电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Quick Search  
  Advanced Search
2008 Vol.30 No.6, Published: 19 June 2008
Articles | Reviews |
 
 
Articles
Select  |    Cite this article 
Yu Yong; Guo Lei
Ant Colony Search for Edge Extraction in Noise Image
2008 Vol. 30 (6): 1271-1275 [Abstract] ( 2266 ) [PDF 369KB] ( 1734 )    DOI: 10.3724/SP.J.1146.2007.00840

Traditional edge extracting methods are sensitive to image noise, and discontinuities often occur in extracted edges. This paper presents an edge leading ant colony algorithm to suppress the noise for edge extraction in noise image. Firstly, it detects the possible edge points which include the real edge points and the noise points. Then, the information of possible edge points is used as heuristic measure to guide iteratively searches of ants to get local edge points. In each cycle, pheromones on the traversed route of each ant are updated proportional to the length of the route, and the searching routes converge on real edges progressively based on the pheromone updating rule. Finally, real edges can be extracted according to the intensity of pheromones. Compared with traditional ant colony algorithms, the proposed method uses leading information to guide the searching process of the ants, which enhances the intention of the search, and improves the efficiency of the algorithm. Experimental results on noise images show that the method can extract real edges effectively, which keeps the edge details and suppresses the noise at the same time.

Select  |    Cite this article 
Qiao Jian-ping; Liu Ju; Yan Hua; Sun Jian-de
A Log-WT Based Super-resolution Algorithm
2008 Vol. 30 (6): 1276-1280 [Abstract] ( 2870 ) [PDF 990KB] ( 1805 )    DOI: 10.3724/SP.J.1146.2006.01829

Most learning-based super-resolution algorithms neglect the illumination problem. In this paper, a new image representation called Logarithmic-Wavelet Transform (Log-WT) is developed for the elimination of the lighting effect in the image. Meanwhile, a Log-WT based method is proposed to combine super-resolution and shadow removing into a single operation. In this method first intrinsic, illumination invariant features of the image are extracted with exploiting logarithmic-wavelet transform. Then an initial estimation of high resolution image is obtained based on the assumption that small patches in low resolution space and patches in high resolution space share the similar local manifold structure. Finally the target high resolution image is reconstructed by applying the special face constraints in pixel domain. Experimental results demonstrate that the proposed method simultaneously achieves single-image super-resolution and image enhancement especially shadow removing. After that, reconstruction results are used for face recognition which improves the recognition rate.

Select  |    Cite this article 
Wang Yan-xia; Ruan Qiu-qi
A Method of Line Structure Features Representation and Matching of Palmprint
2008 Vol. 30 (6): 1281-1285 [Abstract] ( 2173 ) [PDF 370KB] ( 1518 )    DOI: 10.3724/SP.J.1146.2006.01871

Palm line structure features are clear and stable, and they can uniquely describe a palmprint. Because the directions of palm lines are arbitrary and irregular, it is very difficult to accurately represent their structure features with an expression. This paper presents a new approach to line structure features representation and matching for palmprint recognition. It uses improved water-filling algorithm to extract the statistical structure features and direction structure features and label palm lines direction information from the extracted palm lines image. Finally, the extracted global statistical structure features and local detail direction structure features are combined as a feature vector, which is used in the next recognition. The experimental results show the method not only has a good property in matching, but also it can get a better accuracy.

Select  |    Cite this article 
Yang Chun-hua; Yang Jin-ying; Mou Xue-min; Zhou Kai-jun; Gui Wei-hua
A Segmentation Method Based on Clustering Pre-segmentation and High-low Scale Distance Reconstruction for Colour Froth Image
2008 Vol. 30 (6): 1286-1290 [Abstract] ( 2558 ) [PDF 414KB] ( 1524 )    DOI: 10.3724/SP.J.1146.2006.01980

Due to a large variation in the quality of froth images of ore and inhomogeneity of size, shape and grayscale of bubbles, a new segmentation method based on clustering pre-segmentation and high-low scale distance reconstruction is proposed for froth images. Firstly, the segmentation between foreground froth and background mineral slurry image is achieved by the k-means clustering method and the noises are filtered according to intensity distribution and shape distribution information, and a new reconstruction combined with high-low scale distance transformation based on morphological reconstruction is presented and applied to the froth distance- transformation image. Then the precise region makers for watershed transformation are extracted by area-reconstruction h-dome improved transformation. Finally, the watershed algorithm is used to get waterline for every bubble. Bubble physical characteristics such as the bubble number and bubble size can be obtained from the segmented image,which provide the guidance for flotation control process. The experimental results show its effectiveness.

Select  |    Cite this article 
Li Min;Lu Cheng-wu①②; Feng Xiang-chu
A Class of Variational Model for Inverse Problem in Image Zooming
2008 Vol. 30 (6): 1291-1294 [Abstract] ( 2163 ) [PDF 591KB] ( 884 )    DOI: 10.3724/SP.J.1146.2006.01508

To a mass of computation iteration of Chambolle model in solving the inverse problem of image zooming, a class of new model that is based on Besov space is put forward. The new model translates the variational problem that is solved into a sequence based wavelet field through the equivalence between Besov semi-norm and the norm of wavelet coefficients. And the process of minimization shows that the optimization solutions of the sequence can be represented as the orthogonal projection onto wavelet field. Finally, not only the zoomed images have sharper and smooth edges, but also the details of images are kept, resulting in the naturalness. In addition, the effect of denoising is very satisfactory.

Select  |    Cite this article 

Zhang Yue-ting;Yin Zhong-ke; Wang Jian-ying


A New Image Edge Detection Scheme
2008 Vol. 30 (6): 1295-1299 [Abstract] ( 2378 ) [PDF 505KB] ( 1780 )    DOI: 10.3724/SP.J.1146.2006.01749

To solve the problem of capturing only limited directional information in image edge detection method based on space domain or wavelet transform domain, the Contourlet transform with parabolic scaling and sufficient directional vanishing moments is used to represent discontinuous curves in nature images more efficiently. The algorithm detecting modulus maxima in Contourlet subbands has lower computation complexity, because Contourlet subbands obtain much more directions than wavelet subbands. Experimental results demonstrate that the proposed scheme is superior to the scheme based on wavelet modulus maxima by approximating better the edges of images.

Select  |    Cite this article 
Tian Hong-bo①②; Yin Qin-ye; Ding Le; Deng Ke
A Fast Algorithm of Blind Multiuser Detection Using Particle Filtering
2008 Vol. 30 (6): 1300-1303 [Abstract] ( 2385 ) [PDF 236KB] ( 1013 )    DOI: 10.3724/SP.J.1146.2006.01856

Considering the computational complexity of particle filtering, based on the time-observation state space model, a new fast algorithm with low computational complexity is developed for DS-CDMA blind multiuser detection using particle filtering in synchronous systems over flat and fast fading channels. This algorithm classifies the particles when its number exceeds the threshold, and the probability difference of different particles is taken as the criterion whether the particles number is enough, and then the particles number under different circumstance is adjusted adaptively; meanwhile the performance of blind multiuser detection under distinct probability difference of different particles is discussed. Simulation results confirm that this algorithm effectively decreases computational complexity and well remains the performance of blind multiuser detection, meanwhile the performance in proportion to the probability difference.

Select  |    Cite this article 
Zhao Xue-zhi; Ye Bang-yan; Chen Tong-jian
Detection Mechanism of Fuzzy Singular Signal
2008 Vol. 30 (6): 1304-1307 [Abstract] ( 2199 ) [PDF 240KB] ( 924 )    DOI: 10.3724/SP.J.1146.2006.01857

There is scarcely any ideal singular signal in engineering practice and the singularity of engineering signal is always very fuzzy. Wavelet’s detection mechanism for this kind of fuzzy singular signal is researched theoretically. It is proved that wavelet’s detection for a fuzzy singular signal corresponds to that a new wavelet is used to detect an ideal singular signal. The generating definition of this kind of new wavelet and its example are given, the example of simulation of ideal singular signal’s being fuzzed and wavelet’s detection for this fuzzy singularity are given, the singularity detecting process for a fuzzy singular signal in engineering practice is also given. All these results back up the theoretical analysis.

Select  |    Cite this article 
Shen Ming-wei; Zhu Dai-yin;Zhu Zhao-da
Study onΣΔ-STAP in Nonhomogeneous Environment Based on Multistage Wiener Filter
2008 Vol. 30 (6): 1308-1311 [Abstract] ( 2471 ) [PDF 250KB] ( 1253 )    DOI: 10.3724/SP.J.1146.2006.01794

In this paper,an efficient and robust ΣΔ-STAP algorithm for moving targets detection in nonhomo- geneous environment is investigated,which is implemented based on Multistage Wiener Filter(MWF).For culling the training data,a two stages hybrid nohomogeneous detection algorithm is proposed.Based on the general sidelobe canceller structure of MWF,the training data can be firstly censored by the mainbeam output and then followed by the Adaptive Power Residual(APR)detection.In addition,the modified Concurrent Block Processing(CBP) is introduced into the ΣΔ-STAP algorithm, which can significantly reduce the computational load. Theoretical analysis and simulation results are presented to demonstrate that, the aforementioned approach can effectively detect the outliers and improve the targets detection performance. This approach has the advantage of fast convergence, low computation load, and good robustness, which is feasible for engineering application.

Select  |    Cite this article 
Zhou Peng①②; Pi Yi-ming
A Practical Method for Spatial Synchronization in Spaceborne/Airborne Hybrid Bi-static SAR
2008 Vol. 30 (6): 1312-1315 [Abstract] ( 2206 ) [PDF 256KB] ( 833 )    DOI: 10.3724/SP.J.1146.2006.01902

Since there is high difference between the velocities of platforms, the spatial synchronization of the antenna footprints is a big methodical and technological challenge for spaceborne/airborne hybrid bi-static SAR. Based on the method presented in the published literatures, a mathematical model for antenna steering is established and a set of concerned formulae is derived aiming to accommodate the ellipsoidal trajectory of satellites, the ellipsoidal shape of the earth and non-parallel trajectories between the platforms. The practicability of the proposed method is verified by the result of the simulation, which shows that it can achieve useful scene extension in azimuth with an adequate resolution in azimuth.

Select  |    Cite this article 
Fang Li-li①②; Wang Yan-fei
Signal Analysis and Motion Compensation of SAR Data with Diving Acceleration
2008 Vol. 30 (6): 1316-1320 [Abstract] ( 2373 ) [PDF 344KB] ( 962 )    DOI: 10.3724/SP.J.1146.2006.01645

This paper concerns the issue of signal characteristic of side-looking SAR during its diving flight. The geometric and target range expression are built and Doppler parameter variation with operation time is analysed. The corresponding azimuth match filtering function and phase error correction factor based on Doppler parameter are provided for motion compensation. The validity and feasibility of the method is demonstrated by the simulation.

Select  |    Cite this article 
Wang Yu①②; Wang Bin①②; Zhang Zhi-min; Deng Yun-kai
The Research and Application of Modified Wavenumber Domain Algorithm to Real-time Processing
2008 Vol. 30 (6): 1321-1325 [Abstract] ( 2767 ) [PDF 359KB] ( 1129 )    DOI: 10.3724/SP.J.1146.2006.01862

Wavenumber Domain Algorithm (WDA), as a superior SAR signal processing algorithm, is widely applied to the case of wide aperture and high squint angle. However, Interpolation in the 2-dimensional frequency domain is necessary and the motion compensation can not be integrated, so it can not be implemented easily in the real-time processing. In this paper, two modified version of WDA are exploited: one is fit for low-accurate processing, in which the residual Range Cell Migration (RCM) is ignored to improve the processing efficiency; Another is fit the high-accurate processing, in which the FRactional Fourier Transform (FRFT) is employed to correct residual RCM. The two algorithms are free of interpolation and able to be implemented in the real-time processing. In addition, the phase errors of the two algorithms are analyzed particularly. Finally, the results of simulating the point targets and processing the real X-band data are given. The results show that the two algorithms can satisfy the requirements of the real engineering.

Select  |    Cite this article 
Peng Shi-bao; Yuan Jun-quan; Xiang Jia-bin
An Improved InSAR Phase Unwrapping Method Based on Iterative-Weighted Greedy Algorithm
2008 Vol. 30 (6): 1326-1330 [Abstract] ( 2740 ) [PDF 556KB] ( 1196 )    DOI: 10.3724/SP.J.1146.2006.01822

In order to improve the precision of phase unwrapping in InSAR data processing, a new method is presented based on iterative-weighted greedy algorithm. First, the theory derivation is given in detail. Second, to make the result jump out the local optimization and approach the true phase, an iterative-weigthed greedy algorithm is addressed. Finally, the experiment analysis on simulation data and the real InSAR data verifies the effectiveness of the novel method.

Select  |    Cite this article 
Zhu Zhen-bo; Tang Zi-yue; Zhang Ya-biao; Jiang Xing-zhou
The Estimation of Doppler Parameter of Bistatic SAR Based on Radon Translation
2008 Vol. 30 (6): 1331-1335 [Abstract] ( 2311 ) [PDF 338KB] ( 1282 )    DOI: 10.3724/SP.J.1146.2006.01768

The development of Doppler parameter estimating algorithm of bistatic SAR is a pivotal issue, which is still in progress and not sufficiently solved. This paper describes firstly the special case of equal velocity vectors and parallel flight paths of transmitter and receiver, and then makes detailed and mathematical study on the character of Doppler parameter under the above bistatic SAR configuration. Based on the above analysis, this paper provides a new Doppler parameter estimating algorithm of bistatic SAR by Radon transform, which can gets accurate Doppler center and Doppler rate. As a result, it is a feasible Doppler parameter estimating algorithm of bistatic SAR, of which the validity is also proved by the simulation of computer in the last.

Select  |    Cite this article 
Sun Zao-yu; Liang Dian-nong; Zhang Yong-sheng
Method and Error Analysis of DEM Reconstruction for Spaceborne InSAR
2008 Vol. 30 (6): 1336-1340 [Abstract] ( 2820 ) [PDF 274KB] ( 1138 )    DOI: 10.3724/SP.J.1146.2006.01735

DEM reconstruction is a step in data processing of spaceborne InSAR, its error is influenced by baseline error and GCP, etc. In this paper, DEM reconstruction method using GCP based on classic one was presented. To the reconstruction methods, the tranferring relationship between reconstruction error and baseline error was analyzed. The relationship shows that the requirement on orbit measuring precision is exigent, but when using GCP, in the situation of the same orbit measuring precision, the reconstruction error is reduced. In order to reduce the requirement on orbit measuring precision and at the same time to keep reconstruction precision, GCP should be used. In addition , the transferring relationship can direct designing some parameters of the system.

Select  |    Cite this article 
Chen Jie①②; Fang Guang-you; Li Fang
The Application of Time Domain Beamforming to Ultra-wideband Through-wall Imaging Radar
2008 Vol. 30 (6): 1341-1344 [Abstract] ( 2601 ) [PDF 221KB] ( 1572 )    DOI: 10.3724/SP.J.1146.2006.01850

Ultra-WideBand (UWB) through-wall imaging radar is a promising technique and can be widely used for detecting and locating moving people through obstacles. In this paper, time domain beamforming method is presented for UWB through-wall imaging applications. The propagating wave slows down, encounters refraction and is attenuated as it passes through the wall. Firstly, the travel time is calculated from the antenna to the target in closed form based on the refraction model. Next, the beamformer design is presented, which incorporates the wall effects. Finally, Finite-Difference Time-Domain is used to demonstrate the efficacy of beamforming method and the impact of incorrect estimates of the wall thickness and dielectric constant on performance is also considered.

Select  |    Cite this article 
Shen Yan①②; Wang Xin-min①②; Yu Wei-dong
Baseline Design for Small Satellites Formation Interferometric Synthetic Aperture Radar
2008 Vol. 30 (6): 1345-1349 [Abstract] ( 2575 ) [PDF 293KB] ( 1015 )    DOI: 10.3724/SP.J.1146.2006.01782

A baseline design method is proposed for the spaceborne small satellites formation INterferometric Synthentic Aperture Radar (INSAR). This technique is based on the space geometry of the small satellites formation and the real geographic model. An analysis is given to the characteristic of the interferometric echoes, the method of choosing the critical and optimal baseline is also presented. The effect of the equivalent number of looks, signal to noise ratio and the topographic slope is also analyzed. Simulation design is carried out according to the C-band small satellites formation, in one orbit period, the variation of interferometric baseline and the elevation precision are presented. The simulation results validate the effectiveness of this baseline design method.

Select  |    Cite this article 

Liu Jian-cheng;Wang Xue-song; Liu Zhong; Yang Jian-hua; Wang Guo-yu


Preceded False Target Groups Jamming Against LFM Pulse Compression Radars
2008 Vol. 30 (6): 1350-1353 [Abstract] ( 2142 ) [PDF 260KB] ( 1196 )    DOI: 10.3724/SP.J.1146.2006.00458

Frequency modulation and amplitude compensation of interruptedly received LFM signals are studied to precede a false target group based on interrupted T/R jamming system. The distribution of a false target group can be controlled by frequency modulation with received signal based on group delay of matched filter for LFM waveform. Amplitude loss caused from frequency mismatch and interrupted receiving is compensated respectively, so that the false target group can suppress the true target on amplitude to make effective jamming against radar. Finally, numerical simulations verify the analysis.

Select  |    Cite this article 
Lang Yue; Zhao Sheng-hui; Kuang Jing-ming
An Improved Multiple Descriptions Sinusoidal Speech Coder Adaptive to Packet-loss Rate
2008 Vol. 30 (6): 1354-1358 [Abstract] ( 2246 ) [PDF 258KB] ( 824 )    DOI: 10.3724/SP.J.1146.2006.01762

Multiple Descriptions (MD) speech coder can provide robust speech communication over unreliable channels such as the internet. However, existing MD speech coders use fixed scheme for different packet-loss environments. A novel Adaptive Multiple Descriptions Sinusoidal Coder (AMDSC) is proposed, which can vary in coding multiple descriptions according to the network packet-loss rate with optimally adding redundancy between two descriptions in order to make the final distortion minimum. Simulation results show that the proposed AMDSC outperforms existing MD speech coders by taking network loss characteristics into account.

Select  |    Cite this article 
Li Yan-Xiong, He Qian-Hua, Chen Nan, Qi Chao-Hui
Spectral Stability Feature Based Novel Method for Discriminating Speech and Laughter
2008 Vol. 30 (6): 1359-1362 [Abstract] ( 2238 ) [PDF 230KB] ( 1126 )    DOI: 10.3724/SP.J.1146.2007.00745

This paper proposes a novel method which uses spectral stability as feature parameter to discriminate speech and laugh. It is found that the spectral stability of speech is obviously smaller than that of laugh, which indicates that the spectral stability can be used as a feature parameter to discriminate speech and laugh. The performance of discriminating speech and laugh by using Spectral Stability (SS), Mel-Frequency Cepstrum Coefficients (MFCC), Perceptual Linear Prediction (PLP) and pitch, are compared to each other in the same experiment conditions. The experiment results show that the accuracy are respectively 90.74% and 73.63% by using spectral stability as feature parameter to discriminate speech and laugh in the speaker-dependent and speaker-independent conditions, and the discrimination power of spectral stability is superior to the counterparts of other feature parameters.

Select  |    Cite this article 
Xu Yao-hua①②; Wang Gang①②; Guo Ying
Wavelet Package Based Speech Enhancement Algorithm Using Time-Frequency Threshold
2008 Vol. 30 (6): 1363-1366 [Abstract] ( 2391 ) [PDF 231KB] ( 1257 )    DOI: 10.3724/SP.J.1146.2006.01852

Incorporating masking properties of the human auditory system in wavelet domain, this paper proposed a new algorithm of wavelet package speech enhancement based on the time-frequency threshold. New algorithm first obtains speech pre-estimation by frequency-based de-noising method, then, via tracing the variation of time-frequency information of the speech pre-estimation, the threshold is modulated adaptively. Finally, the noisy speech is de-noised by means of time-frequency thresholding the coefficients of the wavelet package. With comparing to the traditional wavelet algorithms, the proposed algorithm offers more pleasant enhanced speech with less distortion and residual noise in the additive Gaussian noise environments, and the experimental results demonstrate its better performance in Subjective test, input and output SNR test, and Modified Bark Spectral Distortion (MBSD) measurement tests.

Select  |    Cite this article 
Li Yang-yang; Jiao Li-cheng
Quantum-Inspired Immune Clonal Multiobjective Optimization Algorithm
2008 Vol. 30 (6): 1367-1371 [Abstract] ( 2588 ) [PDF 251KB] ( 1112 )    DOI: 10.3724/SP.J.1146.2006.01709

Based on the concept of immunodominance,antibody clonal selection theory and quantum bit strategy, a Quantum-inspired Immune Clonal Multiobjective Optimization Algorithm(QICMOA)is proposed.The QICMOA is compared with RWGA,SPEA and MISA in solving low-dimensional problems.The statistical results show that QICMOA has a good performance in converging to true Pareto-optimal fronts with a good distribution.

Select  |    Cite this article 
Xu Fei-fei; Miao Duo-qian; Wei Lai; Feng Qin-rong; Bi Yu-sheng
Mutual Information-Based Algorithm for Fuzzy-Rough Attribute Reduction
2008 Vol. 30 (6): 1372-1375 [Abstract] ( 2392 ) [PDF 215KB] ( 1652 )    DOI: 10.3724/SP.J.1146.2006.01873

Fuzzy-rough attribute reduction is one of the important topics in the research on fuzzy-rough set theory. In this paper,the information entropy is generalized in rough set so that it could be used to value the importance of attribute under fuzzy circumstance.A new heuristic algorithm based on mutual information for fuzzy-rough attribute reduction is introduced and illustrated with a simple example.

Select  |    Cite this article 
Huang Jian-hua; Cheng Heng-da; Wu Rui; Liu Jia-feng
A New Approach for Text Detection Using Fuzzy Homogeneity
2008 Vol. 30 (6): 1376-1380 [Abstract] ( 1952 ) [PDF 297KB] ( 1151 )    DOI: 10.3724/SP.J.1146.2006.01757

Text data presented in images and video contains useful and important semantic information for semantic-based image retrieval system. In this paper, a method is proposed for text detection based on fuzzy logic and homogeneity. First, the original images is fuzzified based on the maximum entropy principle. Then edge and textural information is extracted to evaluate the homogeneity of image which is transformed to fuzzy homogeneity domain. Finally text region is confirmed with texture analysis in fuzzy homogeneity domain. Experimental results confirm that the proposed method achieves better performance in complex background and is applicable to various kinds of video and images.

Select  |    Cite this article 
Wu Yu-jiang; Nie Zai-ping
A Novel Pre-processing Method for Improving the Performance of Polarization Diversity
2008 Vol. 30 (6): 1381-1384 [Abstract] ( 2411 ) [PDF 227KB] ( 1009 )    DOI: 10.3724/SP.J.1146.2006.01858

Conventional polarization diversity suffers from a strong imbalance between the average powers received on its two diversity branches. A novel method is proposed to tackle this problem by pre-combining of the two diversity branches before diversity combining process. Equal average received branch powers thus can be obtained. Theoretical analysis as well as physical interpretation is presented. Numerical examples under typical channel model show that the proposed method can be used to improve the diversity performance significantly, especially in the high Cross Polarization Discrimination (XPD) environments.

Select  |    Cite this article 
Jing Long-jiang; Lin Jing-li; Zhu Wei-le
A Class of High-Rate Low-Complexity QC-LDPC Codes
2008 Vol. 30 (6): 1385-1389 [Abstract] ( 2678 ) [PDF 262KB] ( 1423 )    DOI: 10.3724/SP.J.1146.2006.01738

This paper proposes a class of Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) codes with high code rates, which is an efficient encoding algorithm due to the almost lower triangular form and simple structure of their parity-check matrices. Since the parity-check matrix of the QC-LDPC code is composed of blocks of circulant matrices, the required memory for storing it can be significantly reduced, compared with randomly constructed LDPC codes. Based on the quasi-cyclic structure of the parity-check matrix, a new approach is proposed to analyze the distribution of the short length cycles of their bipartite graph, and a corresponding construction method of QC-LDPC codes without cycles of length 4 is presented. Simulation results show that the proposed codes not only have low encoding complexity and low error floor but also perform well with iterative decoding.

Select  |    Cite this article 

Zhang Yong; Hu Ying-bo; Xu You-yun;Cai Yue-ming


Distributed Linear Dispersion Codes in Cooperative Communication
2008 Vol. 30 (6): 1390-1393 [Abstract] ( 2074 ) [PDF 245KB] ( 953 )    DOI: 10.3724/SP.J.1146.2006.01876

Distributed linear dispersion codes are proposed for the space time coding in wireless network where cooperative nodes can not be decided priori.The nodes in cooperation are coded with different dispersion vectors. The mutual information loss when the number of cooperative nodes decreased is conducted and a coding criterion of distributed dispersion codes is developed accordingly.The simulation results show that the distributed dispersion codes with the coding criterion achieve good performance.

Select  |    Cite this article 
Zhu Shi-xin; Li Ping; Wu Bo
A Class of Repeated-root Constacyclic Codes over the Ring Fq+uFq+…+uk-1Fq
2008 Vol. 30 (6): 1394-1396 [Abstract] ( 2693 ) [PDF 191KB] ( 900 )    DOI: 10.3724/SP.J.1146.2006.02001

Let R=Fq+uFq+…+uk-1Fq,G=R[x]/ and λ be an invertible element in R.A new Gray mapφfrom Gn to Rtn is defined.It is proved that J is a linear x-constacyclic code of length n if and only if φ(J) is a linearα-constacyclic code over R of length tn.By means of the theory of finite rings the structure and sizes of all(uλ-1)-constacyclic codes over R of length pe are obtained.Especially,the structure and sizes of the duals of all (uλ-1)-constacyclic codes of length 2e over the ring F2m+uF2m are also obtained. Some of the results about repeated-root negacyclic codes over the ring Z2a are generalized.

Select  |    Cite this article 
Jin Hui-long①②; Xu Cheng-qian
The Necessary and Sufficient Condition of the Families of Bent Complementary Function Pairs
2008 Vol. 30 (6): 1397-1399 [Abstract] ( 2346 ) [PDF 206KB] ( 756 )    DOI: 10.3724/SP.J.1146.2006.01865

Based on analysis of some characters of the families of Bent Complementary Function Pairs(BCFPF), the equivalence relations of BCFPF with the families of Hadamard complementary matrix pairs is studied.The equivalence relation is the necessary and sufficient condition for constructions of BCFPF。A sort of construction method of BCFPF is provided.The families of Hadamard complementary matrix pairs and can be constructed correspondingly by using the equivalent relationships.

Select  |    Cite this article 
Yu Mei①②; Xu Qiu-min; Jiang Gang-yi①②; Chen Ken
A Fast Coding Algorithm for Multiple Reference B-frames in Multi-view Video Compression
2008 Vol. 30 (6): 1400-1404 [Abstract] ( 2753 ) [PDF 550KB] ( 1535 )    DOI: 10.3724/SP.J.1146.2006.01805

Considering high complexity of multiple reference frames in Multi-view Video Compression (MVC), a fast coding algorithm for MVC is presented based on the traits of multi-view video. The propose algorithm improves the design of reference-lists in H.264 standard that adapts to traditional video coding, and adjusts the old reference-lists using the temporal and spatial correlations of multi-view video. Additionally, the strategy of mode pre-decision is also used to reduce the computational complexity. The experimental results show that the proposed method can reduce encoding complexity and speed up encoding process effectively. Though the new algorithm is implemented on M-Picture prediction structure, it can be also used in other multi-view video coding structures with multiple reference B-frames.

Select  |    Cite this article 
Xu Feng-yan;Li Liang-bin; Wang Zong-xin
A New WLAN Indoor Localization System Based on Distance-loss Model with Area Partition
2008 Vol. 30 (6): 1405-1408 [Abstract] ( 2881 ) [PDF 226KB] ( 1455 )    DOI: 10.3724/SP.J.1146.2006.01786

Based on indoor RSS distance-loss model,an indoor localization system is set up with means of area partition.Parameters of the model are set by comparing the signal data recorded at several collection spots with the ideal signal value lists generated by the computer,which simulates the actual environment.Then users’ location estimates can be achieved with Maximum Likelihood(ML)estimation algorithm.Experiments show the algorithm is effective and can obtain quite precise location result.

Select  |    Cite this article 
Xu Dao-feng;Huang Yong-ming; Yang L -xi
A Low Cost Direct Channel Feedback Method in OFDMA Systems
2008 Vol. 30 (6): 1409-1412 [Abstract] ( 2163 ) [PDF 245KB] ( 821 )    DOI: 10.3724/SP.J.1146.2006.01885

A low cost, real-time CSI feedback method is proposed. The analog DownLink Channel State Information (DL-CSI) obtained at receivers is spreaded and then superimposed upon UpLink User Sequences (UL-US) before transmitting, thus avoiding DL-CSI from exclusive occupation of system resources. Using interference cancellation, iterative UL-US detection and DL-CSI estimation is carried out at base station. Due to spreading, DL-CSI can be accurately recovered even with little allocated energy. Simulations results demonstrate the practicability of the proposed method.

Select  |    Cite this article 
Zhang Hong-yan; Xie Yue-lei; Ouyang Shan
A Blind Evolutionary Particle Filtering Detector in Flat Fading Channels
2008 Vol. 30 (6): 1413-1415 [Abstract] ( 2371 ) [PDF 212KB] ( 1280 )    DOI: 10.3724/SP.J.1146.2006.01930

To overcome the drawbacks of samples impoverishment, an evolutionary particle filtering algorithm is proposed for blind signal detection over flat Rayleigh fading channels whose model coefficients are unknown. During the resampling of particle filtering, evolutionary programming is used. The evolutionary particle filtering algorithm is adopted to overcome the drawbacks of samples, which forms into a blind detection based in evolutionary particle filtering. It is shown through simulations that the proposed particle filtering detector maintains comparable performance with mixture Kalman filter with known model coefficients.

Select  |    Cite this article 
Cao Lei; Zhang Xin; Yang Da-cheng
A Detection Algorithm Combined Frequency Domain Equalization with Partial Parallel Interference Cancellation Based on Energy-Ordering
2008 Vol. 30 (6): 1416-1419 [Abstract] ( 2493 ) [PDF 247KB] ( 1299 )    DOI: 10.3724/SP.J.1146.2007.01365

In this paper, a multiuser detection algorithm (named MMSE-EOPPIC) combined MMSE frequency domain equalization (MMSE-FDE) with Partial Parallel Interference Cancellation based on Energy-Ordering (EOPPIC) is proposed for DS-CDMA system over frequency-selective channels. MMSE-FDE based on overlap-cut method instead of Rake receiver is firstly used to initially estimate all users’ data information, and then partial interference cancellation is in turn implemented for each user in descending order of estimated energy at each iterative stage. In order to improve the detection reliability of each iterative stage, the stronger users’ current stage hard decisions are used to regenerate the weaker users’ multiple access interference (MAI). Simulation results show that MMSE-EOPPIC can efficiently improve the Bit Error Rate (BER) performance of system.

Select  |    Cite this article 
Pan Wen; Jiang Zhan-jun; Du Zheng-feng; Wang Yan; You Xiao-hu
An Algorithm for Dynamic Location Based on Doppler Velocity Estimation and Kalman Filtering in Distributed Mobile Communication System
2008 Vol. 30 (6): 1420-1423 [Abstract] ( 2601 ) [PDF 242KB] ( 972 )    DOI: 10.3724/SP.J.1146.2006.01874

An algorithm is presented for dynamic location in distributed mobile communication system. In the algorithm, Doppler frequency offsets of the MS are estimated by RAUs firstly, and the velocity in each direction from the MS to each RAU is derived. And then, the states equation and the observation equation are constituted, and an Extended Kalman Filter (EKF) is employed to estimate the position of the MS, and the trajectory of the MS can be obtained through a step by step way. The algorithm can improve the location precision because of employing of Kalman filter, which reduces the error accumulation in the Doppler dynamic location algorithm, and this issue is verified by simulation as well.

Select  |    Cite this article 
Wang Jian-hui; Cheng Le-ran; Hu Han-ying
A New Algorithm to Mitigate NLOS Errors in Cellular Networks
2008 Vol. 30 (6): 1424-1427 [Abstract] ( 2516 ) [PDF 256KB] ( 1423 )    DOI: 10.3724/SP.J.1146.2006.01471

The Non-Line-Of-Sight (NLOS) error is the main difficulty for mobile user location in cellular wireless communication system. An accurate and unbiased estimation approach using Probability Density Function (PDF) estimator and biased Kalman filter is presented to mitigate the NLOS error in this paper. The simulation results indicate that with the less prior information about communication environments, the approach has a better location performance even in severe NLOS situations.

Select  |    Cite this article 
Xu Ning; Zhou Bei; Wang Ying; Zhang Ping
A Utility Based Multiuser Scheduling Algorithm in Downlink SDM/OFDMA System
2008 Vol. 30 (6): 1428-1431 [Abstract] ( 2415 ) [PDF 218KB] ( 1088 )    DOI: 10.3724/SP.J.1146.2006.01776

The multiuser scheduling issue in Spatial Division Multiplexing/Orthogonal Frequency Division Multiple Access (SDM/OFDMA) wireless communication system is studied. This issue is characterized as three dimensions of time, frequency, and space. A utility based multiuser scheduling algorithms is proposed to both improve the system resource utilization and maximize the user’s utility. The computer simulation results show that the performance of the proposed algorithms is similar to the exhaustive searching algorithm while the complexity is highly reduced.

Select  |    Cite this article 
Chen Guo-dong; Wu Mu-qing
Adaptive Pulse Waveform Design Based on the Combination of Multiple PSWFs for CUWB System
2008 Vol. 30 (6): 1432-1436 [Abstract] ( 2517 ) [PDF 271KB] ( 1096 )    DOI: 10.3724/SP.J.1146.2006.01574

This paper introduces the operating fundament of Cognitive Ultra WideBand (CUWB) wireless communication system and gives a scheme of dynamically obtaining adaptive emission mask based on spectrum sensing to adapt to spectrum environment and be compatible with FCC spectral mask. Then, a method to generate adaptive CUWB shaping pulse is proposed based on weight combination of Prolate Spheroidal Wave Functions(PSWFs) matching UWB multiple sub-band spectral mask. The simulation results show that the pulse waveforms shaped by this method conform the spectral mask constraint for CUWB, adapt to dynamical variety of the spectral mask.

Select  |    Cite this article 
Zhu Ying-xun; Wang Rong; Yi Xiao-xin
Research on Coverage Control Algorithm of CDMA Bunched System
2008 Vol. 30 (6): 1437-1440 [Abstract] ( 2437 ) [PDF 247KB] ( 951 )    DOI: 10.3724/SP.J.1146.2006.01803

In this paper, the situation optimization issue of a CDMA Bunched system is investigated and a method that optimize the points distribution is given. According to outage equation of CDMA system, a coverage control algorithm is proposed based on gradient descent algorithm. Computer simulation results show that outage probability of the optimized system is one order of magnitude less than the uniform distributed system and 40% less than the regular distributed system..

Select  |    Cite this article 
Liu Jin-long; Xu Zong-ze
Cartesian Product and Authentication Codes
2008 Vol. 30 (6): 1441-1444 [Abstract] ( 2214 ) [PDF 198KB] ( 1007 )    DOI: 10.3724/SP.J.1146.2006.01840

The relation between the Cartesian product and authentication codes is studied in this paper. A new idea to use the private keys to carry the information of the authentication symbols is presented, which is based on the character of Cartesian product’ structure. And the Cartesian product–based optimal authentication codes with equal cheating probabilities of all orders are constructed, which can be easily designed and can be applied well to engineering. In this paper, the secret authentication codes with equal cheating probabilities of all orders are also constructed which are founded on Cartesian product and Latin square. The two construction methods mentioned above need no pre-storing encoder matrix, so that a mass of storage is saved. At the same time, the two schemes can offer an enough security level expected.

Select  |    Cite this article 
Chen Shi-we;i Jin Chen-hui
Analysis of the Noise Functions of Macrocosm Approximation of Binary Addition and Triple Addition Modulo 2n with XOR
2008 Vol. 30 (6): 1445-1449 [Abstract] ( 2595 ) [PDF 201KB] ( 1019 )    DOI: 10.3724/SP.J.1146.2006.01839

Macrocosm approximation is a class of attacks to ciphers by replacing a strong cipher function with a weak cipher function.The XOR of the two functions is called the noise function of this macrocosm approximation. This paper studies the probability distributions of the noise functions produced by macrocosm approximation of binary addition and triple addition modulo 2n with XOR,and gives the computation formulae of the probability distributions of the corresponding noise functions and the square sums of the probabilities, which is helpful to recognize the ability of resistance to macrocosm approximation of binary addition and triple addition modulo 2n with XOR.

Select  |    Cite this article 
Jiang Zheng-tao; Zhang Jing-liang; Wang Yu-min
Research on a New Public Key Cryptosystem as Secure as Integer Factorization
2008 Vol. 30 (6): 1450-1452 [Abstract] ( 2417 ) [PDF 202KB] ( 959 )    DOI: 10.3724/SP.J.1146.2006.01818

Constructing provably secure cryptographic primitives under weak assumptions can improve the security of cryptographic schemes efficiently. Further research on the construction of public-key cryptosystem is provided, and a new public-key encryption primitive is investigated. This scheme is more efficient than that of existing LUC cryptosystems. More over, the proposed scheme is provable secure and its security is proved to be equivalent to the factorization of RSA modulus. At last, an application in signature is suggested; forgery of signature is also equivalent to the factorization of RSA modulus.

Select  |    Cite this article 
Zhao Yao-dong; Qi Wen-feng
The Attack on RSA with Small Private Key and Primes Sharing Least-Significant Bits
2008 Vol. 30 (6): 1453-1456 [Abstract] ( 2388 ) [PDF 191KB] ( 1066 )    DOI: 10.3724/SP.J.1146.2007.00157

In this paper,the security of RSA system is studied if the private keys p and q share their least significant bits.The result shows that RSA system is more vulnerable in this condition when the private key d is small.So it should be careful to void this kind of weak key.

Select  |    Cite this article 
Yang Jun①②; Zhou Xian-wei
A Two-level Decentralized Group Key Management Scheme Based on the Discrete Logarithm Problem
2008 Vol. 30 (6): 1457-1461 [Abstract] ( 2581 ) [PDF 270KB] ( 954 )    DOI: 10.3724/SP.J.1146.2006.01836

Based on a public-key encryption algorithm with “multiple decryption keys mapping to one encryption key” , a group re-keying protocol is proposed and then combining the protocol with the LKH algorithm a two-level decentralized group key management scheme is designed for Source Specific Multicast(SSM). Its backward secrecy, forward secrecy and non-collusion with high probability are demonstrated. The performance bottleneck of sub-group managers and the “1-affects-n” problem existing universally in the common group key approach are miti-gated through the long-livedness of private keys in the upper level and the method of key translation. The analysis shows that adopting a hybrid cryptosystem the novel scheme possesses some advantages of two distinct classes of approaches to group key management.

Select  |    Cite this article 
Xu Bin-yang; Pu He-ping; Li Shao-qian
Scheduling Algorithm Design for Enhanced Scheduling Fairness
2008 Vol. 30 (6): 1462-1465 [Abstract] ( 2331 ) [PDF 256KB] ( 1125 )    DOI: 10.3724/SP.J.1146.2006.01043

A new packet scheduling algorithm Modified Exponential rule(MExp)is proposed for wireless real-time multimedia applications to provide enhanced scheduling fairness.The scheduling fairness of MExp is investigated through theoretical analysis and verified by system level simulation.

Select  |    Cite this article 
Liu Li; Jing Tao; Fu Li; Feng Yu-min
A Call Admission Control in Multi-Service CDMA Networks
2008 Vol. 30 (6): 1466-1469 [Abstract] ( 2294 ) [PDF 221KB] ( 875 )    DOI: 10.3724/SP.J.1146.2006.01908

There is a great demand on multimedia services in wireless networks. Capacity analysis of a multi-service CDMA communication system is employed in which the concept of equivalent bandwidth is introduced, and then an optimal Call Admission Control and Resource Allocation algorithm (CAC-RA) is proposed. in CAC-RA, multimedia traffic is classified into two classes: real-time trafficand non real-time traffic, and manage Call Admission Control (CAC), handoff scheme and resource allocation (RA) together by adopting Markov Decision Process model for adaptive real-time applications, queuing model for non real-time applications ,and nonlinear programming for the proposed revenue function which combine these two models. Numerical results reveal that the proposed CAC-RA scheme adapts itself well to multi-service CDMA networks by achieving reasonable utilization of resources.

Select  |    Cite this article 
Zhang Yue; Qiu Xue-song; Meng Luo-ming
Web Services Based Interoperation Mechanism between Network Management Business Process Management Systems
2008 Vol. 30 (6): 1470-1474 [Abstract] ( 2512 ) [PDF 214KB] ( 1113 )    DOI: 10.3724/SP.J.1146.2006.01795

This paper analyzes Wf-XML based interoperation mechanism between workflow management systems and the characteristics of Web Services based description methods for network management services. Making use of the description methods for network management services given by MUWS, the deficiencies of Wf-XML are improved and interoperation interfaces between network management business process management systems are defined. The implementation and application scenarios of the interoperation interfaces are also illustrated. The functionalities of the interoperation interfaces are clearly defined with good extensibilities.

Select  |    Cite this article 
Tan Wei; Sha Xue-jun; Xu Yu-bin
Routing Algorithm Based on Self-similar Traffic in Mobile Ad hoc Network
2008 Vol. 30 (6): 1475-1479 [Abstract] ( 2305 ) [PDF 272KB] ( 1404 )    DOI: 10.3724/SP.J.1146.2006.01830

This paper analyses routing and queuing performance for self-similar traffic in mobile Ad hoc network which is ubiquity but neglected. A Multi-path Backup Optimized Power (MBOP) algorithm is presented based on network programming model, which exerts multi-path backup routing and optimizes the total transmission power. This algorithm is suitable for structure-changed mobile Ad Hoc network. The simulation result shows that the new algorithm can increase the throughput of network and improve delay.

Select  |    Cite this article 
Tian Chun-qi①②; Zou Shi-hong; Wang Wen-dong; Cheng Shi-duan
A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks
2008 Vol. 30 (6): 1480-1484 [Abstract] ( 2407 ) [PDF 250KB] ( 1585 )    DOI: 10.3724/SP.J.1146.2006.01788

Trust relationship between participants is indispensable to set up in a large-scale distributed P2P file-sharing system. A novel trust model for P2P system based on advanced D-S theory of evidence is proposed in this paper to solve this problem, in which mathematic analysis and some measures are presented to defense against several malicious attacks. The experimental results show that, compared to the current some trust models, the proposed model is more robust on trust security problems and more advanced in successful transaction rate.

Select  |    Cite this article 
Li Yong-hao; Liu Yun; He De-quan
An Incentive Search Model Based on Utility in CAN Network
2008 Vol. 30 (6): 1485-1488 [Abstract] ( 2247 ) [PDF 217KB] ( 910 )    DOI: 10.3724/SP.J.1146.2006.01863

Based on analyses of CAN(Content-Addressable Network) protocol, DFO (Distributed Fairly Optimal) arithmetic is proposed, which use peer’s up/down bandwidth usage and overlay multicast link efficiency defined by utility function as standard. DFO define request/response utility function respective and evaluate global transmit overload based on peer input efficiency vector to conform a fire restrict. DFO can reduce average query latency and global bandwidth cost by optimizing global utility. Simulative results and analysis has shown that DFO improved on hot spot problem in CAN, can achieve the purpose of minimum global query latency and maximal transmit overload balance.

Select  |    Cite this article 
Huang He-qing; Yao Dao-yuan;Shen Jie; Ma Kui; Liu Hai-tao
A Multi-weight Based Clustering Algorithm for Wireless Sensor Networks
2008 Vol. 30 (6): 1489-1492 [Abstract] ( 2456 ) [PDF 257KB] ( 1243 )    DOI: 10.3724/SP.J.1146.2006.01792

Topology control in a wireless sensor network balances load on sensor nodes and increases network scalability and lifetime. Clustering architecture is one of the effective approach. In this paper, we proposed a distributed clustering algorithm MWBC for maximal-lifetime wireless sensor network design, which take into consideration many factors such as the ideal degree, current energy, transmission power, link quality, and relatively position of nodes. Through simulations we have compared the performance of proposed algorithm with that of the LEACH and HEED algorithms in terms of the number of clusters formed, and the Load Balance Factor(LBF)value. The results demonstrate the superior performance of the proposed algorithm.

Select  |    Cite this article 
Wu Zhi-Jun;Zhang Dong
The Approach of Defending Against DoS Attack in Frequency Domain
2008 Vol. 30 (6): 1493-1495 [Abstract] ( 2546 ) [PDF 221KB] ( 1356 )    DOI: 10.3724/SP.J.1146.2006.01688

DoS (Denial of Service) attacks have become one of the most severe security threats to the global Internet increasingly. It makes the resources of Internet used up and incurs congestion by sending a large number of packages constantly. This paper proposes using signal processing method to analyze DoS attacks. Because of sending mass packages, it must have much more power. For this, the FIR filter is designed to filtering the illegitimate frequencies in frequency domain and the LAR (Legitimate traffic to Attacked traffic Ratio) is improved. Then much more resources and service can be supplied for the users.

Select  |    Cite this article 
Yu Bin; Yin Cheng-you; Huang Ye
A Fast Computation Method of Mutual Coupling Inverse Matrix Based on RBF Neural Network
2008 Vol. 30 (6): 1496-1499 [Abstract] ( 2976 ) [PDF 231KB] ( 2172 )    DOI: 10.3724/SP.J.1146.2006.01886

A fast computation method of mutual coupling inverse matrix in uniform linear antenna array based on RBF neural network is proposed to solve the problems of computational complexity and difficult to implement in real-time in traditional method. Different training methods can be applied according to different calculation methods for mutual coupling inverse matrix. The mutual coupling inverse matrix can be estimated in real-time owing to the RBFNNs’ superior ability of parallel processing, and the computation problem can be transformed to nonlinear function approximation. The specific steps are presented. And the simulation results prove its superiority to other methods.

Select  |    Cite this article 
Cui Kai; Xu Xiao-jian; Mao Shi-yi
EM Backscattering of Simplified Ship Model over Sea Surface Based on a High Frequency Hybrid Method
2008 Vol. 30 (6): 1500-1503 [Abstract] ( 2606 ) [PDF 419KB] ( 1211 )    DOI: 10.3724/SP.J.1146.2006.01866

This paper focuses on a special kind of three-plate cavity reflectors which is useful in EM backscattering model of large complex targets over land or sea surface. After employing Computer Graphics (CG) method to eliminate shadowing effect, Physical Optics (PO) and Area Projection (AP) method are combined to analyze specular reflection and multiple scattering mechanism to calculate the Radar Cross Section (RCS) of different reflectors. Finally, by combining with sea reflection coefficient under different sea states, a procdure is proposed to compute the RCS of simplified ship targets over sea surface. The results show that multiple scattering can form obvious RCS characterization under certain conditions.

Select  |    Cite this article 
Liu Pu-kun; Cao Xiao-qin
Design of a 94GHz CW 40kW Gyrotron Oscillator Circuit
2008 Vol. 30 (6): 1504-1506 [Abstract] ( 2328 ) [PDF 201KB] ( 1385 )    DOI: 10.3724/SP.J.1146.2006.02011

The W-band high-power CW gyrotron oscillator has an important application in the field such as millimeter-wave non-lethal weapon etc.In this paper,the operating mode of the gyrotron is chosen by the calculation of starting current,and the 94GHz CW gyrotron oscillator circuit is optimally designed using a self-consistent nonlinear calculating code GYROSC developed by authors.The result shows that the designed W-band CW gyrotron oscillator can obtain output power 40kW,and electron efficiency more than 30%.

Select  |    Cite this article 
Yin Rui-jian①②; Liu Pu-kun
Design of a Single-anode Magnetron-injected-gun for the 3mm GYRO-TWT Amplifiers
2008 Vol. 30 (6): 1507-1510 [Abstract] ( 2527 ) [PDF 239KB] ( 991 )    DOI: 10.3724/SP.J.1146.2006.01896

A single-anode electron gun is designed and simulated according to the requirements of the gyrotron traveling wave amplifier. Firstly,the initial parameters for example the cathode angle, the cathode emitter strip and the distance between cathode and mod-anode are designed based on analytic trade-off equations. Secondly,the final beam parameters are determined with the electron trajectory code EGUN. The results reveal that when the accelerated voltage is 70kV and the beam current is 4.55A, electron gun has the axial velocity spread of 2.4%, and the ratio of the transverse velocity to the axial velocity is equal to 1.0, which can satisfy the requirement of the low electron beam velocity spread in the gyrotron traveling wave amplifier.

Select  |    Cite this article 
Cao Han-mei; Yang Yin-tang; Cai Wei; Lu Tie-jun; Wang Zong-min
High Performance CMOS Bandgap Reference Source Based on Negative Feedback Clamp Technique
2008 Vol. 30 (6): 1517-1520 [Abstract] ( 2596 ) [PDF 241KB] ( 1850 )    DOI: 10.3724/SP.J.1146.2007.00886

A novel CMOS bandgap reference is presented.A negative feedback clamp technique is used which eliminates the offset of Op-Amps and simplifies the design.A regulated cascode configuration is used to improve Power Supply Rejection Ratio(PSRR).It is implemented in SMIC standard 0.18μm CMOS process,the results from HSPICE simulation show that the temperature coefficient between-15~70℃ is 10.8ppm/℃,and the PSRR at 10Hz is 74.7dB,the output noise voltage is 148.7μV/sqrt(Hz).

Select  |    Cite this article 
Cao Jing①②; Ding Yao-gen; Shen Bin
Research on Field Distribution of TM310 Mode in Cylindrical Coaxial Cavity Resonator with Coupling of Waveguide Hole
2008 Vol. 30 (6): 1521-1524 [Abstract] ( 2694 ) [PDF 248KB] ( 1465 )    DOI: 10.3724/SP.J.1146.2007.01875

Output circuit of multi-beam klystron, which is consist of coaxial cavity with high-order mode of TM310 and coupling of waveguide hole, is analyzed in this article. Some methods and steps of adjusting external Q-factor of cavity are described in theory. Some simulations are also made using CST MicroWave Studio (MWS). Output cavity with symmetrical field distribution of TM310 mode and low external Q-factor is obtained in this article.

Reviews
Select  |    Cite this article 
Luo Wu-sheng; Zhai Yong-ping; Lu Qin
Study on Wireless Multimedia Sensor Networks
2008 Vol. 30 (6): 1511-1516 [Abstract] ( 3039 ) [PDF 228KB] ( 3288 )    DOI: 10.3724/SP.J.1146.2007.00016

Wireless Multimedia Sensor Networks (WMSNs), developed from traditional Wireless Sensor Networks(WSNs), is a novel sensor network integrating sensation functions of multimedia streaming (e.g. audio, video, image) and has wide applications. In this paper, the concept and the characteristics of WMSNs are described by comparing with traditional WSNs. Then, on the basis of a survey of the current research status, the key techniques of WMSNs, including node systems, MAC protocols, routing protocols, multimedia signal processing, are discussed in detail. Finally, the current problems are demonstrated, and the further research issues are also discussed.

电子与信息学报
Author Center
Online Submission
Author Instruction
FAQ
Template
Copyright Agreement
MSN:je-jeit@hotmail.com
Links
More>>  
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech