电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Quick Search  
  Advanced Search
2005 Vol.27 No.9, Published: 19 September 2005
Articles |
 
 
Articles
Select  |    Cite this article 
Liu Jian-ping; Liang Dian-nong
Effectiveness Analysis of Spaceborne Parasitic Distributed SAR System
2005 Vol. 27 (9): 1345-1348 [Abstract] ( 1700 ) [PDF 817KB] ( 746 )    DOI:

To analyze several key problems about effectiveness analysis of spaceborne parasitic SAR system,firstly,an index system ofefectiveness assessment is established based on the m ission request ofdistributed SAR system;combined with orbit characteristics of distributed small satellites,the model of system capability is established;based on system working state,Markov model of system reliability is established;based on capability model and reliability model,the model of effectiveness assessment is established.The simulation results indicate the proposed models provide theoretic dependence for effectiveness analysis of spaceborne parasitic distributed SAR system.

Select  |    Cite this article 
Meng Da-di; Ding Chi-biao
A New Approach to Autofocus Considering Strip M ap SAR
2005 Vol. 27 (9): 1349-1352 [Abstract] ( 1937 ) [PDF 1149KB] ( 988 )    DOI:

Phase Gradient Algorithm (PGA) is accomodated to focus the StripMap SAR data in this article. A new approach to StripMap SAR autofocus, StripMap PGA(SPGA), is developed based on the difference between the received signal of StripMap SAR and SpotLight SAR and the classic PGA is referenced. The focused SAR images from SPGAdoes not have the problem of the shift between the blocks which can be found in the images from the traditional StripMap autofocus method. SPGA can get well focused SAR images from more universal scene because of the employment of phase error surface.

Select  |    Cite this article 
Cao YanWei;Zhang KunFan;Jiang ZhiGong;Cheng Zhu;Huang FuKan
A Robust Discrete Spectrum Correcting Method
2005 Vol. 27 (9): 1353-1356 [Abstract] ( 1824 ) [PDF 945KB] ( 1168 )    DOI:

A robust correcting method for discrete spectrum in CW radar velocity measuring is proposed in this paper, t is named the method of triangle. This method, with low compution and high accuracy, is theoretically simple and easily carried out. The paper introduces the principle of this method, analyzes its correcting effects changed with noise and spectrum line numbers used, the simulation result is also given. Finally, the method of triangle is compared with energy centrobaric correction method, with the conclusion that noise has less effects on the method of triangle.

Select  |    Cite this article 
Wang Da-qi; Zhu Min-hui
Non-Linear Distribution Target Detection Method for SAR Images
2005 Vol. 27 (9): 1357-1360 [Abstract] ( 1820 ) [PDF 1016KB] ( 954 )    DOI:

In some condition the present most of the methods are wake of ship or the natural interwave can be observed in remote sensing imagery. In used to detect linear features. This paper puts forward a method, which uses static boundary contour system based on biological vision and image morphological filter based on mathematical morphology to process images. And after conversion into binary image, the non-linear features are classified using binary morphological filter. The effectiveness of this algorithm is demonstrated by the test results of simulating wake images and actual SAR images of ship wakes

Select  |    Cite this article 
Chen Guang dong; Zhu Zhao-da; Zhu Dai-yin; Jiang Wei-guang
Detecting Radial Moving Ground Targets from SAR Image
2005 Vol. 27 (9): 1361-1364 [Abstract] ( 1576 ) [PDF 422KB] ( 694 )    DOI:

This paper is proposes to detecting radial moving ground targets from SAR image. Radical moving targets have focused image just as fixed ground clutters. The algorithm for detection and parameter estimation of radical targets has three steps. The first step isolates the SAR image frequency spectrum to positive band and negative band, then uses IFFT transform to reform two images. The second step subtracts the two-look image amplitude, It offers an approach of suppressing ground clutters and simultaneously indicating the true location of the slant-range moving target image. Finally the radical ground speed of the moving target is carried out by the estimating its Doppler centroid. This combined method is implemented by using real clutter data combined with simulated moving targets. Typical computer results are presented, which illustrate this technique's availability.

Select  |    Cite this article 
Wang XinLou;Qiao Ming;Zou MouYan
A New Speckle Noise Removal Method Based on PDE's
2005 Vol. 27 (9): 1365-1369 [Abstract] ( 1824 ) [PDF 774KB] ( 1050 )    DOI:

Traditional speckle removal methods generally result in the lost of image features. This paper presents a new approach to edge-preserving smoothing of digital SAR images based on the PDE's. A brief analysis of the principle of anisotropic nonlinear diffusion equation for image restoration is introduced, and then an edge indicator is showed in the final update equation to constrain the image edge, staying as close as possible to the input image and to restore discontinuities, which improve the ability of speckle noise removal. Comparison and experimental result show the new proposed algorithm has high performance.

Select  |    Cite this article 
Wei Li-deng; Wu Yi-rong; Xiang Mao-sheng
A Practical Autofocus Algorithm for SAR
2005 Vol. 27 (9): 1370-1374 [Abstract] ( 1600 ) [PDF 844KB] ( 836 )    DOI:

A practical modified autofocus algorithm for synthetic aperture radar, the iterative shift-and-correlation algorithm, is presented, Comparing with the original shift-and-correlation algorithm, the modified one can obtain more accurate estimations in worse case by incorporating the appropriate iterations, the new weightings and the auto-selecting width of the detecting window. Both the theoretical analyses and the test results indicate that the iterative shift-and-correlation algorithm can obtain more reliable results with a cost of slight increment of the computational complexity.

Select  |    Cite this article 
Zheng Wei-ping①② ; Zhang Qiu-ling①② ; Feng Hong-chuan①② ; Wang Yan-fei
Airborne SAR Motion Compensation Based on SCFT Processing Algorithm
2005 Vol. 27 (9): 1375-1378 [Abstract] ( 1933 ) [PDF 692KB] ( 705 )    DOI:

This paper detailedly analyzes precise Range Cell Migration(RCM) correction of the targets and motion error compensation of platforrn in high resolution airborne SAR data processing. The motion error of platforrn is divided into space-invariant component and space-variant component. Then the paper proposes an approach of combining RCM correction and platform MOCO using transfer function of airborne SAR system and Scaled Fourier Transform algorithm. The data simulation results verify the validity of the new method.

Select  |    Cite this article 
Zou Kun;Liang DianNong
Calibration for Low Frequency UWB SAR Based on Time Domain
2005 Vol. 27 (9): 1379-1382 [Abstract] ( 1822 ) [PDF 1064KB] ( 912 )    DOI:

The key problem of calibration for low frequency ultra wide band synthetic aperture radar system is the acquisition of the scattering information of calibrators and suitable signal processing model. In this paper, the RCS of trihedral triangle reflector changing with the frequency and aspect angle is obtained using methed of moment and AWE method, and the calibration model is proposed based on time domain. The computer simulation is used to verify this calibration method, and result is agreed with the theory analysis.

Select  |    Cite this article 
Guo KunYi①②;Wang XiaoQing①②;Cheng XinQing
Error Analysis About Range Multi-aperture SAR Imaging System
2005 Vol. 27 (9): 1383-1387 [Abstract] ( 1783 ) [PDF 1188KB] ( 526 )    DOI:

Range multi-aperture imaging algorithm is proved by theory that it can widen the swath and obtain high resolution at the same time. To evaluate the practicality of range multi-aperture SAR system, this paper gives quantitative errors analysis of this system and presents the corresponding amendment to the imaging algorithm.

Select  |    Cite this article 
Liu Jian-feng; Zhuang Zhi-hong; Liu Zhong
Application Research of Converted Measuring Kalman Filter Used in Burst Control Technology of Missile
2005 Vol. 27 (9): 1388-1392 [Abstract] ( 1940 ) [PDF 870KB] ( 925 )    DOI:

People can use measuring information provided by guider to establish optimal burst control algorithm in order to realize optimal burst. It is an important direction of burst control technology of missile. The optimal burst algorithm includes the estimation of time-to-go, miss distance and miss angle. In order to improve estimation accuracy and satisfy application request, it is important to filter measuring information provided by guider. The paper studied the application of converted measuring Kalman filter in parameters estimation of burst control. The algorithm filtered the information which was converted from polar coordinates to rectangle coordinates. At the same time, it eliminated the divergence caused by coordinate transform. Simulation results indicate that the application of this algorithm improved the estimation accuracy of burst control.

Select  |    Cite this article 
Zhang Ai-min①②;Lin Jing;Li Xiu-lin①②
Robust Cyclic Adaptive Beamforming under Cycle Frequency Error
2005 Vol. 27 (9): 1393-1397 [Abstract] ( 1888 ) [PDF 1245KB] ( 892 )    DOI:

The performance of Cyclic Adaptive Beamforming (CAB) algorithm degrades severely when the estimation of the cycle frequency is not accurate. A robust CAB algorithm is proposed in this paper which overcomes the sensitivity to the Cycle Frequency Error (CFE). Simulations show that the performance of the proposed method when applied to CFE cases is almost as good as that of the original CAB method for the case without CFE.

Select  |    Cite this article 
Wei Yu①②;Sun DeBao;Cen YiGang
Gaussian Chirplet Transform and the Optimization of its Parameters
2005 Vol. 27 (9): 1398-1403 [Abstract] ( 1933 ) [PDF 1048KB] ( 1010 )    DOI:

The Chirplet Transform(CT) have being become one of the most popular field in signal processing, which is extend from the Wavelet Transform(WT). This paper calculate the Gaussian Chirplet Transform(GCT) by the Short-Time Fourier Transform(STFT). At the same time, its parameters is optimized by making use of FRFT and Generalized Time-Bandwidth Product(GTBP). Compared with WVD and STFT, GCT has been show excellent performance for the time-frequency concentration.

Select  |    Cite this article 
Hao Cheng-peng①②;Hou Chao-huan;Yan Jin
A New Estimator for Estimating the Parameters of K-Distribution
2005 Vol. 27 (9): 1404-1407 [Abstract] ( 1892 ) [PDF 531KB] ( 911 )    DOI:

This paper proposes a new estimator for estimating the parameters of K-distribution which combines U estimator with X estimator efficiently. Simulations show that this new estimator yields shape parameter estimates with lower variance when compared with previous estimators. Parameter estimates obtained from new estimator are approximately equal to the numerically evaluated Maximum Likelihood(ML) estimates when v is low.

Select  |    Cite this article 
Yu Gang;Zhang GongMei;Bian ZhengZhong;Guo YouMin
An Improved Coherence Diffusion Method for Image Enhancement
2005 Vol. 27 (9): 1408-1411 [Abstract] ( 1887 ) [PDF 597KB] ( 964 )    DOI:

Coherence diffusion is an important preprocessing step for analyzing oriented structures in the image. Previous coherence diffusion methods for image enhancement could not recognize weak boundaries. In this paper, an efficient diffusion approach is presented. A new structure tensor integrating the second-order directional derivative information is designed, which can precisely analyze complex weak edges in the image. By combining the proposed structure tensor and the classical one as complementary descriptor, the improved diffusion tensor is constructed to detect strong edges simultaneously. Furthermore, parallel AOS (Additive Operator Splitting) scheme is applied to implement numerical solution, which is faster than usual numerical approach. Promising experimental results of several real images demonstrate that the new diffusion approach can preserve important strong edges and weak edges precisely while removing the noise.

Select  |    Cite this article 
Tian HongWei;Jing ZhongLiang;Hu ShiJiang;Li JianXun
A Multi-scan Probabilistic Data Association Algorithm Based on Multi-rate Kinematic Model
2005 Vol. 27 (9): 1412-1415 [Abstract] ( 2053 ) [PDF 1046KB] ( 704 )    DOI:

In this paper, a mistake made the multi-rate kinematic model is improv by Hong (2001) is pointed ed. And then, a multi-scan out and corrected, and the estimation performance of probabilistic data association algorithm is presented With the introduction of double gates, the calculation amount of the presented algorithm is decreased efficiently. Finally, the performance of multi-scan probabilistic data association is studied under different clutter density.

Select  |    Cite this article 
Deng ZiLi;Gao Yuan
Multichannel ARMA Signal Information Fusion Wiener Filter
2005 Vol. 27 (9): 1416-1419 [Abstract] ( 1868 ) [PDF 477KB] ( 845 )    DOI:

Using the Kalman filtering method, based on white noise estimation theory, under the linear minimum variance information fusion criterion, two-sensor information fusion steady-state optimal Wiener filter, smoother and predictor are presented for the multichannel Auto-Regressive Moving Average(ARMA) signals, where the optimal weighting matrices and minimum fused error variance matrix are given. Compared with the single sensor case, the accuracy of the filter is improved. A simulation example of a radar tracking system shows its effectiveness.

Select  |    Cite this article 
Lin Pan;Zheng ChongXun;Yang Yong;Yan XiangGuo;Gu JianWen
A Robust Method for Segmentation of Human Brain Tissue from Magnetic Resonance Images
2005 Vol. 27 (9): 1420-1424 [Abstract] ( 2012 ) [PDF 736KB] ( 1227 )    DOI:

Automatic segmentation of brain magnetic resonance images is a critical problem in many medical imaging applications. In this paper, a robust automated segmentation algorithm is presented for the brain magnetic resonance images. The segmentation framework is composed of three stages. First, it uses level set method to perform the brain stripping operation. In the second stage, it compensates for nonuniformity in the brain image based on computing estimates of tissue intensity variation. Finally, a maximum aposteriori classifier is used to partition the brain into gray matter, white matter, and cerebrospinal fluid. The proposed method has been tested using magnetic resonance dada. This algorithm may be applied to various research and clinical investigations in which brain segmentation and volume measurement involving Magnetic resonance images dada are needed.

Select  |    Cite this article 
Zhu XiaoWu;Tang Bin
A Novel Parameter Estimation Approach to the DS-SS Signal with Low Signal Noise Ratio
2005 Vol. 27 (9): 1425-1428 [Abstract] ( 1889 ) [PDF 764KB] ( 1010 )    DOI:

By exploring the phase information among symbols of the Direct Sequence Spread Spectrum (DS-SS) signal, a novel de-noising approach, used in low signal noise ratio environment, is presented. By coherent integration, this method can fully retain the signal characters and separate I/Q components of the QPSK signal while restraining noise. Combined with conventional parameter estimation methods, the carrier frequency and chip rate of the DS-SS signal can be estimated. Computer simulation confirms its effectiveness.

Select  |    Cite this article 
Zhu ZhiYu①②;Jiang ChangSheng
Channel Assignment Strategy in Mobile Communication Based on Chaos Neural Network
2005 Vol. 27 (9): 1429-1432 [Abstract] ( 1838 ) [PDF 1111KB] ( 869 )    DOI:

Chaos Neural Network(CNN)is applied to solve channel assignment problem in this paper. Energy function expression of channel assignment as well as mathematic model of CNN are put forward. Lyapunov exponent is calculated to judge whether there is chaos in CNN, and the influence on chaos characteristic caused by parameters of CNN model is discussed, then channel assignment algorithm based on CNN is proposed. Simulation results indicate that CNN has stronger ability to search global optimal solution and quicker convergence speed than Hopfield network, for its complicated transient chaos characteristic.

Select  |    Cite this article 
Li Xin;Nie ZaiPing
Impact of Antenna Array Orientation on Performance of MIMO Wireless Channels
2005 Vol. 27 (9): 1433-1436 [Abstract] ( 1850 ) [PDF 879KB] ( 1041 )    DOI:

Orientation of the receive and transmit antenna arrays is always omitted while researching the performance of wireless channels. This paper investigates the impact on spatial correlation and capacity of MIMO (Multiple-lnput Multiple-Output) wireless channels, and obtains that the impact can not be neglected if angular spread is small, and that the antenna arrays should be rotated to make array's normal point to the mean direction of arrival or departure (DOA or DOD) to attain higher capacity. Numerical results verify the impact on spatial correlation, and show that it increases with the departure ofarray's normal from the mean DOA or DOD. The simulation results indicate that orientation of the array with smaller angular spread dominates the impact on MIMO channel capacity and that increasing angular spread diminishes, or even eliminates this impact.

Select  |    Cite this article 
Zhang Peng;Bi GuangGuo;Cao XiuYing
An Iterative Joint Channel Estimation and Symbol Detection Algorithm Based on Prediction for OFDM Systems
2005 Vol. 27 (9): 1437-1440 [Abstract] ( 1603 ) [PDF 385KB] ( 1012 )    DOI:

In this paper, an iterative joint channel-estimation and symbol-detection algorithm based on prediction is presented for orthogonal frequency-division multiplexing systems. Considering the correlation between impulse responses, the prediction method is introduced into the iterative channel estimation. The initial channel value of iterative estimation is predicted in each symbol. Several prediction methods are simulated and compared. The simulation results show that contrasted to the conventional scheme the proposed algorithm improves the convergence capability and system performance dramatically.

Select  |    Cite this article 
Yang Xin;Li Jin;You XiaoHu
Performance Analysis of Closed Loop Transmit Diversity for WCDMA Systems in a Time Variant Fading Channel
2005 Vol. 27 (9): 1441-1445 [Abstract] ( 2052 ) [PDF 1053KB] ( 759 )    DOI:

In this paper, the closed loop transmit diversity technique is investigated. The RAKE receiver model and the weighting vector algorithm are presented. Since the feedback delay in the practical systems has considerable effect on the receiver performance of the closed loop transmit diversity technique, the performance of the RAKE receiver with feedback delay in the time variant wireless channel is analyzed and compared with that of the open loop mode. Theoretical analysis and simulation results show that the closed loop transmit diversity technique outperforms the open loop technique in the environments with low speeds and low path signal-to-noise ratios.

Select  |    Cite this article 
Li Jun;Liao GuiSheng;Guo QingHua
Blind Channel Estimation for Single-Carrier Block Transmission by Exploiting Zero-Padding
2005 Vol. 27 (9): 1446-1449 [Abstract] ( 1772 ) [PDF 465KB] ( 799 )    DOI:

A subspace-based channel estimation method for Single-Carrier Block Transmission (SCBT) systems is presented, which estimates frequency-selective channel blindly in frequency domain, based on zero-padding technology in SCBT system. Sufficient conditions for identifiability are also given. The performance of this method is better than that of conventional oversampling methods, and it is robust to over-estimated channel order. Finally, computer simulations confirm its efficiency.

Select  |    Cite this article 
Zhu YouTuan;Zhu JinKang
A New MM-aryM Coded Construction and Demodulation Scheme
2005 Vol. 27 (9): 1450-1453 [Abstract] ( 1497 ) [PDF 561KB] ( 752 )    DOI:

In this paper, an improved method of constructing multiple quasi-orthogonal spreading codes and a new modulation and demodulation scheme based on position mapping are proposed on the research of methods of constructing multiple quasi-orthogonal codes, using new method of codes grouping and position mapping, and making the demodulating of the quasi-orthogonal branches into the combination of demodulating of orthogonal sequences codes, that will obtain better demodulation performance. Analysis and simulation prove that this scheme can reduce obviously the computer complexity in the receiver side. It will increase transmission speed of information and reduce bit error probability.

Select  |    Cite this article 
Li GuoSong;Zhou ZhengOu
An Algorithm to Reduce MSE of LS Channel Estimation in Mobile OFDM System
2005 Vol. 27 (9): 1454-1458 [Abstract] ( 1958 ) [PDF 1239KB] ( 1219 )    DOI:

In mobile OFDM system, this paper pays much attention to the character of time domain result of LS channel estimation. At the same time, it is noticed that the character of Channel Impulse Response (CIR) is finite impulse response. A new algorithm is proposed to estimate channel effective order, and then the estimated value is used to truncate the time-domain result of channel estimation achieved by LS algorithm in order to reduce Mean Square Error (MSE) of LS algorithm due to noise and Inter-Carrier Interference (ICI). Performance improvement of LS algorithm and its enhancement on Symbol Error Rate (SER) have been evaluated by computer simulation.

Select  |    Cite this article 
Zhao YuanChao;Li DaoBen
The Enhanced Methods of User Identity's Confidentiality in Mobile Communication
2005 Vol. 27 (9): 1459-1462 [Abstract] ( 1642 ) [PDF 795KB] ( 804 )    DOI:

Focused on the scenario that none of the current standards achieves user identity's confidentiality, two enhanced methods are proposed, respectively based on public key cryptography and symmetric key cryptography, in which each user's real identity is concealed among many users' identities. So attackers can not capture the concrete identity information and user identity confidentiality is improved obviously. The performance of the two methods is analyzed and compared. And the proposed methods can be used in other mobile communication technologies.

Select  |    Cite this article 
Gu LiZe;Zhang Sheng;Yang YiXian
A New Proxy Signature Scheme
2005 Vol. 27 (9): 1463-1466 [Abstract] ( 1960 ) [PDF 643KB] ( 808 )    DOI:

Identifiability is one of several security requirements of general proxy signature schemes, i.e. a verifier can determine the identity of the corresponding proxy signer from a proxy signature. In special application, the original signer wants to conceal the identity of the corresponding proxy signer in the proxy signature. The verifier can not recognize the identity of the proxy signer from the proxy signature. In the case of a later dispute, the verifier can reveal the real identity of the proxy signer with the help of the original signer from the proxy signature. In the paper, a new proxy signature scheme should satisfy this requirement.

Select  |    Cite this article 
Gao HaiYing;Yang YiXian;Shi WeiMin
The Analysis of Eigenvalue of Multi-outputting Boolean Functions
2005 Vol. 27 (9): 1467-1469 [Abstract] ( 1584 ) [PDF 532KB] ( 808 )    DOI:

In order to investigate the cryptographical properties of the Multi-outputting Boolean functions under non-uniformity of arguments, this paper defines the spectrum and eigenvalue, presents the general expression and estimation formula, and computes the upper bounds ofagonic functions and t -resilient functions.

Select  |    Cite this article 
Zhang WeiMing;Yao Kai;Li ShiQu
Computing Correlation Coefficients of Bluetooth Combiner
2005 Vol. 27 (9): 1470-1475 [Abstract] ( 2003 ) [PDF 1166KB] ( 940 )    DOI:

The bluetooth combiner, a combiner with four bit memory, is the stream cipher used in bluetooth protocols. The expression and computation of correlation coefficients between inputs and outputs of this combiner is difficult, while this is the base of correlation analysis and correlation attack to it. In this paper, the formulas for correlation coefficients and conditional correlation coefficients of general combiners with memory are presented, with which the coefficients can be computed fast. By using these formulas, all kinds of correlation coefficients ofbluetooth combiner are computed, and some results are list in the paper.

Select  |    Cite this article 
Xie Qi①②;Yu XiuYuan;Wang JiLin
A secure and Efficient (t, n) Multisecret Sharing Authenticating Scheme
2005 Vol. 27 (9): 1476-1478 [Abstract] ( 1679 ) [PDF 290KB] ( 821 )    DOI:

A secure and efficient (t, n) multisecret sharing authenticating scheme based on double shadow is proposed. The main merits are that the participant can reuse his shadows to recover the sharing multiple secrets that the dealer given and it only needs three parameters to reconstruct one secret, and need not to perform a zero-knowledge protocol to prevent the participant cheating. The proposed scheme is clearly superior to the other existing schemes in terms of both computational costs and communication costs.

Select  |    Cite this article 
Yu GuanDing;Zhang ChaoYang;Chou PeiLiang
Bit and Power Allocation Algorithm for OFDM System
2005 Vol. 27 (9): 1479-1482 [Abstract] ( 1969 ) [PDF 699KB] ( 1129 )    DOI:

The maximization of data rate under the constraint of total transmit power and bit error rate is a considerable issue in OFDM system. Recognizing that the number of bits on each subcarrier must be a discrete number for real systems, this paper proposed two bit allocation algorithms which are modified greedy algorithm and water filling level binary searching algorithm. Simulation results show that the complexity of modified greedy algorithm is 10% of that of greedy algorithm and 5-7 iterations are enough for 0.5% data rate loss when SNR is above 10dB.

Select  |    Cite this article 
Guo Lei;Yu GongFang;Li LeMin
A Dual-Link Failure Protection Algorithm with Correlated Link Failure Probability for Survivable WDM Networks
2005 Vol. 27 (9): 1483-1487 [Abstract] ( 1959 ) [PDF 1026KB] ( 854 )    DOI:

Because the fiber links share the common physical resources, they have the Correlated Link Failure Probability (CLFP). Based on CLFP and Differentiated Reliability (DiR), the dual-link failures problem has been studied, and a novel protection algorithm, which is called Shared-Path Protection for Dual-Link Failures with DiR (SPPDLF-DiR), has been proposed for survivable WDM networks. Under dynamic traffic with different load, the performances of SPPDLF-DiR are simulated. The results show that SPPDLF-DiR not only can satisfy the specific requirements of users but also can effectively improve the resource utilization ratio and reduce the blocking ratio.

Select  |    Cite this article 
Wang YuFeng①②;Wang WenDong;Cheng ShiDuan
On Revenue-Maximized Pricing for WCDMA Networks Based on Stackelberg Game
2005 Vol. 27 (9): 1488-1492 [Abstract] ( 1837 ) [PDF 775KB] ( 804 )    DOI:

The problem that how to set the price to maximize revenue in WCDMA networks is investigated in this paper. Instead of adopting congestion pricing mechanism, this paper imposes fixed usage price on throughput of each user, which is assumed to be the function of network congestion and usage cost. Based on above assumptions, the net utility functions of users are provided and Stackelberg game is adopted to model the interaction between network and users. That is, network sets the price to maximize revenue, and in response to the price, users maximize their net utility functions to achieve equilibriums. The paper provides the quantitative relation between revenue and the number of admitted users, and infers that although, technically speaking, network can increase system capacity to admit more users through decreasing transmission rate of users, the network has no incentive to adopt this policy. Conversely, network has the incentive to pert'arm congestion control.

Select  |    Cite this article 
Ling Xiang;Yang Kun;Yan ShaoHu;Wu ShiJi
The System Throughput Estimation Method for Multi-cell WLANs
2005 Vol. 27 (9): 1493-1497 [Abstract] ( 2160 ) [PDF 1036KB] ( 961 )    DOI:

In multi-cell Wireless Local Area Networks (WLAN), co-channel interference between access points, and interference between co-channel users located in neighbored cells are existed, which lead the system performance different from the situation in a single-cell WLAN. A system throughput estimation method is proposed. Three important features of this method are that co-channel overlapping is allowed, hybrid data rates are allowed, and non-uniform distribution of users is allowed. The simulation results on the access point placement and the channel assignment show that the estimation method meets system design.

Select  |    Cite this article 
Tian YongChun;Guo Wei;Zheng XiangQuan
Handoff Management Based on Route Optimization in Hierarchically Multi-hop Wireless Networks
2005 Vol. 27 (9): 1498-1502 [Abstract] ( 1980 ) [PDF 1187KB] ( 868 )    DOI:

This paper studies on handoff management in hierarchically multi-hop wireless networks and proposes a novel user handoff algorithm and mobile base station route handoff strategy. The user handoff algorithm can reduce the number of handoff and balance the load among mobile base stations in dynamic topology. Meanwhile the mobile base station handoff algorithm always tries to find an alternate route from base station locally, which can achieve fast handoff and seamless handoffwith little overhead.

Select  |    Cite this article 
Fan ShiWei;Zhang Tao;Zhou BaiZhao
The Trajectory Estimation in Boost-Phase Using Pseudolinear Estimator
2005 Vol. 27 (9): 1503-1506 [Abstract] ( 1804 ) [PDF 369KB] ( 793 )    DOI:

Trajectory estimation using the measurement of arrival angles from space-based infrared sensors is one of the key technologies in the space early warning system. This paper presents a pseudolinear measure-Kalman estimator for trajectory estimation in boost-phase. Compared with EKF and CRLB, this estimator is more precise.

Select  |    Cite this article 
Zhang WeiJun;Yuan NaiChang;Li Yi;Zheng QiuRong
A Hybrid Method Based on ADI-FDTD and Its Celerity Algorithm
2005 Vol. 27 (9): 1507-1509 [Abstract] ( 1917 ) [PDF 510KB] ( 931 )    DOI:

The paper presents a hybrid method based on FDTD and ADI-FDTD, introduces a method of weighted average to reduce the reflection caused by two different methods on the boundary, and presents a celerity method for the linear, lossless and isotropic medium. The simulation shows that the method is feasible.

Select  |    Cite this article 
Jiang XiaoYong;Xie YongJun
The Calculation of Terminal Currents on an Arbitrarily Bended Cable
2005 Vol. 27 (9): 1510-1512 [Abstract] ( 1703 ) [PDF 407KB] ( 510 )    DOI:

In this paper, a unified formulation to determine the terminal currents of an arbitrarily bended cable excited by a plane wave at any polarization angle is presented. Both the influence of the earth and the curve of cable on the terminal currents are considered in this paper. The method given in this paper is of great significance to the reinforcement of the electronic systems and EMC research.

电子与信息学报
Author Center
Online Submission
Author Instruction
FAQ
Template
Copyright Agreement
MSN:je-jeit@hotmail.com
Links
More>>  
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech