电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Quick Search  
  Advanced Search
2004 Vol.26 No.7, Published: 19 July 2004
Articles |
 
 
Articles
Select  |    Cite this article 
Zou Li; Zhao Yu-ping; Wang Bing; Xiang Hai-ge; Liang Qing-lin
A Novel Unitary Space-Time Modulation
2004 Vol. 26 (7): 1009-1016 [Abstract] ( 1957 ) [PDF 1737KB] ( 838 )    DOI:

In order to improve the spectral efficiency, this paper proposes a new framework for designing a modulation consisting of more than one modulation method. The new modulation method is able to provide better spectral efficiency while preserving the merits of Unitary Space-Time Modulation (USTM), such as low error rate and demodulation simplicity. The necessary condition for this set of modulations is presented and several different options satisfying the condition are given. Finally a novel modulation called Differential Phase Unitary Space-Time Modulation (DPUSTM) is designed as a special case. DPUSTM, which consists of USTM and Differential Phase-Shift Keying (DPSK) modulation, is not only easier to improve the spectral efficiency than USTM, but also simpler to demodulate. The novel modulation can achieve low bit error rate as UST signals and be exploited in multi-rate data communication. The simulation results not only verify the theoretical analysis, but also show that DPUSTM provides a better performance than USTM and DSTM.

Select  |    Cite this article 
Guo Ye-cai①②; Zhao Jun-wei
Novel Method Based on Signal-to-Noise Skew Ratio for Enhancing Quadratic Phase Dynamic Coupling Signals
2004 Vol. 26 (7): 1017-1023 [Abstract] ( 1701 ) [PDF 1305KB] ( 1066 )    DOI:

Signal-to-Noise SKew Ratio (SNSKR) is defined and its mathematical formula is obtained. A novel analysis based on the SNSKR is presented. When ambient noise is asymmetrical distributed noise, the SNSKR is equal to or greater than the original Signal-to-Noise Ratio(SNR); whereas the SNSKR is theoretically infinite value if ambient noise is symmetrical distributed noise. Theoretic analysis and simulation results have shown that the analysis is valid and that it is unnecessary to assume that the ambient noise is Gaussian distribution or asymmetrical distribution when employing third-order cumulant slices extracts the underwater target-radiated quadratic phase dynamic coupling signals. These conclusions are significance in engineering.

Select  |    Cite this article 
Jia Yan-guo; Xu Cheng-qian
Families of Sequence Pairs with Good Dyadic Correlation Properties
2004 Vol. 26 (7): 1024-1029 [Abstract] ( 1581 ) [PDF 997KB] ( 813 )    DOI:

This paper does more research on families of dyadic complementary codes pairs. Firstly, a new block design(dyadic addition set pairs) is presented. Secondly, the equivalent relationship between families of dyadic complementary code pairs and the new block design is given. Finally, families of dyadic complementary code pairs are constructed.

Select  |    Cite this article 
Wang Wei-xin;Wu Zhen-yang;Peng Yue-xing;Liu Chen
A Low-Complexity DOA Estimation Algorithm for Asynchronous DS-CDMA Systems
2004 Vol. 26 (7): 1030-1037 [Abstract] ( 1722 ) [PDF 1525KB] ( 810 )    DOI:

In this paper, a low-complexity DOA estimation algorithm is presented for asynchronous DS-CDMA systems with multipath propagation. First, the influence of multiacess interferences and noise is eliminated. Then, a group of correlation matrices constituted by the interested DOA’s is derived. Finally, according to the conventional MUSIC algorithm, DOA’s are resolved preciously from the above matrices. The algorithm has the advantages of low computation burden and high resolution. Simulation results confirm the effectiveness of the algorithm.

Select  |    Cite this article 
Peng Mu-gen;Wang Wen-bo
A Novel Dynamic Channel Allocation Scheme to Support Asymmetrical Services in TDD-CDMA Systems
2004 Vol. 26 (7): 1038-1044 [Abstract] ( 1859 ) [PDF 1653KB] ( 1084 )    DOI:

In TDD-CDMA system, the different asymmetrical requirements between uplink (UL) and downlink (DL) in different Base Station (BS) and different time will generate serious inter-cell interference. From the interference point of view, Dynamic Channel Allocation (DCA) is treated mandatorily on TDD-CDMA systems. In this paper, a novel and advanced DCA algorithm is presented, which is based on radio resource reserving related to pathloss assistance and BS-BS interference resolving mechanisms. Simulation results show the novel DCA can work better than the traditional DCA schemes for asymmetrical traffic.

Select  |    Cite this article 
Pan Zhi-bo;Zheng Bao-yu;Wu Meng
Study on a Key Update Mechanism for Secure Multicast Based on Time Stream
2004 Vol. 26 (7): 1045-1052 [Abstract] ( 1789 ) [PDF 1813KB] ( 1133 )    DOI:

Several emerging internet services by multicast force the research on secure multicast, and the research on key update is a big challenge. This paper designs a hash function of variable message digest and variable key length for a key update protocol that is proposed based on time stream, and analysises the overall performances for the protocol.

Select  |    Cite this article 
Li Yuan-zheng
A Security Multicast Scheme with the Hierarchical Group Key Management
2004 Vol. 26 (7): 1053-1056 [Abstract] ( 1647 ) [PDF 1040KB] ( 1017 )    DOI:

A new key management scheme applied for large dynamic multicast group is proposed in this paper. In the hierarchical structure one-way hash chain is used as transmission key to transmit the data between the levels. Digital envelope is used to realize key management in subgroups. This scheme is of good attributes in computation, storage and dynamic security. It provides a valuable reference to further study.

Select  |    Cite this article 
Weng Yi-fang;Weng Li-juan;Zhang Lei
Research on Chaotic Synchronized Secure Communication Schemes to Improve Security
2004 Vol. 26 (7): 1057-1063 [Abstract] ( 2049 ) [PDF 1576KB] ( 980 )    DOI:

The security of several typical chaotic synchronized secure communication schemes , as well as the respective unmasking methods are studied to find the way to improve the security. A new secure communication scheme based on active-passive decomposition using parameters perturbation technique, which makes it has a kind of dynamic secrete key, is analyzed in this paper. The dynamic secrete key contributes to the capacity against the unmasking methods. Computer simulation and security test results demonstrate that the scheme is high in security and good in synchronization properties , and that it is safe to the attack of the unmasking methods mentioned in this paper.

Select  |    Cite this article 
Ding Xu-xing; Zhu Ri-hong; Li Jian-xin
Image Compression Based on Integer Wavelet Transform and Improved Embedded Zerotree Wavelet Encoding
2004 Vol. 26 (7): 1064-1069 [Abstract] ( 1789 ) [PDF 1404KB] ( 984 )    DOI:

The main advantages of Integer Wavelet Transform(IWT) are that the input and output values are all integers, all operations can be done in place, only a small memory is required and easy to be implemented in hardware. In the context of image coding, IWT is well suited for lossless compression. However, it performs a little worse compared to the conventional Discrete Wavelet Transform(DWT) for lossy compression. In this paper, a new algorithm is proposed for improving lossy compression performance of IWT, It is by means of the IWT based on lifting scheme combining with improved Embedded Zerotree Wavelet(EZW) based on morphological dilation operation. Simulation results show the proposed algorithm improves the Peak Signal Noise Ratio(PSNR) compared to conventional DWT without increasing computational complexity.

Select  |    Cite this article 
Wu Yuan-ming; Li Tian-qian
A New Real-Time Image Zooming Method
2004 Vol. 26 (7): 1070-1075 [Abstract] ( 1611 ) [PDF 1150KB] ( 948 )    DOI:

A kind of interpolator, called the modified pixel-filled interpolator, is advanced for images enlarged the same integer times in lines as that in columns. The principle a.iul the implement method in software and hardware of the interpolator are given, Comparing with the nearest neighbor interpolator, the bilinear interpolator, the pixol-exchanged-intcrpolator and the wavelet-based zooming methods, the effects of enlarged images with this interpolator are better according to the subjective and objective evaluation to the enlarged images. Its implementation in software and hardware is easy, and can be applied to all kinds of image zooming.

Select  |    Cite this article 
Chen Han-feng; Qi Fei-hu
A Multi-level Elimination Algorithm for Fast Block Motion Estimation
2004 Vol. 26 (7): 1076-1081 [Abstract] ( 2055 ) [PDF 1451KB] ( 790 )    DOI:

A multi-level elimination algorithm for fast motion estimation is proposed in this paper. The most matched block of the current block is detected in the next frame with a multi-level elimination strategy in this algorithm. In the first level, some candidate blocks are eliminated by simple characters based blockmatching, needing only very few computation costs. Then in further levels, more detailed characters are used for block-matching to eliminate more candidate blocks until the most matched block is selected in the last level. Experimental results show that the proposed algorithm can work steadily and get very close performance to the full-search algorithm while a computation reduction of about 12~14 times, with respect to the full-search algorithm.

Select  |    Cite this article 
Wang Bin; Yao Qing-dong; Liu Peng; Zhang Ming; Wei Xiao-dong
The Hardware/Software Co-design of Audio Decoding Used in HDTV
2004 Vol. 26 (7): 1082-1087 [Abstract] ( 1749 ) [PDF 1513KB] ( 1268 )    DOI:

In this paper, Dolby AC3 standard is used as the audio decoding standard to research the hardware/software co-design method of HDTV audio decoding based on Virgo-IP-Core and a new method is present to realize the hardware/software partition by setting models for the key sub-functions of AC3 decoding program. That is, after decoding AC3 bit stream by software, the models are set up for the key sub-functions to get the extended instructions of RISC core. Through this extension, the speed of AC3 decoding is fastened, the memory space is reduced and the gates of the whole system are lessened. Next, the detail hardware of extended instruction is given. Finally, the performance of the whole system is analyzed by using the hardware/software co-evaluation method.

Select  |    Cite this article 
Jin Liang-nian; Wang Ying-sheng; Zou Chuan-yun
Performance of Infrared OPPM-CDMA Systems Using Optical Orthogonal Codes (n,ω,λac)
2004 Vol. 26 (7): 1088-1093 [Abstract] ( 1759 ) [PDF 1318KB] ( 789 )    DOI:

The effect of the multiple-user interference, the receiver shot noise, ambient light interference, the receiver dark current and the thermal noise are taken into account. A probability union bound and the pessimistic estimation method are used that decision errors may occur on condition that two decision measurements are equal. The upper bounds of the bit error (BER) of infrared Overlapping Pulse-Position Modulation (OPPM)/Code Division Multiple Access (CDMA) correlation receiver without optical hard-limiters, with single optical hard-limiters and with double optical hard-limiters for arbitrary AQ and Ac are derived. Moreover, the performance analysis and comparisons for aforementioned three receivers are presented by computer simulation.

Select  |    Cite this article 
Lei Xia; Tang You-xi; Li Shaoqian; Xiao Yue
Optimization Arithmetic for the Power Allocation Scheme on Partial Transmit Sequences
2004 Vol. 26 (7): 1094-1100 [Abstract] ( 1843 ) [PDF 1228KB] ( 837 )    DOI:

When the total transmitting power is limited, the authors investigate the effect of different power allocation schemes on the side-information and the arithmetic to obtain the optimal power allocation coefficient for the system with Partial Transmit Sequences (PTS). Besides, the authors propose a new simple arithmetic to obtain the sub-optimal coefficient. The simulation results indicate that reducing a little power on every data carrier will obtain large gain on side-information carriers. With increasing the signal to noise ratio, the system is apt to averagely allocate the total power on every carrier. The bit error rate with the optimal or sub-optimal coefficient is close to the ideal value.

Select  |    Cite this article 
Jiang Hao; Yan Pu-liu; Xia De-lin; Chen Xiao
A Dynamic-Weight RED Gateway
2004 Vol. 26 (7): 1101-1106 [Abstract] ( 1877 ) [PDF 1390KB] ( 907 )    DOI:

The congestion control mechanisms used in Internet have been the focus of numerous studies and have undergone a number of enhancements. However, even with these enhancements, TCP connections still experience alarmingly high loss rates, especially during times of congestion. The IETF has addressed this problem by advocating the deployment of active queue management mechanisms, such as RED, in the network, But RED have some problems, for example the average queue length changing slowly when congestion starting and ending. To alleviate this problem, a Dynamic-Weight RED(DWRED) is proposed which can quickly be conscious of the congestion and dynamic adjust the weight. DWRED use the average queue length to estimate the change of the queue and adjust the weight to alleviate the congestion and drop when the congestion is over. The time of congestion is shorter than the RED. The result is proved by the simulation.

Select  |    Cite this article 
Yan Shao-hu; Zhuo Yong-ning; Wu Shi-ji; Guo Wei
Analysis on Energy Consumption in Transmission of IEEE802.11 DCF
2004 Vol. 26 (7): 1107-1113 [Abstract] ( 1825 ) [PDF 1566KB] ( 1067 )    DOI:

In saturated IEEE 802.11 WLAN, the energy consumption in transmission per frame through basic mode and RTS/CTS mode is analyzed through mathematical model. The relation of RTS threshold and average energy consumption per frame is produced in the assumption that the frame payload’s length is distributed in a given interval. Further analysis shows there is an optimum RTS threshold that can minimize the average energy consumption. The method of calculating optimum RTS threshold is also presented. All theoretical analysis is validated through computer simulation.

Select  |    Cite this article 

Xiang Bing; Wang Sheng; Li Le-min


A Traffic Grooming Algorithm Based on Shared Protection in WDM Mesh Networks
2004 Vol. 26 (7): 1114-1119 [Abstract] ( 1757 ) [PDF 1421KB] ( 810 )    DOI:

In WDM networks, the bandwidth request of a traffic stream can be much lower than the capacity of a wavelength. Traffic grooming can aggregate low-rate connections onto high-capacity lightpaths to make full use of the bandwidth. But most of the researches related to traffic grooming has focused on ring networks, and fewer concerns are about the dependable traffic grooming of low-rate connections in WDM mesh networks. In this paper, a Shared Protection Traffic Grooming algorithm is proposed based on wavelength Layered-Graph (SPTG-LG) considering both the survivability and traffic grooming in WDM mesh networks. Some simulations and analysis are also given out.

Select  |    Cite this article 
Guo Zhi①②; Ding Chi-biao; Wu Yi-rong
A Real-Time Data Processing System for High Resolution Airborne Synthetic Aperture Radar
2004 Vol. 26 (7): 1120-1125 [Abstract] ( 1995 ) [PDF 1584KB] ( 954 )    DOI:

Design and realization of a real-time high-resolution SAR data processing system is proposed. By the adoption of PowerPC G4 as DSP, VME as system bus and RACE++ as high speed data exchange path, this stable system has great performance and flexible expansibility. To fit different requirement of real-time SAR data processing system, variable performance can be achieved by simply extension.

Select  |    Cite this article 
Ren Dong-chen; Tang Zi-yue; Zhang Shou-rong
The Imaging Technique of Bistatic SAR with Stationary Transmitter to Moving Targets
2004 Vol. 26 (7): 1126-1130 [Abstract] ( 1578 ) [PDF 916KB] ( 866 )    DOI:

This paper studies the imaging of moving target in the situation of the bistatic synthetic aperture radar with stationary transmitter. The WVD-Radon method is used to estimate the Doppler frequency parameter of the moving target, and to adjust the parameter of the imaging and the motion compensation to get better imaging result. The results of computer simulation are given to demonstrate that the conclusion of the paper is correct.

Select  |    Cite this article 
Yang Jun①②; Ma Xiao-yan; Wan Shan-hu; Qin Jiang-min
A Scheme of Accurate Estimation on Scaling Factors for Radar CFAR Detectors
2004 Vol. 26 (7): 1131-1136 [Abstract] ( 1772 ) [PDF 1388KB] ( 893 )    DOI:

Using the perfect properties of Radial Basis Function (RBF) neural networks, such as approximation any non-linear mapping and quick convergence, a new scheme is proposed to estimate scaling factors for radar CFAR detectors. Owing to few constraints, it can estimate scaling factor for single radar as well as radar netting system. The numerical results indicate that the proposed scheme can quickly reach high estimation accuracy for most CFAR detectors.

Select  |    Cite this article 
Liu Ben-yong
Subspace Methods of Radar Target Recognition Using Range Profiles
2004 Vol. 26 (7): 1137-1143 [Abstract] ( 1663 ) [PDF 1434KB] ( 842 )    DOI:

Eigen-subspace and canonical-subspace methods are studied and applied to feature-extraction for target recognition using range profiles of a High-range-Resolution-Radar (HRR) system. Based on this study, a subspace cluster method is proposed to tackle the problem of aspect-sensitivity of range profiles. In subspace cluster method, the aspect scope of a radar target is divided into a proper number of zones, and eigen-subspaces are established for each zone. After the zone number of an unknown target is determined by radar, the range profile of this target is mapped into eigen-subspaces of the corresponding zone, and the class whose subspace has the maximum mapping energy is judged as the right class to which the unknown target belongs. This method is named as single-mode classification rule in the subspace cluster method. Experimental results on simulated data and field data show the efficiency of the subspace methods and subspace cluster method in target recognition.

Select  |    Cite this article 
Wang Jian-guo; He Pei-kun; Han Yue-qiu; Liu Xian-xing
Road Identification in Ground Target Tracking
2004 Vol. 26 (7): 1144-1149 [Abstract] ( 1551 ) [PDF 1046KB] ( 938 )    DOI:

A fast effective algorithm is developed for the road identification problem in ground target tracking. A mathematic model of road identification problem is provided and the problem is related with a positive definite quadratic programming problem with inequality constraints. The optimality conditions are given and a road identification method based on active set algorithm is proposed. The two different simulation examples verify the feasibility and efficiency of the above algorithm.

Select  |    Cite this article 
Peng Zhi-ping; Li Shao-ping
A Modeling Method of MAS Based on Combining Aalaadin Meta-Model with AUML
2004 Vol. 26 (7): 1150-1156 [Abstract] ( 1870 ) [PDF 1578KB] ( 983 )    DOI:

Since the information fails to be expressed integrally in the agent organization model constructed by the single Aalaadin meta-model and it appears difficult in directly modeling with Agent Unified Modeling Language (AUML), a new modeling method (i.e. Aalaadin-AUML modeling method) combining the Aalaadin meta-model with AUML is presented after pointing out the existing mutual supplements in the both. Taking an agent organization of the distribution management in e-business for example, the modeling process is introduced based on this new method. As it is proved by practice, Aalaadin-AUML modeling method expends the ability of information expression and unifies the notion and understanding in the organization model of multi-agent system.

Select  |    Cite this article 
Wang Zhan-hui; Liu Gui-zhong; Liu Long; Liu Jie-yu
A Fast and Accurate Moving Object Extraction Method from Compressed Video Stream
2004 Vol. 26 (7): 1157-1162 [Abstract] ( 1975 ) [PDF 1234KB] ( 814 )    DOI:

In the light of most current segmentation algorithms are of high complexity and huge computation, one algorithm of coarse segmentation in compressed domain and refined segmentation in spatial domain is put forward. The initial coarse segmentation masks from the motion vectors are obtained by applying Estimation Maximum(EM) algorithm. These blocks in the masks can be decompressed to obtain the origin image and the actual edges of the objects can be extracted by applying Canny edge detection and edge tracking only in the segmented regions. By using the proposed algorithm, the amount of data needed to be processed is kept in necessarily minimal, saving the computation time as well as gaining the pixel-wise edges of the segmented objects.

Select  |    Cite this article 
Yang Xin-yu; Wei Heng-yi; Cheng Zhu-lin
A Novel Network Traffic Sampling Measurement Method Based on Event-Driven and Its Application Research
2004 Vol. 26 (7): 1163-1167 [Abstract] ( 1805 ) [PDF 824KB] ( 1020 )    DOI:

This paper researches mainly 011 the network traffic sampling measurement methods. The Stratified Random Double Sampling method based on Event-driven (ESRDS) is proposed. It’s performance is proved to be better than traditional methods in analyzing the length and interval of packets according to simulation experiments. Especially, estimated interval time of packages by this method is nearly real. It also researches on the measurement methods in the calculating Hurst coefficient. According to the estimation of Hurst coefficient using ESRDS method, the error is much less between estimated and real values.

Select  |    Cite this article 
Liu Hong-min; Zhang Rui; Yin He-jun
Reliability Analysis of Spaceborne EPC
2004 Vol. 26 (7): 1168-1172 [Abstract] ( 1713 ) [PDF 977KB] ( 1690 )    DOI:

Spaceborne Electronic Power Controller(EPC) works in severe environment and its lifetime must be over 3 years. Therefore its reliability should be under great consideration. This paper, analyzes on the reliability of EPC used in weather satellite and the estimations of its A and Mean Time Between Failures(MTBF) are given.

Select  |    Cite this article 
Wang Rui; Yang Ru-liang
Two-Dimensional Automatic Gain Control in Synthetic Aperture Radar
2004 Vol. 26 (7): 1173-1176 [Abstract] ( 1660 ) [PDF 816KB] ( 879 )    DOI:

In this paper, a method of automatic gain control for synthetic aperture radar is given. In this way, radar signal is processed in two dimensions. Comparison to the traditional AGC, this method keeps the properties of signal and widens the dynamic range of the receiver. Then the operation mode and coefficient of 2-Dimensional AGC are described, and the computer simulation results and the real radar image are given.

电子与信息学报
Author Center
Online Submission
Author Instruction
FAQ
Template
Copyright Agreement
MSN:je-jeit@hotmail.com
Links
More>>  
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech