电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Quick Search  
  Advanced Search
2000 Vol.22 No.5, Published: 19 September 2000
Articles | Discussions |
 
 
Articles
Select  |    Cite this article 
He You;Liu Dajin;Peng Yingning;Xiong Wei
DISTRIBUTED MULTISENSOR TRACK FUSION WITH FEEDBACK INFORMATION
2000 Vol. 22 (5): 705-714 [Abstract] ( 1852 ) [PDF 1500KB] ( 554 )    DOI:

In order to improve the tracking performance of local sensors in distributed multisensor data fusion systems,this paper discusses the state estimation technique of multisensor tracking with feedback information.Based on the single sensor Kalman filtering equations and distributed estimation solutions with feedback information,this paper presents the track fusion equations with and without feedback information in multicoordinate systems,and proves that two kinds of track fusion solutions are optimal and equivalent in the form of the theorem.The simulation results show that the multisensor data fusion system can not only increase the global estimation accuracy of target but also greatly improve the tracking performance of local nodes by using the feedback information.With respect to multiradar integration tracking,it is suitable for using 2~4 local sensors in data fusion system.

Select  |    Cite this article 
Chen Haifeng;Shao Jiayu; Chen Weinan
A NEURAL ALGORITHM FOR ESTIMATING THE 3D RIGID BODIES’MOTION PARAMETERS
2000 Vol. 22 (5): 715-722 [Abstract] ( 1772 ) [PDF 1265KB] ( 651 )    DOI:

This paper deals with estimating the rigid bodies’motion parameters from token correspondence between two perspective views.Total least square(TLS)method is used to solve the linear equations of motion estimation.Then a minor component analysis (MCA)neuron is constructed to get the TLS solution.Finally a outline resisting version of the learning rule is developed by using the statistical approach.Comparative experiments have been made and results show that our robust rules improve the performance significantly when outliers are presented.

Select  |    Cite this article 
Zhou Yue; Liu Xun;Xiang Jinglin
CLASSIFICAION OF THE RADIATED NOISE OF THE SHIP BY THE FUZZY NEURAL NETWORK
2000 Vol. 22 (5): 723-728 [Abstract] ( 1763 ) [PDF 968KB] ( 712 )    DOI:

The paper deals with the spectrum features,the fractal characteristics of the shipradiated noise,and researches the relationship between them;also,it takes advantage of them to distinguish the types of the ships.At the same time,a fuzzy neural network is used to be a classifier,and its particular superiorities are discussed.The classification processing experiment achieved satisfactory result.

Select  |    Cite this article 
Liu Heping;Zhang Lanling;Sun Yikang
A CONTINUOUS TIME RECURRENT NEURAL NETWORK BASED METHOD TO SOLVE FUNCTIONAL MINIMIZATION PROBLEM
2000 Vol. 22 (5): 729-734 [Abstract] ( 1947 ) [PDF 844KB] ( 617 )    DOI:

In this paper, the continuous time recurrent neural network is proposed to solve the functional minimization problem, which is often involved in estimation and control. At first, the continuous time BPTT algorithm corresponding to the problem is presented. Then,an on-line algorithm based on the amendments of the BPTT algorithm is discussed. This on-line algorithm paves the way for parallel realization.

Select  |    Cite this article 
Sun Changyin;Bao Zheng
A ROBUST SUPER RESOLUTION ALGORITHM FOR RADAR IMAGING
2000 Vol. 22 (5): 735-740 [Abstract] ( 1673 ) [PDF 1137KB] ( 496 )    DOI:

Super resolution Algorithms can be used to obtain high resolution in ISAR imaging.But in the case of maneuvering target,the Doppler frequency of received signal scattered by target will not be constant,and these algorithms always suffer from the signal model error or fail completely when they are used in the cross range.In this paper,the first order approximate model of Doppler frequency is assumed,and an algorithm based on the extended RELAX method is proposed to estimate the parameters of chirp signals.The Cramer-Rao bounds are derived and simulation results are also present to demonstrate the performance of the algorithm.

Select  |    Cite this article 
Liu Zheng;Zhang Shouhong
RANGE-DOPPLER IMAGING OF TARGETS VIA A HOPPED-FREQUENCY PULSES RADAR
2000 Vol. 22 (5): 741-746 [Abstract] ( 1651 ) [PDF 1071KB] ( 605 )    DOI:

With adoption of the hopped-frequency pulses as a radar waveform for imaging targets,a novel algorithm for range-Doppler imaging of rotating targets is proposed.Compared with the stepped-frequency radar Fourier transform(FT) imaging algorithm,the algorithm is characterized by large unambiguous Doppler window that eliminates Doppler confusion occasionally arising via the stepped-frequency radar FT imaging algorithm.Computer simulation results are given to confirm the effectiveness of the proposed algorithm.

Select  |    Cite this article 
Guan Jian;He You; Peng Yingning
PERFORMANCE ANALYSIS OF DISTRIBUTED OS-CFAR DETECTION WITH NONCOHERENT INTEGRATION OF MULTIPLE PULSES
2000 Vol. 22 (5): 747-752 [Abstract] ( 1627 ) [PDF 1007KB] ( 567 )    DOI:

This paper analyzes the distributed OS-CFAR detection with noncoherent integration of multiple pulses under the conditions of nonhomogeneous background and two local detectors.Compared with the monopulse detection and the single sensor detector and the corresponding optimal fixed threshold detection,the integration of multiple pulses improves the distributed detection obviously,and the increase of number of integrated pulses reduces its difference from the optimal fixed threshold detection.Although the increase of number of integrated pulses weaken the superority of distributed detection over the single sensor detection,the superority still exist and it is more obvious for low SNR.

Select  |    Cite this article 
Xu Chunguang;Xie Weixin
AN INSTANTANEOUS FREQUENCY ESTIMATION METHOD BASED ON CROSS LOCALIZED WIGNER-VILLE DISTRIBUTIONS
2000 Vol. 22 (5): 753-758 [Abstract] ( 1867 ) [PDF 861KB] ( 574 )    DOI:

This paper presents an iterative instantaneous frequency estimation based on a cross localized Wigner-Ville distribution(X-LWVD). The convergence of this method is examined analytically and the performance in noise is compared with the peak detection of spectrogram and the peak detection of Wigner-Ville distribution (WVD) by computer simulation. It is demonstrated that this algorithm is an statistically effective method.

Select  |    Cite this article 
Gao Yong;Xiao Xianci
MULTIPLE PARAMETERS ESTIMATION OF MULTIPLE CHIRP SIGNALS
2000 Vol. 22 (5): 759-767 [Abstract] ( 1563 ) [PDF 1566KB] ( 795 )    DOI:

A method of multiple parameters estimation for multiple chirp signals is proposed,a brief performance analysis is also described.Compared with references,the computational load of the method is more attractive,it is favorable to realize for real-time.It is no need for multiple-dimensions search.The results of simulation show that the method can accurately estimate multiple parameters of multiple chirp signals under the lower ratio of signals-to-noise.

Select  |    Cite this article 

Shang Yong;Wu Shunjun


SYSTOLIC STRUCTURE OF THE ADAPTIVE FIR FILTER BASED ON POLYNOMIAL DECOMPOSITION
2000 Vol. 22 (5): 768-774 [Abstract] ( 1806 ) [PDF 1182KB] ( 469 )    DOI:

A kind of parallel structure of the FIR filter is gotten by expressing the polynomial signal as the parallel form in this paper.By analyzing the parallel structure of FIR filter,several kinds of parallel processing algorithms of the adaptive FIR filter are presented.At the same time,the corresponding systolic implementation structures of these algorithms are given.

Select  |    Cite this article 
Yan Mei;Tang Yu;Gong Yaohuan
THE COMBINATION SCHEME OF OPTIMUM ANTENNA AND MULTI-USER DETECTION TECHNIQUE FOR MULTIPLE ACCESS INTERFERENCE SUPPRESSION
2000 Vol. 22 (5): 775-779 [Abstract] ( 1582 ) [PDF 855KB] ( 566 )    DOI:

This paper discusses the combination method of the optimal array based on the maximum signal to noise ratio principle and multi-user detection technique,and proves in theory that the code error rate of the new method is far superior to the sole multi-user detection.

Select  |    Cite this article 
Zhang Zongnian; Ma Yide; Yu Yinglin
ORIENTED ZEROTREE WAVELET-BASED FRACTAL IMAGE CODING
2000 Vol. 22 (5): 780-784 [Abstract] ( 1460 ) [PDF 1185KB] ( 737 )    DOI:

In this paper,the wavelet-based fractal block image coding is introduced.A new oriented zerotree wavelet-based fractal image coding is presented through the combination of zerotree wavelet and fractal image coding.Experimental results show that the performance of this new approach outperforms that of fractal image coding with quadtrees and is almost comparable to that of embedded zerotree wavelet coding (EZW) at high compression ratios.

Select  |    Cite this article 
Chong Jinsong; Zhou Xiaokuan; Wang Hongqi; Wang Rensheng
IMAGE THRESHOLDING SEGMENTATION BASED ON GENETIC ALGORITHM
2000 Vol. 22 (5): 785-790 [Abstract] ( 1736 ) [PDF 961KB] ( 652 )    DOI:

Both Otsu method and KSW entropic thresholding segmentation method are implemented using Genetic Algorithm(GA) in this paper. Optimum parameters suitable for the image segmentation algorithm are also devised. Single thresholding and multithresholding methods are all presented using GA.The results show that GA can shorten the computational time compared with the classical methods.

Select  |    Cite this article 
Zhang Zijing; Jiao Licheng
M-BAND DISCRETE TIME WAVELET TRANSFORM
2000 Vol. 22 (5): 791-798 [Abstract] ( 1677 ) [PDF 1140KB] ( 645 )    DOI:

Two-band continuous time wavelets can be obtained from infinite-level binary tree-structured QMF banks.Similarly,two-band discrete time wavelet transform can be represented as a finite-level binary tree-structured QMF banks.In this paper,two-band discrete time wavelet transforms are generalized to M-band discrete time wavelet transforms.The relationship between M-band discrete time wavelet transforms and M-band paraunitary filter banks is also investigated.It is shown that if the filter banks on each level are parannitary,the wavelet basis generated by this tree is orthonormal.

Select  |    Cite this article 
Xi Liang; Jin Huiwen
THE MODELING AND SIMULATION OF SELF-SIMILAR VBR VIDEO TRAFFIC
2000 Vol. 22 (5): 799-805 [Abstract] ( 1566 ) [PDF 1133KB] ( 708 )    DOI:

A statistical characteristics model of empirical VBR MPEG-I video streams is presented in this paper. Based on fractional Gaussian noise process, an self-similar model approach which models directly both the short-range dependence and long-range dependence empirical autocorrelation structure is studied. According to the simulation result, the improved self-similar process is a better model of VBR video traffic.

Select  |    Cite this article 
Kong Lingjiang ;Fan Luhong; Zhou Zhengou
THE POWER SPECTRUM ANALYSIS OF 8B/10B LINE CODE IN GIGABIT ETHERNET
2000 Vol. 22 (5): 806-810 [Abstract] ( 2214 ) [PDF 770KB] ( 1273 )    DOI:

On the base of a finite state sequential machine, the well known Cariolaro s algorithm is used, namely the transition probability matrix method, to analyze the power spectrum of 8B/10B line code used in gigabit ethernet, and to give the closed-form solution and the curve of the power spectrum density.

Select  |    Cite this article 
Wang Xinmiao; Yan Puliu; Huang Tianxi
A FAULT-IDENTIFICATION AND ALARM-CORRELATION METHOD BASED ON IMPROVED GA-NN MODEL IN COMMUNICATION NETWORKS
2000 Vol. 22 (5): 811-816 [Abstract] ( 1880 ) [PDF 1278KB] ( 553 )    DOI:

As a result of the rising demand for services and the resulting increase in size,bandwidth and complexity,fault management in today’s high speed communication networks is becoming even more difficult.When a network problem or failure occurs,it is possible that a very large volume of alarm messages is generated,while alarm correlation is a potentially complex problem.Though some existing alarm correlation systems nowadays have different drawbacks such as lack of scalability,hindered by solving complexity,or no learning process,etc.This paper presents a fault-identification and alarm-correlation method based on improved GA-NN model in communication networks.The experimental results show that this method is simple,which not only overcomes the disadvantages of normal alarm correlation ways,but also improves the dynamic character,training accuracy and efficiency greatly than BP algorithm,BGA algorithm and AGA algorithm do.

Select  |    Cite this article 
Wang Yong; Zhong Wen; Chen Ming; Cheng Shixin; You Xiaohu
A MULTIUSER DETECTOR DERIVED FROM ML CRITERIA FOR CDMA FREQUENCY SELECTIVE FADING CHANNEL
2000 Vol. 22 (5): 817-823 [Abstract] ( 1754 ) [PDF 1054KB] ( 510 )    DOI:

In this paper, a decorrelator for multiuser detection derived from ML criteria in CDMA system is proposed for frequency selective fading channels. Simulations prove the better performance of this method than the method proposed by Zvonar in which the paths of the same user are combined after decorrelating. This method utilizes equivalent spreading codes for decorrelating, thus the hardware complexity is reduced.

Select  |    Cite this article 
Liu Shengli; Zheng Dong; Wang Yumin
FINDING SECURE ELLIPTIC CURVES OVER GF(2n) AND THEIR BASE POINTS
2000 Vol. 22 (5): 824-830 [Abstract] ( 1676 ) [PDF 1066KB] ( 566 )    DOI:

This paper systematically introduces how to find secure elliptic curves with the help of Weil theorem, and proposes an algorithm to find base points in the curves. Finally, an efficient method of finding the trace of any element in GF(2lk), which is involved in the algorithm of finding base points, is given.

Select  |    Cite this article 
Xu Chengqian
RECURSIVE CONSTRUCTIONS BASED ON SPECIAL ARRAYS FOR THE FAMILIES OF BENT COMPLEMENTARY FUNCTIONS
2000 Vol. 22 (5): 831-835 [Abstract] ( 1446 ) [PDF 639KB] ( 539 )    DOI:

In this paper, the constructions for the families of Bent complementary functions (BCF) are further studied. Recursive construction methods of BCFs are given by using matrices with orthogonal columns and perfect arrays.

Select  |    Cite this article 
Zhong Ming; Jiang Taihui
AN IMPROVED MBELP CODER AT 2.4kbps
2000 Vol. 22 (5): 836-841 [Abstract] ( 1645 ) [PDF 985KB] ( 677 )    DOI:

This paper gives an improved MBELP speech coding algorithm at 2.4kb/s.Compared with conventional MBELP algorithm,this algorithm has some improvements on pitch estimation and unvoice/voice decision.The synthetical speech of vocoder based on this algorithm is better than that based on conventional one.After a brief introduction,the improved MBELP algorithm is discussed in detail.And the results of pitch estimation and U/V decision based on the improved MBELP are compared with those based on conventional MBELP.

Select  |    Cite this article 
Zhou Xuanchang; Wu Xunwei
DOUBLE-EDGE-TRIGGERED FLIP-FLOPS IN TERNARY DYL CIRCUITS
2000 Vol. 22 (5): 842-846 [Abstract] ( 1640 ) [PDF 953KB] ( 562 )    DOI:

By analyzing the switching characteristic of the multiple-β transistor and combining its features of emit-input, emit-output and high working speed, a ternary double-edge-triggered flip-flops is designed in the paper. Computer simulation shows that this design has correct logic function and high working speed. It can be used in designing ternary DYL circuits.

Select  |    Cite this article 
Liang Jian; Hong Wei
A FAST 3D-FDFD METHOD IN CONJUCTION WITH ASYMPTOTIC WAVEFORM EVALUATION TECHNIQUE
2000 Vol. 22 (5): 847-853 [Abstract] ( 1794 ) [PDF 1084KB] ( 508 )    DOI:

A fast generalized algorithm for S parameter extraction of 3-D microwave structures is presented based on the 3-D FDFD (Frequency Domain Finite Difference) method in conjunction with the asymptotic waveform evaluation (AWE) technique.In the AWE technique,the electric field strength at the input and output ports are respectively expanded in a Taylor’s series around a frequency within the desired frequency band,and the coefficients of the Taylor’s series are matched via the Padé approximation to a rational function and the robust Singular Value Decomposition (SVD) technique is employed while solving the Padé equation.Using the rational function,the electric field strengths at the input and output are obtained at any frequency within the desired frequency band,which is used to calculated the S parameter.A good agreement between the numerical results and the reported data is observed.Compared with the traditional FDFD,the computational efficiency of the present method is considerably improved.

Select  |    Cite this article 
Wang Zhiyu; Zhu Minhui; Bai Youtian
THE OPTIMAL RECEPTION OF THE PARTIAL POLARIZATION WAVE
2000 Vol. 22 (5): 854-857 [Abstract] ( 1733 ) [PDF 766KB] ( 572 )    DOI:

The scattering matrix, which describes the scattering property of practical scatters, is generally a function of time. So, the scattered electromagnetic wave is no longer a completely polarized wave, but a partially polarized wave, although the incident wave is completely polarized. This paper mainly focuses on the optimal reception of partially polarized electromagnetic wave, and derives the method for optimizing the intensity received by the antenna.

Select  |    Cite this article 
Zhang Peng; Yan Guanhua; Cheng Shiduan
RESEARCH ON SELF-SIMILAR TRAFFIC CONTROL
2000 Vol. 22 (5): 865-870 [Abstract] ( 1829 ) [PDF 1092KB] ( 604 )    DOI:

Since self-similarity is a common property of traffic in the broadband networks,it is crucial to consider its impact on network management and traffic control.Nowadays,research on self-similar traffic control has been widely noticed.Some results prove that self-similar traffic exhibits different queueing features from the traditional models.Considering on the quality of service and traffic control mechanism,this paper investigates the impact of self-similar traffic on some traffic control mechanisms such as traffic shaping,Usage Parameter Control and Connection Admission Control,and obtains some important conclusions.

Select  |    Cite this article 
Hou Xinyu; Wan Wei; Tong Mingan; Gong Cheng
INFLUENCE OF DIELECTRIC LOSS ON THE TRANSMISSION PROPERTIES OF FREQUENCY SELECTIVE SURFACES
2000 Vol. 22 (5): 871-874 [Abstract] ( 2109 ) [PDF 783KB] ( 654 )    DOI:

The influences of supporting dielectric layers on the transmission properties of FSS with Y slot array embeded in the dielectric are studied in this paper. The frequency properties (resonance frequency, transmission bandwidth and transmission loss are included) of the FSS with different dielectric thickness are discussed. Calculated results show that dielectric losses are main sources of the base of FSS structure.

Select  |    Cite this article 
Xue Qianzhong; Wu Zhensen; Yang Yao
RESEARCH ON THE SCATTERING OF AN INCIDENT GAUSSIAN BEAM
2000 Vol. 22 (5): 875-880 [Abstract] ( 1698 ) [PDF 966KB] ( 614 )    DOI:

The problem of scattering of a Gaussian beam by a rough dielectric surface is studied. By using the plane wave spectrum expansion and Kirchhoff approximation theory, the formulas of scattered field and the incoherent scattering cross-section for Gaussian beam illumination of a rough surface are derived. And the numerical results for incoherent back scattering cross-section are given. Finally, the above results are analyzed and discussed.

Discussions
Select  |    Cite this article 
Shao Zuhua
DISCUSSION ON "SECURITY AND PERFORMANCE ANALYSIS OF TWO KINDS OF ELGAMAL SIGNATURE SCHEMES
2000 Vol. 22 (5): 858-864 [Abstract] ( 2060 ) [PDF 1205KB] ( 537 )    DOI:

Qi Ming and others recently analyzed and discussed the security of two kinds of the ElGamal signature schemes and the password authentication scheme based on two kinds of the signature schemes,and proposed two kinds of improved schemes.This paper first points out that the first p type signature scheme proposed by Qi is not secure,since attackers can forge signature for any message.Then this paper shows that the generalized ElGamal signature schemes can not resist the substitution attack.Finally this paper shows that two kinds of the improved schemes proposed by Qi can not resist the homomorphism attack,and does not have the security as Qi said.

电子与信息学报
Author Center
Online Submission
Author Instruction
FAQ
Template
Copyright Agreement
MSN:je-jeit@hotmail.com
Links
More>>  
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech