Loading...
Office

Table of Content

    20 September 2007 Volume 34 Issue 7
      
    Original Articles
    Improvement and performance analysis of the WAPI certificate authentication protocol
    TIE Man-xia1;2;LI Jian-dong1;2;WANG Yu-min1
    J4. 2007, 34(7):  1-4. 
    Abstract ( 2340 )   PDF (263KB) ( 1352 )   Save
    Related Articles | Metrics
    The WAPI certificate authentication protocol implements the peer mutual authentication between AE and ASUE and guarantees the access of the legislate users, to the legislate network. But because in general the public key computation is complex, this introduces an access bottle-neck for the network. The trusted third party is made full use of and the counts of public key computation in AE and ASUE are reduced when they operate in frequent handover environment or their power is limited in some applications, so an improved protocol is presented. PCL-based analysis and test result show that the new protocol has the same security features as that original one and its efficiency and system acceptance are obviously improved.
    A new algorithm for coverage control and traffic balance of base stations in the mobile communication network
    XUE Fu-Guo1;2;LI Jian-Dong1;PANG Ji-Yong1
    J4. 2007, 34(7):  5-8. 
    Abstract ( 1764 )   PDF (273KB) ( 948 )   Save
    Related Articles | Metrics
    A new algorithm for adapting the coverage and capacity of a base station in mobile networks is proposed. The base station’s coverage varies with its utilization. Then traffic balance between base stations is achieved and network utilization is improved though adaptive coverage adaption. The algorithm is simple and can be used in any existing and future mobile networks.
    An eficient symbol timing synchronization for OFDM systems
    GUO Yi;LIU Gang;GE Jian-hua
    J4. 2007, 34(7):  9-13. 
    Abstract ( 2239 )   PDF (287KB) ( 1546 )   Save
    Related Articles | Metrics
    In OFDM systems, the symbol timimg error over multipath fading channels should stay inside the ISI free range of the guard interval. For DAB systems, the correct symbol timing can be obtained using a 2048-point IFFT of the demodulated phase reference symbol, but it demands heavy computational work and complex control circuits. In this paper, a new efficient symbol timing synchronization algorithm is proposed for DAB systems, which utilizes the good autocorrelation of the phase reference symbol in the time domain. Compared with the method associated with IFFT, the method proposed has a lower complexity and a nicer flexibility with the system performance unchanged.
    ID-based Group Key Distribution Scheme with Dynamic Joining
    YANG Chen;MA Wen-ping;WANG Xin-mei
    J4. 2007, 34(7):  14-17. 
    Abstract ( 1770 )   PDF (274KB) ( 928 )   Save
    Related Articles | Metrics
    A new efficient identity-based group key distribution scheme that can dynamically determine the key distribution user-set is constructed. In the proposed scheme, each user obtains his decryption key based on his identity information from the key distribution center, and the bilinear mapping on Elliptic Curve is utilized to construct the broadcast encryption algorithm and decryption algorithm. The broadcast center only needs to broadcast a controlling header of less constant transmission size (three group elements), and the authorized users can recover the session key correctly from the broadcasting information. Both fully collusion-free security and dynamic joining for users are also implemented.
    Performance analysis of STBC-QOTDM over spatially uncorrelated channels
    SUN En-chang;LIU Zu-jun;TIAN Bin;YI Ke-chu
    J4. 2007, 34(7):  18-22. 
    Abstract ( 1863 )   PDF (492KB) ( 979 )   Save
    Related Articles | Metrics
    An STBC-QOTDM Multi-input Multi-output (MIMO) is proposed, in which the Quasi-orthogonal Time Division Multiplexed (QOTDM) sample sequences are Space Time Block Coded (STBC) before transmission. Based on the integral relationship between the modified Gaussian Q-function, the probability density function and the characteristic function of the channel, a closed form solution for symbol error probability (SEP) of STBC-QOTDM due to the sample errors over spatially uncorrelated fading channels is derived. And the performance of STBC-QOTDM is also given by Monte Carlo simulation.
    A new fast-acquisition algorithm of the PN code in direct sequence spread_spectrum systems
    WANG Miao1;WANG Xiao-chun2
    J4. 2007, 34(7):  23-26. 
    Abstract ( 1532 )   PDF (275KB) ( 1011 )   Save
    Related Articles | Metrics
    Based on the closed-loop with a pre-loop estimator, the optimum seeking method is proposed into the fast acquisition algorithm of the PN code, a new algorithm is proposed the Marokv Model is set up, and the function of the mean acquisition time and its variance are deduced. The performance of acquisition is simulated. The result of computer simulation indicates that the algorithm can improve the performance and that it is more practical.
    The Performance Analysis of DAS Based on the K -distribution Fading Fhannel
    PAN Wen;JIANG Zhan-jun;DU Zheng-feng;WANG Yan;YOU Xiao-hu
    J4. 2007, 34(7):  27-30. 
    Abstract ( 1837 )   PDF (290KB) ( 991 )   Save
    Related Articles | Metrics
    In mobile communication, the Rayleigh-Lognormal distribution can be obtained from the channel with large scale fading, shadowing fading and small scale fading. The Rayleigh-Lognormal distribution has no closed form equation so that it is not suited to the performance analysis. K distribution can be substituted for Rayleigh-Lognormal distribution since the difference between them is small and the K distribution has a closed form equation. The performance of distribution antenna system (DAS), generalized-DAS (GDAS) and center-SIMO with shadow fading are analyzed and compared based on K distribution for one transmitter antenna in uplink communication. A new method for calculating the upper bound closer than Jeason upper bound is proposed. Simulation and theory show that the performance of DAS is the best and that the performance of SIMO is the worst.
    A coded modulation design for concatenated simple parity-check codes
    LIN Deng-sheng;XIN Pei-zhe;LI Shao-qian
    J4. 2007, 34(7):  31-34. 
    Abstract ( 1579 )   PDF (247KB) ( 889 )   Save
    Related Articles | Metrics
    A coded modulation scheme for concatenated simple parity-check (SPC) codes and QAM modulation is studied. By analyzing the approximate union bound on SPC codes considered QAM modulation, it is shown that in order to improve BER performance, the Euclidean distance of the parity-check bits should be enlarged. On the contrary, that of the information bits should be decreased. Finally, the optimum Euclidean distance distribution between the parity-check bits and the information bits is obtained by computing the approximate union bound. And simulation results show that after optimizing, some codes have an about 2dB BER performance gain at the high SNR region compared with the traditional scheme.
    Research on a wireless sensor network used in railway track inspection
    HUO Hong-wei;ZHANG Hong-ke;ZHANG Si-dong
    J4. 2007, 34(7):  35-38. 
    Abstract ( 2318 )   PDF (350KB) ( 1427 )   Save
    Related Articles | Metrics
    It is significant and meaningful for scienctific research and transportation security to monitor the track and roadbedod rail and to transmit the corresponding information to the locomotive manipulator. In this paper, we present a novel wireless sensor network with a multi-sink mobility model for track and roadbed monitoring using wireless sensor networks with sink mobility. We have recommended the network’s structure and defined the hierarchy of the data transmission. A dynamic Power-Control scheme is also proposed. Simulation results show that this model is useful and effective.
    An efficient method for association rules mined in telecommunication alarm correlation analysis
    LI Tong-yan; LI Xing-ming
    J4. 2007, 34(7):  39-42. 
    Abstract ( 1637 )   PDF (290KB) ( 1032 )   Save
    Related Articles | Metrics
    The mining of association rules is one of the primary methods used in telecommunication alarm correlation analysis, in which the alarm databases are very large. The efficiency of the algorithms plays an important role in tackling large datasets. The classical FP-growth algorithm can produce a large number of conditional pattern trees which makes it difficult to mine association rules in telecommunication environment. In this paper, an algorithm LFPTDP based on the Layered Frequent Pattern Tree is proposed for mining frequent patterns and deleting infrequent items with dynamic pruning which can avoid producing conditional pattern trees. Analysis and simulation show that it is a valid method with better time and space efficiency, which is adapted to mining association rules in telecommunication alarm correlation analysis.
    Intrachannel four-wave mixing in high speed optical fiber transmission systems with different modulation formats
    QIN Xi;ZHANG Feng; Lü Bo;LU Dan;CHEN Ming;JIAN Shui-sheng
    J4. 2007, 34(7):  43-46. 
    Abstract ( 1607 )   PDF (321KB) ( 971 )   Save
    Related Articles | Metrics
    Intrachannel Four-Wave Mixing (IFWM) is one of the most important nonlinear effects in optical fiber transmission systems with a bit rate higher than 10Gb/s. It induces the timing jitter to ‘1’ pulses and produces ‘ghost’ pulses to ‘0’ pulses, which will worsen the eyediagram and result in a bit error. In this paper, the mechanism of IFWM is analyzed in detail. And the abilities of return-to-zero (RZ), carrier-suppressed return-to-zero (CSRZ), and alternate mark inversion (AMI) to suppress the ‘ghost’ pulse induced by IFWM are theorectically compared. The results show that the AMI code is the most effective one in suppressing the ‘ghost’ pulse, CSRZ is the moderate one, and the RZ code is the poorest one. Numerical simulation is utilized to validate the conclusion. The conclusion is a good reference for designing of high speed optical fiber transmission systems.
    Outage probability analysis of the cognitive radio system with interference temperature constraints
    HUANGHui;ZHANG Zhao-yang;CHENG Peng;QIU Pei-liang
    J4. 2007, 34(7):  47-50. 
    Abstract ( 2544 )   PDF (371KB) ( 1166 )   Save
    Related Articles | Metrics
    The cognitive radio is proposed as a key technology for improving the utilization of the radio electromagnetic spectrum. In this paper, a multi-user cognitive system in Rayleigh fading channels is analyzed. Several cognitive links coexist in the same spectrum, and their transmission power is restricted by the interference temperature constraint in the primary receiver, as well as constraints on outage probabilities of each link. We study optimal transmission power allocation in order to improve the utilization of the spectrum and satisfy the fairness of each cognitive link. The Rayleigh fading, the channel noise and the interference signal from other cognitive links are all modeled, and the outage probability of the cognitive link is also given. The problem of maximizing the product of the transmitting rates subject to constraints on outage probability and interference temperature is posed as a geometric program. Simulation results show that the approximated solution matches the optimal one very well.
    Algorithms for parameters and sequence estimation of the PN code in long code DS-SS signals
    XU Hai-yuan;HUANG Zhi-tao;ZHOU Yi-yu
    J4. 2007, 34(7):  51-54. 
    Abstract ( 1965 )   PDF (367KB) ( 1028 )   Save
    Related Articles | Metrics
    To investigate the parameters and sequence estimation of the PN code in long code direct sequence spread spectrum (DS-SS) signals, the algorithms including the second order moment of the autocorrelation estimator, the maximum norm approach and matrix eigenvalue decomposition are introduced. New results are deduced for long code DS-SS signals in contrast to short code ones. The methods for estimation of the PN code period, timing offset, symbol period and spread spectrum sequence are proposed. Simulation results show the efficiency of the proposed methods.
    Performance analysis of physical-layer network coding based on the MAP mapping algorithm
    Lü Ling;YU Hong-yi;GUO Jin-huai
    J4. 2007, 34(7):  55-58. 
    Abstract ( 2536 )   PDF (334KB) ( 1376 )   Save
    Related Articles | Metrics
    By embracing the wireless interference, physical-layer network coding significantly enhances the throughput performance of multi-hop wireless networks. Current researches on this technology only consider the scenarios in which two users and power control are involved. In this paper we expand its application circumstance from chain network to general network, present the physical-layer network coding scheme based on the MAP mapping algorithm and analyze its performance. Results show that physical-layer network coding can be applied to the general network. By maintaining the same transmitting energy, the best performance is achieved when both nodes’ energies are equal. The number of the participant nodes and channel state are also the factors that influence the performance of physical-layer network coding.
    Research on p-cycle algorithms with the wavelength continuity constraint
    DENG Yu;ZANG Yun-hua;ZHAO Lei;ZHANG Jie;GU Wan-yi
    J4. 2007, 34(7):  59-63. 
    Abstract ( 1944 )   PDF (348KB) ( 898 )   Save
    Related Articles | Metrics
    This paper focuses on the research on conventional p-cycle algorithms’ performance degradation while there is not any wavelength converter in optical networks. Further, two improved strategies of p-cycle algorithms, viz. FPLC (Fixed Paths Least Congestion) pre-routing algorithm and wavelength complement configuration method, are proposed. Based on our extensive simulations, it can be concluded that the improved p-cycle algorithms can well satisfy the wavelength continuity requirement when the protection switch is being performed compared with the conventional p-cycle algorithms, in spite of a little higher block probability of dynamic traffic. Thus our work is contributive to applying p-cycle protection to present optical networks.
    On strategies for the self-configuring carrier sensing threshold in
    wireless sensor networks
    LIU A-na;YU Hong-yi;ZHENG Chun-jie
    J4. 2007, 34(7):  64-67. 
    Abstract ( 2920 )   PDF (408KB) ( 1052 )   Save
    Related Articles | Metrics
    Some problems on the strategy of the self-configuring carrier sensing threshold are discussed, which aims at energy-efficiency in wireless sensor networks. To measure the performance of collision avoidance and throughput achieved under different carrier sensing ranges, the Sensing Effectiveness Index and the Sensing Cost Index are first introduced. In addition, with an assumption of the Gaussian noise, the stochastic background noise causing that medium is determined mistakenly under fixed carrier sense thresholds are analyzed. Finally, a basic idea of self-configuring carrier sensing threshold is proposed, which is the tradeoff of the effects on the network performance of the carrier sensing range and stochastic noise.
    A general network reliability simulation model
    FAN He-hong;SUN Xiao-han
    J4. 2007, 34(7):  68-71. 
    Abstract ( 2096 )   PDF (312KB) ( 1253 )   Save
    Related Articles | Metrics
    A general network reliability simulation model based on a time-evolving state-transition Monte Carlo method is introduced. The model can be used to simulate and evaluate various network reliability indexes for 2-terminal or multi-terminal connectivity including network reliability, network availability, MTTF, MTBF, MTTR, etc. Compared to the exiting method, this model applies more widely. For that, either the network link or network nodes can be unreliable; the network can be unrepairable or repairable with either limited or unlimited repair capability; furthermore, life distribution and repair time distribution of the network elements can be either exponential or not. Simulation and analysis of reliability and availability parameters of several directed and undirected network with various repair capabilities demonstrate the versatility of the model to simulate and estimate various network reliability indexes for various networks; also the comparison of some of the results with those of former studies validates the model.
    Improved uniform linear adaptive array for interference cancellation
    WANG Wei;CAO Xiang-yu;LIU Tao;WEN Xi
    J4. 2007, 34(7):  72-75. 
    Abstract ( 2040 )   PDF (251KB) ( 1035 )   Save
    Related Articles | Metrics
    Aiming at the problem that the conventional adaptive algorithm generally needs to estimate the direction of arrival signal beam and that the error of direction estimation will worsen the performance of an adaptive array, an improved adaptive algorithm is proposed here, based on a uniform linear array. By introducing the array steering vector, the ability to search for the desired signal beam is obtained by the adaptive array, so the complicated process for direction estimate is avoided. Its system scheme is also presented here. Finally, the validity of the algorithm is verified by the simulation experiment on the 16-units linear array.
    Object tracking based on the spatial color model
    WANG Shu-peng1.2;JI Hong-bing1
    J4. 2007, 34(7):  76-79. 
    Abstract ( 2515 )   PDF (297KB) ( 1431 )   Save
    Related Articles | Metrics
    A visual object tracking algorithm is presented using a spatial color model and particle filtering. For lack of spatial information, the observer likelihood based on the color histogram often leads to inaccurate localization when the background has a similar color to that of the objects. The spatial-color histogram which combines the color and spatial information is used to model the object. By relying on the Bhattacharyya distance of the spatial color histogram, a new observer likelihood is built and applied to particle filtering. Experimental results show that the proposed algorithm can achieve more accurate and robust tracking results.
    A dynamic bluetooth polling scheme based on memory
    XU Fei;ZHUANG Yi-qi;GUO Feng
    J4. 2007, 34(7):  80-83. 
    Abstract ( 1961 )   PDF (223KB) ( 993 )   Save
    Related Articles | Metrics
    The pure round robin polling scheme in Bluetooth specification is inefficient in throughout and average delay. To improve the performance of the Bluetooth piconet, a new dynamic polling scheme based on memory (MBRR) is put forward. This project was enlightened by the action in which ants search for food, the efficiency of the piconet is raised by increasing the polling times to the slaves which have many more payloads. Meanwhile, this project maintains the fairness of each slave. A comparison is made in performance between PRR, ERR and MBRR schemes. The simulation result shows that the MBRR scheme excels in throughput and delay behavior, and has good fairness.
    An efficient incremental BDPCA algorithm
    CAO Xiang-hai;LIU Hong-wei;WU Shun-jun
    J4. 2007, 34(7):  84-87. 
    Abstract ( 1770 )   PDF (298KB) ( 959 )   Save
    Related Articles | Metrics
    Through the analysis of CCIPCA, it can be proved that CCIPCA is an online form of the power method, and its statistical efficiency corresponds to the parameter ,when the data is weighted with the exponential window; based on the character of the power method, we adjust the initial vector and weight, and the computation complexity of CCIPCA is decreased; Based on the modified algorithm, an incremental BDPCA algorithm is presented. Experiments based on ORL and ATT face database demonstrate the efficiency of the presented algorithm.
    An improved unscented Kalman filter for nonlinear systems
    PAN Ping-jun;FENG Xin-xi;LIU Ying-kun;SHI Lie;LI Zheng
    J4. 2007, 34(7):  88-94. 
    Abstract ( 2790 )   PDF (433KB) ( 1178 )   Save
    Related Articles | Metrics
    The significant advantages of the recently developed Unscented Kalman Filter (UKF) for nonlinear systems are its easly implementation, better accuracy and moderate computational complexity. However, the UKF has as bad robustness as the extended Kalman filter (EKF) in modelling uncertainty, and is sensitive to the initial conditions. To overcome the limitations of the UKF, an improved UKF based on the theory of Strong Tracking Filters (STF) is developed in the paper. The improved filter could adjust a filtering gain matrix on line by introducing a time-varied fading matrix. Its effectiveness is demonstrated using a simulation example of target tracking. The simulation results show that the improved UKF has good robustness and can rapidly converge.
    Robust temporal error concealment for H.264 with adaptive block sizes
    ZHANG Ming;BI Du-yan;LI Cheng; Lü Dan
    J4. 2007, 34(7):  95-99. 
    Abstract ( 1977 )   PDF (346KB) ( 1076 )   Save
    Related Articles | Metrics
    To improve the decoded quality of videos when bit stream data incur transmission errors, an effective temporal error concealment algorithm is proposed for H.264 coded video. It uses not only motion vectors and reference frames but the modes of macroblocks adjacent to the lost macroblock as well. Each lost macroblock is concealed on the basis of different block sizes depending on the modes of neighboring macroblocks. Then the motion vector with the minimum value of external boundary match distortion is selected for each block from a list of motion vector candidates. Finally, motion estimation is employed to more accurately recover the lost motion vectors and improve the video quality. For video sequences with different motions and various lost rates of inter-coded macroblocks, experimental results show the proposed technique can obtain a better video quality than conventional temporal concealment techniques and the computational complexity is very low.
    Partial least square regression based head-related transfer function personalization
    HU Hong-mei1;2;ZHOU Lin1;MA Hao1;WU Zhen-yang1
    J4. 2007, 34(7):  100-103. 
    Abstract ( 2128 )   PDF (311KB) ( 1213 )   Save
    Related Articles | Metrics

    A method is proposed to obtain individual head related transfer function (HRTF) based on the partial least square regression (PLSR), in which anthropometric parameters are selected by correlation analysis and the original HRTF data are preprocessed before principal component analysis. Then the objective simulation experiment and subjective sound localization experiment are implemented to evaluate the method. Experiments show that the estimated HRTF has not only a small mean square error, but also little perception difference from the measured one;the localization performance of the individual HRTF estimated by the partial least square regression presented in this paper is more accurate than that of the non-individual HRTF obtained from the database and also more accurate than that estimated via the least square regression (LSR).

    Maneuvering emitter tracking using a single passive observer
    based on radial acceleration information
    YANG Zheng-bin;GUO Fu-cheng;ZHOU Yi-yu
    J4. 2007, 34(7):  104-107. 
    Abstract ( 2989 )   PDF (317KB) ( 1092 )   Save
    Related Articles | Metrics
    To tackle the problem of tracking a maneuvering emitter by a single passive observer, a method using the radial acceleration and angle measurements, combined with unscented transformation(UT) based interacting multiple-model(IMM) algorithm is proposed. The associated mathematical model and to measuring the approaches radial acceleration are also presented. Computer simulations are conducted to compare the proposed method with the traditional bearing only method and the method using the bearing and the bearing rate. Simulation results show that the proposed method is more effective.
    Video object segmentation by 2-D mesh-based motion analysis
    according to motion connectivity
    WANG Yu-jian 1; 2;WU Zhen-yang 2
    J4. 2007, 34(7):  108-111. 
    Abstract ( 1788 )   PDF (456KB) ( 1056 )   Save
    Related Articles | Metrics
    Video object extraction is a key technology in the content-based video coding. A new temporal-spatial video object segmentation algorithm is proposed. This algorithm is based on 2-D mesh-based motion analysis according to motion connectivity. Firstly, a 2-D adaptive mesh fitting the original frame image is obtained via the feature detection algorithm. Then, a higher order statistics motion analysis according to motion connectivity is made of the 2-D mesh representation to get a coarse motion boundary layer. After refining the coarse boundary layer and post-processing the labeled maximal connected region, the final segmenting mask is quickly obtained. Hence the video object is effectively extracted. Experimental results show that the proposed algorithm combines the merits of the mesh-based segmentation algorithms and the pixel-based segmentation algorithms, and therefore achieves satisfactory subjective and objective performance as well as increasing the speed of segmentation.
    ISAR imaging model and analysis of the spin target with high velocity
    LI Yu-sheng1; LIU Ai-fang2;ZHU Xiao-hua1
    J4. 2007, 34(7):  112-115. 
    Abstract ( 2439 )   PDF (377KB) ( 1136 )   Save
    Related Articles | Metrics
    The problem of inverse synthetic aperture radar (ISAR) imaging of a spinning target with high velocity is discussed. The feature of this kind of target is analyzed and the new scheme for the ISAR imaging is proposed. First the ISAR echo signal model of a spinning target with high velocity is presented. And then the ISAR imaging character of this kind of target is analyzed. According to this analysis, a method for ISAR imaging projection plane calculation is introduced. Computer simulations are presented which verify the proposed algorithms.
    Research on adaptive update interval algorithms in phased array radars
    CHENG Ting;HE Zi-shu;TANG Ting
    J4. 2007, 34(7):  116-119. 
    Abstract ( 2229 )   PDF (274KB) ( 1040 )   Save
    Related Articles | Metrics
    An IMM-based and an AGIMM-based adaptive update interval algorithm are proposed for the adaptive update interval problem in phased array radars. In the former algorithm, the update interval is proportional to the inverse square root of the position residual. In the AGIMM-based algorithm, the update interval adjusts according to the moving step of the mid-model. In order to balance the tracking precision and system load effectively, a controllable parameter is introduced. Simulation results demonstrate the effectiveness of the algorithms.
    Mobile location based on the quadratic reflection model
    HUANG Ji-yan;WAN Qun;YANG Wan-lin
    J4. 2007, 34(7):  120-123. 
    Abstract ( 2061 )   PDF (303KB) ( 923 )   Save
    Related Articles | Metrics
    A novel algorithm based on the quadratic reflection assumption is proposed to obtain the precise mobile location in the non line of sight (NLOS) conditions. The algorithm breaks through a single reflection assumption and can work well in quadratic reflection conditions.
    Study of the fuzzy comprehensive group decision model of multi-zone and multi-objective power limiting distribution for Peak load shifting control
    LIU Jia1;2;SHI Yi-bin2;LI Yang1;GAO Li-qun1;SONG Sheng-xian3
    J4. 2007, 34(7):  124-127. 
    Abstract ( 1967 )   PDF (374KB) ( 894 )   Save
    Related Articles | Metrics
    The problem of Power Limiting Distribution for Peak Load Shifting Control is discussed with the AHP and fuzzy set theory, and the fuzzy-comprehensive group decision model of multi-zone and multi-objective Power Limiting Distribution for Peak Load Shifting Control is established. Through the study of a practical example, the satisfactory results are obtained.
    An application of TDPO and its Parallel algorithm
    to the analysis of electromagnetic scattering
    YANG Ling-xia;GE De-biao;JIANG Yan-nan
    J4. 2007, 34(7):  128-131. 
    Abstract ( 2101 )   PDF (268KB) ( 1042 )   Save
    Related Articles | Metrics
    The Time Domain Physical Optics (TDPO) approach is developed for the analysis of transient scattering by electrically large PEC objects. The development is based on the inverse Fourier transformation of the frequency domain physical optical expression. The estimation of required computer memory is discussed. Too much time and prohibitive computation resources are needed for the analysis of electromagnetic characteristics of electrically ultra-large objects. To overcome this drawback, a parallel algorithm that combines TDPO and MPI function is presented. Numerical results show that the speed-up ratio is approximately equal to N, where N is the number of processors, illustrating the high efficiency and good performance of the parallel TDPO.
    3D FDFD analysis of electromagnetic scattering from a complex target
    HU Xiao-juan;GE De-biao
    J4. 2007, 34(7):  132-135. 
    Abstract ( 2170 )   PDF (305KB) ( 1086 )   Save
    Related Articles | Metrics
    The finite-difference frequency-domain (FDFD) equations of electronic field nodes are derived by differentiating the Helmholtz equation, based on the distribution of electric field nodes in Yee cells. Based on the equivalence principle, the incident wave is introduced in the total-field region by setting equivalent electromagnetic currents on the total-field/scattered-field (TF/SF) boundary. The FDFD equations of the nodes located near the TF/SF boundary are modified to fulfill the conditions that all nodes involved belong either to the total-field or to the scattered-field. The method is validated by comparing the amplitude and phase of the surface current on a perfectly electronic conductor cube, which are calculated by the FDFD method, with the result presented in the literature.
    Edge Enhancement and Segmentation Algorithm based on the Snake Model and Lifting Scheme Wavelet Transform for the Infrared Target
    JIAN Yao-bo1;2;RUAN Shuang-chen2;QIN Han-lin3;ZHOU Hui-xin3
    J4. 2007, 34(7):  136-139. 
    Abstract ( 2519 )   PDF (399KB) ( 1112 )   Save
    Related Articles | Metrics
    For the infrared image with characteristics of low contrast and low signal-to-noise, an algorithm for infrared target enhancement and segmentation, which is based on the lifting scheme wavelet transform and the snake model, is presented. Firstly, the lifting scheme wavelet transform is adopted to enhance the infrared image, and then the snake model is utilized to extract target edge information. Finally,the infrared image enhancement and segmentation is achieved . The experi- mental result validates that the presented method can achieve good results compared with other methods.
    Research on ground-to-air missile radar fuze early-exploding by the effect of JEM
    Zhang Lu-you;Zhang Yong-shun;Wang Jian-ye
    J4. 2007, 34(7):  140-143. 
    Abstract ( 1855 )   PDF (373KB) ( 968 )   Save
    Related Articles | Metrics
    Through theoretical analysis and digital simulation, this paper studies the spectrum produced by the effect of JEM and the basic reason that the early-exploding is caused. It also brings forward the method for avoiding the Fuze early-exploding. This method is valuable to military applications.
    Analysis of the double negative media based on the Drude model using the FDTD method
    MA Jia-jun;CAO Xiang-Yu;LIU Tao
    J4. 2007, 34(7):  144-147. 
    Abstract ( 1665 )   PDF (360KB) ( 1249 )   Save
    Related Articles | Metrics
    Metamaterials with double negative permittivity and permeability, based on the Drude model, are analyzed using the FDTD method. The formulation is deduced by the differential method. Numerical results describing the electromagnetic wave propagation through a DNG slab in both 1-D and 2-D cases are presented, which demonstrate conclusively that the DNG media have the property of backward wave direction and negative refraction index.
    SVM target identification method based on polarization HRRP
    LIANG Hai-tao;TONG Chuang-ming;WANG Xiao-dan
    J4. 2007, 34(7):  148-151. 
    Abstract ( 2470 )   PDF (447KB) ( 1163 )   Save
    Related Articles | Metrics
    Aiming at the problem of the lower identification rate and worse robustness of the support vector machine (SVM) towards the data source of a single radar target high resolution range profile and integrating radar targets’ polarization information, targets’ polarization integration HRRP is produced, on the basis of which one SVM target identification method is proposed. This method is used for the processing and identifying experiments on four classes of real test and for emulating targets’ ISAR imaging data, and the clearly better and robust result is obtained. The correctness and validity of the method are proved.
    Study of the surface wave band-gap feature
    of curved electromagnetic band-gap structures
    LIU Tao;CAO Xiang-yu;WEN Xi
    J4. 2007, 34(7):  152-155. 
    Abstract ( 1839 )   PDF (210KB) ( 1251 )   Save
    Related Articles | Metrics
    The surface wave band-gap characteristics for three typical curved EBG structures are studied. By using the suspending microstrip method, the effect of curved EBG structure parameters and curvature on band-gap characteristics is analyzed. The results show that the effect of curvature is insignificant, a slight decrease in. The center frequency of band-gap effect of substrate permittivity and dielectric thickness on band-gap characteristics is in agreement with the effect of planar structures parameters. This conclusion has some important guiding significance for its application to cylindrical conformal antennas.
    An FV-FD hybrid method simulating EM scattering
    DENG Cong;YIN Wen-lu;CHAI Shun-lian;MAO Jun-jie
    J4. 2007, 34(7):  156-159. 
    Abstract ( 1911 )   PDF (334KB) ( 870 )   Save
    Related Articles | Metrics
    An FV-FD hybrid method is proposed by presenting a novel connecting condition between the two algorithms which match in time in different schemes. The RCS of a 2-D PEC cylinder illuminated by the TE wave is calculated as a numerical example, which shows that the method has the advantages of higher accuratly, reduction in running time and saving of computational space .
    Study of the multi-channel biologic magnetic induction tomography
    hardware system
    LI Ye;DONG Xiu-zhen;WANG Cong;LIU Rui-gang;YOU Fu-sheng;SHI Xue-tao
    J4. 2007, 34(7):  160-163. 
    Abstract ( 1878 )   PDF (308KB) ( 1029 )   Save
    Related Articles | Metrics
    Key techniques for biologic magnetic induction tomography are analyzed. A highly precise phase detection method is implemented based on its principle. A stable programme control exciter and weak signal pickup circuits are designed, and a 16 channels magnetic induction tomography hardware system is finally completed. Preliminary imaging experiment based on the homogenous conductivity model is conducted, and the primary image is reconstructed by using the magnetic induction tomography reconstruction algorithm of our team. Experimental results show that the image of an object that has a low conductivity like biologic tissues can be reconstructed by magnetic induction tomography contactlessly. In the aspect of hardware design, the precision of phase detection and system stability are vital decisive factors for imaging quality.
    Improved stencil topology used in the precorrected-FFT solution of EM scattering
    CHEN Zhong-kuan; WANG Sheng-shui;CHAI Shun-lian;MAO Jun-jie
    J4. 2007, 34(7):  164-167. 
    Abstract ( 2282 )   PDF (372KB) ( 1085 )   Save
    Related Articles | Metrics
    A fast solution of 3-D metallic and dielectric objects is implemented using the precorrected-FFT method. To reduce near-zone interactions to be computed directly and precorrected, an improved stencil topology is presented in which the projection and interpolation stencils are floating but not fixed. Numerical results show that the P-FFT method based on the floating stencil can significantly reduce near-zone interactions, thus reducing memory and CPU time.
    Nonuniformity correction algorithm based on the Kalman-filter with
    a piecewise model for infrared image sequences
    QIN Han-lin1;ZHOU Hui-Xin1;LIU Shang-qian1;JIAN Yao-bo2;3
    J4. 2007, 34(7):  168-172. 
    Abstract ( 2229 )   PDF (469KB) ( 939 )   Save
    Related Articles | Metrics
    To reduce the effect that the detector nonlinear response imposes on the nonuniformity correction, a nonuniformity correction algorithm based on the Kalman-filter with a piecewise model is presented. This paper introduces a piecewise linear model of a detector response curve. And the Kalman-filter based nonuniformity correction algorithm is improved, which adapts to infrared focal plane arrays with nonlinearity of the response characteristic. Compared with the original algorithm, it can solve not only the problems of detector offset and gain drift with time, but also the influence of the detector nonlinear response to the nonuniformity correction performance to some extent. Therefore it achieves a better effect of the nonuniformity correction than the original algorithm. The nonuniformity correction capability of the improved algorithm is validated with real infrared image sequences.
    Tracking control and synchronization of the Josephson-circuits-coupled quantum cellular neural network
    WANG Sen;CAI Li; WU Gang; LI Qin
    J4. 2007, 34(7):  173-176. 
    Abstract ( 5703 )   PDF (380KB) ( 938 )   Save
    Related Articles | Metrics
    Tracking control of a hyperchaotic system called the Josephson-circuits-coupled Quantum Cellular Neural Network is studied. A tracking control method is proposed for this chaotic system and it is proved by means of the Lyapunov function that this method can make the system approach any desired smooth orbit at an exponential rate. The synchronization with R?ssler’s chaotic system is also presented. Numerical simulations are given to illustrate the effectiveness of the proposed method.
    Multi-finger power SiGe HBT with high thermal stability
    JIN Dong-yue;SHEN Pei;ZHANG Wan-rong;WANG Yang;SHA Yong-ping;HE Li-jian; ZHANG Wei;XIE Hong-yun
    J4. 2007, 34(7):  177-180. 
    Abstract ( 1542 )   PDF (531KB) ( 790 )   Save
    Related Articles | Metrics
    A multi-finger power SiGe heterojunction bipolar transistor (HBT) with non-uniform finger spacing was fabricated to improve the thermal stability. Experimental results show that the peak temperature of SiGe HBT with non-uniform finger spacing is lowered by 15.87Kcompared with that of uniform finger spacing HBT under the same operational condition. The temperature profile across the device can be improved obviously at different biases for the same HBT with non-uniform finger spacing. With the increase of IC, the capability of HBT with non-uniform finger spacing to improve the temperature profile is more significant. Because of the decrease in peak temperature and the improvement of temperature profile, the power SiGe HBT with non-uniform spacing can operate at a higher bias and hence has higher power handling capability.
    A novel LDO regulator design with internal frequency compensation
    XIAO Jian1;MO Liang-hua2; LIU Yuan-cheng2;ZHANG Fu-jia1
    J4. 2007, 34(7):  181-184. 
    Abstract ( 2368 )   PDF (435KB) ( 2517 )   Save
    Related Articles | Metrics
    A CMOS low Dropout Regulator based on a novel frequency compensation technique with a low equivalent series resistance(ESR) output capacitor is presented. An internal frequency compensation circuit is used to solve the stability and to facilitate the use of multilayer ceramic capacitors for the load of LDO regulators, thus improving transient response and reducing the cost greatly. Test result from a prototype fabricated by SMIC 0.35μm technology proves the feasibility of this method, with the measured output overshoot voltage of less than 20mV when the load cureent steps from 1mA to 100mA.
    Network delay monitor placement based on the hierarchical clustering method
    SHI Heng-hua;XU Xin
    J4. 2007, 34(7):  185-188. 
    Abstract ( 1692 )   PDF (385KB) ( 848 )   Save
    Related Articles | Metrics
    The problem of the Internet monitor placement is turned to that of the network topology cluster. The hierarchical clustering method set is selected to cluster the network nodes for the hierarchical characteristic of the network. An algorithm is put forward based on the difference between the network nodes, which recursively eliminates one out-degree exceptional node. Under the conditions of keeping the basics of the network topology, the proposed algorithm decreases the effect of exceptional nodes on the cluster result. We regard the maximum out-degree nodes in each cluster as the cluster centers, which are chosen as the monitors. Our simulation results show that the complete linkage method of the hierarchical clustering method set can better cluster the network nodes and the proposed algorithm can further improve the cluster result. The proposed algorithm effectively solves the problem of the Internet monitor placement.
    Three dimensional object recognition
    based on the invariant moments and neural network
    XU Sheng;PENG Qi-cong
    J4. 2007, 34(7):  189-192. 
    Abstract ( 1986 )   PDF (653KB) ( 1131 )   Save
    Related Articles | Metrics
    To improve the performance of a 3D object recognition system, the extraction of the invariant moments of 3D objects as object features, together with the modified BP neural network, is used for 3D objects classification and recognition. The theoretical analysis and simulation prove that using the invariant moments feature of 3D objects has the ability to make classification and recognition. The analysis of its is further principal components made to process these invariant moments features to get better recognition performance. A 100% classification rate can be obtained, and the complexity and training time of the neural network are reduced.
    Architecture and performance analysis of the novel high performance computing system based on asynchronous optical packet switching
    ZHAO Jun;SUN Xiao-han
    J4. 2007, 34(7):  193-196. 
    Abstract ( 2198 )   PDF (380KB) ( 811 )   Save
    Related Articles | Metrics
    A novel high performance computing system (HPCS) based on asynchronous OPS and optical multicast is presented. Distributed management is realized in the tree-like structure and can easily achieve all-optical scalability. A 3.2Tbit/s huge capacity fiber with 40 GBit/s single channel capacity is used, and it can interconnect 6400 nodes in two-stage architecture. The packets retransmission mechanism is used to resolve the system collision. Stability and packets waiting delay of the system are simulated. System stability increases with the number (k) and sending rate (b) of old packets, and when b increases to infinity, the maximum value of packets arriving rate (λ) goes to 800packets/s. The packets waiting delay induced by the collision increases with λ while decreasing with the packets leaving rate (μ) and the number of the service windows (C). When C is more than 6 or μ increases to 1000packets/s, the waiting delay decreases to the order of 10-10 seconds.
    Mechanizing probability theory in Isabelle/HOL
    WANG Jin-shuang;ZHANG Xing-yuan;ZHANG Yu-sen
    J4. 2007, 34(7):  197-200. 
    Abstract ( 1724 )   PDF (363KB) ( 838 )   Save
    Related Articles | Metrics
    This paper formalizes the probability theory in Isabelle/HOL/Isar based on the mathematical measure theory. It presents the formal definition of probability space in Isabelle/HOL and verifies the main properties of probability measure. Formally it verifies the Caratheodory’s extension theorem, which lays a foundation for the construction of various probability spaces. This formalization will facilitate the formal verification of probabilistic algorithms and probabilistic systems in Isabelle/HOL.
    Packet classification algorithm based on the maximum feature entropy
    used in GIDS
    NING Zhuo1;2;GONG Jian1;2
    J4. 2007, 34(7):  201-204. 
    Abstract ( 2121 )   PDF (272KB) ( 845 )   Save
    Related Articles | Metrics
    The heavy workloads of the Gigabit Intrusion Detection System (GIDS) make the packet classification algorithm critical to its performance. However,unfortunately In GIDS the problem of creating a minimal decision tree that is consistent with a set of data is NP hard. Based on the former research[1,2], we propose a new algorithm MaxFeatureEntropy to perform local optimization by choosing the most discriminating feature which has the most high entropy when creating the rule decision tree. The method of evaluating the feature entropy of rules is also discussed. The experimental results show that compared to Hicuts and Picuts, the performance of MaxFeatureEntropy improves 44.4% and 20% respectively, and its memory consumption is 10% of that of Hicuts, and 60% of that of Picuts.
    Research on image processing in conoscopic holography measurement
    REN Shu-yan
    J4. 2007, 34(7):  205-208. 
    Abstract ( 1317 )   PDF (377KB) ( 761 )   Save
    Related Articles | Metrics

    To resolve the error in processing fringe images with heavy noise, light fluctuation and low contrast in non-contact measurement based on conoscopic holography, the measurand can be computed from its relation with the phase of a fringe. A method for scanning in selection region is presented on the analysis of common methods’ shortage. It is used to pick up numbers of fringes and the phase of less than one fringe, and it connects the fringe projection with the gradient center of mass to count the numbers of extreme points of the light fringe and start points of less than one fringe which needs fitting by the cosine function. Experimental results show that this method can reduce effects of fringe curvature, backup and light fluctuation. So measurement velocity and precision can be improved correspondingly.

    Biometrics based on multimodal fusion
    LI Xue-yan;GUO Shu-xu;GAO Fengli
    J4. 2007, 34(7):  209-212. 
    Abstract ( 2068 )   PDF (257KB) ( 1005 )   Save
    Related Articles | Metrics
    The dyadic wavelet transform is adopted to extract the finger-vein pattern from finger images, which contain the vein pattern, shading and noise. Images are transformed from the spatial domain to the wavelet domain, and wavelet coefficients of the vein patterns and the noise are processed by the soft-thresholding denoising method, which can recover the vein pattern from noisy data. The vein images with the denoised coefficients are reconstructed, which are the feature images. Then the template is used to match the vein patterns.
    Analysis of the climbing obstacle capability of the eight-wheeled lunar rover
    with the torsion-bar and rocker suspension
    QIU Xue-song;DENG Zong-quan
    J4. 2007, 34(7):  213-216. 
    Abstract ( 1256 )   PDF (423KB) ( 700 )   Save
    Related Articles | Metrics
    Considering the structural characteristic of the eight-wheeled lunar rover with the torsion-bar and rocker suspension and lunar terrain condition, the relationship between the structural dimension of the eight-wheel lunar rover with the torsion-bar and rocker suspension and the parameters for figuring the climbing obstacle capability is described by the quasi-static method. According to the meaning of the inserted coefficient, the climbing vertical obstacle height of the unit wheel diameter is gained by the primary structural parameters described. The curve between climbing vertical obstacle height of the unit wheel diameter and every structural parameter is obtained. The climbing obstacle capability of every wheel synthetically is evaluated. Finally the variation curve is obtained when the structural parameters changes at the same time as the different inserted coefficient. The effect of the two primary structural parameters working on the lunar rover climbing obstacle capability is analysed. The relative error between the height of simulation and that of theoretical calculation is below 10%, which verifies the reliability of analysis.
    Research on motion control of the lunar rover with a torsion bar and rocker-bogie
    YU Xin-yi;DENG Zong-quan; GAO Hai-bo
    J4. 2007, 34(7):  217-221. 
    Abstract ( 1499 )   PDF (427KB) ( 749 )   Save
    Related Articles | Metrics
    This paper analyses the motion of an articulated lunar Rover with a torsion bar and two rocker-bogies and force acting to wheels, and presents five operation patterns of motion of the rover’ wheel . The free-running operation pattern is perfect, and the power dissipation between mechanisms is minimum. The different mode of the motor has an influence on the stability of motion in various terrains. We analyze the motion of the lunar rover for the three simple-driving modes of the motor in the plane terrain and in the uneven terrain using operation patterns of the wheel. According to the mechanical configuration of the rover, operation pattern of the wheel, and principle of speed matching of wheels, we present a control algorithm which can fit various uneven terrains and merge it into the whole locomotion control system. Finally, the experiments in the outdoor prove that the control method is right and that the control system is stable.
    Reseach on the novel variable depth of the cut boring system
    LIU Xin-hui;CHEN Zhi-hua;LI Sheng-yi
    J4. 2007, 34(7):  222-224. 
    Abstract ( 890 )   PDF (232KB) ( 498 )   Save
    Related Articles | Metrics
    Based on the analysis of the domestic and abroad research on the technology of the variable depth of the cut boring system, a novel intelligent boring bar is developed. The whole configuration,micro-feeding device, and control method of the intelligent boring bar are introduced in detail.