Serveral methods for the pararrel acquisition of a PN sequence in a baseband direct sequence spread spectrum system are investigated. Four different kinds of schemes are considered: the optimal estimation scheme, the ...Serveral methods for the pararrel acquisition of a PN sequence in a baseband direct sequence spread spectrum system are investigated. Four different kinds of schemes are considered: the optimal estimation scheme, the locally optimal estimation scheme, the optimal testing searches and the locally optimal testing scheme. In the four kinds of parallel acquisition schemes, the expressions for the probability of error are given and compared with the actual error probabilities obtained via Monte Carlo simulation. We also outline a technique that can be suboptimal because of a large amount of hardware and computation when using the parallel acquisition schemes.展开更多
An optical encryption(OE) scheme based on the spread spectrum ghost imaging(SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadam...An optical encryption(OE) scheme based on the spread spectrum ghost imaging(SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadamard matrix of order N is used as the secure key, and shared with the authorized user, Bob, through a private channel. Each corresponding row vector of the order-N Hadamard matrix is then used as the direct sequence code to modulate a speckle pattern for the ghost imaging system, and an image is encrypted with the help of the SSGI. The measurement results from the bucket detector, named as ciphertext, are then transmitted to Bob through a public channel. The illuminating speckle patterns are also shared with Bob by the public channel. With the correct secure key, Bob could reconstruct the image with the aid of the SSGI system, whereas the unauthorized user, Eve, could not obtain any useful information of the encrypted image. The numerical simulations and experimental results show that the proposed scheme is feasible with a higher security and a smaller key. For the 32 × 32 pixels image, the number of bits sent from Alice to Bob by using SSGIOE(M = 1024, N = 2048) scheme is only 0.0107 times over a computational ghost imaging optical encryption scheme.When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any information of the encrypted image. The extreme circumstance for the proposed SSGI-OE scheme is also discussed, where the eavesdropper begins to extract the information when ER is up to 15%.展开更多
A novel scheme of M-ary multi-carrier spread spectrum based on wavelet packet is proposed. Its performance is investigated for a multipath, slow Rayteigh fading channel. The performance advantages of the system over t...A novel scheme of M-ary multi-carrier spread spectrum based on wavelet packet is proposed. Its performance is investigated for a multipath, slow Rayteigh fading channel. The performance advantages of the system over that based on DFT are demonstrated by both analytical and simulation methods.展开更多
According to the requirements of the high-sensitivity acquisition of Direct Sequence Spread Spectrum(DSSS) signals under ultrahigh dynamic environments in space communications, a three-dimensional joint search of the ...According to the requirements of the high-sensitivity acquisition of Direct Sequence Spread Spectrum(DSSS) signals under ultrahigh dynamic environments in space communications, a three-dimensional joint search of the phase of Pseudo-Noise-code(PN-code),Doppler frequency and its rate-of-change is presented to achieve high sensitivity in sensing high-frequency dynamics. By eliminating the correlation peak loss caused by ultrahigh Doppler frequency and its rate-of-change offset,the proposed method improves the acquisition sensitivity by increasing the non-coherent accumulation time. The validity of the algorithm is proved by theoretical analysis and simulation results. It is shown that signals with a carrier- to-noise ratio as low as 39 dBHz can be captured with high performance when the Doppler frequency is up to ±1 MHz and its rate-of-change is up to ±200 kHz/s.展开更多
Aiming at improving acquisition performance for direct sequence spread spectrum (DSSS) signals, a new acquisition algorithm based on fast Fourier transform (FFT) is proposed. The code phases are parallel searched ...Aiming at improving acquisition performance for direct sequence spread spectrum (DSSS) signals, a new acquisition algorithm based on fast Fourier transform (FFT) is proposed. The code phases are parallel searched throughout the Doppler frequency domain. Since the influence of Doppler frequency errors on peak-to- average ratios of correlation power shows a pattern similar to the sinc function, it is our belief that by judging on peak-to-average ratios for different Doppler frequency errors false alarm probabilities should be lowered. Analyses have supported the underlying principle of this new algorithm. Simulation results have also indicated that the new algorithm can effectively improve the acquisition performance for DSSS signals.展开更多
We study the transmission capacities of two coexisting spread-spectrum wireless networks (a primary network vs. a secondary network) that operate in the same geographic region and share the same spectrum. We defi ne t...We study the transmission capacities of two coexisting spread-spectrum wireless networks (a primary network vs. a secondary network) that operate in the same geographic region and share the same spectrum. We defi ne transmission capacity as the product among the density of transmissions, the transmission rate, and the successful transmission probability. The primary (PR) network has a higher priority to access the spectrum without particular considerations for the secondary (SR) network, while the SR network limits its interference to the PR network by carefully controlling the density ofits transmitters. Considering two types of spread-spectrum transmission schemes (FH-CDMA and DS-CDMA) and the channel inversion power control mechanism, we quantify the transmission capacities for these two networks based on asymptotic analysis. Our results show that if the PR network permits a small increase ofits outage probability, the sum transmission capacities of the two networks (i.e., the overall spectrumefficiency per unit area) will be boosted significantly over that of a single network.展开更多
The proposed scheme is based on Discrete Fourier Transform (DFT) domain processing. The key technology of this scheme is jamming parameters' accurate estimation and jamming reconstruction. Compared with the 't...The proposed scheme is based on Discrete Fourier Transform (DFT) domain processing. The key technology of this scheme is jamming parameters' accurate estimation and jamming reconstruction. Compared with the 'threshold exciser' scheme the proposed scheme can eliminate more jamming energy on the whole frequency band with the minimum loss of useful signal energy. As shown in the research and simulation, the proposed scheme is much better than the 'threshold exciser' scheme, especially in the case of high power jamming whereas the 'threshold exciser' scheme might be invalid.展开更多
Local position and attitude measurement methods are necessary for the navigation of autonomous robots and the other applications. In this paper, a 3D attitude measurement method is proposed. This method uses the sprea...Local position and attitude measurement methods are necessary for the navigation of autonomous robots and the other applications. In this paper, a 3D attitude measurement method is proposed. This method uses the spread spectrum modulated ultrasonic wave for the measurement of the pseudo-distance of each pathway between transmitter and receiver elements that are arranged in an array. The relative attitude between transmitter and receiver unit could be calculated from the relationship between these pseudo-distances. The use of spread spectrum modulation enables the high accuracy, noise tolerance, and coexistence of multiple transmitter devices by code division multiple access (CDMA) between transmitter and receiver elements. A pair of transmitter and receiver prototype for proposed method was manufactured, and the fundamental performance was examined in experiments. As a result, accuracy of σ=0.78 mm in the pseudo-distance measurement of each pathway between transmitter and receiver elements was confirmed, and about 0.01 rad resolution in the attitude measurement was also confirmed.展开更多
The key to narrow-band interference excision in frequency domain is to determine the excision thresh- old in direct-sequence spread-spectrum (DS-SS) systems. The excision threshold is a non-linear function related t...The key to narrow-band interference excision in frequency domain is to determine the excision thresh- old in direct-sequence spread-spectrum (DS-SS) systems. The excision threshold is a non-linear function related to the number and the power of interference, and attempting to get the exact relation of threshold related to the number and the power of interference is almost impossible. The N-sigma algorithm determines the excision threshold using subsection function; however, the excision threshold determined by this method is not exact. A new method to determine the threshold of N-sigma algorithm is proposed. The new method modifies the scale factor N by use of the membership function. The threshold determined by this method is consecutive and smooth, and it is closer to the fact than that of the initial N-sigma algorithm. The GPS signal and single-tone (CW) interference (that is, typical narrow-band interference) are implemented in the simulation, and the results are presented to demonstrate the validity of the new algorithm.展开更多
This paper introduces two kinds of sequences used in spread spectrum communication system: pseudo-noise (PN) se-quence generated by linear feedback shift register(LFSR), such as m-sequence and Gold sequence...This paper introduces two kinds of sequences used in spread spectrum communication system: pseudo-noise (PN) se-quence generated by linear feedback shift register(LFSR), such as m-sequence and Gold sequence, and the chaotic sequence generated by the determination of the nonlinear system. The characteristics of PN sequence and chaotic sequence are analyzed by simulation, and the advantages and disadvantages of different sequences in spread spectrum communication system are ob-tained. The advantages of sequence can be used to improve signal transmission in a spread spectrum communication system.展开更多
At present, with the progress and innovation of technology, the radar communication dual function wave has become a hot research at home and abroad. Excellent integrated waveform can make full use resources of combat ...At present, with the progress and innovation of technology, the radar communication dual function wave has become a hot research at home and abroad. Excellent integrated waveform can make full use resources of combat platform, reduce the size of equipment, and realize the actual functionality of the reality of the battle-field without affecting the radar communication func-tion. The MSK-LFM dual-function wave is a typical representative;it is based on LFM, through the MSK modulation to achieve the integration function. This paper proposes a scheme of combining the spread spectrum technology with the MSK-LFM waveform based on the previous literature. The simulation results show that the waveform envelope is more stable and the energy is more concentrated. With the introduction of spread-spectrum technology, the new waveform ambiguity function graph is much closer to the thumbtack than the traditional MSK-LFM waveform.展开更多
To improve the performance of short-range wireless communications, channel quality must be improved by avoiding interference and multi-path fading. Frequency hopping spread spectrum(FHSS) is a transmission technique w...To improve the performance of short-range wireless communications, channel quality must be improved by avoiding interference and multi-path fading. Frequency hopping spread spectrum(FHSS) is a transmission technique where the carrier hops from frequency to frequency. For frequency hopping a mechanism must be designed so that the data can be transmitted in a clear channel and avoid congested channels. Adaptive frequency hopping is a system which is used to improve immunity toward frequency interference by avoiding using congested frequency channels in hopping sequence. In this paper mathematical modelling is used to simulate and analyze the performance improvement by using FHSS with popular modulation schemes, and also the hopping channel situations are investigated.展开更多
Performances of BPSK, balanced quaternary modulation, dual quaternary modulation and complex quaternary modulation in direct sequence spectrum spread (DS SS) system are discussed in this paper. Based on the crit...Performances of BPSK, balanced quaternary modulation, dual quaternary modulation and complex quaternary modulation in direct sequence spectrum spread (DS SS) system are discussed in this paper. Based on the criterion the power of original signal is the same, it is shown that complex quaternary modulation has the best performance, and dual quaternary modulation degrades 2dB. Moreover, the frequency efficient of the two modulations is 2bit/Hz. Balanced quaternary has the same performance as BPSK with frequency efficient 1bit/Hz.展开更多
By the flexible redefinition of frequency-occupation and frequency-collision event, the frequency-(collision) probability of hybrid(DS/FH) spread spectrum network is analyzed. This probability is based on the simultan...By the flexible redefinition of frequency-occupation and frequency-collision event, the frequency-(collision) probability of hybrid(DS/FH) spread spectrum network is analyzed. This probability is based on the simultaneous transmission number threshold and is discussed in synchronous and asynchronous circumstances respectively. And then, the network throughput based on the packet correct reception probability is analyzed. Two models which have finite and infinite population respectively is discussed. At last, the numerical results are given.展开更多
Frequency Hopping Spread Spectrum (FHSS) system is often deployed to protect wireless communication from jamming or to preclude undesired reception of the signal. Such themes can only be achieved if the jammer or unde...Frequency Hopping Spread Spectrum (FHSS) system is often deployed to protect wireless communication from jamming or to preclude undesired reception of the signal. Such themes can only be achieved if the jammer or undesired receiver does not have the knowledge of the spreading code. For this reason, unencrypted M-sequences are a deficient choice for the spreading code when a high level of security is required. The primary objective of this paper is to analyze vulnerability of linear feedback shift register (LFSRs) codes. Then, a new method based on encryption algorithm applied over spreading codes, named hidden frequency hopping is proposed to improve the security of FHSS. The proposed encryption security algorithm is highly reliable, and can be applied to all existing data communication systems based on spread spectrum techniques. Since the multi-user detection is an inherent characteristic for FHSS, the multi-user interference must be studied carefully. Hence, a new method called optimum pair “key-input” selection is proposed which reduces interference below the desired constant threshold.展开更多
The proposed method inserts a watermark into the spectral components of the data using techniques analogous to spread spectrum communications, hiding a narrow band signal in a wideband channel. The watermark is diffic...The proposed method inserts a watermark into the spectral components of the data using techniques analogous to spread spectrum communications, hiding a narrow band signal in a wideband channel. The watermark is difficult for an attacker to remove. It is also robust to common signal and geometric distortion such as JPEG compression, cropping and scaling. In addition, the watermark can be extracted accurately without source host image at the receiver. Key words digital watermark - spread spectrum techniques - wavelet transform CLC number TN 911.73 - X 913. 2 Foundation item: Supported by Wuhan University Innovation Foundation (904270072)Biography: Shao Hai-mei (1975-), female, lecturer, research direction: wavelet application, image process, digital watermark.展开更多
This paper discusses the requirements for the cancellation of leakage signal, analyzes in detail the principals of cancelling leakage signal in microwave and IF band, and proposes the schemes to realize adaptive cance...This paper discusses the requirements for the cancellation of leakage signal, analyzes in detail the principals of cancelling leakage signal in microwave and IF band, and proposes the schemes to realize adaptive cancellation. Computer analog has shown that the proposed scheme has a very high convergence speed and can reach a high cancellation ratio.展开更多
An idea of estimating the direct sequence spread spectrum(DSSS) signal pseudo-noise(PN) sequence is presented. Without the apriority knowledge about the DSSS signal in the non-cooperation condition, we propose a s...An idea of estimating the direct sequence spread spectrum(DSSS) signal pseudo-noise(PN) sequence is presented. Without the apriority knowledge about the DSSS signal in the non-cooperation condition, we propose a self-organizing feature map(SOFM) neural network algorithm to detect and identify the PN sequence. A non-supervised learning algorithm is proposed according the Kohonen rule in SOFM. The blind algorithm can also estimate the PN sequence in a low signal-to-noise(SNR) and computer simulation demonstrates that the algorithm is effective. Compared with the traditional correlation algorithm based on slip-correlation, the proposed algorithm's bit error rate(BER) and complexity are lower.展开更多
文摘Serveral methods for the pararrel acquisition of a PN sequence in a baseband direct sequence spread spectrum system are investigated. Four different kinds of schemes are considered: the optimal estimation scheme, the locally optimal estimation scheme, the optimal testing searches and the locally optimal testing scheme. In the four kinds of parallel acquisition schemes, the expressions for the probability of error are given and compared with the actual error probabilities obtained via Monte Carlo simulation. We also outline a technique that can be suboptimal because of a large amount of hardware and computation when using the parallel acquisition schemes.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61871234 and 62001249)the Postgraduate Research&Practice Innovation Program of Jiangsu Province(Grant No.KYCX200729)+3 种基金the Natural Science Research Project of Higher Education of Jiangsu Province(Grant No.20KJB510030)the Qing Lan Project of Jiangsu Province(Su Teacher’s Letter[2022]No.29)the Research project of NanJing Tech University Pujiang Institute(Grant No.njpj2022-1-25)the Priority Academic Program Development of Jiangsu Higher Education Institutions.
文摘An optical encryption(OE) scheme based on the spread spectrum ghost imaging(SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadamard matrix of order N is used as the secure key, and shared with the authorized user, Bob, through a private channel. Each corresponding row vector of the order-N Hadamard matrix is then used as the direct sequence code to modulate a speckle pattern for the ghost imaging system, and an image is encrypted with the help of the SSGI. The measurement results from the bucket detector, named as ciphertext, are then transmitted to Bob through a public channel. The illuminating speckle patterns are also shared with Bob by the public channel. With the correct secure key, Bob could reconstruct the image with the aid of the SSGI system, whereas the unauthorized user, Eve, could not obtain any useful information of the encrypted image. The numerical simulations and experimental results show that the proposed scheme is feasible with a higher security and a smaller key. For the 32 × 32 pixels image, the number of bits sent from Alice to Bob by using SSGIOE(M = 1024, N = 2048) scheme is only 0.0107 times over a computational ghost imaging optical encryption scheme.When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any information of the encrypted image. The extreme circumstance for the proposed SSGI-OE scheme is also discussed, where the eavesdropper begins to extract the information when ER is up to 15%.
基金Supported by the National Natural Science Foundation of China(No.60172029)
文摘A novel scheme of M-ary multi-carrier spread spectrum based on wavelet packet is proposed. Its performance is investigated for a multipath, slow Rayteigh fading channel. The performance advantages of the system over that based on DFT are demonstrated by both analytical and simulation methods.
基金supported by the Youth Science Fund,National Natural Science Foundation of China under Grant No.61102130
文摘According to the requirements of the high-sensitivity acquisition of Direct Sequence Spread Spectrum(DSSS) signals under ultrahigh dynamic environments in space communications, a three-dimensional joint search of the phase of Pseudo-Noise-code(PN-code),Doppler frequency and its rate-of-change is presented to achieve high sensitivity in sensing high-frequency dynamics. By eliminating the correlation peak loss caused by ultrahigh Doppler frequency and its rate-of-change offset,the proposed method improves the acquisition sensitivity by increasing the non-coherent accumulation time. The validity of the algorithm is proved by theoretical analysis and simulation results. It is shown that signals with a carrier- to-noise ratio as low as 39 dBHz can be captured with high performance when the Doppler frequency is up to ±1 MHz and its rate-of-change is up to ±200 kHz/s.
基金Sponsored by the National "863" Program Project (1010021310XXX)
文摘Aiming at improving acquisition performance for direct sequence spread spectrum (DSSS) signals, a new acquisition algorithm based on fast Fourier transform (FFT) is proposed. The code phases are parallel searched throughout the Doppler frequency domain. Since the influence of Doppler frequency errors on peak-to- average ratios of correlation power shows a pattern similar to the sinc function, it is our belief that by judging on peak-to-average ratios for different Doppler frequency errors false alarm probabilities should be lowered. Analyses have supported the underlying principle of this new algorithm. Simulation results have also indicated that the new algorithm can effectively improve the acquisition performance for DSSS signals.
基金supported in part by the China 863 Program grants 2007AA10Z235, 2007AA01Z179, 2006BAJ09B05, 2008BADA0B05the NSFC grants 60972073, 60871042, 60872049, and 60971082+1 种基金the China National Great Science Specifi c Project grant 2009ZX03003-011the China 973 Program grant 2009CB320407
文摘We study the transmission capacities of two coexisting spread-spectrum wireless networks (a primary network vs. a secondary network) that operate in the same geographic region and share the same spectrum. We defi ne transmission capacity as the product among the density of transmissions, the transmission rate, and the successful transmission probability. The primary (PR) network has a higher priority to access the spectrum without particular considerations for the secondary (SR) network, while the SR network limits its interference to the PR network by carefully controlling the density ofits transmitters. Considering two types of spread-spectrum transmission schemes (FH-CDMA and DS-CDMA) and the channel inversion power control mechanism, we quantify the transmission capacities for these two networks based on asymptotic analysis. Our results show that if the PR network permits a small increase ofits outage probability, the sum transmission capacities of the two networks (i.e., the overall spectrumefficiency per unit area) will be boosted significantly over that of a single network.
基金the National Natural Science Foundation of China(No.60172029)
文摘The proposed scheme is based on Discrete Fourier Transform (DFT) domain processing. The key technology of this scheme is jamming parameters' accurate estimation and jamming reconstruction. Compared with the 'threshold exciser' scheme the proposed scheme can eliminate more jamming energy on the whole frequency band with the minimum loss of useful signal energy. As shown in the research and simulation, the proposed scheme is much better than the 'threshold exciser' scheme, especially in the case of high power jamming whereas the 'threshold exciser' scheme might be invalid.
基金A part of this topic was presented at the SICE-ICCAS International Joint Conference[1](Busan, October 2006)
文摘Local position and attitude measurement methods are necessary for the navigation of autonomous robots and the other applications. In this paper, a 3D attitude measurement method is proposed. This method uses the spread spectrum modulated ultrasonic wave for the measurement of the pseudo-distance of each pathway between transmitter and receiver elements that are arranged in an array. The relative attitude between transmitter and receiver unit could be calculated from the relationship between these pseudo-distances. The use of spread spectrum modulation enables the high accuracy, noise tolerance, and coexistence of multiple transmitter devices by code division multiple access (CDMA) between transmitter and receiver elements. A pair of transmitter and receiver prototype for proposed method was manufactured, and the fundamental performance was examined in experiments. As a result, accuracy of σ=0.78 mm in the pseudo-distance measurement of each pathway between transmitter and receiver elements was confirmed, and about 0.01 rad resolution in the attitude measurement was also confirmed.
文摘The key to narrow-band interference excision in frequency domain is to determine the excision thresh- old in direct-sequence spread-spectrum (DS-SS) systems. The excision threshold is a non-linear function related to the number and the power of interference, and attempting to get the exact relation of threshold related to the number and the power of interference is almost impossible. The N-sigma algorithm determines the excision threshold using subsection function; however, the excision threshold determined by this method is not exact. A new method to determine the threshold of N-sigma algorithm is proposed. The new method modifies the scale factor N by use of the membership function. The threshold determined by this method is consecutive and smooth, and it is closer to the fact than that of the initial N-sigma algorithm. The GPS signal and single-tone (CW) interference (that is, typical narrow-band interference) are implemented in the simulation, and the results are presented to demonstrate the validity of the new algorithm.
基金National Natural Science Foundation of China(No.61471325)
文摘This paper introduces two kinds of sequences used in spread spectrum communication system: pseudo-noise (PN) se-quence generated by linear feedback shift register(LFSR), such as m-sequence and Gold sequence, and the chaotic sequence generated by the determination of the nonlinear system. The characteristics of PN sequence and chaotic sequence are analyzed by simulation, and the advantages and disadvantages of different sequences in spread spectrum communication system are ob-tained. The advantages of sequence can be used to improve signal transmission in a spread spectrum communication system.
文摘At present, with the progress and innovation of technology, the radar communication dual function wave has become a hot research at home and abroad. Excellent integrated waveform can make full use resources of combat platform, reduce the size of equipment, and realize the actual functionality of the reality of the battle-field without affecting the radar communication func-tion. The MSK-LFM dual-function wave is a typical representative;it is based on LFM, through the MSK modulation to achieve the integration function. This paper proposes a scheme of combining the spread spectrum technology with the MSK-LFM waveform based on the previous literature. The simulation results show that the waveform envelope is more stable and the energy is more concentrated. With the introduction of spread-spectrum technology, the new waveform ambiguity function graph is much closer to the thumbtack than the traditional MSK-LFM waveform.
文摘To improve the performance of short-range wireless communications, channel quality must be improved by avoiding interference and multi-path fading. Frequency hopping spread spectrum(FHSS) is a transmission technique where the carrier hops from frequency to frequency. For frequency hopping a mechanism must be designed so that the data can be transmitted in a clear channel and avoid congested channels. Adaptive frequency hopping is a system which is used to improve immunity toward frequency interference by avoiding using congested frequency channels in hopping sequence. In this paper mathematical modelling is used to simulate and analyze the performance improvement by using FHSS with popular modulation schemes, and also the hopping channel situations are investigated.
基金ThisprojectwassupportedbytheKeyProjectoftheNaturalScienceFoundationofChina (No .6 98310 30 )
文摘Performances of BPSK, balanced quaternary modulation, dual quaternary modulation and complex quaternary modulation in direct sequence spectrum spread (DS SS) system are discussed in this paper. Based on the criterion the power of original signal is the same, it is shown that complex quaternary modulation has the best performance, and dual quaternary modulation degrades 2dB. Moreover, the frequency efficient of the two modulations is 2bit/Hz. Balanced quaternary has the same performance as BPSK with frequency efficient 1bit/Hz.
文摘By the flexible redefinition of frequency-occupation and frequency-collision event, the frequency-(collision) probability of hybrid(DS/FH) spread spectrum network is analyzed. This probability is based on the simultaneous transmission number threshold and is discussed in synchronous and asynchronous circumstances respectively. And then, the network throughput based on the packet correct reception probability is analyzed. Two models which have finite and infinite population respectively is discussed. At last, the numerical results are given.
文摘Frequency Hopping Spread Spectrum (FHSS) system is often deployed to protect wireless communication from jamming or to preclude undesired reception of the signal. Such themes can only be achieved if the jammer or undesired receiver does not have the knowledge of the spreading code. For this reason, unencrypted M-sequences are a deficient choice for the spreading code when a high level of security is required. The primary objective of this paper is to analyze vulnerability of linear feedback shift register (LFSRs) codes. Then, a new method based on encryption algorithm applied over spreading codes, named hidden frequency hopping is proposed to improve the security of FHSS. The proposed encryption security algorithm is highly reliable, and can be applied to all existing data communication systems based on spread spectrum techniques. Since the multi-user detection is an inherent characteristic for FHSS, the multi-user interference must be studied carefully. Hence, a new method called optimum pair “key-input” selection is proposed which reduces interference below the desired constant threshold.
文摘The proposed method inserts a watermark into the spectral components of the data using techniques analogous to spread spectrum communications, hiding a narrow band signal in a wideband channel. The watermark is difficult for an attacker to remove. It is also robust to common signal and geometric distortion such as JPEG compression, cropping and scaling. In addition, the watermark can be extracted accurately without source host image at the receiver. Key words digital watermark - spread spectrum techniques - wavelet transform CLC number TN 911.73 - X 913. 2 Foundation item: Supported by Wuhan University Innovation Foundation (904270072)Biography: Shao Hai-mei (1975-), female, lecturer, research direction: wavelet application, image process, digital watermark.
文摘This paper discusses the requirements for the cancellation of leakage signal, analyzes in detail the principals of cancelling leakage signal in microwave and IF band, and proposes the schemes to realize adaptive cancellation. Computer analog has shown that the proposed scheme has a very high convergence speed and can reach a high cancellation ratio.
基金supported by the National Natural Science Foundation of China under Grant No.61271168
文摘An idea of estimating the direct sequence spread spectrum(DSSS) signal pseudo-noise(PN) sequence is presented. Without the apriority knowledge about the DSSS signal in the non-cooperation condition, we propose a self-organizing feature map(SOFM) neural network algorithm to detect and identify the PN sequence. A non-supervised learning algorithm is proposed according the Kohonen rule in SOFM. The blind algorithm can also estimate the PN sequence in a low signal-to-noise(SNR) and computer simulation demonstrates that the algorithm is effective. Compared with the traditional correlation algorithm based on slip-correlation, the proposed algorithm's bit error rate(BER) and complexity are lower.