电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Quick Search  
  Advanced Search
2000 Vol.22 No.2, Published: 19 March 2000
Articles | Reviews |
 
 
Articles
Select  |    Cite this article 
Li Lizhong; Li Lemin
PERFORMANCE ANALYSIS OF A HYBRID ERROR CONTROL SCHEME FOR WIRELESS ATM SYSTEMS OVER BURSTY CHANNELS
2000 Vol. 22 (2): 177-182 [Abstract] ( 1617 ) [PDF 1092KB] ( 597 )    DOI:

This paper proposes a hybrid error control scheme suitable for wireless ATM systems, that is, voice telephone is protected by pure RS code, video and data are protected by truncated RS/Type II hybrid ARQ protocol. The performance of this hybrid error control scheme over bursty channels is analyzed and simulated. It is found that, by restricting numbers of retransmission, low transmission delay and cell loss rate can be obtained.

Select  |    Cite this article 
Shi Qinghua; Cheng Shixin
OPTIMAL WAVELET MODULATION
2000 Vol. 22 (2): 183-187 [Abstract] ( 1482 ) [PDF 937KB] ( 548 )    DOI:

Wavelet analysis has being gradually applied to communications, especially, wavelet modulation receives much considerations for its bandwidth efficiency. This paper discusses how to design optimal orthogonal wavelet and scaling functions which are generated by FIR filters, from the view point of bandwidth efficiency, the designing method and results are given in details. By comparison, the bandwidth efficiency of wavelet modulation has improved significantly for the same system complexity after optimization, so relatively good spectral performance using simple FIR filters can be obtained.

Select  |    Cite this article 
Li Xiaoping; Zheng Lou; Wu Shiqi
PERFORMANCE EVALUATION FOR DYNAMIC CODE ALLOCATION CDMA SYSTEM
2000 Vol. 22 (2): 188-193 [Abstract] ( 1523 ) [PDF 1255KB] ( 575 )    DOI:

A new dynamic code allocation CDMA (DCDMA) protocol,which can support voice and data services simultaneously,is investigated in this paper. In DCDMA protocol, a voice terminal will reserve a spreading code only in talkspurt. The base station assigns a code after successfully receiving a request packet through a special request channel at the beginning of each talkspurt. Unlike a voice terminal,a data terminal must contend a spreading code for each packet transmission. So the code utilization can be significantly improved in DCDMA system. An analytical model and computer simulation is performed for evaluating the performance of the DCDMA protocol. The results show that the DCDMA protocol is very effective in utilizing code resource, and the QOS requirement on voice calls is still satisfied while the number of data terminal is increased.

Select  |    Cite this article 
Yang Bo; Wang Yumin
A KEY ESCROW SYSTEM FOR NETWORK ENVIRONMENT BASED ON RSA ALGORITHM
2000 Vol. 22 (2): 194-197 [Abstract] ( 1417 ) [PDF 796KB] ( 590 )    DOI:

A key escrow cryptosystem can provide protection for user s privacy, while at the same time, allows for the wiretapping when lawfully authorized. In this paper, a key escrow system based on RSA algorithm for network environment is given. A trusted center in this system specifies n trustees for every user, and distributes the part recovery ability of the user 's secret key to n trustees by (t,n) threshold scheme. When the user broadcasts his encrypted key, only if at least t cooperated trustees can enforce the wiretapping to this user.

Select  |    Cite this article 
Lin Bogang; Qiu Hongduan
THE CONSTRUCTION AND REALIZATION OF D=3 SM ARRAY CODES FOR HIGH-DIMENSION
2000 Vol. 22 (2): 198-204 [Abstract] ( 1399 ) [PDF 1307KB] ( 553 )    DOI:

This paper is based on the concept system for D=2 SM array code proposed by the author in 1994. The coding rule and existence condition for D = 3 SM array code are given, and its structure property, construction step, design analysis and some use are also discussed.

Select  |    Cite this article 

2000 Vol. 22 (2): 204-204,259 [Abstract] ( 1276 ) [PDF 429KB] ( 558 )    DOI:

Select  |    Cite this article 
Zhang Jianzhou; You Zhisheng
THE ENUMERATION OF THE FIRST ORDER CORRELATION IMMUNE BOOLEAN FUNCTIONS
2000 Vol. 22 (2): 205-209 [Abstract] ( 1658 ) [PDF 833KB] ( 738 )    DOI:

A enumerative formula of Boolean functions with the first-order correlation-immunity, which are important in stream ciphers, is given with help of column-balance matrixes, inclusion-exclusioin principle in combinatorics and edge-induced subgraphs in graph theory.

Select  |    Cite this article 
Shen Yuehong; Yi Xiaoxin; Xu Fajiang; Li Xingguo
FUZZY PATTERN RECOGNITION AND FUZZY CLUSTER TECHNIQUES FOR EVALUATION OF COMMUNICATION EQUIPMENT
2000 Vol. 22 (2): 210-217 [Abstract] ( 1599 ) [PDF 1595KB] ( 924 )    DOI:

In this paper, a new method based the fuzzy pattern recognition and fuzzy cluster techniques for the evaluation of communication equipment/system is proposed. Contrast with fuzzy comprehensive evaluation, the new method is effective for practical applications while it keeps the advantages of fuzzy comprehensive evaluation.

Select  |    Cite this article 
Ji Guangrong; Wang Guoyu; Tan Rui; Feng Tianjin; Chen Xia
EVOLUTION ANALYSIS OF THE DETECTED EDGE IN SCALE-SPACE
2000 Vol. 22 (2): 218-225 [Abstract] ( 1548 ) [PDF 1048KB] ( 965 )    DOI:

The detected features evolution in scale-space is an important problem in multiscale analysis. With the 2-D Gaussian function as the kernel, the detected edge of an acute corner in scale-space, that is an ellipse determined by the slope of the corner boundary and the analysis scale, is given out clearly in this paper. Based on this, the assimilative effect of the scale factor to the detected edges of adjacent corners is discussed and the inequality of the distinguishable resolution of the corners in scale-space with the scale factor is given. The results given in this paper can be treated as the general reference for the multiscale analysis.

Select  |    Cite this article 
Zou Hongxing; Zhou Xiaobo; Li Yanda
A MULTIPLE LINE ENHANCER
2000 Vol. 22 (2): 226-232 [Abstract] ( 1522 ) [PDF 1415KB] ( 626 )    DOI:

A general difficulty of using singular value decomposition (SVD) to split signal and noise subspaces is in the right choice of effective rank. The commonly used method toward this end is to use a fixed threshold. Yet despite its apparent physical significance, the lack of adaptability has strongly limited the popularity of subspace approach in line enhancement. In order to surmount this drawback, a cluster method based algorithm for determining the effective rank is proposed in accordance with the a priori information obtained from the time-frequency distribution of the noisy sinusoids. Simulation results show that the methodology advocated is effective for solving a class of multiple line enhancement problems.

Select  |    Cite this article 
Jia Ying; Du Limin; Hou Zijiang
INVERSE CONSTRUCTING OF A SET OF OBJECTIVE FUNCTIONS
2000 Vol. 22 (2): 233-239 [Abstract] ( 1831 ) [PDF 1269KB] ( 650 )    DOI:

To meet the requirements with large-scale neural networks for real-world applications, an inverse way of constructing objective functions was proposed in this paper, which translates the task of constructing objective functions into the design of error signals. Followed this way, a set of objective functions has been given as examples to eliminate the false saturation in Mean Squared Error (MSE) and overspecialization in Cross Entropy (CE). The verification of its power was also made by the comparison with MSE and CE in the tasks of estimating the scaled likelihood for the Hidden Markov Models' states in the Hybrid HMM/ANN models, and showed consistent advantages with the theoretical expectations.

Select  |    Cite this article 
He Zhenya; Chen Yuxin
ROBUST BLIND NEURAL NETWORK BEAMFORMER BASED ON CYCLOSTATIONARY
2000 Vol. 22 (2): 240-246 [Abstract] ( 1505 ) [PDF 1251KB] ( 598 )    DOI:

A new blind beamformer with improved Hopfield network is presented in this paper. To estimate the steering vector, the signal property of cyclostationary is used. To suppress interference, traditional LCMV beamforming is employed. To improve the robustness, diagonal loading technique is exploited. To turn into realization in real time, a neural network structure is given. Simulations demonstrate the excellent performance of the proposed approach in a wide variety of situations.

Select  |    Cite this article 
Tian Yuan;Yang Haijun;Liang Dequn;Wang Hongguan; Wu Gengshi
THE METHOD OF EDGE DETECTION BASED ON NEURAL NETWORK AND THE MEASURE OF IMPORTANCE OF POINTS
2000 Vol. 22 (2): 247-252 [Abstract] ( 1659 ) [PDF 1350KB] ( 802 )    DOI:

Based on the scale and the state of intensity distribution in some neighborhoods of edge points, this paper proposes a measure vector of importance of point that consists of 4 components and corresponds to every point. For considering the background of application, this paper first trains a BP neural network using some samples that have classified by manual work, and then extracts more important edge points in a new image using the trained neural network. Because the image needs not be smoothed by some function in this algorithm, the edge deflection will not happen as usual, the location of gotten edge is in the accurate position. The effectiveness of this algorithm has been testified by some experiments.

Select  |    Cite this article 
Cao Jinde
GLOBAL ASYMPOTOTIC STABILITY ANALYSIS OF DELAYED CELLULAR NEURAL NETWORKS
2000 Vol. 22 (2): 253-259 [Abstract] ( 1591 ) [PDF 1141KB] ( 481 )    DOI:

This paper analyses further global asympototic stability of a class of delayed cellular neural networks by means of Lyapunov functional method and new inequality a2b≤(2a3+b3)/3, (a,b≥0) analysis technique, and some new sufficient criteria are obtained. These criteria are of theoretical and applicable important significance in the design of globally stable networks.

Select  |    Cite this article 
Xie Zhongfu; Wu Tao
HIGH-RESOLUTIN DOA TRACKING ALGORITHM BASED ON PHASED ARRAY WITH A SINGLE CHANNEL RECEIVER
2000 Vol. 22 (2): 260-264 [Abstract] ( 1680 ) [PDF 990KB] ( 690 )    DOI:

This paper presents a high-resolution DOA tracking algorithm based on phased array with a single channel receiver. It is an improved algorithm of the method using specific weights to realize high-resolution direction finding with single channel receiver. When signals are uncorrelated, by using the specific weights in turn and refreshing the power measurements continuously, the time-changed DOA of signals can be traced. The computer simulation results show that the algorithm is effective.

Select  |    Cite this article 
Li Xi;Liu Guosui;Shan Rongguang;Ni Jinlin; Gu Hong
ROTATIONAL MOTION COMPENSATION OF THE TARGET MOVING UNIFORMLY
2000 Vol. 22 (2): 265-273 [Abstract] ( 1617 ) [PDF 1422KB] ( 469 )    DOI:

After translational motion compensation, rotational motion compensation is needed in ISAR technique. This paper considers the rotational motion compensation in the case of that the target moves along a straight trajectory with constant speed. It is found out that the nonlinear factor γ is most important parameter in its rotational motion compensation. In order to estimate γ, image entropy minimization principle is described here. Based on this principle, the unknown γ can be estimated accurately. The effecttiveness of this method are shown by simulated and experimental results.

Select  |    Cite this article 
Liu Benyong; Yang Wanlin
IMAGE RECOGNITION OF RADAR TARGET USING PHASE INFORMATION
2000 Vol. 22 (2): 274-278 [Abstract] ( 1449 ) [PDF 942KB] ( 723 )    DOI:

The echo signal of a high-range-resolution radar(HRR) contains much information about target. By using this information and feature extraction method fully and properly, an efficient target recognition can be executed. A novel approach for radar target recognition is proposed in this paper. This approach explores canonical analysis on a matrix formed by the image vectors of training targets in different aspect angles. One image vector contains both the amplitudes and relative phases of the range profile of a target. A subspace is obtained from this analysis. Projection of an image vector into this subspace forms subimage. The subimages of a training target in different aspect angles are averaged into library feature vector for this target. Using the subimage of an unknown target as feature vector and minimum distance rule for target recognition, experiments on simulated data are done.

Select  |    Cite this article 
Li Xi; Ni Jinlin; Liu Guosui; Luo Yi; Gu Hong; Su Weimin
PHASE COMPENSATION OF SAR/ISAR USING IMAGE COST FUNCTIONS
2000 Vol. 22 (2): 279-289 [Abstract] ( 1688 ) [PDF 2296KB] ( 544 )    DOI:

Phase compensation is a critical step of Synthetic Aperture Radar(SAR) and Inverse Synthetic Aperture Radar(ISAR) imaging technique. This paper proposes a progressive approach algorithm based on image cost function to compensate the random phase error in SAR/ISAR imagery. Four kinds of image cost function are discussed. The comparison of the proposed function is performed by analyzing the simulation and experimental results. It is found out that Shannon entropy function is the best one. Based on it, the interference phase in unknown signal can be estimated accurately.

Select  |    Cite this article 
Su Fei; Sun Jing ao; Cai Anni
RADAR DATA ANALYSIS WITH MULTI-FRACTAL METHODS
2000 Vol. 22 (2): 290-295 [Abstract] ( 1590 ) [PDF 1111KB] ( 1011 )    DOI:

Multi-fractal methods are introduced to radar clutters analysis in this paper to find general characteristics of clutters. Clutters and echoes from targets are analyzed respectively. The results show that the radar clutters are a kind of generalized frctal signals in some degree, and echoes from targets do not match with the fractal model. This fact leads to a new way to detect targets.

Select  |    Cite this article 
Liu Hongchun; Yang Ruliang
A FALSE COLOR SYNTHETIC PROCESSING FOR POLARIMETRIC SAR DATA
2000 Vol. 22 (2): 296-302 [Abstract] ( 2058 ) [PDF 1927KB] ( 696 )    DOI:

This paper studies on the false color synthetic processing for polarimetric SAR data. A new method to get false color image of polarimetric SAR data with the unitary Stokes matrix is presented. Because this method discards the information of total power, it can be used to analyze the target with more power or less power and the target with the same shape in polarization signatures. The paper also presents the way to find three optimum polarization s combinations to enhance the contrast between two types of scatters with polarization signature and use the polarization synthesis to get false color image of polarimetric SAR data.

Select  |    Cite this article 
Yuan Weiliang; Liang Changhong
ANALYSIS OF MICROWAVE COMPONENTS FED BY THE TRANSMISSION LINES WITH A METHOD OF SIGNAL EXTRACTION IN TIME DOMAIN IN COMBINATION WITH FDTD
2000 Vol. 22 (2): 303-309 [Abstract] ( 2041 ) [PDF 1238KB] ( 2627 )    DOI:

A method of signal extraction in time domain is proposed in this paper, by means of which, the time-domain incident wave and reflected wave on the reference plane of the feeder can be extracted from the total-field responses obtained from the time-domain simulation for the microwave components fed by the nondispersive transmission lines, furthermore, its frequency-domain parameters can also be acquired. By comparison with traditional methods, it can avoid to directly compute the time-domain incident wave and reflected wave using the finite-difference time-domain method, so computation time and storage can be reduced. The numerical simulations of rectangular microstrip antenna show that the computation precision of this method is the same as that of traditional methods.

Select  |    Cite this article 
Wang Linli; Song Linggui; Wu Guichu; Chen Xiexiong
SPECTRAL SYNTHESIS BASED ON BIDIRECTIONAL CURRENT-MODE CIRCUITS
2000 Vol. 22 (2): 310-315 [Abstract] ( 1601 ) [PDF 998KB] ( 517 )    DOI:

The spectral techniques is mainly used in the analysis of digital circuits. This paper studies its application in the synthesis of digital circuits. In this paper, the spectral function is realized by using bidirectional current-mode CMOS circuits, and it provides a new technique method for the design of digital circuits.

Select  |    Cite this article 
Zhang Zhijun; Feng Zhenghe
A NEW SMART ANTENNA FOR CDMA SYSTEM
2000 Vol. 22 (2): 331-335 [Abstract] ( 1434 ) [PDF 895KB] ( 649 )    DOI:

A new smart antenna for CDMA system was proposed in the paper. The beam pattern with approximately equal side lobe is adopted. The weighting vectors are got not by measuring or rectifying in advance, they can be got by average method, and can be realized easily in engineering. The enhanced capability of this antenna is approximately equal to adaptive antenna, but need not iterative procedure, has fast response and good robustness.

Select  |    Cite this article 
Li Jinwen; Mao Junjie; Chai Shunlian; Yao Demiao
APPLYING GENETIC ALGORITHM TO ADAPTIVE ARRAY
2000 Vol. 22 (2): 336-340 [Abstract] ( 1577 ) [PDF 912KB] ( 562 )    DOI:

In this paper, a new approach based on genetic algorithm (GA) is applied to adaptive array, in according to the limitation of hardware, the amplitude weights are not changed, but the phase weights are optimized globally with genetic algorithm. For reducing the perturbations to the far field pattern and placing multiple deep nulls real-time in the directions of interference, a genetic algorithm adjusts some of the least significant bits of the beam steering phase shifters. Simulation results confirm the theoretical work.

Select  |    Cite this article 
Rao Qinjiang; Gong Zhonglin
STUDY OF THE INFLUENCE OF ROUGH SEA SURFACE ON THE SPACE FIELD OF HF GROUND-WAVE RADAR ON COAST
2000 Vol. 22 (2): 341-345 [Abstract] ( 1549 ) [PDF 1208KB] ( 601 )    DOI:

To study the influence of rough sea surface on the space field of HF ground wave radar on coast, a derivation of the reflection is introduced first, which is suitable for rough sea surface with Gaussian distribution of heights, and then the reflection is substituted into the radar equation, finally, the propagation loss over rough sea surface is calculated. The resulting predictions in this paper are more accurate and realistic.

Select  |    Cite this article 
Tian Xiaojian; Zhang Darning; Gao Yanjun; Li Dehui; Yi Maobin
APPLICATION OF ULTRA-HIGH SPEED WAVEFORM DIGITIZED SYSTEM TO IC BASED ON LASER PROBE
2000 Vol. 22 (2): 346-349 [Abstract] ( 1538 ) [PDF 855KB] ( 568 )    DOI:

This paper introduces the construction of the ultra-high speed waveform digitized system based on laser probe. The functions of different stages of the high-speed dynamic divider circuit chip are measured with the double-frequency phase sweeping technique. A detail analysis about the chip failure and the characteristics of laser probe measurement is given.

Select  |    Cite this article 

2000 Vol. 22 (2): 350-352 [Abstract] ( 1177 ) [PDF 767KB] ( 757 )    DOI:

Reviews
Select  |    Cite this article 
Xiao Lei; Liang Qinglin
THE TECHNOLOGY TO REJECT MAI IN DS/CDMA SYSTEM
2000 Vol. 22 (2): 316-324 [Abstract] ( 1602 ) [PDF 1976KB] ( 964 )    DOI:

In DS/CDMA communication system, users share time and frequency resourses, it will cause Multiple Access Interference (MAI). The conventional detector follows a single-user detection strategy can not reject MAI. In this paper many important technologies to reject AIAI are described and analyzed.

Select  |    Cite this article 
Hu Weiming; Xu Junhua; Yan Xiaolang
SURVEY ON NEURAL NETWORKS FOR PHYSICAL DESIGN OF ICS
2000 Vol. 22 (2): 325-330 [Abstract] ( 1622 ) [PDF 1500KB] ( 720 )    DOI:

This paper systematically summarizes the merits, defects and perspectives of the neural network approaches being able to solve the physical design tasks, analyzes the present research situation of applying neural networks to physical design, proposes some approaches for mapping physical design problems to neural networks, and presents some methods to raise running speed of the neural network based the algorithm, which is executed in sequential computer.

电子与信息学报
Author Center
Online Submission
Author Instruction
FAQ
Template
Copyright Agreement
MSN:je-jeit@hotmail.com
Links
More>>  
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech