Loading...
Office

Table of Content

    20 December 2004 Volume 31 Issue 6
      
    Original Articles

    Study of the hot carrier reliability of the flash memory

    ZHENG Xue-feng;HAO Yue;LIU Hong-xia;LI Pei-xian;LIU Dao-guang;HAN Xiao-liang
    J4. 2004, 31(6):  821-824. 
    Abstract ( 1774 )   Save
    Related Articles | Metrics
    A method for measuring the coupling rate of the floating-gate voltage in flash memory cells is presented and proved to be feasible. Meanwhile, the degradation of negative gate source-side erased flash memory cells is investigated. Interface states and oxide traps were generated by hot-carrier injection near the source during this erasing process, by which the SILC generated is the major cause for device degradation, on the basis of which, three possible conduction mechanisms are described. he steady-state current and the transient one in the SILC are measured respectively. The conclusion can be drawn from this study that the reliability issue under the action of reading stress is mainly caused by electron tunneling through oxide.

    Simulation and analysis of high frequency small-signal characteristics for 4H-SiC MESFETs

    WANG Lei;ZHANG Yi-men;ZHANG Yu-ming;SHENG Li-zhi
    J4. 2004, 31(6):  825-828. 
    Abstract ( 1623 )   Save
    Related Articles | Metrics
    Small-signal high frequency characteristics of 4H-SiC MESFETs have been studied with the two-dimensional device simulator MEDICI based on the operation model of 4H-SiC MESFETs developed in this paper. The simulation results using teh sinusoidal steady-state analysis approach agree well with the experimental data within the cut-off frequency. Also, the effects of the gate length, gate-to-drain spacer distances, inpruity concentration and lemperature on the high frequency characteristic of SiC MESFETs have been studied based on the presented model.

    Effects of the structure on resonant tunneling in multi-quantum-well systems

    LI Cun-zhi1;LIN Xiao-chun2
    J4. 2004, 31(6):  829-832. 
    Abstract ( 1472 )   Save
    Related Articles | Metrics
    The transfer matrix and transmission coefficient of electron tunneling through a quantum system consisting of N rectangular barriers and wells and the number of wells on electron resonant tunneling are studied in multi-quantum-well systems. Numerical analysis shows that for the symmetrical multi-quantum-well systems in which the widths of middle barriers are equal to the sum of the widths of two side barriers, the resonant energy is decreased and the number of the resonant peaks is increased with the increase in widths of the wells; the number of the resonant peaks and the resonant energy do not change and the transmission ratio of peak to vale is increased with the increase in the number of the wells.

    Defect of the existing fidelity definition and its improvement

    YIN Zhong-hai;JIAN Jian-feng;ZHOU Li-hua;JI Hong;CHEN Jie
    J4. 2004, 31(6):  833-836. 
    Abstract ( 2251 )   Save
    Related Articles | Metrics
    The defect of the existing fidelity definition is discussed. By using this definition, it is found that two obviously different images can be determined to be approximate or the same. With the defect in mind, an improved fidelity definition is presented. The difference and relation between the two definitions are discussed and the analytic expression for deriving one definition from the other is also presented.

    Junction capacitance in the SiGe HBT based on movable charge

    Lü Yi;ZHANG He-ming;DAI Xian-ying;HU Hui-yong;SHU Bin
    J4. 2004, 31(6):  837-840. 
    Abstract ( 1445 )   Save
    Related Articles | Metrics
    When the SiGe HBT is in the normally amplified condition, there is more movable charge in emitter and collector space charge regions. Thus differential capacitance should be adopted when considering their junction capacitance. Additionally the width of the junction is largely related to teh current density, so three cases exist according to the current density. Based on the consideration of carrier transit of teh SiGe HBT, the B-E junction capacitance model related to carrier distribution and the B-C junction capacitance model under different current densities are established and analysed.

    A user adaptive scheduling multiple access protocol

    LIU Jing;LI Jian-dong;CHEN Yan-hui
    J4. 2004, 31(6):  841-845. 
    Abstract ( 1524 )   Save
    Related Articles | Metrics
    A new multiple access control(MAC) protocol-the user adaptive scheduling multiple access(UASMA) protocol is proposed, which can perfectly schedule the packet transmission according to the exact number of active mobile terminals(MTs) determined by the self-organizing algorithm, and can adjust the number of packets sent by one node in one frame properly. The UASMA protocol employs a unique frame structure and presents the concepts of reference-frame-length, thus increasing the utilization ratio of the channel greatly. Meanwhile, the UASMA protocol proposes an efficient collision resolution algorithm for guaranteeing that active MTs can access the channel rapidly. Finally, the performance of the UASMA protocol is evaluated by simulation and compared with CSMA, rouding-poll and UPMA protocols, with the simulation results showing that the former has better performance than the latter.

    ML estimation of integer frequency offset in OFDM systems

    CHEN Chen;LI Jian-dong;HAN Gang;ZHAO Lin-jing
    J4. 2004, 31(6):  846-849. 
    Abstract ( 2097 )   Save
    Related Articles | Metrics
    One of the principal disadvantages of OFDM is very sensitive to frequency offset. Carrier frequency offset can be divided into two parts: an integer one and a fractional one. The integer frequency offset has no effect on the orthogonality among the subcarriers; however it cause a circular shift of data symbols in the receiver, resulting in a BER of 0.5. The maximum likelihood(ML) estimation algorithm for integer frequency offset is derived and it employs the difference relation between two consecutive OFDM symbols. The performance of the ML algorithm is evaluated and compared with the conventional method by computer simulations.

    Performance analysis of an M-ary spread spectrum receiver using biorthogonal cyclic codes

    CHU Zhen-yong1;2;YING Xiao-fan1;TIAN Hong-xin1;YI Ke-chu1
    J4. 2004, 31(6):  850-854. 
    Abstract ( 1563 )   Save
    Related Articles | Metrics
    A novel M-ary spread spectrum receiver using biorthogonal cyclic codes is proposed. In the transmitter, every user uses biorthogonal cyclic codes to realize the spreading spectrum, and the proposed receiver can achieve despreading with only one transform domain matched-filter. Compared with the traditional M-ary spread spectrum system, the proposed scheme effectively reduces the computation complexity and the PN codes selection difficuly of the M-ary spread spectrum system.

    A new adaptive PN code blind acquisition scheme with CFAR

    ZHANG Ying-guang;LIAO Gui-sheng;ZHANG Lin-rang
    J4. 2004, 31(6):  855-859. 
    Abstract ( 1656 )   Save
    Related Articles | Metrics
    A new adaptive serial search pseudonoise(PN) code blind acquisition scheme is proposed, which does not need the help of the pilot signal. The ratio of the power estimation of the pre-correlation signal and post-correlation signal is used as the decision variable. The probability density function(pdf) of the decision statistics is derived. The decision threshold is shown to be independent of the signal power and noise power, so that the constant false alarm rate is achieved. The performance of the proposed scheme is theoretically analyzed an also simulated under the AWGN and Rayleigh fading environment. The results show that the CFAR is achieved in the proposed adaptive blind acquisition scheme.

    An integral constrained optimum beamformer

    LI Ya-mei;FENG Da-zheng;LIU Jian-qiang
    J4. 2004, 31(6):  860-864. 
    Abstract ( 1648 )   Save
    Related Articles | Metrics
    This paper presents an integral constraint beamformer for overcoming the shortcomings in multi-point constraint beamforming that it requires much of the degree of freedom in the weight vector and that it is not robust to the suppression of interference. This is a two-objective optimization problem. To solve the problem, two methods are presented, which are the weighted method and the eigenspace method. Finally, the simulation result shows that the beamformer can reduce the use of teh degree of freeedom and can improve the robustness.

    Direction of arrival estimation based on the MSWF

    HUANG Lei;YUAN Wei-ming;ZHANG Lin-rang;WU Shun-jun
    J4. 2004, 31(6):  865-869. 
    Abstract ( 1709 )   Save
    Related Articles | Metrics

    Utilizing the reduced-rank technique of the multi-state wiener filter(MSWF), a novel method of direction of arrival(DOA) estimation is proposed, resulting in a new way for parameter estimation. Analysis and simulation show that this method can be applied in the case where only a few samples are available and the signal of interference plus noise ratio(SINR) is very low. On the other hand, the new method requires much lower computational cost than the subspace-based methods. Finally, simlations are given to validate the method.

    A new method for space frequency and polarization filtering

    WANG Lan-mei;WANG Hong-yang;LIAO Gui-sheng
    J4. 2004, 31(6):  870-872. 
    Abstract ( 1518 )   Save
    Related Articles | Metrics
    We propose a novel algorithm for joint filtering in spatial, spectral and polarizational domains with an electromagnetic vector sensor(EVS). The proposed algorithm can make full use of the information in three domains and signals can be resolved from the interference background provided there is a separation between signals and interferences in any domain. Finally, the validity of this algorithm is verified by simulation results.

    An analysis of the parameters for antennas with the dome

    YANG Shao-hua;ZHANG Fu-shun;JIAO Yong-chang
    J4. 2004, 31(6):  873-876. 
    Abstract ( 1327 )   Save
    Related Articles | Metrics
    This paper deals with the effects of the pattern caused by the antenna dome construction. The geometrical optical method and radial track are used in the analysis. The patterns with the loaded dome and unloaded dome on the antenna surface are given. The simulation is made by computer. The simulation results show that this method is effective for the analysis of the antenna parameters in many types of dome and for the evaluation of antenna parameters.

    Analysis of a quadrature power series predistortion amplifier

    LIU Hui1;GUAN Bo-ran2
    J4. 2004, 31(6):  877-881. 
    Abstract ( 1519 )   Save
    Related Articles | Metrics
    Predistortion linearization technology is conceptually the simplest form of linearization for an RF power amplifier. The single power series predistorter can significantly compensate amplitude distortion, but it is limited in phase distortion improvement. This paper presents a bandpass nonlinear amplifier model by using the quadrature power series, and uses two such power series predistorters in a quadrature arrangement to linearize the power amplifier. Analytical and simulation results show that using the quadrature power series predistorter can effectively improve both amplitude and phase distortion.

    Watermarking scheme based on the salient feature of Video

    YANG Shi-yong;GE Jian-hua;LIU Pei;CAI Ze-jian
    J4. 2004, 31(6):  882-885. 
    Abstract ( 1703 )   Save
    Related Articles | Metrics
    To lay the watermarking information in the notable feautres areas of video, an algorithm for fuzzy entropy measure(FEM) is proposed. The embedding watermark strength varies with the statistic of the local feature coefficients of the original image, with the modification of these coefficients being self-adaptive. The logo can be detected certainly from the watermarked video sequence by a special Kalman filter without the original video data, and will provide an indication of the copyright existence. Experimental results show that the proposed scheme is effective and turns out to be a reliable authentication tool for the digital Video.

    New expression for and optimization of weighted order statistic filters

    SONG Huan-sheng;WANG Yang-li;WU Cheng-ke
    J4. 2004, 31(6):  886-890. 
    Abstract ( 1620 )   Save
    Related Articles | Metrics
    A new expression for weighted order statistic(WOS) filters has been developed. The importance of this expression is that it makes it very easy to solve the optimization problem of WOS filters under MAE, MSE and LNE criteria. From this expression, the adaptive algorithms for optimizing WOS filters on the LNE criterion(with MAE and MSE criteria as its special cases) have been proposed. The effectiveness of the algorithm is verified by experiments, so the optimization problem of WOS has been resolved.

    Research on the light scattering property of fractal soot particles

    BAI Lu;WU Zhen-sen;CHEN Hui
    J4. 2004, 31(6):  891-895. 
    Abstract ( 1443 )   Save
    Related Articles | Metrics
    Based on the fundamental conception of fractal, we simulate fractal-like clusters of spheres. Calculations are performed on these spheres, whose refractive index values are characteristic of carbonaceous soot. The T matrix approach together with the translation addition theorem for vector spherical waves is employed to solve the aggregate scattering problem. Numerical results for scattering intensity an the linear polarization ratio of soot particles with different fractal structures or different particle numbers are illustrated. The sensitivity of the scattering diagram to optical characteristics of fractal-like soot agglomerates is also discussed. The result shows that the scattering intensity in the forward direction can be used carefully to distinguish soot clusters with different particle numbers. As the number of spheres in soot particles has a closed relationship with the process of burning, this study may be of great importance in predicting of the exhaust gases, heat transfer rate, etc.

    Research on the jamming of FH synchronous signals

    YUAN Xue1;ZENG Xing-wen1;SHEN Zhen-ning1;2
    J4. 2004, 31(6):  896-899. 
    Abstract ( 1534 )   Save
    Related Articles | Metrics
    Based on the characteristics of the TOD FH synchronous technique, this paper proposes a novel method for FH jamming, which works by means of identifying, separating and jamming FH synchronous signals. This method makes it prossible to jam FH synchronous signals synchronously. Computer simulation shows its practicability. Finally a theory for the optimal jamming of FH synchronous signals is discussed.

    Microwave circuit optimization based on the immune algorithm

    XU Dian;SHI Xiao-wei
    J4. 2004, 31(6):  900-904. 
    Abstract ( 1483 )   Save
    Related Articles | Metrics
    The immune algorithm(IA) selects thickness and affinity as the optimality criterions of individuals, and accordingly reproduces the individuals that have small thickness and large fitness. The IA increases the ability to fight premature by calculating individuals' multiplicaties. A numerical example demonstrates its capability to solve the multimodal function. Finally, broadband stepped impedance transformers are designed by four methods respectively. The result shows that microwave circuit optimization based on the IA is feasible and high efficient.

    Dynamic analysis and evaluation of the security of a proactive secret sharing system

    SHI Ting-jun1;2;WANG Chao1;MA Jian-feng1
    J4. 2004, 31(6):  905-909. 
    Abstract ( 1570 )   Save
    Related Articles | Metrics
    This paper proposes a method for evaluating and analyzing the security of a proactive secret sharing system. Due to the difficulty in quantitatively estimating the adversary ability, the stochastic modeling techniques are used for depicting the relationships of the security to teh threshold, the time period and the behavior of adversary. Thus, the process of state transition from the secure state to the compromised state can be modeled as the Markov chain. With the state-transition diagram, the security probability of the system is obtained. Simulation experiment shows that te method has good feasibility and effectiveness. As a result, the threshold and the time period can be selected based on the quantitative method rather than on the empirical knowledge.

    Research on serially concatenated space-time trellis codes with parallel transitions

    LI Ying;WANG Xin-mei
    J4. 2004, 31(6):  910-914. 
    Abstract ( 1447 )   Save
    Related Articles | Metrics
    The space-time trellis codes parallel transitions(PT-STTC) are proposed to decrease the complexity of the serially concatenated space-time code(SCSTC). The design of SCSTC, including the design of the PT-STTC, the corresponding outer encoder and the interleaver, is also described. Based on the concept of union bound, the performance of the SCSTC with the properly designed PT-STTC as the inner code is analyzed, too. Compared with the SCSTC with delay diversity as the inner code, the proposed PT-SCSTC can not only effectively decrease the complexity but have approximate 1dB coding gains.

    An authenticated group key agreement protocol based on the DLE protocol--EAGKA

    DING Yong;TIAN Hai-bo;WANG Yu-min
    J4. 2004, 31(6):  915-918. 
    Abstract ( 1632 )   Save
    Related Articles | Metrics
    Based on the analysis of the tree-based authenticated group key agreement protocol AGKA, we find a weakness in the protocol which is caused by teh different priority of the group member in the negotiation. The weakness indicates that the prior group members may use different shared keys to cheat other members in the same group. Based on the above analysis, a novel authenticated group key agreement protocol, named the EAGKA, is proposed based on the verification of the DLE protocol. With the EAGKA, all members are absolutely equal and the weakness of AGKA is overcome. It can be applied in groups that require high security.

    A further study of full-correlation features of punctured sequences in Turbo codes

    ZHANG Wei-dang1;2;YUAN Cong1;WANG Xin-mei1
    J4. 2004, 31(6):  919-924. 
    Abstract ( 1750 )   Save
    Related Articles | Metrics
    We study the full-correlation features of related sequences in depth using the concept of full-correlation. As the preliminary work, we prove several theorems and properties of full-correlation, followed by an example study. Furthermore, we derive a precise iterative algorithm for calculating the number of equal combinations among correlated sequences. Finally, we analyze the punctured sequences of Turbo codes, and calculated the full-correlation value of punctured sequences corresponding to different punctures matrices applied to different interleavers. Simulation results show that the full-correlation value is one of the important factors affecting the BER performance of Tubrbo codes.

    Reusable electroni cash with anonymity

    YU Bin-xiao;WANG Xin-mei
    J4. 2004, 31(6):  925-928. 
    Abstract ( 1404 )   Save
    Related Articles | Metrics
    Compared with physical cash, electronic cash processes many more advantages, but its reusability is paid less attention to. Developing reusable e-cash can not only improve efficiency and performance, but also enhance anonymity and untracability, thus processing more practical importance. Hitesh Tewari et al. proposed such a scheme using secret splitting, but with some disadvantages: (1) Anonymity gets compromised due to identity information in the scheme; (2) Cash will grow longer and longer along with their use, so there must be limitations on times; (3) Double spending won't be detected untill cash is deposited. In this paper, we propose a new scheme for reusable e-cash, which simulates the process of physical cash, and guarantees customers' control of their e-cash and handovers the ownership of e-cash when paying. Our scheme realizes the reusability in a perferable way, and has better secruity and usability.

    A robust watermarking authentication algorithm using the value of visual masking

    CHEN Dan;WU Qian-hong;WANG Yu-min
    J4. 2004, 31(6):  929-933. 
    Abstract ( 1386 )   Save
    Related Articles | Metrics
    A robust watermarking authentication algorithm is proposed with the value of visual masking as th quantization size. The security depends on hiding keys rather than quantization sizes which now can be opened. Therefore, it avoids some security demerits when using human visual characteristics. Furthermore, our scheme is able to distinguish common image processing from malicious tampering, and even to indicate the area where the malicious tampering arises on the basis of the erro image of watermarks.

    Study of efficient encoding of LDPC codes

    WANG Peng;WANG Xin-mei
    J4. 2004, 31(6):  934-938. 
    Abstract ( 2158 )   Save
    Related Articles | Metrics
    The efficient encoding problem of LDPC codes is studied. Based on the decoding algorithm for LDPC codes under erasure channels and the sparseness of their parity-check matrices, an efficient encoding method for LDPC codes is described and further explained via two classes of linearly encode-able codes. The practical implementation of this method is discussed in detail and two code construction approaches are presented. Simulation results show that the LDPC codes constructed here work no worse than random ones under AWGN channels.

    An adaptive RLS algorithm applied to RF power amplifiers

    Lü Yong-sheng;WANG Jia-li;WANG Yun-fei
    J4. 2004, 31(6):  939-942. 
    Abstract ( 1799 )   Save
    Related Articles | Metrics
    An adaptive predistorter for linearizing RF power amplifiers is studied and analytical and simulation results are presented. Analysis indicates that the adjacent channel power is a quadratic function of predistorter efficients. A new optimization method is given which uses the predicted ACP surface to obtain fast convergence and simulation results show that a 20dB reduction in the third IMD and a 10dB reduction in the quatic IMD are achievable.

    An asymmetric public-key traitor tracing scheme against linear attack

    YU Zhi-qiang;YANG Bo
    J4. 2004, 31(6):  943-947. 
    Abstract ( 1553 )   Save
    Related Articles | Metrics
    A public-key traitor tracking scheme against linear combination(convex combination) attack is presented, which makes use of the oblivious polynomial evaluation protocol in the secret key negotiation process to achieve to asymmetric tracking ability and properties of direct non-repudiation, full frqmeproof. In addition, all the traitors can be determined by overwhelming probobility in our scheme. Furthermore, any information on the decreption key of users will not be involved in broadcasting data products, and compared with current schemes, security is improved.

    An improment algorithm for adaptive feedforward microwave power amplifiers

    WANG Yun-fei;WANG Jia-li;Lü Yong-sheng
    J4. 2004, 31(6):  948-951. 
    Abstract ( 1571 )   Save
    Related Articles | Metrics
    This paper presents a variable loop step LMS algorithm in the design of broad-band, high-linearity and high-efficiency power amplifiers in communication systems. Simulation results are also presented to verify the improvement of the convergence speed and the achievable accuracy of the control loop parameters.

    A scheme for registration in the mobile IP integrated with AAA

    WANG Li-ming;YANG Bo
    J4. 2004, 31(6):  952-954. 
    Abstract ( 1565 )   Save
    Related Articles | Metrics
    With the development of he Internet and the wide use of wireless handsets, more and more attention is paid to the mobile IP. Authentication and registration in the mobile IP is the key for the Mobile IP to proceed. an integrated scheme is proposed in this paper according to the authentication and registration in the Mobile IP. The scheme realizes the incorporation of authentication and registration. key distribution among MH, FA and HA is also achieved in the scheme. In addition, public key and symmetric key operations are employed simultaneously to ensure the secure transmission and authentication of data.

    Image denoising algorithm based on the updating-lifting morphological wavelet

    REN Huo-rong;WANG Jia-li;ZHANG Ping
    J4. 2004, 31(6):  955-958. 
    Abstract ( 1780 )   Save
    Related Articles | Metrics
    A new method for constructing the nonlinear update-lifting morphologic wavelet is presented. The information of the detail signal is used to modify the scale signal, which also guarantees the perfect reconstruction feature of wavelet transform. The update operator of the update-lifting morphologic wavelet is extended. The generalized update operator is presented, which consists of a series of mathematical morphologic operators filering the detail signals in spatial space. The update-lifting wavelet the using generalized update operator is applied to image denoising. Experimental results show that the lifting morphologic wavelet has better denoising performnace and less edge loss in detail image compared to the traditional wavelet thresholding method, expecially in a low signal to noise ratio.

    Security analysis of a key management scheme for multicast based on the one-way function tree

    CHEN Jing;YANG Bo;TIAN Chun-qi
    J4. 2004, 31(6):  959-962. 
    Abstract ( 1500 )   Save
    Related Articles | Metrics
    Multicast is the basis for many new applications in the internet, and key management is one of the key research areas of multicast security. We particularly analyze the security of the key management scheme based on the one-way function tree(OFT), which is one of the drafts of SMuG, an point out the vulnerabilities in providing forward security and backward security. An improved scheme for providing real forward security and backward security is also proposed.

    Designs of several partial blind signatures and the security analyses

    ZHANG Tong1;WANG Yu-min2
    J4. 2004, 31(6):  963-966. 
    Abstract ( 1615 )   Save
    Related Articles | Metrics
    The blind signature is used for hiding the message to be signed and hiding the identities of message providers. The concept and protocol of the partial blind signature are explained after the analysis of teh inherent defects of the blind signature. Three partial blind signature schemes based on the discrete logarithm are introduced and their security are analysed.

    A new integeration method

    SONG Ju-long1;XU Chen2
    J4. 2004, 31(6):  967-969. 
    Abstract ( 1365 )   Save
    Related Articles | Metrics
    A new integeration method is presented, which is an improvement on compound trapezoidal integeration. The interval is partitioned from outside to inside gradually instead of from left to right in sequence. According to the characteristic of the integrand, a sub-interval may be calculated at any moment when it is suitable for calculation. Farther partition is no longer carried out, and hence the amount of calculation is reduced. The illustration shows that the speed of calculation can be commonly increased by 3 to 4 times, and therefore, the method is of goo applied value in engineering.

    Limiter-based chaos control for the pendulum

    LIU Fang
    J4. 2004, 31(6):  970-973. 
    Abstract ( 1486 )   Save
    Related Articles | Metrics
    A research method using the limiter for chaos control is used to control the non-autonomy chaos pendulum system. By this method, we can change global control into efficient local control. According to the simulation result, we can draw the conclusion that the control method with the chaos pendulum has a fast control response time. It can be extended to general control systems.

    Support for dynamic reconfiguration and high-level programming of CORBA-based distributed applications

    CAO Min;WU Geng-feng
    J4. 2004, 31(6):  974-978. 
    Abstract ( 1436 )   Save
    Related Articles | Metrics
    We present a novel approach, called OrbGOP, to supporting the architecting, dynamic reconfiguration and high-level programming of CORBA-based distributed applications. OrbGOP is based on the GOP(Graph-oriented programming) model, where the configuration of a distributed program is described as a logical graph separated from the programming of the constituent components of the program. Component interactions and dynamic reconfiguration are implemented by executing a set of operations that are defined over the graph. OrbGOP extends the application of GOP to the CORBA environment. It provides higher-level abstractions for programming CORBA applications and frees the programmer from the underlying irrelevant details. It also facilitates the architecture description and dynamic reconfiguration of CORBA applications.