Please wait a minute...

Current Issue

    25 October 2006, Volume 27 Issue 10
    Performance analysis of weighted non-coherent receiver for UWB-PPM signal in multipath channels
    Jian-jun WU,Qing-lin LIANG,Hai-ge XIANG
    2006, 27(10):  1-6.  doi:1000-436X(2006)10-0001-06
    Asbtract ( 0 )   HTML ( 2)   PDF (1116KB) ( 36 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The BER performance expressions and weighting coefficients of the weighted non-coherent receiver for the UWB-PPM signal were analytically derived.Subsequently,the analytical results were validated via Monte-Carlo simula-tion,and the impacts of the sub-interval width and the timing error were also numerical analyzed.It is illustrated that the weighted receiver is at least 3dB superior to the conventional non-coherent receiver,and is robust to the variations of sub-integration width and the timing error.

    Research on range matching for wire-speed hardware NIDS
    Shu-hui CHEN,Zhi-gang SUN,Jin-shu SU
    2006, 27(10):  7-12.  doi:1000-436X(2006)10-0007-06
    Asbtract ( 0 )   HTML ( 2)   PDF (658KB) ( 348 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the rule matching problem of hardware NIDS,a range matching algorithm LRC-RM was proposed,with more efficient memory utilization.The approach mapped the port range into a compressed bit vector and organized the bit vectors as an extended balanced binary tree.Experiments were employed to show that NIDS using this approach can perform wire-speed range matching for OC-192 links,while saving 99% memory resource comparing to the existing methods.The algorithm is easy to be implemented within a chip without additional RAM.

    New key management scheme of wireless sensor networks based on key relation table
    Hai-ping HUANG,Ru-chuan WANG,Li-juan SUN,Zhi CHEN
    2006, 27(10):  13-18.  doi:1000-436X(2006)10-0013-06
    Asbtract ( 0 )   HTML ( 2)   PDF (552KB) ( 42 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aimed at some security properties on key management for multicast such as forward confidentiality,backward confidentiality,resisting conspiracy-analysis,expansibility and robustness,and furthermore the obvious character of en-ergy-constraint,a new key management scheme based on threshold mechanism & key relation table was proposed,which mapped keys' value onto the three-dimensional curves and surfaces.Although computing complexity increases within a little scale,the performance optimization of memory complexity as well as communication complexity were proposed.

    Research of perfect punctured binary sequence pair in LCZ/ZCZ
    Lei XU,Ting JIANG,Zheng ZHOU
    2006, 27(10):  19-24.  doi:1000-436X(2006)10-0019-06
    Asbtract ( 0 )   HTML ( 2)   PDF (1597KB) ( 100 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Perfect punctured binary sequence pair was used in LCZ/ZCZ.The theory of LCZ/ZCZ sequence pair sets was defined,and three new methods for constructing LCZ/ZCZ sequence pair sets were presented:ZCZ sequence pair sets based on odd length perfect punctured binary sequence pairs and Hadamard matrices; LCZ sequence pair sets based on even length perfect punctured binary sequence pairs and modified Hadamard matrices; and ZCZ sequence pair sets based on perfect punctured binary sequence pairs and orthogonal matrices.With the proposed methods,LCZ/ZCZ sequence pair sets have wider range of low/zero correlation zone and larger capacity of LCZ/ZCZ sequence sets,which can satisfy re-quirements of projects application better.

    Research on the generalized utility max-min fair algorithm based on piecewise linear function
    Tong XU,Jian-xin LIAO
    2006, 27(10):  25-30.  doi:1000-436X(2006)10-0025-06
    Asbtract ( 186 )   HTML ( 7)   PDF (1352KB) ( 519 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A generalized utility max-min (UMM) fair algorithm of resource allocation based on piecewise linear function was provided,which supported the upper/lower bounds of resource allocation as well as strictly increasing and continu-ous utility functions.Because of the avoidance of iterative procedure,this algorithm was less complex than water-filling,another UMM fair algorithm.And its simplified version had the same complexity as the narrow-sense UMM fair algo-rithm based on piecewise linear function.This algorithm can be applied in various problems of resource allocation in the field of computer and communication.

    Multi-channel based on power control protocol for mobile ad hoc networks
    Dong-sheng LI,Yong XIANG,HIMei-lin S
    2006, 27(10):  31-37.  doi:1000-436X(2006)10-0031-07
    Asbtract ( 64 )   HTML ( 2)   PDF (504KB) ( 82 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To solve the collision problem brought by power control in mobile ad-hoc network (MANET),multi-channel MAC protocol and on-demand minimum energy routing protocol were employed,to carry out a multi-channel based power control ad hoc network,MCBPC.This architecture controlled the frequent changes of topology,decreased the probability of contact brought by power control,and achieved the goal of energy conservation.Simulation results indicate that compared with AODV@IEEE 802.11 approaches,the proposed MCBPC solution achieves about 90% increase in the throughput and network lifetime,and 30% increase in the packet delivery ratio.

    Optimal algorithm based on weight balancing for designing the logical topology of the optical network
    Ming-lei FU,Zi-chun LE,Min LU
    2006, 27(10):  38-43.  doi:1000-436X(2006)10-0038-06
    Asbtract ( 204 )   HTML ( 8)   PDF (596KB) ( 235 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The design of an optimal logical topology in optical networks was reported.The traffic load matrix and the delay matrix were considered together and then two novel network weights were defined.Therefore,both the congestion and average delay were optimized simultaneously.Moreover,an optimal algorithm which based on the two kinds of weight definition was proposed.In the simulation part,the NSFNET was chosen as the network model and the heuristic algorithm was compared with two other kinds of designing algorithms.Finally,the effect on network performances,which was caused by four performance parameters including the congestion,blocking probability,delay and load balanc-ing states,was discussed in numerical results part.

    Multifractal modeling of MPEG-4 video traffic
    Sheng-hui WANG,Zheng-ding QIU
    2006, 27(10):  44-50.  doi:1000-436X(2006)10-0044-07
    Asbtract ( 53 )   HTML ( 2)   PDF (1122KB) ( 79 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The correlation function and marginal distribution of multipliers at each layer were investigated in multifractal multiplicative process.Based on the lemmas gained ,a new multifractal MPEG-4 video traffic model (PMFM,predict-able MFM)was proposed.By modeling the coarsest coefficients with the auto-regressive (AR) process,PMFM has the ability of traffic prediction that traditional MFM do not have.Furthermore,the model stability and robustness were also improved by changing the way of parameter estimation.

    Dynamics of traffic flow in lattice model
    Wei-ping GUO,Xiao-fan WANG,Xiang LI
    2006, 27(10):  51-56.  doi:1000-436X(2006)10-0051-06
    Asbtract ( 22 )   HTML ( 3)   PDF (542KB) ( 209 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the lattice network model,three factors affecting the efficiency of network traffic were investigated:routing algorithm,router performance and user's strategy,and three alternatives to improve the efficiency of communica-tion network traffic were further figured:chose different routing variable according to the loads of the network,made use of advanced routing equipments and adjusted the creation probability of data in the light of users' feedback strategy.

    Intercarrier interference cancellation based on iterative detection algorithm for OFDM systems over time-varying channels
    Xia WANG,Shi-hua ZHU
    2006, 27(10):  57-61.  doi:1000-436X(2006)10-0057-05
    Asbtract ( 51 )   HTML ( 2)   PDF (865KB) ( 412 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to effectically cancel the intercarrier interference (ICI) in the OFDM(orthogonal frequency-division multiplexing) systems,a novel iterative detection algorithm was proposed based on parallel interference cancellation.With the principle of maximize the minimum signal-to-interference and noise power ratio,the received signal was proc-essed by decision,reconstruction and ICI cancellation,iterative algorithm based on ICI cancellation was set up,the flow chart on signal detection was given.On the basis of analysis on time-varying channel,the influence of the normalized Doppler frequency offset on the system performance was investigated.Computer simulation results were presented.Simulation results show that the proposed scheme can improve the system performance significantly by using of the time diversity of time varying channel.The computational complexity can be reduced form O(N )to O(N).

    Synchronization and blind detect algorithm for dual channel audio watermark
    Tao FENG,Ji-qing HAN
    2006, 27(10):  62-68.  doi:1000-436X(2006)10-0062-07
    Asbtract ( 50 )   HTML ( 3)   PDF (779KB) ( 626 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A synchronization and a blind detect algorithm based on character of dual-channel audio was presented by calculating Mel frequency spectrum coefficient and using correlation between left and right channel,the synchronized segment was fix on and the performance was analyzed.After the watermarking was embedded into synchronized segment in both channels at the same time,it could be detected without original audio and watermarking information by calculat-ing the correlation of them between left and right channels.Experimental results show that the proposed approach can significantly improve the watermarking robustness under the attacks of adding noise,MP3 compression,resample and requantization.

    (t,n) threshold secret sharing scheme without SDC
    Fu-cai ZHOU,Long LIN,Jin-ying WANG,Jian XU
    2006, 27(10):  69-73.  doi:1000-436X(2006)10-0069-05
    Asbtract ( 33 )   HTML ( 2)   PDF (628KB) ( 271 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By means of the intractability of ellipse curve discrete logarithm problem (ECDLP),a ( t,n) secret sharing threshold scheme based on ellipse curve cryptography was proposed.Generally speaking,there are two kinds of threshold schemes:a threshold scheme with share distribution center (SDC) and a threshold scheme without SDC.Under distrib-uted situation,there is no such a center can be completely trusted by all members of the group,a threshold scheme with-out SDC appears more attractive.In the scheme without SDC all of the members generate the group public key and pri-vate keys.When new numbers join the group secret sharing should be updated by period.An example of the scheme us-ing the small number was given.The security of the scheme was analyzed in the final.

    Study on network performance evaluation method based on measurement
    Dong-yan ZHANG,Ming-zeng HU,Hong-li ZHANG
    2006, 27(10):  74-79.  doi:1000-436X(2006)10-0074-06
    Asbtract ( 137 )   HTML ( 12)   PDF (819KB) ( 1366 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to evaluate the condition of network,a new synthetically multi-metric performance evaluation method was put forward based on multiple measurement metrics and applied to the performance evaluation of links and nets.The value of calculation reflected the performance condition of links and nets.The performance change of links and nets could be analyzed according to the different strategies using the method.The results of experiment indicate that the method can evaluate the performance of links and nets effectively.

    DNA algorithm of primeness test based on finite automaton
    Xue-qing YANG,Zhong-kan LIU
    2006, 27(10):  80-85.  doi:1000-436X(2006)10-0080-06
    Asbtract ( 34 )   HTML ( 3)   PDF (683KB) ( 291 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Finite automaton,a computational model of extremely limited computing ability,was proved to have the capa-bility of solving primeness test by construction.Then,a DNA algorithm of the primeness test based on finite automaton was proposed.Furthermore,the method of constructing the finite automaton was presented in detail.The state of the fi-nite automaton was encoded by single-stranded DNA.The input was encoded by double-stranded DNA.The transition rule was represented by a double strand with a ring.The state of transition was realized by enzyme-mediated chemical reactions.The innovation of the algorithm is that it can be applied not only in primeness test but also in prime factoriza-tion and further in attack of RSA cipher.The advantage of this method is that it can be easily implemented.The time re-quired is polynomial in the size of the problem instead of exponential in the size of the problem.

    DCT and Wiener filter based on approach for speech enhancement using a single microphone
    Shi-feng OU,Xiao-hui ZHAO,Hai-jun GU
    2006, 27(10):  86-93.  doi:1000-436X(2006)10-0086-08
    Asbtract ( 51 )   HTML ( 4)   PDF (2205KB) ( 848 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Considering the enhancement of speech corrupted by complicated additive noise,a novel algorithm was proposed based on discrete cosine transform (DCT) and Wiener filter using a single microphone.This algorithm did not rely on any speech signal model and could efficiently attain the optimal estimation of clean speech components using successive noisy speech components and minimum mean square error estimation in DCT domain.Furthermore,it could overcome the disad-vantage of independent assumptions in classic methods for speech components.Simulation results demonstrate that the pro-posed algorithm possesses good performance both in objective and subjective tests with different kinds of noise.

    Iterative interference cancellation based on decoding algorithm of space-time block coding in frequency-selective fading
    Tao DONG,Xiao-hu YOU
    2006, 27(10):  94-99.  doi:1000-436X(2006)10-0094-06
    Asbtract ( 35 )   HTML ( 4)   PDF (921KB) ( 53 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Considering that the orthogonality of STBC in frequency-selective fading will be destroyed by the multiple path interference (MPI),an iterative interference cancellation based maximum likelihood sequence estimation (MLSE) decoding scheme was proposed for STBC in frequency-selective fading.Meanwhile,the maximum ratio combining (MRC) method was introduced to improve the proposed scheme,and decrease the computational complexity further.These schemes could effectively make up for the decoding deficiency of conventional STBC in frequency-selective fad-ing.They canceled not only the MPI from even terms corresponding to the orthogonality undestroyed by fading,but also the MPI from odd terms corresponding to the orthogonality destroyed by fading; they has superior performance.More-over,they have lower decoding complexity when compared with direct MLSE decoding of the long sequence signal.Thus they implement good decoding performance with low complexity.

    Study of DHF G function algorithm used for DHF systems
    Yong CHEN,Hang-sheng ZHAO
    2006, 27(10):  100-105.  doi:1000-436X(2006)10-0100-06
    Asbtract ( 37 )   HTML ( 1)   PDF (766KB) ( 424 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    How to construct a set of DFH G function algorithm had presented.The function was easy to be generated.The methods of the parameter selection for the G function were given in theory,and the quality of the uniformity usage of the frequency points in the DFH system range was analyzed.Lastly,the performances of the FH pattern was tested and some beneficial conclusions were derived.

    Implementation of a prototype real-time multi-mode wireless video transmission system
    Dong HU,Feng LIU,Xiu-chang ZHU
    2006, 27(10):  106-112.  doi:1000-436X(2006)10-0106-07
    Asbtract ( 73 )   HTML ( 5)   PDF (879KB) ( 281 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A novel prototype wireless video transmission system was presented.The characteristic of the design was that the wireless terminal used high performance multimedia DSP as video processing and control core,and the interface board integrates various wireless network interfaces.By software control,not only the system could work in single net-work mode,but also could select appropriate transmission channel in multi-mode network environment,so as to present best video quality.The system configuration,hardware and software design,as well as the control policy of the wireless terminal were described in details.Experiments show that in the GPRS/WLAN and CDMA/WLAN test conditions,the system can select the proper network and present satisfactory reconstructed video.

    Performance simulation of a new location searching scheme for mobile communications
    Xiao-yan ZHANG,Xiao-feng DU,Xiang-hua ZHU
    2006, 27(10):  113-117.  doi:1000-436X(2006)10-0113-05
    Asbtract ( 22 )   HTML ( 1)   PDF (419KB) ( 213 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The proliferation of mobile users and the development of mobile communication services had spurred higher request for location management.So it was highly desired to design an effective location management scheme in the structure of mobile communication.Four old location searching schemes for PCS were reviewed and a new scheme was proposed.Simulation results show that the proposed scheme performs better than the old four ones.

    Speech enhancement with Gamma speech modeling
    Xia ZOU,Liang CHEN,Xiong-wei ZHANG
    2006, 27(10):  118-123.  doi:1000-436X(2006)10-0118-06
    Asbtract ( 53 )   HTML ( 11)   PDF (733KB) ( 694 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new speech enhancement system with Gamma speech modeling was proposed.The clean speech compo-nents were estimated by minimum-mean-square-error(MMSE) estimator under the assumption that the clean speech DCT coefficients were modeled by Gamma distributions and the noise DCT coefficients were modeled by Gaussian distribu-tions.Then,the MMSE estimator under speech presence uncertainty and a Gamma model was derived.Furthermore,the noise power was estimated by the IMCRA algorithm with the Gamma model.The simulation results show that the pro-posed algorithm yields less residual noise and better speech quality than the Gaussian based speech enhancement algo-rithms proposed in recent years.

    Video transcoding for H.264 in the compressed domain and key techniques analysis
    Gao-bo YANG,Sheng-fa YU,Zhao-yang ZHANG
    2006, 27(10):  124-131.  doi:1000-436X(2006)10-0124-08
    Asbtract ( 23 )   HTML ( 1)   PDF (619KB) ( 260 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the analysis of the difference between the newest video coding standard H.264 and the earlier video-coding standard,the advances in the key technologies for H.264 video transcoding,which was directly conducted in the compressed domain,were systematically discussed.They were classified into four categories:DCT-to-HT coeffi-cients conversion,fast motion re-estimation and refinement,inter/intra coding mode decision and rate control.Future di-rections on this topic were also prospected.

    Novel blind identification and equalization new method based on particle filter
    Lei WANG,Yu-lin LIU
    2006, 27(10):  132-135.  doi:1000-436X(2006)10-0132-04
    Asbtract ( 25 )   HTML ( 2)   PDF (959KB) ( 483 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on particle filter theory,a new novel blind identification and equalization algorithm was proposed sam-pling of the posterior probability distribution was avoided by sampling the expectation instead of actual values of the channel,so as to reduce the complexity of algorithm.In addition,the importance sampling process could be simplified greatly by choosing the prior density as the importance function.Simulation results show that the algorithm has fast conver-gence performance and be effective even under the circumstances of very low signal-to-noise ratio and less observation data.

    Research on relation between network structure of macro-cell and indoor coverage in UMTS system
    Jiang-hong HAN,Ping ZHANG,Ben-hong ZHANG,Yong LI
    2006, 27(10):  136-140.  doi:1000-436X(2006)10-0136-05
    Asbtract ( 23 )   HTML ( 2)   PDF (798KB) ( 211 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The influence of radio transmission at 2GHz into buildings was quite obvious,the result were analyzed by for network structure of macro-cell in UMTS system.The relation of restriction between the three factors,including building penetration loss,coverage credibility and the link margin also were discussed based on the principle of equilibrium cov-erage in the indoor and the outdoor.How to take the expectation of building penetration loss and its' value were recom-mended were also presented in detail to obtain the much more optimum network structure of macro-cell.With the ap-proach of equilibrium coverage,the waste of base station and the difficulty of controlling will be avoided to the utmost.On the other hand,the insufficiency of base station will also be prevented,and the network performance will be ade-quately exerted.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: