电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Quick Search  
  Advanced Search
2010 Vol.32 No.3, Published: 19 March 2010
Articles | Reviews |
 
 
Articles
Select  |    Cite this article 
Dong Jun,Wang Suo-ping,Xiong Fan-lun
Affinity Propagation Clustering Based on Variable-Similarity Measure
2010 Vol. 32 (3): 509-514 [Abstract] ( 3777 ) [PDF 269KB] ( 4225 )    DOI: 10.3724/SP.J.1146.2009.01066

Affinity Propagation (AP) clustering is not fit to deal with multi-scale data cluster as well as the arbitrary shape cluster issue. Therefore, an improved affinity propagation clustering algorithm AP-VSM (Affinity Propagation based on Variable-Similarity Measure) is proposed embarking from the token of data distribution characters. First, a kind of variable-similarity measure method is devised according of characters of global and local data distribution, which has the ability of describing the characters of data clustering effectively. Then AP-VSM clustering algorithm is proposed base on the frame of traditional AP algorithm, and this method has extended data processing capacity compared with traditional AP. The simulation results show that the new method is outperforming traditional AP algorithm.

Select  |    Cite this article 
Liu Ruo-chen,Niu Man-chun,Jiao Li-cheng
A New Artificial Immune Network Algorithm for Classifying Complex Data
2010 Vol. 32 (3): 515-521 [Abstract] ( 2842 ) [PDF 452KB] ( 1634 )    DOI: 10.3724/SP.J.1146.2009.00309

As a new computational intelligence method, the Artificial Immune Network (AIN) is widely applied to pattern recognition and data classification. Existing artificial immune network algorithms for classifier have two major limitations: one is the scale of the networks, a large scale of networks needs high computation complexity, the other is only once presenting the antigens that can not guarantee find the optimal global classifier. A new Artificial Immune Network Classifier (AINC) algorithm is proposed in this paper. In the proposed algorithm, only one B-cell is used to denote single class in order to reduce the scale of network, and avoid the suppression operation between B-cells, moreover, a new affinity based on the correct rate is proposed to realize the evaluation strategy based on antigen priority. The proposed algorithm is extensively compared with Fuzzy C-Means (FCM), Multiple-Valued Immune Network algorithm (MVIN), and Clonal Selection Algorithm for classifier (CSA) over a test suit of several real life data sets and one SAR image. The result of experiment indicates the superiority of the AINC over FCM, MVIN and CSA on accuracy and robustness.

Select  |    Cite this article 
Zong Hua,Zong Cheng-ge,Yu Chang-jun,Quan Tai-fan
Research and Application on NFE Model of Multi-Sensor Information Fusion
2010 Vol. 32 (3): 522-527 [Abstract] ( 2748 ) [PDF 275KB] ( 1312 )    DOI: 10.3724/SP.J.1146.2009.00249

Aiming at information fusion problem under complex environment, an intellectualized information fusion model, NFE model, which is an organic combination of Neural network, Fuzzy reasoning and Expert system is proposed. The necessity of constructing a complete three-dimensional intelligent information fusion model is analyzed from an engineering perspective. Considering various factors including sensor performance, weather situation, electronic interfere and clutter intensity that effect the credibility of sensors, analysis for weights of sensors is provided and credibility estimator is designed. Simulation experiments prove that the NFE model could realize target recognition effectively under the circumstances of low confidence and sensor fault etc.

Select  |    Cite this article 
Chen Cun-bao,Zhao Li
Speaker Identification Based on GMM with Embedded AANN
2010 Vol. 32 (3): 528-532 [Abstract] ( 3064 ) [PDF 267KB] ( 1078 )    DOI: 10.3724/SP.J.1146.2008.00275

In this paper, a modified Gaussian Mixed Model (GMM) with an embedded Auto-Associate Neural Network (AANN) is proposed. It integrates the merits of GMM and AANN. GMM and AANN as a whole are trained by means of Maximum Likelihood (ML). In the process of training, the parameters of GMM and AANN are updated alternately. AANN reshapes the distribution of the data and improves the similarity of the data in one class. Experiments show that the proposed system improves accuracy rate against baseline GMM at all SNR, maximum to 19%.

Select  |    Cite this article 
Huang Qing-dong①②,Zhang Lin-rang,Li Guo-min①③,Lu Guang-yue
A Multistage Minimal Module Cascaded Canceller Under Small Samples Support
2010 Vol. 32 (3): 533-538 [Abstract] ( 3041 ) [PDF 302KB] ( 852 )    DOI: 10.3724/SP.J.1146.2009.00352

Due to the defects of high complexity and instability convergence performance in the array signal adaptive canceller under the correlated interference, an enhanced array signal multistage cascaded canceller is proposed by substituting the weights of the multistage Winner filter for the minimal module weights, which have the minimal module of the samples quotient between channels. The enhanced algorithm has the ability of fast convergence, less operation and performs well with non-stationary samples distorted by the correlated interference. Simulation results indicate the algorithm can reach convergent performance of the kind of Sample Matrix Inversion (SMI) algorithm using less samples.

Select  |    Cite this article 
Ren Pin-yi,Ling Jie,Wang Rui
A Simplified Maximum Likelihood Detection Algorithm Based on Noise Analysis in V-BLAST System
2010 Vol. 32 (3): 539-543 [Abstract] ( 2683 ) [PDF 252KB] ( 992 )    DOI: 10.3724/SP.J.1146.2009.00235

A novel simplified Maximum Likelihood (ML) detection algorithm based on noise analysis is proposed for Vertical-Bell Labs Layered Space-Time (V-BLAST) system. This algorithm chooses the signal points near the reference line in a multi-dimension space to form the signal subset,finally selects the proper signal vector in the subset as final estimation of the transmitted signals based on ML algorithm. Theoretical analysis and simulation shows that the proposed algorithm not only guarantees the near optimum error rate performance, but also has lower computational complexity, and solves the noise enhancement problem.

Select  |    Cite this article 
Li Hui①②,Wang Yan-fei
The Contrastive Study between Direct FFT and Phase Difference in Parameter Estimation of Sinusoidal Signal
2010 Vol. 32 (3): 544-547 [Abstract] ( 3081 ) [PDF 205KB] ( 1814 )    DOI: 10.3724/SP.J.1146.2008.01006

This paper firstly studies parameter estimation issue directly based on FFT. Thereby, the relationship between the frequency and phase estimation is exposed. Subsequently, the estimation error formula of phase difference arithmetic are deduced and validated by computer simulation. The compare of two methods shows that phase difference arithmetic possesses lesser calculation quantity. Simultaneously, it can gain highly accurate, mutually independent parameter estimation under low SNR. So phase difference arithmetic is easy to realize in engineering field much more.

Select  |    Cite this article 
Bai Lu①②,Cao Fang,Hong Wen
Fast Approach to Estimate the Longest Axis in Coherence Region and Its Applications
2010 Vol. 32 (3): 548-553 [Abstract] ( 2662 ) [PDF 326KB] ( 950 )    DOI: 10.3724/SP.J.1146.2009.00211

The longest axis in coherence region, which gives the largest distance between any two coherences, is significant in forestry applications using coherence scattering model, because it reflects the linear variation of complex coherences with the polarization states. To improve the efficiency and accuracy of traversal search, a fast approach is proposed to estimate longest axis in this paper. It uses the line segment of the tangent points of the rectangle externally tangent to coherence region to get the initial estimation for the longest axis. Nest, it obtains the longest axis using the approximation technique. To improve forest height estimation, a forest parameter inversion technique using the longest axis is presented. Results of simulated data for pine forest show the fast approach consumes much less computation time and gives better estimations for the longest axis than traversal search method. Results also show that the introduction of longest axis in forest parameter inversion yields closer estimations to the true forest height.

Select  |    Cite this article 
He Si-san,Zhou Jian-xiong,Zhao Hui-ning,Fu Qiang
Micro-Doppler Signal Extraction Based on AM-LFM Decomposition
2010 Vol. 32 (3): 554-558 [Abstract] ( 2425 ) [PDF 421KB] ( 1133 )    DOI: 10.3724/SP.J1146.2009.00444

The issue of micro-Doppler signal separation from collected data of targets with micro-motion structures is addressed. The signal mode for target with micro-motion structures is analyzed and the results show that the Doppler frequency of main body is constant and the micro-Doppler frequency is time varying, which can be fitted by a series of piecewise linear frequency modulation signal. A method, which decomposes radar signal to AM-LFM (amplitude modulation-linear frequency modulation) components and determines each component’s corresponding structure by frequency modulation rate, is proposed to extract micro-motion echoes from the main body echoes. Simulated and experimental results verify the correctness of proposed method.

Select  |    Cite this article 
Jiang Fei,Liu Zhong,Hu Wen,Bao Bo-cheng①③
Analyses of Continuous-Chaos Frequency-Modulating Signal of Radar
2010 Vol. 32 (3): 559-563 [Abstract] ( 2850 ) [PDF 315KB] ( 1220 )    DOI: 10.3724/SP.J.1146.2009.00251

The mathematical expression of Continuous-Chaos Frequency-Modulating Signal (CCFMS) is given. The auto-correlation function and root-mean-square bandwidth of CCFMS are derived in theory. The results show that autocorrelation function of CCFMS has excellent side lobe suppression performance. Its RMS bandwidth is proportional to frequency modulation index and RMS of chaotic signal. The performance of CCFMS is further confirmed with typical chaos. It is found that CCFMS has high time peak to side lobe ratio, flat power spectrum, almost thumbtack ambiguity function and peak to average power ratio equal to that of sinusoidal signal. The performance of CCFMS radar against noise is analyzed. Compared with LFMS radar, CCFMS radar has obvious anti-jamming advantages with signal-to-interference ratio improvement factor increased by about 5.5 dB.

Select  |    Cite this article 
Su Jun-hai,Zhang Long①②,Xing Meng-dao
Wideband Radar Detection for Maneuvering Multi-Target
2010 Vol. 32 (3): 564-569 [Abstract] ( 2647 ) [PDF 444KB] ( 1746 )    DOI: 10.3724/SP.J.1146.2009.00257

A new method for detection of multi-target in wideband signal is proposed. Firstly the adjacent correlation is employed to decrease the order of the echoes. Then the Ambiguity function is applied to the auto-term of the result of the adjacent correlation. Further a Radon transform is performed for target energy accumulation, and then the target detection can be carried out. The results of simulated data show the effectiveness of the proposed method.

Select  |    Cite this article 
Wu Xiang-dong①②,Zhao Yong-bo,Zhang Shou-hong,Dong Mei
Height Finding of Meter-wave Radar Using Improved Toeplitz Technique at Low-Angle Environment
2010 Vol. 32 (3): 570-574 [Abstract] ( 2544 ) [PDF 248KB] ( 950 )    DOI: 10.3724/SP.J.1146.2008.00797

The echo waves of radar received consist of direct wave and multipath wave which is reflected from earth (sea) surface and coherent with direct wave. Two new height finding algorithms using improved Toeplitz technique at low-angle environment are presented. The first method uses not only every row elements but also corresponding every column elements of array covariance matrix to construct a Toeplitz matrix, a new covariance matrix is obtained taking average these two matrixes, this process is equivalent to spatial smoothing and improves the accuracy of DOA estimation of elevation. The second method based on the first method, reconstructing a Toeplitz matrix to approach the subspace of above covariance matrix constraint to maximum SNR (Signal Noise Ratio), it can reduce the influence of the noise to a certain extent and improve the robust of algorithm. Theoretical analysis and simulation results demonstrate the merits of the new algorithm.

Select  |    Cite this article 
Jin Liang-nian; Ouyang Shan①②
Analysis of Time-Hopping Sequences Modulated UWB Orthogonal Hermite Pulse-Sequence Radar Signal
2010 Vol. 32 (3): 575-581 [Abstract] ( 2675 ) [PDF 347KB] ( 939 )    DOI: 10.3724/SP.J.1146.2008.00641

An ultra-wideband orthogonal Hermite pulse is an appropriate family of pulses that can represent the commonly-used waveforms in through-the-wall surveillance radar. It has advantages of flexible design,high spectrum utilization and simple design. An analytical expression of the ambiguity function for a train of Time-hopping Modulated Ultra-WideBand (TM-UWB) Hermite waveforms is derived. The relation of resolution,side-lobe suppression characteristic and unambiguous for TM-UWB impulse waveforms with the autocorrelation properties, period of time-hopping sequences, and the average pulse repetition period, order number and scaling parameter of the Hermite signal are investigated, and some application issues for through-the-wall surveillance radar,such as sidelobe suppression and clutter suppression, are also discussed.

Select  |    Cite this article 
Ren Xiao-zhen①②; Yang Ru-liang
An Inverse Problem Based Approach for Differential SAR Tomography Imaging
2010 Vol. 32 (3): 582-586 [Abstract] ( 2527 ) [PDF 337KB] ( 866 )    DOI: 10.3724/SP.J.1146.2009.00259

When reconstructing elevation-velocity image, the observation data obtained from differential SAR tomography in baseline-time plane does not follow uniform distribution. If the elevation-velocity image of multiple scatterers is obtained using two-dimensional FFT method, the imaging result is not very good because of high sidelobes. In this paper, a new differential SAR tomography imaging algorithm is proposed based on Backus- Gilbert technique. In this algorithm, the elevation-velocity imaging is converted into an inverse problem of two- dimensional integral function, and Tikhonov regularization is used to get the regularized solution of the inverse problem. Simulation results show that the proposed algorithm can overcome the influence caused by non-uniform samples, and acquire better imaging result.

Select  |    Cite this article 
Yi Yu-sheng; Zhang Lin-rang; Liu Xin; Liu Nan; Shen Dong
A Large Scene Imaging Algorithm for Missile-borne Side-looking SAR
2010 Vol. 32 (3): 587-592 [Abstract] ( 2816 ) [PDF 355KB] ( 1022 )    DOI: 10.3724/SP.J.1146.2009.00283

The large range migration produced by missile diving acceleration flight make SAR image difficult. This paper establishes the echo model of the missile-borne SAR by using the high order range model based on the characters of the missile movements. Considering the large scene, the change of the slant range is analyzed in details. Then, the two-dimensional point target spectrum is derived by the method of series reversion. A large scene imaging algorithm used for diving acceleration flight is presented. Finally, simulation results are presented to demonstrate the accuracy and validity of the proposed algorithms. The resolution of range and azimuth are identical with the theoretical values.

Select  |    Cite this article 
Wu Yong①②; Song Hong-jun; Peng Jin
Chirp Scaling Imaging Algorithm of SAR in High Squint Mode Based on Range Walk Removal
2010 Vol. 32 (3): 593-598 [Abstract] ( 3046 ) [PDF 334KB] ( 1075 )    DOI: 10.3724/SP.J.1146.2009.00472

SAR echo signal in high squint mode features large range walk and small range curvature. An improved CS imaging algorithm based on range-walk removal is proposed. First, range-walk is removed in time domain. Second, range curvature is corrected in frequency domain. Finally, geometry correction is used to correct geometric distortion. The coupling between azimuth and range is greatly reduced after range-walk removal. Therefore, it satisfies the imaging quality of SAR in high squint mode and the width of the scene swath is broadened as well. Simulation results illustrate that it satisfies the imaging quality of SAR in high squint mode and large scene swath.

Select  |    Cite this article 
Ma Li-xiang; Cheng Li; Tang Yu
Research on Motion Compensation Algorithm for High Resolution Spotlight SAR
2010 Vol. 32 (3): 599-603 [Abstract] ( 3149 ) [PDF 360KB] ( 1223 )    DOI: 10.3724/SP.J.1146.2009.00197

Spotlight SAR is an efficiency way to obtain high resolution radar image. The non-stability of the aircraft motion during the long synthetic aperture time can make the image suffer the severe defocus, and there is phase error in the range direction in the high resolution SAR system. This paper presents a novel signal processing method based on echo signal to get high definition resolution spotlight SAR image, which can make an effective estimation on the aircraft position error, the phase error in range direction and the residual envelop error. The experiment results show that the proposed approach can get the high quality SAR image from raw data.

Select  |    Cite this article 
Xie Xin; Li Guo-lin; Liu Hua-wen
DOA Estimation of Coherent Signals Using one Snapshot
2010 Vol. 32 (3): 604-608 [Abstract] ( 2852 ) [PDF 253KB] ( 1219 )    DOI: 10.3724/SP.J.1146.2009.00321

A new decorrelation algorithm based on one single snapshot is proposed for Direction-Of-Arrival (DOA) estimation of coherent signals on a ULA, which reconstructs a Toeplitz matrix using the observed data vector directly. It is proved that the rank of this Toeplitz matrix is determined merely by the number of incident sources and has no relations with the coherency of the signals. Then accurate signal subspace and noise subspace can be acquired by performing eigenvalue decomposition of the matrix. Combined with the subspace kind algorithms such as MUSIC and ESPRIT, the DOA of coherent signals can be estimated. Simulation results verify that the proposed algorithm is effective.

Select  |    Cite this article 
Lin Guo-qing①②; Chen Ru-wei; Wang Xin-mei; Xiao Guo-zhen
Construction of Quasi-Cyclic LDPC Codes From Prime Fields
2010 Vol. 32 (3): 609-612 [Abstract] ( 2696 ) [PDF 216KB] ( 815 )    DOI: 10.3724/SP.J.1146.2009.00208

This paper presents a method to construct quasi-cyclic LDPC codes from prime fields. This method is a generalization of a method proposed by Lan et al to construct quasi-cyclic LDPC codes based on finite fields, and gives a much larger class of quasi-cyclic LDPC codes based on prime fields. Simulations show that quasi-cyclic LDPC codes constructed by the proposed method perform well over AWGN channels with iterative decoding.

Select  |    Cite this article 
Lin Xue-hong; Niu Kai; Lin Jia-ru
The Constraint Conditions for LDPC Codes in Cryptosystem
2010 Vol. 32 (3): 613-616 [Abstract] ( 2562 ) [PDF 221KB] ( 839 )    DOI: 10.3724/SP.J.1146.2009.00160

This paper first presents Belief Propagation (BP) iteration algorithm in LDPC code-based public-key cryptosystems, and develops the necessary condition of private key if the probability of plaintext is equal. Then the necessary and sufficient condition of public key is deduced according to the recursion of BP iteration algorithm. Simulations show that the parameters of private key and public key are correct.

Select  |    Cite this article 
Zhao Rui①②; Zou Ying-quan; Li Chun-guo;; Yang Lu-xi
OFDM Amplify-and-Forward Two-Way Relaying for Multiuser MIMO Networks
2010 Vol. 32 (3): 617-622 [Abstract] ( 3171 ) [PDF 315KB] ( 880 )    DOI: 10.3724/SP.J.1146.2009.00335

In multiuser MIMO communication networks, a new amplify-and-forward two-way relaying scheme is proposed employing OFDMA for the multiple access transmission in the first time slot and OFDM/SDMA for the broadcast transmission in the second time slot to improve the performance of the system through utilizing frequency diversity and spatial diversity. Considering the characteristic of two-way relaying, the relay beamforming matrixes are designed according to two methods respectively, i.e., signal to leakage and noise ratio (SLNR) and block diagonalization based zero-forcing (BDZF), on per subcarrier basis. The upper bound on the capacity region of this two-way relay network is also derived by using cut-set theory. Simulation results show that the proposed scheme outperforms three other two-way relaying schemes in terms of sum rate and can approach the upper bound of capacity region.

Select  |    Cite this article 
Li Mo; Xu You-yun; Cai Yue-ming
Q-Learning Based Sensing Task Management Algorithm for Cognitive Radio Systems
2010 Vol. 32 (3): 623-628 [Abstract] ( 2804 ) [PDF 306KB] ( 1157 )    DOI: 10.3724/SP.J.1146.2009.00296

More than an adaptive system, the cognitive radio system is an intelligent system. The Q-Learning of the intelligent control theory is adopted in the paper, to solve the sensing task allocation problem among cognitive users. And a Q-Learning based sensing management algorithm is proposed. The algorithm allocates sensing tasks to users through times of interaction with the environment and self-learning. The scheme of the paper works without any channel state information and estimation of primary traffic. From the simulation result, the algorithm could improve the sensing efficiency compared to the static allocation algorithm and attain to the convergence in a short time, which could be an attempt to the future intelligent cognitive radio systems.

Select  |    Cite this article 
Sun Jun; Zhu Hong-bo
One Cross-layer Scheduling Scheme Based on the TSS in IEEE802.22 Standard
2010 Vol. 32 (3): 629-632 [Abstract] ( 2434 ) [PDF 225KB] ( 951 )    DOI: 10.3724/SP.J.1146.2009.00612

In this paper, one sensing-slots scheduling scheme is proposed by using cross-layer design based on IEEE802.22 draft standard. In order to improve the whole system performance, the parameters of TSS scheme in current IEEE802.22 draft are further studied and modified by using cross-layer design. A new sensing-slots scheduling scheme on the MAC layer is proposed from two aspects. First, on the basis of the second-order statistic properties of wireless fading channels on the physical layer, the scheduling frequency of fast sensing timeslot is defined. Then, in order to maximize the transmission throughput for sencondary users, the duration of fine sensing stage is optimized. It is proven that the scheme proposed in this paper makes the TSS scheme more explicit, effective and be able to adapt to varying transmission environments.

Select  |    Cite this article 
Pei Min-yan; Cheng Wen-jing; Wei ji-bo
Joint ML Time-Frequency Synchronization and Channel Estimation for MIMO Systems Using Orthogonal Training Sequences
2010 Vol. 32 (3): 633-637 [Abstract] ( 2953 ) [PDF 281KB] ( 839 )    DOI: 10.3724/SP.J.1146.2009.00163

This paper addresses the issue of joint Maximum-Likelihood (ML) time-frequency synchronization and channel estimation for Multiple-Input Multiple-Output (MIMO) systems. The resulting joint ML estimation requires solving a maximization problem with no closed-form solution. Since numerical calculation of the estimation is computationally hard, a computationally efficient closed-form ML solution is proposed using two repetitions of orthogonal training sequences. With theoretical analysis and simulations, the mean-square errors of the ML estimates versus the average SNR and the number of antennas are investigated, and then the performance of the proposed estimator is compared with the Cramer-Rao Bound (CRB). The results prove the effectiveness of proposed estimator.

Select  |    Cite this article 
Zhao Li; Sun Xian-pu; Zhang Hai-lin
An Improved Water-filling Algorithm for Discrete Bit Allocation
2010 Vol. 32 (3): 638-642 [Abstract] ( 2958 ) [PDF 253KB] ( 1340 )    DOI: 10.3724/SP.J.1146.2009.00328

In this paper, an improved water-filling algorithm is proposed for the problem of Discrete Bit Allocation DBA in OFDM systems. The bit-water-level, defined in this paper as the water-filling level under which the power allocated to a certain sub-carrier satisfies the integer bit constraint, is used in the proposed algorithm. First, using the bit-water-levels of the sub-carrier with the maximal channel gain, bits and power are allocated to all the sub-carriers. Then, the allocation results are adapted to satisfy the total transmit power constraint. It is proved that the algorithm yields the optimal solution and its computational complexity depends only on the number of sub-carriers.

Select  |    Cite this article 
Lin Yu-qing; Zhu Qi①②; Zhu Hong-bo
A Three-Level Market-Based Scheme of Spectrum Allocation for Cognitive Ad hoc Networks
2010 Vol. 32 (3): 643-648 [Abstract] ( 2777 ) [PDF 334KB] ( 851 )    DOI: 10.3724/SP.J.1146.2009.00332

Clustering is the main framework of large scale Ad Hoc networks, and one of its key technologies is spectrum allocation. In this paper, a novel three-level market-based scheme of spectrum allocation is proposed for cognitive clustered Ad Hoc networks. In this scheme, cluster headers buy spectrum from spectrum administrator of primary service according to the estimation of their demands, and a market-based algorithm which stems from microeconomic theory is adopted in the spectrum allocation within each cluster. An analysis is given on the iterative pricing algorithms of Excess Demand-Based (EDB) and Successive Over-Relaxation (SOR) for in-cluster market as well as on the process of spectrum purchase based on demand executed by cluster headers. The simulation results show that cluster profit is maximized by adopting the market-based algorithm, and that a significantly utility improvement is achieved by demand-based purchase of cluster headers compared with equal purchase. As a result, the spectrum allocation scheme proposed in this paper can improve the system performance efficiently. The convergence of EDB and SOR iterative algorithms is also proved by simulation.

Select  |    Cite this article 
Li Le; Xiong Zhi-hui; Wang Bin; Zhang Mao-jun; Chen Li-dong
High-Speed Data Communication Between DSP and FPGA in Embedded Panoramic Video Processing System
2010 Vol. 32 (3): 649-654 [Abstract] ( 3038 ) [PDF 388KB] ( 1612 )    DOI: 10.3724/SP.J.1146.2009.00329

As the huge computational loads of panoramic video processing, most of the embedded panoramic video processing system are based on multi-cores. The problem of high-speed data communication between multi-cores must be solved. A high-speed data communication method between DSP and FPGA is proposed. In order to realize high-speed data communication, the address-bus is used to transport commands, the wave of data communication between dual-cores in DMA mode is analyzed and simulated. The experiments show that the data transmission speed is up to 588 MBps between DSP and FPGA by using those methods.

Select  |    Cite this article 
Zhao Ji-jun; Wang Li-rong①②; Ji Yue-feng; Xu Da-xiong
A Performance Comparison Study of Impairment-Aware Dynamic RWA Algorithms
2010 Vol. 32 (3): 655-659 [Abstract] ( 2684 ) [PDF 263KB] ( 817 )    DOI: 10.3724/SP.J.1146.2009.00253

Set out from the evolution to all-optical transparent infrastructure and to service-orient characteristic, the researches on impairment-aware routing and wavelength assignment algorithms are surveyed and analyzed. Three new dynamic impairment-aware routing and wavelength assignment algorithms (IBest, IFF, IPack)are proposed through increasing the consideration of physical impairments effect on classic routing and wavelength assignment algorithms. The results from simulation show that the proposed algorithms both can maintain its competitive edge from corresponding classic ones and are superior to the classic ones in blocking probability in realistic circumstance with impairments.

Select  |    Cite this article 
Rui Lan-lan; Meng Luo-ming; Qiu Xue-song
Terminal Service Context Definition Method and Service Model
2010 Vol. 32 (3): 660-665 [Abstract] ( 2772 ) [PDF 255KB] ( 1151 )    DOI: 10.3724/SP.J.1146.2009.00181

While current research on service context mainly focuses on service quality and seldom consider personal terminal environment, a terminal environment related context named Terminal Service Context is proposed, which could provide essential information support for ubiquitous services. A general terminal service context definition method is provided, which could draw feature parameters of terminal environment for all kinds of service scenarios, and form formalized and retrievable contexts. Furthermore, service model based on the terminal service context is given and the storage and application methods of the context are analyzed. Finally, the proposed definition method and service model are verified by a typical ubiquitous service scenario. The results show that the method can extract the context required by ubiquitous service. Based on the model, service platform can adapt to heterogeneous terminal environments dynamically, and provide individualized presentation and handoff services for users.

Select  |    Cite this article 
Cao Chang; Zhang Yong-jun; Shi Shuai; Li Bin; Huang Shan-guo; Zhang Jie; Gu Wan-yi
Research on the Encapsulations Issues of Circuit Emulation Service for T-MPLS Network
2010 Vol. 32 (3): 666-670 [Abstract] ( 2479 ) [PDF 266KB] ( 900 )    DOI: 10.3724/SP.J.1146.2009.00190

This paper studies encapsulated packet length of circuit traffic in the multi-service transport multi- protocol label switching network, which based on ITU-T standards. And the paper compared the performance of the network according to different TDM packet length. Then, an adjustment scheme is proposed to change the packet length dynamically. With the consideration of the real-time conditions of the traffic’s latency and variance, this scheme calculates the suitable payload sizes in the destination node and feeds back to the source node, in order to adjust this size in the adaptation module. This scheme is implemented in a testbed based on OPNET modeler for performance evaluation. The simulation results show that, compared with traditional constant bit encapsulation scheme, this scheme works more effectively both on the transmission quality and efficiency, and meets the requirement of supporting circuit traffic.

Select  |    Cite this article 
Fei Gao-lei; Hu Guang-min; Qian Feng
A Novel Method for Nonstationary Network Internal Loss Tomography
2010 Vol. 32 (3): 671-676 [Abstract] ( 2843 ) [PDF 286KB] ( 1009 )    DOI: 10.3724/SP.J.1146.2009.00186

Most of network link parameters inference methods assume that link states are stationary during measurement period, and can not obtain time-varying characteristics of link parameters. In this paper, a novel nonstationary internal loss tomography method is proposed. Assume in a relatively short time window, the time-varying curves of link loss rates are described by k times continuous differentiable functions. The k-th order Taylor Serieses of these functions are estimated using network tomography approach. Then based on the estimates of each time window, the time-varying link loss rates of entire measurement period are obtained by integrating the estimates of all time windows using Inverse Distance Square Weighted algorithm. NS2 simulations show that the method is capable of tracking variation of link loss rates effectively, and superior existing stationary internal loss tomography methods.

Select  |    Cite this article 
Zhang Ke①②; Zeng Jia-zhi; Liu Wei
Data Delivery Scheme of DTMSN Based on Probability Replication and Its Performance Research
2010 Vol. 32 (3): 677-681 [Abstract] ( 2540 ) [PDF 309KB] ( 1189 )    DOI: 10.3724/SP.J.1146.2009.00262

A new data delivery scheme-PRD (Probability Replication Delivery scheme) is proposed for pervasive data gathering in DTMSN (Delay Tolerant Mobile Sensor Networks) that networks with intermittent connectivity in space. PRD consists of two key components for data transmission and queue management, respectively. The former makes decisions on when and where to transmit data messages according to the node delivery probability. The latter employs the message survival time based on probability and delivery copies to decide dropping for minimizing transmission overhead. Simulation results show that the proposed PRD data delivery scheme achieves the higher message delivery ratio with the lower transmission overhead and data delivery delay than other DTMSN data delivering approaches.

Select  |    Cite this article 
Wan Li; Liao Jian-xin; Zhu Xiao-min
Time Series Frequent Pattern Mining Algorithm and its Application to WSAN Behavior Prediction
2010 Vol. 32 (3): 682-686 [Abstract] ( 3038 ) [PDF 250KB] ( 1435 )    DOI: 10.3724/SP.J.1146.2009.00300

A frequent pattern mining algorithm FPM (Frequent Pattern Mining) is proposed. FPM not only considered the frequency but also the distribution of the frequent pattern along the time series. Based on these different types of frequent patterns, MAMC (Mixed memory Aggregation Markov Chan) is extended to FMAMC (Frequent pattern based Mixed memory Aggregation Markov Chan) model. The proposed algorithm and model are applied to a smart building project, experiment and practice both demonstrate FPM is efficient than existing algorithms and FMAMC model could more accurately predict the node behavior in WSAN than MAMC.

Select  |    Cite this article 
Zhang Zhi-qiang; Zhang Yong-jian; Wang Yu; Lu Yu
Rekeying Algorithm Based on Orbital Cluster in the LEO Satellite Network
2010 Vol. 32 (3): 687-692 [Abstract] ( 2541 ) [PDF 372KB] ( 983 )    DOI: 10.3724/SP.J.1146.2009.01085

A kind of Rekeying Algorithm based on Orbital Cluster (RAOC) is proposed in the Low Earth Orbit (LEO) satellite network. The LEO satellite network is divided into different clusters according to the characteristics of the LEO satellite network in RAOC. The rekeying process is carried out by the initiating node of the LEO satellite network and the head nodes of the clusters. Rekeying lock is introduced to ensure consistency of the rekeying. The simulation results indicate that RAOC can accomplish the rekeying automatically compared with ground-based TT&C(Tracking, Telemetry and Command) algorithm and space-based TT&C algorithm, and the rekeying efficiency is improved by RAOC.

Select  |    Cite this article 
Zhen Hong-hu①②; Chen Yue; Guo Yuan-bo
A Strong Anonymity Threshold Signature Scheme Based on DAA
2010 Vol. 32 (3): 693-699 [Abstract] ( 2687 ) [PDF 259KB] ( 1115 )    DOI: 10.3724/SP.J.1146.2009.00287

For most present threshold signature schemes, sub-sign member can not sign a message anonymously or theirs anonymity is very weak. To improve their anonymity, a strong anonymity (n, t) threshold signature scheme based on DAA (Direct Anonymous Attestation), which is adopted by Trusted Computing Group v1.2 specifications, is proposed. Compared with the others, the scheme colligates DAA, zero-knowledge proof and Feldman verifiable secret sharing technique to achieve untraceable sub-sign and insure strong anonymity of signers, even the verifier and the dealer are colluded. Besides strong anonymity, analysis shows the scheme also has the property of unforgeable share, verifiable sub-sign, and robustness etc. It can be used in the situations which desire high-level anonymity such as “anonymous voting”.

Select  |    Cite this article 
Zhu Cong-hui; Zhao Tie-jun; Zheng De-quan
Joint Chinese Word Segmentation and POS Tagging System with Undirected Graphical Models
2010 Vol. 32 (3): 700-704 [Abstract] ( 2484 ) [PDF 245KB] ( 1500 )    DOI: 10.3724/SP.J.1146.2009.00214

For Chinese Part-Of-Speech(POS) tagging, word segmentation is a preliminary step. To reduce accumulated errors between two steps and improve the segmentation performance by utilizing POS information, segmentation and POS tagging can be performed simultaneously. In this paper, a joint segmentation and POS tagging system is proposed based on undirected graphical models which can make full use of the dependencies between the two stages. In the joint system, segmenting and tagging are viewed as the sequence labeling; moreover any connected sub-graph can be viewed as a certain dependency which can be used to find the final opinion labeling. The joint model achieves high performances with 97.19% in segmentation precision and 95.34% in POS tagging precision, which are the state-of-art performances for Chinese word segmentation and tagging on 1998-year People’s Daily corpus.

Select  |    Cite this article 
Dong Gang①②; Yang Hai-gang
Reducing Undetected Error Rate of CRC Coding Based on Lossless Compression and Implement in Circuits
2010 Vol. 32 (3): 705-709 [Abstract] ( 2908 ) [PDF 229KB] ( 1267 )    DOI: 10.3724/SP.J.1146.2009.00255

The Cyclic Redundancy Checking (CRC) is widely used in many applications. For a certain format of the code, the error undetected probability is nearly a constant. But more bits of the information take more chances to burst errors. This paper proposes to reduce the error burst probability with lossless compression method, i.e., Huffman coding. The probability can be less then one ten-thousandth. Consequently, a new reliability circuit for VLSI with combined Huffman and CRC coding has been designed in this paper.

Select  |    Cite this article 
Zhang Zhi-qiang; Wang Yong; Luo Ji-run; Ding Yao-gen
Suppression of High Order Mode Oscillation in a Broadband Klystron
2010 Vol. 32 (3): 710-713 [Abstract] ( 2817 ) [PDF 439KB] ( 1004 )    DOI: 10.3724/SP.J.1146.2009.00149

The phenomena of a high order mode oscillation in a broadband klystron are described in this paper. Some methods are discussed for suppressing parasitical mode oscillation in klystron resonant cavity. One new method is used to eliminate the oscillation in the broadband klystron. The method can make the high order mode frequency change enormously but the fundamental mode frequency alter faintly through adjust the structure of a resonant cavity, thereby the high order mode oscillation is suppressed. An improved design for resonant cavity with Ansoft HFSS code and corresponding experimental approval has been performed. The testing result of the klystron with the improved resonant cavity shows that the high order mode oscillation can effectively be suppressed.

Select  |    Cite this article 
Yuan Gang; Chen Jing
A Clustering Detection Algorithm of Stationary Target for Passive Time Difference Location System
2010 Vol. 32 (3): 728-731 [Abstract] ( 2946 ) [PDF 239KB] ( 848 )    DOI: 10.3724/SP.J.1146.2009.00120

A clustering algorithm, based on ant colony optimization algorithm, is proposed, and the stationary target can be detected without prior information. This algorithm is used in practical time difference location system and its performance is demonstrated.

Select  |    Cite this article 
Zhu Yin-bing; Xu Jiang-ning; Cui Guo-heng; Ma Jian-guo
Time-frequency Methods for Period Identification of Loran-C
2010 Vol. 32 (3): 732-736 [Abstract] ( 2866 ) [PDF 335KB] ( 1030 )    DOI: 10.3724/SP.J.1146.2009.00129

Based on the analysis of Short Time Fourier Transform(STFT) and Wigner-Vill Transform(WVT) for Loran-C signal, influence of SNR at the antenna input, SGR(Sky-wave to Ground-wave Ratio) and phase difference on STFT and WVT for Loran-C signal are analyzed and simulated. The results show that peak values of STFT and WVT for Loran-C signal are steady, and noise can be restrained successfully. But they both have the issue of multi-values, moreover, the issue of multi-values of Loran-C signal’s WVT can be removed successfully and effectively because frequency points of its negative peak values are different when the arrival time interval of sky-wave and ground-wave is different, so a new period identification based on WVT for Loran-C is presented.

Select  |    Cite this article 
Zeng Guang; Yang Yang; Han Wen-bao; Fan Shu-qin
On the Properties of the Minimal Polynomial of σ-LFSR Sequence
2010 Vol. 32 (3): 737-741 [Abstract] ( 3498 ) [PDF 234KB] ( 1243 )    DOI: 10.3724/SP.J.1146.2009.00061

σ-Linear Feedback Shift Register (σ-LFSR) is a word-oriented feedback shift register, which has a better tradeoff between the security and efficiency. The sequence generated by σ-LFSR is called the σ-linear recurrence sequence and its characteristic polynomial is the matrix polynomial over finite field. With analysis of the algebra structure of the matrix polynomial ring over finite field, the sufficient and necessary condition for the minimal polynomial of σ-linear recurrence sequence to be unique is given.

Select  |    Cite this article 
Lü Yuan①②; Sheng Xue-min①②; Liu Hui-jie; Gong Wen-bin
A Novel Unit of Reconfigurable Antenna Array
2010 Vol. 32 (3): 742-746 [Abstract] ( 2935 ) [PDF 510KB] ( 1400 )    DOI: 10.3724/SP.J.1146.2009.00198

A novel wideband omnidirectioanl planar antenna comprised two back-to-back dipoles printed on a dielectric substrate which use as unit of pattern reconfigurable antenna array is presented. The presented antenna shows a wide impedance bandwidth about 50% (VSWR<2), and a stable antenna gain level of about 6.44 dBi, with small variations(<2.0 dB) for omnidirectional radiation, is obtained across the used bandwidth. Details of antenna design and experimental results are proposed, and compared with excellent agreement. A constructed prototype is suitable for WiMax(802.16) application fixed and mobile solutions ,as well as base or relay stations for WLAN operation or mobile communications.

Select  |    Cite this article 
Ge Yun; Zhang Dong
New Fast Algorithm for Modulated Complex Lapped Transform with Arbitrary Windowing Function
2010 Vol. 32 (3): 747-749 [Abstract] ( 2674 ) [PDF 179KB] ( 906 )    DOI: 10.3724/SP.J.1146.2009.00204

A new algorithm for efficient computation of the Modulated Complex Lapped Transform (MCLT) with arbitrary windowing function is presented. For the MCLT of length-2M input data sequence, the proposed method is based on computing a length-2M type-II generalized discrete Hartley transform. Comparison with existing algorithms shows that the proposed method achieves the minimal number of arithmetic operations.

Select  |    Cite this article 
Deng Ying-na; Zhu Hong; Liu Wei; Zhang Xiao-dan
Human Pose Model and Block Growth Combined Crowd Segmentatio
2010 Vol. 32 (3): 750-754 [Abstract] ( 2318 ) [PDF 487KB] ( 918 )    DOI: 10.3724/SP.J.1146.2009.00119

Crowd object segmentation is a key issue of the object tracking and recognition in multiple cameras. Human rough models with position, scale and pose information are constructed and then get the corresponding models by using Bayesian model. Then, the foreground is segmented into blocks of similar color distribution. Then the problem of the seed blocks selection is solved thought of color and position information under human inter-occlusion, and human region is received by seed growth. For blocks with similar color, they are merged into the objects by comparing the edge energy they brought. It can be seen that the method could segment the crowd precisely, and is not sensitive to background noise from the experimental results.

Select  |    Cite this article 
Wang Lei-chun; Ma Chuan-xiang
A One-dimensional Linear Regression Model Based Spatial and Temporal Data Compression Algorithm for Wireless Sensor Networks
2010 Vol. 32 (3): 755-758 [Abstract] ( 2666 ) [PDF 223KB] ( 1150 )    DOI: 10.3724/SP.J.1146.2009.00704

Considering spatial and temporal redundancy of data and demand of saving energy in Wireless Sensor Networks (WSN), a One-Dimensional Linear Regression model based Spatial and Temporal(ODLRST) data compression algorithm, is proposed. By eliminating temporal redundancy of data in single node and spatial redundancy of data among nodes respectively in WSN, ODLRST greatly compresses these data. Simulation results show that ODLRST can reduce data size sent by nodes and network traffic in WSN, and save and balance energy consumption in the network.

Select  |    Cite this article 
Wang Shao-qing; Nie Jing-nan
Research on Incremental Cooperation Transmission and Its Energy Efficiency in Wireless Sensor Networks
2010 Vol. 32 (3): 759-762 [Abstract] ( 2766 ) [PDF 216KB] ( 973 )    DOI: 10.3724/SP.J.1146.2009.01096

The scheme of incremental cooperation transmission and its energy efficiency in wireless sensor networks are studied in this paper. Two important issues including ‘when to cooperate’ and ‘performance of cooperation’ are also solved. The expressions of energy efficiency of direct and cooperative transmission are deduced respectively and then the effects of key parameters on the performance of cooperative transmission are discussed. Simulation results demonstrate that the incremental cooperation transmission provides better energy efficiency than direct transmission when the communication distance is bigger than the threshold of the distance. Energy efficiency can be enhanced by optimizing the position of the relay node selected or the modulation level.

Reviews
Select  |    Cite this article 
Yang Hai-gang; Sun Jia-bin①②; Wang Wei
An Overview to FPGA Device Design Technologies
2010 Vol. 32 (3): 714-727 [Abstract] ( 3728 ) [PDF 538KB] ( 3248 )    DOI: 10.3724/SP.J.1146.2009.00751

As a programmable logic device, Field Programmable Gate Array(FPGA)has evolved from merely a peripheral component in an electronic design to become a core processing element of digital systems over the last two decades. It finds extensive applications in many fields, such as computer hardware, communication, aviation, spaceflight and automobile-electronics, etc. The FPGA chip design research achieves a significant progress with the advance of semi-conductor technologies. This survey reviews the past history, presents status and future trend in the ever quest for high performance FPGAs.

电子与信息学报
Author Center
Online Submission
Author Instruction
FAQ
Template
Copyright Agreement
MSN:je-jeit@hotmail.com
Links
More>>  
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech