电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Quick Search  
  Advanced Search
2007 Vol.29 No.4, Published: 19 April 2007
Articles |
 
 
Articles
Select  |    Cite this article 
Hu Hai-feng; Yang Zhen
Study of Mobile-Agent-Based Information-Driven Multiresolution Algorithm in Wireless Sensor Networks
2007 Vol. 29 (4): 763-766 [Abstract] ( 2412 ) [PDF 255KB] ( 2590 )    DOI: 10.3724/SP.J.1146.2006.00110

in this paper, Mobile-Agent-based Information-Driven Multiresolution Algorithm (MAIDM) is presented for Target Tracking in Wireless Sensor Networks(WSN), in order to provide better accuracy and degree of fault tolerance while meeting the energy requirement. In a clustered-based wireless sensor networks,mobile agent is used to process data of nodes with multiresolution algorithm according to information contribution of different nodes,and the size of mobile agent is determined by the maximum value of the information contribution along the path of mobile agent. A balance has to be struck between the energy efficiency object and fault tolerance/accuracy object. Simulation results show that MAIDM performs better than IDSQ from perspectives of fault tolerance and accuracy, MAIDM ‘s energy-efficient performance is better than MA-CSIP.

Select  |    Cite this article 
Qu Yu-gui; Lin Zhi-ting; Zhao Bao-hua
WPCS Coverage Strategy for Wireless Sensor Network
2007 Vol. 29 (4): 767-770 [Abstract] ( 2234 ) [PDF 267KB] ( 2472 )    DOI: 10.3724/SP.J.1146.2005.01106

An effective approach for extending wireless sensor network lifetime is scheduling sleep intervals for extraneous nodes. But most of the existing coverage protocols are based on the circular sensing module. So, how to combine consideration of coverage and connectivity maintenance in a single activity scheduling is discussed in this paper, when the sensing module is not circular. The Well-Proportioned Coverage Strategy (WPCS) is presented which extends the lifetime of sensor network by minimizing the overlap area. Simulations show that WPCS outperforms Coverage Configuration Protocol (CCP) and is suitable for various situations. It effectively reduces the number of activity nodes and extends the lifetime of sensor network.

Select  |    Cite this article 
Zhang Xin; Chang Yi-lin; Sun Fang-tao; Shen Zhong
A Fault Monitoring Algorithm for Hierarchical Network
2007 Vol. 29 (4): 771-775 [Abstract] ( 2363 ) [PDF 274KB] ( 835 )    DOI: 10.3724/SP.J.1146.2005.01091

One mission of network management is to monitor the network effectively. The monitoring methods in Simple Networks Management Protocol (SNMP) are polling and trap. Both of them consume the system resources and network bandwidth. Based on the hierarchical network architecture, a dynamic monitoring algorithm is proposed so as to minimize the management overhead. By analyzing the probability of the alarm occurrence with the sampled network information, the proposed algorithm prolongs the interval between two consecutive polling when no alarm could occur. It also reduces the redundant alarm information resulted from the signal fluctuation. This method significantly reduces the amount of monitoring traffic and guarantees to detect the abnormal event. The simulation results show that the proposed monitoring scheme reduces both the number of polling and the cost of the network management, consequently improves the network performance.

Select  |    Cite this article 
Wang Kun; Yin Zhong-hai; Zhou Li-hua; Cai Zhen
Study on Information System Disaster Recovery Planning
2007 Vol. 29 (4): 776-780 [Abstract] ( 2692 ) [PDF 248KB] ( 1341 )    DOI: 10.3724/SP.J.1146.2005.01684

When disaster happens, it is necessary use quantitive and accurate method to select the best set from many sub disaster recovery plans to control the disaster recovery activities. This paper presents a practicable mathematical model using optimization theory. The model contains some parameters that stand for different applications, facilities, resources, sub plans, budget, etc. The model classifies resources and solves the conflicts among various sub disaster recovery plans. With less subjective parameter, the model can evaluate DRP more impersonally. The model possesses less parameter and can be easily implemented to analyze DRP accurately and quantitatively. The implementation and the analysis of the model are presented. Test also verifies the correctness of this model.

Select  |    Cite this article 
Lü Xin-yan; Zhao Bao-hua; Qu Yu-gui
Analysis of Conformance Test Reliability Based on Formal Specification
2007 Vol. 29 (4): 781-784 [Abstract] ( 2577 ) [PDF 266KB] ( 967 )    DOI: 10.3724/SP.J.1146.2005.01105

Many description languages can be used by the formal specification, but there is a uniform method which can perform the conformance test under the formal specification. Adopting a statistical method, this paper analyses the conformance test reliability based on the formal specification, then it will give the confidence interval for the reliability and especially point out the conditions which can affect the reliability under ‘zero-error’.

Select  |    Cite this article 
Yang Fan; Liu Zeng-ji; Qiu Zhi-liang; Liu Huan-feng
A Fair Round Robin Scheduling Algorithm with Low Latency
2007 Vol. 29 (4): 785-788 [Abstract] ( 2473 ) [PDF 280KB] ( 1175 )    DOI: 10.3724/SP.J.1146.2006.00152

A new round robin scheduling algorithm named LFRR(Large weight First Round Robin) is proposed in this paper. In order to achieve good delay property and low implementation complexity, several methods are taken in LFRR. Firstly, when slots are allocated for flows in the schedule table, LFRR refers to the ideal situation where the slots of each flow are uniformly distributed in the schedule table to prevent flows’ slots from appearing too early or too late. Secondly, in LFRR system flows which weights are the same and larger than 1 are aggregated into a virtual flow. LFRR deals with virtual flows instead of actual flows. This deceases the flow number that scheduling algorithm deals with. Thirdly, when a slot can be allocated to several virtual flows, flows with larger weight have high priority to posses this slot. Theoretical and simulation results show the delay property of LFRR is much better than that of WRR(Weighted Round Robin) and the fairness of LFRR can be guaranteed.

Select  |    Cite this article 
Wu Xiao-rong; He Ming-yi; Zhang Yi-fan
Vector Fusion of Multispectral Images Based on Multiwavelet Decomposition
2007 Vol. 29 (4): 789-794 [Abstract] ( 2541 ) [PDF 654KB] ( 1019 )    DOI: 10.3724/SP.J.1146.2005.01127

In the real domain, the finitely supported, orthogonal, symmetric nontrivial scalar wavelet bases do not exist, while the multiwavelet offers the finite support, symmetry, orthogonality simultaneously. As a result, the wavelet theory is extended to vector field. Considering vector characteristics provided by the coefficients of the multiwavelet transformed image, pixel-based and region-based scalar fusion schemes are extended to vector case and a novel fusion algorithm is also proposed in this paper. The new algorithm is based on vector fusion scheme in multiwavelet domain, which makes sufficient use of the correlation among the components of multiwavelet transform coefficient vectors to improve fusion quality. The original algorithm is carried out with emphases on the novelty of the fusion algorithm and the demonstration by using real multispectral image compared with algorithms employing wavelet scalar fusion scheme. The experimental results demonstrate that the proposed multiwavelet vector fusion algorithm can obtain both better subjective vision characteristics and better objective evaluation indices and outperform the wavelet scalar fusion scheme. Accordingly it is testified that when applied in image fusion, multiwavelet is more suitable than wavelet to human vision system and it is of great potential to wide applications.

Select  |    Cite this article 
Zhao Shan; Cui Jiang-tao; Zhou Li-hua
Image Retrieval Based on Bit-plane Distribution Entropy
2007 Vol. 29 (4): 795-799 [Abstract] ( 2781 ) [PDF 988KB] ( 1291 )    DOI: 10.3724/SP.J.1146.2006.00009

The content-based image retrieval on histogram is analyzed and a novel image retrieval algorithm is proposed based on bit-plane distribution entropy. Firstly, the image is divided into eight bit-planes by the image bit-plane-code. Then, an entropy vector is constructed by computing the entropy of the four significant planes which contain most of the structural information of the image. Meantime, the gray-code of bit-planes is used to avoid the effect of changes in the image intensity values on bit-planes. Finally the Mahalanobis distance is adopted to measure the similarity because of the correlation between the concerned vectors after designing the correlation-weighted matrix. Experimental results show that the proposed method has sound retrieval performance.

Select  |    Cite this article 
Ji Zhen-hai; Sun Ning; Zou Cai-rong; Zhao Li
Face Alignment Based on Weighted Active Shape Models
2007 Vol. 29 (4): 800-803 [Abstract] ( 2334 ) [PDF 415KB] ( 1464 )    DOI: 10.3724/SP.J.1146.2005.01674

Active Shape Models (ASM) is one of powerful tools for face alignment and face recognition. However, the performance of ASM is often influenced by some factors such as the initial location, illumination and so on, which will frequently lead to the local minima in optimization. This paper proposes a weighted Active Shape Models, in which the more robust local appearance model is constructed with the local information of each landmark fully. Through the improved method the local minima problem can be solved efficiently, extracted the detailed local information of face feature points and localized the points accurately. Experiments verify the above conclusions.

Select  |    Cite this article 
Ding Ai-ling; Shi Guang-ming; Zhang Ning; Jiao Li-cheng
Signal Compression and Design of Wavelet Based on Waveform Matching
2007 Vol. 29 (4): 804-807 [Abstract] ( 2294 ) [PDF 267KB] ( 2645 )    DOI: 10.3724/SP.J.1146.2006.00477

Wavelet transform is widely used in data compression. How to choice the best wavelet base is a key point for improving the compression ratio. In ths paper, a idea of using wavelet base functions matching to signal which need to be compressed is put forward. A waveform matching criteria for contructing matche wavelets, which it used to compress the one-dimension signal, is given. The wavelet filter is constructed with an structuring filter banks and the criteria,and an example of compressing a one-dimension signal is presented. Compared with other wavelet filters, the matched wavelet filter is able to improve the performance of signal compression.

Select  |    Cite this article 
Hou Shu-min; Li You-rong; Liu Guang-ling
A New Method of Detecting Nonlinear for Time Series Based on KS Test
2007 Vol. 29 (4): 808-810 [Abstract] ( 2818 ) [PDF 202KB] ( 3426 )    DOI: 10.3724/SP.J.1146.2005.00998

The choice of test statistics can bring important influence to nonlinear of time series. This paper introduces a Non-parameter test——Kolmogorov-Smirnov (KS) test into nonlinearity test. After applying the Phase-randomized surrogate algorithm to create surrogate data, three test statistics methods, which include KS test, the third-order autocovariance and the asymmetry due to time reversal, are employed to determine nonlinear of five kinds signals. By comparing the test results, it indicates that KS test is an effective and stable nonlinear test statistics. The proposed method has high noise immunity and more sensitive to nonlinear signal.

Select  |    Cite this article 
Xiong Bo; Li Guo-lin; Hu Min
Identification of m-Sequence for BPSK Fuse Signal Based on Phase-Difference Method
2007 Vol. 29 (4): 811-814 [Abstract] ( 2386 ) [PDF 273KB] ( 1109 )    DOI: 10.3724/SP.J.1146.2005.00706

According to one-to-one relationship of the Binary-Phase-Shift-Keying (BPSK) fuse signal’s pulse-phase difference and the m-sequence, the m-sequence can be obtained by solving the phase-difference equations. First, the pulse phase is measured by FFT. Then, first-order phase difference method and second-order phase difference method separately are applied to identify the m-sequence. The computer simulation proves the method to be completely correct. Finally, the reliability of the method is analyzed to find that, even if any Pseudo Noise (PN) code is mistakenly identified because of large measuring error of the corresponding pulse phase, it has no influence on identification of the later codes. This indicates that the method has high reliability.

Select  |    Cite this article 
Chen Hang-yong; Liu Yong-xiang; Li Xiang; Guo Gui-rong
Phase Cancellation for Synthesizing Range Profiles of a Moving Target via Stepped Frequency Signal
2007 Vol. 29 (4): 815-818 [Abstract] ( 2349 ) [PDF 276KB] ( 1039 )    DOI: 10.3724/SP.J.1146.2005.01139

In this paper, a new method is explored for synthesizing range profile of a moving target via stepped frequency signal. The principle of synthesizing range profile of an extended target is investigated for stepped frequency signal. The distortion of synthetic range profiles is discussed with the theory of Discrete Fourier Transform (DFT). Based on phase cancellation, a new technology is proposed to achieve range profile with out distortion for a moving target. The new technology does not need the estimation of the velocity. The result of emulation proves the effect of the method.

Select  |    Cite this article 
Chen Hong-yan; Fu Yu-sheng; Zhang Rui; Pi Yi-ming
Speckle Reduction of Polarimetric SAR Image Based on ICA-SCS Algorithm
2007 Vol. 29 (4): 819-821 [Abstract] ( 2748 ) [PDF 454KB] ( 1225 )    DOI: 10.3724/SP.J.1146.2005.00716

In this paper, a novel method of sparse coding shrinkage based on independent component analysis is proposed to reduce speckle in polarimetric SAR Images. With soft-thresholding operator on polarimetric SAR image, this method reduces speckle effectively and preserves polarimetric properties. The experiment shows that the image edges are retained with the method and the speckle is removed effectively.

Select  |    Cite this article 
Kang Xin; Han Chong-zhao; Xu Feng; Wang Ying-hua
Unsupervised Classification of Polarimetric SAR Image Using Deorientation Theory and Complex Wishart Distribution
2007 Vol. 29 (4): 822-826 [Abstract] ( 2914 ) [PDF 571KB] ( 1270 )    DOI: 10.3724/SP.J.1146.2006.00416

Scatter targets of complex terrain surfaces with random orientation product random fluctuating echoes. This leads to a confused classification by directly using target decomposition on full polarimetric SAR (PolSAR) image. To solve this problem, a new unsupervised classification method is proposed in this paper. Firstly, the target vector is transformed to the state with minimization of cross-polarization (min-x-pol); then the parameters u/v/H are used to characterized scattering mechanism, and the fuzzy membership is adopted instead of "hard" division of parameter plan; finally, characterizing the coherency matrix as multivariable complex Wishart distribution, the polarimetric SAR image is classified based on Bayes maximum likelihood criteria. Experiment is performed on a L-band NASA/JPL SIR-C polarimetric SAR image over Danshui town, Guangdong, P.R. China. Furthermore, the movements of the clustering centers are discussed. Compared with the k-mean like method based on H/α, the results show that the proposed method provides a significant performance improvement in classification result and the associated scattering mechanism of class is more accurate. The classification result is beneficial for automatic recognition of terrain type.

Select  |    Cite this article 
Xiu Zhi-jie; Chen Jie; Fang Guang-you; Li Fang
Ground Penetrating Radar Imaging Based on F-K Migration and Minimum Entropy Method
2007 Vol. 29 (4): 827-830 [Abstract] ( 2767 ) [PDF 348KB] ( 1189 )    DOI: 10.3724/SP.J.1146.2005.01200

Estimation of position and shape of the object subsurface is one of the main problems in Ground Penetrating Radar(GPR) application. Migration method in domain of seismic techniques is effective to locate and reshape the object. The electromagnetic wave velocity parameter is the main factor influencing the precision of location. In this paper, the GPR images are handled with frequency-wavenumber migration on the base of applying minimum entropy method to estimate velocity parameter. Experimental results of simulation and GPR data prove its feasibility and validity.

Select  |    Cite this article 
Zeng Bin; Zhang Xiao-ling; Shi Jun; Huang Shun-ji
The Influence of PRF Error to Velocity Measurement in Distributed SAR
2007 Vol. 29 (4): 831-835 [Abstract] ( 2261 ) [PDF 402KB] ( 729 )    DOI: 10.3724/SP.J.1146.2005.01197

Distributed SAR system adopts the flight model which receivers and transmitter are in different platform, that has many prominent merits, but the receiver and transmitter’s PRF can have error. The paper bases on the principle of bistatic SAR, establishes the influence model of the PRF error to imaging and interferometry, analyzes the influence of the PRF error to interferometric phase, and proposes the PRF precision request in this foundation. The simulation enunciates the validity of the model and the reasonableness of the PRF precision requirement.

Select  |    Cite this article 
Zhang Rong-quan; Huang Yu-lin; Yang Jian-yu
Ambiguity Function and Resolution Characteristic of Bistatic Linear FMCW Radar Signal
2007 Vol. 29 (4): 836-840 [Abstract] ( 3110 ) [PDF 313KB] ( 1189 )    DOI: 10.3724/SP.J.1146.2005.01171

Based on the special geometrical configuration of bistatic radar and linear Frequency Modulation Continuous Ware (FMCW)principle, the ambiguity function of bistatic linear FMCW radar is derived in detail in this paper, and it is showed that the shape of ambiguity function is affected by the position of target. Furthermore, the expression of range resolution, velocity resolution and range-velocity coupling slope derived from the bistatic linear FMCW ambiguity function are the function with respect to the bistatic angle, so, the resolution characteristic has the relationship with the position of target. The conclusion of this paper can be used in the signal processing and waveform design of bistatic linear FMCW radar system.

Select  |    Cite this article 
Wu Yuan-bin
Wideband Low-IF Topologies for Radar System
2007 Vol. 29 (4): 841-845 [Abstract] ( 2274 ) [PDF 245KB] ( 1019 )    DOI: 10.3724/SP.J.1146.2005.01141

Micromation,modularization and digitization are the trends of modern radar receivers. This paper presents a novel wideband low-IF receiver topologies suitable for fully integration. Its architecture is very simple, and can attain very good performance. Also a design example of wideband low-IF radar receiver application in L-band radar is put forth.

Select  |    Cite this article 
Wu Nan; Feng Da-zheng; Liu Bao-quan
A Phase Unwrapping Approach Based on the Branch-Cut Method and Finite Element Method for Interferometric SAR
2007 Vol. 29 (4): 846-850 [Abstract] ( 2847 ) [PDF 477KB] ( 1304 )    DOI: 10.3724/SP.J.1146.2005.01119

A two-dimensional phase unwrapping approach is proposed using the branch-cut method and finite element method. Different strategies are taken for different quality data regions: first, using the “congruence” characteristic of the branch-cut method, the unwrapped phases can be retrieved in the reliable region with the largest area; then with good boundary values provided, the remaining regions are unwrapped with the finite element method (FEM) in a least square sense. Experimental results, carried out on simulated and real data, show that the proposed approach overcomes the drawbacks of the branch-cut method and FEM, i.e., the “half-baked” solution and phase slope underestimation, respectively, and has an advantage over other approaches in accuracy.

Select  |    Cite this article 
Zuo Yan-jun; Yang Ru-liang
Distributed Micro-satellites SAR Orbit Design and Ambiguity Function Analysis
2007 Vol. 29 (4): 851-854 [Abstract] ( 2187 ) [PDF 324KB] ( 864 )    DOI: 10.3724/SP.J.1146.2005.01158

sing on satellite trajectories, the formula of formation flying orbit elements is derived. The imaging geometric model of distributed satellites SAR is presented and the ambiguity function of distributed satellites SAR is analyzed. Moreover, a design example of the space circular formation flying is given. According to the design result, the ambiguity function simulations of distributed satellites SAR with different formation configurations and different satellites are developed. The relation between satellites formation configurations, number and ambiguity function is studied, and it is theory basis of following imaging algorithm research.

Select  |    Cite this article 
Chen De-yuan; Tu Guo-fang
A New Algorithm of Ship Targets Detection in SAR Images Using Wavelet Transform
2007 Vol. 29 (4): 855-858 [Abstract] ( 2518 ) [PDF 426KB] ( 1087 )    DOI: 10.3724/SP.J.1146.2005.01089

Using the local nature of wavelet transform and Teager energy operator (TEO), a novel scheme is proposed to detect ship targets in SAR images based on TEO wavelet enhancement. The algorithm applies wavelet transform to SAR image and computes the Teager energy of every wavelet coefficient of the high frequency components. According to the property of the Teager energy which enhances the ship signals of SAR image, two-parameter Constant False Alarm Rate(CFAR) detection algorithm is applied to the enhanced SAR image to detect ship targets. The simulating results show that the new detector improves detection performance comparing with the two-parameter CFAR detector and the cell average detection based on K-distribution.

Select  |    Cite this article 
Wang Na; Li Xia
A New Dual v Support Vector Machine Based on Class-Weighted
2007 Vol. 29 (4): 859-862 [Abstract] ( 2222 ) [PDF 249KB] ( 1144 )    DOI: 10.3724/SP.J.1146.2005.01008

A new class-Weighted Dual v-SVM, termed as WD v-SVM, is proposed and Karush-Kuhn Tucker condition (KKT) is derived for it. The dual parameters v+ and v- are analyzed theoretically, and it is deduced that they represent the upper and the lower bound for the percentage of bounded support vectors and the support vectors in the weighted positive or negative class respectively, which is similar to their counterparts in v-SVM. Therefore, the classification performance of small sample class is improved through adjusting its class weight. Experimental results show that the WD v-SVM not only keeps the advantages of v-SVM, but also solves the problem of larger classification error rate of small sample class.

Select  |    Cite this article 
Chen Guo-ming; Zhao Li; Zou Cai-rong
Speech Enhancement Based on Masking Properties and Short-Time Spectral Amplitude Estimation
2007 Vol. 29 (4): 863-866 [Abstract] ( 2530 ) [PDF 346KB] ( 1237 )    DOI: 10.3724/SP.J.1146.2005.01338

In this paper a single channel speech enhancement method for noisy speech signals is proposed, which is based on masking properties of the human auditory system and power spectral density estimation. During the estimation of power spectrum of the speech, the estimator can be modified by the MMSE method and the estimator of short -time spectral amplitude filter is determined by masking properties. In this way, the best trade off among the reduction of noise, the speech distortion and the level of musical residual noise can be found. Experimental results demonstrate the improved performance of the proposed algorithms.

Select  |    Cite this article 
Wang Zuo-ying; Sun Jian
The Inhomogeneous HMM with General Topological Structure and Its Application in Language Identification between Mandarin and English
2007 Vol. 29 (4): 867-869 [Abstract] ( 2388 ) [PDF 222KB] ( 1327 )    DOI: 10.3724/SP.J.1146.2005.01128

In order to use duration information in Language IDentification (LID) efficiently, the inhomogeneous Hidden Markov Model (HMM) with general topological structure is proposed, and is used to identify the language between Mandarin and English also. Because the inhomogeneous HMM with general topologic structure not only describes the duration of state more accurately than HMM, but also uses the structure information of specific language phonetics more effectively, the LID system based on the inhomogeneous HMM with general topological structure has better performance than the homogeneous HMM. For the LID system based on inhomogeneous HMM with different duration distribution, the norm distribution has better performance than the uniform distribution, it shows that the state duration is an important cue for language identification and the norm distribution can model the duration more accurately than the uniform distribution.

Select  |    Cite this article 
Zhan Jin-long; Liao Gui-sheng; Li Yong-zhao
A Novel Grouping Method for LDSTBC+OFDM
2007 Vol. 29 (4): 870-874 [Abstract] ( 2125 ) [PDF 317KB] ( 822 )    DOI: 10.3724/SP.J.1146.2005.00858

A novel grouping method is proposed for LDSTBC(Layered Differential Space-Time Block Code) over frequency selective channels, relying on mutual orthogonality between subcarriers of different users in OFDMA(Orthogonal Frequency-Division Multiple Access) systems. At the transmitter, LDSTBC combined with OFDM is applied . At the receiver, the group suppression based on subcarrier selection matrices is used, then the traditional decoding method for DSTBC is used for each layer. Compared with SVD the improved approach only needs one receive antenna so the complexity of the receiver decreases remarkably. Simulation results show that the performance of the improved method is better than the one based on SVD.

Select  |    Cite this article 
Xu Zhang-sheng; Zhu Jin-kang
A Novel Distributed Turbo Coding Structure Based on Base Station Cooperation
2007 Vol. 29 (4): 875-879 [Abstract] ( 2241 ) [PDF 338KB] ( 939 )    DOI: 10.3724/SP.J.1146.2005.01194

A Distributed Turbo Coding (DTC) structure based on Base Station (BS) cooperation is proposed in this paper. By transmitting the data after coding through several different BS, The spatial diversity gain can be obtained at the same bandwidth efficiency, thus the communication quality of the user can be enhanced in cell boundary. Because the resources are allocated among several cell range, distributed coding structure also can improve the resource alloc success probability of the users in heavy cell. Based on the DTC structure proposed in this paper, five different realizable schemes are given, and their BER performance and resource alloc success probability are analyzed in asymmetric AWGN channel. The coding structure and realizable schemes given in this paper can also be applied to multiple BS system and distributed BS system.

Select  |    Cite this article 
Yu Fei; Yang Lü-xi
A New Pre-coding Scheme Based on Maximum of Carrier-to-Interference Ration for OFDM Systems
2007 Vol. 29 (4): 880-883 [Abstract] ( 2483 ) [PDF 244KB] ( 906 )    DOI: 10.3724/SP.J.1146.2005.01190

Orthogonal Frequency Division Multiplexing (OFDM) systems is very sensitive to frequency errors. An easy pre-coding scheme with rate 1/2 can reduce this sensitivity to frequency offset and compress the inter-carrier interference. A new pre-coding scheme based on the maximum of carrier-to-interference is proposed in this article. It can efficiently find the pre-coding parameter with known frequency offset. The simulation results shown that the new pre-coding scheme can outperform the traditional one.

Select  |    Cite this article 
Lei Wei-jia; Li Xiang-ming; Li Guang-jun
Design of LDPC Codes over GF(q) for Bandwidth Efficient Transmission
2007 Vol. 29 (4): 884-887 [Abstract] ( 2364 ) [PDF 284KB] ( 1171 )    DOI: 10.3724/SP.J.1146.2005.01121

Optimization of binary LDPC (Low-Density Parity-Check) codes for application to binary PSK modulation has been demonstrated in the literature, on the basis of Monte-Carlo method proposed by Davey(1998). The lack of rotational symmetry in a generic q-ary signal constellation, however, limits the application of Davey’s method. This paper proposes an efficient Davey-type Monte Carlo technique for code optimization within the category of quasi-regular codes, so that one can directly combine the optimized LDPC code over GF(q) with arbitrary q-ary modulation to achieve bandwidth efficiency in transmission. The validity of the proposed design procedure is illustrated through examples combining quasi-regular LDPC codes with MQAM and MPSK signaling schemes.

Select  |    Cite this article 
Xu Chun-xia; Chen Wei-hong
An Algorithm to Determine the Annihilators of Boolean Function and a Class of Invariants of Algebraic Attacks
2007 Vol. 29 (4): 888-891 [Abstract] ( 2399 ) [PDF 255KB] ( 817 )    DOI: 10.3724/SP.J.1146.2005.01134

In this paper, a new algorithm to construct the annihilators of Boolean function is introduced, and using the feature matrix of Boolean function, a method to judge whether a Boolean function has low degree annihilators is presented. Then, by studying the algebraic immunities of (5,1,3,12) rotation symmetric saturated best functions and a type of constructed functions, a class of functions are proved to be invariants of algebraic attacks, and this property is generalized in the end.

Select  |    Cite this article 
Liu Yong-liang; Gao Wen; Yao Hong-xun; Huang Tie-jun
Security on ID-Based Key Agreement for Multimedia Encryption
2007 Vol. 29 (4): 892-894 [Abstract] ( 2486 ) [PDF 236KB] ( 814 )    DOI: 10.3724/SP.J.1146.2005.01076

Recently, Yi et al..(2002) proposed an ID-based key agreement protocol for multimedia encryption. The protocol was built on both the Diffie-Hellman key exchange protocol and the RSA public key cryptosystem. Yi et al. analyzed the security of the protocol, and understood that the protocol is robust to the malicious attacks. However, this paper shows that the protocol is vulnerable to certain malicious attacks such as forging secret information and tampering exchanging messages and analyzes the reasons that the protocol suffers these attacks. This paper points out that it may be hard to improve the protocol due to the inherent flaw of the protocol.

Select  |    Cite this article 
Pang Liao-jun; Tan Shi-chong; Wang Yu-min
A (t, n) Threshold Digital Signature Scheme with Ability to Identify Cheaters
2007 Vol. 29 (4): 895-897 [Abstract] ( 2404 ) [PDF 257KB] ( 907 )    DOI: 10.3724/SP.J.1146.2005.01086

Based on the security mechanism of the discrete logarithm, an ElGamal-like (t, n) threshold digital signature scheme with ability to identify cheaters is proposed in this paper. In the key generation phase, each participant’s public and private keys, and the group public key are negotiated among all the participants with no trusted party required. In the signature generation phase, no secure communication is needed between any two participants. This scheme provides the capability of detecting cheating and identifying the cheater that may be from the internal legal participants or the external attackers. The security of this scheme is based on the difficulty of solving the discrete logarithm problem. Analyses show that this scheme is a computationally secure and efficient scheme.

Select  |    Cite this article 
Chen Shuai; Zhong Xian-xin; Shi Jun-feng; Zhu Shi-yong
Image Encryption through Discrete Digital Chaotic Sequence
2007 Vol. 29 (4): 898-900 [Abstract] ( 2431 ) [PDF 422KB] ( 1172 )    DOI: 10.3724/SP.J.1146.2005.01054

Study a new formula for amplitude discrete chaotic sequence to encrypt images under hardware devices conveniently from Logistic mapping formula for continuous amplitude, and generate a longer period sequences by exclusive OR algorithm with three amplitude discrete digital chaotic sequence in different periods. The image is encrypted by exclusive OR algorithm with the longer period image encrypting sequence and original image. The method is sensitive to initial values through simulation of encrypting and decrypting image. The result shows that the manner to generate amplitude discrete chaotic sequence is simple and more secure for information security, more convenient for hardware to encrypt images.

Select  |    Cite this article 
Wen Jing-Hua; Li Xiang; Zhang Huan-guo; Liang Min; Zhang Mei
Formal Analysis of Fair E-Commerce Protocols Based on ATL
2007 Vol. 29 (4): 901-905 [Abstract] ( 2628 ) [PDF 274KB] ( 1374 )    DOI: 10.3724/SP.J.1146.2005.01088

Aiming at the shortcoming that traditional temporal logic such as LTL,CTL and CTL* regards protocols as close system to analyze, Dr Kremer(2003) proposes an ATL(Alternating-time Temporal Logic) logical method based on game to analyze fair E-commerce protocols, and analyses formally several typical protocols on their fairness and other properties. In this paper, ATL logical and its applications in formal analysis of E-commerce protocols are discussed, and Dr Kremer’ approach is ulteriorly extended to analyze security of protocols besides fairness. Finally, the strict formal analysis is made for ZDB protocol(1999) proposed by Zhou et al. With this new method, as a result there exists 2 possible attacks in the ZDB protocol under non-secrecy channels: leakiness of secret information and reply attacks.

Select  |    Cite this article 
Lei Zheng-xiong; Liao Jian-xin; Zhu Xiao-min
Cache Allocation Algorithm in Batching Stream Transmission Scheme Based Mobile Streaming Media System
2007 Vol. 29 (4): 906-910 [Abstract] ( 2244 ) [PDF 292KB] ( 824 )    DOI: 10.3724/SP.J.1146.2005.00703

In this paper, a proxy-based mobile streaming media system in WCDMA network is introduced. Two metrics, mean network transferring cost and mean playback startup latency of mobile terminals, to evaluate performance of a cache allocation algorithm in proxy are presented. Expressions for corresponding saving and integrated saving of the metrics under Mobile Batcing (MBatching) stream transmission scheme are developed. A cache allocation algorithm that applies to the mobile streaming media system is put forward to make the total integrated saving of all the streaming media program maximal. Simulation results demonstrate that the algorithm can make the total integrated saving larger, save more network transferring cost and achieve higher byte-hit rate than another allocation algorithm.

Select  |    Cite this article 
Jia Peng; Li Jian; Gu Wan-yi
Multicast Routing Based on Genetic Algorithm in Optical Networks
2007 Vol. 29 (4): 911-914 [Abstract] ( 2244 ) [PDF 335KB] ( 1068 )    DOI: 10.3724/SP.J.1146.2005.01100

A genetic algorithm of optimizing the order of arranging multicast services in optical network is proposed. Then the multicast trees are constructed and wavelengths are chosen by the optimized order to minimize the required number of wavelengths and multicast links in optical network. Three routing algorithms and the ameliorative effect of wavelength converters on resource optimization are compared. Simulations in NSFNet show that in sparse splitting network, when the number of multicast capable nodes is half of the number of total nodes, the resource optimization has been acceptable.

Select  |    Cite this article 
Jiang Hong; Zhang Hong-wei
Analysis of Reversal GLR Failure Recovery Algorithm in 3G Mobile Networks
2007 Vol. 29 (4): 915-919 [Abstract] ( 2480 ) [PDF 282KB] ( 915 )    DOI: 10.3724/SP.J.1146.2005.01085

In 3G mobile networks, when the location information of a roaming user in a Gateway Location Register (GLR) is incorrect or obsolete, the location tracking before recovery will fail which severely degrades system performance. Traditional location recovery algorithms needed to occupy a great many long-distance signaling circuit resources. In order to reduce occupation on long-distance signaling circuit and GLR failure recovery interval, a new algorithm, referred to as reversal GLR failure recovery algorithm, is proposed in this paper. The proposed algorithm fully uses corresponding information in Visited Location Register(VLR) to avoid long-distance signaling cost between GLR and Home Location Register(HLR). Through performance analysis, the algorithm is proved to be feasible.

Select  |    Cite this article 
Sun Li-juan; Wang Ru-chuan
Application of Combination of Quantum Computation and Genetic Algorithm to Computer Network Optimization
2007 Vol. 29 (4): 920-923 [Abstract] ( 2346 ) [PDF 297KB] ( 1385 )    DOI: 10.3724/SP.J.1146.2005.01063

The algorithm in this paper is based on the combination of quantum computation and genetic algorithm .The core is that using a qubit representation instead of binary, numeric, or symbolic representations and the dynamic adjusting quantum rotation gate strategy are applied to accelerate convergence. So it has better diversity and global search capacity than the conventional genetic algorithm. The results of solving the optimal problems of communication nets show that the efficiency of the new method is obviously higher than that of the conventional genetic algorithm.

Select  |    Cite this article 
Zhang Tao; Zhang Jun
A Minimum Cost Handover Algorithm for Mobile Satellite Networks
2007 Vol. 29 (4): 924-928 [Abstract] ( 2548 ) [PDF 303KB] ( 993 )    DOI: 10.3724/SP.J.1146.2006.00443

In mobile satellite networks, for the aim of shortening handover delay while using network resource efficiently, a proper handover scheme should be given. In this paper, by introducing the interrupting probability and the cost model of service, triggering schemes for path optimization in handover is given. Here, a novel mobile Satellite networks Minimum Cost Handover (SMCH) algorithm is proposed. This algorithm can assure the Quality of Service (QoS) parameters (such as delay) during the handover, as well as can minimize the handover cost. So it can use the network resource efficiently after the handover. Correlative simulation indicates that this novel algorithm is superior to other current algorithm in respect of guaranteeing the QoS and decreasing handover cost. Besides, it also has more adaptability and more practicability.

Select  |    Cite this article 
Liu Ning-qing; Lu Zhi; Li Xin
A Closed-Loop Distribution Power Control Method Based on Estimator
2007 Vol. 29 (4): 929-932 [Abstract] ( 2372 ) [PDF 251KB] ( 2372 )    DOI: 10.3724/SP.J.1146.2005.01135

This paper investigates the power control used in 3G. Then, presents a closed-loop distribution power control method based on estimator. Firstly the performance of this method is analyzed in theory, and a set of systematic scheme is given. Secondly a system model is established. Finally simulation results show that the convergence speed of this method is fast. The result is a strong ability of tracing wireless channel. So this method possesses a good perspective.

Select  |    Cite this article 
Tang Zhi-hua; Zhu You-tuan; Wei Guo; Zhu Jin-kang
Threshold Setting of Channel Limited Feedback in OFDM System
2007 Vol. 29 (4): 933-937 [Abstract] ( 2540 ) [PDF 252KB] ( 908 )    DOI: 10.3724/SP.J.1146.2005.01080

In this paper, mathematical expression of channel capacity as well as channel capacity loss due to feedback threshold setting are proposed, which is based on research on resource management in downlink multiuser OFDM systems and limited feedback theory. Three threshold setting schemes are proposed, which are from the aspects of feedback outage probability, capacity loss and feedback utility. Numerical results demonstrate that through setting threshold properly, the feedback can be decreased greatly at the cost of little capacity loss, leading to effective application of resource allocation algorithms in downlink multiuser OFDM systems.

Select  |    Cite this article 
Geng Jia; Cao Xiu-ying; Bi Guang-guo
The Proof of the Trace Criterion for Space-Time Trellis Codes in Frequency-Selective Fading Channels
2007 Vol. 29 (4): 938-941 [Abstract] ( 2234 ) [PDF 228KB] ( 628 )    DOI: 10.3724/SP.J.1146.2005.01059

When the product of the numbers of transmit and receive antennas is large, the design criterion for space-time trellis codes is the trace criterion. This criterion is originally designed for flat fading channels only. In this paper, it is proved that the trace criterion also can be used in frequency-selective fading channels. The simulation results show that the good codes according to the trace criterion have better performance than other codes, when the channel fading is frequency-selective.

Select  |    Cite this article 
Deng Dan; Zhu Jin-kang
Transmit Antenna Selection for Linear Dispersion Codes
2007 Vol. 29 (4): 942-945 [Abstract] ( 2205 ) [PDF 263KB] ( 847 )    DOI: 10.3724/SP.J.1146.2005.00980

In an effort to utilize the advantage of using multiple antennas, transmit antenna selection for linear dispersion codes (LDC-TAS) is proposed in this paper. Three criteria are presented: maximum channel gain, maximum capacity and max-min post-SNR, for selecting the optimal transmit antennas when linear, coherent receiver is used over a slowly varying channel. Simulation results suggest that the max-min post-SNR criterion outperforms the other selection methods in a variety of modulation modes, such as QPSK, 8PSK and 16QAM. Compared with BLAST-TAS, under the same spectral efficiency, the proposed scheme shows significant diversity advantage. In low SNR environment, LDC-TAS is still better than STBC-TAS.

Select  |    Cite this article 
Li Yuan-jie; Yang Lu-xi; He Zhen-ya
A First-Order Statistical Clustering Method for Long-Code MIMO CDMA Blind Channel Estimation
2007 Vol. 29 (4): 946-949 [Abstract] ( 2456 ) [PDF 239KB] ( 2373 )    DOI: 10.3724/SP.J.1146.2005.00712

A blind channel estimation method is presented for the Multiple-Input-Multiple-Output (MIMO) CDMA system employing long spreading codes. To estimate channel parameters, a decorrelating matched filter is applied as front-end at the receiver. The matched filter outputs consist of the signal space spanned by the users channel vector and the centers of the sets are extracted by clustering procedure. Then the channel parameters are estimated via the first-order statistics of the filter outputs. The K-mean clustering algorithm is improved in class centers initialization for fast convergence. The proposed method has low computational complexity. Simulation results illustrate the effectiveness of the proposed method and the robustness to channel order overestimation.

Select  |    Cite this article 
Wang Zhi-ying; He Chen
MTP Adaptive Modulation Criterion for MIMO Systems
2007 Vol. 29 (4): 950-953 [Abstract] ( 2309 ) [PDF 257KB] ( 2483 )    DOI: 10.3724/SP.J.1146.2005.00713

In this paper, a novel optimization criterion is presented for Adaptive Modulation (AM) Multi-Input and Multi-Output (MIMO) system, which aims at finding out proper modulation and power allocation parameters to reach the required Quality of Services (QoS), while the overall transmission power is minimized. The closed-form solution under perfect Channel State Information (CSI) and the practical algorithm under imperfect CSI are given. The simulation results show that the proposed criterion is very helpful to make cross-layer optimization by taking the QoS requirements into account much easier.

Select  |    Cite this article 
Du Yan; Zhang Yong-sheng; Wang Xin-zheng
On the LS Channel Estimation of SC-FDE Systems Based on Data Aided Method
2007 Vol. 29 (4): 954-958 [Abstract] ( 2743 ) [PDF 329KB] ( 1214 )    DOI: 10.3724/SP.J.1146.2005.01077

In this paper, the requirements of training sequence for channel estimation in SC-FDE systems are discussed, and the customarily used training sequence for channel estimation in OFDM systems can not be used in SC-FDE systems directly is pointed out. By analyzing, it is concluded that Newmann sequence is very suitable for SC-FDE systems. Without considering the energy lost of CP, the LS estimation performance bound is given. Theoretical analysis and simulation results show that this bound can be achieved by using Newmann sequence.

Select  |    Cite this article 
Guo Yi; Wang Shi-lian; Zhang Er-yang
Study on Open-Loop Adaptive FIR Filter Approach for Interference Suppression
2007 Vol. 29 (4): 959-962 [Abstract] ( 2437 ) [PDF 247KB] ( 1154 )    DOI: 10.3724/SP.J.1146.2005.01182

A new approach for interference suppression in DSSS communication is introduced aim at the shortcomings of the method in transform domain. It combines interference detection in transform domain with interference suppression using open-loop adaptive FIR excision filtering in time domain. The expression of receiver signal-to-noise ratio is derived and it is maximized by adjusting filter coefficients depend on the interference power and its frequency information. The numerical simulation demonstrates that the proposed method is better than FFT method in transform domain in both single-tone and multi-tone interference environment and is effective and efficient to narrowband interferences.

Select  |    Cite this article 
Xia Zhi-zhong; Zhu Li-ping; Lu Xiao-wei
Performance of FFH/BFSK AGC Receiver over a Nakagami-fading Channel with Partial-Band Jamming
2007 Vol. 29 (4): 963-966 [Abstract] ( 2318 ) [PDF 255KB] ( 974 )    DOI: 10.3724/SP.J.1146.2005.01042

The Bit Error Rate (BER) performance of a noncoherent Fast Frequency-Hopped Binary orthogonal Frequency-Shift-Keying (FFH/BFSK) Spread Spectrum (SS) receiver with Adaptive Gain Control (AGC) is investigated in the presence of Partial-Band Jamming (PBJ) and Additive White Gaussian Noise (AWGN) over frequency non-selective slow Nakagami-fading channels. Exact BER expressions in a one fold integral is derived. The effects of arbitrarily values of fading parameter and diversity level on system performance are considered. Numerical results compare the worst case BER performance of the AGC receiver with that of the Product Combining (PC) receiver. Compared with the former BER analysis method,the advantage of this paper lies in the uniform analysis mode so that the analysis of the performance of the system under different fading channels is simply a analysis step。

Select  |    Cite this article 
Chen Yun-peng; Zhang Pei-ren; Sun Yi; Gao Xiu-feng
One Low Complex Reference Picture Selection Optimal Method
2007 Vol. 29 (4): 967-970 [Abstract] ( 2191 ) [PDF 237KB] ( 807 )    DOI: 10.3724/SP.J.1146.2005.01056

Packet loss led to great degradation of picture quality, when video stream transmitted in error-prone channel. RPS (Reference picture selection) could improve picture quality by selecting suitable reference picture, but RPS greatly increased computation complexity. In this paper one low complex RPS optimal method was proposed. First error concealment steps in decoder was tracked in encoder to reconstruct error picture; second only error reconstructed picture and the preceding picture were taken as optional reference pictures; third picture difference variance was computed by linear prediction when processing R-D optimization. Through above means time of motion estimation was reduced, and then computation complexity was greatly decreased. Experiment result shows the method greatly lower encoder’s complexity, while only loss small picture quality.

Select  |    Cite this article 
Lu Guang-yue; Shao Chao; Luo Lin
Peak-to-Average Power Ratio Reduction in Real-Valued OFDM Systems Using PTS Method
2007 Vol. 29 (4): 971-974 [Abstract] ( 2491 ) [PDF 285KB] ( 1102 )    DOI: 10.3724/SP.J.1146.2005.00720

This paper firstly discusses the problem when using Partial Transmit Sequence (PTS) in the Peak-to-Average Power Ratio (PAPR) reduction of real-valued OFDM systems.Secondly, the Adjacent-partition PTS (APTS) and Interleaved-partition PTS (IPTS) are proposed for real-valued OFDM systems. The simulation results confirm the effectiveness of APTS and IPTS in PAPR reduction for real value OFDM systems.

Select  |    Cite this article 
Wang Hai-ming; Hu Wu-jie; Feng Ming-hai
A New Approach to Reduce PAR by Using S-HNN for OFDM System
2007 Vol. 29 (4): 975-978 [Abstract] ( 2398 ) [PDF 269KB] ( 666 )    DOI: 10.3724/SP.J.1146.2005.01093

This paper proposes a new approach to reduce the Peak-to-Average power Ratio(PAR) value of multi-carrier/OFDM with a new kind of adaptive soft feedback Stochastic Hopfield Neural Network (S-HNN). By adopting new neural output function and random state disturbance, the system performance is improved greatly. Furthermore, it can be implemented easily compared to the traditional HNN method. By parameter adjustment, the lowest PAR can be found. So it is an effective and practical algorithm for OFDM system.

Select  |    Cite this article 
Jiang Hui-juan; Tan Xiao; Shen Yue-hong
A Novel Scheme for Space-Time Block Coding with Variable Transmit Diversity Gain in Time-Frequency-Shift Keying Systems
2007 Vol. 29 (4): 979-982 [Abstract] ( 2540 ) [PDF 293KB] ( 937 )    DOI: 10.3724/SP.J.1146.2005.01104

A novel scheme for unitary space-time block coding with variable transmit diversity gain is proposed for TFSK (Time-Frequency-Shift Keying) systems. Each modulated TFSK symbol is divided into two orthogonal sub-symbols, and the new scheme is constructed by differently combining the sub-symbols with the different transmit diversity gain able to be achieved by noncoherent processing at the receivers. The results of computer simulation show that the new scheme has advantage of anti-flat-fading over Alamouti space-time block coding and space-time frequency-shift keying, and ST-TFSK systems with two diversity gain enjoy the superior coding rate and the inferior anti-fading performance to the ones with four diversity gain, which approve the theoretical analysis

Select  |    Cite this article 
Chen Teng-bo; Chen Yi-bo; Jiao Yong-chang;Zhang Fu-shun
Synthesis of the Hexagonal Antenna Array Considering the Mutual Coupling Effects
2007 Vol. 29 (4): 983-986 [Abstract] ( 2760 ) [PDF 281KB] ( 1974 )    DOI: 10.3724/SP.J.1146.2005.00715

This paper investigates a new method for synthesis of the hexagonal antenna array. The local convergence of the nonlinear least-square method is restricted by selecting several initial values, such can achieve the global optimization of the antenna array. According to the elements symmetry distributed in axis, the scattering coeffecient of whole antenna array can be achieved by calculating part of elements, and abase the influence by mutual coupling . Simulation results show the pattern of antenna array approaches the objective pattern in the least square sense.

Select  |    Cite this article 
Chen Ke-song; He Zi-shu; Han Chun-lin
Sidelobe Reduction of Asymmetric Linear Thinned Arrays Using Genetic Algorithm
2007 Vol. 29 (4): 987-990 [Abstract] ( 2422 ) [PDF 284KB] ( 1093 )    DOI: 10.3724/SP.J.1146.2005.00723

This paper presents how to synthesize asymmetric linear arrays using genetic algorithms. The asymmetric configuration is an available degree of freedom to control the characters of thinned arrays. In this paper, the Genetic Algorithms (GA) determines which elements are turned off in a periodic array to yield the lowest maximum Relative SideLobe Level (RSLL). Fitness function of GA for asymmetric linear arrays synthesis is designed. Simulation results show that the optimized asymmetric linear arrays which lack the design constraint of bilateral symmetry can not only obtain lower sidelobes, but also weaken the deterioration of scanning beam if the thinned arrays are made up of the directional elements.

Select  |    Cite this article 
Zhang Hui; Zhang Xiao-fa; Yan Dun-bao; Yuan Nai-chang
Broadband Circularly Polarized H-Shaped Aperture-Coupled Microstrip Patch Antenna
2007 Vol. 29 (4): 991-993 [Abstract] ( 2806 ) [PDF 230KB] ( 2354 )    DOI: 10.3724/SP.J.1146.2005.00710

Design of broadband circularly polarized microstrip patch antenna which is coupled by two H-shaped apertures is presented in this paper. Based upon the proximity coupling feed by the Wilkinson power divider, the proposed antenna can have a standing wave bandwidth of about 47.5% and the axial-ratio value within 3dB is about 50%. The front-to-back ratio of the antenna radiation pattern is better than 21dB, which indicate the realization of the good circularly polarized and low backward radiation level characteristics.

Select  |    Cite this article 
Li Bin; Wu Bian; Liang Chang-hong
A Study on High Gain Circular Waveguide Array Antenna Using Metamaterial Structure
2007 Vol. 29 (4): 994-997 [Abstract] ( 2690 ) [PDF 608KB] ( 989 )    DOI: 10.3724/SP.J.1146.2005.01045

A new method of improving the gain of circular waveguide array antenna is presented in this paper. The electromagnetic characteristics of metamaterial and high-gain circular waveguide antenna with the metamaterial structure are studied by using the numerical simulation method, which are also compared with those of the conventional antenna. The simulation results show that this method is effective and the metamaterial structure can realize congregating the radiation energy, so the gain of the array antenna is increased and the side lobe level is decreased.

Select  |    Cite this article 
Chang Qing; Zhang Bo-chuan; Chen Xiang-dong; Zhang Qi-shan
Study on the Signal Intensity of High Dynamic GPS Signal Simulator
2007 Vol. 29 (4): 998-1001 [Abstract] ( 2809 ) [PDF 208KB] ( 2103 )    DOI: 10.3724/SP.J.1146.2005.01710

According to receiver’s dynamic environment, high dynamic GPS signal simulator can precisely generate GPS signal that the receiver get. GPS signal simulator has many technology request, the intensity of the signal is a key technology in the high dynamic GPS receiver’s research and development. After the GPS signal is demodulated, the Signal Noise Ratio(SNR) of the receiver is analyzed in this paper. On the basis of above, the paper also derives how the signal generated by GPS Signal Simulator reflects truly the GPS signal and outside noise. Experimentation result proves the effectiveness of the method mentioned above.

Select  |    Cite this article 
Zhang Xing; Bai Qiang; Xia Shan-hong; Zheng Feng-jie; Chen Shao-feng
Design and Measurement of a Miniaturized Three Dimensional Electric Field Sensor
2007 Vol. 29 (4): 1002-1004 [Abstract] ( 2494 ) [PDF 234KB] ( 3423 )    DOI: 10.3724/SP.J.1146.2005.01145

Electric field sensors used at present are only capable of measuring one or two dimensional values of electric field intensity. A miniaturized electric field sensor used for measuring three dimensional electric field is introduced, which is composed of axial(Z) and radial(X, Y) electric field measuring units, driving unit and circuit unit. The practicability of the three dimensional electric field sensor is demonstrated, and it is shown that the theoretical prediction and experimental result are in good agreement.

Select  |    Cite this article 
Li Bing; Zheng Jin; Ge Lin-dong
CIC Decimation Filters Based on Polyphase Structure and Partially Sharpening Technique
2007 Vol. 29 (4): 1005-1008 [Abstract] ( 3005 ) [PDF 258KB] ( 1250 )    DOI: 10.3724/SP.J.1146.2005.01126

In this paper an improved solution to the design of Cascaded-Integrator-Comb (CIC) filter is proposed, in which the overall transfer function is factorized to recursive and non-recursive parts. The cascade factors of two parts can be adjusted independently. The sharpening is applied to recursive part to correct the passband droop, and decimation factor is moved prior to the sharpening of recursive part by the use of equivalent transform to operate at a low rate. Polyphase decomposition is applied to non-recursive part to realize high-speed filtering. Computer simulation shows that the modified CIC filter has a frequency response comparable to that of sharpening CIC filters while design flexibility is increased. The effect of the cascade factor of recursive and non-recursive parts on the modified CIC frequency response is discussed in terms of passband droop and alias rejection.

Select  |    Cite this article 
Lv Meng , Fu Yu-Zhuo
A Novel Arithmetic of Circuits Partition Used in Parallel Digital Simulation
2007 Vol. 29 (4): 1009-1012 [Abstract] ( 2487 ) [PDF 275KB] ( 855 )    DOI: 10.3724/SP.J.1146.2005.01061

Parallel simulation techniques are often employed to meet the computational requirements of large hardware simulations in order to reduce simulation time. In addition, partitioning for parallel simulations has been shown to be vital for achieving higher simulation throughput. This paper presents the design and implementation of a new partitioning algorithm based on a multilevel heuristic, also presents the speed up of applying this to a real hardware parallel simulation system Discovery. This algorithm attempts to balance load and reduce the whole simulation network communication to improve performance. The experimental results obtained from the benchmarks indicate that this algorithm yields better partitions than other partitioning algorithms for better simulation performance.

Select  |    Cite this article 
Ren Zhi-jun; Sun Yu-fa
Modeling and Analysis of Vertical Vias in High Speed Printed Circuit Board
2007 Vol. 29 (4): 1013-1016 [Abstract] ( 2311 ) [PDF 307KB] ( 2564 )    DOI: 10.3724/SP.J.1146.2005.01049

Vias are one of the most common interconnection structures used in modern high speed Printed Circuit Board (PCB), which would induce a series of problems such as loss of signal integrity when transmitting signal especially high speed signal. So it is very important that vias are modeled and simulated accurately, speedily, efficiently. The network cascade theory combined with a semi-analytical full wave approach based on Foldy-Lax equation is used to model vias in this paper. In single-layer vertical vias, the Fold-Lax equations of multiple scattering among the cylindrical vias are given. The exciting field coefficients of cylindrical vias are solved. The scattering matrix of coupling among single-layer vias is calculated. By multi-port network cascade theory, the scattering matrix of coupling among multi-layer vertical vias is obtained. The results of scattering matrix are given for 4-layer vertical vias, which show that the method presented in this paper is correct and valid.

电子与信息学报
Author Center
Online Submission
Author Instruction
FAQ
Template
Copyright Agreement
MSN:je-jeit@hotmail.com
Links
More>>  
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech