target with acoustic characteristic in wireless sensor network, according to the attenuation model of acoustic energy with distance, an acoustic-energy based target tracking algorithm is proposed based on dyn...