By Topic

Signal Design and Its Applications in Communications, 2007. IWSDA 2007. 3rd International Workshop on

Date 23-27 Sept. 2007

Filter Results

Displaying Results 1 - 25 of 89
  • New Direction of Wireless Technology

    Publication Year: 2007 , Page(s): 1
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1034 KB) |  | HTML iconHTML  

    The 3rd generation (3G) mobile wireless communications systems based on direct-sequence code division multiple access (DS-CDMA) technique were put into services, with much higher data rates than the present 2G systems, in many countries and their deployment speed has since accelerated. 3G systems will be continuously evolving with high speed downlink packet access (HSDPA) technique, mul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithm for the k-error linear complexity of a sequence with period 2pn over GF(q)

    Publication Year: 2007 , Page(s): 104 - 108
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (364 KB) |  | HTML iconHTML  

    We first optimize the structure of the Wei-Xiao-Chen algorithm for the linear complexity of sequences over GF(q) with period N = 2pn, where p and q are odd primes, and q is a primitive root ( mod p2). Then the union cost is used, so that an efficient algorithm for computing k-error linear complexity of a sequence with period 2pn over GF(q) is derived, where p and q... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Security Video Watermarking Scheme for Broadcast Monitoring

    Publication Year: 2007 , Page(s): 109 - 113
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1920 KB) |  | HTML iconHTML  

    Identification and verification of a video clip via its fingerprint find applications in broadcast monitoring, database search and transaction tracking. For broadcast monitoring, we propose a novel robust hashing algorithm for video based on the 3-D wavelet transform (3D-DWT). Then the watermark information and the short fingerprint using the proposed hash algorithm are combined to create the embe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Shift Bound for Cyclic Codes by DFT with Unknown Elements

    Publication Year: 2007 , Page(s): 114 - 117
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (262 KB) |  | HTML iconHTML  

    The shift bound is a good lower bound of the minimum distance for cyclic codes, Reed-Muller codes and geometric Goppa codes. In this paper we consider cyclic codes defined by defining sequence and new simple derivation using the discrete Fourier transform with unknown elements and the Blahut theorem is shown. Moreover two examples of binary cyclic codes are given. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consideration of fast simulation technique of LDPC code

    Publication Year: 2007 , Page(s): 118 - 122
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3181 KB) |  | HTML iconHTML  

    This paper proposes a method to estimate bit-error rate (BER) at high signal-to-noise ratio. The computer simulation result of the proposed method shows good agreement with those of the original Monte Carlo (MC) simulations. By using the proposed method, the number of bits needed to computer simulation is reduced to 50% of the MC simulation for code length 1027[bit], It is reduced to 20% compared ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Existence of Multilevel Hadamard Matrices with Odd Order

    Publication Year: 2007 , Page(s): 123 - 127
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (4498 KB) |  | HTML iconHTML  

    The multilevel (n-ary) Hadamard matrices, which are related to orthogonal matrices or orthogonal designs, are investigated in this paper. It is assumed that all matrix elements are integers, which make the binary Hadamard matrices as special cases of multilevel (n-ary) Hadamard matrices. It is shown that the multilevel Hadamard matrices of odd order do exist if only two different matrix elements a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quotient Subcode Set and Inverse Relative Dimension/Length Profile

    Publication Year: 2007 , Page(s): 128 - 132
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (414 KB) |  | HTML iconHTML  

    The generalized hamming weight played an important role in coding theory. In the study of the wiretap channel of type II, the generalized hamming weight was extended to a two-code format. Two equivalent concepts of the generalized hamming weight hierarchy and its two-code format, are the inverse dimension/length profile (IDLP) and the inverse relative dimension/length profile (IRDLP), respectively... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AOA Estimation Based on MP Algorithm in Beam-Space Using Rotational Invariance Technique

    Publication Year: 2007 , Page(s): 13 - 17
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3966 KB) |  | HTML iconHTML  

    A novel algorithm using Rotational Invariance technique for AOA estimation is presented in this paper, which is based on sparse decomposition of signal, and applied into beam-space against the deficiencies of traditional DF algorithms and sub-space algorithms. The former methods are widely used in actual applications. However, they have many drawbacks such as low-resolution, bad robustness and etc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Genetic Algorithm for QOS Multicast Routing

    Publication Year: 2007 , Page(s): 133 - 137
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3580 KB) |  | HTML iconHTML  

    Aiming at the problem of multicast routing with multiple QoS constraint, such as delay, bandwidth, losing rate, a new genetic algorithm is brought up based on the k-th shortest path in this paper. Our algorithm outputs an approximate Steiner tree satisfying all QoS constraint of multicast request in a network with e edges and v vertices, in time O(e+vlogv+kv). Under the genet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Bit and Power Allocation Algorithm in Multi-Carrier CDMA

    Publication Year: 2007 , Page(s): 138 - 142
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (4646 KB) |  | HTML iconHTML  

    Multi-carrier code division multiple access (MC-CDMA) is a promising candidate for the air interface of 4G wireless networks. In MC-CDMA systems, a number of sub carriers per user are used for the high-rate data transmission, and each data modulated by a different sub earlier is transmitted through a different frequency band. Each data undergoes a different channel condition and arrives with a dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security of GPT-like public-key cryptosystems based on linear rank codes

    Publication Year: 2007 , Page(s): 143 - 147
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (389 KB) |  | HTML iconHTML  

    Recent structural attacks on the GPT cryptosystem and variants are reviewed. The equivalency of different forms of cryptosystems is shown and the general form for the purpose of cryptanalysis is stated. The published structural attacks are turned out to be either polynomial, or exponential, depending on parameters of the cryptosystem. The secure choice of parameters is suggested for avoiding polyn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Full Diversity, High Rate Space-time Block Coding Scheme

    Publication Year: 2007 , Page(s): 148 - 151
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2157 KB) |  | HTML iconHTML  

    A novel space-time block coding (STBC) scheme for four transmit antennas is proposed based on the binary phase shift keying (BPSK) constellation modulation. The new scheme achieves full diversity full rate. And it also can achieve linear decoding at receiver, so the decoding complexity at receiver is greatly reduced. Because the scheme can achieve full diversity, good performance can be obtained n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Efficient Check Node Update Method for Improved Min-Sum LDPC Decoding

    Publication Year: 2007 , Page(s): 152 - 156
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3236 KB) |  | HTML iconHTML  

    This paper has presented various min-sum related LDPC decoding algorithms and their typical hardware architectures of check node update in the scenario of parallel implementation. For one check node update of normalized min-sum algorithm, if the current row weight is dc, dc multiplications are needed. If dc is large, dc multiplications are needed, which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partial Correlations of Galois Ring Sequences

    Publication Year: 2007 , Page(s): 157 - 161
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (406 KB) |  | HTML iconHTML  

    Galois ring m-sequences were introduced in the late 1980s and early 1990s, and have near-optimal full periodic correlations. They are related to Z4-linear codes, and are used in CDMA communications. We consider periodic correlation and obtain algebraic expressions of the first two partial period correlation moments of these sequences. These correlation moments have applications in synch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autocorrelation of Some Quaternary Cyclotomic Sequences of Length 2p

    Publication Year: 2007 , Page(s): 162 - 166
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (360 KB) |  | HTML iconHTML  

    We define a new quaternary cyclotomic sequences of length 2p, where p is an odd prime. We compute the autocorrelation of these sequences. In terms of magnitude, these 4 values. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expanded LS Code in MC-DC-CDMA system

    Publication Year: 2007 , Page(s): 167 - 171
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (331 KB) |  | HTML iconHTML  

    This paper presents a novel multicarrier DS-CDMA scheme based on the loosely synchronous (LS) codes, which can achieve very high spectral efficiency and better performance. We present a method to extend LS code on complex plan, with detail description of its construction, and give proof of some properties on such code. At last, simulation results show that the example code has better performance t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Poly Phase Zero-Correlation Zone Sequences based on Complete Complementary Codes and DFT matrix

    Publication Year: 2007 , Page(s): 172 - 175
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (291 KB) |  | HTML iconHTML  

    Recently, numerous constructions of zero correlation zone (ZCZ) sequences have been introduced e.g. based on perfect sequences and complete complementary codes etc.. However, the previous construction method which based on complete complementary code is lacking for merit figures when none of whose elements are zero. In this paper, a new construction method of ZCZ sequences based on complete comple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finite-Length Sequence Pairs With Impulsive Convolution and Their Application to Asymmetric-Key Spread Spectrum Communication System

    Publication Year: 2007 , Page(s): 176 - 180
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (325 KB) |  | HTML iconHTML  

    In an ad-hoc communication system, the information security between a sender and a receiver must be assured strictly. In this paper, finite-length sequence pairs are introduced for the application to an asymmetric-key spread spectrum communication system. The convolution of the sequence pair gives an impulse except the small values at the first and last ends. The real-valued sequence pairs of leng... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wideband Signal DOA Estimation Based on MP Decomposition

    Publication Year: 2007 , Page(s): 18 - 21
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2232 KB) |  | HTML iconHTML  

    A novel DOA estimation algorithm based on MP decomposition has been proposed. The atom dictionary of the new algorithm is based on the array geometry, and the algorithm is applicable for any phase differentiable signals, both wideband and narrow band signals. Computer simulations demonstrated that the accuracy of this algorithm is better than the algorithm based on WVD. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Properties of Even-Shift Orthogonal Sequences

    Publication Year: 2007 , Page(s): 181 - 184
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (319 KB) |  | HTML iconHTML  

    This paper investigates properties of the even-shift orthogonal sequence of length 2n, whose out-of-phase aperiodic auto-correlation function takes zero at any even shift. It is shown that the halves of all E-sequences with odd n produced by logic functions are balanced sequences, whose elements 1 and -1 appear half, and there is not any balanced e-sequence for even n. Furthermore it is also shown... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Construction of ZCZ Arrays Set Based on Interleaved Technique

    Publication Year: 2007 , Page(s): 185 - 189
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (315 KB) |  | HTML iconHTML  

    A new construction method of ZCZ arrays set based on interleaved technique is presented. Given perfect periodic autocorrelation array and orthogonal matrix, arrays set with certain zero correlation zone can be constructed through interleaved method. The presented technique has good application foreground in many kinds of array signal design. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recursion Subspace-Based Method for Bearing Estimation

    Publication Year: 2007 , Page(s): 190 - 194
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (516 KB) |  | HTML iconHTML  

    In this paper, a recursion subspace-based method (RSM) is presented to estimate the bearings of incident signals impinging on a uniform linear array (ULA). Unlike the existing linear operation based methods, such as the signal subspace method without eigendecomposition (SUMWE) of Xin et al, that calculate the noise subspace, the RSM method finds a cleaner signal subspace by means of a successive r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new family of optimal zero correlation zone sequences from Perfect Sequences Based on Interleaved Technique

    Publication Year: 2007 , Page(s): 195 - 199
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (389 KB) |  | HTML iconHTML  

    In this paper, we present a new method for construction of zero correlation zone (ZCZ) sequence sets, which are optimal with respect to Tang, Fan, and Matsu-fuji bound. The method proposed is based on interleaved technique and a perfect sequence of length m(2k + 1) with m >2, k ges 0. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Almost Perfect Nonlinear Functions

    Publication Year: 2007 , Page(s): 2
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (921 KB) |  | HTML iconHTML  

    A function F:F[unk]¿F[unk] is almost perfect nonlinear (APN) if, for every a¿0, b in F[unk], the equation F(x)+ F(x+a)=b has at most two solutions [4]. When used as an S-box in a block cipher, it opposes then an optimum resistance to differential cryptanalysis. The function F is almost bent (AB) if the minimum Hamming distance between all its component functions v·F, v ¿ F[unk]{0}, where "·" ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Zero Correlation Distribution of ZCZ Sequences Obtained from a Perfect Sequence and a Unitary Matrix

    Publication Year: 2007 , Page(s): 200 - 203
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (241 KB) |  | HTML iconHTML  

    A class of zero-correlation zone (ZCZ) sequences constructed by the recursive procedure from a perfect sequence and a unitary matrix was proposed by Torii, Nakamura, and Suehiro (2004). In the reference H. Torii et al. (2004), properties of just enough for the class of sequences used in approximately synchronized CDMA (AS-CDMA) systems were considered. In this paper, we give more detailed distribu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.