Please wait a minute...

Current Issue

    25 July 2006, Volume 27 Issue 7
    Academic paper
    Adaptive mixed norm filtering algorithm based on SαSG noise model
    Dai-feng ZHA,Xiao-ying GAO
    2006, 27(7):  1-6.  doi:1000-436X(2006)07-0001-06
    Asbtract ( 0 )   HTML ( 1)   PDF (1162KB) ( 192 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Alpha-stable distribution,a generalization of Gaussian,was better for modeling impulsive noises than Gaussian distribution in signal processing.This class of process had no close form of probability density function and finite second order moment.A new adaptive mixed moments filtering algorithm based on SαSG noise model was proposed.The simulation experiments show that the proposed new algorithm is more robust than the conventional algorithm.

    New family of multilength multi-wavelength reed-solomon code of OCDMA system
    Xiu-li ZHOU,Jun-xian MA,Yu HU
    2006, 27(7):  7-11.  doi:1000-436X(2006)07-0007-05
    Asbtract ( 0 )   HTML ( 1)   PDF (712KB) ( 123 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new class of multilength,constant-weight two-dimensional multi-wavelength reed-solomon (2D MW RS) code with large capacity and good correlation properties was constructed.The performance of these new MW RS codes with two kinds of lengths in an OCDMA network was analyzed.The result shows that media with the shorter code words performs much better than the media with longer codeword,and OCDMA system with these new multilength MW RS codes performs well.These features allow large capacity multimedia transmission with different bit-rate and quality-of-service requirements accommodated simultaneously in OCDMA network system.

    Divisible e-cash based on signatures of zero-knowledge proof and strong-RSA problem
    Bing PENG,Fan HONG,Guo-hua CUI
    2006, 27(7):  12-19.  doi:1000-436X(2006)07-0012-08
    Asbtract ( 0 )   HTML ( 1)   PDF (2049KB) ( 628 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    There exist some drawbacks such as quite deep binary tree and the linkability within various nodes from the same ancestor in the divisible electronic cash (e-cash) scheme based on quadratic residuosity problem.Based on signatures of zero-knowledge proof and strong RSA problem,the concept of group signature was firstly introduced to off-line divisible e-cash thereafter,a new off-line divisible e-cash payment system was presented.In the new system,the ancestor node could be divided into more than 2 nodes,and above all,different nodes stem from the same e-cash was unlikable.

    Adaptive traffic distributing based on dynamic topology for multipath routing in MANET
    Hui-yao AN,Xi-cheng LU,Wei PENG,YU-hang PENG
    2006, 27(7):  20-26.  doi:1000-436X(2006)07-0020-07
    Asbtract ( 0 )   HTML ( 1)   PDF (804KB) ( 432 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to circumvent these problems that led to impose both communications overhead on the network and processing overhead on node in most MANET multipath routing schemes proposed so far when the same size load was distributed into the various paths regardless of the qualities,a scheme called adaptive dynamic traffic distributing multipath routing(ADTDMRP)was proposed,which distributed by proportioning flows among multiple paths dynamically based on the weight value of each path.It made routing decisions using only “local” information at the most of time and thus reducing the network overhead.By implementing the algorithm on the OPNET modeler,the results demonstrate that adaptive dynamic traffic distributing multipath routing is indeed a viable alternative to MANET routing approach.

    Stochastic bridge approach for generating correlated time series and its applications
    Luo-quan HU,Hong-bo ZHU
    2006, 27(7):  27-34.  doi:1000-436X(2006)07-0027-08
    Asbtract ( 67 )   HTML ( 2)   PDF (717KB) ( 567 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the propagation properties of electromagnetic wave in wireless channels,correlated time series generated by stochastic bridge processes were proposed.The basic random variables with special probability density functions constructed from these time series were produced,which could be used to model wireless propagation channels.The statistical characteristics of basic random variables constructed from free Brownian bridge process and bounded Brownian bridge process,and from free Langevin bridge process and bounded Langevin bridge process were investigated in detail from the numerical simulation,respectively.There were apparently locally favorable peaks in probability density function of basic random variables with lower reflections.Finally,the applications of basic random variables in modeling wireless channels were discussed.

    Influence of tracking and pointing error on the performance of inter-satellite optical CDMA communication system
    Qing-gui TAN,Yu HU,Yue-ying ZHAO
    2006, 27(7):  35-38.  doi:1000-436X(2006)07-0035-04
    Asbtract ( 44 )   HTML ( 1)   PDF (666KB) ( 54 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to study the performance of inter-satellite optical CDMA communication system,the influence of tracking and pointing error on the BER of this communication system was analyzed.With considering the effects of multi-user interference,tracking,pointing error,and APD noise,the system model of inter-satellite optical CDMA communication system was presented.The relationship between BER and receiving optical power was analyzed in detail.The results show that the inter-satellite optical CDMA communication system can realize high-speed communication when the normal variance σ of tracking and pointing error is small.When σ is large,a new detection scheme and channel coding should be used to improve communication performance.

    Analysis of correspondence property for security protocols
    Ming YANG,Jun-zhou LUO
    2006, 27(7):  39-45.  doi:1000-436X(2006)07-0039-07
    Asbtract ( 46 )   HTML ( 1)   PDF (718KB) ( 311 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cryptographic protocol was specified as the procedure of challenge and response using cryptography,not only to confirm the existence of other principals but also to negotiate about some data such as session keys.Applying the idea and some authentication logic results,a new efficient method that provided SSM semantics-based definition of authentication goal was proposed,which summed up correspondence analysis as the analysis of the existence relationship of strands and the consistence of strand parameters.

    Research on TCP performance improvement in wireless ad hoc networks based on topology control
    Ying-ji ZHONG,Dong-feng YUAN
    2006, 27(7):  46-52.  doi:1000-436X(2006)07-0046-07
    Asbtract ( 26 )   HTML ( 1)   PDF (746KB) ( 139 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Space restrain mechanism was adopted in the plain of network nodes due to the lower performance of TCP in Wireless ad hoc networks.The total interference of the networks is decreased by considering location information and increasing the plain to lower the co-interference between the nodes.The broadcast success ratio,computed the lower bound of the space location for the network nodes and discussed the efficiency of the network under single-TCP and multi-TCP environments separately was analyzed.The simulation results show that the novel method can improve the throughput of the networks significantly.

    Fast algorithm and architecture for embedded block coding
    Cheng-yi XIONG,Jian-hua HOU,Jin-wen TIAN,Jian LIU
    2006, 27(7):  53-60.  doi:1000-436X(2006)07-0053-08
    Asbtract ( 46 )   HTML ( 1)   PDF (733KB) ( 304 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the problem of inefficiency of implementing embedded block coding in JPEG 2000,a novel fast algorithm to achieve word-level sequential and parallel bit plane coding (BPC) was proposed.The proposed BPC algorithm adopted a technique of performing the coding pass prediction and context formation as parallel and pipelined fashion.By using this BPC algorithm,the coefficients bit modeling for all bit planes in a code block were completed as parallel and sequential mode by one scan.Based on this new coding algorithm,an efficient high-speed architecture (HSA) was presented,which could perform context formation for 4 coefficients belonging to the same stripe column at one intra- clock cycle,and achieve context formation for an N×N code-block in approximate N2/4 intra- clock cycles.Theoretical analysis and experimental results demonstrate that,the proposed HSA could significantly increase throughput rate with good performance in terms of speedup to cost,compared with the up-to-date design.

    Joint source-channel iterative decoding based on hidden markov model
    Wei-wei YIN,Le-nan WU
    2006, 27(7):  61-65.  doi:1000-436X(2006)07-0061-05
    Asbtract ( 67 )   HTML ( 2)   PDF (599KB) ( 68 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A joint source-channel decoding algorithm using source parameters which were estimated by the soft output of Turbo code with Baum-Welch reestimated algorithm was proposed.The source parameters were obtained by the soft output of decoding the received noisy information sequence.The joint source-channel iterative decoding was implemented by combining the channel decoding and the source decoding with accurate probability structure of source model estimated by iteration.Discrimination information was suggested to measure the precision of the estimated source parameters and was used to determine the stop of the estimation iteration.

    Technical Report
    Wiener LMS channel estimation and tracking algorithm for OFDM systems with transmitter diversity
    Bin-feng BAI,Yue-ming CAI,Xin XU
    2006, 27(7):  66-72.  doi:1000-436X(2006)07-0066-07
    Asbtract ( 24 )   HTML ( 1)   PDF (1191KB) ( 120 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A Wiener LMS channel estimating and tracking algorithm for OFDM systems with transmitter diversity was proposed.The algorithm used Wiener prediction technology to improve the ability of tracking channel.The simulation results show that the algorithm achieve reliable channel estimation.The performance is improved greatly compared with conventional algorithm LMS algorithm and simplified algorithm proposed by LIYe and this improvement is obvious under fast varying channel.

    Modeling and analysis for an enhanced three-tier dynamic location management in 3G
    Hao ZHANG,Jian-xin LIAO,Xiao-min ZHU,Chun WANG
    2006, 27(7):  73-79.  doi:1000-436X(2006)07-0073-07
    Asbtract ( 27 )   HTML ( 0)   PDF (936KB) ( 46 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on 3G cellular networks where the home location registers,gateway location registers and visitor location registers formed a three-tier hierarchical mobility database structure,an enhanced movement-based location management scheme was presented.Furthermore,the cost model of location update and paging for the proposed scheme was formulated analytically and the proposed scheme was compared with the basic movement-based location management scheme and static location management scheme in 3G.The outcomes show that the enhanced movement-based location management scheme outperforms the other two schemes.

    Chaos-based scramble self-embedding watermarking algorithm
    Hong-jie HE,Jia-shu ZHANG
    2006, 27(7):  80-86.  doi:1000-436X(2006)07-0080-07
    Asbtract ( 66 )   HTML ( 3)   PDF (980KB) ( 308 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A chaos-based scramble self-embedding watermarking algorithm was proposed to locate tamper block on the watermarked images and improve security of the existing self-embedding fragile watermarking algorithms that could not effectively locate tamper block.In proposed algorithm,the binary watermark image was generated from the watermark blocks putted together according to their positions,and the improved security binary watermark scrambled by chaotic systems was embedded into the LSB of the image data.While image authentication,the block of tampered content could be effectively localized according to the predefined threshold.Theoretic analysis and simulation results show that the proposed algorithms may not only improve security,but it also effectively locates tamper blocks whether watermark is altered or not.

    Image registration method based on mutual information about distance field of image edges
    Jian-wei ZHANG,uo-qiang HANG,Yan WO
    2006, 27(7):  87-93.  doi:1000-436X(2006)07-0087-07
    Asbtract ( 35 )   HTML ( 1)   PDF (823KB) ( 204 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Image registration method based on mean Hausdorff distrance was simple,fast and available in application to image registration.At the same time,due to un-identical edges extracted from images,incorrect or inaccurate registration was often obtained.A new image registration method based on mutual information about distance field of image edges was presented.The distance field of the reference image edges and the binary edge image of floating image were regarded as two discrete probability distributions,and the mutual information between them was adopted as similarity function to register images.Results of experiments show that the new method is excellent to both identical and un-identical image edges.

    Effective MAC scheme for improving usable throughput in WLAN
    Hui FENG,Ting WANG,Bo HU
    2006, 27(7):  94-99.  doi:1000-436X(2006)07-0094-06
    Asbtract ( 50 )   HTML ( 2)   PDF (617KB) ( 298 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In DCF mode of 802.11 infrastructure BSS,the usable throughput was compromiseel by two main factors.One was the channel utilization ratio decreases when the number of competing stations increases.The other one was the severe asymmetry between downlink and uplink data because AP possesses no advantage position when accessing the share channel.Both problems were solved by a new MAC scheme which adjusts the minimum contention window of AP and station to optimized values derived from a mathematical model under downlink/uplink bandwidth control.Meanwhile,a new estimation method for station number is proposed via dynamic MAC addresses statistic at AP side.

    Performance of admission control for multi-traffic in wireless communication network base on discrete time queue
    Ming-xing LIU,Zhan-you MA,Nai-shuo TIAN
    2006, 27(7):  100-105.  doi:1000-436X(2006)07-0100-06
    Asbtract ( 37 )   HTML ( 2)   PDF (812KB) ( 60 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An admission control scheme with priority for real-time traffic was designed,and a discrete time queue model Geo1 + ¯ 2/Geo1Geo2/s,s(PP) was proposed to investigate the performance of the multi-traffic admission control scheme,which based on the wireless communication running mechanism and the variable QoS(quality of service) requirement of multi-traffic.The queue was analysised by using method of matrix-geometric solution,and the exact performance measure were obtained such as average queue length of both traffic,blocking probability of real-time traffic.

    Iterative channel estimation and decoding algorithm for quasi-coherent demodulation of Turbo coded GMSK signals
    Tuan-feng WU,Xi-gen YANG
    2006, 27(7):  106-111.  doi:1000-436X(2006)07-0106-06
    Asbtract ( 45 )   HTML ( 1)   PDF (707KB) ( 682 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new simple iterative channel estimation algorithm for quasi-coherent demodulation Turbo coded GMSK signals was presented.Based on the iterative decoding principle of Turbo code,the algorithm improved the channel estimation accuracy using output of decoder.Numerous simulation results show that the proposed algorithm can improve bit error rate (BER) performance dramatically.

    Realization of Raman amplifier with reverse multi - wavelength pumping
    Hui WANG,Dun-kai WEI,Jun SHEN,Feng-xian JIANG
    2006, 27(7):  112-116.  doi:1000-436X(2006)07-0112-05
    Asbtract ( 22 )   HTML ( 1)   PDF (724KB) ( 572 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A fiber Raman amplifier with bandwidth of 90 nm using eight pump lasers was presented.Based on the theoretic model,a gain of (11.5±1) dB was obtained with the 25 km SMF manufactured by Corning Corp as gain media.The experimentally measured spectra of signal gain coefficient and inter-pump gain coefficient for different pump parameters are in good agreement with the results of improved theoretic model.

    Efficient inter mode selection algorithm for H.264
    Lu LU,Wei ZHOU
    2006, 27(7):  117-121.  doi:1000-436X(2006)07-0117-05
    Asbtract ( 36 )   HTML ( 1)   PDF (513KB) ( 354 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Motion estimation was introduced by H.264 video coding standard with multiple block sizes to achieve a considerably higher coding efficiency than other video coding algorithms.However,this comes at the greatly increased computing complexity at the encoder.A method was proposed to eliminate some redundant coding modes that contribute very little coding gain based on analysis of macroblock detail-level and texture directions.The simulation results show that the algorithm can remarkably decrease the complexity at the encoder while keeping satisfying coding efficiency.

    Novel UWB communication pulse design method
    Zhi-yuan LIN,Ping WEI
    2006, 27(7):  122-126.  doi:1000-436X(2006)07-0122-05
    Asbtract ( 50 )   HTML ( 8)   PDF (540KB) ( 214 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the restriction of federal communications commission (FCC) emission mask,the methods of designing impulse pulse waveforms for ultra wideband (UWB) communications was investigated.The second derivative Gaussian pulse with the diverse shaping factors and the diverse spectral moving factors acted as basis functions.The iterative combination pulse method and the linear minimum mean square error (LMMSE) combination pulse method were presented.The comparison were presented for the bit error rate (BER) performance analyses of the pulse position modulation time hopping ultra wideband (PPM TH UWB) impulse radio (IR) communication system employing the iterative combination pulse or the second derivative Gaussian pulse in the additive white Gaussian noise (AWGN) channel,multiple user interference (MUI) and multiple path channel.Several numerical experiments demonstrate the efficiency of this method.

    Capacity analysis of three-node wireless Gaussian relay channel
    Yuan ZHANG,Xi-qi GAO
    2006, 27(7):  127-135.  doi:1000-436X(2006)07-0127-08
    Asbtract ( 43 )   HTML ( 4)   PDF (1264KB) ( 548 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The capacity of three-node wireless relay channel was analyzed.While previous research work showed how parameters like relay numbers,antenna numbers and fading affected the capacity,focused on the impact of relay position.By analysis results,there were three modes that the capacity will follow:with relay moving from source toward destination,the capacity can decrease (mode C1),or increase (mode C3),or decrease after increasing (mode C2).A numerical example was given to verify the theory.

    Academic communication
    Improvement on the construction of nonbinary t-sEC/AUED codes
    Peng-cheng ZHANG,Fang-wei FU
    2006, 27(7):  135-140.  doi:1000-436X(2006)07-0135-06
    Asbtract ( 24 )   HTML ( 1)   PDF (979KB) ( 117 )   Knowledge map   
    References | Related Articles | Metrics

    A general construction for nonbinary t-sEC/AUED codes of length n with the magnitude error criterion was presented by Fu et al.When n?1 is a prime power,a improvement on the construction was given and it was shown that the lower bound from the new construction was better than the bounds given by Fu et al.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: