电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Quick Search  
  Advanced Search
2006 Vol.28 No.5, Published: 19 May 2006
Articles | Reviews |
 
 
Articles
Select  |    Cite this article 
Chen Yuan; Li Le-min
A Random Early Expiration Detection Based Buffer Management Algorithm for Real-Time Traffic over Wireless Networks
2006 Vol. 28 (5): 769-773 [Abstract] ( 2231 ) [PDF 324KB] ( 890 )    DOI:

A random early expiration detection based buffer management algorithm is proposed for real-time traffic over wireless networks. Considering the characters of wireless link such as variable channel condition and transmission error, the algorithm is composed of three steps: aimed to guarantee the delay of retransmission packets, using the method which is similar to early congestion detection to detect expiration and discard packets in advance; adaptive adjusting the drop probability based on the trend of channel condition; re-calculating the threshold value when the link rate is changed. The influence on the TCP performance is also considered in the design. Simulation results show that the system performance is improved through using the proposed algorithm.

Select  |    Cite this article 
Shi Yan; Liu Zeng-ji; Sheng Min
Study of Admission Control Algorithms with Deterministic Delay Guarantees in DiffServ Networks
2006 Vol. 28 (5): 774-779 [Abstract] ( 2103 ) [PDF 259KB] ( 977 )    DOI:

An admission control algorithm with deterministic delay guarantees in DiffServ networks, Service Admission Control in DiffServ (SACiD), is developed in this paper. It can not only prevent the end-to-end delay of admitted services from violating the allowed upper bound, but alalo utilize network resources efficiently. Simulation results indicate that the performance of SACiD is close to that of the similar algorithm in IntServ networks with little memory requirement. Due to its simplicity and scalability, SACiD can support resource management in DiffServ networks.

Select  |    Cite this article 
Feng Mei-yu; Cheng Sheng; Zhang Xu; Ding Wei
An Algorithm and Model to Improve Reliability of Multicast in Ad hoc Networks
2006 Vol. 28 (5): 780-784 [Abstract] ( 2014 ) [PDF 726KB] ( 1081 )    DOI:

In Ad hoc networks, low reliability of wireless link makes the scalability of multicast group degrade drastically, and FEC(Forward Error Correction) technique and NACK(Negative ACKnowledgement)-based mechanism, which guarantees reliable transport of multicast in wired networks, is not adapt to be deployed in Ad hoc networks. In this paper, focusing on improving the scalability of multicast in Ad hoc networks, a Reliable Multicast Transport Scheme (RMTS) consist of PDA(Packet Dispersal Algorithm) and ARM(Active Retransmission Model) is proposed to guarantee reliable transports of multicast. Both theory analyses and simulation result show the merits of validity, simpleness, low resources-occupied and moderate overhead.

Select  |    Cite this article 
Zhang Guang-hui; Li Jian-dong; Zhou Lei; Pang Ji-yong
Topology-Transparent Reservation Time Division Multiple Access in Multihop Ad hoc Networks with MIMO Links
2006 Vol. 28 (5): 785-788 [Abstract] ( 1824 ) [PDF 582KB] ( 1144 )    DOI:

A topology-transparent Time Division Multiple Access (TDMA) with reservation for MIMO link is proposed for multi-hop Ad hoc networks in this paper. By reservation each node transmits simultaneously all data streams in its assigned collision-free slots and utilizes free slots among other non-assigned slots and its assigned collision slots by probability to transmit a part of all data streams. The protocol is suitable for distributed application since it need not know the whole network topology information. Through theoretical analysis, the minimum throughput and optimal frame length are derived. The results show that the protocol is robust to topology change.

Select  |    Cite this article 
Wang Hong-xi; Chen Jian-feng; Jiao Wen-hua; Liu Yong
A Bandwidth Scheduling Architecture for IEEE 802.16 Wireless MAN in TDD Mode
2006 Vol. 28 (5): 789-794 [Abstract] ( 1778 ) [PDF 309KB] ( 1112 )    DOI:

A fair and efficient bandwidth allocation scheduling architecture for IEEE 802.16 Broadband Wireless Access (BWA) systems in TDD mode is proposed. In this area, comparing with the traditional fixed bandwidth allocation, the proposed scheduling architecture allocates uplink and downlink bandwidth simultaneously and dynamically. A Deficit Fair Priority Queue (DFDQ) algorithm is proposed to schedule different service flow, which provides more fairness to the system. The simulation results show the proposed architecture can meet the QoS requirement and fairness for all types of traffic.

Select  |    Cite this article 
Xu Ping-ping; Yu Miao; Xu Bin; Bi Guang-guo
Space Reuse Based Media Access Control Technique for Ultra-wideband Systems
2006 Vol. 28 (5): 795-799 [Abstract] ( 1715 ) [PDF 313KB] ( 1253 )    DOI:

This paper studies the media access control protocol and key technologies in ultra-wideband wireless networks. It is mainly analyzed that the basic principle of IEEE 802.15.3 media access control protocol which is as one of the most suitable protocols for ultra-wideband networks. Using the character of accurate location information of ultra-wideband communication, the IEEE 802.15.3 protocol is improved and a scheme which is media access control technique based space reuse is proposed. Simulation results reveal this new proposal improves the performance of network throughput and packet access delay compared with basic IEEE 802.15.3 media access control scheme.

Select  |    Cite this article 
Zhang Deng-yin; Qiao Li-xia
Study of Measurement Methodology for Satellite Network Traffic
2006 Vol. 28 (5): 800-804 [Abstract] ( 2014 ) [PDF 305KB] ( 1273 )    DOI:

Taking into account the features of satellite networking,solving the measurement for traffic in satellite networks by adopting passive measurement method based on SNMP is studied in this paper. The principle of measurement for network traffic using SNMP is studied firstly. Based on this, a selecting algorithm of nodes monitored is introduced so as to decrease the number of devices monitored and enhance the network performance of measurement for traffic. Finally, the flow chart of application explored in practice and the related experimental results are given. Further calculating or statistical disposing using the results can be processed. Then the distribution and utilization of resources in satellite network can be confirmed and the network can be adjusted to the optimal performance. The whole procedure of measurement for traffic is implemented and real-time exact data and available network management evidence are provided for the implementation of traffic engineering in satellite network.

Select  |    Cite this article 
Wang Rong; Chen Yue; Wu Jiang-xing
Implementing Distributed Weighted Fair Scheduling Algorithm in CICQ Switches
2006 Vol. 28 (5): 805-809 [Abstract] ( 1928 ) [PDF 224KB] ( 1149 )    DOI:

Traditional input-queued switches based on crossbar are insufficient in providing good QoS performance. As a contrast, the CICQ(Combined Input and Cross-point buffered Queuing) switches can provide almost 100% throughput under different input traffic, the performance of which is very close to the OQ(Output-Queued) switch, and has the potentials to support good QoS. Based on the CICQ switches, a new scheme is put forward, which can realize distributed weighted fair schedule for the packets of variable length, and have both the scalability of input-queued switches and QoS performance of output-queued switches. The issue of updating the virtual time of back-pressured queues is also discussed. Simulation results show the scheme is very effective and has good performance.

Select  |    Cite this article 
He Hong; Li Jian-dong; Sheng Min
Performance Analysis of a Novel CRMA Protocol Based on Runtime Optimization
2006 Vol. 28 (5): 810-814 [Abstract] ( 1989 ) [PDF 303KB] ( 1370 )    DOI:

To improve the Binary Exponential Backoff algorithm (BEB)’s channel throughput of IEEE 802.11 protocol, a novel Collision Reduced Multiple Access protocol (CRMA) is proposed based on slow contention window decrease mechanism and runtime optimization method. By integrating slow CW decrease scheme with runtime optimization mechanism to effectively solve no state information indicating the actual contention level of BEB algorithm after a successful transmission, CRMA protocol can record the current backoff stage of the latest successful transmission under the overload network precisely. As a result, it decreases the collision times and improve the channel utilization. The CRMA protocol could be compatible completely with pre-existed IEEE 802.11 protocol, and it is represented by its simplicity, integrability, complete distribution and adaptiveness. The performance analysis and numerical results show that its performance is much better than the IEEE 802.11 protocol and other recent multiple access mechanisms because of the accurate estimation of congested level before transmission and the effective record of backoff stage after a successive transmission.

Select  |    Cite this article 
Fu Jian; Zhang Ling
The Research on the Dynamic Key Management of Wireless Ad hoc Network
2006 Vol. 28 (5): 815-819 [Abstract] ( 1689 ) [PDF 300KB] ( 968 )    DOI:

As a kind of dynamic self-organized network, wireless Ad hoc network is faced with serious security threat. On the basis of analyzing the characteristics of Ad hoc network, a hierarchical group key management solution (Hierarchical Group Controller-Based Group Key Management protocol) based on extended Diffie-Hellman protocol is presented. The HGKM utilizes member filter function and hierarchy to maintain a single group key to adapt to the special requirements for frequent key refresh of Ad hoc network.

Select  |    Cite this article 
Cai Man-chun; Zhao Hai-yang; Ma Chun-guang;Yang Yi-xian
A Fair Offline E-cash Scheme
2006 Vol. 28 (5): 820-822 [Abstract] ( 1910 ) [PDF 174KB] ( 1128 )    DOI:

Based on group signature scheme from bilinear pairings, a new offline fair cash scheme is presented. Because of setting up on the elliptic curve group and without using blind signature scheme , this scheme has many properties such as having simple structure, security, efficiency, trapdoor-free and so on.

Select  |    Cite this article 
Wu Ke-li①②; Wu Bin; Wei Xiang-he; Liu Feng-yu
A Structured Multi-signature Scheme with Signers’ Intentions
2006 Vol. 28 (5): 823-826 [Abstract] ( 2023 ) [PDF 220KB] ( 1021 )    DOI:

A multi-signature scheme is a digital signature scheme that allow multiple signers to generate in a collaborative and simultaneous manner. In the application of multi-signature, the signing order among co-signers may satisfy a special sequence and sometimes the each signer can express his intention associating with the message to be signed and referring by others. Considering the need of application, a multi-signature from bilinear pairings is proposed in this paper. The proposed scheme has two properties that it can set up the order of signing in advance and add the intention of signer into the signature. The security analysis of the new scheme shows that it can resist all kind of outsider and insider attacks.

Select  |    Cite this article 
Chen Wei; Hu Yun; Yang Yi-xian; Niu Xin-xin
Application of Correlation Attack in Algorithm Identify
2006 Vol. 28 (5): 827-831 [Abstract] ( 2096 ) [PDF 271KB] ( 1246 )    DOI:

A correlation attack on A5/1 algorithm can be educed by the linear filling weakness in initiate process of A5/1 algorithm. An aberrant A5/1 sequence can be obtained from it, which have treated by statistic tools to get A5/1 statistic trait, so the distinction of A5/1 output from real random sequence can be found. Test results show that this method can work effectively.

Select  |    Cite this article 
Yu Zhao-ping; Wang Xiao-dong
On the Construction of Super-Pseudorandom Permutations Based on the Rotation Permutations
2006 Vol. 28 (5): 832-835 [Abstract] ( 1996 ) [PDF 232KB] ( 892 )    DOI:

Towards making the construction method on the DES-model pseudorandom permutations given by Luby and Rackoff optimal and practical, a new construction method on pseudorandom permutations is provided. Based on the random oracle model by showing that two DES-model permutations are sufficient to be super-pseudorandom permutation together with initial and final rotation permutations, the complexity of construction is reduced samewhat and its proof of security is simplified The revised construction reduces the success probability of the adversary and the upper bound of advantage and also requirements of the first and the end functions.

Select  |    Cite this article 
He Jun; Guo Wei
A New Method for Eliminating the Carrier Phase Equivocation of V&V Algorithm
2006 Vol. 28 (5): 836-839 [Abstract] ( 2177 ) [PDF 206KB] ( 1576 )    DOI:

The V&V algorithm is very suitable for carrier synchronization of burst signal. After V&V algorithm, a post processing is needed for eliminating the phase equivocation which is brought by the residual frequency and the cycle slip can be avoided. In this paper, a new post processing method is put forward. It has a good effect on the phase equivocation brought by both residual frequency and noise. Contrast to some other methods, it reduces the probability of cycle slip greatly. Simulation results prove that this method had a good performance and can apply to the demodulation of MPSK burst signal.

Select  |    Cite this article 
Wu Tuan-feng; Yang Xi-gen; Li Ji-ping
Combined Algorithm Based on FFT for Frame Synchronization and Frequency Offset Estimation
2006 Vol. 28 (5): 840-843 [Abstract] ( 2044 ) [PDF 277KB] ( 1275 )    DOI:

This paper presents a new combined algorithm based on FFT for frame synchronization and frequency offset estimation. The algorithm can achieve frame synchronization effectively in the presence of a frequency offset and the frequency offset estimation range is -Rs/2~Rs/2. Simulation results indicate that the proposed algorithm can outperform existing methods when a frequency offset exists.

Select  |    Cite this article 
Deng Jia-xian; Kang Yao-hong
A Novel Image Coding Algorithm Based on Coefficients of Interest
2006 Vol. 28 (5): 844-847 [Abstract] ( 1971 ) [PDF 380KB] ( 1168 )    DOI:

A novel image coding algorithm based on coefficients of interest is proposed in terms of the special needs of remote-sensing images. When coding rate is given, the entropy estimate is calculated from the coefficients of the given image, so that the last coding bit-plane can be derived when the image is coded normally. The difference of the algorithm from the one for region-of-interest algorithm lies in that the region and the scaled value need not be preappointed, and the most important is that all the coefficients in bands are not scaled up, while the coefficients of interest and the scaled value are deduced from the given image in the algorithm. This algorithm can be thought as the generalization from the region-of-interest algorithm, which is smarter and more valid than the region of interest coding algorithm. The simulation and the experimental results show that the small targets in the remote-sensing images can be saved validly while the whole image quality decreases a little.

Select  |    Cite this article 
Wang Chen; Du Jian-hong
Research of Image Compression Based on Image Inpainting
2006 Vol. 28 (5): 848-851 [Abstract] ( 1815 ) [PDF 361KB] ( 1227 )    DOI:

An optimized approach based on texture synthesis for filling-in blocks of missing data is presented in this paper. According to coarseness analysis and the character of inpainting algorithm, parts of image blocks would be dropped purposively. And then, this method is applied to the second-time image compression along with other compression algorithms such as JPEG, and the compression ratio is highly improved.

Select  |    Cite this article 
Hu Wen; Zheng Guo-xin
Orthogonal Hermite-Based Pulse Shapes Used for Ultra-Wide-Band Multi-user Communication
2006 Vol. 28 (5): 852-856 [Abstract] ( 1810 ) [PDF 349KB] ( 955 )    DOI:

Orthogonal Hermite pulse shapes used for Ultra Wide-Band(UWB) communication are proposed. The paper presents a novel method for multi-user transmission system in UWB communication. By transmitting multiple orthogonal Hermite pulses simultaneously, the UWB multi-user transmission system achieves good performance characteristic. Also it proposes that orthogonal Hermite pulses can be applied to the DS-CDMA system in UWB to access more users at one time.

Select  |    Cite this article 
Zhang Yan-rong; Hao Li; Fan Ping-zhi
Performance of Multi-rate Single Cell CDMA Systems with Linear Successive Interference Cancellation
2006 Vol. 28 (5): 857-860 [Abstract] ( 2057 ) [PDF 327KB] ( 1383 )    DOI:

Successive Interference Cancellation (SIC) can effectively mitigate Multiple Access Interference (MAI) and improve the capacity of Direct-Sequence Code-Division Multiple Access (DS-CDMA) systems. In this paper, for the uplink of a single cell DS-CDMA system, the capacity limits of a conventional single-user detection receiver, a system with linear SIC receiver, and a system with perfect SIC are derived for an Addictive White Gaussian Noise (AWGN) channel. The results show that the linear SIC system can provide a much larger capacity compared with the conventional system in all cases. Moreover, with increasing of the number of the users in the system, the difference between the whole power of the perfect SIC and that of the linear SIC increases. So, if the perfect SIC is used to guide the power allocation, the resulting performance will be significantly worse than predicted.

Select  |    Cite this article 
Zhang Li-wei; Zhu Li-dong; Wu Shi-qi
Study on the ISL’s Geometrical Characteristics of Small Satellites Formation Flying in Elliptical Orbits
2006 Vol. 28 (5): 861-864 [Abstract] ( 1736 ) [PDF 320KB] ( 1067 )    DOI:

This paper focuses on the geometrical properties of Inter-Satellite Links (ISLs) of the small satellites formation flying under the elliptical orbits, including the azimuth, elevation and the distance. The article addresses the mathematical formula for these characteristics., and then presents the simulation results based on the given example. The paper also analyzes the law that the formation flying’s ISL’s geometrical characteristics change with the parameters of the satellite constellation. These results are important for future’s constellation design , satellite networking, etc.

Select  |    Cite this article 
Wu Ting-yong; Zhu Li-dong; Wu Shi-qi
The Satellite Constellation Scheme Study for MEO-TDRSS of China
2006 Vol. 28 (5): 865-870 [Abstract] ( 1741 ) [PDF 332KB] ( 1181 )    DOI:

Based on the functionality and traffic characteristics of the Medium Earth Orbit Tracking and Data Relay Satellite System(MEO-TDRSS), the coverage properties and Inter-Satellite Link(ISL) performances of four familiar satellite constellation schemes which are adopted as the MEO-TDRSS of China are simulated and compared. The simulation results indicate that Rosette and Common-track constellations, whose satellites are distributed in the celestial sphere uniformly, are appropriate for MEO-TDRSS of China.

Select  |    Cite this article 
Yu Xiao-yan; Wang Jia-qing; Yang Lü-xi
Doubly Selective Fading Channel Estimation Based on Polynomial Interpolation in MIMO Systems
2006 Vol. 28 (5): 871-874 [Abstract] ( 2121 ) [PDF 327KB] ( 851 )    DOI:

High data transmission rates and high mobility give rise to time selectivity and frequency selectivity in wireless communication channels. This paper investigates Multi-Input Multi-Output (MIMO) time and frequency doubly selective channel estimation using polynomial interpolation method for data block transmissions. Firstly, a polynomial interpolation model is introduced to represent doubly selective MIMO channel; then, relying on channel Doppler fading rate and the polynomial error term, the polynomial model order and the length of the whole data block are obtained; Finally, based on polynomial interpolation channel model, MIMO doubly selective channels are estimated using pilot symbol assisted modulation. Simulation results show that the proposed estimation method has effective performance.

Select  |    Cite this article 
He Jin; Liu Zhong
Screened-Ratio-Principle-Based DOA Estimation Algorithm in Impulsive Noise Environment
2006 Vol. 28 (5): 875-878 [Abstract] ( 1722 ) [PDF 317KB] ( 864 )    DOI:

This paper present a new DOA estimation algorithm in impulsive noise environment. The algorithm uses firstly screened ratio principle to construct the correlation matrix of the array data and then implements the DOA estimation by MUSIC algorithm. In comparison with the Fractional Lower Order Moment (FLOM)-based algorithms, the proposed algorithm does not need the selection of the FLOM parameter. Computer simulations show that the algorithm is more robust and more accurate than FLOM-MUSIC algorithm.

Select  |    Cite this article 
Gao Yuan-yuan; Shen Yue-hong; Hu Xian-bin
Implementation of ST-FSK Detection Based on Decoupled Maximum Likelihood Detection
2006 Vol. 28 (5): 879-882 [Abstract] ( 1948 ) [PDF 287KB] ( 867 )    DOI:

This paper presents a decoupled maximum likelihood(ML) detection algorithm, which utilizes the orthogonal characteristic of signal, decoupled the combined ML detection into separated one, under the assumption that CSI is known at the receiver. Utilizing appropriate channel estimation algorithm, the decoupled algorithm not only sharply reduces the computational complexity compared to the noncoherent ML detection, but also improves the performance. Simulation results confirm the effectiveness of the algorithm.

Select  |    Cite this article 
Yang Zhi; Mao Shi-yi; Chen Wei
Multiresolution Based Local Structured Information Entropy for Robust Multimodal Image Fusion
2006 Vol. 28 (5): 883-889 [Abstract] ( 2503 ) [PDF 1263KB] ( 1289 )    DOI:

The updated image fusion schemes could not identify meaningful image features from noises, the input noise is treated as valid information and transferred into the fused output. After complex wavelet transformation (CWT), structured information is decomposed into varying scales and directions. Based on CWT, two structured information entropies, intra-band structured information entropy and inter-band structured information entropy, are formulated to express the structurization level of image features. Preceding the image fusion process, the metrics are employed to weight all inputs. As a result, the perceptual salient inputs are enhanced while the noise inputs are de-emphasized adaptively. Comparing the visual aesthetics of fusion results and analyzing the performance objectively, show the good performance of the proposed image fusion algorithm.

Select  |    Cite this article 
Wang Wei-hong①②; Qin Xu-jia①③
Novel Image Inpainting Algorithm Based on CSRBF Interpolation
2006 Vol. 28 (5): 890-894 [Abstract] ( 2254 ) [PDF 674KB] ( 1457 )    DOI:

A novel algorithm for image inpainting based on Compactly Supported Radial Basis Functions(CSRBF) interpolation is proposed. The algorithm looks an image as an incomplete 3D points set. The 2D image inpainting problem is converted into implicit surface reconstruction problem from 3D points set. To construct the implicit surface for approximating the points set by using Radial Basis Functions(RBF) can interpolate the points in absent portion, and then resample from the constructed surface can calculate the pixels’ value of damaged or removed portion on the image. Using CSRBF, the matrix of corresponding system of the linear algebraic equations is spare and bounded. So it can decrease the complexity of RBF algorithm. A number of examples on image inpainting demonstrates that the algorithm is an practical one and using the algorithm can obtain good results.

Select  |    Cite this article 
Yu Ying;Wang Xiao-long; Liu Bing-quan
A Method of Automatic Recognition for Chinese Organization Name Based on SVM/RS
2006 Vol. 28 (5): 895-900 [Abstract] ( 2162 ) [PDF 283KB] ( 1738 )    DOI:

A method to identify Chinese organization names by utilizing SVM (Support Vector Machines) and RS (Rough Set) is provided. Forming rule of organization name is defined based on semanteme collocation relation, and then the un-redundancy set of rough forming rules can be learned by employing attribute reduction in RS automatically. A chain of words matching forming rule is selected first as candidate, then a SVM classifier discern whether a candidate is real organization name according to candidate semanteme and its contextual semanteme while recognizing. Results of open testing achieve F-measure 82.06% in 16.17 million words news based on this project separately.

Select  |    Cite this article 
Wang Jian-yong;Zhou Xiao-guang; Liao Qi-zheng
A Mixed Noise Filter Based on Median-Fuzzy Technology
2006 Vol. 28 (5): 901-904 [Abstract] ( 1734 ) [PDF 438KB] ( 1329 )    DOI:

A new algorithm of mixed noise removal for digital image is presented combing median filter and fuzzy technology. The pixels of an image are divided into two sets: impulse noise points and pixels polluted by Gaussian noise. The min-max operator is used first. Then impulse noise is detected accurately by using image texture and removed by median filter. A detail-preserving fuzzy filter is adopted to reduce Gaussian noise contained in other pixels. Experiments show that the algorithm can remove mixed impulse and Gaussian noise efficiently while protecting image details.

Select  |    Cite this article 
Sun Hui; Zhu Shan-an
The Algorithm Based on Zero-Crossing and Extremum Estimation to Obtain Instantaneous Frequency and Instantaneous Amplitude
2006 Vol. 28 (5): 905-908 [Abstract] ( 2443 ) [PDF 257KB] ( 1561 )    DOI:

According to Hilbert-Huang Transform (HHT) theory, the signal’s Intrinsic Mode Function (IMF) is extracted by Empirical Mode Decomposition (EMD). Its time-frequency-amplitude spectrum and marginal spectrum are obtained by Hilbert transform. In the basis of summarizing the limitation of the Hilbert transform theory and its realization, an algorithm based on zero-crossing and extremum estimation to obtain instantaneous frequency and instantaneous amplitude is presented. The positions of zero-crossings and extrema are obtained accurately by interpolating the discrete signal. The instantaneous frequency and instantaneous amplitude of relative points are obtained. The signal’s instantaneous frequency and instantaneous amplitude waveform are obtained by cubic spline interpolation computation. By testing the result and comparing the detail of result with Hilbert transform method through several representative examples, it shows that the instantaneous frequency and instantaneous amplitude obtained by zero-crossing and extremum estimation algorithm are more precise and the frequency resolution is better.

Select  |    Cite this article 
Qi Chong-ying; Wang Yong-liang; Zhang Yong-shun; Zhang Ming-zhi
One-Dimensional DOA Estimation and Self-Calibration Algorithm for Multiple Subarrays in the Presence of Mutual Coupling
2006 Vol. 28 (5): 909-914 [Abstract] ( 1931 ) [PDF 394KB] ( 899 )    DOI:

The issue of Direction-Of-Arrival (DOA) estimation in multiple subarrays is addressed. It is assumed that an array is composed of several uniform linear arrays (ULAs) of arbitrary known geometry, but there are mutual coupling between sensors of each subarray. By using the banded, symmetric Toeplitz character of the ULAs and the block diagonal character of the multiple subarrays, a new decoupling DOA estimation and self-calibration algorithm is proposed. The new algorithm can provides accurate DOA estimation without the knowledge of mutual coupling. In addition, the mutual coupling coefficients for array self-calibration can be achieved simultaneously. Instead of multidimensional nonlinear search or iterative computation, the algorithm just uses a one-dimensional search and can reduce the computation burden. DOA identifiability issue for such arrays is discussed, and the corresponding Cramer-Rao Bound (CRB) is derived also. Monte-Carlo simulations illustrate that the proposed algorithm possesses the better performance of low computational complexity, high resolution and better accuracy of self-calibration.

Select  |    Cite this article 
Su Hong-yan; Long Teng; He Pei-kun; Hou Xiao-min
Target’s Redundancy Removed Algorithm for Modulated Frequency Stepped Pulse Radar Signal Echoed by Moving Target
2006 Vol. 28 (5): 915-918 [Abstract] ( 1902 ) [PDF 318KB] ( 949 )    DOI:

To reduce the loss of sampling, higher sampling frequency than bandwidth of chirp must be adopted for Modulated Frequency Stepped Pulse(MFSP) radar signal, which will bring on over-sampling result of pulse compression for chirp. So the pick-up algorithm for the MFSP radar signal must be adopted to eliminate target’s redundancy in order to obtain fine HRRP(High-Resolution Range Profile). However, because of inaccuracy of the velocity compensation method, the velocity error of the moving target will produce velocity-range coupling error, even bring the influence of losing target or producing spurious peaks on the HRRP. This paper proposes a target’s redundancy removed algorithm based on the offset of the most powerful scatterer, which can solve the velocity-range coupling problem effectively by modifying the pick-up scopes of all sampled points. Finally, the processing results of both simulated data and real radar data validate the correctness of theoretical analysis.

Select  |    Cite this article 
Hu Xiao-xin; Wang Yan-fei; Qin Lei
Lifting Wavelet for SAR Raw Data Compression
2006 Vol. 28 (5): 919-922 [Abstract] ( 1791 ) [PDF 349KB] ( 1976 )    DOI:

The advantages of wavelet transform constructed with lifting scheme are introduced and compression algorithm based on lifting wavelet for SAR raw data is proposed. Compression performance of the algorithm is analyzed with simulation and real raw data and compared with other techniques by different quality parameters, which show that the algorithm is suitable for compression of SAR raw data.

Select  |    Cite this article 
Zhang Xin①②; Wu Yi-rong; Ding Chi-biao
A Easy Implementation Real Time Autofocus Algorithm for High Resolution Airborne SAR
2006 Vol. 28 (5): 923-926 [Abstract] ( 1886 ) [PDF 254KB] ( 963 )    DOI:

The effect of the range migration to the Shift-And-Correlate Monopulse Secondary Surbeillause Redar (SAC) algorithm is analyzed in this paper. The conclusion is that the precision of SAC would be severely affected by the range migration in the high resolution SAR. Integrated with the range Doppler algorithm, a new SAC autofocus algorithm based on the limits of range bin is presented, which called Shift-And-Correlate within Gate Strategy (SACGS). The effect of the range migration is minished by SACGS. And the precision is increased. The efficiency of SACGS is proved by the simulation and actual SAR data. It can satisfy the request of the high resolution. And the computation is very simple, which make it very suitable for real-time image processing.

Select  |    Cite this article 
Guo Kun-yi;Sheng Xin-qing
A Range Multi-aperture SAR Imaging Method Based on SCFT
2006 Vol. 28 (5): 927-931 [Abstract] ( 1744 ) [PDF 387KB] ( 747 )    DOI:

The SAR working mode of range multi-aperture is a high resolution imaging mode for wide swath. Resolving and imaging are the two parts of range multi-aperture imaging algorithm. How to match the two parts together is the key problem for the algorithm. This paper presents a new method based on SCFT (SCaled FT) to solve the problem. Simulation and comparison between different methods is also given to prove the feasibility of range multi-aperture SAR imaging method based on SCFT.

Select  |    Cite this article 
Li Ying; Shi Qing-feng; Zhang Yan-ning; Zhao Rong-chun
Automatic Segmentation for Synthetic Aperture Radar Images
2006 Vol. 28 (5): 932-935 [Abstract] ( 1831 ) [PDF 401KB] ( 1106 )    DOI:

The multiplicative nature of the speckle noise in SAR images is a big problem in SAR image segmentation. A novel method for automatic segmentation of SAR images is proposed. The wavelet energy is used to extract texture features, the regional statistics is used to extract gray-level features and the edge preserving mean of gray-level features is used to ensure the accuracy of classification of pixels near to the edge. Three representative kinds of features of SAR image are extracted, so the segmentation performance is enhanced. Besides, an improved unsupervised clustering algorithm is proposed for image segmentation, which can determine the number of classes automatically. Segmentation results on real SAR image demonstrate the effectiveness of the proposed method.

Select  |    Cite this article 
Ding Qian-jun①②; Wang Yong-liang; Zhang Yong-shun
Efficient Algorithms for Implementing Multistage Wiener Filter in Adaptive Arrays
2006 Vol. 28 (5): 936-940 [Abstract] ( 2386 ) [PDF 279KB] ( 1728 )    DOI:

Based on the analysis of the algorithms for implementing Multistage Wiener Filter (MWF), the MWF implemented by the Correlation Subtraction Algorithm (CSA) is proved to be an Unitary MWF (UMWF). The rank reduction performance of UMWF is superior to the original MWF proposed by Goldstein, Reed, and Scharf. In this paper, the block matrixes in the CSA are modified to reduce the size of the observation data vectors step by step in the forward recursion of MWF. The modified block matrixes can also be used in the CSA architecture. The new implementing algorithm needs a lower computation complexity, while keeping almost the same performance as the CSA. The validity of the proposed algorithm is proved by the simulation results.

Select  |    Cite this article 
Su Hong-tao; Zhang Shou-hong; Bao Zheng
Mutual Coupling, Gain and Phase Error Calibration for Transmitting Array
2006 Vol. 28 (5): 941-944 [Abstract] ( 2077 ) [PDF 307KB] ( 1010 )    DOI:

An error model of transmitting array mutual coupling, gain and phase error of the synthetic transmitted beam bistatic HF-Surface Wave Radar (HF-SWR) is investigated in this paper. According to the characteristics of the error model, a transmitting array calibration method is proposed. This method employs the direct signal between receiving antenna and transmitting antenna as calibration sources, and utilizes an iterative Least Square (LS) algorithm to estimate the errors of transmitting array. Simulation results validate the effectiveness of this method.

Select  |    Cite this article 
Chang Ben-yi; Gao Li
The Geometric Accuracy Test of the Airborne High Resolution SAR Developed by IECAS
2006 Vol. 28 (5): 945-949 [Abstract] ( 2184 ) [PDF 827KB] ( 979 )    DOI:

In this paper, geometric accuracy of the airborne high resolution SAR developed by Institute of Electronics, Chinese Academy of Sciences (IECAS) is verified with real terrain map data by using classical radar photogrammetry.The experimental results show that horizontal positional accuracy of single imagery revision is better than ±4m and spatial positional accuracy of stereo images measurement is better than ±20m for the kind of radar imagery.

Select  |    Cite this article 
Yu Ji-jun①②; Sheng Xin-qing①③
Scattering from 3-D Targets in the Subsurface Using MOM
2006 Vol. 28 (5): 950-954 [Abstract] ( 2189 ) [PDF 286KB] ( 991 )    DOI:

In this paper, an accurate and efficient implementation approach of the Method of Moments (MOM) is developed to compute scattering from 3-D targets in the subsurface, which is based on the Mixed Potential Integral Equation (MPIE) in layered media and the RWG basis function. The implementation skill and computing performance of the proposed approach are studied in detail. In particular, how to efficiently calculate various different Sommerfeld integrals (SIs) is numerically investigated with the discrete complex images technique. The computed results of the targets in free space are in agreement with Mie Series results and the computed results of subsurface flat are also in agreement with the published data, which shows the reliability, efficiency and accuracy of the developed approach. Furthermore, the EM scattering of other shaped targets is computed at different size, buried depth, and subsurface medium.

Reviews
Select  |    Cite this article 
Wang Ying; Li Xiang-lin
An Overview of the Capacity of Digital Watermarking
2006 Vol. 28 (5): 955-960 [Abstract] ( 2145 ) [PDF 336KB] ( 1450 )    DOI:

The diversified researches of capacity of digital watermarking are summarized in this paper. The capacity of watermarking as a basic communication system, the capacity as side information, the capacity using dirty paper encoding and the capacity of security watermarking are introduced. An effective conclusion for designing the arithmetic of embedding and detecting is found by analysis the capacity.

电子与信息学报
Author Center
Online Submission
Author Instruction
FAQ
Template
Copyright Agreement
MSN:je-jeit@hotmail.com
Links
More>>  
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech