电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Quick Search  
  Advanced Search
2003 Vol.25 No.11, Published: 19 November 2003
Articles | 论文 | Reviews | Discussions |
 
 
Articles
Select  |    Cite this article 
Ma Zhangyong; Liu Yaran; Zhao Chunming; You Xiaohu
The joint inerative channel estimation and decoder algorithm for the ofdm system
2003 Vol. 25 (11): 1441-1446 [Abstract] ( 1968 ) [PDF 1181KB] ( 821 )    DOI:

For the QPSK-modulated OFDM system, the channel estimation accuracy can be improved using of the soft information which is based on the iterative decoder principle of Turbo. Meanwhile, in order to avoid serious error propagation due to the error decision of the decoder, the weighted iterative estimation algorithm is proposed. The simulation results show that the proposed algorithm improves the system performance dramatically compared with the conventional scheme.

Select  |    Cite this article 
Qu Daiming; Zhu Guangxi; Chen Zhonglin
A practical pilot-based channel estimation method for space-time coded ofdm system
2003 Vol. 25 (11): 1447-1451 [Abstract] ( 1523 ) [PDF 934KB] ( 734 )    DOI:

This paper deals with pilot-based channel estimation of space-time coded OFDM system in frequency selective channels. DFT-based LS and LMMSE method are studied. A practical channel estimation method is proposed. In proposed method the complexity of LS and LMMSE methods is greatly reduced by optimally designing the pilot symbols. And the performance demonstrated by simulation is close to idea channel information.

Select  |    Cite this article 
Zhao Zheng; Yin Qinye; Zhang Hong; Zhang Jianguo
Direct decoding in a space-time block code for frequency-selective fading channels
2003 Vol. 25 (11): 1452-1462 [Abstract] ( 1659 ) [PDF 1131KB] ( 698 )    DOI:

This paper proposes a decoding scheme in space-time block code system with three transmitting antennas and one receiving antenna for frequency-selective fading channels, which does not require channel estimation at the transmitter or receiver. By applying the subspace method to space-time codes, the direct decoding is accomplished from both a signal processing and space-time coding perspective. With the special orthogonal design of space-time block codes, the input of the space-time block code system is obtained from the subspace. The direct decoding is addressed for frequency-selective fading channels from a single carrier perspective. Monte Carlo simulations show the performance of direct decoding and the performance com-parison with the decoder using the perfect channel information.

Select  |    Cite this article 
Shen Jianfeng; Wang Zongxin
A toa estimation method with high resolution
2003 Vol. 25 (11): 1463-1468 [Abstract] ( 1804 ) [PDF 907KB] ( 529 )    DOI:

A Time-Of-Arrival(TOA) estimation method for CDMA system with high reso-lution is proposed. The integrate-dump circuits are used to sample the received signals while the sampling rate is not raised, then the Discrete-Fourier-Transform(DFT) is used to transform the discrete signals to frequency domain. Based upon the CDMA signal model, the multipath channel model and the discrete frequency spectrum of the known spreading codes, the integer part of TOA with multiples of a chip interval is estimated. Then least square method in discrete frequency domain is used to estimate the remainder fractional part of TOA. This method has the high resolution with low operation volume while the sampling rate is not high, so it is an effective and high precise TOA estimation method.

Select  |    Cite this article 
Zeng Zhaohua; Liu Guizhong; Zhao Jianping
Determining of convergent threshold and step-size for lms and normalized lms algorithm
2003 Vol. 25 (11): 1469-1474 [Abstract] ( 2882 ) [PDF 1252KB] ( 756 )    DOI:

Based on eigenvalue distributing of input signal, the convergent necessary, condi-tions for LMS and Normalized LMS(NLMS) algorithm are again researched through the accu-rate analysis of the misadjustment. To avoid blindness for applying LMS and NLMS algorithm, the convergent threshold and the simple adaptive calculating formula for the step-size of them are proposed. The influence of eigenvalue distributing of input signal and order of filter on the threshold of step-size is also analyzed. Compared with an existing algorithm, the characters of lower computational complexity, practicality and stronger adaptive are shown and the satisfied misadjustment is achieved by adopting the presented method for calculating the step-size.

Select  |    Cite this article 
Mi Liang; Zhu Zhongliang
Comparison of performance between chaotic sequences and nonlinear sequences based on shift register
2003 Vol. 25 (11): 1475-1481 [Abstract] ( 1766 ) [PDF 1312KB] ( 746 )    DOI:

Both chaotic sequences and nonlinear feed-forward logic (NLFFL) sequences based on linear shift register almost have the same properties: the ease of their generation and various families with a large family size and long sequence period, as well as their broadband noise-like and non-linear nature. Their generation methods, correlation properties, Code Division Multi-ple Access (CDMA) properties and their resistance against correlation attack are compared in the paper. By simulation, it shows that most of their properties are comparable, but chaotic sequences are less vulnerable to correlation attack and jamming than some NLFFL sequences when their period is less than or equal to 1023, so they have more practical value than these nonlinear sequences based on shift register.

Select  |    Cite this article 
Zhong Hua; Liu Fang; Jiao Licheng
A novel fragile watermark technique based on image feature
2003 Vol. 25 (11): 1482-1487 [Abstract] ( 1615 ) [PDF 1623KB] ( 574 )    DOI:

In this paper, a novel fragile watermark technique is proposed, which is based on the method of Yeung-Mintzer’s (1997). To resolve the existing security problem, a chaotic key which is based on image feature is used to control the embedding of fragile watermark. Theoretical analysis and experimental results demonstrate its effectiveness in resisting possible attacks. And because the watermark is embedded in pixel-wise order, the technique has good ability of detecting local alterations.

Select  |    Cite this article 
Wang Chongwen①②; Li Jianwei; Chen Weimin
Fingerprint classification using hmm and svm
2003 Vol. 25 (11): 1488-1493 [Abstract] ( 1739 ) [PDF 1340KB] ( 1061 )    DOI:

In this paper, a new classification method is proposed that is based on HMM and SVM using FingerCode. This technique uses FingerCode as representation of fingerprint, first, using five HMM classifiers to classify originally, furthermore, basing on the most possible two results of classification by HMM, the corresponding SVM classifier is selected to make final decision. Through experiments, the performance of this method reaches or exceeds many popular ones and has value to a certainty in practice.

Select  |    Cite this article 
Pei Jihong; Yang Xuan
Pre-extracting support vector for support vector maching using bi-color voronoi diagrams
2003 Vol. 25 (11): 1494-1498 [Abstract] ( 1739 ) [PDF 1122KB] ( 656 )    DOI:

Support Vector Machines (SVMs) are a new generation learning system based on recent advances in statistical learning theory. SVMs have many well features that make them attractive for small samples, nonlinear and high dimensional pattern recognition. However, choice of Support Vectors(SVs) is difficult in SVMs, which is a bottleneck problem. In this paper, a novel method using bi-color Voronoi diagram is proposed to pre-extract SVs based on Voronoi diagram. Considering the distribution feature of samples space, this method determi-nates SVs based on the bi-color Voronoi diagram before training SVMs. Learning is based on these pre-extracted vectors. Experiments show that this method is feasible and effective.

Select  |    Cite this article 
Wang Haiming; Guo Shide; Yu Daoheng
A new kind of shadow detector based on cnn-ubn
2003 Vol. 25 (11): 1499-1504 [Abstract] ( 1777 ) [PDF 1138KB] ( 672 )    DOI:

In this paper, a new kind of two-dimensional Cellular Automata (CA) is studied. Several algorithmic rules are discovered that can be used to design new Cellular Neural Networks (CNN) which can implement shadow detector and overstriking for character recognition. Their Boolean expressions and learning algorithms are introduced detailedly. The results of computer simulation confirm that this new approach is simpler and more effective than that given in the literature. Furthermore, these results also confirm that new CNN can be designed with CA rules and find a novel method to design CNN.

Select  |    Cite this article 
Zhang Jianming; Yang Dacheng
Linear modeling methods for cdma network planning
2003 Vol. 25 (11): 1505-1513 [Abstract] ( 1491 ) [PDF 1583KB] ( 569 )    DOI:

This paper presents some modeling methods for CDMA network planning applica-tions. Linear equations are used for modeling CDMA multi-cell networks and iterative methods are adopted for solving the equations. The simulation results based on these models are pre-sented in this paper. The analysis shows that the results are fairly accurate, so the models can be used in real networks perfectly. What’s more, the methods are easy to be implemented on computer platforms. Thus, these modeling methods can be used as the core algorithms of planning softwares, perspectively.

Select  |    Cite this article 
Shi Ruirong; Jing Linjiao; Song Fuming; Shen Ting; Li Jianxiong
Pepeat-pass interferometry with airborne synthetic aperture radar
2003 Vol. 25 (11): 1519-1524 [Abstract] ( 2070 ) [PDF 1444KB] ( 775 )    DOI:

In this paper, the interferomtric experiments on airborne L-SAR system of IECAS is demonstrated. And data obtained from experiments are processed, and Chinese first DEM with repeat-pass airborne SAR, which nearly accords with the real topographic map, is obtained, and its height accuracy is about 10m. A new imaging coregistration method for crossed-orbit is presented and its effectiveness is tested by airborne data.

Select  |    Cite this article 
Zheng Mingjie; Yang Ruliang
Sar moving targets detection based on dpca and interferometric processing
2003 Vol. 25 (11): 1525-1530 [Abstract] ( 2280 ) [PDF 1070KB] ( 803 )    DOI:

This paper puts forward a new method of detecting three-aperture Synthetic Aperture Radar (SAR) ground moving targets after studying Displaced Phase Center Antenna (DPCA) and interferometric processing technique. This method can not only discover moving targets but also estimate the targets parameters such as real positions and velocities. Furthermore it is simpler and needs fewer computations. Finally some typical computer simulation results are presented which illustrate the method’s validity.

Select  |    Cite this article 
Zhao Xiwen①②; Zhang Shourong; Wang Weiyan
A new microwave imaging method for earth observation
2003 Vol. 25 (11): 1531-1535 [Abstract] ( 1899 ) [PDF 974KB] ( 661 )    DOI:

Microwave imaging techniques which can provide all-weather, day-and-night imag-ing capability have important applications to many scientific fields. It is an active area to ex-plore new microwave imaging ideas, systems and techniques. In this paper, a new microwave imaging method for earth observation is proposed. In this method, the signal transmitter and receiver are located in different platforms, and only a monochromatic microwave is required to illuminate the earth surface. Numerical simulation results show that this method can produce a microwave image with high spatial and radiation resolutions.

Select  |    Cite this article 
Nie Jianying①②; Li Xingguo; Lou Guowei
Extremal solution of the target\’s brightness temperature in millimeter wave radiometric measurements
2003 Vol. 25 (11): 1536-1541 [Abstract] ( 1798 ) [PDF 815KB] ( 648 )    DOI:

The near sensing techniques with millimeter wave play important role in many fields. To make precise measurements of the radiometric brightness temperature of a target, one must set up model of the interaction between the electromagnetic radiation properties of the antenna and the incident radiation from the environment. This interaction can be described by Fredholm integral equation of the first kind which is extremely unstable. In this paper, a inversion method is presented and is then applied to retrieve armored target’s brightness temperature in millimeter wave radiometric measurements.

Select  |    Cite this article 
Xing Feng①②; Ren Liehui; Xu Cheng; Zhou Bin; Song Wenmiao
Finite element analysis of the waveguide system based on the operator theory of vector wave function space
2003 Vol. 25 (11): 1542-1547 [Abstract] ( 1959 ) [PDF 903KB] ( 880 )    DOI:

This paper presents a finite element method for the analysis of waveguide system without spurious modes. Prom the operator theory of the vector wave function space, a succinct and complete electromagnetic wave equation set is derived and the electiic field intensity vector can be expressed by two scalar functions. These two scalar functions are numerically computed by using finite element method so that the parameters of the waveguide system can be obtained. The method is demonstrated by the calculation of the reflection coefficients of the rectangular waveguide with an inductive diaphragm and the rectangular waveguide with an E-plane step respectively.

Select  |    Cite this article 
Li Haitao; Zhang Jing; Lu Jianhua
Performance of ultra-wideband impulse radio wireless communication system in multipath and multiuser environments
2003 Vol. 25 (11): 1564-1569 [Abstract] ( 1766 ) [PDF 779KB] ( 609 )    DOI:

Ultra-wideband impulse radio is a developing high speed wireless access technology. In this paper, the principle of ultra-wideband multiaccess communication is analyzed with the transmitting signal. In order to study the system performance in mulitpath channels, the deterministic two-path model and the statistical S-V model are employed for evaluating the bit error rates of the system by simulation. The results indicate that the intersymbol interference and multiple access interference are the main factors that degrade the system performance, which, on the other hand, may be improved by antenna diversity.

Select  |    Cite this article 
Zhao Chunhui;Li Fuchang
A blind audio watermark algorithm base on dwt and dct
2003 Vol. 25 (11): 1570-1574 [Abstract] ( 2146 ) [PDF 963KB] ( 796 )    DOI:

This paper presents a novel blind audio digital watermark algorithm. It makes full use of the multi-resolution of DWT and the energy compression of DCT and embeds binary image watermark in the audio by quantification process. The watermark can be extracted without the original audio signal. Experimental results demonstrate the algorithm is robust and imperceptible.

Select  |    Cite this article 
Fu Xinwei; Yu Qiuxing; Li Zhishun
Target recognition based on multiresolution fractal feature
2003 Vol. 25 (11): 1575-1577 [Abstract] ( 1546 ) [PDF 472KB] ( 683 )    DOI:

In this paper, echoes are decomposed based on wavelet multiresolution analysis. It is shown that the energy of wavelet coefficients is exponential to the decomposed scale in some degree, which is similar to the definition of fractal dimension. Hence, two sorts of features are extracted and applied to recognizing five classes of echoes. The recognition results are satisfactory.

Select  |    Cite this article 
Liu Yuan; Yin Qing; Zhang Limin
A verifiable dynamic secret sharing scheme
2003 Vol. 25 (11): 1578-1580 [Abstract] ( 1597 ) [PDF 463KB] ( 699 )    DOI:

In the paper, an improved secret sharing scheme based on elliptic curve cryptography is proposed. It guarantees the mutual identity authentication between the legal dealer and the participating parties and can protect against the cheating action. The problems of renew and reuse are properly treated. The scheme may be applicable in practical network communication.

Select  |    Cite this article 
Zhao Chenglin
A new edge-reserve filtering algorithm
2003 Vol. 25 (11): 1581-1584 [Abstract] ( 1735 ) [PDF 939KB] ( 1246 )    DOI:

In this paper, a new edge-reserve filtering algorithm is presented. It adaptively adjusts the size of the filter’s supporting area according to the local variance of the interested area. The bigger the local variance is, which means the more high frequency texture information is contained in this area, the smaller the support area will be. In order to protect the edges of the image when it is filtered, this algorithm will divide the pixels in its supporting area into several groups according to the angle between its direction and the mean gradient of this area. By this way, pixels along the content edges will be given a bigger weight factors than pixels that are vertical to the image edge. Thus protect the edges from being blurred by the filtering process. The simulation results show that this algorithm is better than median filter both in terms of PSNR values and subjective image qualities. For pictures that are rich in texture information, the PSNR gain could reach 3dB higher.

论文
Select  |    Cite this article 
Hu Guojie; Feng Zhengjin
Security property of a class of digital chaotic encryption system
2003 Vol. 25 (11): 1514-1518 [Abstract] ( 1580 ) [PDF 780KB] ( 778 )    DOI:

Under Kirchhoff principle, the security property of digital chaotic encryption system is discussed using chosen-ciphertext attacking. The key of the encryption system can be got by chosen-ciphertext attacking. The digital chaotic encryption system based on digital filter does not have high privacy.

Reviews
Select  |    Cite this article 
Yu Yunhua①②; Liu Yang; Shi Yin
Progress on key techniques of in-band on-channel digital audio broadcast
2003 Vol. 25 (11): 1548-1557 [Abstract] ( 1666 ) [PDF 2031KB] ( 766 )    DOI:

A Digital Audio Broadcasting(DAB) system, which is based on advanced technique of Coded Orthogonal Frequency Division Multiplexing (COFDM), can provide improved per-formance of high robustness and virtual CD-like quality. In-Band On-Channel(IBOC) digital audio systems have the capability of simultaneously transmitting both analog and digital signals (in hybrid mode)within the allocated channel mask, allowing full compatibility with existing analog receivers, and will accomplish smooth transition from analog broadcasting to all-digital mode DAB at low cost. The authors analyze the spectrum of Frequency Modulation (FM) IBOC DAB, and presents basic structures of FM IBOC DAB transmitting system and receiver, introducing key technologies of Perceptual Audio Codcr(PAC), Forward Error Coding(FEC), OFDM, First-Adjacent Canceling(FAC), Time Diversity Delay (TDD)and Audio Blend(AB). By careful comparison and analysis, some advice on development of Chinese IBOC DAB is given.

Discussions
Select  |    Cite this article 
Chen Xiaoyi; Yao Qingdong; Liu Xiaocheng
The vmsk modulation delusion
2003 Vol. 25 (11): 1558-1563 [Abstract] ( 1982 ) [PDF 986KB] ( 615 )    DOI:

H. R. Walker presented a high spectral efficiency modulation (VMSK). It can reach 30 bit/(s·Hz) simply without loss of SNR in his analysis. There are papers introduce this technology in China too. But, through deeply analysis based on the engineering point, a very regrettable conclusion is obtained, i.e, this technology is a beautiful rainbow!

电子与信息学报
Author Center
Online Submission
Author Instruction
FAQ
Template
Copyright Agreement
MSN:je-jeit@hotmail.com
Links
More>>  
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech