Advanced Search

2011 Vol. 33, No. 7

Display Method:
Articles
Energy Pricing Based Power Allocation and Relay Selection Algorithm for Bidirectional Cooperative OFDM Systems
Pang Li-Hua, Li Jian-Dong, Zhang Yang, Chen Dan
2011, 33(7): 1525-1531. doi: 10.3724/SP.J.1146.2010.01312
Abstract:
The network lifetime optimization issue is investigated for bidirectional two-hop cooperative Orthogonal Frequency Division Multiplexing (OFDM) systems recruiting multiple relays. Since direct treatment for the network lifetime maximization formulati...
Truncated Sequential Detection for Spectrum Sensing in Cognitive Radio
Yan Qi, Yang Jia-Wei, Zhang Wen
2011, 33(7): 1532-1536. doi: 10.3724/SP.J.1146.2011.00042
Abstract:
The detection time required to reach a decision in sequential detection is a random variable. Although the sequential detection has a high average detection speed, very long detection time may be required in some specific cases. In order to improve t...
An Algorithm for Call Admission Control Based on Connection Two-phase Activation Model in IEEE 802.16 Networks
Zuo Yong, Pan Ke, Liu Xue-Yong, Chen Jie
2011, 33(7): 1537-1543. doi: 10.3724/SP.J.1146.2010.01378
Abstract:
The data transfer is defined as connection-oriented and two-phase activation model is employed to set up connection in IEEE 802.16 networks. Considering that free resource is exhausted but some resources is reserved for those admitted service flows, ...
Performance Analysis of NNC-DFH Receiver over Nakagami Fading Channel with Partial-band Jamming
Qu Xiao-Xu, Wang Shu, Lou Jing-Yi
2011, 33(7): 1544-1549. doi: 10.3724/SP.J.1146.2010.01324
Abstract:
Noise-Normalization Combining (NNC) is applied in Differential Frequency Hopping (DFH) receiver to improve the performance of DFH system in rejecting Partial-Band Jamming (PBJ). Symbol Error Rate (SER) performance of this receiver over Nakagami fadin...
Iterative Detection Algorithm Based on Symbol Frequncy Domain Equlization for Continuous Phase Modulation
Li Qiang, Yan Qing, Luo Sheng
2011, 33(7): 1550-1555. doi: 10.3724/SP.J.1146.2010.01287
Abstract:
In this paper, the Frequncy Domain Equlization (FDE) algorithm for partial response Continuous Phase Modulation (CPM) signals is studied. A new framework of CPM transmitted signals is designed, and a novel low-complexity iterative detection approach ...
Cross-layer Resource Scheduling in OFDM-based Cooperative Cognitive Radio Networks
Liu Zhong-Jun, Xu You-Yun, Zhang Dong-Mei, Gong Bing
2011, 33(7): 1556-1560. doi: 10.3724/SP.J.1146.2010.01239
Abstract:
Cooperative communication and cognitive radio are the key candidates for the future mobile communication technologies. Focusing on the resource allocation issue in OFDM-based cooperative cognitive radio networks, an efficient cross-layer scheduling s...
Immune-clonal-selection based Spectrum Assignment for Cognitive Radio Networks
Wang Xiao-Fei, Chen Yue-Bing, Zhang Xi, Zhang Quan, Tang Chao-Jing
2011, 33(7): 1561-1567. doi: 10.3724/SP.J.1146.2010.01127
Abstract:
A spectrum assignment scheme for cognitive radio networks is proposed by means of combining graph theory with immune optimization algorithm. A binary matrix coding scheme is introduced to represent antibody population. Two operators Random-Constraint...
Multipath Flow Allocating Routing Algorithm Based on Energy Efficiency Optimization in Wireless Sensor Networks
Hao Xiao-Chen, Jia Nan, Liu Bin
2011, 33(7): 1568-1574. doi: 10.3724/SP.J.1146.2010.01370
Abstract:
Considering at the characteristic that the energy of node is limited in wireless sensor networks, an energy-efficiency optimizing model both considering transmission energy consumption and its equilibrium characteristic is build in this paper. To mak...
A Distributed Secure Data Dissemination Mechanism for Delay/Disruption Tolerant Networks
Jiao Ya-Zhou, Jin Zhi-Gang, Shu Yan-Tai
2011, 33(7): 1575-1581. doi: 10.3724/SP.J.1146.2010.01364
Abstract:
Different from traditional networks, there is often no contemporaneous end-to-end link between the source and destination in Delay/Disruption Tolerant Networks (DTN). So traditional security mechanism that based on central server is not suitable to D...
Identity-based Concurrent Signcryption Scheme
Liu Wen-Qi, Gu Hong, Yang Jian-Hua
2011, 33(7): 1582-1588. doi: 10.3724/SP.J.1146.2010.01346
Abstract:
Signcryption is a cryptographic primitive that combines both the function of digital signature and encryption in a logical single step. However, in some occasion there are conflicts of interest between the two entities, so concurrent signature is pro...
A New Method for Source Number Detection Based on Peak-to-average Power Ratio
Jiao Ya-Meng, Huang Jian-Guo, Hou Yun-Shan
2011, 33(7): 1589-1593. doi: 10.3724/SP.J.1146.2010.01222
Abstract:
In this paper, a new method based on Peak-to-Average Power Ratio Threshold (PAPRT) is proposed by combining the eigenvectors with the binary hypothesis testing. The eigenvectors are employed to weigh the received data and then the peak-to-average pow...
Improved Fast Cyclic Spectral Estimation Algorithm and Performance Analysis
Cui Wei-Liang, Jiang Hua, Li Jian-Qiang, Wu Chu
2011, 33(7): 1594-1599. doi: 10.3724/SP.J.1146.2010.01170
Abstract:
An improved fast algorithm is proposed for cyclic spectral estimation, which decreases the requirement of data quantity, without reducing the performance. The windowed overlapped data processing, which is used in time smooth method, is introduced int...
Blind Detection of QAM Signals Using Continuous Hopfield-type Neural Network
Ruan Xiu-Kai, Zhang Zhi-Yong
2011, 33(7): 1600-1605. doi: 10.3724/SP.J.1146.2010.01271
Abstract:
A novel blind detection algorithm of multi-valued square/non-square QAM signals using complex Continuous Hopfield-type Neural Network (CHNN) is proposed. The blind detection issue of multi-valued QAM signals is transformed into solving a quadratic op...
A New Fast Prime-length 2-D DCT Algorithm Based on Subset Partition
Sun Ji-Li, Tian Mao
2011, 33(7): 1606-1610. doi: 10.3724/SP.J.1146.2010.01220
Abstract:
A new fast algorithm based on subset partition for prime-length 2D Discrete Cosine Transform (DCT) is proposed. The rule of subset partition is put forward, and the frequency data of DCT output are separated into several irrelevant subsets according ...
Practical Face Recognition via Factor Analysis
Liao Hai-Bin, Chen Qing-Hu, Yan Yu-Chen
2011, 33(7): 1611-1617. doi: 10.3724/SP.J.1146.2010.01182
Abstract:
Considering the variation of illumination, expression and pose, a new face recognition algorithm is proposed based on factor analysis and data mining. The consistence of factor analysis model based on content and style with linear discriminant analys...
Face Recognition Based on Gabor Multi-channel Weighted Optimization and Sparse Representation
Yang Qing-Shan, Guo Cheng-An, Jin Ming-Lu
2011, 33(7): 1618-1624. doi: 10.3724/SP.J.1146.2010.01280
Abstract:
Very recently, the sparse representation theory in pattern recognition arouses widespread concern. In this paper, the sparse representation-based face recognition algorithms are studied. In order to make the representation coefficient vector sparser,...
Corresponding Feature Extraction Algorithm between Infrared and Visible Images Using MSER
Lian Lin, Li Guo-Hui, Wang Hai-Tao, Tian Hao, Xu Shu-Kui
2011, 33(7): 1625-1631. doi: 10.3724/SP.J.1146.2010.01111
Abstract:
Corresponding feature extraction is a key stage in infrared-visible image registration, fusion, and change detection, etc.. Considering the difficulties in correct extraction of related features between infrared and visible images of the same scene, ...
Probabilistic Sparse Kernel Logistic Multi-classifier
Zheng Jian-Wei, Wang Wan-Liang, Jiang Yi-Bo, Chen Wei-Jie
2011, 33(7): 1632-1638. doi: 10.3724/SP.J.1146.2010.01237
Abstract:
A new kernel logistic regression model based on two phase sparsity-promoting prior is proposed to render a sparse multi-classifier and enhance the run-time efficiency. For accelerating the building of the model, the bottom-up training algorithm is ad...
A New Particle Filter Based on Differential Evolution Method
Li Hong-Wei, Wang Jun, Wang Hai-Tao
2011, 33(7): 1639-1643. doi: 10.3724/SP.J.1146.2010.01212
Abstract:
The main problems of the Particle Filter (PF) are the sample degeneracy and impoverishment phenomenon. To deal with the problems, a new PF based on Differential Evolution (DE) is proposed. Firstly, the Importance Distribution (ID) which contains the ...
Ultrawideband Through-the-wall Radar Adaptive Imaging Approach Using Cross-correlation Weighting of Dual Robust Beamforming
Jin Liang-Nian, Ouyang Shan , Xiao Hai-Lin
2011, 33(7): 1644-1648. doi: 10.3724/SP.J.1146.2010.00843
Abstract:
An effective adaptive imaging method using cross-correlation weight of dual robust beamforming is proposed for UltraWideBand (UWB) through-the-wall imaging radar. Dual constrained Robust Capon Beamformings (DRCB) is applied to these 2 subarrays which...
Joint Estimation of Angle and Doppler Frequency for Bistatic MIMO Radar in Spatial Colored Noise Based on Temporal-spatial Structure
Fu Wei-Bo, Su Tao, Zhao Yong-Bo, He Xue-Hui
2011, 33(7): 1649-1654. doi: 10.3724/SP.J.1146.2011.00016
Abstract:
A method of joint estimation of angle and Doppler frequency for bistatic MIMO radar in spatial colored noise based on temporal-spatial structure is presented. In this method, based on the assumption of temporally Gaussian white noise, the cross-corre...
Location Method of Near Space Radar Network Based on Regularized Constrained Total Least Square
Wang Shen-Shen, Feng Jin-Fu, Wang Fang-Nian, Huang Feng
2011, 33(7): 1655-1660. doi: 10.3724/SP.J.1146.2010.01211
Abstract:
The regularized constrained total least square algorithm for near space radar network is discussed in this paper. Firstly the nonlinear equations about range and angle are transformed into linear equations. The influence of error is analyzed by expan...
Feature Extraction of Scattering Centers in High-resolution SAR Image
Lou Jun, Jin Tian, Song Qian, Zhou Zhi-Min
2011, 33(7): 1661-1666. doi: 10.3724/SP.J.1146.2010.00960
Abstract:
Synthetic Aperture Radar (SAR) targets detection and identification technology is one of the choke points for SAR practical application. Extraction of effective feature is the key of SAR targets detection and identification. The information of SAR ta...
A New Wind Vector Algorithm in Scanning Mode Based on Gray Cross-correlation
Zhao Feng-Jun, Liu Fan, Deng Yun-Kai, Yu Wei-Dong, Feng Jin
2011, 33(7): 1667-1670. doi: 10.3724/SP.J.1146.2010.01320
Abstract:
Theory, characteristics and shortcomings of traditional wind vector algorithm are analyzed in the beginning of this paper, and then, a new wind vector algorithm in scanning mode is delivered. The correlation of ocean wave in two neighboring scanning ...
The Detection Performance Analysis of Network Radar on Rician Targets of Pulse-to-pulse Fluctuation
Liu Yue-Ping, Jiang Qiu-Xi, Bi Da-Ping, Cui Rui
2011, 33(7): 1671-1677. doi: 10.3724/SP.J.1146.2010.01196
Abstract:
The detection performance of the four different kinds of network radar models on Rician model of pulse-to-pulse fluctuation is analyzed when the total power of single pulse of the transmitters is definite. The simulated and analyzed results show that...
High Resolution Range Imaging Method for Frequency-coded Pulse Radar Based on Compressive Sensing
He Ya-Peng, Zhuang Shan-Na, Li Hong-Tao, Zhu Xiao-Hua
2011, 33(7): 1678-1683. doi: 10.3724/SP.J.1146.2010.01281
Abstract:
A novel Compressive Sensing (CS) based high resolution target range imaging method for Frequency- Coded Pulse Radar (FCPR) is proposed in this paper. Considering spatial sparsity of the target scene, a FCPR target sparse signal model is derived. A FC...
Fast Angle Estimation Algorithm of Coherently Distributed Targets for Bistatic MIMO Radar
Guo Yi-Duo, Zhang Yong-Shun, Zhang Lin-Rang, Tong Ning-Ning
2011, 33(7): 1684-1688. doi: 10.3724/SP.J.1146.2010.01255
Abstract:
A fast angle estimation algorithm of coherently distributed targets based on bistatic MIMO radar is proposed. Firstly, the signal model of coherent distributed targets for bistatic MIMO radar is established. Then, Hadamard product rotational invarian...
High-accuracy Frequency Estimation Synthetic Algorithm in Laser Doppler Velocity Radar
Yang De-Zhao, Ou Pan , Lin Zhi-Li, Song Ning-Fang
2011, 33(7): 1689-1693. doi: 10.3724/SP.J.1146.2010.01373
Abstract:
In order to achieve high accurate measurement of objects velocity, a laser Doppler velocity radar system is established and the frequency estimation algorithm is investigated. The frequency estimation method based on autocorrelation operation is impr...
Research on Mending of Space-borne Sliding Spotlight SAR Imaging Model Error
Han Bing, Zhang Yong-Jun, Hu Dong-Hui, Huang Li-Jia
2011, 33(7): 1694-1699. doi: 10.3724/SP.J.1146.2010.01259
Abstract:
Sliding spotlight SAR, which is between strip-map SAR and spotlight SAR, is a unique imaging mode. Concerning on the long illuminating time and long accumulating time of high-resolution and wide-coverage-area space-borne sliding spotlight SAR, the pr...
New Method for Improving the Performance of SAR Image Segmentation
Yan Xue-Ying, Jiao Li-Cheng, Wang Ling-Xia, Wan Hong-Lin
2011, 33(7): 1700-1705. doi: 10.3724/SP.J.1146.2010.01190
Abstract:
Considering the shortage of edge preservation and low direction-resolution for SAR image segmentation based on the conventional wavelet transform domain, a new segmentation method is proposed based on Gray-Level Cooccurrence Probability (GLCP) featur...
Auto-interpretation for Bridges over Water in High-resolution Space-borne SAR Imagery
Zhang Shao-Ming, He Xiang-Chen, Zhang Xiao-Hu, Sun Yi-Wei
2011, 33(7): 1706-1712. doi: 10.3724/SP.J.1146.2010.01341
Abstract:
An automatic method for detecting and interpreting bridges over water in high-resolution space-borne synthetic aperture radar imagery is proposed. Firstly, the textual features for image classification are computed, including response for Gabor filte...
Research of Detection Technique of Navigation Signals Evil Waveform
Wang Bin, Pang Yan, Liu Hui-Jie
2011, 33(7): 1713-1717. doi: 10.3724/SP.J.1146.2010.01163
Abstract:
The detection of navigation signals evil waveform based on multicorrelator is an important issue of GNSS integrity monitoring. This paper defines the effect of 2nd-order step threat model of evil waveform on the code tracking loop, analyzes the multi...
Simulation of the Electromagnetic Scattering for Target Coated with Anisotropic Materials
Yu Ding-Feng, He Si-Yuan, Zhu Guo-Qiang, Zhang Fan
2011, 33(7): 1718-1721. doi: 10.3724/SP.J.1146.2010.01230
Abstract:
The Method of Moments (MoM) based on Impedance Boundary Condition (IBC) is presented to analyze the electromagnetic scattering characteristics of three-dimensional target coated with anisotropic materials. According to the surface equivalence princip...
Study on Electron Emission Phenomenon of Cathode Evaporator
Yang Jing-Xin, Yin Sheng-Yi, Wang Yu, Wang Xin-Xin
2011, 33(7): 1722-1726. doi: 10.3724/SP.J.1146.2010.01219
Abstract:
In order to study electron emission phenomenon of cathode evaporator, a new designed test device is used to collect the electron emission curve of evaporator deposited on polycrystalline tungsten surface, Electron emission microscope and SEM are used...
A New Type S-band High-average-power Broadband Klystron
Zhang Zhao-Chuan, Shen Bao-Li, Yu Xiao-Juan, Zhang Feng, Huang Yun-Ping
2011, 33(7): 1727-1732. doi: 10.3724/SP.J.1146.2010.01260
Abstract:
This paper presents the design considerations, the simulation results and the test results for a new type S-band high-average-power broadband klystron. In this paper, a method which is used for verifying the quality of an electron-optics-system of a ...
Logic Equivalent Transformation for Nano-meter CMOS Hybrid Circuits
Xia Yin-Shui, Chu Zhu-Fei, Wang Lun-Yao, Hung William N N, Song Xiao-yu
2011, 33(7): 1733-1737. doi: 10.3724/SP.J.1146.2010.01208
Abstract:
Regarding the connectivity domain constraint in nano-meter circuit architecture, this paper proposes a circuit equivalent transformation method based on logic replication for reducing mapping complexity. The fanout degrees of all gates in a circuit a...
A New Histogram-based Kernel Function Designed for Image Classification
Jia Shi-Jie, Kong Xiang-Wei
2011, 33(7): 1738-1742. doi: 10.3724/SP.J.1146.2010.01244
Abstract:
Kernel-based Support Vector Machine (SVM) is widely used in many fields ( e.g. image classification) for its good generalization, in which the key factor is to design effective kernel functions. As there is not much a priori knowledge introduced into...
Salt-and-pepper Noise Removal by Variational Method Based on Improved Adaptive Median Filter
Sun Hai-Ying, Li Feng, Shang Hui-Liang
2011, 33(7): 1743-1747. doi: 10.3724/SP.J.1146.2010.01295
Abstract:
To improve the performance of salt-and-pepper noise removal, a two-stage scheme is proposed. In the first phase, an improved adaptive median filter is used to identify pixels which are likely to be contaminated by noise (noise candidates). In the sec...
Blind Despreading of Synchronous Multi-user Long-code DS-SS Signals
Zhang Hua-Guo, Wei Ping
2011, 33(7): 1748-1751. doi: 10.3724/SP.J.1146.2010.01236
Abstract:
In this paper, a blind despreading algorithm is proposed for the synchronous multi-user long-code Direct Sequence Spread Spectrum (DS-SS) signals in low Signal to Noise Ratio (SNR) scenarios. The synchronous multi-user long-code DS-SS signals are rep...
A Further Enhanced M-estimator for the K-distribution Shape Parameter
Li Da-Peng, Yao Di
2011, 33(7): 1752-1755. doi: 10.3724/SP.J.1146.2010.00958
Abstract:
M-estimator is a new estimator presented by Hao Cheng-peng in 2005, which possesses higher accuracy in the estimation of shape parameter of K-distribution and is enhanced in 2007. In this paper, a further enhanced M-estimator is proposed based on the...
Research on Range Profile Synthesizing Method for High Speed Moving Target in Stepped Frequency Modulated Radar
Hu Jie-Min, Fu Yao-Wen, Wei Xi-Zhang, Li Xiang, Jing Ning
2011, 33(7): 1756-1760. doi: 10.3724/SP.J.1146.2010.00798
Abstract:
Because its capability in long-range imaging with simple hardware architecture, the stepped frequency modulated signal has an obvious advantage in modern radar target recognition. The principle of synthesizing the range profile using stepped frequenc...
Two Cryptographic Properties of Strong Security Tweakable Enciphering Scheme
Guo Rui, Jin Chen-Hui
2011, 33(7): 1761-1764. doi: 10.3724/SP.J.1146.2010.01110
Abstract:
This paper presents the concepts of sorted-attack security and generalized sorted-attack security of tweakable enciphering schemes under chosen-plaintext and chosen-ciphertext attacks. Firstly, it is proved that those two notions are equivalence. Sec...
k-error Linear Complexity of Output Sequences of Single Cycle T-function
Luo Xiao-Jian, Hu Bin
2011, 33(7): 1765-1769. doi: 10.3724/SP.J.1146.2010.00853
Abstract:
The k-error linear complexity of the output sequences of single cycle T-function is investigated with the polynomial theory and the Chan Games algorithm as the main tools. All of the linear complexity drop points and the k-error linear complexity on ...
Differential Enumeration Attack on ARIA
Chen Shao-Zhen, Lu Lin-Zhen
2011, 33(7): 1770-1774. doi: 10.3724/SP.J.1146.2010.01292
Abstract:
The 4-round ARIA differential property is given, and the differential enumeration attack on 7-round and 8-round ARIA-256 is presented in this paper. The attacks need 256 chosen plaintexts. The attack on 7-round ARIA has the time complexity of 2238.2 ...
Research of Logic Function Synthesis Algorithm Based on Threshold Logic
Wei Yi, Shen Ji-Zhong
2011, 33(7): 1775-1778. doi: 10.3724/SP.J.1146.2010.01199
Abstract:
Threshold Logic Gate (TLG) is receiving much attention because of its logic versatility and functionally complete. For the circuit design based on TLG, a method is described to determine whether a function is threshold or not with the spectral techno...