Loading...
Office

Table of Content

    20 February 2007 Volume 34 Issue 1
      
    Original Articles
    A perfect scheduling power control strategy for wireless LAN
    SHENG Min;TIAN Ye;LI Jian-dong;JIANG Fan
    J4. 2007, 34(1):  1-5. 
    Abstract ( 2945 )   PDF (197KB) ( 1676 )   Save
    Related Articles | Metrics
    The research on the power control strategy in Wireless LAN is a very important issue in the wireless communication field. In this paper, a Perfect Scheduling Power Control strategy PS_PC is presented for decreasing the power consumption of equipments in WLAN, and it schedules the traffics buffered in Access Point (AP) according to their arrival time, so that the QoS guarantee can be provided and the consumed system resources by collision or backoff procedure are decreased. The theoretical analysis and simulation results show that the PS_PC is an effective power saving method.

    On the tracking strategies and space geometrical relationship between a TDRS and user satellites
    LI Yu-heng;SUN En-chang;YI Ke-chu
    J4. 2007, 34(1):  6-10. 
    Abstract ( 2361 )   PDF (190KB) ( 1439 )   Save
    Related Articles | Metrics
    From the viewpoint of tracking strategies and link establishment, this paper studies the space geometrical relationship between a TDRS and user satellites in detail. Taking into account of the occultation caused by the Earth and the body of a satellite, the bidirectional tracking rules for a TDRS and user satellites are investigated based on classical orbital elements and the satellite's attitude. The coverage of a TDRS over a user satellite with different orbital altitudes is calculated and simulated. In order to overcome the occultation caused by the body of a user satellite, a way to fix the antenna to a mast which extrudes above the side towards space of a user satellite is presented. With an appropriate height of the mast, the occultation can be eliminated. All these formulas and strategies are the key elements for TT&C and applications of China's future TDRS.
    Adaptive sliding mode control of a flexible cable structure
    HUANG Jin;DONG Zheng-liang
    J4. 2007, 34(1):  11-156. 
    Abstract ( 2115 )   PDF (204KB) ( 1213 )   Save
    Related Articles | Metrics
    According to the strong nonlinearity and big lag of the cable feed system, an adaptive sliding mode controller is proposed. The MIMO control law is derived with the linear model of the system. In addition, the model error and wind force are considered as the external disturbances, which are estimated on line and compensated. A series simulation is done with the parameters of a 5-meter scaled large spherical radio telescope model, and the results show that not only is the position error with the adaptive sliding mode controller reduced to 40% of that with the PID controller, but also the robustness of the system is improved.
    Analyses of the temperature properties of the 6H-SiC NMOS and PMOS
    HAN Ru;YANG Yin-tang
    J4. 2007, 34(1):  16-20. 
    Abstract ( 2426 )   PDF (190KB) ( 1413 )   Save
    Related Articles | Metrics
    The analytical model which comprises the temperature compensation for the SiC MOSFET is modified by considering the Gauss model of interface state density and the Poole-Frenkel effect. The simulation results for the 6H-SiC NMOS and PMOS show that as the non-uniformity distribution of interface state density, the percentage of current change due to the threshold voltage becomes smaller when the temperature is increased; the main reason for the large leakage current is the existence of surface defects. The larger the defect density, the more rapidly the current value increases with the temperature.
    High-accuracy frequency estimation based on the continuous zoom in the local spectrum
    XUE Hai-zhong1;2;LI Peng1;ZHANG Juan1;GUO Zhen1
    J4. 2007, 34(1):  21-25. 
    Abstract ( 2375 )   PDF (187KB) ( 1179 )   Save
    Related Articles | Metrics
    To study the problem of fast and accurate Doppler frequency estimation in the noisy environment, this paper presents the algorithm for high-accuracy frequency estimation based on the continuous zoom in the local spectrum. First, the algorithm cursorily estimates the signal spectrum with FFT; then, the narrowband spectrum of interest is obtained; finally, the narrowband spectrum is analyzed by the method of frequency subdivision. Due to adopting twice window functions in time domain and frequency domain during the subdivision process, straining noise and analyzing the spectrum are organically combined. Not only are the estimate precision and frequency stability greatly improved but also the computational quantity is largely reduced.
    Optimum receiver for the differential UWB signal based on the generalized likehood ratio test
    XIANG Xin1;2;WANG Yong1;YI Ke-chu1;TIAN Hong-xin1
    J4. 2007, 34(1):  26-284. 
    Abstract ( 1945 )   PDF (116KB) ( 980 )   Save
    Related Articles | Metrics
    The generalized likelihood ratio test (GLRT) is proposed to achieve optimum detection for differential UWB signals. Under unknown channel conditions, maximum likehood estimation of the channel response is implemented, statistical detection of differential UWB signals is performed subsequently, and the receiver architecture based on the generalized likelihood ratio test is obtained. The analytical conclusion shows that the GLRT receiver of differential UWB is a correlation receiver in which the local template waveform is computed as the average of the channel responses to former symbol pulses. Based on the conclusion, the performance of bit error probability is analyzed by using a Gaussian approximation of the noise components at the output of the receiver. The GLRT receiver can serve as a performance benchmark for the conventional differential UWB receivers.
    Motion analysis and trajectory planning of a spherical omnidirectional rolling robot
    LI Tuan-jie;ZHANG Xue-feng;CHEN Yong-qin
    J4. 2007, 34(1):  29-33. 
    Abstract ( 2185 )   PDF (192KB) ( 1585 )   Save
    Related Articles | Metrics
    An internal locomotion mechanism of a spherical omnidirectional rolling robot is designed. Four linear motors move inward and outward respectively along four spokes with geometrical symmetry in three dimensional space, which will cause the robot to roll in all directions on a flat surface by displacing its gravity center. Based on the nonholonomic constraint arising from rolling contact and the discrete motion nature of stepper linear motors, the motion model of the robot is established. The second-order control differential equations are derived. Then an algorithm for trajectory planning is developed. A numerical example is given to illustrate the methods for motion analysis and trajectory planning. The virtual prototype technology is used to validate the effectiveness of the methods.
    Gridless net routing of the integrated circuit with the particle swarm optimization algorithm
    HUANG Xun-cheng;ZHUANG Yi-qi;GENG A-nan
    J4. 2007, 34(1):  34-378. 
    Abstract ( 2335 )   PDF (175KB) ( 1212 )   Save
    Related Articles | Metrics
    A particle swarm optimization algorithm is presented for the layout of IC design. Particle swarm optimization based on swarm intelligence is a new evolutionary computational tool and is successfully applied in function optimization, neural network design, classification, pattern recognition, signal processing, robot technology and so on. A modified algorithm is presented and applied to the layout of IC design. For a given layout plane, first of all, this algorithm generates the corresponding grid group by barriers and nets’ports with the thought of gridless net routing, establishes the initialization fuzzy matrix, then utilizes the global optimization character to find out the best layout route only if it exits. The results of model simulation indicate that the PSO algorithm is feasible and efficient in IC layout design.
    Image adaptive RST invariant watermark based on pseudo-Zernike moments
    LI Lei-da;GUO Bao-long
    J4. 2007, 34(1):  38-42. 
    Abstract ( 2681 )   PDF (176KB) ( 1574 )   Save
    Related Articles | Metrics
    Rotation, scaling and translation (RST) attacks can desynchronize watermark detection, thus making many watermarking systems fail. In this paper, an image adaptive RST invariant watermark (AWPZM) is proposed by using the rotation invariant property of pseudo-Zernike moments and odd-even quantization. Pseudo-Zernike moments of the original image are computed firstly, and those suitable for watermark generation are selected. Then, their magnitudes are odd-even quantized to generate the watermark. In detection, the normalized hamming function is employed to weigh the similarity of the watermark. Experimental results show its robustness to rotation and scaling. For traditional attacks such as JPEG compression, added noise and filtering, the similarities are all above 0.95.
    Scan blind spot analysis of a triangular arrangement of waveguide end-slot finite phased arrays
    LIU Song-hua;LI Long;DANG Xiao-jie;LIANG Chang-hong
    J4. 2007, 34(1):  43-48. 
    Abstract ( 1802 )   PDF (243KB) ( 987 )   Save
    Related Articles | Metrics
    A blind spot analysis is made in rectangular waveguide end-slot phased arrays of a triangular arrangement by using the method of moments (MoM). By increasing array elements of the E plane and H plane, the reflection coefficients versus scanning for the central elements in various sized arrays have been calculated. As the number of array elements of the E plane increases, the blind effect changes greatly, and as the number of array elements of the H plane increases, it will almost not change. By analyzing the coupling coefficient between array elements, an explanation of this phenomenon is given. In the analysis of the blind spot problem, the relationship between the radiation pattern of the center element and the reflection coefficient has been derived. We find their disunity in describing the blind effect. The sufficient condition for the unity that the array be equal scale excited and that the phase of the reflection coefficient be zero(resonance) is obtained.
    Interactive arbitrary shape volume clipping based on region marking
    ZHENG Jie;JI Hong-bing;YANG Wan-hai
    J4. 2007, 34(1):  49-53. 
    Abstract ( 1741 )   PDF (179KB) ( 1177 )   Save
    Related Articles | Metrics
    A novel interactive volume clipping method based on region marking is proposed. The method uses an efficient dataset region marking algorithm to archive the interactive result, regardless of the shape of the clipping object to define which parts of the volume have to be clipped. The proposed technique is integrated into the general graphics hardware accelerated volume rendering. The sophisticated graphics hardware is utilized to make it possible to interactively select and explore regions of the volume datasets under the standard PC.
    Estimation of the moving parameters for objects in the bistatic forward scattering barrier radar
    Lü Xiao-lei;ZHANG Shou-hong;LI Nuo
    J4. 2007, 34(1):  54-589. 
    Abstract ( 1966 )   PDF (183KB) ( 919 )   Save
    Related Articles | Metrics
    Concerning the problem of low precision and easy divergence in estimation of the moving parameters for objects in the Bistatic Forward Scattering Barrier Radar, a new tracking filter algorithm is presented based on the Extended Kalman Filter (EKF) and Unscented Kalman Filter (UKF).The new filter applies insensitiveness of UKF to initial estimation error to catch the object,which avoids the divergence due to the big error in initial estimation when using EKF,and then uses EKF to keep the tracking of objects,which avoids low precision and divergence due to sensitiveness of UKF to the system model error when the objects traverse the base line. Simulation results show the validity of the algorithm proposed in the paper.
    Uniform single and multi resolution representations of the triangle mesh
    ZHAN Hai-sheng;ZHOU Li-hua
    J4. 2007, 34(1):  59-62. 
    Abstract ( 1571 )   PDF (219KB) ( 894 )   Save
    Related Articles | Metrics
    By employing the topological adjacent relations among triangles, the highest resolution triangle mesh is parted into a set of generalized triangle strips in which the dual graph of every strip is the Hamiltonian path or cycle. The multiresolution representation of the triangle mesh is constructed successively by simplifying the generalized triangle strips while preserving the properties of the Hamiltonian triangulation. The single and multi resolution representations have same codec strategies in this method. The code rate is proportional to c directly when a triangle mesh is represented in c of resolutions.
    A new Clos fabric with input memory and the study of its routing and scheduling algorithm
    YANG Fan1;QIU Zhi-liang1;LIU Zeng-ji1;LIU Gu-qing2;YAN Jing1
    J4. 2007, 34(1):  63-67. 
    Abstract ( 2012 )   PDF (172KB) ( 1085 )   Save
    Related Articles | Metrics

    A new Clos switching structure termed MmM is proposed. All the switching elements in the MmM use input memory. So MmM is adaptive to high speed switching fabrics. In MmM the middle stage provides the routing message for the first stage. The distributed routing and scheduling algorithm named Clos load balance routing(CLBR) for the MmM is proposed. CLBR can balance the traffic load and decease the collisions of output ports. Simulation results show that the MmM with CLBR performs better than the MSM with CRRD.

    Improvement classification performance by the support vector machine ensemble
    LI Qing;JIAO Li-cheng
    J4. 2007, 34(1):  68-70. 
    Abstract ( 2309 )   PDF (109KB) ( 1488 )   Save
    Related Articles | Metrics

    Ensemble Methods are learning algorithms that construct a collection of individual classifiers which are independent and yet accurate, and then classify a new data point by taking vote of their predictions. The support Vector Machine (SVM) presents excellent performance in solving the problems with a small number of simple, nonlinear and local minima. The combination of the Support Vector Machine with Ensemble methods has been done by Hyun-Chul Kim based on the bagging algorithm, yet it does not show high robustness for its randomicity. In this paper, by a deep investigation into the principle of the SVM and the Ensemble Method, we propose two possible ways, cross validated committees and manipulating of the input feature strategies, to construct the SVM ensemble, which provides strong robustness according to experimental results.

    Precoding for the multiuser MIMO-OFDMA downlink with limited feedback
    LIU Yi;ZHANG Hai-lin
    J4. 2007, 34(1):  71-75. 
    Abstract ( 3074 )   PDF (188KB) ( 1768 )   Save
    Related Articles | Metrics
    A precoding scheme for the MIMO-OFDMA downlink is discussed, which includes subcarrier assigning, power allocation and adaptive modulation. By using the beamforming codebook constructed according to the Grassmannian space packing, the optimal beamforming vector is determined at the receiver and its index is conveyed to the transmitter. Then power and bits are allocated to each subcarrier using ‘greedy algorithm’. The feedback data are greatly decreased compared with the existing schemes while maintaining a large capacity.
    Performance analysis of the IEEE 802.11 DCF in the non-saturation state
    LI Bo1;LI Jian-dong2;FANG Yong1
    J4. 2007, 34(1):  76-81. 
    Abstract ( 2147 )   PDF (209KB) ( 960 )   Save
    Related Articles | Metrics
    In the case of the non-saturation state, a simple and effective analysis model is proposed for the IEEE 802.11 DCF with multiple traffic supporting. In the model, the concepts of “Virtual Time Slot” and “Virtual Time Slot State” are introduced, which discretize the behavior of a wireless terminal. Based on it, a two dimensional Markov chain is used in the model. By using the proposed model, the approximated closed form solutions of the average packet delays are obtained. Moreover, the method for controlling the average packet delays of all the traffic flows is given. The proposed model and the obtained analytical results help one to further study how to predict and optimize the system performance.
    Fast parallel calculation of the radar cross section for large open-ended cavities based on CRE and MPI
    ZHANG Peng-fei;GONG Shu-xi
    J4. 2007, 34(1):  82-86. 
    Abstract ( 1642 )   PDF (196KB) ( 878 )   Save
    Related Articles | Metrics

    According to the characteristic that the definition point of the Q matrix of wave front is always located on the extremum point on the axis of the beam, a three-dimensional formula for the rectificative factor of phase in complex ray paraxial approximation is proposed, which calculates the rectificative factor of phase directly without considering the calculation of the main directions and curvatures and the rotation of the coordinates, thus simplifying the paraxial approximation calculation by the complex ray expansion (CRE) method. A big cell parallel calculating method is proposed, by which the calculation tasks are distributed to the processes,evenly spaced,according to RCS calculating angles. Results show that the calculating speed of the Large Open-ended Cavities’ RCS is about 102 higher than that of the traditional shooting and bouncing ray (SBR).

    A region growing phase unwrapping algorithm based on local frequency estimation for interferometric SAR
    WU Nan;FENG Da-zheng;LIU Bao-quan
    J4. 2007, 34(1):  87-91. 
    Abstract ( 1951 )   PDF (206KB) ( 1005 )   Save
    Related Articles | Metrics
    We propose a phase unwrapping approach. With local frequencies estimated by the maximum likelihood (ML) estimator, the unwrapped phase at the central pixel of a local image is obtained by fitting unwrapped phases with an ideal plane assumed. We take a region-growing strategy in which a quality map guides the phase unwrapping from high-quality pixels to low-quality pixels, minimizing the propagation of errors to a maximum degree.
    A fair exchange protocol based on short signature with the off-line semi-trusted third party
    XIN Xiang-jun1;2;LI Fa-gen3;XIAO Guo-zhen1
    J4. 2007, 34(1):  92-95. 
    Abstract ( 2572 )   PDF (140KB) ( 1921 )   Save
    Related Articles | Metrics
    Based on a short signature scheme and discrete logarithm problem, a new fair exchange protocol with the off-line semi-Trusted Third Party (TTP) is proposed. The off-line semi-TTP intervenes into the protocol in case of trouble, which makes the fair exchange optimistic. The off-line TTP need not be completely trusted, since it can get neither signature exchanged when disputation is solved. Because this protocol is based on short signature, which needs low storage and little communication, it can be used in low-bandwidth communication and low-storage environments.
    Elastic nanocontact model of micro-mechanical systems
    FAN Kang-qi;JIA Jian-yuan;WANG Wei-dong
    J4. 2007, 34(1):  96-100. 
    Abstract ( 1607 )   PDF (193KB) ( 878 )   Save
    Related Articles | Metrics
    Based on the Lennard-Jones potential, the adhesive forces among the atoms of two spheres are considered as the distributing load acting on the surfaces of the two spheres. And according to the classically elastic theory, a novel model of elastic nanocontact of two spheres is established to solve the contact problems emerging in micro-mechanical systems. The model is capable of obtaining the variations with the distance of the adhesive force, the deformations and the contours of the two spheres at the same time. The results from the model established are consistent with the conclusions drawn from the scanning experiments available of atomic force microscopy, which confirms the validity of the model in investigating the nanocontact problems in micro-mechanical systems
    A special class of nonlinear bilevel programming problem and its genetic algorithm
    LI He-cheng1;WANG Yu-ping2
    J4. 2007, 34(1):  101-105. 
    Abstract ( 2127 )   PDF (164KB) ( 1222 )   Save
    Related Articles | Metrics
    In terms of the Karush-Kuhn-Tucker conditions of convex programming, a special nonlinear bilevel programming problem, whose follower-level problem is a convex programming, is transformed into an equivalent single-level programming problem. To solve the transformed problem effectively by using the genetic algorithm, firstly, a new constraint-handling scheme is proposed by adding slack terms to linear inequality constraints and by solving boundary points on nonlinear constraints; secondly, a linear model is constructed to decrease the dimensions of the search space; finally, a new crossover operator is designed, based on the best individuals generated by the algorithm, and it is helpful to improve the fitness values of crossover offspring.
    An improvement on group signature
    SI Guang-dong1;LI Yan-ping1;2;XIAO Guo-zhen1
    J4. 2007, 34(1):  106-109. 
    Abstract ( 2270 )   PDF (138KB) ( 1197 )   Save
    Related Articles | Metrics

    A new efficient group signature scheme proposed by J.H.Zhang et al is analyzed. We point out its shortages in the module and prove that this scheme can be attacked completely in the same module algorithm. We present its improved scheme on RSA and discrete logarithm assumption, which contains the merits of the original scheme, unforgeability and anonymity, and gets rid of the original shortages. The total computation of signature and verification take only 6 exponents and the efficiency raised by nearly two times in the improved scheme.

    A collaborative membership protocol based on joint votes for P2P network
    TIAN Yu-min;MA Yong
    J4. 2007, 34(1):  110-114. 
    Abstract ( 1654 )   PDF (167KB) ( 855 )   Save
    Related Articles | Metrics
    Trust management based on CA can not suit the Peer-to-Peer network of dynamic, symmetry and decentralization. The CMPJV is proposed to determine whether or not to permit one applicant to join the peer group by joint votes of all the peers in the peer group, and to initialize the applicant’s key attributes in the decentralized environment. The final result of joint votes is calculated by WCVTS, which introduces two factors: original role trust that permits peer to vote more precisely instead of yes or no, and role delegation ability that is used to limit the authorization scope horizontally and vertically. In addition, because any one peer is his own CA to issue his vote for the applicant, and CMPJV is one pure peer-to-peer group admission protocol , it can better overcome the inherent drawbacks of Client/Server. Finally, the running model’s analysis is used to verify its formal security.
    An image content authentication system based on iris feature watermarking
    FAN Ke-feng1;MO Wei2;PEI Qing-qi1;WANG Zhan-wu3;ZHAO Xin-hua2
    J4. 2007, 34(1):  115-121. 
    Abstract ( 2166 )   PDF (245KB) ( 1071 )   Save
    Related Articles | Metrics
    An efficient scheme is presented for protecting the ownership of the digital image content by applying iris feature watermarking. The main idea is as follows. Iris image preprocessing is conducted firstly, which includes iris image de-noising based on wavelet analysis, a coarse- to- precise iris localization, normalization and wavelet-based feature codes extraction, with the watermark generated by the operation between the iris codes and NVF. The second and third steps deal with adaptive iris-based watermark embedding and detecting using the human visual system (HVS) and independent component analysis (ICA). The final step is authentication between the iris codes transformed from the extracted watermark and the iris database. An adaptive PSNR metric is proposed for the more objective evaluation of the watermarking system. Experimental results show that the algorithm has good performance in dealing with various kinds of attack.
    Multicast fault recovery on network coding
    SUN Yue;YANG Yuan;WANG Xin-mei
    J4. 2007, 34(1):  122-125. 
    Abstract ( 2644 )   PDF (162KB) ( 1758 )   Save
    Related Articles | Metrics
    Problems on link failure recoveries in multicast networks are considered. From the idea of erasure codes, a way to construct a reliable multicast system based on network coding is presented. When limited link failures have occurred in the network, we can have a recover-based solution for all recoverable failures with a static network code, and do not need to change the coding of interior nodes. Based on the information flow decomposition, a way to construct the network codes in a smaller field is proposed. In this way, we can provide nearly instantaneous self-healing multicast communication networks to enhance the robustness of the multicast connections, and achieve a higher rate of multicasting with less required network capacity.
    Integrating Web objects extracted from multiple sites into relational database
    HUANG Jian-bin1;2;JI Hong-bing1;SUN He-li3
    J4. 2007, 34(1):  126-130. 
    Abstract ( 2514 )   PDF (165KB) ( 1527 )   Save
    Related Articles | Metrics
    This paper studies the problem of integrating heterogeneous semi-structured Web objects into relational database. A generalized sequential learning model named the Combined Conditional Random Fields is presented for solving the problem of schema matching between pairs of heterogeneous Web data sources. The proposed model is able to learn on the manually labeled training data and unlabeled database records, thereby reducing the dependence on tediously labeled samples. It also provides a novel way to incorporate the two-dimensional neighborhood dependencies between Web data elements. Moreover, a constrained Viterbi algorithm is implemented to resolve the imposed labels inference for optimal data integration. Experimental results using a large number of Web pages from diverse domains show that the proposed method can improve the matching accuracy significantly.
    Direction-of-arrival estimation based on modified STFD-ESPRIT
    TANG Jian-long;LUO Yong-jiang;SI Hai-fei;YANG Shao-quan
    J4. 2007, 34(1):  131-134. 
    Abstract ( 2012 )   PDF (149KB) ( 847 )   Save
    Related Articles | Metrics
    The algorithm for direction-of-arrival of the wideband chirp signals based on ESPRIT using the modified spatial time-frequency matrix is presented. The modified STFD matrix which has the similar mathematical construction with the covariance matrix can be obtained with the cross Wigner-Ville distributions of the outputs of the array. Under the condition of uniform line array, the modified STFD matrix can be transformed into the matrix which has the property of rotational invariance. Then the ESPRIT can be applied to DOA estimation.
    Group Gaussian approximation iterative detection for Turbo-BLAST
    GUO Xu-dong;LI Ying;BAI Bao-ming
    J4. 2007, 34(1):  135-139. 
    Abstract ( 2099 )   PDF (194KB) ( 1319 )   Save
    Related Articles | Metrics

    A low complexity group Gaussian approximation iterative detection for Turbo-BLAST is proposed. The proposed algorithm divides the transmitted signals into two groups. After assuming the superstition of the transmitted signals in one group in a Gaussian variable, the log-likelihood ratio of each bit in another group is calculated via maximum a posterior principle. The proposed algorithm can considerably decrease the receiver complexity. Furthermore, the performance of the new algorithm can also approach the optimal detection when the system has more receiver antennas than transmitter antennas.

    Multiuser receiver scheme for the CDMA system based on full-rate space-time coding
    YU Xiang-bin1;DONG Tao2
    J4. 2007, 34(1):  140-144. 
    Abstract ( 2362 )   PDF (188KB) ( 968 )   Save
    Related Articles | Metrics
    A full-rate space-time coding based CDMA system model is firstly given. Considering that the existing space-time coded CDMA system has high decoding complexity, a low-complexity multiuser receiver scheme is proposed. In this scheme, each user employs the multiuser detection method to achieve the single user receiver signal form, which benefits the application of complex orthogonality of space-time coding. After maximum ratio combination, the decoding computation is only simple linear combination, and thus the exponential decoding complexity of the existing scheme is effectively decreased. On the condition of the same system throughput, the given system can adopt the low-order modulation scheme, and utilize more spatial redundant information. As a result, the concatenation of channel coding significantly strengthens the transmission reliability of the system in the fading channel. Simulation results also show that the system has a lower bit error rate than corresponding full-diversity space-time coded CDMA systems.
    A steering gear system controller in missiles based on the fractal modified PID algorithm
    WAN Yan-hui1;3;LI Cun-zhi2;GUO Hua1;HOU Wei-bo2;PEI Li-xia2;WANG Fang2
    J4. 2007, 34(1):  145-148. 
    Abstract ( 3296 )   PDF (154KB) ( 1411 )   Save
    Related Articles | Metrics
    Aiming at the steering gear machinery in some missiles,and adopting the combined configuration of a small rare earth torque motor and a harmonic drive reducer, the increasing PID (Proportional-Integral-Derivative)control system based on the rate character of fractal geometry is designed. This control system has some advantages as follows: considering the change with velocity and small damp of harmonic drive, improving the ability of the control system, adopting the complement between linear model and fractal model, using Short-time Fractal Dimension of the feedback signal to attain the difference between the real angle and the ideal angle, and consulting the change above to modify the output of PID. Experimental shows that the 25°rank-jump response constant of this gear machine system is less than 100ms, and with 20Hz and amplitude of ±1.5°, the frequency response phase delay is less than 20°, and orientation precision is higher than 0.06°.
    A novel location-based routing algorithm for mobile Ad Hoc networks
    CHEN Zhuo;LIU Kai;ZHANG Jun
    J4. 2007, 34(1):  149-153. 
    Abstract ( 2119 )   PDF (172KB) ( 1170 )   Save
    Related Articles | Metrics

    A location-based grid routing (LBGR) algorithm for mobile Ad Hoc networks is presented. To improve the capability of strong route maintenance in the presence of frequent unpredictable topology changes due to node mobility, the LBGR algorithm utilizes position information to employ a forwarding approach based on a grid-constructed trajectory. Based on the position relationship of nodes and downstream grids, each intermediate node infers the next hop to relay packets. Simulation results demonstrate that in the case of lower communication overhead the LBGR algorithm can reduce both the packet dropped rate and the average number of hops per route.

    A robust wideband constant-beamwidth beamforming method for acoustic imaging
    WANG Juan;FENG Qing;WU Ren-biao;SU Zhi-gang
    J4. 2007, 34(1):  154-158. 
    Abstract ( 2509 )   PDF (180KB) ( 1532 )   Save
    Related Articles | Metrics
    The focused beamformer is an efficient broadband beamforming method because of the advantages of the ability to operate in multipath environments and computational efficiency. However, the robustness of the focused beamformer is not good enough when the error of signal direction exists. To overcome the shortcoming, a novel robust broadband beamforming method based on the focusing approach is presented in this paper to achieve a constant beamwidth for acoustic imaging. The proposed method mainly applies the idea of Robust Capon Beamforming (RCB) to the focusing approach to get the more exact focusing transformation matrix and then reduce the focused data error. Thus it can greatly improve the robustness performance of the focused beamformer.
    Normal filters and prime filters of pseudo NM-algebras
    LIU Yong-lin1;2;LIU San-yang2;ZHANG Xiao-hong3
    J4. 2007, 34(1):  159-164. 
    Abstract ( 1770 )   PDF (203KB) ( 1040 )   Save
    Related Articles | Metrics

    In order to establish the mathematical foundation of the intelligent information processing system and develop the logic algebraic theory itself, a new class of logic algebra——pseudo NM algebra has been proposed recently. This paper introduces and investigates the filter theory of pseudo NM algebra. The notions of filters,generated filters,normal filters and prime filters etc. are defined. Their basic properties are investigated, with the structures of generated filters obtained. We show that prime filters and irreducible filters are equivalent,and that maximum filters must be prime filters. The prime filter theorem of pseudo NM algebra and its some corollaries are established. All these results are the non-commutative generalizations of the corresponding ones of the filter theory of NM algebra.