电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Quick Search  
  Advanced Search
1999 Vol.21 No.4, Published: 19 July 1999
Articles |
 
 
Articles
Select  |    Cite this article 
Cheng Hongwei; Zhou Yiyu; Sun Zhongkang
A RECURSIVE AND PARALLEL FAST JPDA ALGORITHM
1999 Vol. 21 (4): 433-440 [Abstract] ( 1856 ) [PDF 1447KB] ( 570 )    DOI:

Joint Probabilistic Data Association (JPDA) is a very fine optimal multitarget tracking and association algorithm in clutter. However, the calculation explosion effect in computation of association probabilities has been a difficulty. This paper will propose a method based on layered searching construction of association hypothesis events. According to the method, the searching schedule of the association events between two layers can be recursive and with independence, so it can also be implemented in parallel structure. Comparative analysis of the method with relative methods in other references and corresponding computer simulation tests and results are also given in the paper.

Select  |    Cite this article 
Xue Bing; Shan Ganlin; Huang Yunhua
THE RESEARCH FOR TARGET DATA ASSOCIATION BASED ON THE PRINCIPLE OF DISTRIBUTED INFERENCE AND DECISION
1999 Vol. 21 (4): 441-446 [Abstract] ( 1713 ) [PDF 1150KB] ( 569 )    DOI:

The theory of distributed inference and decision is a kind of theory to be used to solve the distributed interwound decision problems. This theory is first presented to solve the problem of target data association in this paper. The basic principle and structure of distributed target data association decision system are formulated and a algorithm for this problem is designed based on the principle and structure. The algorithm is divided into two stages , the one is initial inference and decision stage, another is distributed inference and decision stage. In the end of this paper the algorithm is discussed.

Select  |    Cite this article 
Shao Chao; Bao Zheng
THE ANALYSIS OF THE RESOLUTION CHARACTERS OF RELAX ALGORITHM
1999 Vol. 21 (4): 447-454 [Abstract] ( 1675 ) [PDF 1422KB] ( 507 )    DOI:

The paper gives a detail analysis of the mathematical principle of the RELAX algorithm that separating and resolving the signals, and the performance of the characters of the separation and resolution in the circumstance that the algorithm resolves the signals or not. The relationship and development of the algorithm from DD-RELAX to CD-RELAX, RELAX-AS and MD-RELAX are also discussed. The computer simulation are made to confirm the theory analysis.

Select  |    Cite this article 
Huang Yong; Xiao Xianci; Lin Yunsong
SECOND-ORDER NONUNIFORM SAMPLING FOR THE FAST RECOVERY OF BANDPASS SIGNAL
1999 Vol. 21 (4): 455-460 [Abstract] ( 1658 ) [PDF 917KB] ( 518 )    DOI:

Fast recovery and frequency-shifting of real bandpass signal based on second-order sampling is discussed. Using FFT and complex filtering, real bandpass signal can be recovered as a analytic signal whose central frequency is within two times of its bandwidth, and phase property is not changed. Finally, using simple computation, original frequency can be acquired. Computer simulation shows the correction of the method.

Select  |    Cite this article 
Wang Chengyi; Wang Hongyu
ESTIMATION OF CYCLIC SPECTRA USING TWO-CHANNEL COMPLEX MAXIMUM ENTROPY (AUTOREGRESSIVE) SPECTRAL ANALYSIS
1999 Vol. 21 (4): 461-466 [Abstract] ( 1758 ) [PDF 994KB] ( 546 )    DOI:

The main methods for estimation of cyclic spectra for cyclostationary processes are temporally smoothed cyclic periodogram and spectrally smoothed cyclic periodogram. In case of short record length, both methods have low resolution and reliability. This paper uses two-channel complex maximum entropy (autoregressive) spectral analysis method to estimate cyclic spectra. Fine performances such as resolution and reliability can be obtained with this method.

Select  |    Cite this article 
Ma Changzheng; Zhang Shouhong; Jiao Licheng
THE OPTIMAL WINDOW FUNCTIONS OF SHORT TIME FOURIER TRANSFORM AND PSEUDO-WIGNER DISTRIBUTION
1999 Vol. 21 (4): 467-472 [Abstract] ( 2512 ) [PDF 589KB] ( 891 )    DOI:

Short time Fourier transform and pseudo-Wigner distribution are two most useful tools in time-frequency analysis, the choice of window functions is the base for their applications, which require deep study. The criteria of window functions are discussed in detail, and the optimal length of window is obtained by means of optimal frequency resolutions.

Select  |    Cite this article 
Lin Yunsong; Huang Yong; Xiao Xianci
THE SOLUTION TO AN AMBIGUITY PROBLEM WITH NOISE PROTECTION IN NUMBER SYSTEM
1999 Vol. 21 (4): 473-481 [Abstract] ( 1372 ) [PDF 1466KB] ( 576 )    DOI:

The relationship between the discrete Fourier transform (DFT) and the symmetrical/Asymmetrical number system (SNS/ANS) is introduced in this paper. And the influence of noise upon the solution to an ambiguity problem in number system is also discussed. The principle of noise insensitive solution to the ambiguity in ANS is extended to SNS. The unambiguous bandwidth equation with noise protection in SNS is presented,based on which a real time noise insensitive algorithm in SNS for resolving undersampling ambiguous frequency is proposed.

Select  |    Cite this article 
Mao Yongcai; Bao Zheng
PERFORMANCE ANALYSIS OF CYCLIC ESTIMATORS FOR MULTIPLE HARMONICS IN COMPLEX ZERO MEAN MULTIPLICATIVE NOISES
1999 Vol. 21 (4): 482-487 [Abstract] ( 1539 ) [PDF 750KB] ( 523 )    DOI:

The concern here is retrieval of multiple tone harmonics observed in complex-valued multiplicative noises with zero mean. Cyclic statistics have proved to be useful for harmonic retrieval in the presence of complex-valued multiplicative noises with zero mean of arbitrary colors and distributions . Performance analysis of cyclic estimators is carried through and large sample variance expressions of the cyclic estimators are derived. Simulations validate the large sample performance analysis.

Select  |    Cite this article 
Lu Guangyue; Bao Zheng
COMPENSATION OF SCATTERERS MIGRATION IN ISAR IMAGING
1999 Vol. 21 (4): 488-493 [Abstract] ( 1496 ) [PDF 1240KB] ( 536 )    DOI:

Range-Doppler method is the most common method in ISAR imaging. To obtain radar image of a target, certain angle of the target with respect to Radar Light Of Sight (RLOS) during the coherent integration interval is required. In some case, there will exist scatterers migration. Actually, scatterers Migration Through Resolution Cell (MTRC) occurs inevitably in higher resolution radar image, which will result in the point-spread function broadening and image resolution decreasing. The scatterers' migration is discussed in the paper and a simple and efficient method is proposed to compensate MTRC. Compensation results of the simulated data and the real data collected in a microwave anechoic chamber show that the resolution of the final radar image is improved.

Select  |    Cite this article 
Liu Jianwei; Wang Yumin
AUTHENTICATION PROTOCOL FOR MOBILE USER REGISTRATION IN PERSONAL COMMUNICATION SYSTEMS
1999 Vol. 21 (4): 494-499 [Abstract] ( 1416 ) [PDF 1224KB] ( 497 )    DOI:

Impersonation and eavesdropping are the crucial threats in wireless communication systems. In personal communication systems (PCS), it is necessary to provide security protection on the voice/data transmitted over wireless links, and perform mutual authentication between mobile user and serving network. Recently, many protocols are proposed for different mobile networks, such as GSM, IS-41, CDPD and wireless LAN. However, these protocols have different weakness when they are applied in PCS environment. Based on the public-key P&A model proposed by M.J. Beller, et al.(1993), this paper presents an authentication protocol for mobile user registration. Then the formalized security proof of the protocol using BAN authen- tication logic, and the qualitative analysis about its computing complexity are given. Results show that many new security features are added to the proposed protocols when it is compared with the protocols available.

Select  |    Cite this article 
Hong Xinwei; Xu Shugong; Huang Zailu; Huang Liqun
ON THE EXPERIMENT ABOUT QOS OF CBR TRAFFIC IN A BURSTY ENVIRONMENT
1999 Vol. 21 (4): 500-505 [Abstract] ( 2269 ) [PDF 1122KB] ( 558 )    DOI:

CBR is one of the most important kinds of real-time traffic in ATM network. Guarantying the quality of service(QOS) of CBR traffic is crucial to the success of ATM technology. So, analyzing the QOS of the CBR traffic is worth studying. The paper analyzes the QOS of CBR traffic in a bursty enviroment through computer simulation. It is found that multiplexer utilization, buffer capacity, background intensity and autocorrelation property of the background traffic can all make hard effects on the delay and delay jitter of CBR traffic. Especially, when the background traffic exhibits long-range dependence, the QOS of CBR traffic will degrade severely. Some control actions should be taken to minimize the effects of all the factors.

Select  |    Cite this article 
Tu Guofang; Wang Yekui
THE ADAPTIVE MULTI-LEVEL QUANTIZED SUBSAMPLED BLOCK TRUNCATION CODINGTHE ADAPTIVE MULTI-LEVEL QUANTIZED SUBSAMPLED BLOCK TRUNCATION CODING
1999 Vol. 21 (4): 506-510 [Abstract] ( 1715 ) [PDF 759KB] ( 628 )    DOI:

In this paper, a novel moving picture coding algorithm, called the adaptive multilevel quantized subsampled block truncation coding is presented. The experiments show that this algorithm has better performance than the other algorithms of the same kind and can be realized in real time with software in current PC, the compression ratio is 30 and the peak signal to noise ratio is 35.4 dB.

Select  |    Cite this article 
Sun Xiaorong; Wang Yumin
DESIGN OF SOFTWARE KEY ESCROW SYSTEM
1999 Vol. 21 (4): 511-515 [Abstract] ( 1708 ) [PDF 1119KB] ( 513 )    DOI:

Key escrow systems have gained much attention in recent years. A key escrow system can provide cryptographic protection to sensitive data ,while at the same time, allows for the decryption of encrypted message under lawful authorization. Since the public were not satisfied with the classified encryption method used in key escrow system in hardware, such as Clipper and Capstone, NIST of US announced a cooperative program with industry to explore the possibilities of performing key escrow cryptography using software-only techniques. This paper proposes a scheme for supporting the implementation of key escrow systems in software, which employs symmetric encryption algorithm for securing communication, and one-way hash function and asymmetric cryptography for identifying the users and verifying session key.

Select  |    Cite this article 
Zhang Jianzhong; Xiao Guozhen
A THRESHOLD SECRET SHARING SCHEME TO IDENTIFY CHEATERS
1999 Vol. 21 (4): 516-521 [Abstract] ( 1392 ) [PDF 1127KB] ( 508 )    DOI:

In this paper a threshold secret sharing scheme to identify cheaters is proposed by using authentication codes.The performance of the scheme is discussed. The results show that in the scheme the valid shareholders not only can identify the impersonation of an adversary, but also are able to detect the cheating of some valid shareholders, in particular one honest shareholder is able to detect the cheating of the other participants forming a coalition, and the information rate of the scheme is higher than that of others.

Select  |    Cite this article 
Kang Niankan; Xia Shanhong
MONTE CARLO SIMULATION OF ENERGY SPECTRUM AND SPACE CHARGE EFFECT OF MULTI-ENERGY ELECTRON BEAMS
1999 Vol. 21 (4): 522-528 [Abstract] ( 1518 ) [PDF 1318KB] ( 682 )    DOI:

An approach to generate a multi-energy electron beam by transmitting a monoen-ergetic beam though a solid film is proposed. The energy (velocity) spectrum of the resultant beam is predicted by Monte Carlo simulation of electron scattering. The calculation accuracy is fairly good in comparison with available measurements. Space charge effect of a multi-energy electron beam in a uniform electrical field or field-free space has also been analyzed.

Select  |    Cite this article 
Gao Shichang; Zhong Shunshi
ANALYSIS AND DESIGN OF A DUAL-POLARIZED MICROSTRIP ANTENNA ARRAY WITH PARALLEL CORNER FEEDING
1999 Vol. 21 (4): 529-535 [Abstract] ( 1854 ) [PDF 987KB] ( 1730 )    DOI:

In this paper, parallel corner feeding with two ports is proposed to realize the high isolation, dual-polarized microstrip antenna. A novel dual-polarized feedline network is designed for the array. A method of analysis is developed, which is based on the multiport network model, the cavity theory, the segmentation technique and the desegmentation technique. A one-layer coplanar microstrip antenna array at 6GHz band is designed. The measured isolation between two feeding ports reaches -50dB, which is much better than those of one-layer dual-polarized arrays commonly used.

Select  |    Cite this article 
Fang Zhenxian; Liu Ying
TERNARY CIRCUITS AND THEORY OF THREE ESSENTIAL CIRCUIT ELEMENTS
1999 Vol. 21 (4): 536-542 [Abstract] ( 1456 ) [PDF 1110KB] ( 585 )    DOI:

Based on a quaternary algebra, this paper presents a unified theory of ternary circuits-theory of three essential circuit elements (signal, network and load). The theory shows that a simple transform relation exists between ternary gate stage and switch stage, between ternary switch stage structures and between ternary dynamic and static circuits. Particularly, various ternary dynamic and static circuits can be deduced from the same equation.

Select  |    Cite this article 
Gao Jianjun; Gao Baoxin; Liang Chunguang
EQUIVALENT CIRCUIT MODEL OF METAL-SEMICONDUCTOR-METAL PHOTODIODE
1999 Vol. 21 (4): 543-548 [Abstract] ( 1831 ) [PDF 1245KB] ( 593 )    DOI:

An MSM photodiode equivalent circuit model based on external microwave port characters are presented in this paper, while the parameters of DC and capacitance model preserve the physical meaning. The circuit simulation results are agree with experimental results.

Select  |    Cite this article 
Li Xia; Xie Weixin
FRACTAL NEURAL NETWORKS FOR SHORT TERM MEMORY
1999 Vol. 21 (4): 549-552 [Abstract] ( 1496 ) [PDF 765KB] ( 698 )    DOI:

Synaptic connection matrix encodes limited information. It is well known that neural network memory with storage prescriptions based on Hebb s rule will collapse as more patterns are stored. By requiring that old patterns are automatically forgotten and the memory recalls only the most recent ones, a new short-term neural network memory based on Y.Baram s fractal neural network is proposed. Comparison is made with Morris and Wong's method and the experimental results are shown to be rather satisfactory and encouraging.

Select  |    Cite this article 
Jiang Yongrnei; Kuang Gangyao; Liang Diannong
UWB FOPEN SAR MAN-MADE TARGET SIGNATURE
1999 Vol. 21 (4): 553-556 [Abstract] ( 1685 ) [PDF 951KB] ( 698 )    DOI:

Foliage penetrating (FOPEN) VHF/UHF SAR can image hidden man-made targets with wide-angle and ultra-wideband to achieve both range and azimuth with high resolutions. The target can be modeled by dihedral formed between its side and the ground due to the long wavelength of VHF/UHF. The paper provides the backscattering signal form of dihedral model, SAR image of man-made targets is simulated in theory and the signature library is formed which can be utilized in the subsequent stages of target detection and recognition.

Select  |    Cite this article 
Tian Jianbo; Zheng Dong; Wang Yumin
THE DISCUSSION OF PARALLEL ATTACK
1999 Vol. 21 (4): 557-560 [Abstract] ( 1464 ) [PDF 676KB] ( 554 )    DOI:

The parallel attack is discussed in this paper from the semantics, and the method of decision is presented.

Select  |    Cite this article 
Liu Huanping; Yang Yixian; Yang Fangchun
MULTISTAGE SECRET SHARING BASED ON ONE-WAY FUNCTION
1999 Vol. 21 (4): 561-564 [Abstract] ( 1739 ) [PDF 413KB] ( 597 )    DOI:

This paper points out the drawback of the secret sharing schemes proposed by J.He, et al. (1994) and L. Harn(1995). This paper also gives the secret sharing schemes, which overcome the above mentioned drawback.

Select  |    Cite this article 
Du Biao; Yang Kezhong; Zhong Shunshi
FIVE-BEAM PARABOLIC TORUS REFLECTOR ANTENNA
1999 Vol. 21 (4): 565-568 [Abstract] ( 1901 ) [PDF 552KB] ( 590 )    DOI:

The radiation field formulas are given for a parabolic torus reflector antenna. A five-beam parabolic torus antenna with 90?azimuth coverage has been designed and developed. An experimental radiation pattern of these five beams and theoretical patterns of the central beam of the antenna are also given. Comparison between calculated and measured patterns shows they are in good agreement. Finally, the measured gain data for the central beam and the edge beam are presented.

Select  |    Cite this article 
Hou Xinyu; Wan Wei; Tong Mingan; Wan Guobin
ANALYSIS OF TRANSMISSION PROPERTIES OF A SYMMETRIC DOUBLE-LAYER FSS
1999 Vol. 21 (4): 569-572 [Abstract] ( 1440 ) [PDF 422KB] ( 675 )    DOI:

A symmetric double-layer frequency selective surface is studied by adopting the symmetric and anti-symmetric excitation method. Transmission properties of the structure are discussed for different dielectric parameters of the structure. It is shown that the frequency response of the structure can be great by improved by choosing suitable dielectric parameters of the covering and coating layers.

Select  |    Cite this article 
Zhang Yu
THE EXPERIMENTAL STUDY ON THE EFFECT OF TIME VARIATION OF ATMOSPHERE ON THE PRECISION OF RADIOWAVE REFRACTIVE CORRECTION
1999 Vol. 21 (4): 573-576 [Abstract] ( 1663 ) [PDF 782KB] ( 677 )    DOI:

To improve the precision of the outer measuring system,the accuracy of radiowave refractive correction must be raised. The refractive correction's formulation in the assumption of atmospheric ballface stratification does not meet the requirements,because the atmospheric parameters are fucnctions of the four dimention at temporospatial structure. The new refractive correction's formulation needs to study the atmospheric variations not only on space, but also on time. This paper gives the experimental results of the effect of the atmospheric time variation on the precision of the radiowave refractive correction.

电子与信息学报
Author Center
Online Submission
Author Instruction
FAQ
Template
Copyright Agreement
MSN:je-jeit@hotmail.com
Links
More>>  
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech