Loading...
Office

Table of Content

    20 December 2016 Volume 43 Issue 6
      
    Stable-throughput analysis and optimization of cooperative cognitive radio networks based on information and energy cooperation
    KUO Yonghong;HE Bingtao;CHEN Jian
    Journal of Xidian University. 2016, 43(6):  1-7.  doi:10.3969/j.issn.1001-2400.2016.06.001
    Abstract ( 348 )   PDF (569KB) ( 408 )   Save
    References | Related Articles | Metrics

    According to the unsaturated data traffic in wireless communications, this paper studies the interaction between primary users (PUs) and secondary users (SUs) in a cooperative cognitive radio network which is based on information and energy cooperation, and optimizes the stable-throughput of SUs. A probabilistic cooperation scheme has been proposed and the stable-throughput region has been characterized in order to reflect the interaction between PUs and SUs by using the Queuing Theory. Then by deriving the optimal value of the relaying probability, the stable-throughput of secondary users can be maximized under the constraint of the primary queue stability. Simulation results and theoretical analysis show that the probabilistic cooperation scheme can achieve maximal stable-throughputs for SUs, and meanwhile PUs can also have a better performance compared to the non-cooperative case.

    Power allocation and transmission scheduling for a transmitter with hybrid energy sources
    LIU Didi;LIN Jiming;WANG Junyi;CHEN Xiaohui;ZHANG Wenhui
    Journal of Xidian University. 2016, 43(6):  8-14.  doi:10.3969/j.issn.1001-2400.2016.06.002
    Abstract ( 546 )   PDF (713KB) ( 180 )   Save
    References | Related Articles | Metrics

    The problem of dynamic power allocation and transmission scheduling for a transmitter powered by hybrid energy sources (combination of power grid and energy harvesters) is studied. The goal is to minimize the time average energy consumed from the power grid, that is, to improve the utilization efficiency of the energy harvested by the harvesters under the condition of unknowing statistical distribution of the energy harvesting process, data arrival process and fading channel state. An efficient dynamic power allocation and transmission scheduling algorithm is proposed based on Lyapunov optimization, and the algorithm is simple to operate due to its low complexity. Using the proposed algorithm the power consumed by the transmitter from the power grid can be close to the minimum arbitrarily under all data queues stability, and meanwhile the algorithm guarantees that data queues cannot exceed the maximum delay. Simulation results indicate that the proposed algorithm has a better performance than other two simple algorithms.

    Relay incentive in cooperative communication by exploiting link imbalance
    LI Zhao;CAI Shenjin
    Journal of Xidian University. 2016, 43(6):  15-20+115.  doi:10.3969/j.issn.1001-2400.2016.06.003
    Abstract ( 293 )   PDF (1723KB) ( 178 )   Save
    References | Related Articles | Metrics

    A relay incentive mechanism based on link imbalance(LIABLE) is proposed for the cooperative downlink communication system. In order to encourage nodes to participate in cooperation, the communication resource is offered as a reward to the relay node that participates in data cooperation. Unlike traditional bottleneck elimination methods in multi-hop end-to-end communication, the LIABLE attempts to make use of the bottleneck caused by link imbalance. Moreover, the location and size of the bottleneck can be controlled on demand by adjusting the relay's transmit power, so that the difference of data rates between two hops can be afforded to the relay as a reward. Simulation results show that the proposed scheme can provide appropriate compensation to the relay node on premise that the destination's transmission performance is guaranteed. In addition, enhancement of the system spectral efficiency and the relay node's energy efficiency can be realized.

    Floating small target detection in the sea clutter via block-whitened clutter suppression
    LI Dongchen;SHUI Penglang;XU Shuwen
    Journal of Xidian University. 2016, 43(6):  21-26.  doi:10.3969/j.issn.1001-2400.2016.06.004
    Abstract ( 319 )   PDF (1127KB) ( 181 )   Save
    References | Related Articles | Metrics

    It is always a difficult task for the marine surface surveillance radar to detect the floating small target embedded in the sea clutter. Considering the non-uniform and non-stationary nature of sea clutter, the block-whitening strategy is used to suppress the clutter. By analyzing the differences between the energy distributions of the clutter-only returns and those of the returns with the target in the time-frequency (TF) plane, a TF feature is extracted via the TF-ridge-aided Hough transform. A detector using the TF feature is proposed. Experimental results for the IPIX radar datasets show that the proposed detector attains a better detection performance than the fractal-based detector in a relatively short observation time.

    Research on modified Newton and Taylor-series methods in TDOA
    FANG Jiaqi;FENG Dazheng;LI Jin
    Journal of Xidian University. 2016, 43(6):  27-33.  doi:10.3969/j.issn.1001-2400.2016.06.005
    Abstract ( 432 )   PDF (651KB) ( 217 )   Save
    References | Related Articles | Metrics

    In the Time Difference Of Arrival (TDOA) source localization model, based on the Taylor-series (TS) method and Newton (NT) method, this paper presents the Modified Taylor-series(MTS) method and the Modified Newton method(MNT), which solve the critical convergent problem caused by the bad initial value in the original algorithms. The proposed algorithms modify the ill-condition Hessian matrix caused by the bad initial value using the Tikhonov (TI) or the Diagonal Singular Value Decomposition technique (DSVD) in the Regularization theory. The regularization parameter which controls the properties of the regularized solution is determined by the L-curve method. Simulation results show that compared with the TS and NT methods, the proposed methods ensure that the solution of the iterative methods converges on the source location, improves the convergent probability and has a better capability to remove the local minima. The proposed methods also give superior performances of the location accuracy comparing with the closed-form algorithms in low SNR environment.

    Analysis of the geometry and wave port symmetry in the higher-order MoM
    LI Yanyan;ZUO Sheng;WANG Yong;ZHANG Yu
    Journal of Xidian University. 2016, 43(6):  34-38+146.  doi:10.3969/j.issn.1001-2400.2016.06.006
    Abstract ( 609 )   PDF (2661KB) ( 192 )   Save
    References | Related Articles | Metrics

    Focusing on the symmetry of the geometric structure and wave port excitation, a symmetric analysis method utilizing the combination of the higher-order MoM and wave port theory is proposed. With the help of the parallel out-of-core computing technique, the radiation characteristics of a large-scale narrow slotted waveguide array are simulated. Numerical results show that the using the wave port and geometric symmetry can significantly reduce the requirement of memory and computing time while maintaining the same precision and accuracy.

    Degree of freedom evaluation in the radiation field for metamaterial aperture imaging radar
    WU Zhenhua;LIU Hongwei;ZHANG Lei;KOU Na
    Journal of Xidian University. 2016, 43(6):  39-44.  doi:10.3969/j.issn.1001-2400.2016.06.007
    Abstract ( 291 )   PDF (1123KB) ( 142 )   Save
    References | Related Articles | Metrics

    There has no complete evaluation system to measure the radiation field of metamaterial imaging radar currently. This paper presents a method of using the first and second cross-correlation statistics of the measurement matrix to assess the degree of freedom of the radiation field, and the reconstruction performance of metamaterial imaging radar is analyzed based on the method. The inaccuracy caused by using only the mean value of measurement matrix cross-correlation is analyzed first. Then the cross-correlation coefficient variance indicator is introduced to develop a new evaluation system. Finally, combined with the compressed sensing theory, the corresponding relationship between imaging reconstruction precision and the two indicators is established through the phase diagram. Simulation results show that our method effectively evaluates the degree of freedom of the radiation field and guides the design of metamaterial imaging radar.

    Improved polarimetric SAR calibration algorithm considering channel noise
    ZHANG Haiying;LI Zhenfang;LI Jinwei;FANG Chao
    Journal of Xidian University. 2016, 43(6):  45-50.  doi:10.3969/j.issn.1001-2400.2016.06.008
    Abstract ( 283 )   PDF (3134KB) ( 137 )   Save
    References | Related Articles | Metrics

    It is necessary to calibrate polarimetric SAR(Synthetic Aperture Radar) data in order to use the data for scientific applications. The present Ainsworth algorithm does not consider the cross-polarization channel noise in estimating the cross-polarization imbalance parameter and therefore the estimation of this parameter is not robust. To solve the above problem, an improved Ainsworth algorithm is presented, which takes the cross-polarization channel noise into consideration. This algorithm can preserve a high performance under the situations of difference cross-polarization channel noise powers and a low signal noise ratio. Experimental results based on simulated and real data confirm the effectiveness of the improved algorithm.

    Decoding of codes correcting a single translocation error for the cell's level of flash memory
    MU Jianjun;ZHAO Peng;JIAO Xiaopeng
    Journal of Xidian University. 2016, 43(6):  51-55+121.  doi:10.3969/j.issn.1001-2400.2016.06.009
    Abstract ( 224 )   PDF (444KB) ( 176 )   Save
    References | Related Articles | Metrics

    By using permutation to represent the data of flash memory cells, the rank modulation scheme, which can effectively improve the reliability of the data stored by the flash storage device, has become an important technology of the error control coding in flash data storage system. Based on permutation code interleaving, the construction for the rank modulation code that can correct a single translocation error for the cell's level of flash memory is proposed. By making a detailed analysis of the properties of permutation theory, the corresponding decodinHocquenghem-Bose-Chandharig method for this rank modulation code is given.

    Automated security analysis techniques in MANET routing protocols
    MAO Liqiang;HUANG Ying
    Journal of Xidian University. 2016, 43(6):  56-61.  doi:10.3969/j.issn.1001-2400.2016.06.010
    Abstract ( 260 )   PDF (591KB) ( 161 )   Save
    References | Related Articles | Metrics

    Automated security analysis techniques in Mobile ad hoc network(MANET) routing protocols has become a hot research field. We have developed an automated evaluation process to analyze security properties of SRP and Ariadne. Using the automated security evaluation process, we can produce and analyze all topologies for a given network size. The NDA attackers and routing protocols are modeled in SPIN, and the route corruption attack is found automatically, which indicates the effectiveness of automated analysis of MANET route protocols using SPIN.

    New method for multi-label feature extraction
    ZHANG Jujie;FANG Min;GUO Jin
    Journal of Xidian University. 2016, 43(6):  62-67.  doi:10.3969/j.issn.1001-2400.2016.06.011
    Abstract ( 221 )   PDF (977KB) ( 151 )   Save
    References | Related Articles | Metrics

    Existing multi-label feature extraction methods are limited by not fully exploiting feature information. To tackle this problem, this paper proposes a new method for multi-label feature extraction. First, it maximizes the Hilbert-Schmidt independence criterion (HSIC) between labels and the features after reducing dimensionality to exploit label information, while it minimizes the information loss using principal component analysis (PCA). Experiments across Yahoo demonstrate the effectiveness and superiority of the proposed method to PCA and 3 state-of-art multi-label feature extraction methods.

    Supervisor synthesis in Petri nets based on basis marking graphs
    MA Ziyue;TONG Yin
    Journal of Xidian University. 2016, 43(6):  68-73.  doi:10.3969/j.issn.1001-2400.2016.06.012
    Abstract ( 274 )   PDF (550KB) ( 304 )   Save
    References | Related Articles | Metrics

    This paper proposes a method to design an online controller based on basis marking graphs for Petri nets. According to the initial marking and the controllability of transitions, a basis marking graph is first computed whose nodes are marked as legal or weakly illegal by solving integer programming problems. Based on the marked basis reachability graph, an online transition disabling rule is computed on-time to prevent the system from reaching illegal markings by firing uncontrollable transitions. This control strategy has a high efficiency since the full enumeration of the reachability graph is avoided.

    Automatically generating kinetostatic model for planar flexure-based compliant mechanisms
    LI Jiajie;LIU Xiaoyuan;CHEN Guimin
    Journal of Xidian University. 2016, 43(6):  74-79.  doi:10.3969/j.issn.1001-2400.2016.06.013
    Abstract ( 301 )   PDF (719KB) ( 169 )   Save
    References | Related Articles | Metrics

    Based on the concept of graph theory, a new two-colored digraph representation of planar flexure-based compliant mechanisms is presented, which is mapped to computers by the data structure of the orthogonal list. Then, the vertices and edges of the diagraph are traversed in the order of operations, to automatically generate kinetostatic models for planar flexure-based compliant mechanisms. The process of the automatically generating kinetostatic model for planar flexure-based compliant mechanisms based on graph theory is illustrated by applying it to the differential micro-displacement amplification mechanism. The results achieved by the automatically generating model and the finite element method are in good agreement, which validates the effectiveness of the proposed methods.

    Multicast scheduling algorithm with a dynamic weight for the input buffered Crossbar
    YANG Fan;XU Zhanqi;LI Danwu;ZHU Jianfeng;MA Tao;DING Zhe
    Journal of Xidian University. 2016, 43(6):  80-85.  doi:10.3969/j.issn.1001-2400.2016.06.014
    Abstract ( 196 )   PDF (562KB) ( 118 )   Save
    References | Related Articles | Metrics

    A multicast scheduling algorithm with a dynamic weight is proposed for the input buffered crossbar. The address of the multicast cell is copied and saved according to its destination ports to decrease the effect of head of line blocking. When a multicast cell is scheduled, its weight is computed in each iteration according to its fanout splitting dynamically to give more chances for the low fanout splitting cells to export. This scheme can decrease the fanout splitting of multicast cells. The input port congestion under a heavy multicast traffic load can be effectively avoided if multicast fannout splitting is decreased. To verify the performance of the proposed scheduling algorithm, a multicast traffic mode with few perfect matchings is proposed. Simulation results show that the new scheduling algorithm has a good throughput under this rigorous traffic mode and other traditional traffic modes.

    Implementation of UPML absorbing boundary conditions in DGTD method
    LI Linqian;WEI Bing;YANG Qian;GE Debiao
    Journal of Xidian University. 2016, 43(6):  86-90.  doi:10.3969/j.issn.1001-2400.2016.06.015
    Abstract ( 293 )   PDF (1109KB) ( 92 )   Save
    References | Related Articles | Metrics

    For the DGTD-UPML absorb boundary condition,the basic theory of UPML in the TM case is studied and implementationis presented. By lessons from the ideas of impedance matching, anisotropic parameters set and matched matrix in the FDTD method, based on the characteristics of the unstructured meshing and features of flux transfer among the elements, the formulas for wave propagation in the UPML are presented, and then the iterative formulas are derived. Compared with the generalreflectivity of -24dB in the first step SMABC due to the discretization of the unstructured grid in the DGTD, the double attenuation of 130dB demonstrates the good absorption of the 2D UPML layer for the electromagnetic wave.

    Experimental characterization of the human vision contrast threshold for the triangle pattern
    ZHANG Dongyang;ZHANG Jianqi
    Journal of Xidian University. 2016, 43(6):  91-96.  doi:10.3969/j.issn.1001-2400.2016.06.016
    Abstract ( 323 )   PDF (950KB) ( 106 )   Save
    References | Related Articles | Metrics

    The human vision contrast threshold characteristic is an important basis for the performance evaluation of the Electro-Optical (EO) imaging system. The Human vision contrast threshold characteristic for the triangle pattern is the premise for constructing the performance model based on the triangle orientation discrimination threshold. In this paper, a comprehensive test platform which integrates pattern generation, display control, measurement and analysis is constructed based on the 4AFC methodology used in the triangle orientation discrimination The discrimination probabilities of the triangle pattern with seven different spatial frequencies are measured at different background luminance levels. Futher, the Weibull function is fitted to the experiment data, and the curves of the human visual contrast threshold vs. the 75% correct discrimination probability are obtained. In the normal viewing luminance range, the results show that the contrast threshold increases with the increase of the target spatial frequency for the same background luminance, and the contrast threshold decreases with the increase of the background luminance for the same target spatial frequency.

    Low cost and high performance RO-PUF design for IP protection of FPGA implementations
    ZHANG Guodong;LIU Qiang;ZHANG Qijun
    Journal of Xidian University. 2016, 43(6):  97-102.  doi:10.3969/j.issn.1001-2400.2016.06.017
    Abstract ( 326 )   PDF (983KB) ( 254 )   Save
    References | Related Articles | Metrics

    As FPGAs have been adopted in many electronic system designs, intellectual property (IP) protection of FPGA implementations has become one of the major concerns in industry. The ring oscillator-based physical unclonable function (RO-PUF) has been investigated for IP authentication of FPGA implementations. However, integrating RO-PUF into FPGA implementations for practical applications still faces challenges: (1) it always introduces considerable hardware overheads; and (2) the limited set of challenge-response pairs (CRPs) due to limited circuit resources may not authenticate a large population of FPGA implementations with a small error. To address these issues, this paper first proposes an effective technique, logic fusion. It combines the RO logic of the PUF with the normal circuit logic, without increasing logic resource usage in FPGAs. Second, a post-processing procedure is exploited to expand the set of CRPs from the designed RO-PUF. Experimental results show that the reliability, randomness and uniqueness metrics of the designed RO-PUF are 99.97%, 50.37% and 49.83%, respectively. Compared with the existing RO-PUF design techniques, the area overhead can be reduced by 45% with the same performance.

    Pseudo-privileged information and SVM+
    SUN Guangling;DONG Yong;LIU Zhi
    Journal of Xidian University. 2016, 43(6):  103-108.  doi:10.3969/j.issn.1001-2400.2016.06.018
    Abstract ( 262 )   PDF (578KB) ( 81 )   Save
    References | Related Articles | Metrics

    In machine learning, learning using privileged information(LUPI) tries to improve the generalization of the classifier by leveraging information only available during learning. In the scenario of privileged information(PI) possessed by partial training samples, pseudo-privileged information(PPI) and SVM+are investigated. The proposed models depend on two formulations. One is to construct PPI for the samples without PI alone. The formulation enables slacks of such samples predicted in the correcting space with an ultimate goal of improving the generalization of the classifier. Available information and random features are proved to be effective options for PPI. The other is to replace the genuine PI with PPI so as to predict the slacks of all training samples in the unique correcting space. It is confirmed that at least for certain genuine PI and two categories classification task, the latter one is capable of obtaining better generalization performance. Experiments are performed on written digits and facial expression recognition. The results have validated advantages of SVM+using PPI.

    Speech enhancement using the improved K-SVD algorithm by subspace
    GUO Xin;JIA Hairong;WANG Dong
    Journal of Xidian University. 2016, 43(6):  109-115.  doi:10.3969/j.issn.1001-2400.2016.06.019
    Abstract ( 320 )   PDF (903KB) ( 136 )   Save
    References | Related Articles | Metrics

    In the case of a low SNR, it is difficult that the clean speech is separated completely by sparse representation from the noisy speech. To solve the above problem, a speech enhancement method using the improved K-SVD algorithm by subspace is proposed. First, the noise is tracked by the optimal estimator of the subspace, and a noise dictionary is trained by using the K-SVD. Then, the speech dictionary is trained by the K-SVD algorithm. In the process of training, if an atom whose sparse coefficient is lower than the set threshold and could also be found in the noise dictionary, the sparse coefficient is set to zero, which achieves the goal of de-noising. Simulation results show that the algorithm can remove white noise and babble noise obviously, so that the SNR is improved and distortion is reduced greatly. Simultaneously, this improved algorithm can also be applied to eliminate the random noise very well. And the improved algorithm verified by SPSS19.0 software is superior to the K-SVD algorithm and subspace algorithm under a low SNR.

    Hyperspectral unmixing method based on the non-convex sparse and low-rank constraints
    KONG Fanqiang;BIAN Chending;LI Yunsong;GUO Wenjun
    Journal of Xidian University. 2016, 43(6):  116-121.  doi:10.3969/j.issn.1001-2400.2016.06.020
    Abstract ( 299 )   PDF (1919KB) ( 139 )   Save
    References | Related Articles | Metrics

    Aiming at the row sparse feature of the abundance matrix of hyperspectral mixed pixels, a hyperspectral unmixing method based on the non-convex sparse and low-rank constraints is presented. The non-convex sparse representation and non-convex low-rank models are first constructed, which take the non-convex p-norm of the abundance matrix as the sparse constraint and the non-convex p-norm of the singular values of the abundance matrix as the low-rank constraint. Then the low-rank prior and the sparse prior are jointly utilized to construct a non-convex minimization model. An augmented lagrange alternating minimization method is proposed to solve the unmixing model, the compound regularization problem is decomposed into multiple single regularization problems solved by the variable separation method. Experimental results demonstrate that the proposed method outperforms the greedy algorithm and the convex algorithms with a better spectral unmixing accuracy, and is suitable for high signal-to-noise ratio hyperspectral data.

    Fast RPEM algorithm in satellite communication
    LI Liangshan;YANG Yuhong;WANG Lan
    Journal of Xidian University. 2016, 43(6):  122-128.  doi:10.3969/j.issn.1001-2400.2016.06.021
    Abstract ( 385 )   PDF (578KB) ( 156 )   Save
    References | Related Articles | Metrics

    The memory polynomial pre-distortion is an effective technique to compensate the nonlinearity for the satellite channel. However, its adaptive algorithm has the defect of the slow convergence speed. To counteract this problem, a fast shrinkage Recursive Prediction Error Method (SH-RPEM) algorithm is devised for the memory polynomial pre-distortion over the nonlinear satellite channel. By using a known Shrinkage method and L<sub>1</sub>-L<sub>2</sub> minimization formulation, the relationship between the noise-free posteriori and priori error signal is obtained. Furthermore, an optimal forgetting factor which can significantly enhance the convergence speed is proposed by minimizing the mean square of the noise-free posteriori error signal. Simulation results show that the SH-RPEM algorithm can effectively suppress constellation wrapping and spectrum regrowth of the signal and solve the nonlinear distortion. Moreover, the SH-RPEM algorithm can achieve a faster convergence speed and better stability without increasing the computational complexity.

    Novel design method for the ultra-wideband digital phase shifter
    ZHANG Honggang;LIU Luokun;JIAN Chunxiao;ZHANG Xianfeng;ZHENG Xiaoyu
    Journal of Xidian University. 2016, 43(6):  129-134.  doi:10.3969/j.issn.1001-2400.2016.06.022
    Abstract ( 366 )   PDF (3191KB) ( 195 )   Save
    References | Related Articles | Metrics

    Based on the vector sum theory, using the hybrid microwave integrated circuits (HMIC) technology, a novel method of designing Ultra-wideband digital phase shifter is proposed. By adjusting the magnitude of two orthogonal signals to obtain different amplitude and phase vectors in the first quadrant, this method adopts the structure of three-level cascade to realize a 360° phase shift of the input signal. Using this method, a UHF band ultra-wideband six bit digital phase shifter is designed and fabricated. In the working frequency band of the 57% relative bandwidth, the phase shifter has the RMS phase error of less than 3.8°, and amplitude imbalance of less than 3.0dB. When applied in the phased arrays antenna, which has a wide working band and narrow instantaneous signal bandwidth, the amplitude imbalance is decreased to less than 2.5dB and the RMS phase error is reduced to less than 3.0°, by dividing the frequency band for piecewise correction. It meets the need of a certain type of phased array antenna.

    Coupling influences of the radar electromagnetic field on the complex transmission line in an aperture cavity
    FANG Xiaoxing;ZHU Zhiyu;ZHANG Mingxin;LI Yang
    Journal of Xidian University. 2016, 43(6):  135-140.  doi:10.3969/j.issn.1001-2400.2016.06.023
    Abstract ( 207 )   PDF (543KB) ( 81 )   Save
    References | Related Articles | Metrics

    Aimed at coupling calculation for radar waves and aperture cavity complex TL, a calculation method is proposed based on the MoM, the dyadic Green's function (GF) and mixing of the Π model and Agrawal model. First, the incident electromagnetic field at the aperture of the radar antenna can be obtained by the MoM. Then the MoM-GF hybrid algorithm is used to obtain the equivalent magnetic current in the aperture and the electromagnetic field inside the cavity. Finally, the TL load current response can be calculated with the result of electromagnetic fields and the hybrid TL model of the equivalent Π circuit and Agrawal. Throuth TL simulation results by the BLT equation this method can be validated effectively.

    Approach to reassembling virtual small bronze fragments using the curvature feature
    LIN Suzhen;WANG Dongjuan;ZHONG Jiarang;ZHU Xiaohong;ZHANG Shangmin
    Journal of Xidian University. 2016, 43(6):  141-146.  doi:10.3969/j.issn.1001-2400.2016.06.024
    Abstract ( 298 )   PDF (1855KB) ( 164 )   Save
    References | Related Articles | Metrics

    For the time-consuming problem of manual stitching small bronze fragments,an approach for virtual small bronze fragments reassembly based on curvature feature is proposed. First, we extract and smooth the 2d contour of the small bronze fragment, and then compute the curvature of each point on the contour and regard the local maxima of the curvature as the candidate corners. After that, the round corners and false corners are eliminated according to the support region. And then the chord lengths between the adjacent corners are calculated as the feature sequences to find the match. Finally, the reassembled result is obtained and refined by applying the invariance of the vector module. Experimental result proves that the method can effectively improve the efficiency of stitching and the effect of matching.

    PEEC-MoM hybrid method for electromagnetic compatibility analysis of the cable-enclosure system
    YANG Furong;LI Peng;XU Wanye;WEI Maogang;LI Xun
    Journal of Xidian University. 2016, 43(6):  147-151+157.  doi:10.3969/j.issn.1001-2400.2016.06.025
    Abstract ( 286 )   PDF (2069KB) ( 174 )   Save
    References | Related Articles | Metrics

    For the EMC problem of a cable(with connector)-enclosure(with PCB) system, a hybrid numerical analysis method for the partial element equivalent circuit (PEEC) and the method of moment (MoM) is proposed. The PEEC is used to model the cable-connector-PCB, and the electromagnetic properties could be calculated by the circuit method. Based on energy conservation, the cable-connector is replaced by an equivalent dipole which has similar electromagnetic radiation properties. The equivalent dipole is added to the model of the enclosure which is analyzed by the MoM. Then the shielding effectiveness of the enclosure and the signal integrity of the PCB in the enclosure can be obtained. An experiment is designed to verify the proposed hybrid method. The test results and simulated results are in good agreement. This hybrid method could be used to calculate not only the signal integrity of the cable and PCB, but also the shielding effectiveness of the cable-enclosure system.

    Mechanism for fault location based on the credibility model of all optical networks
    LIU Yingting;ZHU Ruijie;DU Xiaoming;ZHAO Yongli
    Journal of Xidian University. 2016, 43(6):  152-157.  doi:10.3969/j.issn.1001-2400.2016.06.026
    Abstract ( 211 )   PDF (533KB) ( 155 )   Save
    References | Related Articles | Metrics

    Optical networks, driven by the rapid development of the broad band business, tend to be of large capacity and high rate. However, the complexity of optical networks topologies and the business deployment, together with the feature of NP-completeness make multi-link faults location difficult in a transparent optical network. How to diagnose the accurate faults number and location without doubt is becoming an intractable problem. We have studied the uncertain relationship between alarms and fault in all optical networks. A multi-link fault location model in an entire transparent optical network is established. Then we advance two heuristic fault location algorithms based on the credibility mode above, which could measure the credibility of multi-link faults location reasoning process according to alarms quantificational. Finally, we build up a simulation system to simulate the network model and fault propagation model in entire optical networks and obtain the fault location module to verify the correctness of multi-link faults location model based on credibility and the performance faults location of two algorithms. Simulation results show that the model solves the uncertainty of the fault location effectively, and two algorithms display the good performance on the accuracy of fault location.

    Novel mixed-criticality reliability scheduling strategy and schedulability test
    JING Weipeng;HUO Shuaiqi;CHEN Guangsheng;LIU Yaqiu
    Journal of Xidian University. 2016, 43(6):  158-163.  doi:10.3969/j.issn.1001-2400.2016.06.027
    Abstract ( 318 )   PDF (515KB) ( 137 )   Save
    References | Related Articles | Metrics

    In order to solve the reliable scientific workflow scheduling problem for the Mixed-Criticality task in cloud computing, we proposed the Mixed-Criticality reliability scheduling strategy (MCRSS) based on Primary/Backup. First, the priority of the primary Mixed-Criticality task is determined and the task is scheduled for the virtual processor with the deadline being the shortest, the backup is the virtual processor with the cost of copy being the lowest. Second, the schedulability test of the primary and backup task are proposed. If the task does not satisfy the schedulability test, then the task will change to high criticality. Experimental results show that the MCRSS algorithm is of high reliability and load balancing capabilities.

    Detection method for the burst signal in a low SNR
    CHEN Dan;LIU Mingqian;ZHANG Yang;HU Ye
    Journal of Xidian University. 2016, 43(6):  164-169.  doi:10.3969/j.issn.1001-2400.2016.06.028
    Abstract ( 444 )   PDF (593KB) ( 179 )   Save
    References | Related Articles | Metrics

    A detection method for the burst signal based on the cepstrum of the power spectrum is proposed to solve the problem of the poor burst signal detection performance in the low SNR environment. First, the maximum value of the spectrum is used as the test statistic and is smoothed by the smooth window. Then, the K-mean clustering algorithm is used to classify the decision to distinguish the signal and the noise. Finally, the detection of the burst signal is completed by the three-state transition based on the length. Simulation results show that the proposed method has a better detection performance and lower computational complexity in low SNR environments.

    1.5bit substage circuit for charge domain pipelined ADCs
    HUANG Songren;CHEN Zhenhai;ZHANG Hong;LI Xue;QIAN Hongwen;YU Zongguang
    Journal of Xidian University. 2016, 43(6):  170-175.  doi:10.3969/j.issn.1001-2400.2016.06.029
    Abstract ( 329 )   PDF (1519KB) ( 105 )   Save
    References | Related Articles | Metrics

    A 1.5bit sub-stage circuit based on bucket-brigade devices (BBD) for high speed charge domain pipelined ADCs is presented to solve the problem that the performances of high-speed, high-resolution ADCs rely on the opamps with large gain-bandwidth production, which results in large power consumption. Charge transfer and residue charge calculation are realized with a boosted charge transfer (BCT) circuit in the proposed 1.5bit sub-stage, and therefore, the high-performance opamps in traditional pipelined ADCs are eliminated and the power consumption can be reduced remarkably. Based on the proposed 1.5bit sub-stage circuit, a 10bit 250MS/s charge domain pipelined ADC is designed in 0.18μm CMOS technology. Measurement results under a sampling frequency of 250MHz and an input sinusoidal frequency of 9.9MHz show that the ADC achieves a spurious free dynamic range (SFDR) of 64.4dB and a signal-to-noise-and-distortion ration(SNDR) of 56.9dB, with power consumption of only 45mW.

    Multi-target tracking with the cubature Kalman multi-bernoulli filter
    WANG Haihuan;WANG Jun
    Journal of Xidian University. 2016, 43(6):  176-182.  doi:10.3969/j.issn.1001-2400.2016.06.030
    Abstract ( 371 )   PDF (771KB) ( 331 )   Save
    References | Related Articles | Metrics

    The particle cardinality-balanced multi-target multi-bernoulli(P-CBMeMBer) filter needs large numbers of particles and has serious particles degradation. To solve this problem, we combine the square-rooted cubature Kalman filter(SCKF) with the P-CBMeMBer filter, called square-rooted cubature Kalman P-CBMeMBer(SCP-CBMeMBer) filter. The SCP-CBMeMBer filter obtains the predicted particles by sampling the importance density function generated by the SCKF in order to alleviate particles degradation. Compared to the P-CBMeMBer filter based on the unscented Kalman filter(UP-CBMeMBer), the proposed method is more stable and its performance is unrestricted by the dimension of the target states. The results show that the proposed method has a higher accuracy than the P-CBMeMBer filter and the UP-CBMeMBer filter.