Loading...
Office

Table of Content

    20 October 2007 Volume 34 Issue 5
      
    Original Articles
    Modified KNN rule with its application in radar HRRP target recognition
    CHEN Feng;DU Lan;BAO Zheng
    J4. 2007, 34(5):  681-686. 
    Abstract ( 2313 )   PDF (636KB) ( 1252 )   Save
    Related Articles | Metrics
    Due to the target-aspect sensitivity of high resolution rang profiles (HRRPs), we first use a modified k-nearest neighbor (KNN) rule for binary-class classification problem, and then extend it to multi-class classification problems using the one against one (OAO) method. This method adjusts the effective influence size of each training sample in order to make sure the statistical confidence level in a range that can be trusted. Experimental results show our method’s good performance for multi-class classification problems and its effectiveness to improve the KNN rule.
    Low complexity iterative tree search detection for MIMO systems
    YANG Yuan;HU Jun-feng;WANG Wei;ZHANG Hai-lin
    J4. 2007, 34(5):  687-692. 
    Abstract ( 2394 )   PDF (678KB) ( 1205 )   Save
    Related Articles | Metrics

    This paper presents a low complexity bit-level iterative tree search (ITS) detector for Turbo-MIMO wireless communication systems. When combining natural binary bit mapping and QR decomposition on the augmented channel matrix with the symbol-level ITS, we get a bit-level ITS algorithm. In this algorithm the metric is computed in a bit-by-bit fashion. In this way the computational complexity of metric updating and sorting can be greatly reduced. Based on the bit-level ITS, the complexity can be further reduced using the a priori information from the decoder. Because the rank of the augmented channel matrix is always equal to the number of transmitting antennas, the algorithm can work well in an ill-conditioned channel. Simulation shows that the proposed algorithm can achieve similar performance to that of the ITS using natural binary bit mapping and has about 1dB gap with the ITS using Gray bit mapping. In the high SNR region, the complexity of the proposed bit-level ITS is about 6%~40% of the symbol-level ITS.

    Novel SNR estimation algorithm for OFDM systems
    REN Guang-liang;LUO Mei-ling;CHANG Yi-lin
    J4. 2007, 34(5):  693-696. 
    Abstract ( 2596 )   PDF (552KB) ( 1172 )   Save
    Related Articles | Metrics
    According to the requirements of the adaptive control in wireless OFDM systems and the weakness of Boumard’s method, a novel SNR estimation algorithm based on the preamble is proposed for OFDM systems. The average powers of signal and noise are estimated by making full use of the frequency autocorrelation characteristics of the received preamble data and the wireless channels, and thus the average SNR of the system is obtained. By using the estimated coefficients of the sub-channels, the SNR of each subchannel can also be obtained. Simulation results show that the performance of the proposed algorithm is better than that of Boumard’s method, and obtains an improvement by more than 10 times at the low SNR.
    Fast motion estimation algorithm in spatial enhancement layer based on SVC
    FENG Ying;WU Cheng-ke
    J4. 2007, 34(5):  697-701. 
    Abstract ( 1645 )   PDF (552KB) ( 950 )   Save
    Related Articles | Metrics
    Based on the analysis of the characteristics of motion estimation in the spatial enhancement layer, a new algorithm is proposed. The algorithm estimates the prediction threshold of pixel SAD with the information from the base layer. It makes a decision of whether the motion estimation with the residual-prediction is terminated, so a lot of macroblock can avoid the undesirable motion estimation with the residual-prediction. And it makes use of the upsampled motion vectors to do the motion estimation with the residual-prediction if it is unavoidable. Simulation results indicate that the proposed algorithm can decrease the coding time of the motion estimation in the enhancement layer by 35%, and the computational complexity of encoder is significantly reduced.
    Routing and scheduling algorithm based on compositive priority computing for high speed switching fabrics
    YANG Fan;QIU Zhi-liang;LIU Zeng-ji;YAN Jing
    J4. 2007, 34(5):  702-707. 
    Abstract ( 2280 )   PDF (726KB) ( 1119 )   Save
    Related Articles | Metrics
    An algorithm which computes integrated priority for the packet in the input memory switch is proposed. In this algorithm both the packet delay and packet loss rate are considered to compute packet priority. The length of the packet queue is turned into discrete values and weighted nonlinearly with packet delay priority. So the priority that combines packet delay and dynamic queue length is obtained. A packet scheduling algorithm based on this priority scheme is proposed for the input memory switch. The scheduling algorithm supports both packet delay and packet queue length. The application of this scheduling algorithm in Crossbar and Clos networks is presented. A new routing algorithm for balancing the load of high priority traffic is also proposed. Simulation results show these two algorithms can lower the packet loss rate and guarantee packet delay.
    Study of quantum communication systems used for free space
    YAN Yi1;2;PEI Chang-xing1;SHI Rui-juan1;HAN Bao-bin1;ZHANG Lei1
    J4. 2007, 34(5):  708-711. 
    Abstract ( 2397 )   PDF (644KB) ( 2171 )   Save
    Related Articles | Metrics
    An experimental system of quantum communication that operated for free space is presented. This system is composed of two subsystems, which use attenuated laser or entangled photon pairs as the photon source, respectively. It can be used for experimental investigation in atmospheric characteristics of the system using a single photon source or entangled photon pairs, respectively, along with a comparison of characteristics between the two systems. The results show that the atmosphere in the lower layer plays an important role in affecting the quantum communication, and that the efficiency of the quantum key distribution is higher in the system using a single photon source.
    Low power routing method based on reducing adjacent signal coupling dissipation
    LIU Yi1;2;YANG Yin-tang1;2;WANG Nai-di1
    J4. 2007, 34(5):  712-715. 
    Abstract ( 1925 )   PDF (495KB) ( 1025 )   Save
    Related Articles | Metrics
    According to the logic value of an adjacent signal, the coupling dynamic dissipation of the adjacent signal is computed. The method is used in calculating the dynamic dissipation of the N bit bus during M, so the average dissipation factor p<sub>M</sub> is obtained to reflect the average power of the N bit bus. With the datafile of the program address bus, the best routing of the bus is searched for by computing the lowest p<sub>M</sub>. As a result, the dynamic dissipation of the bus is reduced by 38.2%.
    Conal selection algorithm for multi-objective optimization problems
    SHANG Rong-hua;MA Wen-ping;JIAO Li-cheng;ZHANG Wei
    J4. 2007, 34(5):  716-721. 
    Abstract ( 2099 )   PDF (680KB) ( 1121 )   Save
    Related Articles | Metrics
    A new algorithm for multi-objective optimization problems is proposed. The antibodies in the antibody population are divided into dominated ones and non-dominated ones, which is suitable for the characteristic that one multi-objective optimization problem has a series Pareto-optimal solutions. Selecting of the non-dominated antibodies guarantees the convergence to the true Pareto-front and the convergence speed. The clonal operation implements the searching for optimal solutions in the global region and is available for getting a widely spread Pareto-front. Adopting the non-uniform mutation operation improves the searching for optimal solutions in the local region and assures the diversity of the solutions. Compared with the existing algorithms, simulation results show that the solutions obtained by the new algorithm are most widely spread, dominate those gained by the other algorithms to some extent and depress the metric S to less than 3%.
    Self-adaptive chaos quantum clonal algorithm
    LI Yang-yang;JIAO Li-cheng
    J4. 2007, 34(5):  722-727. 
    Abstract ( 1678 )   PDF (758KB) ( 993 )   Save
    Related Articles | Metrics
    A novel algorithm, called the self-adaptive chaos quantum clonal algorithms-SCQA, is proposed to avoid premature convergence. By adopting the quantum bit as a representation, SCQA uses the Logistic Sequence to control the mutation size and Chaos Mutation Operator to control the clonal selection. Simulations with function optimization problems show that SCQA performs well in terms of the quality of solution and computational cost,where the standard deviation is up to 10-7 and the number of the mean generations is less than 10.
    A robust detection algorithm for V-BLAST OFDM systems
    ZHAN Jin-long;LIU Hong-qing;LIAO Gui-sheng
    J4. 2007, 34(5):  728-732. 
    Abstract ( 2397 )   PDF (642KB) ( 1014 )   Save
    Related Articles | Metrics
    A robust detection algorithm based on the array signal processing theory is proposed for V-BLAST(Vertical Bell Labs Layered Space-Time) OFDM systems with a channel estimation error. The covariance matrix of receive data is eigendecomposed, and the signal subspace is obtained. Then the channel vector (with error) is projected onto the subspace, and more accurate channel vector is obtained. According to the beamforming algorithm, the detection filter coefficients are calculated. Simulation results show that the performance of the proposed algorithm is much better than ZF(Zero-Forcing) and MMSE(Minimum Mean Square Error) algorithms.
    Novel pre-processing method for SAR image based automatic target recognition
    HU Li-ping;LIU Hong-wei;WU Shun-jun
    J4. 2007, 34(5):  733-737. 
    Abstract ( 2703 )   PDF (689KB) ( 1041 )   Save
    Related Articles | Metrics
    An efficient image pre-processing method is proposed for Synthetic Aperture Radar (SAR) image based automatic target recognition application. Firstly, the smoothed target image is segmented from the clutter background via adaptive threshold segmentation, morphological filter and geometric clustering processing. Secondly, power transformation is used to enhance the obtained target image. Finally, Principal Component Analysis (PCA) and 2-Dimensional Principal Component Analysis (2DPCA) features are extracted for classifying the target. Experimental results based on the Moving and Stationary Target Acquisition and Recognition (MSTAR) data show that the recognition performance of PCA and 2DPCA by using the proposed pre-processing method can reach more 96.5%.
    Study on the pattern synthesis of microwave SIAR arrays
    YANG Ming-lei;CHEN Bai-xiao;ZHANG Shou-hong
    J4. 2007, 34(5):  738-742. 
    Abstract ( 3000 )   PDF (1210KB) ( 1516 )   Save
    Related Articles | Metrics
    On the basis of array model of the Multiple-Input Multiple-Output (MIMO) radar, a universal array model of the Synthetic Impulse and Aperture Radar (SIAR) is constructed and a realization sheme for microwave SIAR with a thinned subarray set for the transmitted array and a dense subarray set for the received array is proposed. Then a modified genetic algorithm (GA) with combined selection and double cross is employed in the optimization of the subarray position of bistatic SIAR antenna arrays to decrease the pattern’s sidelobe level with a fixed subarray number and a constant array aperture. Simulation results show that the modified GA raises the convergence velocity greatly with the maximum peak relative sidelobe level (RSLL) reaching -31.1dB, which meets the requirement of the project.
    Detection method for small targets in the IR image based on the variable weighted pipeline filter
    LIU Jin;JI Hong-bing
    J4. 2007, 34(5):  743-747. 
    Abstract ( 1982 )   PDF (790KB) ( 1075 )   Save
    Related Articles | Metrics
    To deal with the lower detection probability in the low SNR by the traditional pipeline filter algorithm resulting from marginal noise interference in complicated IR background, a variable weighted pipeline filter algorithm is presented for detecting small targets in IR image sequences. The adaptive learning scheme is employed to modify the pipeline center position, i.e., variable weighted pipeline center coordinates, according to targets’ positions. This method can restrain effectively the interference caused by marginal noise. Compared with the traditional detection algorithm, this method is more suitable for dealing with failure detection and targets disappearing resulting from marginal pipeline noise. Experiments on long-rang IR image sequences show that the proposed algorithm can detect small targets within the IR image sequence efficiently with the SNR higher than 1.5.
    Study of iterative multi-user detection technology in the DS-CDMA system
    XIE Hong;YAN Xiao-zhen;LUO Qing-hua
    J4. 2007, 34(5):  748-752. 
    Abstract ( 2417 )   PDF (648KB) ( 1074 )   Save
    Related Articles | Metrics
    For the purpose of cutting down the influence of multi-access interference on the performance of a CDMA(Code-Division Multiple-Access) system, we combine a turbo decoder with a multi-user detector organically and present the iterative multi-user detection technology. The turbo decoder is taken as the input soft-in information generated by multi-user detection, and produces a posteriori probabilities, which is used as a priori probabilities by multi-user detection. After a certain number(usually more than 3)of iterations the decoder makes a hard decision and outputs the result. The simulation result presented shows that iterative Multi-user Detection Technology enables the system to improve in performance greatly, which is near (less than 1dB) single user performance.

    Approximate analysis of the BER performance of the successive interference canceler
    ZHANG Dong-hong1;2;LIAO Gui-sheng1
    J4. 2007, 34(5):  753-757. 
    Abstract ( 1630 )   PDF (670KB) ( 1008 )   Save
    Related Articles | Metrics
    Based on the partition of sample space which is constituted by symbol decision events, the approximate Bit Error Rate(BER) formula with the miss matched amplitude of the successive interference canceler (SIC) is generated from the formula of total probability and independence of the symbol decision event.The effect of the miss matched amplitude on the BER performance is discussed by the application of the approximate BER formula and the character of the error residuals incurred by the miss matched amplitude.The result shows that the BER performance of SIC would be enhanced with the decrease of the miss matched amplitude rate.Simulation results agree well with those of theoretical prediction and the increase of BER is not distinct when the miss matched amplitude rate is less than 20%.
    A new genetic algorithm for horizontal overcastting
    SUN Hong-yuan1;2;XIE Wei-xin2;LU Ke-zhong2;YANG Xun1
    J4. 2007, 34(5):  758-762. 
    Abstract ( 1946 )   PDF (601KB) ( 1072 )   Save
    Related Articles | Metrics
    Spatial analysis is key to realizing space information application. The horizontal overcastting problem is one of its important application to optimize an observer network deploying. There is no effective approximate algorithm to solve this NP-complete problem yet. A parallel horizontal overcastting genetic algorithm is presented in the paper. To reduce computing time, a dynamic load balancing is employed in the algorithm. Simulation results show that the speedup ratio of the algorithm is close to the optimization and that computing time is reduced effectively. Also, compared to static load balancing, the dynamic algorithm can observably reduce the executing time, increase the speedup ratio and raise parallel efficiency.
    Entanglement states exchange and preservation in the system of the multi-atom-cavity-field
    WANG Ju-xia1;2;AN Yu-ying1;YANG Zhi-yong1
    J4. 2007, 34(5):  763-767. 
    Abstract ( 1676 )   PDF (533KB) ( 900 )   Save
    Related Articles | Metrics
    From the viewpoint of the quantum information theory, the J-C Model of an atom interacting with a single-model light-field is expanded to a union physical system model which consists of M(where M is any positive integer) pairs of two-level atoms and the M cavity-field with interaction respectively. By solving the evolution matrix of the system state vector, the process of the atoms interacting with the light-field is studied and the principle of exchange and preservation of quantum entanglement information in this system is discussed. It is found that not only the atom entanglement but also the light-field entanglement can be transferred and preserved under different time conditions. At the same time, the different form entanglement states can be prepared by using the interaction of the atoms with the cavity-field.
    Initialization-independent spectral clustering on the joint model
    MA Xiu-li;JIAO Li-cheng
    J4. 2007, 34(5):  768-772. 
    Abstract ( 2610 )   PDF (1736KB) ( 1903 )   Save
    Related Articles | Metrics
    Due to the initialization-dependence of original spectral clustering, an initialization-independent spectral clustering on the joint model is proposed and then is applied to image segmentation. The joint model can make full use of the information, spatial adjacency information and feature similarity information included in the data and then a more precise clustering result can be obtained. And the introduction of the K-Harmonic Means algorithm (KHM) can overcome the initialization-dependence of original spectral clustering and thus a more robust clustering result can be obtained. Experiments on textural images and Synthetic Aperture Radar (SAR) images verify the validity of the proposed algorithm.
    Fuzzy least square support vector machines for regression
    WU Qing;LIU San-yang;DU Zhe
    J4. 2007, 34(5):  773-778. 
    Abstract ( 2072 )   PDF (578KB) ( 1274 )   Save
    Related Articles | Metrics
    The conception of fuzzy membership is introduced into least square support vector machines(LSSVMs), which overcomes the disadvantage that LSSVMs are so sensitive to outliers in training samples. And then fuzzy least square support vector machines (FLSSVMs) are proposed based on support vector domain description (SVDD). Data samples in the feature space are described and the smallest enclosing hypersphere is obtained. The fuzzy membership value to each sample point is determined according to the distance of each sample from the center of the hypersphere, which can reduce the effect of outliers. Numerical results show that the predictive precision of the proposed method is higher than that of SVMs and LSSVMs without decreasing the training speed.
    Hybrid fuzzy cognitive maps
    Lü Zhen-bang;ZHOU Li-hua
    J4. 2007, 34(5):  779-783. 
    Abstract ( 1736 )   PDF (544KB) ( 1148 )   Save
    Related Articles | Metrics
    The conventional Fuzzy Cognitive Maps (FCM) can only represent monotonic or symmetric causal relationships, but can not simulate the AND/OR relationships among the antecedent nodes. The Hybrid Fuzzy Cognitive Map (HFCM) is proposed to eliminate the drawbacks of the existing FCM models. The HFCM represents the casual relationships with single-antecedent fuzzy rules to enhance linguistic information and simulative capability of FCM, and simulates various AND/OR relationships among the antecedent nodes by aggregating causal inference results with Weighted Ordered Weighted Averaging(WOWA) or Ordered Weighted Averaging(OWA) operators. Compared with the conventional FCM, the HFCM has more powerful cognitive capability. Compared with the Rule Based Fuzzy Cognitive Map, the HFCM avoids the combinatorial rule explosion problem as the scale and complexity of its rule base are reduced from the geometrical level to the arithmetical level, and improves the representation and inference performance of FCM. The HFCMs combine the advantages of numeric FCMs and linguistic FCMs.
    Reliable multi-objective topology optimization design of the monolithic compliant mechanism
    CUI Ming-tao;CHEN Jian-jun;CHEN Yong-qin;SONG Zong-feng
    J4. 2007, 34(5):  784-788. 
    Abstract ( 1946 )   PDF (983KB) ( 1050 )   Save
    Related Articles | Metrics
    In the process of designing the monolithic compliant mechanism via multi-objective topology optimization of continuum, the elasticity modulus and external loads are treated as random variables, and so are the strain energy and the mutual potential energy acting as the objective function. The Hasofer-Lind and Rackwitz-Fiessler method is adopted to derive the iterative formulations on the failure probability of a series system consisting of two failure modes, the strain energy and the mutual potential energy. The dual mathematical model of reliable multi-objective topology optimization design of the monolithic compliant mechanism is built. The dual arithmetic of sequential convex rogramming is adopted as the solving strategy. An inverter compliant mechanism is adopted as the numerical example and indicates that the topology optimization design result approaches conservativeness with an increasing reliability constraint index.
    Design of a servo controller with the intelligent dual module NC

    JIANG Pei-gang1;2;CHEN Jian-jun1;ZHANG Yan-hai2;BAI Qing-hua2
    J4. 2007, 34(5):  789-793. 
    Abstract ( 2085 )   PDF (744KB) ( 1014 )   Save
    Related Articles | Metrics
    This paper proposes a new approach to intelligent Fuzzy-PID dual module control for improving dynamic performance of an NC servo feed system. This new controller uses auto-adaptive full domain control by self-adjusting factors with fuzzy regulation and fuzzy scaling. Simulations suggest that this method can achieve online automatic adjustment of the control parameters and algorithms according to the requirements for dynamic performance at different response phases under various working conditions. The unfavorable disturbance, large overshoot and long adjustment time in the old control algorithm can be effectively avoided. A Matlab simulation demonstrates that compared with a general PID fuzzy controller, the proposed controller can offer a rapid response, small overshoot, strong robustness and self-optimization.
    Vacuity detection in computation temperal logic
    GUO Jian1;JIN Nai-yong2
    J4. 2007, 34(5):  794-799. 
    Abstract ( 1664 )   PDF (536KB) ( 882 )   Save
    Related Articles | Metrics
    In model checking a new method is proposed on checking whether a system property represented by a computation temperal logic(CTL) formula is vacuity. From the polarity of atomic proposition, a series of CTL formulae is derived by substituting the atomic proposition with TRUE or FALSE, before they are verified by model checking tools. If one of the CTL formulae has passed the verification, then it is concluded that the system property is a vacuity. In this solution, to check the vacuity of the CTL formula, it is not necessary to substitute all of its sub-formulae by TRUE or FALSE, but instead, it is enough to substitute its atomic proposition, and thus the number of times for checking is linear with the number of atomic propositions. With a VIS system, effectiveness of this solution is further verified by checking the vacuity of specification on the cross-road traffic controller.
    Image decomposition based on sparse representations and a projected regularization method
    JIANG Ling-ling;YIN Hai-qing;FENG Xiang-chu
    J4. 2007, 34(5):  800-804. 
    Abstract ( 2353 )   PDF (1121KB) ( 1336 )   Save
    Related Articles | Metrics
    A novel method is presented for separating images into texture and cartoon parts based on sparse representations and a projected regularization scheme. The basic idea presented in this paper is the use of two appropriate dictionaries, one for the representation of texture parts-the dual tree complex wavelet transform and the other for the cartoon parts-the second generation of curvelet transform followed by a projected regularization method which is employed to better direct the separation process and reduce the pseudo-Gibbs oscillations. Both dictionaries are chosen such that they lead to sparse representations over one type of image-content and several experimental results show that the algorithm’s performance is validated.
    Bullet mark profile measurement based on FTP of the double reference surface
    QUAN Gui-qin1;AN Yu-ying1;WANG Feng-qin2
    J4. 2007, 34(5):  805-808. 
    Abstract ( 1684 )   PDF (662KB) ( 859 )   Save
    Related Articles | Metrics
    Aimed at measuring the bullet mark on the helmet, the fringe projection Fourier Transformation Profilometry (FTP) based on double reference surfaces is proposed. The second reference surface, which is the helmet surface without damage, is introduced. This method is different from the convenient measuring method, which only uses one reference plane, and avoids the loss of information and insures accuracy in measurement. Experiments prove that this method is availd, and that precision is up to 0.1mm.
    Research on the construction of delay gene regulatory network
    ZHANG Hong-yi1;2;ZHANG Jun-ying1
    J4. 2007, 34(5):  809-813. 
    Abstract ( 1921 )   PDF (567KB) ( 1024 )   Save
    Related Articles | Metrics
    Based on phase space construction, the transcriptional lags between genes are estimated by the minimum mutual information principle. Then, the time course expression levels of a gene is shifted according to the estimated transcriptional lag for further clustering analysis. Finally, for a target gene, the prediction of its possible parent gene sets and the coefficient of determination (CoD) are employed to compute the probability of selecting a parent gene set from all the possible parent gene sets for the target gene. Some experiments have been performed, indicating that the feasibility and validity of constructing a gene regulatory network with the proposed method are superior to those by the conventional methods.
    Universally composable secure authentication protocol for wireless mesh networks
    YANG Chao;CAO Chun-jie;MA Jian-feng
    J4. 2007, 34(5):  814-817. 
    Abstract ( 1966 )   PDF (539KB) ( 961 )   Save
    Related Articles | Metrics
    The authentication protocol of Wireless Mesh Networks does not support 802.1X-based mutual authentication. Based on Diffie-Hellman(DH) exchange and making use of the combination characteristic of the Universally Composable(UC) security model and trust transfer, a new authentication protocol is proposed. Piggybacking opposite direction authentication messages in response, this protocol not only provides two-way authentication for Wireless Mesh Networks but also affords provably UC-security. Furthermore,compared with the original scheme, the communication cost decresses by 60%.
    Efficient group signature scheme with verifier-local revocation
    ZHANG Yue-yu;PANG Liao-jun;SU Wan-li;WANG Yu-min
    J4. 2007, 34(5):  818-822. 
    Abstract ( 1567 )   PDF (529KB) ( 939 )   Save
    Related Articles | Metrics
    A verifier-local revocation group signature scheme with backward unlinkability is proposed based on the scheme presented by Boneh and Shacham. In our scheme, the private key to a group member is a triple consisting of the key obtained from the key issuer and that generated by the member, thus realizing strong exculpability. Also, we solve the problem that the running time of signature verification is linearly dependent on the length of revocation list using zero knowledge under Decision Linear Diffie-Hellman assumption, so the verification of our scheme requires only three multi-exponentiations and one paring computation. Further, our scheme realizes the backward unlinkability based on the concept of time intervals and is only 1553bits in size.
    Integrality authentication schema of H.264 video based on the fragile watermark
    WANG Mei-hua1;PEI Qing-qi2;FAN Ke-feng3
    J4. 2007, 34(5):  823-827. 
    Abstract ( 1778 )   PDF (749KB) ( 986 )   Save
    Related Articles | Metrics
    In order to solve the problem of integrality authentication for low bit-rate video, a novel video authentication schema based on the fragile watermark is proposed. According to the relationship of the quantilzed DCT coefficients of the intra frame during the H.264 encoding progress, the authentication code is created. After that, the authentication information,as watermark is embedded into the high-frequency quantized DCT coefficients of the intra frame. The integrality authentication is carried out in the decode time and the original video is not needed for extracting the watermark. Experimental results show that this schema could maintain a small change in bit-rate and keep small distortion, which means the proposed schema is effective.
    Lognormal quasi-maximum likelihood estimate of CARR
    ZHOU Jie;LIU San-yang
    J4. 2007, 34(5):  828-834. 
    Abstract ( 1583 )   PDF (535KB) ( 929 )   Save
    Related Articles | Metrics
    In order to circumvent the heavy-tailed problem in estimating the conditional autoregressive range model(CARR), the lognormal distribution is considered. Under conditions that the innovations have a finite 12th moment, which allows the model to have a unit root,we show that the quasi-maximum likelihood estimator which uses the lognormal distribution as the likelihood is locally consistent and asymptotically normal by the properties of the M-estimator and functional central limit theorem for martingale.Meanwhile the efficiency of the estimator can also be improved by the heavier tail of lognormal distribution than the exponential likelihood methods currently used in the literature.
    Preparation of transparent laser ceramics Nd:YAG by the nitrate pyrogenation method
    LI Gui-fang;CAO Quan-xi;LI Shuang-chun;SU Sha-sha
    J4. 2007, 34(5):  835-838. 
    Abstract ( 1410 )   PDF (1289KB) ( 910 )   Save
    Related Articles | Metrics
    The single phase of Nd:YAG powder were synthesized at 1000℃ by the evaporation of its nitrate solution method using Al(NO<sub>3</sub>)<sub>3</sub>9H<sub>2</sub>O, Y(NO<sub>3</sub>)<sub>3</sub>6H<sub>2</sub>O and Nd<sub>2</sub>O<sub>3</sub> as starting materials. With the addition of 0.5%(in mass) tetraethyl orthosilicate as the sintering aid, transparent Nd:YAG ceramics were fabricated by vacuum sintering at 1500℃~1700℃ for 5h. The Nd:YAG transparent ceramics materials were characterized by the XRD and SEM. The results show that the precursor completely transformed to the YAG(Y<sub>3</sub>Al<sub>5</sub>O<sub>12</sub>) phase at about 1000℃ without the intermediate phase of YAM and YAP. The dispersive and flowing property of the particle are very good and the grain size of Nd:YAG is in the range of 200~250nm. The SEM of the fracture surface of the sintered body shows that the grain size is about 2~4μm and that the grain increases while the pores decrease with the increase of the sintered temperatures. The chemical composition of Nd:YAG transparent ceramics in the inner grain and at the grain boundary are basically uniform. Its optical transmittance reaches 47% in the visible light wavelengths, and 56% in the infrared wavelengths.
    New parameter estimation algorithm for near-field sources
    LIANG Jun-li1;2;JI Bang-jie1;2;ZHAO Feng3;ZHANG Jun-ying3
    J4. 2007, 34(5):  839-843. 
    Abstract ( 2363 )   PDF (658KB) ( 1058 )   Save
    Related Articles | Metrics
    This paper proposes a new subspace-based algorithm to jointly estimate the frequencies, directions of arrival (DOAs), and ranges of multiple near-field narrow-band sources. Firstly, the proposed method constructs four cumulant matrices by virtue of the fourth-order cumulants of some properly chosen sensor outputs; secondly, by using the above-mentioned four matrices, it forms three new ones, from whose eigenvalues the source parameters can be easily obtained. In comparison with some available cumulant-based methods, the proposed algorithm can make efficient use of the array aperture, and thus has a higher estimation accuracy. Simulation results also show that the proposed method is of such performance.
    Research on the echo power losing ratio of chaff cloud

    ZHANG Ling-jun1;HAN Wei-guo1;LIU Di1;LIU Fu-qiang1;LI Yu-shan2
    J4. 2007, 34(5):  844-848. 
    Abstract ( 2053 )   PDF (652KB) ( 973 )   Save
    Related Articles | Metrics
    Based on the forming mechanism of the chaff cloud echo, the scattered power model of the chaff cloud is establish. It is noted that the scattered power loss and the coherent accumulation efficiency drop exist in the echo of the ripe chaff cloud. The expression for echo power losing ratio of the chaff cloud has been deduced. By comparing the estimation by this expression with the actual measurement data, the accuracy of this expression has been verified. The results in this paper can be used for the development of jamming and radar equipments.
    Research on evaluating DDJ performance in the serial interconnect channel
    TANG Shi-yue1;YANG Jun-feng2
    J4. 2007, 34(5):  849-852. 
    Abstract ( 1751 )   PDF (733KB) ( 930 )   Save
    Related Articles | Metrics
    From the impulse response of a digital serial communication channel, this paper gets the mathematic expression for the data dependence jitter(DDJ) crossing unique threshold. An induction method is found to search for the special codes which makes DDJ unilaterally increase or decrease and calculate the extremum of DDJ. In contrast with the method using a lot of random codes to search for the peak-peak value of DDJ, this method can calculate this value directly with less computation complexity. The analytical result and simulated result are compared according to a second order system and this method need only compute no more than 20 codes to reach the precision of simulating 105 random codes. This method also can be used to analyze the other jitter components.