电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Quick Search  
  Advanced Search
2008 Vol.30 No.3, Published: 19 March 2008
Articles | Reviews |
 
 
Articles
Select  |    Cite this article 
Dai Fang①②; Xue Jian-ru; Zheng Nan-ning
Embedding Intrinsic Mode Function into Anisotropic Diffusion Equation for Image Denoising
2008 Vol. 30 (3): 509-513 [Abstract] ( 2797 ) [PDF 1232KB] ( 1264 )    DOI: 10.3724/SP.J.1146.2007.00511

In this paper, an image denoising model which embeds intrinsic mode function into Perona-Malik model is proposed. Firstly, the image is decomposed into Intrinsic Mode Functions (IMFs) by using empirical mode decomposition technique; each of IMFs captures the feature information under different scales. Secondly, the first and second IMFs are embedded into Perona-Malik model. Experimental results indicate that this method is more efficient than Perona-Malik model in removing Gaussian noise. Moreover, this method can remove salt and pepper noise.

Select  |    Cite this article 
Li Zhi-yong; Teng Sheng-hua; Du Kun; Zou Mou-yan
Colorization Based on Unevenness in Chrominance Blending
2008 Vol. 30 (3): 514-517 [Abstract] ( 2185 ) [PDF 351KB] ( 1152 )    DOI: 10.3724/SP.J.1146.2006.01051

Colorization of grayscale image is in general an active and challenging area of research in image processing. In this paper, current colorization algorithms are summarized. Then a colorization algorithm based on unevenness is proposed. According to the new algorithm, a better colorized result is got with less sensitivity to the initial color distribution.

Select  |    Cite this article 
Wei Zhi-qiang; Jin Ya-qiu
InSAR Phase Unwrapping Algorithm Based on Ant Colony Algorithm
2008 Vol. 30 (3): 518-523 [Abstract] ( 2430 ) [PDF 518KB] ( 1278 )    DOI: 10.3724/SP.J.1146.2006.01303

According to scaled real Digital Elevation Maps (DEM) information, sets of Single Look Complex (SLC) SAR images are simulated for interferometric missions, based on the SAR imaging mechanism and scattering model of two-scale rough surface. On the basis of the Ant Colony Optimization (ACO), a novel phase unwrapping method is developed. This method is applied to the simulated sets of SAR images and real ENVISAT ASAR images of repeat-path orbits. Experiment results show its improved performances on unwrapping precision and speed with respect to several existed phase unwrapping algorithms.

Select  |    Cite this article 
Zhu Jing-fu①②; Huang Feng-gang
The Equivalence Framework and the Application to Image Denoising of Two Dimensional Wavelet Shrinkage and Anisotropic Diffusivity 
2008 Vol. 30 (3): 524-528 [Abstract] ( 2660 ) [PDF 353KB] ( 1050 )    DOI: 10.3724/SP.J.1146.2007.00888

Image denoising is one of important technology in image processing. The denoising image can be gotten by shrink the amplitude of wavelet coefficient of noise according to the fact that it is smaller than others in Wavelet Shrinkage (WS). The Anisotropic Diffusivity (AD) completes denoising according to the direction and amplitude of gradient while as far as possible to keep the characteristic of image. In this paper, the equivalence framework of two dimensional wavelet shrinkage and anisotropic diffusivity is proved with experiment. After that, the Anisotropic Wavelet Shrinkage (AWS) is proposed that synthesizes the merits of the wavelet shrinkage and anisotropic diffusivity according to the equivalence. The contrastive experiments show that the AWS is better for image denoising.

Select  |    Cite this article 
Yang Yan-xi; Liu Ding; Xin Jing
Research of Image Correlation Matching Method Based on CPSO
2008 Vol. 30 (3): 529-533 [Abstract] ( 2839 ) [PDF 447KB] ( 1242 )    DOI: 10.3724/SP.J.1146.2006.01344

A Chaos Particle Swarm Optimization (CPSO) algorithm is presented. The initial location of the particle is evaluated by chaos. During the running time, according to the variance of the population’s fitness, the chaotic location update of the particle is performed adaptively. The experimental results using the testing functions show that CPSO is able to search the global optimizer and avoiding the premature convergence on the multidimensional variable space. Applied the algorithm to image correlation matching, a new image correlation matching method based on CPSO is presented. The experimental results show that this method is very effective for image matching processing with noise.

Select  |    Cite this article 
Zhu Qiu-yu; Wang Shuo-zhong
Data Fusion and Confidence in Image Feature Detection and Mahalanobis Distance
2008 Vol. 30 (3): 534-538 [Abstract] ( 2697 ) [PDF 220KB] ( 1488 )    DOI: 10.3724/SP.J.1146.2006.01199

Using a statistical approach, data fusion is performed in image feature detection with which information about the same feature obtained by multiple methods can be integrated. Validity of the described fusion scheme and properties of the fused data are discussed. A confidence measure is defined and applied to evaluate credibility of the results. Taking into account the data fusion and confidence measure, a Mahalanobis distance is derived. The technique is applied to face retrieval and its canthus detection. Experimental results show that the proposed approach can reduce adverse effects of feature detection errors and enhance the pattern recognition rate.

Select  |    Cite this article 
Zhang Zhi-wei; Yang Fan; Xia Ke-wen; Yang Rui-xia
A Supervised LPP Algorithm and Its Application to Face Recognition
2008 Vol. 30 (3): 539-541 [Abstract] ( 2802 ) [PDF 300KB] ( 2357 )    DOI: 10.3724/SP.J.1146.2006.01258

Illumination and pose variations make the performance of the Locality Preserving Projections (LPP)in face recognition decrease. To solve the problem, a supervised LPP using discriminant information is presented in this paper, the proposal calls for the establishment of a feature subspace in which the intrasubject variation is minimized, while the intersubject variation is maximized, then face recognition is implemented with the subspace. Experimentation results on Havard and Umist indicate that this approach is robust to illumination and pose and has higher recognition rate than LPP and other subspace methods.

Select  |    Cite this article 
Wang Hong-qiang; Qin Yu-liang; Liu Ji-hong; Li Xiang
Modified PDA Algorithm Performance Prediction Based on Hybrid Conditional Averaging Approach
2008 Vol. 30 (3): 542-545 [Abstract] ( 2383 ) [PDF 262KB] ( 895 )    DOI: 10.3724/SP.J.1146.2006.00982

Taking into account target tracking in high-density clutter, first the modified PDA algorithm (MPDA) is presented, then its performance estimation is obtained by using HYbrid Conditional Averaging(HYCA)approach, which gives us a series of off-line recursive algorithms for performance measurement. Simulation results show that the modified algorithm performance prediction based on HYCA approach is effective, and MPDA’s tracking precision is improved in contrast with PDA’s.

Select  |    Cite this article 
Ma Li-xiang①②; Wang Yan-fei; Zhang Bing-chen; Wang Pei①②
An Irrelevant Amplitude-Phase Algorithm for INSAR Raw Data Compression
2008 Vol. 30 (3): 546-549 [Abstract] ( 2602 ) [PDF 308KB] ( 707 )    DOI: 10.3724/SP.J.1146.2006.01047

An irrelevant Amplitude-Phase (AP) algorithm is used in raw data compression according to the bulky raw data of Interferometric Synthetic Aperture Radar(INSAR) system. The new algorithm is based on the statistical property and the high correlation between the two channels of INSAR. Amplitude and phase of raw data are compressed irrelevantly. Detail analysis in theory is given and experiment with real data is undertaken. Comparisons are made with BAQ algorithm at aspects of correlation, fringe similarity index and residuals. The results show that AP algorithm is superior to BAQ algorithm at the same reduction ratio. Thereby AP algorithm preserves more information of amplitude and phase.

Select  |    Cite this article 
Dong Zhen; Liang Dian-nong; Huang Xiao-tao
A RFI Suppression Algorithm Based on Channel Equalization for the VHF/UHF UWB SAR
2008 Vol. 30 (3): 550-553 [Abstract] ( 2360 ) [PDF 313KB] ( 1139 )    DOI: 10.3724/SP.J.1146.2006.01173

For Very High Frequency/Ultra High Frequency(VHF/UHF) Ultra-WideBand Synthetic Aperture Radar (UWB SAR) the Radio Frequency Interference(RFI) may degrade the SAR image. In this paper a method based on channel equalization is proposed to remove the RFI yet preserve SAR image quality. The effectiveness of the method is also verified with the real data from an airborne VHF/UHF UWB SAR.

Select  |    Cite this article 
Huan Ruo-hong①②; Yang Ru-liang; Yue-Jin①②
A New Method for Synthetic Aperture Radar Images Feature Extraction and Target Recognition
2008 Vol. 30 (3): 554-558 [Abstract] ( 2483 ) [PDF 453KB] ( 1015 )    DOI: 10.3724/SP.J.1146.2006.01198

This paper presents a new method for synthetic aperture radar images feature extraction and target recognition which based on principal component analysis in wavelet domain and support vector machine. After wavelet decomposition of a SAR image, feature extraction is implemented by picking up principal component of the low-frequency sub-band image. Then, support vector machine is used to perform target recognition. Results are presented to verify that, the correctness of recognition is enhanced obviously, and the method presented in this paper is a effective method for SAR images feature extraction and target recognition.

Select  |    Cite this article 
Zhang Da-wei①②; Wei Fang①②; Wang Yan-fei
Analysis of the Doppler Effect in FMCW-SAR and Its Influence on the Image of the System
2008 Vol. 30 (3): 559-563 [Abstract] ( 2428 ) [PDF 341KB] ( 1453 )    DOI: 10.3724/SP.J.1146.2006.01025

Sawtooth signals are transmitted and received continuously in FMCW-SAR, which makes the character of the echo of FMCW-SAR is different from pulsed SAR. Combined with the imaging principle of FMCW-SAR, the influence of Doppler effect on FMCW-SAR imaging system is analyzed in this paper. It is pointed out that second coupling of range and azimuth signals may be caused by Doppler effect and defocusing of the image may be caused by it. An approach to compensate for the Doppler effect in the azimuth Doppler domain is presented and the flow chart of the RD algorithm for the FMCW-SAR imaging system is given out. Experimental results show that the Doppler effect and second coupling of the range and azimuth signals may be compensated by the approach presented in this paper and better images could be formed.

Select  |    Cite this article 
Wang Xiao-qing; Yu Ying; Chen Yong-qiang; Zhu Min-hui
The Study on the Ocean Echo Signal Coherent Time of Bistatic SAR
2008 Vol. 30 (3): 564-568 [Abstract] ( 2160 ) [PDF 253KB] ( 959 )    DOI: 10.3724/SP.J.1146.2006.01287

The coherent time of echo signal of ocean surface is much different from that of land because of its stochastic movement, which is related to the system parameters designation. The ocean echo signal coherent time of bistatic SAR is studied in this paper. The echo signal phase due to the wave movement is analyzed, and the effect on the bistatic SAR imaging of the ocean wave stochastic movement is given. The formula of coherent time is given, the relationship between the azimuth resolution and the coherent time is given, and the relationships between the coherent time and some factors are simulated and analyzed.

Select  |    Cite this article 
Zhang Wen-chao①②; Wang Yan-fei; Pan Zhi-gang
SAR Raw Data Compression Based on 2D Real-Valued Discrete Gabor Transform
2008 Vol. 30 (3): 569-572 [Abstract] ( 2871 ) [PDF 408KB] ( 975 )    DOI: 10.3724/SP.J.1146.2006.01285

This paper proposes a compression method for Synthetic Aperture Radar (SAR) raw data,which is based on time-frequency analysis theory and the linear frequency modulation properties of the SAR raw data. In this method, the raw data of I and Q channels is divided into blocks at first, then each block is transformed into time-frequency domain by 2D-RDGT (Two-Dimensional Real valued Discrete Gabor Transform) and the desired bits are allocated to each frequency plane, finally each frequency plane is quantized with BAQ(Block Adaptive Quantization).The same raw data is experimented with this method and the existing methods.The experiments results show that this method outperforms the existing methods in raw data domain and SAR image domain.

Select  |    Cite this article 
Ge Jian-jun; Zhang Chun-cheng
Research on Medium PRF Selection of Airborne Pulsed Doppler Radar by Simulated Annealing Algorithm
2008 Vol. 30 (3): 573-575 [Abstract] ( 2809 ) [PDF 193KB] ( 1098 )    DOI: 10.3724/SP.J.1146.2006.01252

Medium PRF and N/M detection rule is the general working model of airborne pulse Doppler radar, it is necessary to satisfy the demand that medium pulse repetition frequency(PRF) set can solve ambiguities of range and Doppler, besides the demand, the blind zones of range and Doppler occurred by the medium PRF set should be minimum. So the medium PRF set selection can be modeled as a large scale combinatorial optimization problem, the problem can be solved by simulated annealing algorithm. This paper proposed a method for medium PRF set selection of airborne pulsed Doppler radar. based on the characteristics of the radar. The results of experimentation show this method is very effective.

Select  |    Cite this article 
Yang Zheng-bin; Xie Kai; Guo Fu-cheng; Zhou Yi-yu
Hybrid Particle Filtering Algorithm for Passive Location by a Single Observer Based on Bearing Constrained Sampling
2008 Vol. 30 (3): 576-580 [Abstract] ( 2463 ) [PDF 300KB] ( 978 )    DOI: 10.3724/SP.J.1146.2006.01340

To achieve fast location of moving emitter by a single stationary observer, an algorithm of hybrid particle filter based on bearing constrained sampling is presented. The algorithm gets proposal importance density from Extended Kalman Filter(EKF), and generates particles through the constraint between bearing measurements and the state variables, thus the number of particles and computation cost decrease when tackling high-dimensional filtering, and the filtering performance gets improved. Applying the algorithm to the location method of using Doppler changing rate and bearing measurements, simulation results of comparing the proposed algorithm with EKF, Unscented Kalman Filter(UKF) and the general hybrid particle filter, show that the proposed algorithm is superior in convergence speed, tracking precision and filtering stability to others, and the estimation error is more closer the Cramer-Rao lower bound.

Select  |    Cite this article 
Xu Wei-ming①②; Liu Yan-chun
Algorithm of Multirate Interacting Multiple Model for Underwater Target Tracking
2008 Vol. 30 (3): 581-584 [Abstract] ( 2210 ) [PDF 251KB] ( 1068 )    DOI: 10.3724/SP.J.1146.2006.01309

To solve the real-time and reliability problem of the underwater maneuver target tracking, according to the features of under maneuver target motion, namely, slow speed and weak motion capability, the mixing filter between pattern space and measurement space is performed by the wavelet transform, and the algorithm of multirate interacting multiple model is proposed for under maneuver target tracking. Meanwhile, the uniform expressions of multirate interacting multiple model are presented. The simulation results show that the algorithm of the multirate interacting multiple model has the low computation complexity and can improve the real-time and reliability performances of the underwater maneuver target tracking.

Select  |    Cite this article 
Zhang Xiao-fei; Xu Da-zhuan
Oblique Projection-Based Beamforming Algorithm
2008 Vol. 30 (3): 585-588 [Abstract] ( 2700 ) [PDF 249KB] ( 1207 )    DOI: 10.3724/SP.J.1146.2006.01263

Sampling Matrix Inversion (SMI) beamforming technique has the worse performance in the small snapshot number, high signal-noise- ratio and coherent source. Diagonal loading technique can improve the beamforming aberration. But loading value is hard to solve. An oblique projection-based beamforming algorithm is proposed in this paper. This algorithm uses oblique projection algorithm for the received signal to eliminate interference and enhance the algorithm robustness. Simulation results reveal that this algorithm has the better beamforming performance than conventional SMI beamforming algorithm and projection algorithm in the lower, middle and high Signal-Noise-Ratio (SNR), and it has the better performance in the small snapshot number and coherent source. So it has robust characteristic and the better performance. The algorithm is no more complex and can be implemented easily, and it can be used widely.

Select  |    Cite this article 

Xu Shun; Liu Yu-lin; Chen Shao-rong


A Time-Domain Algorithm for Blind Source Separation of Non-stationary Convolutive Mixtures
2008 Vol. 30 (3): 589-592 [Abstract] ( 2503 ) [PDF 262KB] ( 1112 )    DOI: 10.3724/SP.J.1146.2006.01273

In this paper, a time-domain blind source separation algorithm for non-stationary convolutive mixtures is proposed by reprogramming the vectors of convolutive mixture model and generalizing the joint approximate diagonalization method. Firstly the sampling convolutive mixture signals are reseted for matching instantaneous mixture model, then considering non-stationarity of the sources, space whitening and joint block-diagonalization method is exploited to obtain the original signals. This algorithm simplifies the convolutive mixture problem into the instantaneous mixture problem from a new point of view, so it avoids domain transformation and convolution operation, as well as decreases the complexity. Computer simulation verifies its effectiveness and gives the analysis results about the effect on the signal to interference ratio as its parameter changes.

Select  |    Cite this article 
Sun Xiao-li; Feng Xiang-chu; Song Guo-xiang
The Study of Correlation between Directed Diffusion Equation and Wavelet Transform
2008 Vol. 30 (3): 593-595 [Abstract] ( 2230 ) [PDF 267KB] ( 925 )    DOI: 10.3724/SP.J.1146.2006.01278

Based on the point that directed diffusion equation is a diffusion process with direction, the correlation between directed diffusion and wavelet transform is studied in this paper. At first, the last low-frequency image after wavelet decomposition can be an initial approximation of the next low-frequency image. It is tested and verified that the last low-frequency image can diffuse and converge to the next low-frequency image. On the other hand, the next low-frequency image can also diffuse and converge to the last low-frequency image. Above process just presents the gradual variation of wavelet decomposition and reconstruction. So the interative diffusion of directed diffusion equation can realize wavelet decomposition and reconstruction in two contiguous layers. With the reduction of time interval, the gradual variation of wavelet decomposition and reconstruction can be observed in more and more fine scales.

Select  |    Cite this article 
Liang Jun-li①②; Yang Shu-yuan; Wang Shi-jun①②; Zhao Feng
A New Near-Field Source Localization Algorithm Using Second-Order Statistics
2008 Vol. 30 (3): 596-599 [Abstract] ( 2635 ) [PDF 259KB] ( 926 )    DOI: 10.3724/SP.J.1146.2006.01203

In this paper, based on Second-Order Statistics (SOS), a new algorithm is proposed for jointly estimating ranges, frequencies and Direction-Of-Arrival (DOA) of multiple near-field narrowband sources. The proposed method constructs three matrices using the second-order statistics of the properly chosen sensor outputs, and forms two new ones using the three matrices, then estimates the source parameters from the new ones’ eigenvalues and the corresponding eigenvectors. In comparison with other methods based on SOS, the proposed method can save one sensor, and only uses three SOS matrices; in addition, the estimated parameters are paired automatically. Finally, the simulation results are presented to validate the performance of the proposed method.

Select  |    Cite this article 
Hu Jun-feng①②; Zhang Hai-lin
Optimization of Construction and Encoding for Finite Length Irregular LDPC Codes
2008 Vol. 30 (3): 600-603 [Abstract] ( 2291 ) [PDF 208KB] ( 1220 )    DOI: 10.3724/SP.J.1146.2006.01182

The main influence for the performance of finite length Low-Density Parity-Check(LDPC) codes is analyzed. According to optimum choice for degree distribution, a check matrix is constructed with improved Progressive-Edge-Growth (PEG) algorithm. A practical efficient encoding algorithm is proposed to optimize the check matrix. A finite length irregular LDPC code with low error-floor performance and approximate linear encoding complexity is obtained. This optimization method can be easily extended to general communication channels.

Select  |    Cite this article 
Zhu Yong-zhong; Xie Yong-jun; Ni Da-ning
Design of Quasi-Elliptic Filter with Source-Load Cross-Coupling
2008 Vol. 30 (3): 604-606 [Abstract] ( 2533 ) [PDF 241KB] ( 1116 )    DOI: 10.3724/SP.J.1146.2007.00409

A general method is presented for synthesis of quasi-elliptic filter with source-load coupling. The equivalent circuit of the low-pass prototype of a lossless coupled resonator filter is proposed, as well as its transfer function t (s ).The expressions of MSL, MSi and MiL in the coupling matrix M are obtained based on two-port admittance matrix [ YN ]. Finally, a novel quasi-elliptic two pole microstrip filter composed of two hexagonal open-loop resonators is designed. The numerical results are verified with the simulation, The measured and simulated data are in good agreement.

Select  |    Cite this article 
Li Dou; Ji Bing-hui; Wang Feng; Xiang Hai-ge
The Dynamic Allocation of Broadband DVB-RCS Satellite Access Channel Based on Chaotic Prediction
2008 Vol. 30 (3): 607-611 [Abstract] ( 2692 ) [PDF 286KB] ( 1248 )    DOI: 10.3724/SP.J.1146.2006.01286

This paper provides an overview of broadband satellite communication networks based on Digital Video Broadcasting-Return Channel System (DVB-RCS) standard, with an emphasis on the dynamic allocation of multi-access channel. A novel combined Demand Assignment Multiple Access (DAMA) scheme is proposed, in which chaotic prediction method is employed for self-similar traffic. For comparing the performance of different schemes, OPNET software is used to build a simulation system. Simulation results indicate that the novel scheme has better performance under heavy channel load and when the traffic has high degree of self-similarity.

Select  |    Cite this article 
Wang Wen-yi; Yang Shu-yuan; Liang Jun-li; Gao Li
Power Allocation for Cooperative Diversity with Multi-relays Based on Decode-and-Forward
2008 Vol. 30 (3): 612-615 [Abstract] ( 2438 ) [PDF 197KB] ( 1151 )    DOI: 10.3724/SP.J.1146.2006.01294

This paper studies the power allocation problem in a cooperative diversity system with multi-relays based on decode-and-forward in fading channels. The system model assumes both the source and the destination have the complete Channel State Information (CSI). A relay selection and power allocation scheme is proposed to minimize the system outage probability by maximize the system capacity on each channel realization with power restraint. Simulation results verify the improved performance of the proposed method.

Select  |    Cite this article 

Nie Yuan-fei;Ge Jian-hua; Wang Yong


Impact of Non-ideal SNR Estimation on the Performance of BICM-ID Systems
2008 Vol. 30 (3): 616-620 [Abstract] ( 2112 ) [PDF 277KB] ( 1051 )    DOI: 10.3724/SP.J.1146.2006.01206

This paper proposes an intuitive modeling of a prior information with Signal-to-Noise-Ratio (SNR) mismatch for Bit-Interleaved Coded Modulation with Iterative Decoding (BICM-ID) systems. The extrinsic information transfer chart is applied to analyze the impact on BICM-ID caused by non-ideal SNR estimation for different constellations, labeling methods and channel types. It is found that the results are semblable for these cases. The performance of BICM-ID systems with different frame length is compared with SNR mismatch varied. The system performance decreases acutely when SNR mismatch is smaller than -3dB and maintains when it is bigger than 0dB for long frame, while it is more sensitive for SNR underestimation than overestimation for moderate and short frames. Besides these, SNR estimation methods are presented for 8PSK in Gaussian channel and 16QAM in Gaussian and Rayleigh channels. Finally, simulation results show these methods are effective.

Select  |    Cite this article 
Li Xu-ming; Wu Le-nan
A Novel Frequency Domain Differential Demodulator in Application to HF Communication
2008 Vol. 30 (3): 621-624 [Abstract] ( 2379 ) [PDF 219KB] ( 1000 )    DOI: 10.3724/SP.J.1146.2006.01189

In HF communication, the signals suffer from the effect of delay spread, time-varying interference and additive Gaussian noise. The performance of conventional differential demodulator is very poor in bad HF channel. A novel frequency domain differential demodulator is proposed which employs blind phase estimation to cancel the effect of phase error caused by delay spread. Its performance is studied through simulation in bad HF channel, and comparing with the conventional differential demodulator is described. Simulation results show that the proposed technique outperforms conventional differential demodulators in performance of transmission over the fast fading HF channel.

Select  |    Cite this article 
Han Xiang; Zhao Dan; Wei Ji-bo; Wang Jian-xin
An Adaptive Iterative Detection and Decoding Algorithm for MIMO Systems
2008 Vol. 30 (3): 625-629 [Abstract] ( 2323 ) [PDF 259KB] ( 959 )    DOI: 10.3724/SP.J.1146.2006.01315

To further reduce the redundancy of the existing non-exhaustive list MAP detection algorithms, which is induced by defining a fixed and large list size, an Adaptive Size List Sphere Decoding (ASLSD) algorithm is proposed. Through updating radius and setting stop criterion, the resulted detection list has a variable length which is adaptive with the SNR and the iteration. Moreover, by combining LSD with a list, the repeated detection with different radius is avoided. Simulation shows that with slight loss in performance, the proposed algorithm leads to a much shortened detection list, which means a simplified receiver.

Select  |    Cite this article 
Li Liang-bin; Wang Zong-xin
A Novel Spatial Correlation Estimation Technology in MIMO Communication System
2008 Vol. 30 (3): 630-633 [Abstract] ( 2442 ) [PDF 304KB] ( 1188 )    DOI: 10.3724/SP.J.1146.2006.01411

A novel algorithm is proposed in this literature to estimate the transmit and receive antenna correlation matrix, RT and RR, in MIMO system. Theoretical analysis indicates that the estimation performance is improved when more training number is used. Interestingly, the performance of the estimation of antenna correlation matrix at one side is highly correlated to the correlation degree of the antennas at the other side, but not the correlation degree of itself. Moreover, the relationship between estimation performance and antenna numbers is also presented. Simulation results show that mean error of this algorithm is generally below 0.05 when 200 training symbols are used.

Select  |    Cite this article 
Wu Zhou; Zhao Chun-hui
Cross Optimization Scheduling Algorithm for MIMO System
2008 Vol. 30 (3): 634-637 [Abstract] ( 2352 ) [PDF 261KB] ( 930 )    DOI: 10.3724/SP.J.1146.2006.01387

MIMO technology can utilize spatial multiplexing in link level or use multiuser scheduling in system level to increase system capacity. However it is not enough only to optimize the performance of link level or only to schedule the multiuser in system level respectively. Combining both to optimize can obtain higher system capacity. A novel Cross Optimization Scheduling Algorithm (COSA) is proposed, which combines the scheduling strategy in system level with the physical optimization in link level and water-filling algorithm is used to adjust power allocation of each antenna. Simulation results show that COSA algorithm not only provides the fair channel access chance to users in system level but utilizes spatial multiplexing of MIMO system and allocates power in link level to increase system capacity.

Select  |    Cite this article 
Hou Hua;Zhou Wu-yang;Zhu Jin-kang
An Adaptive Wireless Resource Allocation Scheme Based on Cross-Layer Fairness Criterion
2008 Vol. 30 (3): 638-642 [Abstract] ( 2335 ) [PDF 287KB] ( 1134 )    DOI: 10.3724/SP.J.1146.2006.01162

A new fairness criterion based on the joint optimization of the physical layer and the MAC layer is proposed in this paper. It is suitable for both the real-time traffic and the non-real-time traffic. According to the criterion a new cross-layer resource allocation scheme is presented. Simulation results confirm the significant performance improvement and the user QoS satisfaction fairness by the proposed scheme.

Select  |    Cite this article 
Wang Xiao-dong; Bu Zhi-yong; Chen Yun-feng
Fade Statistics in Composite Fading Channels
2008 Vol. 30 (3): 643-647 [Abstract] ( 2213 ) [PDF 262KB] ( 1234 )    DOI: 10.3724/SP.J.1146.2006.01244

The Joint Probability Density Function (JPDF) of signal envelope and its derivative, which is subjected to composite fading, is analyzed by means of conditional probability density. New uniform expressions for the average Level Crossing Rate (LCR) and Average Fade Duration (AFD) of signal envelope are derived using the above obtained JPDF, then some results of the PDF, Cumulative Distribution Function (CDF), average LCR and AFD of signal envelopes, characterized by Rayleigh-Lognormal, Ricean-Lognormal, Nakagami-Lognormal fading models, are derived via Gauss-Hermite quadrature. Simulation results validate the correctness of these expressions.

Select  |    Cite this article 
Zhao Liang; Zhu Wei-qing; Zhu Min
An Adaptive Equalization Algorithm for Underwater Acoustic Coherent Communication System
2008 Vol. 30 (3): 648-651 [Abstract] ( 2594 ) [PDF 267KB] ( 973 )    DOI: 10.3724/SP.J.1146.2006.01229

Multi-Channel Decision Feedback Equalizer (MC-DFE) is the main method to overcome multipath fading and eliminate Inter-Symbol Interference (ISI) for underwater acoustic coherent communications. To reduce computational complexity and improve the precision of the data processing, an adaptive and self-optimized pre-combination multi-channel decision feedback equalizer is proposed which consists of Fast self-Optimized LMS Diversity Combiner (FOLMSDC), Fast self-Optimized LMS (FOLMS) and Fast self-Optimized LMS Phase Compensation (FOLMSPC). The proposed algorithm uses single error signal to adjust coefficients according to Minimize Mean Square Error (MMSE) scheme. The proposed algorithm is analyzed through simulation experiments and lake experiments. The experiment results show that proposed algorithm can further reduce computational complexity, and the algorithm performance is better than available algorithms.

Select  |    Cite this article 
Liu Qing-ge; Shao Ding-rong; Li Shu-jian
General Quadratic Prime Codes
2008 Vol. 30 (3): 652-655 [Abstract] ( 2103 ) [PDF 204KB] ( 842 )    DOI: 10.3724/SP.J.1146.2006.01194

Based on the relationship between the extension Galois fields and the prime Galois fields, this paper presents a new construction of frequency-hopping sequences, here designated as general quadratic prime codes, by expanding the construct idea of prime codes to extension Galois fields. Taking a general quadratic irreducible polynomial as the module and based on the multiplication of extension Galois fields, quadratic prime codes with more sequences and longer period possess ideal Hamming autocorrelation and nearly ideal Hamming cross-correlation properties of no greater than two. Furthermore, general quadratic prime codes can be further partitioned to get frequency hopping sequences groups in which the maximum Hamming cross-correlation between any two FH sequences in the same group is at most one.

Select  |    Cite this article 
Li Shuang-xun; Cheng Zhu; Wang Zhan; Xue Hong-yin; Huangfu Kan
Array Calibration Based on both PARAFAC and Array Rotation
2008 Vol. 30 (3): 656-659 [Abstract] ( 2120 ) [PDF 227KB] ( 987 )    DOI: 10.3724/SP.J.1146.2006.01236

The array calibration for spreading communication system is discussed in this paper. Based on both PARAFAC and array rotation, an array calibration approach is proposed. This calibration approach is employing auxiliary spreading code signal, PARAFAC analysis and array rotation. Array calibration can be performed without the DOA knowledge of auxiliary signal, which is convenient in practice. Simulation result shows that the calibration approach is feasible and efficient.

Select  |    Cite this article 
Hu Bin; Jin Chen-hui; Feng Chun-hai
Cryptographic Properties of Plateaued Functions
2008 Vol. 30 (3): 660-664 [Abstract] ( 2183 ) [PDF 205KB] ( 813 )    DOI: 10.3724/SP.J.1146.2007.00117

Plateaued functions include Bent functions and partially bent functions, but are wider than them. They have good cryptographic properties, and are important in the design of nonlinear combining functions. This paper proves some properties of Plateaued functions with Walsh spectrum and auto-correlation coefficient, and presents some other properties of Plateaued functions.

Select  |    Cite this article 
Jin Chen-hui; Shi Jian-hong; Deng Hui
Analysis of the Minimum Decimation Distance of Decimation Attack
2008 Vol. 30 (3): 665-667 [Abstract] ( 2415 ) [PDF 184KB] ( 900 )    DOI: 10.3724/SP.J.1146.2006.01269

Decimation attack is one attack method of stream ciphers. In this paper, the decimation attack to prime Linear Feedback Shift Register(LFSR) sequences is investigated. The connection of decimation distance and the linear complexity of the original sequence and the decimate sequence is presented. The minimum decimate distance that makes the linear complexity of the decimate sequence less than that of the original sequence is obtained. The minimum known plaintext amount for decimation attack is given, and the practical feasibility of the decimation attack to prime LFSR’s is analyzed. It is proved that the decimation attack to prime LFSR is useful possibly only in the case that the degree of LFSR is very small.

Select  |    Cite this article 
Ming Yang; Wang Yu-min
Designated Verifier Proxy Signature Scheme without Random Oracles
2008 Vol. 30 (3): 668-671 [Abstract] ( 2380 ) [PDF 204KB] ( 956 )    DOI: 10.3724/SP.J.1146.2006.01661

In a designated verifier proxy signature scheme, the original signer delegates his signing capability to the proxy signer in such a way that the latter can sign messages on behalf of the former, but only designated verifier can believe the validity of the signatures. The security of the known designated verifier proxy signature schemes is proven in the random oracle model. In this paper, based on Waters signature scheme, the first designated verifier proxy signature scheme is presented and is provably secure without random oracles. The proposed scheme is proven secure against existential forgery in adaptively chosen message attack under the weak Gap Bilinear Diffie-Hellman assumption.

Select  |    Cite this article 
Yu Yong; Yang Bo; Li Fa-gen; Sun Ying
An ID-based Proxy Signcryption Scheme with Fast Revocation
2008 Vol. 30 (3): 672-675 [Abstract] ( 2563 ) [PDF 202KB] ( 886 )    DOI: 10.3724/SP.J.1146.2006.01396

Proxy signcryption schemes allow an original signcrypter to delegate his signcryption rights to a proxy signcrypter. However, the existing proxy signcryption schemes have the defect that can not solve the proxy revocation problem, that is, how to revoke the delegated signcryption rights of a proxy signcrypter. Based on the bilinear pairings, a new identity-based proxy signcryption scheme is proposed in this paper. A SEcurity Mediator (SEM) is introduced in the scheme to help a proxy signcrypter to generate valid proxy signcryptions, to examine whether a proxy signcrypter signcrypts messages according to the warrant, and to check the revocation of a proxy signcrypter. It is shown that the proposed scheme satisfies all the security requirements of a secure proxy signcryption scheme. Moreover, a proxy signcrypter must cooperate with the SEM to generate a valid proxy signcryption, which makes the new scheme has an effective and fast proxy revocation.

Select  |    Cite this article 
Zhang Yong-jing; Feng Zhi-yong; Zhang Ping
A Q-learning Based Autonomic Joint Radio Resource Management Algorithm
2008 Vol. 30 (3): 676-680 [Abstract] ( 2436 ) [PDF 304KB] ( 1385 )    DOI: 10.3724/SP.J.1146.2006.01357

A Q-learning based Joint Radio Resource Management (JRRM) algorithm is proposed for the autonomic resource optimization in a B3G system with heterogeneous Radio Access Technologies (RAT). Through the “trial-and-error” interactions with the radio environment, the JRRM controller learns to allocate the proper RAT and the service bandwidth for each session. A backpropagation neural network is adopted to generalize the large input state space to reduce memory requirement. Simulation results show that the proposed algorithm not only realizes the autonomy of JRRM through the online learning process, but also achieves well trade-off between the spectrum utility and the blocking probability.

Select  |    Cite this article 
Zhou Xiao-bo; Lu Han-cheng; Li Jin-sheng; Hong Pei-lin
A Predict Fair Queuing Based IEEE 802.11e MAC Layer Protocol
2008 Vol. 30 (3): 681-684 [Abstract] ( 2860 ) [PDF 260KB] ( 1177 )    DOI: 10.3724/SP.J.1146.2006.01068

Fairness is an important issue when accessing a shared wireless channel. This paper presents a new fair queuing method—PFQ, after studied some fairness solutions presented recently to IEEE WLAN. And then presents a new IEEE 802.11e MAC layer protocol—P-EDCF by introducing PFQ into EDCF(Enhanced Distributed Coordination Function). This new protocol is fairer and more efficient in channel accessing by modifying the priority control method of EDCF. The results of simulations proves that P-EDCF performs much fairer than EDCF without reducing the efficiency of the system.

Select  |    Cite this article 
Jiang Hong; Lu Bin
A Distributed GLR Scheme for Mobile Networks
2008 Vol. 30 (3): 685-689 [Abstract] ( 2362 ) [PDF 250KB] ( 692 )    DOI: 10.3724/SP.J.1146.2006.01168

In the Universal Mobile Telecommunication System (UMTS) core network, an optional element Gateway Location Register (GLR) is introduced in visited networks to reduce location management signaling cost. In traditional GLR scheme, the GLR is usually centralized which may be a potential bottleneck due to the increase of number of roaming subscribers. In addition, the failure of GLR in the centralized GLR scheme will be fatal to the services for roaming subscribers. In this paper, a novel distributed GLR scheme is presented where the first visited VLR in visited network becomes the GLR for a roaming user to increase the ability to resist against failure of GLR and reduce the potential bottleneck. Analytic results show that the distributed scheme surpasses the traditional centralized GLR scheme in performance parameters such as robustness, resistance-bottleneck, database tracking cost and tracking-delay. In addition, the proposed scheme is easily realized since it only involves in software upgrade in corresponding network elements.

Select  |    Cite this article 
Wang Kai-xi; Yang Fang-chun
Study on the Overload Control Mechanism Based on the Adjacent Resourse in NGN
2008 Vol. 30 (3): 690-694 [Abstract] ( 2457 ) [PDF 229KB] ( 759 )    DOI: 10.3724/SP.J.1146.2006.01246

The dependence is formed between different function entities due to service request. The concept named “adjacent resources” is proposed according to the dependence and the NGN’s flatter architecture than the traditional telecommunication network. A distributed algorithm for overload control is presented, which is based on the proposed concept. It throttles the request at the logical adjacent resources. The algorithm can effectively handle with the overload control issuing from SIP fork or load balance scenarios. The mechanism can improve the network effective throughput by throttling the service request as soon as possible, which satisfies with the overload control requirements presented in the ETSI TISPAN draft.

Select  |    Cite this article 
Cheng Geng; Li Yun-zhao; Liu Wei; Cheng Wen-qing; Yang Zong-kai
Joint Routing and Spectrum Assignment in Cognitive Radio Networks
2008 Vol. 30 (3): 695-698 [Abstract] ( 2695 ) [PDF 300KB] ( 1471 )    DOI: 10.3724/SP.J.1146.2007.00065

Nodes in Cognitive radio networks can change their communication frequency actively, which affects networks topology and routing. In this paper, a joint routing and spectrum assignment scheme for cognitive radio networks is proposed that assigns spectrum bands during on-demand routing. Simulation results show that, in the scenario of cognitive radio networks that have multiple data flows, this scheme provides better adaptability and incurs much lower cumulative delay when comparing to other routing approaches.

Select  |    Cite this article 
Wang Tian-jing①②; Yang Zhen; Hu Hai-feng
An Event Driven Clustering Algorithm Based on Spatial Correlation in Wireless Sensor Networks
2008 Vol. 30 (3): 699-702 [Abstract] ( 2314 ) [PDF 244KB] ( 1304 )    DOI: 10.3724/SP.J.1146.2007.00120

Clustering algorithm is a kind of key technique used to reduce energy consumption, which can increase network scalability and lifetime. Considering spatial data correlation of sensor nodes, a novel Event Driven Clustering Algorithm (EDCA) based on spatial correlation in wireless sensor networks is proposed. According to the user-provided error-tolerance threshold and spatial data correlation Markovian model, the algorithm divides the event sensing range into dummy polar coordinate equal layer. Only one node per equal layer is selected as cluster-head by present maximal remainder energy. Mobile agent collects sensing information of cluster-heads. The mechanism reduces the number of transmission and saves energy efficiently.

Select  |    Cite this article 
Wu Jiang-xia; Yang Fang-chun
QoS Prediction of Web Service Composition with Transaction Mechanism
2008 Vol. 30 (3): 703-706 [Abstract] ( 2270 ) [PDF 230KB] ( 1090 )    DOI: 10.3724/SP.J.1146.2006.01441

An approach for QoS prediction of Web service composition with transaction mechanism is proposed. With the analysis on the exception handler policy of the transaction and the effect on the execution processes of composite services, the specification model of composite services is defined. On the base of the model, an algorithm to predict the QoS of composite services is proposed. The experiment shows the approach gets lower error rate than the existing workflow based prediction approach while estimating the composite service with transaction mechanism, and proves the feasibility of the algorithm.

Select  |    Cite this article 
Qin Ning-ning; Zhang Lin; Shan Xiu-ming; Xu Bao-guo
A Heuristic Track Strategy for Wireless Sensor Networks
2008 Vol. 30 (3): 707-711 [Abstract] ( 2311 ) [PDF 296KB] ( 861 )    DOI: 10.3724/SP.J.1146.2006.01324

The coverage problem has been expanded with presenting the reverse problem which has not yet been thoroughly studied, i.e., given an intrusion detecting WSN, how to design an object locomotion track with high security and fast speed. Based on this goal, a heuristic algorithm, namely, the SS (shortened Security and Speed) algorithm is introduced to build the corresponding tracks with adjusting the secure and speedy parameters under the varying application demands without the support of the global topology information. And the corresponding Integrated Gain (IG) will be posed to measure the SS ability. Simulations show that, the SS algorithm is not sensitive to the density and distribution of sensors, and solves the defects of working blind spot and track flooding. Compared with the traditional Voronoi algorithm, the proposed SS algorithm matches the results of the optimal more closely and has the smaller complexity than the optimal approach.

Select  |    Cite this article 
Liu Xinag-hui; Jing Ning; Yin Jian-ping; Li Jun; Jin Xiao-shan
The Hierarchical Network Monitoring Model with Bounded Bandwidth and Delay Constraints
2008 Vol. 30 (3): 712-716 [Abstract] ( 2298 ) [PDF 218KB] ( 829 )    DOI: 10.3724/SP.J.1146.2006.01316

Designing optimal monitoring infrastructure is a key step for network monitoring. In this paper the problem of optimizing a hierarchical monitoring system is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subject to bandwidth constraints on the individual links and delay constraint on the aggregating path. The problem is NP-hard and approximation algorithm is proposed with performance guarantee ln d + 1 under unique aggregating route, where d is the number of monitoring object.

Select  |    Cite this article 
Ding Er-rui; Wang Yi-feng; Zeng Ping; Ding Yang
Color Calibration Based on Structural Risk Minimization and Total Least Squares
2008 Vol. 30 (3): 717-720 [Abstract] ( 2409 ) [PDF 260KB] ( 1395 )    DOI: 10.3724/SP.J.1146.2006.01200

A locally regressive algorithm for color calibration is proposed. Starting from the principle of structural risk minimization, the algorithm regards the residual of total least squares as the empirical risk and chooses the K-nearest neighborhood of a calibration color point to implement local regression for color calibration. Experimental results indicate that the proposed algorithm is superior, in both precision and robustness, to multiple regression and multiple regression based on subspaces and that its average error, maximum error and error standard deviation decrease by 46%(27%), 57%(21%) and 42%(20%) respectively.

Select  |    Cite this article 
Yang Zhi-guang; Ai Hai-zhou
Demographical Classification by Shape Free Texture and Boosting Learning
2008 Vol. 30 (3): 721-724 [Abstract] ( 2374 ) [PDF 278KB] ( 1426 )    DOI: 10.3724/SP.J.1146.2006.01328

In this paper, a gender and age classification method, in which age is classified into four classes: child, youth, midlife and agedness, based on shape free texture and boosting learning is introduced. After a face is detected, face alignment extracts 88 facial landmarks by which the face image is normalized to a shape free texture. Further more, three kinds of local feature, Haar like feature, LBP histogram and Gabor jet are extracted from the shape free texture; and boosting learning method is used for training classifiers. The experimental results show that, LBP histogram can be used for robust recognition of children and old people, Haar like feature is more efficient for discriminating young and middle aged people, and Gabor Jet fits for gender classification best.

Select  |    Cite this article 
Li Wei-jiang; Zhao Tie-jun; Wang Xian-gang
A SMT-based Approach for Query Expansion in Information Retrieval
2008 Vol. 30 (3): 725-729 [Abstract] ( 2254 ) [PDF 207KB] ( 1141 )    DOI: 10.3724/SP.J.1146.2006.01382

In practical applications of information retrieval, such as the search engine,the query user submitted contains only several keywords usually. This will cause unmatched issue of word of relevant files and user’s query and have more serious negative effects on the performance of information retrieval. On the basis of analyzing of process of producing query, this paper puts forward a new method of query expansion on the basis of model of statistical machine translation. The approach extract related terms between documents and query through statistical machine translation model, then expand into query. The experiment result on TREC data collection shows the proposed method, SMT-based query expansion, has 12 - 17% of the improvement all the time more than the language model method without expanding. Compared to the popular approach of query expansion, pseudo feedback, the proposed method has the competed average precision.

Select  |    Cite this article 
Que Xiao-feng;Nie Zai-ping;Hu Jun
Analysis of Antennas Mounted on Complex Platforms Using MLFMA
2008 Vol. 30 (3): 730-733 [Abstract] ( 2269 ) [PDF 272KB] ( 1058 )    DOI: 10.3724/SP.J.1146.2006.01271

Wire antennas mounted on complex platform combined with conducting and dielectric objects are analyzed in this paper. EFIE-PMCHW boundary coupled integral equations are constructed by using equivalence principle. The surface, wire and junction basis functions are defined to simulate the current distribution on the complex structure and the selection of the basis functions on the boundary of the conducting/dielectric interface is analyzed. Multi-Level Fast Multipole Algorithm (MLFMA) is employed to accelerate the matrix-vector multiplication and solve the loss problem. Application of MLFMA increases the ability to solve the large-scale problem. Numerical examples validate this method and demonstrate the accuracy and high efficiency of this method.

Select  |    Cite this article 

Jiao Cheng-peng; He Xiu-lian;Gong Shu-xi


On the Integration Path and Expansion Function of the Discrete Complex Image Method
2008 Vol. 30 (3): 734-737 [Abstract] ( 2528 ) [PDF 214KB] ( 929 )    DOI: 10.3724/SP.J.1146.2007.00394

The integration paths and the expansion functions in two-level DCIM are investigated. Accurate expansion functions are proposed and a novel integration path, which can be used to calculate the spatial Green’s functions of microstrip structure, is presented. The spatial Green’s functions of a five-layer microstrip structure are calculated, and the results show the effectiveness of the proposed method.

Select  |    Cite this article 
Zhang Xia;Tao Hai-hong;Lian Gui-sheng
Pattern Synthesis Method for Arbitrary Arrays
2008 Vol. 30 (3): 738-741 [Abstract] ( 2208 ) [PDF 286KB] ( 1253 )    DOI: 10.3724/SP.J.1146.2006.01910

A novel pattern synthesis algorithm based on optimization theory is presented in the paper. The algorithm initializes with the set of weights which is used to maintain the desired mainlobe with phase-independent derivative constraints, then the residual weight vector is optimized to acquire the desired sidelobe, the influence of the residual weight on the mainlobe will be confined to a certain bound. Object function can be considered as the Second-Order Cone Programming(SOCP). Compared with the existing pattern synthesis algorithms which synthesize the array patterns with both desired magnitude and phase response, the proposed algorithm which synthesizes the array patterns with only desired magnitude response, can efficiently work and is unrelated to the reference point. Computer simulations on some arbitrary arrays demonstrate the effectiveness and validity of the proposed algorithm.

Select  |    Cite this article 
Chai Shun-lian;Wang Sheng-shui;Chen Zhong-kuan;Mao Jun-jie
Solution of the Boundary Integral Equation in Time Domain Based on the Laguerre Polynomials
2008 Vol. 30 (3): 742-745 [Abstract] ( 2772 ) [PDF 233KB] ( 1019 )    DOI: 10.3724/SP.J.1146.2006.01292

In order to eliminate the late-time-oscillate in time domain integral equation, EFIE, MFIE and CFIE which based on the method of MOD using Laguerre polynomials as temporal basis function were introduced, induced current distributing and backward scattering of far field in time domain and monostatic RCS of a conducting sphere and a cylinder were given. The results showed that they eliminate the late-time-oscillate effectively and the CFIE has higher precision than the other two.

Select  |    Cite this article 
Xu Zhong-qiang;Zhu Xiu-chang
Super-Resolution Reconstruction of Compressed Video Based on Noise Distribution Property
2008 Vol. 30 (3): 752-755 [Abstract] ( 2742 ) [PDF 363KB] ( 965 )    DOI: 10.3724/SP.J.1146.2006.01255

This paper models the process of video compression, DCT quantization noise and motion estimation noise with exploiting the quantization step size and motion information embedded in the bit-stream. Together with the additive noise term of imaging, the proposed total noise term adaptively adjusts for different quantizers. With a Huber-Markov Random Field (HMRF) as the prior model, the gradient descent algorithm and MAP super-resolution reconstruction are presented and their performances are also analyzed. Simulation results show that proposed algorithm obtains better objective and subjective performances.

Select  |    Cite this article 
Chai Wen-wen①②; Zhang Xiao-juan
Ultra Wideband Antenna Design Using U-slot
2008 Vol. 30 (3): 756-758 [Abstract] ( 2486 ) [PDF 228KB] ( 1480 )    DOI: 10.3724/SP.J.1146.2006.01351

A new antenna array consisting of U-slot microstrip patches is introduced. The array is fed by a novel wideband matching network and the energy is coupled to the U-slot patches through the feed slot on the ground. The operating frequency range of antenna array is from 10.4 to 16.7GHz, corresponding to an impedance bandwidth of 46.5%. The gain is above 13dBi from 11-15GHz.

Select  |    Cite this article 
Sun De-fu;Tang You-xi;Shao Shi-hai;Li Shao-qian
Differential Space Time Modulation with Distributed Transmit Antennas
2008 Vol. 30 (3): 759-762 [Abstract] ( 2381 ) [PDF 272KB] ( 895 )    DOI: 10.3724/SP.J.1146.2006.01211

It is difficult to estimate channel knowledge in multiple input multiple output system which based on distributed antenna structure because the transmit signals are received asynchronously. Aiming at this matter, a differential encoding and detection scheme is proposed where channel estimation is not needed. The proposed scheme has the same spectral efficiency as V-BLAST scheme and can be applied to any number of transmit antenna and receive antenna, besides the number of receive antenna can be less than transmit antenna. The simulation results show that the BER performance is different corresponding to different channel propagation delay.

Reviews
Select  |    Cite this article 
Wei Jing-zhi;Yang Yi-xian;Niu Xin-xin
Overview of Study on the Technical Architecture of OMA DRM
2008 Vol. 30 (3): 746-751 [Abstract] ( 3423 ) [PDF 282KB] ( 2173 )    DOI: 10.3724/SP.J.1146.2006.01680

In order to have a thorough understanding of the technical architecture of OMA DRM specification, and to actively promote creation of the Chinese DRM standard and application research of digital content protection technology, a systematic approach of OMA DRM is presented. The following functions of the latest release of OMA DRM2.0 are analyzed: rights object acquisition protocol, security model, architecture, content format and rights expression language. Then, these features are synthesized to present a complete working mechanism of OMA DRM: working flow and principle of OMA DRM. Finally, the capabilities of the latest release are analyzed by presenting the main difference between OMA DRM2.0 and OMA DRM1.0, and the limitations of OMA DRM2.0.

电子与信息学报
Author Center
Online Submission
Author Instruction
FAQ
Template
Copyright Agreement
MSN:je-jeit@hotmail.com
Links
More>>  
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech