Advanced Search

2009 Vol. 31, No. 7

Display Method:
Articles
Optimization of Cooperative Spectrum Sensing Mechanisms in Cognitive Radio Networks
Guo Chen, Peng Tao, Wang Wen-bo
2009, 31(7): 1525-1530. doi: 10.3724/SP.J.1146.2008.00884
Abstract:
In this paper, the optimization of cooperative spectrum sensing mechanisms in cognitive radio networks is investigated to improve the sensing efficiency and spectrum utilization. The optimization algorithms and strategies of detection period, detecti...
A Method of Increasing the Coherence Bandwidth on Shortwave Channel Using the Narrow Beam Forming
Li Yan-li, Duan Xiao-hui, Ma Meng, Jiao Bing-li
2009, 31(7): 1531-1535. doi: 10.3724/SP.J.1146.2008.00827
Abstract:
Shortwave communication works with frequency-selective fading channel, of which coherence bandwidth is an important parameter describing the flat channel bandwidth to be used by single carrier system. As has been known, increasing the coherence bandw...
Research on Application of Binary Sequence Pair with Two-Level Periodic Autocorrelation
Liu Kai, Xu Cheng-qian, Li Gang
2009, 31(7): 1536-1541. doi: 10.3724/SP.J.1146.2008.01474
Abstract:
A new concept of orthogonal matrix pair is presented, which is the extension of orthogonal matrix, and especially the binary orthogonal matrix pair is not restricted by the fact that the order of matrix should be the power of 2. Based on the binary s...
Throughput-Maximizing Limited Feedback for Transmit Beamforming in MISO-OFDM Systems
Zhang Lei, Wu Gang, Li Shao-qian
2009, 31(7): 1542-1547. doi: 10.3724/SP.J.1146.2008.00921
Abstract:
In this paper, a new throughput-maximizing transmit beamforming scheme with limited feedback is presented in Multiple-Input Single-Output Orthogonal Frequency Division Multiplexing (MISO-OFDM) systems. By dividing the total subcarriers of an OFDM sym...
A Transmission Method for Sequential Power Allocation in MIMO-HARQ Systems
Zhao Guo-dong, Yang Chen-yang
2009, 31(7): 1548-1553. doi: 10.3724/SP.J.1146.2008.00859
Abstract:
Hybrid Automatic Retransmission reQuest (HARQ) is an error control method for reliable communications. Combining HARQ with Multiple-Input-Multiple-Output (MIMO) systems using spatial multiplexing can provide reliable high data rate transmission. In t...
A Suboptimal User Selection Algorithm Based on Block Diagonalization and Fairness
Chen Xiao-han, Liu Ju, Zheng Li-na, Xu Hong-ji
2009, 31(7): 1554-1559. doi: 10.3724/SP.J.1146.2008.00485
Abstract:
In this paper, a suboptimal user selection method is proposed based on Block Diagonalization (BD). Firstly, an upper-bound of sum-rate capacity is deduced, and is used as the selection criterion of proposed algorithm. Secondly, the upper-bound is use...
Downlink Precoding for Multi-user Quasi-orthogonal Space Time Block Coded MIMO System
Cao Ying-hong, Yin Fu-liang, Chen Zhe
2009, 31(7): 1560-1564. doi: 10.3724/SP.J.1146.2008.00842
Abstract:
In this paper, a downlink precoding scheme is proposed for the Quasi-orthogonal Space Time Block Coded Multi-User MIMO (QSTBC-MU-MIMO) system. Based on the SLNR (Signal-to-Leakage-Noise Ratio) maximization, this scheme minimizes the co-channel interf...
An Insufficiently Guaranteed Handover Scheme Used in Multi-service LEO Constellation Communication System
Liu Yan-chen, Ma Dong-tang, Ding Ding, Cai Li-jin
2009, 31(7): 1565-1570. doi: 10.3724/SP.J.1146.2008.01241
Abstract:
A non-sufficiently guaranteed handover scheme for multiple services is proposed in this paper. Under this scheme, the channels will be allocated and reserved for the arriving calls to be served when an interval is less than the maximum cell residence...
Universally Composable Group Key Exchange Protocol
Jia Hong-yong, Qing Si-han, Gu Li-ze, Yang Yi-xian
2009, 31(7): 1571-1575. doi: 10.3724/SP.J.1146.2008.00042
Abstract:
In this article, a universally composable group key exchange ideal function is proposed and realized using witness indistinguishable proof of knowledge with partially isolated party based on the tamper-proof hardware token. Compared with protocols un...
An Efficient Fault-Tolerant and Intrusion-Tolerant Scheme Based on Trust Relationship for IP Networks
Ji Jun-jie, Yang Xiao-long, Wang Jin, Wu Xiong-biao, Lin Jian-ren, Long Ke-ping
2009, 31(7): 1576-1581. doi: 10.3724/SP.J.1146.2008.00615
Abstract:
Nowadays, IP networks are suffering many faults and malicious attacks which greatly threaten its security and survivability. So it is an important issue that how to make the IP networks to be more robust under faults and attacks, i.e., to improve the...
Reliability Evaluation Algorithm for Distributed Tightly-Coupled Virtual Private Networks
Dai Fu-sheng, Liu Gong-liang
2009, 31(7): 1582-1587. doi: 10.3724/SP.J.1146.2008.00481
Abstract:
An algorithm of reliability indexes is proposed in this paper for evaluating the reliability of the distributed tightly-coupled virtual private networks with multi-QoS requirements, which is constructed in the environment of interconnection network. ...
Channel Assignment Strategy for Wireless Mesh Network Based on Topology-division
Yan Jun-rong, Zhang Shun-yi, Long Hua, Sun Yan-fei
2009, 31(7): 1588-1593. doi: 10.3724/SP.J.1146.2008.00757
Abstract:
According to the characteristics of tree-topology aggregating traffic of wireless mesh network, this paper proposes a channel assignment strategy based on topology-division. Considering the effect of interference on different links, wireless interfer...
A Heuristic Lookup Partition Algorithm for Packet Classification
Chen Bing, Pang Yu-ke, Ding Qiu-lin
2009, 31(7): 1594-1599. doi: 10.3724/SP.J.1146.2008.00626
Abstract:
Regional partition packet classification algorithm is one of the most effective algorithms. To solve the unsymmetrical distribution problem of regional partition for packet classification, a heuristic lookup partition algorithm is proposed after anal...
Pair-wise Key Establishment Scheme Based on Transerval Design in Clustered Sensor Networks
Xu Li, Zhang Hong-yan, Shen Jin-bo
2009, 31(7): 1600-1605. doi: 10.3724/SP.J.1146.2008.00564
Abstract:
Due to the limited energy, small storage room and so on, the traditional network key management scheme is challenged. Based on the transerval design,bivariable polynomial and threshold strategy, a new pairwise key establishment scheme and multi-path ...
A Novel Hybrid Blind Channel Equalization Algorithm
Liu Zu-jun, Xu Hai-sheng, Wang Jie-ling, Yi Ke-chu
2009, 31(7): 1606-1609. doi: 10.3724/SP.J.1146.2008.00742
Abstract:
To improve MSE performance in steady-state and convergence rate of blind equalization, a hybrid blind channel equalization algorithm is proposed in this paper. With decision feedback equalizer, the proposed algorithm applies the error item of DD-LMS ...
A New Inter-view Prediction Structure
Yan Tao, An Ping, Shen Li-quan, Zhang Zhao-yang
2009, 31(7): 1610-1614. doi: 10.3724/SP.J.1146.2008.00956
Abstract:
Multi-view Video Coding (MVC) demands high compression rates, temporal random access, spatial random access, as well as view scalability, which based on inter-view prediction structure. Joint Multi-view Video Coding (JMVC) proposed the fixed view-tem...
Adaptive Image Compression Based on Multibandelets
Yang Xiao-hui, Jiao Li-cheng, Li Deng-feng
2009, 31(7): 1615-1619. doi: 10.3724/SP.J.1146.2008.00765
Abstract:
For protecting directional geometric structure information, a novel basis function called multibandelets is presented in this paper. And then an image compression algorithm is proposed based on the multibandelet transform and Shannon encode. Experime...
Analysis Algorithm to Frequency Rate of LFM Signal Based on Biorthogonal Fourier Transform
Wang Ben-qing, Li Xing-guo
2009, 31(7): 1620-1623. doi: 10.3724/SP.J.1146.2008.00870
Abstract:
There are many analysis algorithms for frequency rate of LFM signal, but those algorithms have some drawbacks, such as highly computational complexity, long time for searching, and cross-term in multi-LFM signal. In this paper, a new analysis algorit...
Blind Separation Algorithms of BPSK Signals by Estimating Source Number
Tan Bei-hai, Zhao Min, Xie Sheng-li
2009, 31(7): 1624-1629. doi: 10.3724/SP.J.1146.2008.00992
Abstract:
At present, there exist a lot of algorithms of blind separation, among which there are few algorithms focusing on blind separation of digital signals and estimating source number. To solve the problem, this paper proposes a novel algorithm to solve t...
Contour Detection Based on Compound Receptive Field
Du Xiao-feng, Li Cui-hua, Li Jing
2009, 31(7): 1630-1634. doi: 10.3724/SP.J.1146.2008.01164
Abstract:
Contour detection from natural scenes is a tough task in computer vision. This paper proposes a visual model of contour detection based on compound receptive field. By inducing dis-inhibition mechanism to traditional model that was based on inhibitio...
Information Fusion Algorithm of Fault Diagnosis Based on Random Set Metrics of Fuzzy Fault Features
Xu Xiao-bin, Wen Cheng-lin, Wang Ying-chang
2009, 31(7): 1635-1640. doi: 10.3724/SP.J.1146.2008.00408
Abstract:
In order to deal with the uncertainties in feature extraction and decision-making, an information fusion algorithm of fault diagnosis is presented based on random set metrics of fuzzy features and evidence reasoning. Firstly, membership functions are...
A New Probabilistic Data Association Filter Based on Probability Theory
Liu Zong-xiang, Xie Wei-xin, Huang Jing-xiong
2009, 31(7): 1641-1645. doi: 10.3724/SP.J.1146.2008.00796
Abstract:
The Probabilistic Data Association Filter (PDAF) and the Joint Probabilistic Data Association Filter (JPDAF) are theoretically analyzed and their shortages in theory are pointed out. Based on the probability theory, a New Probabilistic Data Associati...
Region of Interest Detection Based on Visual Attention Model and Evolutionary Programming
Zhang Jing, Shen Lan-sun, Gao Jing-jing
2009, 31(7): 1646-1652. doi: 10.3724/SP.J.1146.2008.00739
Abstract:
According to biological attention mechanism, a region of interest detection based on visual attention model and evolutionary programming is proposed in this paper. Candidate image regions are segmented with evolutionary programming algorithm. The int...
Automatic Detection of the Masses in the Mammograms Using Characteristic Modeling and Neural Networks
Xu Wei-dong, Liu Wei, Li Li-hua, Xia Shun-ren, Ma Li, Shao Guo-liang, Zhang Juan
2009, 31(7): 1653-1658. doi: 10.3724/SP.J.1146.2008.00677
Abstract:
Mammography is a conventional early detection method for breast cancer. A novel Computer-Aided Diagnosis (CAD) method for the masses is proposed in this paper. Two characteristic models are built up to represent the masses with various backgrounds, a...
Multi-frame Stepped-Frequency Signal Processing Based on Doppler Bin Alignment
Yuan Hao-juan, Gao Mei-guo, Mu Jian-chao
2009, 31(7): 1659-1663. doi: 10.3724/SP.J.1146.2008.00903
Abstract:
This paper presents a multi-frame stepped-frequency signal processing method to detect moving targets, and a Doppler bin alignment method is proposed to compensate the image aliasing caused by moving targets. This method makes use of the relationship...
A Method for Fast Multi-target Localization in Bistatic MIMO Radar System
Chen Jin-li, Gu Hong, Su Wei-min
2009, 31(7): 1664-1668. doi: 10.3724/SP.J.1146.2008.00871
Abstract:
The direction finding cross localization using bistatic MIMO radar system is studied in this paper, and a fast multi-target localization algorithm based on propagator method is proposed. The new method avoids the estimation and SVD (Singular Value De...
On Detection of Number of Tomography SAR Signals in the Elevation Direction Using the FB-MAPES Method
Ren Xiao-zhen, Yang Ru-liang
2009, 31(7): 1669-1673. doi: 10.3724/SP.J.1146.2008.00735
Abstract:
When using Tomography SAR combined with spatial spectrum estimation to solve layover effect, the number of signals should be estimated in the elevation direction first. The accuracy of number of signals is directly related to the following estimation...
Research of Polar Format Algorithm for Bistatic SAR Imaging Based on Chirp Scaling
Wang Xin, Zhu Daiy-in, Zhu Zhao-da
2009, 31(7): 1674-1678. doi: 10.3724/SP.J.1146.2008.00944
Abstract:
This paper investigates an implementation of Polar Format Algorithm(PFA) in Bistatic SAR imaging based on the principle of Chirp Scaling(CS). PFA realizes datas Polar Coordinate Transformation by two 1-D interpolations, which is computationally expen...
An Algorithm for Repeated Trajectory Bistatic Spotlight SAR Widefield Imaging
Zhang Lei, Jing Wei, Xing Meng-dao, Bao Zheng
2009, 31(7): 1679-1683. doi: 10.3724/SP.J.1146.2008.00153
Abstract:
Based on the current research on bistatic SAR image, a new algorithm to process data of repeated trajectory bistatic spotlight SAR system is proposed. The algorithm first suppress azimuth aliasing with an azimuth preprocess step, and focus image with...
A Novel Adaptive Interferences Suppression and Background Uniformization Method Applicable to FLGPSAR System
Yang Yan-guang, Song Qian, Jin Tian, Wang Jian, Zhou Zhi-min
2009, 31(7): 1684-1689. doi: 10.3724/SP.J.1146.2008.00276
Abstract:
To solve the problems of the self-signature interference and the nonuniformity of image background existing in the vehicle-mounted Forward-Looking Ground Penetrating Synthetic Aperture Radar (FLGPSAR) detection system, an adaptive method is proposed ...
InSAR Interferometric Phase Estimation Based on Robust Beamforming
Mao Zhi-jie, Liao Gui-sheng
2009, 31(7): 1690-1695. doi: 10.3724/SP.J.1146.2008.00278
Abstract:
A method of interferometric phase estimation based on the robust beamforming is proposed. The method can provide the accurate interferometric phase estimation, by correcting the spatial steering vector and by taking advantage of the coherence informa...
Velocity Ambiguity Resolution and Synthesis Processing in Multi-frequency MIMO Radar
Qin Guo-dong, Chen Bai-xiao, Chen Duo-fang, Zhang Shou-hong
2009, 31(7): 1696-1700. doi: 10.3724/SP.J.1146.2008.01054
Abstract:
The multi-frequency MIMO radar uses sparse-array to transmit the FMCW signals of multiple carrier frequencies, and an array to receive the echoes. The signal model of multi-frequency MIMO radar is analyzed in this paper. A new method is proposed to r...
Subband Implementation for Wideband Radar Clutter Suppression and Target HRRP Enhancement on the Principle of Maximizing the Pearson Correlation Coefficient
Dai Feng-zhou, Liu Hong-wei, Wu Shun-jun
2009, 31(7): 1701-1705. doi: 10.3724/SP.J.1146.2008.00795
Abstract:
To overcome the Doppler dispersion of the wideband radar return, a method of subband implementation for wideband radar clutter suppression and target High Resolution Range Profile (HRRP) enhancement is presented in this paper. The return is decompose...
The Characteristic Inversion of the Mid-course Missile Based on the Ellipse Model
Wei Xi-zhang, Ding Xiao-feng, Li Xiang
2009, 31(7): 1706-1710. doi: 10.3724/SP.J.1146.2008.00549
Abstract:
This paper is for the identification from the RCS sequence of the Mid-course missile. On the base of analyzing its motion and electromagnetic scattering characteristic, a new method using RCS magnitude changes with respect to the object gesture angle...
Selecting Regularization Parameter in Time Marching Method Based on the Synchronous Iteration of Noise and Image
Liu Peng, Liu Ding-sheng, Li Guo-qing
2009, 31(7): 1711-1715. doi: 10.3724/SP.J.1146.2008.00582
Abstract:
In order to correctly estimate the variance of noise in iteration, a pure synthesis noise as an image is synchronously iterated with the observation image in de-convolution, and it takes variance of pure noise image as the estimation of the variance ...
SAR Image Enhancement Based on Nonsubsampled Contourlet Transform
Sha Yu-heng, Liu Fang, Jiao Li-cheng
2009, 31(7): 1716-1721. doi: 10.3724/SP.J.1146.2007.01870
Abstract:
Based on nonsubsampled Contourlet transform and SAR image statistical property, a SAR image enhancement method is proposed. A speckle noise variance estimate algorithm is given using nonsubsampled Laplace Pyramid decompose, and a wake edge enhancemen...
Simulation Study of the Confined-Flow Multi-lenses Multi-beam Electron-Optical System
Zhang Rui, Wang Yong, Xie Jing-xin
2009, 31(7): 1722-1726. doi: 10.3724/SP.J.1146.2008.00799
Abstract:
The electron-optical system of an L-band multi-beam klystron is designed. The 2-D simulation for the system is conducted first and the 3-D simulation is done in succession. Confined-flow uniform magnetic fields focusing system with multi-lenses is ad...
Fast Numerical Solutions of Diffusion Equations in Image Processing
Wang Wei-wei, Feng Xiang-chu
2009, 31(7): 1736-1740. doi: 10.3724/SP.J.1146.2008.00475
Abstract:
Fast algorithms for solving the 2 order nonlinear diffusion equations in image processing are presented. A linear finite difference scheme incorporating the explicit scheme and the implicit scheme is given. The stability condition of the scheme is al...
Modulation Classification Algorithm for Jamming Signal Based on Cumulant
Cheng Han-wen, Zhu Lei, Wu Le-nan
2009, 31(7): 1741-1745. doi: 10.3724/SP.J.1146.2008.00910
Abstract:
In order to solve the modulation classification problem of detecting illegal or jamming signal in normal communication, a new modulation classification algorithm for the same channel jamming signal is proposed. Firstly, the effects of unknown paramet...
Parameter Estimation of 1/f-Type Fractal Signal Using Least Square Method
Gao Feng-li, Guo Shu-xu, Zhang Zhen-guo, Yu Si-yao, Li Xue-yan
2009, 31(7): 1746-1748. doi: 10.3724/SP.J.1146.2008.00833
Abstract:
A novel method to estimate the parameters of 1/f-type fractal signal is proposed according to characteristics of the wavelet coefficient variance versus scale of 1/f-type fractal signal in white noise, and namely, after the wavelet coefficient varian...
Immune Clonal SAR Image Segmentation Algorithm
Ma Wen-ping, Jiao Li-cheng, Shang Rong-hua
2009, 31(7): 1749-1752. doi: 10.3724/SP.J.1146.2008.00863
Abstract:
Because of the multiplicative nature of the speckle noise in SAR images, it is difficult to solve SAR image segmentation problems using general image segmentation technique. A novel SAR image segmentation algorithm based on an artificial immune syste...
An Efficient Signcryption Scheme Based on CPK
Chen Yong-gang, Jia Chun-fu, Lü Shu-wang
2009, 31(7): 1753-1757. doi: 10.3724/SP.J.1146.2008.01113
Abstract:
In this paper, a new signcryption scheme called CPK-SC is proposed based on Combined Public Key (CPK) to resolve the authentication and non-repudiation problem. CPK-SC discards the pairings and solves the restriction that the traditional identity-bas...
A Secure Quantum Virtual Private Network Scheme in Passive Optical Network
Huang Peng, Liu Ye, Zhou Nan-run, Zeng Gui-hua
2009, 31(7): 1758-1762. doi: 10.3724/SP.J.1146.2008.00423
Abstract:
A novel Passive Optical Network (PON) model is proposed. By exploiting this architecture, an efficient Quantum Key Distribution (QKD) protocol with Quantum Identity Authentication (QIA) is designed. In this scheme, both the QIA and QKD between optica...
A Chain Weighted Averaging LS Channel Estimation for MIMO-OFDM Systems
Liu Gang, Ge Jian-hua, Guo Yi
2009, 31(7): 1763-1766. doi: 10.3724/SP.J.1146.2008.00470
Abstract:
Channel estimation for MIMO-OFDM systems is investigated, and a chain weighted averaging LS channel estimation algorithm is proposed. Based on the FDM circular pilot sequence, the new algorithm obtains a temporal channel estimation using LS algorithm...
Opportunistic Relaying of the Physical-Layer Network Coding Packets
Lü Ling, Yu Hong-yi
2009, 31(7): 1767-1770. doi: 10.3724/SP.J.1146.2008.00640
Abstract:
To combat fading in wireless channel, an Opportunistic Relaying scheme based on Physical-layer Network Coding (PNC-OR) is proposed, which not only improves the network throughput by network coding ideas, but also achieves the multi-user diversity gai...
Researching on Random Phase-Coded to Suppress RFI in SFGPR
Li Ting-jun, Kong Ling-jiang, Zhou Zheng-ou
2009, 31(7): 1771-1774. doi: 10.3724/SP.J.1146.2008.00958
Abstract:
The Radio Frequency Interference (RFI) makes the most performance degradation for the Synthetic Aperture Imaging (SAI) and the object detection of Stepped-Frequency Ground Penetrating Radar (SFGPR). This paper proposes a random phase-coded method to ...
Reconfigurable Analog Circuit and Application Design Based on Operational Transconductance Amplifier
Ma Wei-wei, Wang You-ren, Shi Yu, Cui Jiang
2009, 31(7): 1775-1778. doi: 10.3724/SP.J.1146.2008.00919
Abstract:
The conventional coarse-grained reconfigurable analog circuits have bad flexibility, and the reConfigurable Analog Block (CAB) structure is complicated. In order to solve such problems, a new OTA-based reconfigurable analog circuit is presented in th...
Discussions
New Identity-Based Ring Signature in the Standard Model
Liu Zhen-hua, Hu Yu-pu, Mu Ning-bo, Ma Hua
2009, 31(7): 1727-1731. doi: 10.3724/SP.J.1146.2008.01207
Abstract:
null
Cryptanalysis and Improvement of Several Convertible Ring Signature Schemes
Wang Hua-qun, Guo Xian-jiu, Yu Hong, Peng Yu-xu
2009, 31(7): 1732-1735. doi: 10.3724/SP.J.1146.2008.00928
Abstract:
The security of the three convertible ring signature schemes proposed by Zhang-Liu-He (2006), Gan-Chen (2004) and Wang-Zhang-Ma(2007) is analyzed, and it is found that these convertible ring signature schemes are susceptible to convertibility attack ...