The construction and specifications of a surface acoustic wave storage correlator are described. A time domain processing mode spread spectrum system is presented. An analysis of the interference rejection for this sy...The construction and specifications of a surface acoustic wave storage correlator are described. A time domain processing mode spread spectrum system is presented. An analysis of the interference rejection for this system is provided. The formula for calculating the probability of error of the system is given. The experimental results agree with the theoretical analysis.展开更多
This paper analyzes the performance of both in-band and outband narrowband interference suppression in orthogonal code modulation spread spectrum system, and compares with conventional spread spectrum system at the sa...This paper analyzes the performance of both in-band and outband narrowband interference suppression in orthogonal code modulation spread spectrum system, and compares with conventional spread spectrum system at the same information transmission rate and spread spectrum bandwidth. Simulation results indicate that the antijamming (narrowband interference) performance obtained from orthogonal code modulation spread spectrum system is much better than that from conventional spread spectrum system.展开更多
A method is presented for the detection and parameter estimation of a single Linear Frequency Modulation (LFM) signal in spread spectrum systems based on Wigner Hough Transform (WHT) , followed by the theoreti...A method is presented for the detection and parameter estimation of a single Linear Frequency Modulation (LFM) signal in spread spectrum systems based on Wigner Hough Transform (WHT) , followed by the theoretical analysis. A simulation result is given to show the effectiveness of this method.展开更多
An optical encryption(OE) scheme based on the spread spectrum ghost imaging(SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadam...An optical encryption(OE) scheme based on the spread spectrum ghost imaging(SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadamard matrix of order N is used as the secure key, and shared with the authorized user, Bob, through a private channel. Each corresponding row vector of the order-N Hadamard matrix is then used as the direct sequence code to modulate a speckle pattern for the ghost imaging system, and an image is encrypted with the help of the SSGI. The measurement results from the bucket detector, named as ciphertext, are then transmitted to Bob through a public channel. The illuminating speckle patterns are also shared with Bob by the public channel. With the correct secure key, Bob could reconstruct the image with the aid of the SSGI system, whereas the unauthorized user, Eve, could not obtain any useful information of the encrypted image. The numerical simulations and experimental results show that the proposed scheme is feasible with a higher security and a smaller key. For the 32 × 32 pixels image, the number of bits sent from Alice to Bob by using SSGIOE(M = 1024, N = 2048) scheme is only 0.0107 times over a computational ghost imaging optical encryption scheme.When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any information of the encrypted image. The extreme circumstance for the proposed SSGI-OE scheme is also discussed, where the eavesdropper begins to extract the information when ER is up to 15%.展开更多
The key to narrow-band interference excision in frequency domain is to determine the excision thresh- old in direct-sequence spread-spectrum (DS-SS) systems. The excision threshold is a non-linear function related t...The key to narrow-band interference excision in frequency domain is to determine the excision thresh- old in direct-sequence spread-spectrum (DS-SS) systems. The excision threshold is a non-linear function related to the number and the power of interference, and attempting to get the exact relation of threshold related to the number and the power of interference is almost impossible. The N-sigma algorithm determines the excision threshold using subsection function; however, the excision threshold determined by this method is not exact. A new method to determine the threshold of N-sigma algorithm is proposed. The new method modifies the scale factor N by use of the membership function. The threshold determined by this method is consecutive and smooth, and it is closer to the fact than that of the initial N-sigma algorithm. The GPS signal and single-tone (CW) interference (that is, typical narrow-band interference) are implemented in the simulation, and the results are presented to demonstrate the validity of the new algorithm.展开更多
Serveral methods for the pararrel acquisition of a PN sequence in a baseband direct sequence spread spectrum system are investigated. Four different kinds of schemes are considered: the optimal estimation scheme, the ...Serveral methods for the pararrel acquisition of a PN sequence in a baseband direct sequence spread spectrum system are investigated. Four different kinds of schemes are considered: the optimal estimation scheme, the locally optimal estimation scheme, the optimal testing searches and the locally optimal testing scheme. In the four kinds of parallel acquisition schemes, the expressions for the probability of error are given and compared with the actual error probabilities obtained via Monte Carlo simulation. We also outline a technique that can be suboptimal because of a large amount of hardware and computation when using the parallel acquisition schemes.展开更多
Performances of BPSK, balanced quaternary modulation, dual quaternary modulation and complex quaternary modulation in direct sequence spectrum spread (DS SS) system are discussed in this paper. Based on the crit...Performances of BPSK, balanced quaternary modulation, dual quaternary modulation and complex quaternary modulation in direct sequence spectrum spread (DS SS) system are discussed in this paper. Based on the criterion the power of original signal is the same, it is shown that complex quaternary modulation has the best performance, and dual quaternary modulation degrades 2dB. Moreover, the frequency efficient of the two modulations is 2bit/Hz. Balanced quaternary has the same performance as BPSK with frequency efficient 1bit/Hz.展开更多
It is a necessary step to estimate the spreading sequence of direct sequence spread spectrum (DSSS) signal for blind despreading and demodulation in non-cooperative communications. Two innovative and effective detec...It is a necessary step to estimate the spreading sequence of direct sequence spread spectrum (DSSS) signal for blind despreading and demodulation in non-cooperative communications. Two innovative and effective detection statistics are proposed to implement the synchronization and spreading sequence estimation procedure. The proposed algorithm also has a low computational complexity with only linear additions and modifications. Theoretical analysis and simulation results show that the algorithm performs quite well in low SNR environment, and is much better than all the existing typical algorithms with a comprehensive consideration both in performance and computational complexity.展开更多
Aiming at improving acquisition performance for direct sequence spread spectrum (DSSS) signals, a new acquisition algorithm based on fast Fourier transform (FFT) is proposed. The code phases are parallel searched ...Aiming at improving acquisition performance for direct sequence spread spectrum (DSSS) signals, a new acquisition algorithm based on fast Fourier transform (FFT) is proposed. The code phases are parallel searched throughout the Doppler frequency domain. Since the influence of Doppler frequency errors on peak-to- average ratios of correlation power shows a pattern similar to the sinc function, it is our belief that by judging on peak-to-average ratios for different Doppler frequency errors false alarm probabilities should be lowered. Analyses have supported the underlying principle of this new algorithm. Simulation results have also indicated that the new algorithm can effectively improve the acquisition performance for DSSS signals.展开更多
By the flexible redefinition of frequency-occupation and frequency-collision event, the frequency-(collision) probability of hybrid(DS/FH) spread spectrum network is analyzed. This probability is based on the simultan...By the flexible redefinition of frequency-occupation and frequency-collision event, the frequency-(collision) probability of hybrid(DS/FH) spread spectrum network is analyzed. This probability is based on the simultaneous transmission number threshold and is discussed in synchronous and asynchronous circumstances respectively. And then, the network throughput based on the packet correct reception probability is analyzed. Two models which have finite and infinite population respectively is discussed. At last, the numerical results are given.展开更多
An idea of estimating the direct sequence spread spectrum(DSSS) signal pseudo-noise(PN) sequence is presented. Without the apriority knowledge about the DSSS signal in the non-cooperation condition, we propose a s...An idea of estimating the direct sequence spread spectrum(DSSS) signal pseudo-noise(PN) sequence is presented. Without the apriority knowledge about the DSSS signal in the non-cooperation condition, we propose a self-organizing feature map(SOFM) neural network algorithm to detect and identify the PN sequence. A non-supervised learning algorithm is proposed according the Kohonen rule in SOFM. The blind algorithm can also estimate the PN sequence in a low signal-to-noise(SNR) and computer simulation demonstrates that the algorithm is effective. Compared with the traditional correlation algorithm based on slip-correlation, the proposed algorithm's bit error rate(BER) and complexity are lower.展开更多
The proposed method inserts a watermark into the spectral components of the data using techniques analogous to spread spectrum communications, hiding a narrow band signal in a wideband channel. The watermark is diffic...The proposed method inserts a watermark into the spectral components of the data using techniques analogous to spread spectrum communications, hiding a narrow band signal in a wideband channel. The watermark is difficult for an attacker to remove. It is also robust to common signal and geometric distortion such as JPEG compression, cropping and scaling. In addition, the watermark can be extracted accurately without source host image at the receiver. Key words digital watermark - spread spectrum techniques - wavelet transform CLC number TN 911.73 - X 913. 2 Foundation item: Supported by Wuhan University Innovation Foundation (904270072)Biography: Shao Hai-mei (1975-), female, lecturer, research direction: wavelet application, image process, digital watermark.展开更多
Based on the electrical model of body area communication, the change tendency of chan nel gain in 100 kHz 10 MHz band was experimentally analyzed and verified. Results show that chan nel gain was flat and signal a...Based on the electrical model of body area communication, the change tendency of chan nel gain in 100 kHz 10 MHz band was experimentally analyzed and verified. Results show that chan nel gain was flat and signal attenuation was approximately 43 dB in 1 MHz 10 MHz band. The char acteristics of the channel were taken into account in the design of body area spread spectrum com munication and its multiuser receiver issue. BER Eb/No curves of single user and multiuser were de rived by simulation. The characteristics of body area commutation channel were studied and the fea sibility of introducing spread spectrum theory to body area communication was verified.展开更多
This paper discusses the requirements for the cancellation of leakage signal, analyzes in detail the principals of cancelling leakage signal in microwave and IF band, and proposes the schemes to realize adaptive cance...This paper discusses the requirements for the cancellation of leakage signal, analyzes in detail the principals of cancelling leakage signal in microwave and IF band, and proposes the schemes to realize adaptive cancellation. Computer analog has shown that the proposed scheme has a very high convergence speed and can reach a high cancellation ratio.展开更多
Traditional lapped transform domain excision techniques obtain good performance at the expense of increased processing delay. Extension of transform domain filtering techniques to the lapped biorthogonal transform dom...Traditional lapped transform domain excision techniques obtain good performance at the expense of increased processing delay. Extension of transform domain filtering techniques to the lapped biorthogonal transform domain can help solve the problem. By incorporating biorthogonality into the lapped transforms, more flexibility is obtained in the design of windows. Thus transform bases with better stopband attenuation can be generated by designing windows, but not by increasing the overlapping factor. In this paper, a new modulated lapped biorthogonal transform (MLBT) with optimized windows is introduced for efficient compression of multi-tone interfering signal energy. The bit error rate (BER) performance of the receiver employing the proposed MLBT excision technique is analyzed and compared with that of the lapped transform domain excision-based receivers. Simulation results demonstrate the improved performance and increased robustness of the proposed technique.展开更多
In the present work, a direction of arrival estimator, under spread spectrum reference of signal-assisted radio operating in a Rayleigh fading channel, is proposed. The analysis, which is applied to general receiver a...In the present work, a direction of arrival estimator, under spread spectrum reference of signal-assisted radio operating in a Rayleigh fading channel, is proposed. The analysis, which is applied to general receiver antenna array configurations, demonstrates the high performance of the estimator which is due to the double dispreading (code word and reference signal). The probability distribution function of the estimator is extracted and the system’s robustness in regard to large number of interferers is demonstrated.展开更多
The influence of the longitudinal acceleration and the angular acceleration of detecting target based on vortex electromagnetic waves in keyhole space are analyzed.The spectrum spreads of different orbital angular mom...The influence of the longitudinal acceleration and the angular acceleration of detecting target based on vortex electromagnetic waves in keyhole space are analyzed.The spectrum spreads of different orbital angular momentum(OAM)modes in different non-line-of-sight situations are simulated.The errors of target accelerations in detection are calculated and compared based on the OAM spectra spreading by using two combinations of composite OAM modes in the keyhole space.According to the research,the effects about spectrum spreads of higher OAM modes are more obvious.The error in detection is mainly affected by OAM spectrum spreading,which can be reduced by reasonably using different combinations of OAM modes in different practical situations.The above results provide a reference idea for investigating keyhole effect when vortex electromagnetic wave is used to detect accelerations.展开更多
基金Supported by the National Postdoctoral Science Fund of China
文摘The construction and specifications of a surface acoustic wave storage correlator are described. A time domain processing mode spread spectrum system is presented. An analysis of the interference rejection for this system is provided. The formula for calculating the probability of error of the system is given. The experimental results agree with the theoretical analysis.
文摘This paper analyzes the performance of both in-band and outband narrowband interference suppression in orthogonal code modulation spread spectrum system, and compares with conventional spread spectrum system at the same information transmission rate and spread spectrum bandwidth. Simulation results indicate that the antijamming (narrowband interference) performance obtained from orthogonal code modulation spread spectrum system is much better than that from conventional spread spectrum system.
文摘A method is presented for the detection and parameter estimation of a single Linear Frequency Modulation (LFM) signal in spread spectrum systems based on Wigner Hough Transform (WHT) , followed by the theoretical analysis. A simulation result is given to show the effectiveness of this method.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61871234 and 62001249)the Postgraduate Research&Practice Innovation Program of Jiangsu Province(Grant No.KYCX200729)+3 种基金the Natural Science Research Project of Higher Education of Jiangsu Province(Grant No.20KJB510030)the Qing Lan Project of Jiangsu Province(Su Teacher’s Letter[2022]No.29)the Research project of NanJing Tech University Pujiang Institute(Grant No.njpj2022-1-25)the Priority Academic Program Development of Jiangsu Higher Education Institutions.
文摘An optical encryption(OE) scheme based on the spread spectrum ghost imaging(SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadamard matrix of order N is used as the secure key, and shared with the authorized user, Bob, through a private channel. Each corresponding row vector of the order-N Hadamard matrix is then used as the direct sequence code to modulate a speckle pattern for the ghost imaging system, and an image is encrypted with the help of the SSGI. The measurement results from the bucket detector, named as ciphertext, are then transmitted to Bob through a public channel. The illuminating speckle patterns are also shared with Bob by the public channel. With the correct secure key, Bob could reconstruct the image with the aid of the SSGI system, whereas the unauthorized user, Eve, could not obtain any useful information of the encrypted image. The numerical simulations and experimental results show that the proposed scheme is feasible with a higher security and a smaller key. For the 32 × 32 pixels image, the number of bits sent from Alice to Bob by using SSGIOE(M = 1024, N = 2048) scheme is only 0.0107 times over a computational ghost imaging optical encryption scheme.When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any information of the encrypted image. The extreme circumstance for the proposed SSGI-OE scheme is also discussed, where the eavesdropper begins to extract the information when ER is up to 15%.
文摘The key to narrow-band interference excision in frequency domain is to determine the excision thresh- old in direct-sequence spread-spectrum (DS-SS) systems. The excision threshold is a non-linear function related to the number and the power of interference, and attempting to get the exact relation of threshold related to the number and the power of interference is almost impossible. The N-sigma algorithm determines the excision threshold using subsection function; however, the excision threshold determined by this method is not exact. A new method to determine the threshold of N-sigma algorithm is proposed. The new method modifies the scale factor N by use of the membership function. The threshold determined by this method is consecutive and smooth, and it is closer to the fact than that of the initial N-sigma algorithm. The GPS signal and single-tone (CW) interference (that is, typical narrow-band interference) are implemented in the simulation, and the results are presented to demonstrate the validity of the new algorithm.
文摘Serveral methods for the pararrel acquisition of a PN sequence in a baseband direct sequence spread spectrum system are investigated. Four different kinds of schemes are considered: the optimal estimation scheme, the locally optimal estimation scheme, the optimal testing searches and the locally optimal testing scheme. In the four kinds of parallel acquisition schemes, the expressions for the probability of error are given and compared with the actual error probabilities obtained via Monte Carlo simulation. We also outline a technique that can be suboptimal because of a large amount of hardware and computation when using the parallel acquisition schemes.
基金ThisprojectwassupportedbytheKeyProjectoftheNaturalScienceFoundationofChina (No .6 98310 30 )
文摘Performances of BPSK, balanced quaternary modulation, dual quaternary modulation and complex quaternary modulation in direct sequence spectrum spread (DS SS) system are discussed in this paper. Based on the criterion the power of original signal is the same, it is shown that complex quaternary modulation has the best performance, and dual quaternary modulation degrades 2dB. Moreover, the frequency efficient of the two modulations is 2bit/Hz. Balanced quaternary has the same performance as BPSK with frequency efficient 1bit/Hz.
基金supported by the Specialized Research Fund for the Doctoral Program of Higher Education (20060003032)
文摘It is a necessary step to estimate the spreading sequence of direct sequence spread spectrum (DSSS) signal for blind despreading and demodulation in non-cooperative communications. Two innovative and effective detection statistics are proposed to implement the synchronization and spreading sequence estimation procedure. The proposed algorithm also has a low computational complexity with only linear additions and modifications. Theoretical analysis and simulation results show that the algorithm performs quite well in low SNR environment, and is much better than all the existing typical algorithms with a comprehensive consideration both in performance and computational complexity.
基金Sponsored by the National "863" Program Project (1010021310XXX)
文摘Aiming at improving acquisition performance for direct sequence spread spectrum (DSSS) signals, a new acquisition algorithm based on fast Fourier transform (FFT) is proposed. The code phases are parallel searched throughout the Doppler frequency domain. Since the influence of Doppler frequency errors on peak-to- average ratios of correlation power shows a pattern similar to the sinc function, it is our belief that by judging on peak-to-average ratios for different Doppler frequency errors false alarm probabilities should be lowered. Analyses have supported the underlying principle of this new algorithm. Simulation results have also indicated that the new algorithm can effectively improve the acquisition performance for DSSS signals.
文摘By the flexible redefinition of frequency-occupation and frequency-collision event, the frequency-(collision) probability of hybrid(DS/FH) spread spectrum network is analyzed. This probability is based on the simultaneous transmission number threshold and is discussed in synchronous and asynchronous circumstances respectively. And then, the network throughput based on the packet correct reception probability is analyzed. Two models which have finite and infinite population respectively is discussed. At last, the numerical results are given.
基金supported by the National Natural Science Foundation of China under Grant No.61271168
文摘An idea of estimating the direct sequence spread spectrum(DSSS) signal pseudo-noise(PN) sequence is presented. Without the apriority knowledge about the DSSS signal in the non-cooperation condition, we propose a self-organizing feature map(SOFM) neural network algorithm to detect and identify the PN sequence. A non-supervised learning algorithm is proposed according the Kohonen rule in SOFM. The blind algorithm can also estimate the PN sequence in a low signal-to-noise(SNR) and computer simulation demonstrates that the algorithm is effective. Compared with the traditional correlation algorithm based on slip-correlation, the proposed algorithm's bit error rate(BER) and complexity are lower.
文摘The proposed method inserts a watermark into the spectral components of the data using techniques analogous to spread spectrum communications, hiding a narrow band signal in a wideband channel. The watermark is difficult for an attacker to remove. It is also robust to common signal and geometric distortion such as JPEG compression, cropping and scaling. In addition, the watermark can be extracted accurately without source host image at the receiver. Key words digital watermark - spread spectrum techniques - wavelet transform CLC number TN 911.73 - X 913. 2 Foundation item: Supported by Wuhan University Innovation Foundation (904270072)Biography: Shao Hai-mei (1975-), female, lecturer, research direction: wavelet application, image process, digital watermark.
基金Supported by the Ministerial Level Advanced Research Foundation(7130819)
文摘Based on the electrical model of body area communication, the change tendency of chan nel gain in 100 kHz 10 MHz band was experimentally analyzed and verified. Results show that chan nel gain was flat and signal attenuation was approximately 43 dB in 1 MHz 10 MHz band. The char acteristics of the channel were taken into account in the design of body area spread spectrum com munication and its multiuser receiver issue. BER Eb/No curves of single user and multiuser were de rived by simulation. The characteristics of body area commutation channel were studied and the fea sibility of introducing spread spectrum theory to body area communication was verified.
文摘This paper discusses the requirements for the cancellation of leakage signal, analyzes in detail the principals of cancelling leakage signal in microwave and IF band, and proposes the schemes to realize adaptive cancellation. Computer analog has shown that the proposed scheme has a very high convergence speed and can reach a high cancellation ratio.
文摘Traditional lapped transform domain excision techniques obtain good performance at the expense of increased processing delay. Extension of transform domain filtering techniques to the lapped biorthogonal transform domain can help solve the problem. By incorporating biorthogonality into the lapped transforms, more flexibility is obtained in the design of windows. Thus transform bases with better stopband attenuation can be generated by designing windows, but not by increasing the overlapping factor. In this paper, a new modulated lapped biorthogonal transform (MLBT) with optimized windows is introduced for efficient compression of multi-tone interfering signal energy. The bit error rate (BER) performance of the receiver employing the proposed MLBT excision technique is analyzed and compared with that of the lapped transform domain excision-based receivers. Simulation results demonstrate the improved performance and increased robustness of the proposed technique.
文摘In the present work, a direction of arrival estimator, under spread spectrum reference of signal-assisted radio operating in a Rayleigh fading channel, is proposed. The analysis, which is applied to general receiver antenna array configurations, demonstrates the high performance of the estimator which is due to the double dispreading (code word and reference signal). The probability distribution function of the estimator is extracted and the system’s robustness in regard to large number of interferers is demonstrated.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.11804073 and 61775050).
文摘The influence of the longitudinal acceleration and the angular acceleration of detecting target based on vortex electromagnetic waves in keyhole space are analyzed.The spectrum spreads of different orbital angular momentum(OAM)modes in different non-line-of-sight situations are simulated.The errors of target accelerations in detection are calculated and compared based on the OAM spectra spreading by using two combinations of composite OAM modes in the keyhole space.According to the research,the effects about spectrum spreads of higher OAM modes are more obvious.The error in detection is mainly affected by OAM spectrum spreading,which can be reduced by reasonably using different combinations of OAM modes in different practical situations.The above results provide a reference idea for investigating keyhole effect when vortex electromagnetic wave is used to detect accelerations.