Journal of Xidian University 2008 Vol.35
Please wait a minute...
For Selected: Toggle Thumbnails
Research on ISAR imaging of the complexly moving target based on the time-chirp distribution
LI Ya-chao;SU Jun-hai;XING Meng-dao;BAO Zheng
J4   
Abstract2677)      PDF(pc) (1524KB)(1460)       Save
The change in chirp rate caused by the complex motion of the ship target deteriorates the azimuth focusing quality. This paper proposes a new imaging method based on TC-DechirpClean(DechirpClean searching method based on the time-chirp distribution), which makes use of the changing rate of scatterers’ chirp to search their chirp rate and change rate of the chirp rate in the time-chirp distribution plane. At the same time, we do FFT after compensating the higher-order phase term to acquire the information about the center frequency and magnitude of these scatterers according to the maximum magnitude criteria. Finally, we can reconstruct the echo signal and obtain an instantaneous ISAR image. The imaging result of real data confirms that this method can greatly improve an unfocused ISAR image caused by the change rate of the chirp rate.
Related Articles | Metrics
Optimal UWB pulse design method based on B-spline
WANG Min;WU Shun-jun;LUO Feng
J4   
Abstract1902)      PDF(pc) (809KB)(987)       Save
The Ultra-Wideband (UWB) pulse waveform in communication need not only achieve orthogonality but also meet the Federal Communications Commission(FCC) spectral mask for the UWB commercial system. B-spline functions exhibit good approximation properties when serving as a basis in function learning. In this paper, a flexible UWB pulse waveform design method is proposed based on B-spline basis. The task of UWB pulse waveform design is represented as a constrained optimization problem, which takes the spectrum utility ratio as the target function, and takes orthogonality and spectral mask as the constraint. Subsequently the UWB pulse waveforms obtained in this way have the advantages of better spectrum utility ratio and complying with the FCC spectrum mask. The system of B-spline is also applicable to implemented circuits. Experimental results show the feasibility and merits of the proposed method.
Related Articles | Metrics
SAR image despeckling using statistical priors in nonsubsampled contourlet transform domain
SUN Qiang;JIAO Li-cheng;HOU Biao
J4   
Abstract2395)      PDF(pc) (1915KB)(1032)       Save
A new despeckling scheme for synthetic aperture radar (SAR) images is proposed based on the adaptive shrinkage principle in the nonsubsampled contourlet transform (NSCT) domain. First, the statistical distributions of signal and speckle noise coefficient magnitudes in the NSCT-domain image subbands are effectively approximated by Gamma distributions and exponential distributions, respectively, which can make the shrinkage factor well adapt to the high redundancy of NSCT image subbands. A new set of directional neighborhood models is then proposed to calculate the prior ratio, making the shrinkage factor well adapt to the flexible directionality of NSCT-domain image subbands, thus enhancing the coefficient shrinkage performance. The experimental results on a real SAR image demonstrate that the proposed despeckling scheme can preserve the details while speckle noise is reduced. Compared with several classical despeckling methods, the new scheme has better edge preservation performance and backscattering coefficient preservation performance.
Related Articles | Metrics
Ambiguity analysis of the distributed micro-satellites SAR system
YI Yu-sheng;LIU Xin;LIU Nan;ZHANG Lin-rang
J4   
Abstract1733)      PDF(pc) (747KB)(1035)       Save
A calculational method for ambiguities of long base-line distributed micro-satellites synthetic aperture radar system is proposed. The precision position of ambiguity dots is derived from micro-satellites’ real orbit information and the geometry of distributed micro-satellites. And the formulas are given to calculate both the range ambiguity ratio and azimuth ambiguity ratio, followed by the simulation analysis of the ambiguities of the Cartwheel formation and the Pendulum formation, which shows the ambiguity property of the distributed micro-satellites SAR System. The results of the simulation analysis indicate that the range ambiguities of micro-satellites will get close to that of the chief satellite as the decrease in distance between chief satellite and micro-satellites, and that the azimuth ambiguities of micro-satellites almost remain constant.
Related Articles | Metrics
Non-orthogonal joint diagonalization for blind source separation
ZHANG Hua;FENG Da-zheng;NIE Wei-ke;XU Xian-feng
J4   
Abstract2508)      PDF(pc) (604KB)(1253)       Save
A novel cost function and a corresponding iterative algorithm for the non-orthogonal joint diagonalization of a set of eigen-matrices are proposed. The proposed cost function, improved from the classical least squares cost function that is the fourth function associated with the mixture matrix, is quadratic if two of the three parameter sets are fixed. Therefore, a new iterative algorithm based on the gradient descend method contains three sub-steps. In each sub-step, the closed solution is found by minimizing the cost function associated with one parameter group while fixing the others. Furthermore, global convergence is analyzed even in the presence of the estimation error of the eigen-matrix group. Finally, the results of the simulations illustrate that the proposed algorithm has better convergence performance, lower computational complexity, and can accurately retrieve the source signals from a set of received signals.
Related Articles | Metrics
Low complexity detection algorithm for the space-time bit interleaving coded modulation system
LI Ying;GUO Xu-dong;WANG Xin-mei
J4   
Abstract2259)      PDF(pc) (616KB)(1035)       Save
A new low complexity iterative detection algorithm is proposed for the space-time bit interleaving coded modulation system. By utilizing the characteristics of the interleaving and the central limited theorem, the superstition of the transmitted signals at the receiver is first assumed as a Gaussian random variable. Therefore, the matrix inverse calculation can be avoided, which enables the proposed method to be used in a system with more transmitter antennas than receiver antennas. Under the previous assumption, P most significant symbol combinations are identified via the sequential principle to calculate the log likelihood ratio of each bit, which will be used by the iterative decoding. Compared with the available sequential algorithm, the proposed method reduces the complexity without sacrificing any performance.
Related Articles | Metrics
Immune algorithm for TSP with dynamic vaccination
QI Yu-tao;LIU Fang;JIAO Li-cheng
J4   
Abstract2157)      PDF(pc) (694KB)(1087)       Save
To enhance the efficiency of artificial immune algorithms for Traveling Salesman Problem (TSP), we designed a dynamic vaccination strategy. The proposed vaccination obtains both single-vaccines and multi-vaccines by applying a linear complex intersecting operation on a random subset of the memory cell. The lengths of vaccines increase with iteration, which depresses the problem size and algorithm’s searching space. Compared with other vaccination strategies, the proposed strategy is unsupervised, which makes more accurate prediction of edges in the best tour and helps immune algorithms to maintain better solution paths.
Related Articles | Metrics
Spherical shell clustering based on quantum measurement
YANG Xun1;XIE Wei-xin1;2;HUANG Jian-jun2
J4   
Abstract2221)      PDF(pc) (861KB)(987)       Save
Laboratory of Defense Technology, Shenzhen Univ., Shenzhen 518060, China)
This paper proposes a method based on quantum measurement for spherical shell clustering. This method simulates the conscious cognition of the human brain using quantum measurement. It regards a sample set as an environment quantum ensemble which is measurable and the stimulus quantum system. In this thought, each sample is treated as a microcosmic state of quantum superposition. The stimulus quantum ensemble attracts the conscious attention and makes the cognition mechanism produce corresponding spherical shell surface operators by collapsing on microcosmic states in probability. A shell surface operator is applied to measure the environment quantum ensemble and the average measure value can be obtained which validates the operator. At the same time, a sample set on the shell surface will come forth. Quantum shell clustering has the ability of perfect initialization and auto-detection of the class number of clustering compared with fuzzy shell clustering. The quantum cognition thought,which integrates unconscious data-driving and conscious concept-driving in information-processing, can be further studied and applied in the other pattern analysis.
Related Articles | Metrics
Trajectory invariable-information target tracking algorithm with bearing-only measurement
LIU Jin-mang1;2;JI Hong-bing1;ZUO Tao2
J4   
Abstract2627)      PDF(pc) (640KB)(1303)       Save
Force Engineering Univ., Sanyuan 713800, China)
For the single sensor target tracking with bearing-only measurement, a novel trajectory invariable-information target tracking algorithm is proposed. A new cotangent theorem is deduced to solve the nonlinearity for bearing-only measurement. Both the heading angle calculation and the invariable-information of target trajectory are deduced to estimate the target bearing. For asynchronous bearing-only measurements from multiple sensors, a new two-sensor-with-bearing-only measurement target tracking method is brought forward, which estimates the target position by the geometry between sensors and target. Simulation results show that the new algorithm achieves a favorable tracking precision.
Related Articles | Metrics
Design of the fuzzy neural PID controller based on hybrid PSO
ZHAO Jun;CHEN Jian-jun
J4   
Abstract2203)      PDF(pc) (734KB)(1137)       Save
Considering the problems of the linearity limit of PID control and the steady-state error in fuzzy, fuzzy PID control for it cannot easily obtain the control rules of the integral error, so a fuzzy neural PID controller which consists of a fuzzy neural network and a PID neural network is designed. The parameters of the controller are optimized by the mixed learning methods integrating the offline particle swarm optimization algorithm combined with chaos strategies of global searching ability, with the online BP algorithm of local searching ability. Simulation results show that the designed novel controller and the proposed optimization algorithm have obviously improved the performance of the transient state and steady state in the control processing. Compared with conventional PID, fuzzy control and fuzzy-PID control method, the new controller with the optimization method has good robustness and better performance. The new method breaks through the limit of linearity of PID control and expands its applications. It also provides a new reference for the combination of intelligent method and PID method.
Related Articles | Metrics
Model checking multirate hybrid systems
ZHANG Hai-bin;DUANG Zhen-hua
J4   
Abstract1716)      PDF(pc) (515KB)(968)       Save
The model checking problem for initialized multirate hybrid systems is investigated, which is to check whether or not an initialized multirate automaton satisfies a property described by a hybrid interval temporal logic (HITL) formula. Firstly, some rules are defined to translate an HITL formula to an interval temporal logic (ITL) formula. Then, an equivalence relation over state spaces of multirate automata is defined to construct region automata from multirate automata. By constructing a labeled finite state automaton from a region automaton, the model checking issue for initialized multirate automata is translated to the same issue for ITL. Thus, by using the model checking algorithms for ITL and the translating rules defined in this paper, the model checking problem for initialized multirate hybrid systems can be solved.
Related Articles | Metrics
Design methods for non-fragile controllers for a class of uncertain impulsive hybrid systems
CHEN Guo-pei1;LI Jun-min1;YANG Ying1;2
J4   
Abstract1702)      PDF(pc) (572KB)(903)       Save
A non-fragile control method for the impulsive hybrid system, whose discrete part is described by a finite state machine (FSM), is presented. It can avoid the effect of the parameter uncertainty of the controller. By concerning the stability of two parts, a concept of asymptotical stability for the whole hybrid system is proposed. Then, based on the optimal road idea, the discrete state can visit the desired set infinitely often along the optimal road by controlling the firing of discrete event, i.e., the FSM is stabilized. In addition, by using the multiple Lyapunov function, under the assumption that the additive gain variation of controller is bounded, the control gain is determined to stabilize the continuous subsystem by solving an LMI. So, the whole hybrid system is stabilized. A simulation example shows the effectiveness of the proposed approach. This approach can be used for computer integrated manufacturing systems and traffic management systems.
Related Articles | Metrics
Multicast routing algorithm for network coding
WANG Jing1;LIU Jing-mei1;WANG Xin-mei1;YUAN Rong-liang2;LIU Xiang-yang3
J4   
Abstract2272)      PDF(pc) (631KB)(1763)       Save
Information Eng. College, Xi′an Univ. of Science & Tech., Xi′an 710054, China; 3. Military Comprehensive Information Network Teaching Office, Xi′an Commun. College, Xi′an 710106, China)
This paper presents a new multicast routing algorithm for network coding. The algorithm searches the routing groups from source to each sink by using the Dijkstra reduction network. In the process of searching, link-sharing between different path groups is considered to decrease bandwidth resource consumption and improve load balance. Simulation results show that the routing algorithm is effective, and that its performance is closer to that of the minimum-cost multicast algorithm based on network coding. Finally, mathematical analysis indicates that the algorithm can reduce computation by 40% at least.
Related Articles | Metrics
On the correlation analysis of product sequences
XIAO Hong1;2;XIAO Guo-zhen1;WANG Xin-mei1
J4   
Abstract1880)      PDF(pc) (494KB)(912)       Save
Telecommunication Engineering Inst, Air Force Engineering Univ., Xi′an 710077, China)
This paper presents a complete representation of auto-correlation functions of product sequences generated by one nonlinear combining function which consists of a finite number of l linear feedback shift registers (LFSR’s) with an AND gate logic, gives a formula for determining the Hamming weight of this product sequences in a period, and shows that the auto-correlation functions of such a kind of product sequences take l+1 values and that the main maximum value is high.
Related Articles | Metrics
Provable secure ID-based threshold signature scheme without random oracles
ZHANG Le-you1;2;HU Yu-pu2;LIU Zhen-hua1;2
J4   
Abstract2533)      PDF(pc) (522KB)(1031)       Save
A (t, n) threshold signature scheme is presented and is provably secure in the standard model. The proposed construction possesses public verifiability and detects the dishonest participants by using Gennaro’s distributed key generation (DKG) protocol and the bilinear pairing. Its key generation does not require a trusted dealer in the key generation protocol and only runs an interactive protocol among n participants. This new scheme proves robust and secure against existential forgery under the adaptive chosen message attack, assuming that the computation Diffie-Hellman assumption holds.
Related Articles | Metrics
Study of the electronic structure of nitrogen doped 3C-SiC with first-principles calculation
SONG Jiu-xu;YANG Yin-tang;CHAI Chang-chun;LIU Hong-xia;DING Rui-xue
J4   
Abstract2162)      PDF(pc) (1148KB)(1321)       Save
The electronic structures of the nitrogen doped(3×3×3)3C-SiC supercell are studied with first-principle calculation in which exchange-correlation energy is indicated by generalized gradient approximation, electronic wave functions are expanded in terms of a plane wave basis set and electron interaction is substituted by a ultra-soft pseudo-potential. The electrical structures of 3C-SiC with different nitrogen doping concentrations are calculated, and results show that the bottom of the conduction band of nitrogen doped 3C-SiC is taken up by N 2s electron states, that the top of the valence band has N 2p electron states, and that the bottom of the conduction band and the top of the valence band shift to a lower energy while the speed of the bottom of the conduction band is faster than that of the top of valence band, which leads to the band gap being narrower with the increase in nitrogen doping concentration.
Related Articles | Metrics
Preparation and characterization of K-doped p type ZnO films
WU Jun;YANG Yin-tang
J4   
Abstract1539)      PDF(pc) (842KB)(973)       Save
Potassium(K), one of Ⅰ-group elements, is used as a dopant to prepare K:p-ZnO films deposited on single crystal Si(100) substrates by use of the radio frequency magnetron sputtering technique. The structures and electrical properties of the as-grown ZnO films are characterized by Hall, XRD, AFM and XPS measurements. The results indicate that the p-ZnO films show a typical preferred orientation of crystallites along with (002). When the substrate temperature and oxygen partial pressure are kept at 500℃ and 30%, respectively, the root mean square (rms) surface roughness of the p-ZnO thin films is 89.05nm approximately, and the hole concentration, mobility and resistivity are up to 5.45×1017/cm3, 1.96cm2/(V·s), and 5.91Ω·cm, respectively.
Related Articles | Metrics
Robust guaranteed cost control for the networked control systems
ZHANG Xi-min1;2;LI Jian-dong1;ZHANG Jian-guo3
J4   
Abstract1992)      PDF(pc) (564KB)(1108)       Save
By means of the Lyapunov method and the robust control theory, a robust guaranteed cost control appproach is presented for the networked control systems (NCS), which is of the single-packet transmission and the bounded random communication time-delay. The NCS is modeled as a discrete uncertain time-delay control system. The effect of the random communication time-delay on the systems is converted to the unknown bounded uncertain parameter disturbance. A sufficient condition for the existence of the robust guaranteed cost control law for the systems is proved, and the design of the robust guaranteed cost state feedback controller for the NCS is solved by a set of linear matrix inequalities. Finally, a numerical example shows the effectiveness of the proposed methed.
Related Articles | Metrics
A new method for reduced-reference image quality assessment
WANG Ti-sheng;GAO Xin-bo;LU Wen;LI Guang-dong
J4   
Abstract1831)      PDF(pc) (754KB)(1292)       Save
Based on the characteristic that image distortion results in the change of visual sensitivity coefficients of image, a new reduced-reference (RR) image quality assessment metric is proposed. Contourlet is applied to extract the visual sensitivity coefficients of the image. Summarizing the difference of visual sensitivity coefficients between the distorted image and the reference image, we can get the measurement of the distorted image. Experimental results illustrate that the proposed method has a good consistency with the subjective assessment of human beings, and can reflect the visual perception of the image effectively.
Related Articles | Metrics
Square attack on the 14-round block cipher SMS4
ZHONG Ming-fu;HU Yu-pu;CHEN Jie
J4   
Abstract2004)      PDF(pc) (532KB)(1004)       Save
In order to make a new security evaluation for the block cipher SMS4, a certain plaintext is chosen to built a gamma set that contains three active words. Based on the character of the diversification of the active words in the round structure of SMS4, a balance word is found in the ninth round by observing the spread path of the balance words, and therefore a new 12-round distinguisher is constructed, by use of which a 14-round square attack is made on SMS4. In the attack 232chosen plaintexts are needed and the time complexity is about 296.5.Thus the 14-round SMS4 is not immune to the Square attack.
Related Articles | Metrics
Task scheduling based on trust mechanism of the L-fuzzy set in grid computing
SUN Peng-gang1;QUAN Yi-ning1;LIU Jun-ping2
J4   
Abstract2019)      PDF(pc) (602KB)(1238)       Save
Mathematics and Information Science, Shaanxi Normal Univ., Xi′an 710062, China)
A novel trust model based on the L-fuzzy set is established. It describes the trust between entities by linguistic variables, presents a formalized depiction based on context-free grammar and uses fuzzy operators to dispose trust levels. A new task scheduling algorithm L-FSTM-Min-Min (L-Fuzzy Set Trust Model-Min-Min) is brought out based on this model and Min-Min algorithm. This algorithm utilizes the triple I method to make fuzzy inference for multi-recommendation trust rules based on fuzzy logic and achieves comprehensive trust evaluation.Through the experiment by the GridSim simulator, results show that task completing time is obviously reduced and that the number of failed services is greatly decreased compared with the Min-Min algorithm in the same condition.
Related Articles | Metrics
Area-efficient high-speed VLSI design of the RS(255,239) decoder
ZHANG Jing-bo1;DAI Xian-ying2;ZHANG He-ming2;HU Hui-yong1;JIA Da-zhong1
J4   
Abstract2276)      PDF(pc) (716KB)(1139)       Save
Based on the modified Euclid’s algorithm, a VLSI architecture is proposed, which only uses two folding calculating cells and three-stage pipeline processing architectures to improve its throughput. Also, a way is introduced to reduce the complexity and critical path delay of general finite multipliers by the transferring of field from the time domain to the composite domain. Based on the TSMC 0.18 standard cell library, the proposed RS decoder consists of about 20 614 gates for widely used RS(255,239) code, which reduces complexity by about 60% compared with an existing architecture with systolic arrays when having the same error correction ability.
Related Articles | Metrics
Watersheds algorithm for relative potential energy
ZHANG Li-li;YAO Yong;LIU Zhi-jing
J4   
Abstract1966)      PDF(pc) (750KB)(1438)       Save

A watersheds algorithm for relative potential energy is presented. The presented algorithm calculates the relative potential energy of watersheds and compares them with the preestablished thresholds to remove the unnecessary details and get the important contour information. This method is introduced on the basis of the fast watersheds model. As a result, over-segmentation is effectively restrained, region fusing is avoided and the efficiency improved accordingly. Experimental results have shown that, compared with the original region-fusing algorithm, the efficiency has increased by 14.3%, and that the over-segmentation phenomenon has been obviously improved.

Related Articles | Metrics

Mechanism study of the surface passivation effect on current collapse characteristics of AlGaN/GaN HEMTs

YUE Yuan-zheng;HAO Yue;ZHANG Jin-cheng;FENG Qian
J4   
Abstract1783)      PDF(pc) (518KB)(1062)       Save
The effects of surface passivation on AlGaN/GaN highelectronmobility transistors (HEMTs) have been investigated. The surface passivation layer of Si3N4 is deposited by plasma enhanced chemical vapor deposition (PECVD). The currentvoltage and gatedrain diode characteristics of AlGaN/GaN HEMTs before and after passivation are analyzed. The current collapse under DC sweep has been significantly decreased after passivation and the existence of small dispersion of drain current is due to traps in the GaN buffer. The drain current increases after passivation, because surface passivation reduces the surface state density and so increases the sheet carrier density shown in Transmission Linear Model (TLM) measurement.
Related Articles | Metrics
Asymmetric digital watermarking algorithm based on DHT
LIU Xiang-li1;KOU Wei-dong1;WANG Zhi-guo2
J4   
Abstract1808)      PDF(pc) (554KB)(1027)       Save
An Asymmetric digital watermarking algorithm is proposed, based on the discrete Hartley transform (DHT). The energy of the reference watermark is redistributed in the DHT domain to get embedding watermarks. They have the same correlation with the reference one. The embedding watermarks can be detected by the reference one, but not by one another. To decide whether the watermark is present or not, the detector compares the correlation coefficient with the decision threshold. In addition, the proposed algorithm deals with real numbers, which increases the computing efficiency compared with those dealing with complex numbers.
Related Articles | Metrics
Research on and evaluation of the reliability of a communication network management and control system
HAN Wei-zhan;ZHANG Si-dong;SUN Yu
J4   
Abstract2192)      PDF(pc) (739KB)(1333)       Save
The reliability of a communication network management and control system, typically a complicated integrated system of software and hardware, has a significant effect on the communication network. A new approach to analyzing and evaluating the reliability of the system of a communication network is proposed. The whole system is divided into some layers such as subsystems, centers, software/hardware system and modules. The corresponding reliability models like series, parallel-in-weight, “n from k” vote and redundant model, etc. are established according to the falure criteria. The reliability of the software system can be obtained by the module analysis method and the reliability of a center can be obtained by integrating software and hardware system reliabilities. From bottom to top, the integrated realiability of the whole system can be found in the end. We also give the processing of integrated analysis and evaluation. The efficiency of our approach is validated through a real example simulation.
Related Articles | Metrics
Research on the bistatic RCS characteristic of aircraft
HUANG Pei-lin;JI Jin-zu;WU Zhe
J4   
Abstract2148)      PDF(pc) (1383KB)(1191)       Save
The RCS of aircraft at different bistatic radar angles is gained to investigate the electromagnetism scattering characteristic of the multi-station and bistatic radar.This method uses an efficient method for revolving the target and fixing bistatic radar angle to avoid multiple picketage. Three bistatic RCS characteristics, which are symmetry, similarity and weak coupling, are found by comparing the target RCS with different bistatic radar angles. Some results are obtained as follows: stealth technology of monostatic radar could realize the stealth purpose by changing the electromagnetism scattering space distribution and making the intense wave crest go out of the important detect region, while techology of bistatic radar that intercepts the intense wave crest which is out of the important detect region is mainly used to meet the anti-stealth requirement.Both of the main threatening bistatic radar angles and the entire intense wave crest should be considered to estimate the target bistatic stealth characteristic.
Related Articles | Metrics
Analysis of two novel spherical helical antennas
ZHANG Hou1;YIN Ying-zeng2;XIA Dong-yu3
J4   
Abstract2106)      PDF(pc) (932KB)(1256)       Save
Antenna and EM Scatterng, Xidian Univ., Xi′an 710071, China; 3. P.O.B.2863, Beijing 100085, China)
Two novel spherical helical antennas are designed by projecting the planar equiangular spiral antenna onto the surfaces of hemisphere and partial sphere. Their radiation properties are analyzed by the moment method with the curved basic and testing function, and the curves of the VSWR, gain, polarization and pattern vs. frequency are also given, respectively. It can be seen that the circular polarization band of the novel hemispherical helical antenna is broader.The gain curve of the partial spherical helical antenna is flatter and the structure is simpler.
Related Articles | Metrics
Design and analysis of a verifiable secret sharing scheme
LI Hui-xian1;CAI Wan-dong1;PEI Qing-qi2
J4   
Abstract1904)      PDF(pc) (490KB)(1002)       Save
As the further expansion of the multiple secret sharing scheme, the multi-secret sharing scheme can share any number of secrets in one sharing session. In order to prevent the secret dealer’s and the participant’s cheating attacks like those in the existing multi-secret sharing schemes, a new verifiable threshold multi-secret sharing scheme is proposed. Each participant’s secret shadow is selected by himself and it can be transmitted to the secret dealer over a public channel. The shadow can be used in multiple sharing sessions without the need to be updated. At the same time, it is allowed to check whether each cooperative participant and the secret dealer have taken a legal action or not. The security of the proposed scheme is based on that of Shamir’s secret sharing scheme and that of the ECIES cryptosystem, and the difficulty in solving the elliptic curve discrete logarithm.
Related Articles | Metrics
Neural networks based on the genetic algorithm and its application in mechanical engineering
LIU Dao-hua1;2;YUAN Si-cong1;WANG Jin-you2;ZHAO Jin-chang1
J4   
Abstract2570)      PDF(pc) (606KB)(1099)       Save
Authors take advantage of the genetic algorithm (GA) to automatically obtain structures, weights and bias of neural networks (NN). A classified coding scheme is presented to get modeling parameters of an NN. Then a practical fitness function along with a new method that can automatically adjust the number of hidden nodes and connection weights according to the individual fitness values is described in detail. The proposed method is applied to calculate the parameters of a manipulator with a freedom of degree 2. Simulation result is compared with data obtained from practical experience and the back propagation(BP) learning algorithm. Comparison study indicates that the proposed method has many advantages such as higher simulation accuracy, less resource utilization and higher computational efficiency.
Related Articles | Metrics
Radio telescope pointing model based on the generalized extended interpolation correction method
KONG De-qing1;2;SHI Hu-li1;2;ZHANG Xi-zhen1;ZHANG Hong-bo1
J4   
Abstract1759)      PDF(pc) (913KB)(975)       Save
A new pointing error correction model of the radio telescope based on generalized extended interpolation is presented. After the linear pointing correction, the surveying region is divided into spherical Delaunay triangulations, and the whole smooth pointing correction surface is produced by using the high-accuracy generalized extended interpolation approximation method. In every Delaunay triangle, the border points of segmentation can meet the interpolation condition, and by using the surrounding information of joint (including the inner joint) sufficiently, the piecewise best-fitting is obtained. Simulation results using experimental pointing data of the 50m radio telescope show that this model improves the pointing forecast precision by 30.3 percent compared with the linear pointing model.
Related Articles | Metrics
QoS-aware cooperative diversity protocol for wireless LANs
LI Yi;JI Hong
J4   
Abstract2164)      PDF(pc) (557KB)(1080)       Save
By introducing quality of service(QoS) attributes into cooperative communications, a QoS-aware cooperative diversity protocol is proposed. According to different services, cooperative diversity is invoked only if the minimum data rate required to have a successful transmission cannot be achieved. Based on user-specific QoS requirements, partners are determined cautiously. Analytical and simulation results indicate that the QoS-aware cooperative diversity protocol can avoid the negative effect of error propagation in cooperation and greatly improve the system throughput.
Related Articles | Metrics
A novel GPS frequency estimation algorithm in high dynamic circumstances
ZHU Yun-long;LIU Zhong-kan;YANG Dong-kai;ZHANG Qi-shan
J4   
Abstract2263)      PDF(pc) (537KB)(1109)       Save
Low estimation precision and high loss-of-lock threshold are the two important drawbacks of the extended Kalman filter (EKF) which is the widely used GPS frequency estimation algorithm in high dynamic circumstances, caused by linearizing all nonlinear models. To resolve the problems of EKF, the unscented Kalman filter (UKF) which is a new kind of linear filter is introduced to estimate frequency. Instead of the linearization steps required by the EKF, a series of Sigma points and unscented transform (UT) are used to predict and update the state vector and covariance. Simulations indicate that the estimation precision of UKF is greatly improved compared with that of EKF, that the loss-of-lock threshold is about 1dB lower than that of EKF, and that the estimation performance is improved.
Related Articles | Metrics
Optimal joint design of adaptive coded modulation and ARQ
CHENG Peng;ZHANG Zhao-yang;HUANG Hui;QIU Pei-liagn
J4   
Abstract2025)      PDF(pc) (528KB)(1052)       Save
A cellular downlink system combining AMC and ARQ is considered. The BS obtains the channel state information through the feedback of the receiver, and then adaptively chooses the modulation and coding method at the physical layer to maximize the system spectrum efficiency. At the same time, ARQ at the data link layer is also adopted to improve the robustness performance. Based on this cross-layer system, the problem of spectral efficiency maximization for non-realtime services is studied, that is, how to maximize the spectral efficiency by optimally choosing the AMC parameters under the average delay constraint. First, the above cross-layer system is modeled under some reasonable assumptions. Then, the studied problem is formulated as a convex optimization one. Finally, this problem is solved with the classical Lagrangian method. Numerical simulations show that our proposed method is optimal.
Related Articles | Metrics
Inverse kinematic research based on a new type of reconfigurable robot
WEI Yan-hui;ZHAO Jie;ZHU Yan-he;CAI He-gao
J4   
Abstract1760)      PDF(pc) (503KB)(1026)       Save
The complicated work configurations of reconfigurable robots make it quite difficult to solve the problem of inverse kinematics, which directly affects the real time control and application of reconfigurable robots. In this paper, a new modular modeling method is proposed, and by using this new method, the kinematical model for a robot can be built immediately. This is a method that decomposes the work configurations of a robot at the target position into finite configuration planes, and by describing the workspace of these configuration planes, the orientations and positions of these planes can be matched to find the numerical solutions to a robot. The applicability of this method is proved through the kinematical simulation of an eight DOF robot built using elementary modules.
Related Articles | Metrics
Study of heat load forecasting based on the maximum entropy principle
CHEN Lie;QI Wei-gui;DENG Sheng-chuan
J4   
Abstract1604)      PDF(pc) (508KB)(997)       Save
According to the characteristics of architecture heat supply and the demands for energy-saving control, load forecasting based on the maximum entropy method is proposed. By using the least square fitting and the pretreatment approach, the historical random load series collected from the heat supply station are separated into the certain part and the random part. Then the load series is dealt with by the auto-correlation method and the maximum entropy method respectively. Comparing the results of these two methods shows that the load forecasting based on the maximum entropy theory can meet the demands for heating energy-saving control in terms of the forecasting accuracy, auto-adaptive and real-time ability better.
Related Articles | Metrics
Joint parameter estimation for MIMO systems
DONG Wei;LI Jian-dong;L Zhuo;HE Peng
J4   
Abstract2419)      PDF(pc) (775KB)(1458)       Save
This paper addresses the problem of frequency offsets and channel gains estimation for a multi-input multi-output (MIMO) system in flat-fading channels. The general case where frequency offsets are possibly different for each transmit antenna is considered. The maximum-likelihood(ML) estimation of the joint frequency offsets and channel gains is investigated, assuming that a training sequence is available. The exact solution to this estimation problem turns out to be too complex as it involves a search over a multi-dimensional domain. To solve this complex estimation problem, a novel joint estimation algorithm for frequency offsets and channel gains is proposed. The new algorithm involves two steps. Frequency offsets are first estimated by the particle swarm optimization(PSO) theory. Then channel gains are estimated by the ML estimator. Simulation results show that the proposed algorithm has a larger frequency offset estimation range than the correlation-based estimation algorithm and asymptotically achieves the Cramer-Rao lower bound (CRLB).
Related Articles | Metrics
Iterative channel estimation with noise reduction for MIMO-OFDM systems
GUO Yi;LIU Gang;GE Jian-hua
J4   
Abstract2541)      PDF(pc) (734KB)(1166)       Save
To eliminate the effect of inter-carrier interference(ICI) on MIMO-OFDM systems, an iterative channel estimation algorithm is proposed. Based on the frequency-domain orthogonal block pilot pattern, the new algorithm obtains a temporal channel response by the discrete Fourier transform(DFT) based channel estimation algorithm, and improves the estimation performance by the iterative channel estimation with noise reduction. With the channel pre-correcting and appropriate time-domain filtering, the new algorithm can effectively eliminate the effect of ICI and channel noises. Furthermore, owing to avoiding the inversion of a large matrix to decouple the inter-antenna interference, the new algorithm can be easily realized compared with the traditional algorithms.
Related Articles | Metrics
SNR aided RCFO estimation method for OFDM systems
REN Guang-liang;XING Jiang-tao;CHANG Yi-lin
J4   
Abstract6436)      PDF(pc) (636KB)(1163)       Save
A new residual carrier frequency offset(RCFO) estimation method is proposed for orthogonal frequency division multiplexing(OFDM) systems in wireless fading channel. In the method, the SNRs on all the sub-carriers are estimated and used to select high quality sub-channels. And then the hard decision data on the high quality sub-channels are combined with the pilot data to estimate the RCFO. The new method has the advantages of both pilot tone assisted(PTA) and decision directed(DD) methods. Simulation results show that the estimation accuracy of the proposed method has an improvement at least 4 times better than that of the PTA method, and at least 21 times better than that of the DD method when the SNR is more than 10dB.
Related Articles | Metrics
Low-complexity Zigzag codes coded orthogonal modulation with non-coherent detection
CHE Shu-ling;WANG Xin-mei
J4   
Abstract2369)      PDF(pc) (639KB)(1262)       Save
A low-complexity orthogonal modulation scheme with non-coherent detection is presented, which is suitable to the low-rate region. Information bits are first encoded by a Zigzag encoder and then the coded bits satisfying a single parity check constraint are mapped into a PPM symbol. According to the equivalence between soft-out demodulation and decoding of orthogonal Hadamard codes, demodulation and decoding can be considered as a whole at the receiver side, so not only can the iterative operations between decoding and demodulation be avoided, but also the fast Hadamard transform(FHT) and the so-called a posteriori probability fast Hadamard transform(APP-FHT) algorithm can be adopted to further decrease decoding complexity. Furthermore, linear interleavers with a joint design are used to improve the error floor problem in our scheme. Simulation results show that our scheme can lead to performance comparable to that of other non-coherent orthogonal modulation schemes.
Related Articles | Metrics