Advanced Search

2009 Vol. 31, No. 3

Display Method:
Articles
Neighborhood Margin Fisher Discriminant Analysis
Wei Lai, Wang Shou-jue, Xu Fei-fei, Wang Rui-zhi
2009, 31(3): 509-513. doi: 10.3724/SP.J.1146.2008.00557
Abstract:
The curse of high dimensionality is usually a major cause of limitations of many machine learning algorithms. A novel algorithm called Neighborhood Margin Fisher Discriminant Analysis (NMFDA) is proposed for supervised linear dimensionality reduction...
Feature Weighted Support Vector Machine
Wang Ting-hua, Tian Sheng-feng, Huang Hou-kuan
2009, 31(3): 514-518. doi: 10.3724/SP.J.1146.2007.01711
Abstract:
Support vector machine has been applied in many research fields, such as pattern recognition and function estimate. There is a shortcoming in Weighted SVM and Fuzzy SVM, which take the importance of sample into account but neglect the relative import...
Complicated Coalition Parallel Generation Based on Discrete Particle Swarm Optimization
Jiang Jian-guo, Zhang Guo-fu, Qi Mei-bin, Su Zhao-pin
2009, 31(3): 519-522. doi: 10.3724/SP.J.1146.2007.01593
Abstract:
Coalition generation is a key problem in multi-agent systems. Discrete particle swarm optimization is adopted to solve the problem, and random perturbation of particles is used to avoid premature convergence. A novel two-dimensional binary encoding i...
A Random Walk Based Clustering Algorithm
Li Qiang, He Yan, Jiang Jing-ping
2009, 31(3): 523-526. doi: 10.3724/SP.J.1146.2007.01626
Abstract:
In this paper, a modified model of random walk is proposed, and then a clustering algorithm is developed based on this model. In the algorithm, at first a weighted and undirected graph G(V,E,d) is constructed among data points in a dataset according ...
Local Marginal Discriminant Analysis for Face Recognition
Li Zi-rong, Du Ming-hui
2009, 31(3): 527-531. doi: 10.3724/SP.J.1146.2007.01621
Abstract:
A novel dimensionality reduction method called Local Marginal Discriminant Analysis (LMDA) is proposed in this paper based on spectral graph theory and manifold learning. Based on Neighborhood Preserving Projections (NPP), the reconstruction distorti...
Using Bivariate Threshold Function for Image Denoising in NSCT Domain
Jia Jian, Jiao Li-cheng, Xiang Hai-lin
2009, 31(3): 532-536. doi: 10.3724/SP.J.1146.2007.01791
Abstract:
As the main prevailing denoising method, how the threshold function works and whats the threshold value are the greatest importance techniques. Consider the dependencies between the coefficients and their parents, a non-Gaussian bivariate distributio...
A Fast Algorithm for Terrain Simulation Using Wavelet Based on FBM Fractal Features
Bu Yan-long, Pan Liang, Shen Lin-cheng
2009, 31(3): 537-541. doi: 10.3724/SP.J.1146.2007.01702
Abstract:
In this paper Haar wavelet is used to construct the simulated natural terrain based on the FBM model and fractal features. Relations between fractal coefficients of truly terrains and wavelet decomposition coefficients of which are anlysised firstly,...
A Least Square Affine-Based Block-Match Image Registration Algorithm for Dynamic Video Super Resolution
Wang Su-yu, Zhuo Li, Shen Lan-sun, Li Xiao-guang
2009, 31(3): 542-545. doi: 10.3724/SP.J.1146.2007.01745
Abstract:
Registration of the consecutive frames is quite essential in dynamic video super resolution. In this paper, a multi-scale least square affine-based block-match method is proposed. An index Dmv is defined to evaluate global and local matching performa...
A Multi-purpose Dual Watermark Algorithm
Ye Tian-yu, Niu Xin-xin, Yang Yi-xian
2009, 31(3): 546-551. doi: 10.3724/SP.J.1146.2007.01569
Abstract:
The single watermark algorithms always merely have single function. In order to overcome the drawback, a multi-purpose dual watermark algorithm is proposed in the paper, taking advantage of the stability of singular values. It divides the original im...
Adaptive Dither Modulation Image Watermarking Algorithm
Xiao Jun, Wang Ying
2009, 31(3): 552-555. doi: 10.3724/SP.J.1146.2007.01652
Abstract:
Quantization step is one of the key factors affecting the performances of quantization watermarking. In this paper, a new quantization watermarking algorithm is proposed using the JPEG quantization table to choose the quantization step of dither modu...
Measurement Fusion Steady-State Kalman Filtering Algorithm with Correlated Noises and Global Optimdity
Deng Zi-li, Gu Lei, Ran Chen-jian
2009, 31(3): 556-560. doi: 10.3724/SP.J.1146.2007.01530
Abstract:
For the multisensor linear discrete time-invariant stochastic control systems with correlated input and measurement white noises, and with correlated measurement white muses, a weighted measurement fusion steady-state Kalman filtering algorithm is pr...
Image Denoising Based on Nonsubsampled Contourlet Transform and Bivariate Model
Bian Ce, Zhong Hua, Jiao Li-cheng
2009, 31(3): 561-565. doi: 10.3724/SP.J.1146.2007.01636
Abstract:
This paper proposes a new image denoising method based on the NonsubSampled Contourlet Transform(NSCT) and the bivariate model under the framework of Bayesian MAP estimation theory. The proposed algorithm uses the NSCTs advantages of translation-inva...
An Over-sampling Based Blind Separation Algorithm of Single Channel MPSK Signals
Cui Rong-tao, Li Hui, Wan Jian, Dai Xu-chu
2009, 31(3): 566-569. doi: 10.3724/SP.J.1146.2007.01792
Abstract:
A new algorithm is proposed for blind separation of two MPSK mixture signals obtained by a single- channel receiver. The proposed algorithm is based on optimal Bayesian Estimation criteria, and implemented via the particle filtering that is used to s...
The Study on the Separability of SVM Used in Target Recognition
Guo Lei, Xiao Huai-tie, Fu Qiang
2009, 31(3): 570-573. doi: 10.3724/SP.J.1146.2007.01662
Abstract:
This paper mainly studies the sufficient necessary condition of linear separability and the essential of soft margin in SVM, which is used in target recognition. In this paper, the sufficient necessary condition of linear separability is proved using...
Numerical Synthesis for Constant Beamwidth Beam Pattern with Steering-Invariance
Xing Gao-xiang, Cai Zhi-ming
2009, 31(3): 574-577. doi: 10.3724/SP.J.1146.2007.01796
Abstract:
A steering-invariant constant beamwidth beamforming algorithm is proposed. On the basis of main-lobe shape controlling idea, the proposed algorithm uses the main-lobe on some direction as reference main-lobe, and constructs the reference beampattern ...
Study on the Three Channels SAR-GMTI System with the Slant-Placed Antennae
Li Ya-chao, Li Xiao-ming, Xing Meng-dao, Bao Zheng
2009, 31(3): 578-582. doi: 10.3724/SP.J.1146.2007.01771
Abstract:
This paper proposes a new system based on DPCA technology for the detection and position of moving target, namely three antennae are placed at a slant angle along airplane flying detection. The echo model of moving target is established based on thre...
Micro-Doppler Effect of Rotation Structure on Radar Targets
Li Jin-liang, Wang Xue-song, Liu Yang, Liu Jin, Meng gang, Wang Tao
2009, 31(3): 583-587. doi: 10.3724/SP.J.1146.2007.01808
Abstract:
Micro-dynamics characteristics are related to targets structures and can be used for target classification. Rotation structure of target is modeled as a sum of directional point scatterers. With the directional point scatter model, the micro-Doppler ...
Synthetic Aperture Radar Images Target Recognition Based on Wavelet Domain NMF Feature Extraction
Huan Ruo-hong, Yang Ru-liang
2009, 31(3): 588-591. doi: 10.3724/SP.J.1146.2007.01889
Abstract:
This paper presents a method for synthetic aperture radar images target recognition based on wavelet domain non-negative matrix factorization feature extraction. Low-frequency sub-band image is obtained by 2-D discrete wavelet decomposition of a SAR ...
Adaptive Frequency Domain Algorithm for SAR Raw Data Compression Based on Two Dimensions Look-up Table
Qi Hai-ming, Yu Wei-dong
2009, 31(3): 592-595. doi: 10.3724/SP.J.1146.2007.01664
Abstract:
According to Doppler centroid shift and Doppler spectrum split, this paper proposes an adaptive Doppler nonuniform bit allocation approach based on one dimension Look-Up Table (LUT). Combined with one dimension quantization and coding LUT this approa...
Two Kinds of Robust CFAR Detector Based on MIMO Radar System
Wang Dun-yong, Ma Xiao-yan, Yuan Jun-quan, Wang Dang-wei
2009, 31(3): 596-600. doi: 10.3724/SP.J.1146.2007.01683
Abstract:
Based on the system characteristics of MIMO radar,two kinds of MIMO radar CFAR detectors(termed OSCA-CFAR and LCIOSCA-CFAR) based on order statistic and mean level are presented. Firstly, formulas of false alarm probability and detection probability ...
Research on the Motion Compensation of the Ballistic Targets High Resolution Range Profile
Cao Min, Fu Yao-wen, Huang Ya-jing, Li Xiang, Zhuang Zhao-wen
2009, 31(3): 601-605. doi: 10.3724/SP.J.1146.2007.01655
Abstract:
The motion of the ballistic target in midcourse is very complex, which has high flight speed and micro-motion such as spin, precession and tumble. According to its complex motion, wideband radar echo model after dechirping is firstly built. Then the ...
Analysis of the Interferometric Coherence between Residule Images in Location of Moving Target with Polarimetric SAR
Liu Zhong-xun, Dai Da-hai, Wang Xue-song, Li Du
2009, 31(3): 606-609. doi: 10.3724/SP.J.1146.2007.01790
Abstract:
This paper mainly deals with the optimal inteferometric coherence of the residual images in frequency domain in detection and location of moving target with polarimetric SAR. The essential procedure of clutter cancellation in doppler frequency is pre...
A New Passive Barrage Jamming Method for SAR
Sun Guang-cai, Bai Xue-ru, Zhou Feng, Xing Meng-dao, Bao Zheng
2009, 31(3): 610-613. doi: 10.3724/SP.J.1146.2007.01885
Abstract:
Based on the character of SAR imaging procedure, this paper proposes a new passive SAR barrage jamming approach, utilizing the rotating angular reflectors. This method makes use of micro-Doppler modulation induced by rotating angle reflectors in orde...
Self-Calibration of Channel Errors for Bistatic HF Surface Wave SIAR
Liu Chun-bo, Chen Bai-xiao, Chen Duo-fang, Zhang Shou-hong
2009, 31(3): 614-618. doi: 10.3724/SP.J.1146.2007.01659
Abstract:
To calibrate the channel errors with gain and phase uncertainty for bistatic HF surface wave Synthesis Impulse and Aperture Radar (SIAR), a self-calibration approach for evaluating the gain-phase errors is presented in this paper. The impact of chann...
A New Algorithm for Underground Medium Parameters Inversion
Yu Yan-nong, Fang Guang-you
2009, 31(3): 619-622. doi: 10.3724/SP.J.1146.2007.01642
Abstract:
When Ground Penetrating Radar is applied in actual projects, medium parameter (the permittivity is main) is a necessary data for users to position the depth of underground targets and the thickness of medium layers correctly. An inversion algorithm f...
A Method to Validate Parameter Inversion Results for Bare Soil
Yin Qiang, Cao Fang, Hong Wen
2009, 31(3): 623-627. doi: 10.3724/SP.J.1146.2007.01506
Abstract:
This paper analyzes the two scattering models and inversion techniques for bare soil surface, which were proposed by Oh(1992) and Dubois(1995), respectively. A method to validate the parameter inversion results of both two models was developed under ...
Scattering Analysis of Active Phased-Array Antenna?System
Zhang Peng-fei, Gong Shu-xi, Liu Ying, Xu Yun-xue
2009, 31(3): 628-631. doi: 10.3724/SP.J.1146.2007.01807
Abstract:
The reflection coefficient of the receiver load of the feed system model for the cells in the active phased-array antenna is analyzed by S parameters. The scattering field of the active phased-array antenna is analyzed by submitting the reflection co...
Study on Characteristics of Converging-Wave Based on Low Effective Permittivity Metamaterials
Liu Tao, Cao Xiang-yu, Ma Jia-jun, Wang Wei
2009, 31(3): 632-635. doi: 10.3724/SP.J.1146.2007.01836
Abstract:
Through establishing structure model, the relation is presented among radiation power density of radiation source and effective permittivity and effective permeability. Simultaneously, the relations are numerically analyzed between radiation power de...
A Method of Reducing the Complexity of Sphere Decoder in the High-Condition Number Channel
Zhao Hui, Long Hang, Wang Wen-bo
2009, 31(3): 636-639. doi: 10.3724/SP.J.1146.2007.01876
Abstract:
For MIMO system, as an efficient algorithm to replace ML detection, Sphere Decoding (SD) can reduce the detection complexity greatly. Whereas the bad channel with large condition number still aggravates the computation complexity of SD. In this paper...
Performance Analysis and Enhancement of Channel Estimation for STBC-OFDM Systems with Virtual Subcarriers
Wang Yi, Tao Xiao-feng, Zhang Ping
2009, 31(3): 640-644. doi: 10.3724/SP.J.1146.2007.01730
Abstract:
Performance of Discrete Fourier Transform (DFT) based channel estimation for Space Time Block Code-Orthogonal Frequency Division Multiplexing (STBC-OFDM) systems with virtual subcarriers is analyzed. The concise expressions for Mean Squared Error (MS...
A Pre-processed Constant Modulus Multi-user Blind Detection in MIMO MC-CDMA System
Shi Rui-hua, Feng Guang-zeng
2009, 31(3): 645-648. doi: 10.3724/SP.J.1146.2007.01658
Abstract:
A semi-blind multi-user constant modulus receiving system for downlink MIMO MC-CDMA system is proposed. The received signals are pre-processed before constant modulus detection, then the MIMO receiving system is transformed into several SISO receivin...
Limited Feedback SDMA with Adaptive Multiplexing Order
Huang Yong-ming, Xu Dao-feng, Luo Yuan-qian, Yang Lu-xi
2009, 31(3): 649-652. doi: 10.3724/SP.J.1146.2007.01780
Abstract:
In order to tackle the inter-user interference issue of the limited feedback SDMA which uses a fixed number of active beams to simultaneously transmit signal, this paper proposes a novel limited feedback SDMA capable of adaptively selecting the optim...
Study on ICI Cancellation Algorithms for Mobile OFDM Systems
Xi Xiao-ping, Zhang Can
2009, 31(3): 653-656. doi: 10.3724/SP.J.1146.2007.01862
Abstract:
For broadband OFDM systems, Doppler effect induced by high mobility gives rise to the InterCarrier Interference (ICI). By fully exploiting the ICI distribution property and partial channel information, two novel complexity-reduced Minimum Mean Square...
Tomlinson-Harashima Precoding for Multiuser MIMO Systems
Xu Dao-feng, Huang Yong-ming, Yang Lu-xi, Du Ying-gang, Li Bin
2009, 31(3): 657-660. doi: 10.3724/SP.J.1146.2007.01477
Abstract:
Traditional Tomlinson-Harashima Precoding (THP), which leaves all the equalization tasks to the transmitter, prevent from fully utilizing the advantages of MIMO techniques. In this paper, a THP scheme for multiuser MIMO system is proposed. The inter-...
A Novel Channel Quantization and Feedback Algorithm in Multiuser Diversity Systems
Liang Xue-jun, Zhu Guang-xi, Cao Xi, Wang De-sheng
2009, 31(3): 661-665. doi: 10.3724/SP.J.1146.2007.01742
Abstract:
In this paper, the relative content is researched for resolving the problem that a lot of wireless resource is expended by feedback information in MIMO-OFDM system. A novel algorithm including cluster, quantization and feedback is proposed. By utiliz...
Synchronization Acquisition Using Early-Late Gate Based on Frequency-PN Sequence Double Pattern for FFH/BFSK Spread-Spectrum systems
Cheng Yu-fan, Li Shao-qian
2009, 31(3): 666-670. doi: 10.3724/SP.J.1146.2007.01670
Abstract:
In this paper, a novel synchronization acquisition approach using the early-late gate for FFH/BFSK system is proposed, and it is based on frequency-PN sequence double pattern. Analytical and numerical results show the following advantages: the decisi...
The Research and Application of Partial Correlation Property of LS Sequences
Feng Li-fang, Fan Ping-zhi, Li Dao-ben
2009, 31(3): 671-674. doi: 10.3724/SP.J.1146.2007.01647
Abstract:
In this paper, the generalized orthogonal sequences and N-shift partial length D0 orthogonal sequences with partial correlations are investigated. In particular, the partial correlation properties of Loosely Synchronized (LS) sequences are analyzed i...
SER Performance Analysis for Cooperative Relay Transmission Using Moment Generating Functions
Ding Sheng, Yan Kai, Wang Ying-guan, Liu Hai-tao
2009, 31(3): 675-678. doi: 10.3724/SP.J.1146.2007.01617
Abstract:
Cooperative diversity with multi-relay provides dramatic gains in slow fading wireless environments. In terms of average Symbol-Error Rate(SER) at the destination, the performances of multi-relay cooperative transmission with Maximal Ratio Combining(...
Study on Dynamic Routing, Wavelength and Timeslot Assignment Algorithm in WDM-TDM Optical Networks
Xiang Peng, Wang Rong
2009, 31(3): 679-683. doi: 10.3724/SP.J.1146.2007.01774
Abstract:
In order to improve the wavelength utilization in WDM networks, multiple traffic connections can be allowed to share the capacity of a wavelength via TDM technology. The resultant network is a WDM-TDM optical network, where the Routing, Wavelength an...
A Subcarrier Grouping Approach and Detection for MIMO-OFDM Systems with GFDFR Space-Frequency Coding
Xu Xin, Cai Yue-ming, Song Zhi-qun
2009, 31(3): 684-688. doi: 10.3724/SP.J.1146.2007.00201
Abstract:
In this paper, a subcarrier grouping approach for Group-wise Full-Diversity Full-Rate (GFDFR) coded MIMO-OFDM systems with virtual and DC subcarriers is proposed. A PDA-SD hard detection algorithm and a neighbor searching soft detection algorithm, wh...
A Structure and Algorithm of Wideband Blind Equalizer Based on Subband Decomposition Technique
Zhang Wei, Jin Guang-ming, Dai Xu-chu
2009, 31(3): 689-693. doi: 10.3724/SP.J.1146.2007.01794
Abstract:
In high speed wideband wireless communications, the duration of channels impulse response is about hundreds of symbol periods, which causes the convergence speed of linear blind equalizer to be much slower. Based on subband decomposition technique, a...
Semantic Web Services Based Intelligent Telecommunication Service Model
Wang Wen-bo, Li Xiao-feng, Li Yong
2009, 31(3): 694-697. doi: 10.3724/SP.J.1146.2007.01760
Abstract:
According to the reality that the need of users is becoming more and more diversified in telecommunication service field, the model of semantic Web services in Internet is tailored and a semantic Web services based intelligent telecommunication servi...
Adaptive Multi-Path Routing in Mobile Ad hoc Network Based on Path Segment
Wu Da-peng, Zhen Yan, Wu Mu-qing
2009, 31(3): 698-701. doi: 10.3724/SP.J.1146.2007.01668
Abstract:
The probability of packet delivered in Ad hoc network can be guaranteed by the multi-path scheme, with the analysis on the path numbers, the decision method based on packet drop rate is introduced; furthermore, the segment adaptive multi-path routing...
Multi-Ring Lookup Protocol Family Based on Bi-Dimensional P2P
Si Peng-bo, Ji Hong, Yue Guang-xin
2009, 31(3): 702-706. doi: 10.3724/SP.J.1146.2007.01740
Abstract:
All nodes in Chord can be viewed as being placed into a one-dimensional ring. In this paper, a novel concept of bi-dimensional P2P is introduced for mobile Ad hoc networks, in which nodes are placed into a square, so that more than one configurable r...
Semantic Search Based on Structured P2P
Hou Xiang-song, Cao Yuan-da, Guan Zhi-tao, Zhang Yu
2009, 31(3): 707-710. doi: 10.3724/SP.J.1146.2007.01681
Abstract:
Peer-to-Peer (P2P) overlays are appealing, since they can aggregate resources of end systems without relying on sophisticated infrastructures. Unfortunately current peer-to-peer systems either offer exact keyword match or provide inefficient text sea...
Research on Chord-Based Semantic Service Discovery with QoS
Zhang Ying, Huang Hou-kuan, Yang Dong, Zhang Hong-ke
2009, 31(3): 711-715. doi: 10.3724/SP.J.1146.2008.00924
Abstract:
Service description language, metadata storage and service matching algorithm are three critical factors influencing the efficiency and quality of service discovery. This paper presents a prototype system of Chord-based semantic service discovery wit...
A Data Fusion Algorithm Based on Bayes Sequential Estimation for Wireless Sensor Network
Zhang Shu-kui, Cui Zhi-ming, Gong Sheng-rong, Sun Yong, Fang Wei
2009, 31(3): 716-721. doi: 10.3724/SP.J.1146.2008.00054
Abstract:
Mobile Agent(MA) is more suitable for wireless sensor networks than the C/S model in data fusion. In MA based data fusion, the order of nodes visited along the route by MA has a significant impact on the algorithm efficiency and life time of wireless...
An Authentication Protocol Based on Key Array for RFID
Ding Zhi-guo, Guo Li, Wang Yu-jie
2009, 31(3): 722-726. doi: 10.3724/SP.J.1146.2007.01753
Abstract:
As RFID becomes more and more popular, it is imperative to design authentication protocols to resist all possible attacks and threats. In order to overcome counterfeits of readers, a new authentication protocol is proposed based on key array. The new...
Application of -LFSR in Stream Cipher AB
Zeng Guang, Han Wen-bao, Fan Shu-qin
2009, 31(3): 727-730. doi: 10.3724/SP.J.1146.2007.01693
Abstract:
-LFSR is a word-oriented feedback shift register with a good tradeoff between security and efficiency. As an example, using -LFSR in ABC increases its period from 232(2127-1) to 232(2128-1) and, more important, its Hamming weight with the feedback po...
An Efficient DWT-EBCOT Combined VLSI Architecture with Low Memory for JPEG2000
Guo Jie, Li Yun-song, Wu Cheng-ke, Liu Kai, Wang Ke-yan
2009, 31(3): 731-735. doi: 10.3724/SP.J.1146.2007.01637
Abstract:
Motivated by an enormous amount of storage between DWT and EBCOT in JPEG2000 hardware implementation, a novel memory-efficient scheme based on code block size is proposed. Further reuse of on-chip code block size memories and efficient scheduling of ...
Design and Simulation Analysis of Novel Helical Slow-wave Structure with High Heat Transfer
Tang Kang-song, Zhao Gang, Li Shi, Yin He-jun
2009, 31(3): 736-739. doi: 10.3724/SP.J.1146.2007.01761
Abstract:
The thermal statement of the helical slow wave structure is analyzed in detail in this paper, and an elliptical shell is firstly brought up to replace the conventional circle shell in the slow-wave structure. Then the 3D thermal analysis of the helic...
A Novel MRF Model for Structure Preservation in SAR Image Despeckling
Song Heng, Wang Shi-xi, Ji Ke-feng, Yu Wen-xian
2009, 31(3): 745-748. doi: 10.3724/SP.J.1146.2007.01645
Abstract:
A novel MRF model called SPMRF (Structure Preserving MRF) is proposed for Bayesian despeckling of SAR images. In SPMRF every pixel within a neighborhood is associated with a weighting parameter which determines its contribution to the central pixels ...
Study on Ultra-High Speed SAR Raw Data Recorder Based on Disk Array
Hong Pu, Wang Yan-fei
2009, 31(3): 749-751. doi: 10.3724/SP.J.1146.2007.01835
Abstract:
In this article, an ultra-high speed SAR raw data recorder based on disk array is introduced, including its construct, working principle, and main features. Two kinds of data packet allocating method are proposed: the sequential allocating method and...
BER Based Transmit Beamforming for MISO-OFDM with Limited Feedback
Zhang Lei, Wu Gang, Li Shao-qian
2009, 31(3): 752-755. doi: 10.3724/SP.J.1146.2007.01732
Abstract:
In this paper, a new transmit beamforming scheme with limited feedback is presented in Multiple-Input Single-Output Orthogonal Frequency Division Multiplexing (MISO-OFDM) systems. By dividing the total subcarriers of an OFDM symbol into a series of c...
A Novel Time-Hopping Multiple-Access DCSK System Designing and Analysis
Li Hui, Song Yao-liang, Yang Yu-wang
2009, 31(3): 756-758. doi: 10.3724/SP.J.1146.2007.01649
Abstract:
The common multiple-access schemes for Differential Chaos Shift Keying (DCSK) system have two disadvantages. Firstly, all users share the same slot, only method to decrease multiple-access interference is utilizing the low correlativity of chaotic si...
Algorithm of Network Video Stream Recognition and Classification Based on Multi-Pattern Matching
Sun Qin-dong, Guo Xiao-jun, Huang Xin-bo
2009, 31(3): 759-762. doi: 10.3724/SP.J.1146.2008.00301
Abstract:
Identifying video stream quickly from the network flow is the foundation and prerequisite of network video surveillance and management. According to the analysis of characteristics of network video streams, a fast recognition and classification algor...
Discussions
A New Set of Sufficient Conditions for MD5 Collisions
Chen Shi-wei, Jin Chen-hui
2009, 31(3): 740-744. doi: 10.3724/SP.J.1146.2007.01562
Abstract:
Wang et al. (2005) proposed a collision attack on MD5 and gave a set of sufficient conditions to yield a MD5 collision. Yuto Nakano et al. (2006) pointed out that there were 16 redundant conditions in Wang et al.s set of sufficient conditions and exp...