Loading...
Office

Table of Content

    20 August 2009 Volume 36 Issue 4
      
    Original Articles
    Study of the cross-layer architecture for guarantee of QoS in WiMAX
    LI Jian-dong;CHEN Ting;DENG Shao-ping;LI Chang-le
    J4. 2009, 36(4):  573-582. 
    Abstract ( 1936 )   PDF (1070KB) ( 1485 )   Save
    References | Related Articles | Metrics

    This paper proposes one novel cross-layer architecture for quality of service(QoS) of guarantee in point-to-multipoint (PMP) Worldwide Interoperability for Microwave Access (WiMAX) networks, which divides the whole protocol structure model into two sub-planes vertically: one is data service flow delivery sub-plane which could provide data processing and delivering layer-by-layer for service flow based on IEEE 802.16 standards, and the other is the QoS resource management sub-plane which could coordinate the operation of all manage modules in different protocol layers and implement adaptive QoS joint control by various signaling. Simulation results show that the QoS joint control solution based on the cross-layer architecture can provide guarantee of QoS for multimedia communication service flow effectively and obtain users' fairness when comparing to the typical control solution used in PMP WiMAX.

    Robust generalized inner products algorithm using diagonal loading
    LIU Cong-feng;LIAO Gui-sheng
    J4. 2009, 36(4):  583-589. 
    Abstract ( 2006 )   PDF (823KB) ( 1370 )   Save
    References | Related Articles | Metrics

    For the problem of the covariance matrix estimation in the nonhomogeneous condition for space-time adaptive processing (STAP), the diagonal loading generalized inner products (DL-GIP) technique is proposed. By analyzing the GIP algorithm deeply, the diagonal loading is used to improve the GIP detection performance, and for DL-GIP, the key is to select the loading level, and the selecting method is advanced particularly. It is important that the effect of the diagonal loading upon the GIP performance be analyzed particularly in theory, namely the rational diagonal loading can improve the detection probability and the output signal-to-noise ratio. The last simulation attests its correctness and effectiveness, namely DL-GIP provides a higher probability of detection and robustness multiple outliers detection technique, and its performance is superior to other NHD methods this paper has mentioned.

    Transmitter-receiver combined adaptive MIMO transmission scheme for spatially correlated channels
    LI Zhao;YANG Jia-wei;YAO Jun-liang;HAN Wei-jia
    J4. 2009, 36(4):  590-595. 
    Abstract ( 1928 )   PDF (857KB) ( 1442 )   Save
    Related Articles | Metrics

    We propose an adaptive MIMO transmission technique in IEEE 802.11n clustered MIMO channels. In the strategy a compound antenna structure composed of uniform linear array, uniform circular array and star array, and two transmission schemes including spatial multiplexing and beamforming are considered. The mobile station and base station utilize the instantaneous and spatially statistical channel information to cooperatively implement adaptation among different transmission schemes and antenna array types. Compared with the method based on statistical channel information only, the proposed method can achieve better capacity performance approximating the optimal ergodic capacity with the complexity reduced and little feedback cost needed.

    Low complexity ordering algorithm for multiuser  MIMO Tomlinson-Harashima precoding
    WANG Wei;HU Mei-xia;ZHANG Hai-lin
    J4. 2009, 36(4):  596-601. 
    Abstract ( 2145 )   PDF (651KB) ( 1489 )   Save
    References | Related Articles | Metrics

    The nonlinear Tomlinson-Harashima precoding(THP) algorithm is an effective solution for MIMO broadcast. However, the performance of the THP strongly depends on the ordering of precoding symbols. To compare different ordering THP algorithms effectively, an ordering gain factor is defined in this paper. And we propose a low complexity ordering THP algorithm based on the approximate equal-diagonal QR decomposition. The proposed algorithm obtains a triangle matrix with approximate equal diagonal elements by rearranging the order of the channel matrix's rows to maximize the ordering gain. Simulation results reveal that the proposed algorithm has a significant reduction of computational complexity at the expense of only slight performance degradation compared to the optimal ordering THP algorithm.

    Face recognition algorithm based on wavelet preprocessing and tensor PCA
    WEN Hao;LU Zhao-yang;GAO Quan-xue
    J4. 2009, 36(4):  602-607. 
    Abstract ( 2609 )   PDF (772KB) ( 1574 )   Save
    References | Related Articles | Metrics

    The accuracy rate of the face recognition by tensor PCA is higher than that by PCA. And wavelet has two abilities to capture localized time-frequency information and to reduce the dimension of images. According to the two advantages of the above algorithms, a new face recognition algorithm based on wavelet transform and tensor PCA is proposed. Wavelet transform is firstly used and then tensor PCA is used to extract the feature of subband images, and the efficient recognition of face images can be realized. The recognition rate of the proposed alogorithm is 6% higher than that of the tensror PCA algorithm, and the recognition time of the proposed algorithm is 35.74% that of the tensor PCA algorithm, which is illustraed in experimental results.

    Novel MAC scheme for weighted-fair differentiated service in 802.11e WLANs
    ZHANG Guo-peng;ZHAO Li-qiang;ZHANG Hai-lin
    J4. 2009, 36(4):  608-613. 
    Abstract ( 1654 )   PDF (659KB) ( 1366 )   Save
    References | Related Articles | Metrics

    In this paper, a novel MAC scheme referred to as P-EDCA is proposed to resolve the unfairness problem in IEEE 802.11e WLANs (i.e., the flows with lower priorities can not get any throughput of data transfer in cases of heavy network loads). P-EDCA provides weighted fairness for differentiated service between the flows, and supports the stations with the 802.11e based multi-queue structure. By using the inner centralized queuing discipline, P-EDCA guarantees fair transmission opportunity between the queues within a station. And by using a contention based access method, i.e., the DFS algorithm, fairness of channel accessing between the stations is reached. Simulation results show that weighted-fair differentiation is accurately implemented by P-EDCA with no information shared between the users. And, without decreasing the performance of higher priority flows, P-EDCA outperforms the original EDCA in terms of its QoS assurance for lower priority flows in the network.

    Collaborative filtering algorithm via compressing the sparse user-rating-data matrix
    HOU Cui-qin;JIAO Li-cheng;ZHANG Wen-ge
    J4. 2009, 36(4):  614-638. 
    Abstract ( 2436 )   PDF (701KB) ( 2359 )   Save
    References | Related Articles | Metrics

    The paper proposes a novel memory-based collaborative filtering algorithm—Multi-label Probabilistic Latent Semantic Analysis based Collaborative Filtering, which improves the quality of recommendations by reducing the dimension of the user-rating-data matrix by multi-label probabilistic latent semantic analysis when the matrix is extremely sparse. Firstly, it confines the set of latent variables of probability latent semantic analysis to the set of multi-label of items to make latent variables have meanings of corresponding labels. Then it learns the probabilistic distribution of latent variables, i. e.,  the model of use's interest, to compress the user-rating-data matrix. Finally, it computes the similarity between different users based on the above learned model and makes recommendations. Compared to memory-based collaborative filtering algorithms, the proposed algorithm decreases the mean absolute error 4 percents averagely on test dataset by reducing the dimension of the user-rating-data matrix. The proposed algorithm makes the recommendation system understandable and obtains competitive recommendations compared to the filtering algorithm which reduces the dimension of the user-rating-data matrix by probabilistic latent semantic analysis.

    IR dim target tracking and detection based on new genetic particle filter
    LI Cui-yun;JI Hong-bing
    J4. 2009, 36(4):  619-644. 
    Abstract ( 1967 )   PDF (688KB) ( 1602 )   Save
    References | Related Articles | Metrics

    Crucial issues in a particle filter(PF) are to remove the degeneracy phenomenon and alleviate the sample impoverishment problem. In this paper, by using techniques from a genetic algorithm we propose some modifications to solve these problems simultaneously. A genetic algorithm with arithmetic crossover, fast Metropolis-Hastings mutation and the roulette wheel selection improves resampling procedures for the standard particle filter. The new particle filter is developed for IR dim target tracking and detection. By using multi-frame target amplitude and motion features some values of the filter's output are used to approximately construct the likelihood ratio for hypothesis test in the detection stage. Simulation results show that genetic resampling based on fast Metropolis-Hastings can produce various particles and remove the degeneracy phenomenon. For some actual image sequences with an SNR of 2.0, successful detection probability reaches 98.5% with 10-3 false alarm probability. Experimental results show that the performance of the proposed algorithm is better than that of traditional resampling particle filter algorithms.

    Multi-channel moving target focusing and parameter estimation algorithm
    YU Jing;LIAO Gui-sheng
    J4. 2009, 36(4):  624-668. 
    Abstract ( 1735 )   PDF (904KB) ( 1343 )   Save
    References | Related Articles | Metrics

    To overcome the shortcomings of the traditional moving target parameter estimation methods which assume that the target moves with a constant velocity, a new multi-channel moving target parameter estimation algorithm is proposed. By polynomially fitting the instant frequency curve of the azimuth echoes and solving the equations, we can get the estimation of the moving parameters. Furthermore, by reconstructing the azimuth reference function the focused images of the targets can be obtained. The method overcomes the considerable parameter estimation error of an accelerated target obtained by the constant velocity model. Finally the validity of the algorithm is verified by simulations.

    Efficient method of moments for the computation of RCS
    YUAN Hao-bo;WANG Nan;LIANG Chang-hong
    J4. 2009, 36(4):  629-674. 
    Abstract ( 1818 )   PDF (729KB) ( 1515 )   Save
    References | Related Articles | Metrics

    The higher order method of moments is based on both higher order current modeling and higher order geometrical modeling. However, the commonly used low order bilinear patch is low in precision and not compatible with the conventional computer aided design (CAD) tools. This paper proposes a truly double higher order method of moments which approximates the structure with NURBS (Nonuniform Rational B-Spline) surfaces. A new set of formulas are introduced to rapidly evaluate the singular impedances and approximate the far-zone impedances. The resultant unknowns are less than 10% of that of FEKO. Besides, we need only adjust the order of the basis functions instead of meshing the structure repeatedly as the frequency increases. The precise model of a missile is conveniently obtained by the CAD tools, and the radar cross section (RCS) obtained by this new technique is validated against that obtained by FEKO.

    Robust clutter spectrum compensation algorithm for forward looking airborne radar
    LI Ming;LIAO Gui-sheng;QU Yi;ZHU Sheng-qi
    J4. 2009, 36(4):  633-638. 
    Abstract ( 1477 )   PDF (990KB) ( 1327 )   Save
    References | Related Articles | Metrics

    In this paper, a new approach to spatial angle frequency shifting spectrum compensation for forward looking radar is proposed. The algorithm compensates the clutter Doppler frequency for the range cell before using spatial angle frequency shifting, which overcomes the problem of decreasing moving target detection performance, caused by the spatial angle frequency shifting algorithm to enhance the sidelobe of the reference range clutter spectrum. Experimental results show that the improved algorithm can obtain obviously better performance than spatial angle frequency shifting, without performance loss under radar clutter with some uncertain errors.

    Uplink detection algorithms in multiuser MIMO systems
    LI Chuan;LIU Wei;CHEN Rui;HUANG Peng-yu
    J4. 2009, 36(4):  639-644. 
    Abstract ( 1864 )   PDF (603KB) ( 1396 )   Save
    References | Related Articles | Metrics

    We propose two novel uplink multiuser detection (MUD) algorithms for Multi-User Multiple Input Multiple Output (MU-MIMO) systems. Based on block diagonalization (BD) technique the proposed parallel and successive MUD algorithms can decompose the MU-MIMO system into parallel single user MIMO (SU-MIMO) systems, which enables the SU-MIMO based algorithms to be directly applied and significantly reduces complexity. Simulation results show that the proposed algorithms are capable of achieving the same performance as the corresponding SU-MIMO system and have a substantial performance gain against the traditional zero-forcing (ZF) based algorithm. Furthermore, theoretical analysis and simulation results demonstrate that the successive BD algorithm significantly outperforms the parallel one.

    Novel DGS microstrip low-pass filter
    WEI Feng;ZHAI Yang-wen;SHI Xiao-wei;CHEN Lei;HUANG Qiu-lin
    J4. 2009, 36(4):  645-648. 
    Abstract ( 2159 )   PDF (890KB) ( 1881 )   Save
    References | Related Articles | Metrics

    A conventional microstrip low-pass filter has a large area and a narrow stop-band. To solve this problem, a new microstrip low-pass filter is presented in this paper, which is composed of semicircle defected ground structures and semicircle stepped-impedance shunt stubs. The effect of parameter variation of S-DGS and S-SISS on band-stop characteristic is studied. An equivalent circuit model of the proposed LPF is also described. The proposed filter is compact and the 3dB cutoff frequency is 2.7GHz. The stop-band is 4~16GHz, which is wider by 20% than that of the conventional DGS filter. Simulation results are in good agreement with the measured results, which verifies the reliability of the designed filter.

    Beamforming detector for group space-time coded systems
    J4. 2009, 36(4):  649-654. 
    Abstract ( 1913 )   PDF (641KB) ( 1330 )   Save
    References | Related Articles | Metrics

    According to the characteristic of group space-time coded systems, a new detecting algorithm based on beamforming is proposed. By utilizing the unitary matrix, the transmitter decouples the input signal into spatial orthogonal beam directions with the matched filters in beam directions in the receiver, and the gain obtained by each data block can be equivalent to the sum of the projection from the channel matrix to the corresponding beam directions. Beam selection is adopted to maximize the minimum gains of all the blocks, which can improve the system diversity gain efficiently. Moreover, a multiple-rate group space-time coded scenario is presented. Theoretical analysis and simulation results reveal that the proposed algorithm has a better capacity and error performance with lower decoding complexity.

    Study of effects of steady-state thermal blooming on high energy laser propagation in the atmosphere
    YANG Rui-ke;WANG Xin-kuan;YAO You-qun;WU Jian
    J4. 2009, 36(4):  655-660. 
    Abstract ( 1705 )   PDF (729KB) ( 1404 )   Save
    References | Related Articles | Metrics

    Based on the integral method, the effects of the steady-state thermal blooming of laser beam propagation in the atmosphere in existence of wind and its influence on light intensity in the far field are studied. The integral equation of the steady-state thermal blooming is deduced for high energy laser propagation in the atmosphere. The Gauss-Legendre numerical integral algorithm is introduced and modified in order to speed up convergence. The results show that the convergence time is decreased almost two time; moreover, the more the thermal distortion, the greater the improvement becomes. Then, the numerical calculation of thermal blooming at 10.6 and 3.8μm are performed based on the modified method. The results at 10.6μm are good as we expected. If we consider further the 3.8μm case, it is indicated that thermal distortion and spread of the laser beam are enlarged when the transmitted laser power or distance is increased for other fixed parameters. However, the spot distortion is in inverse proportional to the aperture size at a certain power and distance. However, the numerical result shows that the aperture should be neither too large nor too small. Both of these cases can reduce the power density and the area of the effective spot on the target. Furthermore, cost is proportional to the aperture size. Hence, the reasonable selection of the aperture is one of the important parameters for a high energy laser system.

    On the colored Petri net model of the C3I system of the double aircraft carriers group
    ZHU Sen;LI Zhi-wu
    J4. 2009, 36(4):  661-668. 
    Abstract ( 1616 )   PDF (867KB) ( 1361 )   Save
    References | Related Articles | Metrics

    Based on the basic theory and property of the colored Petri nets(CPN) and C3I system, such features of the aircraft carrier groups arrangement as the battle order, area, and power are analyzed . The work focuses on the use of colored Petri nets to establish a model for an aircraft carrier's air battle C3I system according to the battle arrangement and configuration of the group with double aircraft carriers. By using the CPN tools, the model is simulated and analyzed under priority and random inputs. This paper can find some efficient way to improve the command system's battle efficiency by cooperation, make the scientific and reasonable decisions, and minimize the war cost.

    Demodulation scheme and transmission performance study  of the DOPSK signal in optical communication
    LI Xiao-jun;LIU Zeng-ji;WEN Ai-jun;Lü Liang
    J4. 2009, 36(4):  669-674. 
    Abstract ( 1723 )   PDF (664KB) ( 1306 )   Save
    References | Related Articles | Metrics

    Based on the principle of the Mach-Zehnder Delay interferometer and balanced detector, an improved demodulation method is suggested for the ODOPSK modulation format. It is theoretically proved that this method could be used to demodulate the DOPSK signal correctly. Then the transmission performance of RZ-DOPSK in the single-channel is simulatively studied. It is shown that the chromatic dispersion tolerance of RZ-DOPSK is larger than that of other modulation formats, and that the nonlinear tolerance is smaller than that of RZ-DQPSK and RZ-DBPSK, but much larger than that of RZ-BASK.

    Research on the measurement system for terminal antenna quality conformability
    HOU Jian-qiang;NIU Zhong-qi
    J4. 2009, 36(4):  675-679. 
    Abstract ( 1394 )   PDF (694KB) ( 1494 )   Save
    References | Related Articles | Metrics

    The resonance perturbation theory is extended in this paper, and the result could be deduced that the antenna performance in the free space and the resonance frequency of the cavity and antenna system (the antenna is placed in the cavity) are correlative. A new experimentation is designed to verify the correlation between the antenna resonance frequency of antenna and the cavity-antenna system. Experimental results show the correlation coefficient is above 0.93, which proves that the deduced theory is correct. Based on such a theory, a measurement system for terminal antenna quality conformability is developed. The terminal antenna which is produced by the industrialization process could be measured quickly and accurately with this system, and the duration of measurement is less than 10s. So the measurement efficiency could be improved greatly. Besides the small antenna conformability, this system could be used to measure the specification of other small samples such as cable connector.

    Axiomatization for the first-order projection temporal logic and formal verifications
    SHU Xin-feng;DUAN Zhen-hua
    J4. 2009, 36(4):  680-729. 
    Abstract ( 1749 )   PDF (539KB) ( 1434 )   Save
    References | Related Articles | Metrics

    To verify the properties of the concurrent and reactive systems based on the theorem proving approach, an axiomatization is formulized for the first order projection temporal logic (FPTL). Further, FPTL can be used to describe the properties as well as the implementation of the system to be verified, which enables us to do verification within the same logic framework. Finally, an example is given to illustrate how to do system verification based on FPTL and its axiomatic system.

    Generalized tweakable enciphering schemes
    LI Xue-yuan;WANG Xin-mei
    J4. 2009, 36(4):  686-690. 
    Abstract ( 2257 )   PDF (498KB) ( 1502 )   Save
    References | Related Articles | Metrics

    The tweakable enciphering scheme is a kind of wide-block tweakable block cipher.In order to find more efficient tweakable enciphering schemes and more implementation methods,we propose generalized tweakable enciphering schemes.By defining an allowed function sequence,different construction methods for the function sequence,and the mapping from the function sequence to the enciphering scheme,we get many new tweakable enciphering schemes.Among them,some are better than the original scheme in efficiency,others are comparable to it in efficiency.At the same time,some new implementation methods for the tweakable enciphering scheme are discovered.

    Estimation method for the transmission distance for the 2.4GHz Zigbee application
    GUO Hong-fu;BAI Li-na;GUO Zhi-hua
    J4. 2009, 36(4):  691-745. 
    Abstract ( 1658 )   PDF (538KB) ( 1332 )   Save
    References | Related Articles | Metrics

    It is a troublesome matter for a Zigbee designer that using the general wireless channel model to estimate transmission distance results in lager errors. By the 802.15.4a channel model, the analytical methods of 2.4GHz Zigbee RF module radiation transmission loss is discussed; the factors that affect the transmission distance are analyzed, and the estimation formula for the maximum transmission distance is derived. For the Zigbee RF module specific circuit designed, the transmission loss and the largest transmission distance are calculated and through the experimental test, the estimated error is less than 10%, which is in line with the requirements of engineering applications, and it can be used as the theoretical basis for 2.4GHz Zigbee RF module design and engineering applications to estimate the transmission distance.

    Random network coding against the eavesdropping adversaries
    ZHOU Ye-jun;LI Hui;MA Jian-fen
    J4. 2009, 36(4):  696-701. 
    Abstract ( 1990 )   PDF (542KB) ( 1721 )   Save
    References | Related Articles | Metrics

    An algorithm against eavesdropping adversaries is presented. By means of this algorithm an eavesdropper is unable to get any meaningful information about the source, which we call practical security. We show that if we give up a small amount of overall capacity, then a random code achieves the practically secure condition at a much higher probability. When there is a low rate secret channel between the source and destination, the shared secret algorithm not only achieves the max-flow but also the practically secure condition at a probability of one. Furthermore, implementing the algorithm involves only a slight modification of the source and destination with the operations at the intermediate nodes remaining unchanged.

    Algebraic attack on symmetric Boolean functions  with a high algebraic immunity
    LI Xue-lian;HU Yu-pu
    J4. 2009, 36(4):  702-707. 
    Abstract ( 1839 )   PDF (523KB) ( 1417 )   Save
    References | Related Articles | Metrics

    Algebraic immunity is an important index to measure the ability to resist algebraic attacks. If a Boolean function has a low algebraic immunity, then it can not resist the algebraic attack. This paper gives two conclusions on some Boolean functions with a high algebraic immunity, that is, 1) for most of symmetric Boolean functions with a high algebraic immunity, if they are used inappropriately, then the attacker still can launch an efficient algebraic attack; 2)our algebraic attack is still efficient for a more general class of Boolean functions with a high algebraic immunity, which consists of a rotation symmetric Boolean function and a Boolean function with a low degree. Our algebraic attack requires a segment of the consecutive bitstream.

    Mechanism of the influence of the panel positional error on the power pattern of large reflector antennas
    WANG Wei;LI Peng;SONG Li-wei
    J4. 2009, 36(4):  708-713. 
    Abstract ( 1660 )   PDF (1435KB) ( 1402 )   Save
    References | Related Articles | Metrics

    The errors associated with a segmented reflector limit the electrical performance obtainable with those antennas. In order to determine realistic error budgets for such antennas, approximate expressions for ETM (Error Transformation Matrix) between panel positional errors and aperture phase errors are derived. Base on the ETM, the mechnism of the influence of the panel positial errors on the power pattern of a reflector antenna with 3-ring panels is studied. It is found by comparing simulation with experimental data that the error is less than 10%. Thus the ETM may be applied to antennas with realistic panel schemes for the prediction of electrical performance and panel adjustment.

    Universally composable secure Internet key exchange protocol
    PENG Qing-quan;PEI Qing-qi;YANG Chao;MA Jian-feng
    J4. 2009, 36(4):  714-720. 
    Abstract ( 1634 )   PDF (636KB) ( 1329 )   Save
    References | Related Articles | Metrics

    The new Internet key exchange protocol (IKEv2) is analyzed, and it is found that the protocol can not achieve active identity protection to the initiator and has the security flaw of authentication failure in its initial exchange. However, it is necessary to protect the identity information to the initiator under the environment of a wireless access network. In this paper, a novel key exchange protocol for the wireless network based on IKEv2 initial exchange is proposed, which realizes active identity protection to the initiator by the responder explicitly proving his true identity, and achieves successful authentication by reconstructing the authentication payload. With the Universally Composable (UC) security model, this new protocol is analyzed in detail, with the analytical results showing that it affords provably UC security. Performance analysis and simulation results show that the proposed protocol has less computation and communication overhead.

    Accurate analysis of electrically large wire-to-surface configurations by the adaptive integral method
    HUANG Chun-ming;AN Xiang;Lü Zhi-qing
    J4. 2009, 36(4):  721-724. 
    Abstract ( 1687 )   PDF (634KB) ( 1477 )   Save
    References | Related Articles | Metrics

    The idea of choosing the surface part of the Costa basis function independently of the  RWG region is presented while solving electromagnetic radiation problems of surface-wire configurations using the adaptive integral method(AIM). Because unsually many triangles are involved in junctions, the equivalent sources are inaccurate if projecting all of them to the uniform grids as the traditional AIM. To overcome this shortcoming, only a part of each triangle basis function on the surface is selected, based on the fact that the normal component of the current on the edges of each triangle will vanish. Therefore, the resulting equivalent sources can be more accurate in the corresponding grid box. Numerical results demonstrate that the technique could effectively improve the accuracy of near-zone matrix elements by about 40%. The method can be used to analyze arbitrary surface-wire configurations with a high accuracy and efficiency.

    Automatic target recognition of ISAR images  based on SIFT features
    CUI Yan-peng;HU Jian-wei;YANG Shao-quan;ZHU Yan
    J4. 2009, 36(4):  725-729. 
    Abstract ( 2130 )   PDF (844KB) ( 1406 )   Save
    References | Related Articles | Metrics

    Under conditions of translation, rotation, projection and shelter of the aircraft targets, undesired inverse synthetic aperture radar(ISAR) images will make target classification more difficult. A new feature extraction method is proposed to identify ISAR images from different flight attitudes of the target aircraft. The approach provides effective features for identification using the order scales extracted by scale invariant feature transform. Experimental results show the presented algorithm is quite effective.

    Performance analysis of an improved multiple-access differential chaos shift keying
    ZHOU Zhi-bo;ZHOU Tong;WANG Jin-xiang
    J4. 2009, 36(4):  730-735. 
    Abstract ( 1755 )   PDF (644KB) ( 1243 )   Save
    References | Related Articles | Metrics

    A new kind of multiple-access differential chaos shift keying (MA-DCSK) is presented which is based on the chaotic binary sequence and Walsh code. In the proposed system, the signals in the transmitter and the corresponding receiver are multiplied by the same Walsh code. Due to the constant instantaneous power of the chaotic binary signal and the Walsh code orthogonality, the interference between users will be greatly reduced. So, this kind of MA-DCSK has the multiple-access ability. The bit error rate (BER) performance is analyzed and the BER formula is evaluated. Simulation results match the numerical ones well, which supports the theoretical analysis. The performance is compared with that of other kinds of MA-DCSK in the additive white Gaussian noise (AWGN) channel. It is shown that the proposed MA-DCSK system is comparable to other MA-DCSK systems as all users use the different chaotic initial values. Compared to other MA-DCSK systems, the structure of the proposed system is simpler and more feasible to be implemented since the delays are invariant and the data to be processed is a kind of antipodal binary.

    Extraction of the transient characteristics of the communication radiating source and individual indentification
    LU Man-jun;ZHAN Yi;SI Xi-cai;YANG Xiao-niu
    J4. 2009, 36(4):  736-740. 
    Abstract ( 1909 )   PDF (588KB) ( 1667 )   Save
    References | Related Articles | Metrics

    Individual communication signals identification is an important issue in the field of communication reconnaissance in recent years. The recurrence plot method is proposed to detect the start-up point of the transient signals, which is based on the nonlinear characteristics of the transient signal. Wavelet transform is used to extract features from the transmitters. The most discriminatory features are selected from a large number of wavelet transform features by genetic algorithms, and Support Vector Machines (SVM) are used to realize the individual identification. Experimental results show that the introduced method achieves good accuracy recognition rate in terms of a little features as reference, with the accuracy recognition being more than 90%.

    Study of the  microwave OTH radar maximum detection range of ships
    LIU Ai-guo;CHA Hao
    J4. 2009, 36(4):  741-745. 
    Abstract ( 1597 )   PDF (663KB) ( 1840 )   Save
    References | Related Articles | Metrics

    The prediction model of the radar maximum detection range of the sea surface ship in evaporation duct environments is studied. The predictions of the present radar Over The Horizon detection range prediction model frequently deviate significantly from radar measurements. The limitation of the present prediction model is described. The use of the vertical multi-scatter center to model the surface ship is presented. A vertical distribution model of the radar cross section is used to correct the present prediction model. Finally, the predictions by the corrected model are compared with the radar observations. The result shows that the predictions by the corrected model agree well with the observations and are more accurate.

    Research on the curvature parameter in the S-shaped inlet's stealth design
    JI Jin-zu;WU Zhe;LIU Zhan-he
    J4. 2009, 36(4):  746-750. 
    Abstract ( 2500 )   PDF (1150KB) ( 1384 )   Save
    References | Related Articles | Metrics

    The inlet is a strong scattering source in the aircraft head important attitude angle. One way to reduce RCS (Radar Cross Section) is to make the inlet S-shaped to increase the electromagnetic wave reflection time to reduce backward wave energy. A series of S-shaped inlets bended vertically and horizontally are tested in the microwave anechoic chamber to study relative curvature's influence. Experimental result shows that when the incident is vertically polarized, the head direction RCS average's variation along the relative curvature is of “W” shape and has 2 minimum values; when horizontally polarized, the head direction RCS average's variation is different in two bend fashions. The variation is of “W” shape when vertically bended and monotonously descends when horizontally bended. Generally speaking, a proper relative curvature can reduce the backward's RCS of the inlet.

    Algorithms and application of the wavelet-based signal processing
    LI Chuan-wei;LI An-zong
    J4. 2009, 36(4):  751-755. 
    Abstract ( 2023 )   PDF (794KB) ( 2647 )   Save
    References | Related Articles | Metrics

    Confined to the measuring and transmitting conditions in the field, the mud signal model is usually set which contains all kinds of noises. In order to manipulate the signals, an optimal wavelet is designed according to the characteristics of the signals based on the minimum entropy. By using the wavelet, the modular maximum of signals, noises and the baseline are calculated for different scales. The advanced processing algorithms for the modular maximum are conducive to noise-reduction, baseline correction, and singularity detection. The algorithms have been applied with satisfactory results in the Measure While Drilling system in some oil field.

    Provable security signcryption scheme and its hybrid construction
    ZHANG Chuan-rong;ZHANG Yu-qing
    J4. 2009, 36(4):  756-760. 
    Abstract ( 1875 )   PDF (494KB) ( 1455 )   Save
    References | Related Articles | Metrics

    By using the Tag-KEM/DEM hybrid encryption technique and based on a provable security signcryption hybrid construction SCTK/DEM proposed by Bj¢rstad in 2006, a new signcryption scheme is given. By analyzing its hybrid construction, it is obtained that the proposed signcryption scheme is up to the SCTK/DEM construction. So, it has provable security. Moreover, compared with the famous signcryption scheme SCS, the high efficiency of our proposed scheme is shown at the same time.