Loading...
Office

Table of Content

    20 February 2011 Volume 38 Issue 1
      
    Original Articles
    Unified conformal mapping and the three-wire transmission line capacitor
    WANG Xinwen;LIANG Changhong;CHEN Xi;ZHU Cheng;QING Jun
    J4. 2011, 38(1):  1-7.  doi:10.3969/j.issn.1001-2400.2011.01.001
    Abstract ( 1827 )   PDF (572KB) ( 1559 )   Save
    References | Related Articles | Metrics

    The mirror method, the electric axis method and the complex conformal mapping method are the typical methods to solve electromagnetic-field problems. The image method is used only to solve the field distribution of charges near the conductor. The electrical axis method is used merely to solve the potential function between two infinite long parallel cylindrical conductors.Therefore, the conventional electric axis method is relaced by the uniform conformal mapping method in this paper, and the issues of eccentric coaxial lines and parallel pairs of cylinders are unified. This paper also presents the complex examples of the three-wire transmission line capacitor. Therefore, the unified conformal mapping method can replace the image method and electrical axis method and simplify the solution of the electromagnetic-field problem.

    A novel image segmentation algorithm
    XU Jianjun;GAO Shan;BI Duyan;CHEN You
    J4. 2011, 38(1):  8-15.  doi:10.3969/j.issn.1001-2400.2011.01.002
    Abstract ( 2684 )   PDF (415KB) ( 1572 )   Save
    References | Related Articles | Metrics

    The Intersecting Cortical Model (ICM) is adopted for image segmentation. Because the nonlinear exponential attenuation threshold mechanism is suitable for brightness respondence but not suitable for image segmentation, we change it to the linear threshold mechanism which leads to the LT-ICM. Meanwhile, an improved 2-D Tsallis cross-entropy segmentation rule is proposed for determining the segmentation threshold and iteration time automatically. Experiments show that the proposed algorithm is better than OSTU and K-means algorithms for the texture image segmentation. Besides, our rule is more effective than the 2-D max-Shannon-entropy rule, traditional 2-D Tsallis cross-entropy rule, and min-cross-entropy rule.

    Joint estimation of multi-targets angles-Doppler frequencies for the MIMO bistatic radar
    ZHANG Yongshun;NIU Xinliang;ZHAO Guoqing;GUO Yiduo
    J4. 2011, 38(1):  16-21. 
    Abstract ( 1960 )   PDF (612KB) ( 1375 )   Save
    References | Related Articles | Metrics

    In order to implement the multi-parameter estimation for the bistatic radar without any synchronization,a multi-targets signal model of the MIMO bistatic radar is set up and a joint angles-Doppler frequencies estimation algorithm for multi-targets is proposed. In the algorithm, the virtual array data of multitarget echoes in MIMO receivers is first uncorrelated, then a special matrix based on the propagation operator constructed, and finally the joint estimation of the DODs, DOAs and Doppler frequencies can be obtained by the corresponding relationships between the eigenvalue or eigenvector and the estimated parameters. The proposed algorithm does not need the multi-dimensional nonlinear peak search, and only needs an eigenvalue decomposition, and the estimated parameters of the targets can be paired automatically. The correctness and effectiveness of the proposed method are verified with computer simulation.

    Hybrid genetic and tabu search algorithm for static virtual topology designs in three layers of optical networks
    XU Zhanqi;JIN Xing;YANG Fan;HAN Sen
    J4. 2011, 38(1):  22-27.  doi:10.3969/j.issn.1001-2400.2011.01.004
    Abstract ( 1487 )   PDF (595KB) ( 1168 )   Save
    References | Related Articles | Metrics

    Considering the fact that the SDH network and technology are widely used in practice, we study the static virtual topology design problem in IP over SDH over WDM(IP/SDH/WDM) optical networks, and propose a hybrid genetic and tabu search algorithm for virtual topology designs (HGTSA-VTD). The key elements within HGTSA-VTD are designed in detail, making this hybrid algorithm have the integrated advantages of the global search for genetic algorithms and local search for tabu search algorithms. Its effectiveness in resource utility has been verified by comparing the simulation results with the results by existing approaches used formerly on the NSFnet.

    Video semantics robust watermarking method for the AVS compressed domain
    TONG Ming;QIN Kezhen;JI Hongbing
    J4. 2011, 38(1):  28-33+46.  doi:10.3969/j.issn.1001-2400.2011.01.005
    Abstract ( 1472 )   PDF (597KB) ( 1235 )   Save
    References | Related Articles | Metrics

    To improve the robustness of the watermarking method remarkably, this paper proposes a video semantics watermarking method, which combines video semantics with video watermarking by using the high-level semantic features of stability and unvulnerability. This method looks upon mining association rules as a constrained optimization problem, uses an improved clonal selection algorithm for the fuzzy association rule mining to extract the semantics of motion and texture, and generates dynamic semantics watermark online. This method determines the shots of interest according to motion semantics adaptively, determines the I frames of interest according to texture semantics adaptively, and selects the intense movement and slow movement of the region as a region of interest according to human visual masking properties, and then embeds watermark in the IF DCT coefficients of the luminance sub-block prediction residual of the I frames of interest; it adaptively controls watermark embedding strength by use of video texture features. Experiments and analysis show that this method is robust not only to various conventional attacks, but also to re-frame, frame cropping, frame deletion and other video-specific attacks.

    Efficient multi-granularity optical switching architecture and its waveband traffic grooming algorithm
    YANG Fan;XU Zhanqi;QIU Zhiliang;WU Chengchao
    J4. 2011, 38(1):  34-41.  doi:10.3969/j.issn.1001-2400.2011.01.006
    Abstract ( 1474 )   PDF (530KB) ( 1280 )   Save
    References | Related Articles | Metrics

    The multi-granularity OXC can reduce the number of switching ports of the wavelength switching plane of the ordinary OXC in the DWDM network. But there is a tight coupling between the waveband switching plane and the wavelength switching plane in ordinary multi-granularity OXC. So the switching architecture of the ordinary multi-granularity OXC is complex. A new multi-granularity OXC is proposed. In this new architecture, the wavelength switching plane and waveband switching plane are independent. Therefore the switching architecture can be simplified and the number of switching ports of the wavelength switching plane can be reduced effectively. In order to increase the utilization of the waveband, a traffic grooming algorithm for this new architecture is proposed. Simulation results show that the traffic grooming algorithm can effectively decease the blocking possibility.

    New inversion channel electron mobility model of the 4H-SiC n-MOSFET
    TANG Xiaoyan;ZHANG Yuming;ZHANG Yimen
    J4. 2011, 38(1):  42-46. 
    Abstract ( 2123 )   PDF (1697KB) ( 1319 )   Save
    References | Related Articles | Metrics

    An inversion channel electron mobility model of the 4H-SiC n-MOSFET is presented according to the physical mechanism. The quasi-2D Coulomb scattering mobility model based on the first principles takes account of the screening effect by carriers and temperature on Coulomb scattering, in which no empirical parameters are included. This can be directly embedded into the 2-D device simulator. The numerical relationship between the proportionality constant of the surface roughness scattering mobility model and the surface roughness degree is deduced. Correctness of the model is confirmed by comparison between simulated and experimental results. The simulated results show that Coulomb scattering plays a dominant role near the interface. Surface roughness scattering becomes more obvious at a higher gate voltage and it is the dominant scattering mechanism to limit the mobility in the inversion layer for the higher doped SiC MOSFET.

    New differential evolution constrained optimization algorithm
    LIU Ruochen;JIAO Licheng;LEI Qifeng;FANG Lingfen
    J4. 2011, 38(1):  47-53.  doi:10.3969/j.issn.1001-2400.2011.01.008
    Abstract ( 2271 )   PDF (1103KB) ( 1706 )   Save
    References | Related Articles | Metrics

    Most existing differential evolution algorithms for the Constrained Optimization Problem(COP) use the penalty function method to handle constrains, which depends strongly on the penalty parameter. So, this paper transforms the COP into two-objective multi-objective optimization by taking constraints as an objective function. Based on the concept of Pareto, the grades of individuals in population are prescribed so as to determine their selection probability in the process of “survival of the fittest”. In addition, when the algorithm gets into a local optimum, an infeasible solution replacing mechanism is also given to improve the search capability. The results of the 13 Standard tests show that compared to the Evolutionary Algorithm based on Homomorphous Maps (EAHM), Constraint Handling Differential Evolution (CHDE), Evolutionary Strategies based on Stochastic Ranking (ESSR) and Artificial Immune Response Constrained Evolutionary Strategy (AIRCES), the proposed algorithm has certain advantages in convergence speed and solution accuracy.

    Design of the low-power MOSFET driver circuit for APFC
    SHI Lingfeng;WANG Qingbin;XU Wendan;MIAO Zihui
    J4. 2011, 38(1):  54-58+65.  doi:10.3969/j.issn.1001-2400.2011.01.009
    Abstract ( 1723 )   PDF (819KB) ( 1483 )   Save
    References | Related Articles | Metrics

    AA drive circuit for driving an external power MOSFET is designed for active power factor correction (APFC), which consists of a level-shift circuit and a single totem-pole output stage. The level-shift circuit adopts the current mirror structure so that it can reduce the power dissipation by adjusting the bias current. The dead time in the single totem-pole output stage can also decrease the power dissipation. Clamping the control signal VGS for the high voltage PMOS between 6V and 11V not only makes low consumption but also saves the layout area. Based on the 0.4μm BCD process, simulation results show  that the better circuit power is 7.34mW and that the layout area can be saved by 15% when VDD is 14V and switch frequency is 75kHz.

    Exception handling based alias analysis technique in software maintenance
    WANG Liming;CHEN Ke;XU Lin;ZHANG Zhongbao;LIU Jian;CHEN Ping
    J4. 2011, 38(1):  59-65.  doi:10.3969/j.issn.1001-2400.2011.01.010
    Abstract ( 1301 )   PDF (1550KB) ( 1243 )   Save
    References | Related Articles | Metrics

    For the error diagnosis problem in object-oriented software maintenance, this paper proposes a novel alias analysis technique. By extending the control flow graph of a program, exception handling structures are analyzed. Based on the extended control flow graph, the process of alias analysis is divided into two phases, flow sensitive intra-class analysis and requirements based inter-class analysis, to achieve a complete alias analysis of the whole system, and effectively improves the efficiency of error diagnosis for programs which contain exception handling structures.

    Robust successive MMSE precoding for the MU-MIMO downlink transmission system
    LI Chuan;LIU Wei;LI Xiaoya;ZHOU Lihua
    J4. 2011, 38(1):  66-70.  doi:10.3969/j.issn.1001-2400.2011.01.011
    Abstract ( 1913 )   PDF (824KB) ( 1312 )   Save
    References | Related Articles | Metrics

    A robust successive MMSE (SMMSE) precoding scheme is proposed in the context of the multiple user multiple input multiple output (MU-MIMO) downlink (DL) transmission system under the condition of imperfect channel state information (CSI) at the transmitter side. The proposed algorithm enables us to use multiple antennas at the receiving terminal so that it is possible to jointly process the received signal at the receiving terminial, with the eigen-beamforming technique belonging to the joint processing method. Simulation results show that the robust SMMSE algorithm aided eigen-beamforing technique can effectively improve the system performance compared to the one without considering the impact of the channel estimation error, and even completely remove the error floor.

    Modified RMA for the tandem bistatic FMCW SAR with frequency non-linearity correction
    LIANG Yi;WANG Hongxian;XING Mengdao;BAO Zheng
    J4. 2011, 38(1):  71-79+84.  doi:10.3969/j.issn.1001-2400.2011.01.012
    Abstract ( 1680 )   PDF (1576KB) ( 1262 )   Save
    References | Related Articles | Metrics

    Considering the long sweep period of the Frequency Modulated Continuous Wave (FMCW) SAR, it becomes difficult to maintain the linearity of frequency. For lack of the satisfactory correction methods, a modified frequency non-linearity correction algorithm is presented. Furthermore, the Doppler frequency shift introduced by the platform's continuous motion is analyzed in detail. For the signals after frequency non-linearity correction, the concept of instantaneous frequency is used by introducing the parameter, i.e., bistatic angle, to deduce the signal analytical expression in the two dimensional wave-number domain. Based on this, a modified Range Migration Algorithm(RMA) with frequency non-linearity correction is proposed which is aimed at the Tandem Bistatic FMCW SAR. Simulation data processing verifies the correctness of the analysis and the effectiveness of the algorithms, including frequency non linearity correction and imaging processing.

    Performance analysis of cooperative relay topology
    WANG Yong;LI Hui;ZHANG Weidong
    J4. 2011, 38(1):  80-84.  doi:10.3969/j.issn.1001-2400.2011.01.013
    Abstract ( 1660 )   PDF (579KB) ( 1596 )   Save
    References | Related Articles | Metrics

    The performance of amplify-forward (AF) and decode-forward (DF) is analyzed in the two basic single relaying modes for a single-relay system in the Rayleigh fading environment. This paper investigates the impact of the relay's position on the system capacity and probability of error for both AF and DF schemes. The position of the relay is crucial to the performance. The result shows that depending on transmission power, channel noise and path loss the best performance is achieved when the relay is at an equal distance from the sender and the destination in AF or the relay is closer to the source around in DF.

    Shift operator method applied for the 2-dimensional conducting target coated with magnetized plasma in FDTD analyses
    10.3969/j.issn.1001-2400.2011.01.014
    J4. 2011, 38(1):  85-89+130.  doi:10.3969/j.issn.1001-2400.2011.01.014
    Abstract ( 1657 )   PDF (1645KB) ( 1262 )   Save
    References | Related Articles | Metrics

    The finite-difference time-domain(FDTD) method is extended to two dimensional anisotropic dielectric dispersive media—magnetized plasma by using Shift Operator(SO). It is proved that when the incident plane wave vector is perpendicular to the axis of the 2-dimensional axial magnetized plasma cylinder, the electromagnetic wave can be decomposed into Transverse Electric(TE) and Transverse Magnetic(TM) waves, with the electromagnetic scattering characters of the TM wave having no relation with the external DC magnetic field but the electromagnetic scattering characters of the TE wave having close relations with the electromagnetic parameters in magnetized plasma. The physical reasons have been analyzed. The FDTD with shift operator (SO-FDTD) formulations in this case is derived based on the constitutive relation for the magnetized plasma and shift operator. For electromagnetic scattering of the Von Karman shaped conducting cylinder coated with anisotropic magnetized plasma, the effect of coating thickness and plasma parameters on the bistatic Radar Cross Section(RCS) is investigated, with some numerical results obtained. The results indicate that appropriate plasma coating may efficiently reduce the RCS of a metallic target.

    Polarimetric SAR filtering method to preserve scattering characteristics
    GUO Rui;LIU Yanyang;ZANG Bo;XING Mengdao
    J4. 2011, 38(1):  90-95.  doi:10.3969/j.issn.1001-2400.2011.01.015
    Abstract ( 1458 )   PDF (1644KB) ( 1324 )   Save
    References | Related Articles | Metrics

    Most of the speckle filtering methods can not preserve the scattering characteristics of  the PolSAR image because of their being based on the statistic model. To solve this problem, here we propose a speckle filtering method to preserve polarimetric scattering characteristics. Firstly, by extracting scattering characteristics from the PolSAR image, we mark different sorts with different markers; then, referring to the different markers, an adaptive slipping window is used to compute the filtering parameter; finally, measured data are applied in the filtering experiment using the filtering parameter. From the analysis, we have proved the effectiveness of our method.

    Study of the imaging method of the missile-borne scan SAR wide-swath mode
    ZHOU Peng;LI Yachao;XING Mengdao
    J4. 2011, 38(1):  96-103.  doi:10.3969/j.issn.1001-2400.2011.01.016
    Abstract ( 1813 )   PDF (8378KB) ( 1243 )   Save
    References | Related Articles | Metrics

    In order to extend the swath of the SAR (Synthetic Aperture Radar) image to match the scene, the missile-borne ScanSAR wide-swath mode is studied in this paper. Firstly, the geometric model and the range equation are built, secondly the spatial variation of the linear range cell migration and the Doppler centroid are analyzed, thirdly the modified Range-Doppler algorithm and its computation load are analyzed, and lastly the geometric correction expressions are deduced. Simulation shows the effectiveness of the imaging mode and algorithms proposed.

    Iterative shrinking filtering algorithm with nonlinear state constraints
    CHEN Jinguang;LI Jie;GAO Xinbo
    J4. 2011, 38(1):  104-109.  doi:10.3969/j.issn.1001-2400.2011.01.017
    Abstract ( 1463 )   PDF (558KB) ( 1291 )   Save
    References | Related Articles | Metrics

    In the process of filtering, the filtering accuracy can be improved if the state constraints are used in an effective manner. The nonlinear constrained function can be linearized by the Taylor series expansion. However, if the Jacobian matrix of the nonlinear constrained function is nonexistent, this method will not work anymore. Moreover, the moving horizon estimation (MHE) algorithm needs a heavy computational burden in this condition. So a perfect measurement method is proposed based on the unscented transform to solve this problem. Furthermore, in order to reduce the negative effect from the base point error, the nonlinear constraints can be treated as measurements with different noise covariance. The noise covariance shrinks in the measurement update stage, and the constrained conditions are enhanced step by step. The state estimation error is improved after some iterations. Simulation results show that the proposed algorithm can obtain a higher filtering accuracy, and that its computational time is 1/27 of that of the moving horizon estimation algorithm even if the window size is 2.

    Coregistration of multiple-pass interferograms of a single-baseline InSAR system based on phase gradients
    GUO Jiao;LI Zhenfang;BAO Zheng
    J4. 2011, 38(1):  110-116.  doi:10.3969/j.issn.1001-2400.2011.01.018
    Abstract ( 1543 )   PDF (687KB) ( 1301 )   Save
    References | Related Articles | Metrics

    It is a practical and feasible way to acquire multibaseline interferometric data by utilizing repeat passes of a single-baseline InSAR system. Due to the high coherence, the single-pass pair of SAR images generated by a single-baseline InSAR can be coregistered using conventional methods. However, there exist extreme difficulties in the coregistration operation for multiple-pass SAR images due to the serious temporal and spatial baseline decorrelation, especially in the case of large effective cross-track baseline lengths. Fortunately, the repeat-pass interferograms obtained by a single-baseline InSAR correspond to the identical terrain, i.e., Digital Elevation Model (DEM). Hence the interferograms contain coherent information, even if the SAR images are decorrelated completely. Based on this point, we propose an innovative strategy to coregister the repeat-pass interferograms instead of the SAR images. Computer simulation results show that the proposed method has the ability to align multiple-pass interferograms of a single-baseline InSAR system accurately.

    Parallel Gaussian particle filter for passive multi-target tracking
    ZHANG Jungen;JI Hongbing;CAI Shaoxiao
    J4. 2011, 38(1):  117-122.  doi:10.3969/j.issn.1001-2400.2011.01.019
    Abstract ( 2308 )   PDF (3178KB) ( 4044 )   Save
    References | Related Articles | Metrics

    In multi-target tracking, aiming at the data association problem and the curse of dimensionality that arises due to the increased size of the state-space associated with multiple targets, a novel algorithm based on the parallel Gaussian particle filter (parallel-GPF) is proposed. By assuming that the states of the targets conditioned on the past measurements are mutually independent, the algorithm is amenable for multi-channel parallel implementation. With the Markov chain Monte Carlo (MCMC) approach the marginal association probabilities can be evaluated. Then, the filtering distributions of each target are computed independently with GPF. And, Quasi Monte Carlo (QMC) integration is utilized for approximating the prediction and update distributions. Finally, the proposed method is applied to passive multi-sensor multi-target tracking. Simulation results show that the proposed algorithm can obtain a better tracking performance than JPDAF, MCMCDAF and MC-JPDAF.

    Missile-borne squint SAR algorithm based on a curve locus
    LIU Gaogao;ZHANG Linrang;YI Yusheng;LIU Nan;LIU Xin;WANG Chun
    J4. 2011, 38(1):  123-130.  doi:10.3969/j.issn.1001-2400.2011.01.020
    Abstract ( 1611 )   PDF (383KB) ( 1219 )   Save
    References | Related Articles | Metrics

    For the problem of the forward-looking blind zone on the missile-borne SAR, this paper presents a squint RD imaging algorithm in a missile trajectory. This algorithm requires a curve locus to receive target imaging, which causes the radar antenna to be directed to the target at a squint degree that changes the forward-looking into a squint mode. Considering the handicap by the complex trajectory equation under the curve locus, we first obtain the trajectory equation in high order, and takes RCMC(Range Cell Migration Correction) in the time-doppler domain, then derive the two-dimensional frequency domain expression by series reversion and finally receive the imaging results by a two-dimensional matched filter. Simulation results verifies its validity.

    Modified space-time multiple-beam approach for the airborne radar
    HE Jie;FENG Dazheng;Lü Hui;CAO Yang
    J4. 2011, 38(1):  131-135.  doi:10.3969/j.issn.1001-2400.2011.01.021
    Abstract ( 1877 )   PDF (593KB) ( 1265 )   Save
    References | Related Articles | Metrics

    For the low system degrees of freedom of the Space-Time Multiple-Beam (STMB) approach and the general sidelobe canceller structure of the multistage Wiener filter (MWF), a dimension-reducing space-time adaptive processing (STAP) based on the STMB approach for the airborne radar is proposed. Firstly, to reduce the degrees of freedom of the clutter, the space-time received data are pre-filtered by using the STMB approach; secondly, the output data after preprocessing are processed by the MWF to optimize the weight vector, which can further reduce both computational complexity and sample support requirement. Theoretical analysis and computer simulation results illustrate that the method can achieve a robust performance without a large loss in the presence of large random amplitude and phase errors existing in the array elements. Experimental results by using the measured data demonstrate the effectiveness of the proposed method.

    Estimation of a high-velocity target's motion parameters for a modulated frequency stepped radar
    SUN Huixia;LIU Zheng;CAO Yunhe
    J4. 2011, 38(1):  136-141.  doi:10.3969/j.issn.1001-2400.2011.01.022
    Abstract ( 1529 )   PDF (607KB) ( 1247 )   Save
    References | Related Articles | Metrics

    Aiming at the motion compensation for the modulated stepped frequency radar signal echoed by a moving target, we develop a new method combining envelope correlation and the least burst error rule for estimating the velocity. First, the coarse velocity is measured by using envelope correlation, then the refined velocity is estimated by utilizing the least burst error rule based on the coarse velocity, which avoids the problem of the local minimum existing in the least burst error method. Simulation results indicate that the method can accomplish accurate estimation of target motion parameters with good anti-noise performance.

    Design of the controller for nonlinear interconnected systems
    GUO Gang;NIU Wensheng;MA Jianfeng
    J4. 2011, 38(1):  142-146+183.  doi:10.3969/j.issn.1001-2400.2011.01.023
    Abstract ( 1731 )   PDF (557KB) ( 1224 )   Save
    References | Related Articles | Metrics

    The decentralized state feedback control problem is studied for a nonlinear interconnected systems with a time-varying delay in both states and inputs which are composed of a number of Takagi-Sugeno (T-S) fuzzy bilinear subsystems with interconnections. Based on the Lyapunov criterion and the parallel distribution compensation scheme, the delay-dependent stabilization sufficient conditions are derived for the whole close-loop fuzzy interconnected systems, which have less conservativeness than that by the existing methods. The corresponding decentralized fuzzy controller design is converted into a convex optimization problem with linear matrix inequality (LMI) constraints. Finally, a simulation example shows the effectiveness of the proposed approach.

    On nonbinary rate-compatible LDPC codes
    ZHOU Lin;BAI Baoming;SHAO Junhu;LIN Wei
    J4. 2011, 38(1):  147-152.  doi:10.3969/j.issn.1001-2400.2011.01.024
    Abstract ( 1904 )   PDF (517KB) ( 1454 )   Save
    References | Related Articles | Metrics

    Two design methods for nonbinary rate-compatible LDPC(RC-LDPC)codes are proposed. And a novel irregular bit-wise shortening algorithm based on the algebraic properties of their binary images is proposed, with which we can obtain improved performance and extra flexibility; a symbol-wise puncturing algorithm for binary LDPC codes is extended to nonbinary LDPC codes. With these two algorithms, we obtain a family of nonbinary RC-LDPC codes with the code-rate range from 1/10 to 5/6. Simulation results demonstrate that gains of 0.1~1.1dB are obtained by proposed methods.

    Fast method to enforce the passivity of macromodels for the admittance matrix
    YAN Xu;LI Yushan;GAO Song;DING Tonghao;QU Yongzhe
    J4. 2011, 38(1):  153-158.  doi:10.3969/j.issn.1001-2400.2011.01.025
    Abstract ( 1770 )   PDF (555KB) ( 1356 )   Save
    References | Related Articles | Metrics

    Based on inequality constraint, numerical optimization is used in the traditional quadratic programming method to compensate the passivity violations, with the required simulation time being quite large. A novel quadratic programming method to enforce the passivity of macromodels is presented, which can greatly reduce the simulation time. This method is based on the quadratic programming method with an equality constraint. The associated optimization problem can be solved by the method of Lagrange multipliers. The Krylov subspace method is adopted to solve the resulting linear system, which can fully utilize the sparsity of the problem. The computational time required for this method is significantly reduced. A frequency selection strategy for passivity violations is also introduced. Several examples show that the solving time required for the presented method is less than 1/10 that of the traditional quadratic programming method.

    Design of cognitive engine for CR using the RBF neural network
    JIANG Hong;MA Jinghui;HUANG Yuqing;WU Chun
    J4. 2011, 38(1):  159-164+170.  doi:10.3969/j.issn.1001-2400.2011.01.026
    Abstract ( 1981 )   PDF (571KB) ( 1295 )   Save
    References | Related Articles | Metrics

    Cognitive radio (CR) is an intelligent wireless communication system, and the design of a cognitive engine is one of the key issues. The cognitive engine can utilize the reasoning and learning methods to achieve the perception, adaptation and learning ability. This paper presents a design scheme for the cognitive engine based on the RBF neural network (RBF-NN) to adapt varied wireless environment according to experiential knowledge. A CR simulation cognitive engine is realized using the 802.11a simulation platform by collecting data and training the NN to learn channel characteristics. Under the premise of studying the sensation information, CR reconfiguration is realized according to the user's needs. Simulation results show that the proposed cognitive engine can effectively realize the study and reconfiguration function, and that the prediction accuracy is higher than that of the BP NN model by 10%~30%.

    Difference threshold based fuzzy handover algorithm for heterogeneous networks
    ZHANG Tiankui;QIU Yu;FENG Chunyan
    J4. 2011, 38(1):  165-170.  doi:10.3969/j.issn.1001-2400.2011.01.027
    Abstract ( 1777 )   PDF (3254KB) ( 1590 )   Save
    References | Related Articles | Metrics

    In order to improve the accuracy of vertical handover and to reduce the “Ping-Pong effect”, a difference threshold based fuzzy handover (DTFH) algorithm is proposed for heterogeneous networks. The handover trigger and handover decision are considered for DTFH. The signal to noise ratio (SNR) gap between the target network and the current network is obtained by the mobile station (MS), and the SNR gap between the two networks is compared with a predefined trigger threshold for handover trigger. Then based on the method of fuzzy logic, the MS gets the fuzzy decision values of the target network and the current network, and the gap between the fuzzy decision values of these two networks is compared with a predefined decision threshold for handover decision. In simulation, a heterogeneous network comprising LTE and WiMAX is used. Compared with traditional handover algorithms, the simulation results show that the DTFH algorithm can reduce the “Ping-Pong effect”, increase the throughput of MS, and improve the performance of vertical handover.

    Reliability prediction model of component-based embedded software
    LI Changde;ZHOU Xingshe;DONG Yunwei
    J4. 2011, 38(1):  171-175.  doi:10.3969/j.issn.1001-2400.2011.01.028
    Abstract ( 1672 )   PDF (575KB) ( 1624 )   Save
    References | Related Articles | Metrics

    Traditional software reliability growth models based on the black-box approach are inappropriate to model the reliability of component-based software. How to analyze and predict software reliability from components' reliabilities is concerned. Considering that the component developer and user may be different and taking into account the assembling methods of component-based software, a reliability prediction model of component-based embedded software is proposed. Using this model, the reliability of the system is a function of the stochastic properties of the component failure behavior, the architecture structure of the program and the utilization of these components by the user. The main ideas of this model are: firstly, the software architecture is modeled as a discrete time Markov chain, and complex structures such as parallel, redundant and subroutine calls are transformed from the architecture view to the state view, secondly, the developer of the component gives each interface's reliability of the component and the user provides the usage profile from the component level and interface level, on the basis of which we can calculate the component's reliability in different use scenarios.

    Anonymous authentication scheme for mobile communication
    LIU Jinye;GU Lize;LUO Shoushan;YANG Yixian;CUI Jun;WU Xingyao
    J4. 2011, 38(1):  176-183.  doi:10.3969/j.issn.1001-2400.2011.01.029
    Abstract ( 2004 )   PDF (609KB) ( 1200 )   Save
    References | Related Articles | Metrics

    In order to enable the mobile network to provide anonymity services and ensure the confidentiality of the user's identity, whereabouts and other information, we put up an anonymous authentication scheme, which solves the problem of user's anonymity not only in roaming network, but also in adscription network. The scheme has not only a small amount of communication, but also does not need to change the key every time. The scheme is based on the knowledge proof, and uses the direct anonymous attestation protocol theory together with encrypting transfer and signature validation for its implementation. Theoretical analysis and experimental results demonstrate that users do not need to go to the home agent to authenticate the user's identity in the roaming network, and that there is no need to map out its true identity in the adscription network. It implements user's anonymity in the whole network effectively.

    Fast antenna selection in multi-user distributed MIMO systems
    ZHENG Nae;CUI Weijia;WANG Daming
    J4. 2011, 38(1):  184-188.  doi:10.3969/j.issn.1001-2400.2011.01.030
    Abstract ( 1856 )   PDF (584KB) ( 1301 )   Save
    References | Related Articles | Metrics

    The number of antennas at the base station side in a multi-user distributed MIMO system is much larger than that of a centralized one. Accordingly, antenna selection at the base station side becomes one of the key technologies in such a system. However, traditional algorithms are too complex to be realized. A low complexity receive antenna selection algorithm based on parameter optimization is proposed to deal with the complexity problem in the uplink of multi-user distributed MIMO systems. In order to reduce the complexity, an elimination method with capacity computation replaced by iterative parameter optimization computation is introduced in the algorithm. Both complexity analysis and simulation results show that the computation complexity is largely reduced while the capacity performance is still close to that of the optimal algorithm.