The perceptual effect of the phase information in speech has been studied by auditorysubjective tests. On the condition that the phase spectrum in speech is changed while amplitudespectrum is unchanged, the tests show...The perceptual effect of the phase information in speech has been studied by auditorysubjective tests. On the condition that the phase spectrum in speech is changed while amplitudespectrum is unchanged, the tests show that: (1) If the envelop of the reconstructed speech signalis unchanged, there is indistinctive auditory perception between the original speech and thereconstructed speech; (2) The auditory perception effect of the reconstructed speech mainly lieson the amplitude of the derivative of the additive phase; (3) td is the maximum relative time shiftbetween different frequency components of the reconstructed speech signal. The speech qualityis excellent while td <10ms; good while 10ms< td <20ms; common while 20ms< td <35ms, andpoor while td >35ms.展开更多
A novel scheme of M-ary multi-carrier spread spectrum based on wavelet packet is proposed. Its performance is investigated for a multipath, slow Rayteigh fading channel. The performance advantages of the system over t...A novel scheme of M-ary multi-carrier spread spectrum based on wavelet packet is proposed. Its performance is investigated for a multipath, slow Rayteigh fading channel. The performance advantages of the system over that based on DFT are demonstrated by both analytical and simulation methods.展开更多
Based on the motion of platform and the scanning rules of the squint SAR, this paper constructs an exact slant range model between a point target and APC, then presents a novel analysis method of the high resolution c...Based on the motion of platform and the scanning rules of the squint SAR, this paper constructs an exact slant range model between a point target and APC, then presents a novel analysis method of the high resolution characters in azimuth of squint SAR. By deeply researching the length of synthetic aperture and the azimuth resolution, we give the application conditions of various formulae about the two important parameters, which is vital to the exact imaging and brief but reasonable processing.展开更多
The fuzzy C-means clustering algorithm(FCM) to the fuzzy kernel C-means clustering algorithm(FKCM) to effectively perform cluster analysis on the diversiform structures are extended, such as non-hyperspherical data, d...The fuzzy C-means clustering algorithm(FCM) to the fuzzy kernel C-means clustering algorithm(FKCM) to effectively perform cluster analysis on the diversiform structures are extended, such as non-hyperspherical data, data with noise, data with mixture of heterogeneous cluster prototypes, asymmetric data, etc. Based on the Mercer kernel, FKCM clustering algorithm is derived from FCM algorithm united with kernel method. The results of experiments with the synthetic and real data show that the FKCM clustering algorithm is universality and can effectively unsupervised analyze datasets with variform structures in contrast to FCM algorithm. It is can be imagined that kernel-based clustering algorithm is one of important research direction of fuzzy clustering analysis.展开更多
Under the Bargmann constrained condition, the spatial part of a new Lax pair of the higher order MkdV equation is nonlinearized to be a completely integrable system (R2N,dp^dq, H0=1/2F0)(F0= (^q,p) + (^p,p) + (p,q)2)....Under the Bargmann constrained condition, the spatial part of a new Lax pair of the higher order MkdV equation is nonlinearized to be a completely integrable system (R2N,dp^dq, H0=1/2F0)(F0= (^q,p) + (^p,p) + (p,q)2). While the nonlinearization of the time part leads to its N-involutive system (Fm).展开更多
We ayptanalyze Kim et. al's one-time proxy signature scheme used in mobileagents, and then a successful forgery is introduced It is showed that a dishonest customer cansuccessfully forge a valid one-time proxy sig...We ayptanalyze Kim et. al's one-time proxy signature scheme used in mobileagents, and then a successful forgery is introduced It is showed that a dishonest customer cansuccessfully forge a valid one-time proxy signature by impersonating the stiver Furthermore, he canrequest the server with responsibility for the forged bidding information.展开更多
This letter investigates an efficient design procedure integrating the Genetic Algorithm (GA) with the Finite Difference Time Domain (FDTD) for the fast optimal design of Smart Antenna Arrays (SAA). The FDTD is used t...This letter investigates an efficient design procedure integrating the Genetic Algorithm (GA) with the Finite Difference Time Domain (FDTD) for the fast optimal design of Smart Antenna Arrays (SAA). The FDTD is used to analyze SAA with mutual coupling. Then,on the basis of the Maximal Signal to Noise Ratio (MSNR) criteria, the GA is applied to the optimization of weighting elements and structure of SAA. Finally, the effectiveness of the analysis is evaluated by experimental antenna arrays.展开更多
Based on Shamir's secret sharing, a (t, n) multi-secret sharing scheme isproposed in this paper p secrets can be shared among n participants, and t or more participants canco-operate to reconstruct these secrets a...Based on Shamir's secret sharing, a (t, n) multi-secret sharing scheme isproposed in this paper p secrets can be shared among n participants, and t or more participants canco-operate to reconstruct these secrets at the same time, but t— 1 or fewerparticipants can derivenothing about these secrets. Each participant's secret shadow is as short as each secret. Comparedwith the existing schemes, the proposed scheme is characterized by the lower complexity of thesecret reconstruction and less public information. The security of this scheme is the same as thatof Shamir' a threshold scheme. Analyses show that this scheme is an efficient, computationallysecure scheme.展开更多
Based on the Distributed Coordination Function (DCF) and the Enhanced DCF (EDCF) mechanisms in IEEE 802.11 and 802.11e, a novel backoff scheme for Wireless Local Area Network (WLAN) is proposed. The scheme is to solve...Based on the Distributed Coordination Function (DCF) and the Enhanced DCF (EDCF) mechanisms in IEEE 802.11 and 802.11e, a novel backoff scheme for Wireless Local Area Network (WLAN) is proposed. The scheme is to solve the problem of the packet loss and the decrease of performance due to the increasing Contention Window (CW) when there are continuous collisions. In the proposed scheme, the CW of the packet will change dynamically with different delay for the different traffics. Mathematic formulas are presented to indicate the relationship between the CW and the delay character. ,The performance of the new scheme is also discussed with simulation results. The results show that it helps WLAN system handle multimedia simultaneously.展开更多
A computationally efficient method for jointly estimating both Directions Of Arrival (DOA) and ranges of near field sources is presented. The proposed algorithm does not need any spectral peak searching and the 2-D pa...A computationally efficient method for jointly estimating both Directions Of Arrival (DOA) and ranges of near field sources is presented. The proposed algorithm does not need any spectral peak searching and the 2-D parameters are automatically paired. It is suitable for arbitrary additive Gaussian noise environment. Furthermore, its performances are confirmed by computer simulations.展开更多
In this letter, discrete complex image method is employed to compute the Green's functions in the spatial domain, which improves the speed of evaluating the impedance matrix.The triangle vector basis function--RWG...In this letter, discrete complex image method is employed to compute the Green's functions in the spatial domain, which improves the speed of evaluating the impedance matrix.The triangle vector basis function--RWG, is used to simulate the current distribution in order to compute the scattering properties of arbitrary shape microstrip patch without the staircase approximation. The numerical result shows the validity of the proposed method.展开更多
In order to analyze the deleterious effects of Passive InterModulation (PIM) on high power communication satellite systems, the basic concept of PIM is introduced, and an equation for the power spectral density of the...In order to analyze the deleterious effects of Passive InterModulation (PIM) on high power communication satellite systems, the basic concept of PIM is introduced, and an equation for the power spectral density of the n-th order PIM distortion insuch systems is derived by applying flat signal-power spectrum assumption and Fourier transform method. It is indicated that PIM level generally decreases with order and the lowest frequency receive channel in the receive band is the channel of most affected by PIM interference.展开更多
A Direction Of Arrival(DOA) estimator based on the signal separation principle is introduced, and one of representative multidimensional estimators is established by introducing Matrix Operator projection signal steer...A Direction Of Arrival(DOA) estimator based on the signal separation principle is introduced, and one of representative multidimensional estimators is established by introducing Matrix Operator projection signal steering Vector Excision(MOVE) operation. Thanks to Alternating Separation (AS) technique, the multidimensional problem is transformed into a series of one-dimensional optimal ones. Furthermore, an equivalent simplified implementation of the AS is obtained. Finally the definiteness and uniqueness of the estimator are analyzed.展开更多
All watermarks are shared into shadow images using VCS(Visual Cryptography Scheme). Only one specific shadow (as a new watermark) is embedded into the host signal and the other ones are distributed to every user in ea...All watermarks are shared into shadow images using VCS(Visual Cryptography Scheme). Only one specific shadow (as a new watermark) is embedded into the host signal and the other ones are distributed to every user in each group as a key. In the watermarking extraction procedure, users in different group can obtain different watermark by combining their shadows with the extracted one from the watermarked signal. Analysis and experimental results show that the new watermarking method is novel, secure and robust.展开更多
A single channel measurement system for brain MIT has been built. The system is composed of an exciting source unit,a detecting unit,a rotating and controlling unit,and imaging unit. The experiment results of single c...A single channel measurement system for brain MIT has been built. The system is composed of an exciting source unit,a detecting unit,a rotating and controlling unit,and imaging unit. The experiment results of single channel measurements show that the system output versus the conductivity of the objects was an approximate linear relationship when the diameter of an object was about 9cm and its conductivity was in 0.1 S/m,0.7 S/m,2 S/m,6 S/m. The sensitivit yof the phase detector was 53 mV/degree from -10 to +10 degree.展开更多
Multiple access interference (MAI) and near-far problem are two major obstacles in DS-CDMA systems. Combining wavelet neural networks and two matched filters, the novel multiuser detector, which is based on multiple v...Multiple access interference (MAI) and near-far problem are two major obstacles in DS-CDMA systems. Combining wavelet neural networks and two matched filters, the novel multiuser detector, which is based on multiple variable function estimation wavelet networks over single path asynchronous channel and space-time channel respectively is presented. Excellent localization characteristics of wavelet functions in both time and frequency domains allowed hierarchical multiple resolution learning of input-output data mapping. The ma thematic frame of the neural networks and error back ward propagation algorithm are introduced. The complexity of the multiuser detector only depends on that of wavelet networks. With numerical simulations and performance analysis, it indicates that the multiuser detector has excellent performance in eliminating MAI and near-far resistance.展开更多
基金the National Natural Science Foundation of China (No.60071029)
文摘The perceptual effect of the phase information in speech has been studied by auditorysubjective tests. On the condition that the phase spectrum in speech is changed while amplitudespectrum is unchanged, the tests show that: (1) If the envelop of the reconstructed speech signalis unchanged, there is indistinctive auditory perception between the original speech and thereconstructed speech; (2) The auditory perception effect of the reconstructed speech mainly lieson the amplitude of the derivative of the additive phase; (3) td is the maximum relative time shiftbetween different frequency components of the reconstructed speech signal. The speech qualityis excellent while td <10ms; good while 10ms< td <20ms; common while 20ms< td <35ms, andpoor while td >35ms.
基金Supported by the National Natural Science Foundation of China(No.60172029)
文摘A novel scheme of M-ary multi-carrier spread spectrum based on wavelet packet is proposed. Its performance is investigated for a multipath, slow Rayteigh fading channel. The performance advantages of the system over that based on DFT are demonstrated by both analytical and simulation methods.
文摘Based on the motion of platform and the scanning rules of the squint SAR, this paper constructs an exact slant range model between a point target and APC, then presents a novel analysis method of the high resolution characters in azimuth of squint SAR. By deeply researching the length of synthetic aperture and the azimuth resolution, we give the application conditions of various formulae about the two important parameters, which is vital to the exact imaging and brief but reasonable processing.
文摘The fuzzy C-means clustering algorithm(FCM) to the fuzzy kernel C-means clustering algorithm(FKCM) to effectively perform cluster analysis on the diversiform structures are extended, such as non-hyperspherical data, data with noise, data with mixture of heterogeneous cluster prototypes, asymmetric data, etc. Based on the Mercer kernel, FKCM clustering algorithm is derived from FCM algorithm united with kernel method. The results of experiments with the synthetic and real data show that the FKCM clustering algorithm is universality and can effectively unsupervised analyze datasets with variform structures in contrast to FCM algorithm. It is can be imagined that kernel-based clustering algorithm is one of important research direction of fuzzy clustering analysis.
文摘Under the Bargmann constrained condition, the spatial part of a new Lax pair of the higher order MkdV equation is nonlinearized to be a completely integrable system (R2N,dp^dq, H0=1/2F0)(F0= (^q,p) + (^p,p) + (p,q)2). While the nonlinearization of the time part leads to its N-involutive system (Fm).
文摘We ayptanalyze Kim et. al's one-time proxy signature scheme used in mobileagents, and then a successful forgery is introduced It is showed that a dishonest customer cansuccessfully forge a valid one-time proxy signature by impersonating the stiver Furthermore, he canrequest the server with responsibility for the forged bidding information.
文摘This letter investigates an efficient design procedure integrating the Genetic Algorithm (GA) with the Finite Difference Time Domain (FDTD) for the fast optimal design of Smart Antenna Arrays (SAA). The FDTD is used to analyze SAA with mutual coupling. Then,on the basis of the Maximal Signal to Noise Ratio (MSNR) criteria, the GA is applied to the optimization of weighting elements and structure of SAA. Finally, the effectiveness of the analysis is evaluated by experimental antenna arrays.
文摘Based on Shamir's secret sharing, a (t, n) multi-secret sharing scheme isproposed in this paper p secrets can be shared among n participants, and t or more participants canco-operate to reconstruct these secrets at the same time, but t— 1 or fewerparticipants can derivenothing about these secrets. Each participant's secret shadow is as short as each secret. Comparedwith the existing schemes, the proposed scheme is characterized by the lower complexity of thesecret reconstruction and less public information. The security of this scheme is the same as thatof Shamir' a threshold scheme. Analyses show that this scheme is an efficient, computationallysecure scheme.
基金Supported by the National Natural Science Foundation of China (No.90304008) ShaanxiInternational Cooperation Project 2003KW-08.
文摘Based on the Distributed Coordination Function (DCF) and the Enhanced DCF (EDCF) mechanisms in IEEE 802.11 and 802.11e, a novel backoff scheme for Wireless Local Area Network (WLAN) is proposed. The scheme is to solve the problem of the packet loss and the decrease of performance due to the increasing Contention Window (CW) when there are continuous collisions. In the proposed scheme, the CW of the packet will change dynamically with different delay for the different traffics. Mathematic formulas are presented to indicate the relationship between the CW and the delay character. ,The performance of the new scheme is also discussed with simulation results. The results show that it helps WLAN system handle multimedia simultaneously.
基金Supported in part by Trans-Century Trainning Programme Foundation for the Talents by the State Education Commission and the National Natural Science Foundation of China (No.60172028)
文摘A computationally efficient method for jointly estimating both Directions Of Arrival (DOA) and ranges of near field sources is presented. The proposed algorithm does not need any spectral peak searching and the 2-D parameters are automatically paired. It is suitable for arbitrary additive Gaussian noise environment. Furthermore, its performances are confirmed by computer simulations.
文摘In this letter, discrete complex image method is employed to compute the Green's functions in the spatial domain, which improves the speed of evaluating the impedance matrix.The triangle vector basis function--RWG, is used to simulate the current distribution in order to compute the scattering properties of arbitrary shape microstrip patch without the staircase approximation. The numerical result shows the validity of the proposed method.
文摘In order to analyze the deleterious effects of Passive InterModulation (PIM) on high power communication satellite systems, the basic concept of PIM is introduced, and an equation for the power spectral density of the n-th order PIM distortion insuch systems is derived by applying flat signal-power spectrum assumption and Fourier transform method. It is indicated that PIM level generally decreases with order and the lowest frequency receive channel in the receive band is the channel of most affected by PIM interference.
基金Partially supported by the National Natural Science Foundation of China(No.60372036), Natural Science Foundation of Shaanxi Province (2002F24) and Funds from the Information Industry Ministry of China (2002XK610039)
文摘A Direction Of Arrival(DOA) estimator based on the signal separation principle is introduced, and one of representative multidimensional estimators is established by introducing Matrix Operator projection signal steering Vector Excision(MOVE) operation. Thanks to Alternating Separation (AS) technique, the multidimensional problem is transformed into a series of one-dimensional optimal ones. Furthermore, an equivalent simplified implementation of the AS is obtained. Finally the definiteness and uniqueness of the estimator are analyzed.
基金Supported by the National Natural Science Foundation of China (No.90204017, 60373059)National 973 Project (G1999035805) ISN Open Foundation
文摘All watermarks are shared into shadow images using VCS(Visual Cryptography Scheme). Only one specific shadow (as a new watermark) is embedded into the host signal and the other ones are distributed to every user in each group as a key. In the watermarking extraction procedure, users in different group can obtain different watermark by combining their shadows with the extracted one from the watermarked signal. Analysis and experimental results show that the new watermarking method is novel, secure and robust.
文摘A single channel measurement system for brain MIT has been built. The system is composed of an exciting source unit,a detecting unit,a rotating and controlling unit,and imaging unit. The experiment results of single channel measurements show that the system output versus the conductivity of the objects was an approximate linear relationship when the diameter of an object was about 9cm and its conductivity was in 0.1 S/m,0.7 S/m,2 S/m,6 S/m. The sensitivit yof the phase detector was 53 mV/degree from -10 to +10 degree.
基金This project was supported by the National Natural Science Foundation of China (60073053 60133010).
文摘Multiple access interference (MAI) and near-far problem are two major obstacles in DS-CDMA systems. Combining wavelet neural networks and two matched filters, the novel multiuser detector, which is based on multiple variable function estimation wavelet networks over single path asynchronous channel and space-time channel respectively is presented. Excellent localization characteristics of wavelet functions in both time and frequency domains allowed hierarchical multiple resolution learning of input-output data mapping. The ma thematic frame of the neural networks and error back ward propagation algorithm are introduced. The complexity of the multiuser detector only depends on that of wavelet networks. With numerical simulations and performance analysis, it indicates that the multiuser detector has excellent performance in eliminating MAI and near-far resistance.