2004 Vol.26 No.1, Published: 19 January 2004
Articles |
Info from EIS of NSFS |
|
|
|
|
|
|
Articles |
Xiang Bing; Wang Sheng; Li Le-min
A Sparse Multifiber and Wavelength Assignment Algorithm in WDM-Networks
|
2004 Vol. 26 (1): 1-6
[Abstract]
(
1655 )
[PDF 640KB]
(
677
)
DOI:
Constrained by the price and technology, not only the wavelength converters laid in WDM network but also the Wavelength Per Fiber (WPF) is limited. But there are usually some spare fibers in links, so it is important to make full use of these fibers to lower the blocking probability in WDM networks. This paper proposes a sparse multifiber and wavelength assignment algorithm based on dynamic traffic service WDM-networks. The simulation results show that by assigning sparse multifiber, the blocking performance can be obtained with fewer number of WPF.
|
|
Zhu Wen-tao; Xiong Ji-ping; Li Jin-sheng; Hong Pci-lin
Hierarchical Key Management in Secure Multicast
|
2004 Vol. 26 (1): 7-13
[Abstract]
(
1760 )
[PDF 883KB]
(
827
)
DOI:
Multicast is a preferred communication technique in multiple recipients and its importance is rapidly growing. The Internet Group Management: Protocol(IGMP) does not provide access control of the members. To provide communication confidentiality, traffic in secure multicast is encrypted with a session key known only by certified group members. Whenever there is a change in the group membership, the key has to be updated dynamically, thus key management is indicated as the sticking point in secure multicast rescarch. To be applicable to large scale multicast, hierarchical structure is introduced as a solution to the scalability problem of group key management. The paper addresses the logical key hierarchy and concentrates on the optimal structure problem of the key tree. A theoretical analysis is given in the paper with the result in correspondence with a previous experimental conclusion.
|
|
Zhan Zhi-qiang; Qiu Xue-song; Meng Luo-ming
The Network Managenent Service Access Model and Its Implementation
|
2004 Vol. 26 (1): 14-19
[Abstract]
(
1764 )
[PDF 1203KB]
(
661
)
DOI:
The characteristics of the network management service access in the Telecommunication Management Network (TMN) arc analyzed. According to these characteristics, the Network Management Service Access Model(NMSAM) applying extensible Markup Lan-guage(XML) and Model-View-Controller (MVC) architecture is presented. The implementation of the NMSAM is also given.
|
|
Zhu Chun-mei; Wu Wei-ling
A Novel Dynamic Sequential Allocation Algorithm of OVSF Codes
|
2004 Vol. 26 (1): 20-26
[Abstract]
(
1666 )
[PDF 741KB]
(
692
)
DOI:
This paper analyzes the feature of W-CDMA downlink OVSF code. A novel dynamic sequential allocation algorithm is presented according to code blocking ratio in the stochastic allocation. Low level codes are allocated firstly, and codes in the same level are allocated sequentially by order from low to high. The algorithm flow and system implemen-tation is specified. Finally, theoretical analysis and system simulation are presented. It is proved that it greatly reduces the code blocking probability and system overhead , which is valuable for engineering applications.
|
|
Li Ke-xiang①; Song Guo-wen②
Performance Analysis of Coherent Delay-Locked Loop Based on Interpolation and Integrate/Dump Filter
|
2004 Vol. 26 (1): 27-34
[Abstract]
(
1950 )
[PDF 988KB]
(
775
)
DOI:
A Coherent Delay-Locked Loop(CDLL) is proposed based on interpolation and integrate/dump filter for PN code tracking in DS-CDMA systems. The performance of the CDLL is investigated under AWGN and multi-user environments, and closed-form expres-sions for the timing adjustment error probability, steady-state timing squared root error, probability and Mean Time to Lose Lock (MTLL) are derived by employing appropriate Markov chain models. Finally, some numerical results are presented and analysis shows that those results also perform well in single path fading environment. The delay-locked loop is applied to the development of WCDMA BTS and WCDMA MT.
|
|
Xiao Kun; Wu Shi-qi
A New Distributed Power Control Algorithm
|
2004 Vol. 26 (1): 35-40
[Abstract]
(
1644 )
[PDF 625KB]
(
747
)
DOI:
This paper first proposes the prototype algorithm of an improved distributed power control (IDPC). In this algorithm, mobile units adjust their transmitter powers ac-cording to not only their power levels at last iterative step but also the largest and second smallest eigenvalues of the link gain matrix at current time instant. As for the prototype algorithm, link gains for all mobile units must be measured and large burden may be brought in at base stations. For this reason, the prototype algorithm is developed further in a dis-tributed way and thus lead to IDPC algorithm, in which both the positive receiver noise and constrained transmitter power are also considered. As a result, with IDPC algorithm, the CIR’s are balanced quickly and a superior outage performance to other algorithms is reached.
|
|
Liu Lin; Deng Ping; Fan Ping-zhi
A Cooperative Location Method Based on Chan and Taylor Algorithms
|
2004 Vol. 26 (1): 41-46
[Abstract]
(
2257 )
[PDF 640KB]
(
921
)
DOI:
In this paper, two location algorithms, i.e. Chan and Taylor series expansion methods, are analyzed and a cooperative location method based on Chan and Taylor algorithms is proposed. The performance of the cooperative location method is simulated under different channel environments, and the results show that the cooperative location method can significantly improve the location accuracy under bad channel environments.
|
|
Xiao Jian-hua; Zhang Ping
A Transmit Diversity Technique for OFDM
|
2004 Vol. 26 (1): 47-52
[Abstract]
(
1708 )
[PDF 669KB]
(
659
)
DOI:
A simple transmit diversity technique assumes that channel does not change over two symbol period of time. Therefore, this technique is not suitable for time varying channels. This paper modifies the transmit diversity technique to accommodate time varying channel (mobile multipath channel). Simulation results show that the proposed modification works well in fast varying channel.
|
|
Ma Xiao-hong; Lu Xiao-yan; Yin Fu-liang
Time Delay Estimation by Using Modified Crosspower Spectrum Phase Technique
|
2004 Vol. 26 (1): 53-59
[Abstract]
(
2458 )
[PDF 786KB]
(
1946
)
DOI:
The Crosspower Spectrum Phase (CSP) technique is a well known time delay estimation method. A relatively precise time delay estimation can be achieved by using it in the environment of weak noise and medium reverberation. The performance degrades sharply in the environment of low SNR and strong reverberation. The modified CSP algorithm is proposed in order to improve the performance of CSP. The weighting function of the proposed CSP method changes with the variation of SNR, and the time delay of arrival is accomplished via a weighted function of frames of CSP. Computer simulation results indicate that the proposed method will give satisfactory value of time delay estimation even in the environment of low SNR and strong reverberation.
|
|
Xiang Qian; Lin Chun-sheng; Gong Shen-guang
The Signal Structure Analysis of Non-Gaussian Noise Based on Wavelet Packet Transform
|
2004 Vol. 26 (1): 60-64
[Abstract]
(
1822 )
[PDF 532KB]
(
1194
)
DOI:
By exploiting wavelet packet transform to analyze signals both in time and frequency space, this paper researches the statistic property of non-Gaussian stationary noise and its signal structure. The results of classic optimum detector arc extended to the condition where the distribution of background noise is non-Gaussian and a new signal detection algorithm in non-Gaussian background noise is given. The simulated result justifies this method.
|
|
Duo Lei①; Li Chao①②
The Inverse Square Attack of Rijndael Cipher
|
2004 Vol. 26 (1): 65-71
[Abstract]
(
1784 )
[PDF 714KB]
(
793
)
DOI:
Rijndael was selected as the AES. The best-known attack against Rijndael is still the one presented by the designers called Square attack. Square attack is a chosen plaintext attack. In this paper a new kind of attack called Inverse Square attack is presented which is a kind of chosen cipher text attack and better than Square attack. It also shows that if only inverse the moving direction of RotByte transformation of key schedule, the complexity of the attack will be 2~8-factor bellow the complexity of Square attack.
|
|
Sun Lin-hong; Ye Ding-feng; Lǚ Shu-wang; Feng Deng-guo
Composite Attack on Sequence Cipher
|
2004 Vol. 26 (1): 72-76
[Abstract]
(
1712 )
[PDF 491KB]
(
608
)
DOI:
The composite attack on sequence cipher is developed and forward feedback network is analyzed by the composition of correlation attack and inversion attack, both theory and experimental results show its complexity. Finally, comparison with normal attack is given.
|
|
Sun Xiao-chang①②; Huang fu Kan①; Yuan Jun-quan①; Wang Zhan①
Space-Time Adaptive Processor Rank-Reduced by Multistage Nested Wiener Filter
|
2004 Vol. 26 (1): 77-81
[Abstract]
(
1951 )
[PDF 595KB]
(
985
)
DOI:
An anti-jamming space-time adaptive processor rank-reduced by Multistage Nested Winner Filter(MSNWF) is presented in this paper. Such processor can overcome the need of freedom degrees in traditional array processing while maintains the computa-tional complexity requirements at a low level. Simulations proved such a processor can provide more freedom degrees under janimering senario and the ability to identify interfer-ences in a multidimensional spectrum at the AOA-frequency coordinates. Simulations also proved a low rank (D=10) is enough for the MSNWF space-time processor to approximate its full rank performance.
|
|
Yang Jun①②; Ma Xiao-yan①; Wan Shan-hu①
Weighted Myriad Filter Implementation with Genetic Algorithm in α-Stable Noise Environments
|
2004 Vol. 26 (1): 82-88
[Abstract]
(
1793 )
[PDF 736KB]
(
798
)
DOI:
A novel algorithm is proposed based on the genetic theory, which has global optimum searching characteristic. Meanwhile, considering its computational cost, decimal code, not binary one is used in operation of the operators. Moreover, a modified adaptive weights training algorithm is also used to resolve the weights fluctuant problem in stable range. Numerical simulations demonstrate that tlie genetic algorithm can converge at the global extremum quickly, and that weights estimation with the modified adaptive weights training algorithm have a more stable range, and the filtering performance has been improved obviously.
|
|
Wang Yan-ping; Peng Hai-liang; Yun Ri-sheng
Locating Calibrators in Airborne InSAR Calibration
|
2004 Vol. 26 (1): 89-94
[Abstract]
(
1715 )
[PDF 491KB]
(
943
)
DOI:
The condition number of sensitivity matrix is a key factor that influences the performance of InSAR calibration. On the basis of InSAR calibration theory, basic principles of locating calibrators are proposed, and constraints of locating calibrators are also derived. Under the theory of condition number minimization, an algorithm of locating calibrators is presented to minimize the sensitivity matrix condition number. Theoretic analyses and computing results show that the algorithm is efficient.
|
|
Gao Xiang-wu①②; Tian Xu-wen①; Yang Ru-liang①
Study on the Azimuth Resolution of Spaceborne SAR Working on Spotlight Mode
|
2004 Vol. 26 (1): 95-99
[Abstract]
(
2346 )
[PDF 676KB]
(
725
)
DOI:
From the difference of imaging geometry between spaceborne SAR, and airborne SAR, traditional formula computing the azimuth resolution of airborne SAR working on spotlight mode will bring big errors if it is used for spaceborne SAR. In this paper, the new formula of the azimuth resolution for spaceborne spotlight SAR. is presented, and the data simulation results validate the validity of the new method.
|
|
Tang Zi-yue①②; Zhang Shou-rong①
Influence of the Frequency Instability on the Bistatic-SAR Imaging
|
2004 Vol. 26 (1): 100-106
[Abstract]
(
1901 )
[PDF 865KB]
(
982
)
DOI:
The high stability of frequency sources is the foundation to the phase synchronization of the Bistatic Synthetic Aperture Radar (BiSAR) system. This paper analyzcs the influence of various frequence instabilities of sources in transmitter and receiver to the BiSAR imaging, and demonstrates the requirement to the source stability. The computer simulation results of BiSAR imaging with four types of frequency instabilities are presented.
|
|
Wang Rui①②; Yang Ru-liang①
Radar Doppler Properties Evaluation in Elliptic Orbits
|
2004 Vol. 26 (1): 107-111
[Abstract]
(
1858 )
[PDF 571KB]
(
686
)
DOI:
For spaceborne Synthetic Aperture Radar (SAR), Dopplcr property is one of the most important factors for azimuth performance. In this paper, the elliptic orbit is applied. The Doppler centroid frequency and Doppler frequency rate are evaluated in different orbit angle with the affection of attitude error considered. And the comparison with circular orbit is given. Finally, yaw steering is discussed.
|
|
Gao Huo-tao; Yang Zi-jie; Li Jie; Wei Zhong-wei
Design of a Small Broadband Array System for High-Frequency Surface Wave Radar
|
2004 Vol. 26 (1): 112-117
[Abstract]
(
1733 )
[PDF 710KB]
(
1111
)
DOI:
According to the requirements of engineering design for High-Frequency Surface Wave Radar (HF-SWR), at first, a small broadband transmitting antenna is optimized based on the theory of log periodic antennas. Then, based on the end-fire array theory, a small broadband twin-whip antenna with big forward to backward ratio is designed. And six twin-whip antennas are used as the fundrnental element to form 12 side plane array system. The working principle of 12 side array and the log periodic antennas are analyzed, and calculating result is given in this paper. A practical broadband antenna system for HF-SWR is designed.
|
|
Yan Dun-bao; Yuan Nai-chang; Fu Yun-qi
Research on Dielectric Layer PBG Structures in Waveguide Based on FDTD
|
2004 Vol. 26 (1): 118-123
[Abstract]
(
1679 )
[PDF 631KB]
(
682
)
DOI:
In this paper, a new dielectric layer PBG structures in waveguide is introduced, and numerical analysis to its stop-band characteristic is finished. The design of PBG structures and the effect of the size of period, the number of periods, the size of unit etc. are presented. And the conclusion is presented too. It is easy to design and manufacture waveguide filter using dielectric layer PBG structures.
|
|
Xiang Dong; Liu Xin; Xu Yi
Partial Scan Design Based on Circuit State Information and Conflict Analysis
|
2004 Vol. 26 (1): 124-130
[Abstract]
(
1584 )
[PDF 811KB]
(
564
)
DOI:
A multiple phase partial scan design method that breaks critical cycles using a combination of valid circuit state information and conflict analysis is proposed. It is quite cost-effective to obtain circuit state information via logic simulation, therefore, circuit state information is iteratively updated after a given number of partial scan flip-fiops being selected. When all critical cycles in the circuit are broken, our method turns to the con-flict resolution process using an intensive conflict-analysis-based testability measure conflict rather than reducing the sequential depth. The proposed method tries to eliminate the con-flicts and uses a conflict-analysis-based testability measure conflict. Sufficient experimental results are presented to validate the method.
|
|
Han Guo-dong; Zhang Xing-ming; Deug Yong; Wu Jiang-xing
A Kind of Priority-Based Self-Adapting I/O Scheduling Scheme for Integrated-Service Access System
|
2004 Vol. 26 (1): 131-136
[Abstract]
(
1768 )
[PDF 696KB]
(
576
)
DOI:
On the basis of the introduction of the integrated-service access system, this paper introduces a new kind of scheduling scheme called "priority-based parameter self-adapting round-robin I/O scheduling", and the implementation of this scheme in integrated-service access system is presented. The performances of several scheduling schemes are tested and compared in this paper.
|
|
Liu Lian-hui; Shi Jun; Li Bai-ping; Wang Jian-xin
Study of Chaotic Spread-Spectrum Sequences Based on Neural Networks
|
2004 Vol. 26 (1): 137-141
[Abstract]
(
1912 )
[PDF 669KB]
(
811
)
DOI:
The chaos generation neural network based on the excellent learning ability and synaptic weight database are built to generate many chaotic spread-spectrum sequences trained by the modified back-propagation algorithm with various discrete chaotic time series. The chaotic sequences are very easily generated by changing weights of neural network model, and their number is large. The computer simulation results show that the output chaotic sequences have good correlation property, balance property and linear complexity, therefore they are good candidates for the optimal encrypting code and the spread spectrum code.
|
|
He Guo-guang;Cao Zhi-tong;Chen Hong-ping;Zhu Ping
Controlling Chaos in a Neural Network Based on the Orbit Space Compression
|
2004 Vol. 26 (1): 142-145
[Abstract]
(
1889 )
[PDF 580KB]
(
651
)
DOI:
In this paper, a controlling chaos method of the orbit space compression is proposed for a Chaotic Neural Network(CNN). The computer simulation of the chaotic behaviors of the CNN proves that each pattern can be controlled using the orbit space compression. Starting from any initial state the CNN can converge in a stored pattern or its inverse pattern, which has the smallest Hamming distance with the initial state. The controlling method of the orbit space compression shows clear physical meaning and can be easily carried out.
|
|
Guo Qing-hua;Liao Gui-sheng
A Robust Adaptive Beamformer
|
2004 Vol. 26 (1): 146-150
[Abstract]
(
1896 )
[PDF 319KB]
(
927
)
DOI:
The linearly constrained adaptive beamformer is hypersensitive to the amplitude and phase errors of antenna array when the signal-to-noise ratio exceeds a certain threshold. Even if the array imperfections are slight, the beamformer suppresses the desired signals as if they are interference signals. In this paper, a robust adaptive beamformer in the presence of array imperfections is presented by improving the block matrix of the generalized side lobe canceller. Since this method is based on the structure of the generalize side lobe canceller, it is convenient to use its partial adaptive processing to reduce the computation load.
|
|
Liu Dong;Xiang Jing-lin
Fast HRP Algorithm Realization Methods Based on the Wavelet Multiresolution Decomposition
|
2004 Vol. 26 (1): 151-156
[Abstract]
(
1720 )
[PDF 698KB]
(
678
)
DOI:
The Matching Pursuit(MP) algorithms display good performance of recurring the orthonormal sparse structure of signals, but the signal decomposition process widely ex-hibits pre-echo artifact and local mismatch, so HRP algorithm was proposed by S. Jaggi, et al. to acquire more exact inner structure of signals. Unfortunely HRP algorithm is followed by more huge operation cost. The fast HRP algorithm is advanced at wavelet domain by tak-ing advantage of wavelet multiresolution decomposition, and a parallel algorithm framework is used to further reduce operation time. Theory and simulation trials indicate that HRP algorithm at wavelet domain not only reduces HRP operation cost greatly, but also improves the effect of the wavelet analysis, thus it is a promising technique applied in adaptive signal decomposition and feature extraction.
|
|
Zhang Xiao-ling;Zeng Bin;Huang Shun-ji
The Influence of the Rotating of the Cluster Micro-Satellite on Height Measurement of InSAR
|
2004 Vol. 26 (1): 157-162
[Abstract]
(
1757 )
[PDF 830KB]
(
782
)
DOI:
The cluster micro-satellite Synthetic Aperture Radar(SAR) system is an inno-vative SAR system brought forward recently. In the cluster micro-satellite system, tech-nology of cross-track interferometic SAR imaging processing is studied. The influence of the rotating of the cluster micro-satellite on the baseline and the interferometric phase is analyzed. The corrected formula of the baseline and the interferometric phase are derived. By computer simulation, the errors between corrected and uncorrected height measurement are compared. The analysis results verify the correction of the formula and the necessity to correct the baseline and the phase.
|
|
|
Info from EIS of NSFS |
|
2004 Vol. 26 (1): 163-164
[Abstract]
(
1379 )
[PDF 386KB]
(
754
)
DOI:
|
|
|
2004 Vol. 26 (1): 165-168
[Abstract]
(
1432 )
[PDF 914KB]
(
1068
)
DOI:
|
|