Advanced Search

2013 Vol. 35, No. 7

Display Method:
Articles
Fast Wavenumber Domain Imaging Algorithm for Airborne Downward-looking Array 3D-SAR Based on Region of Interest Pick
Peng Xue-Ming, Wang Yan-Ping, Tan Wei-Xian, Hong Wen, Wu Yi-Rong
2013, 35(7): 1525-1531. doi: 10.3724/SP.J.1146.2012.01287
Abstract:
3D wavenumber domain imaging algorithm takes no approximation of the range course and owns high image reconstruction precision. The cross-track dimensional array length is much shorter than cross-track dimensional imaging swath in downward-looking ar...
Multi-band Fusion Imaging Based on High Precision Parameter Estimation of Geometrical Theory of Diffraction Model
Tian Biao, Liu Yang, Xu Shi-You, Chen Zeng-Ping
2013, 35(7): 1532-1539. doi: 10.3724/SP.J.1146.2012.01364
Abstract:
This paper focuses on multi-band fusion imaging. A method based on high-precision parameter estimation of Geometrical Theory of Diffraction (GTD) model is given. It makes use of the phase difference of pole and scattering coefficient between the all-...
Inverse Synthetic Aperture Ladar Imaging Algorithm for Maneuvering Target Based on FRFT-CLEAN
Ruan Hang, Wu Yan-Hong, Ye Wei
2013, 35(7): 1540-1546. doi: 10.3724/SP.J.1146.2012.01423
Abstract:
When imaging maneuvering target with Inverse Synthetic Aperture Ladar (ISAL), dispersion and Doppler frequency time-variation exist in the echo signal in range and cross-range direction, respectively. For targets of which the maneuverability can be a...
Radar HRRP Target Recognition Based on Truncated Stick-breaking Hidden Markov Model
Pan Mian, Wang Peng-Hui, Du Lan, Liu Hong-Wei, Bao Zheng
2013, 35(7): 1547-1554. doi: 10.3724/SP.J.1146.2012.01190
Abstract:
To improve the performance of radar High-Resolution Range Profile (HRRP) target recognition, a new Truncated Stick-Breaking Hidden Markov Model (TSB-HMM) based on time domain feature is proposed. Moreover, a hierarchical classification scheme based o...
Robust Detection in Compound Gaussian Clutter Based on Bayesian Framework
Zou Kun, Liao Gui-Sheng, Li Jun, Li Wei
2013, 35(7): 1555-1561. doi: 10.3724/SP.J.1146.2012.01333
Abstract:
The texture component of compound Gaussian model determines the non-Gaussian characteristics of clutter, and the uncertainty of the texture component can result to the detection performance degradation of the conventional detectors. In this paper, ba...
Detection and Parameter Estimation of Linear Frequency Modulation Continuous Wave Signal
Zhu Wen-Tao, Zheng Ji-Bin, Su Tao, Zhu Kai-Ran, Zhang Long
2013, 35(7): 1562-1568. doi: 10.3724/SP.J.1146.2012.01356
Abstract:
Considering application of long time accumulation to the detection and parameter estimation of Linear Frequency Modulated Continuous Wave (LFMCW), a novel method based on the joint window-variant coherent average method and cyclostationary method is ...
An Ultrafine Multifunctional Unmanned Aerial Vehicle SAR System
Wang Yan-Fei, Liu Chang, Zhan Xue-Li, Li He-Ping
2013, 35(7): 1569-1574. doi: 10.3724/SP.J.1146.2012.01601
Abstract:
This paper describes an ultrafine MultiFunctional Unmanned Aerial Vehicle (UAV) SAR (MFUSAR) developed at the Institute of Electronics, Chinese Academy of Sciences. MFUSAR can operate in Ku and X band and be capable of high resolution, interferometry...
Sea Surface Wind Speed Measurement Using GNSS Reflection Signal
Zhou Xuan, Ye Xiao-Min, Yu Yang, Shao Lian-Jun, Liu Shu-Ming, LI Zi-Wei
2013, 35(7): 1575-1580. doi: 10.3724/SP.J.1146.2012.01396
Abstract:
This paper introduces the mechanism of sea surface wind measurement using Global Navigation Satellite System Reflection (GNSS-R) signal and sea surface scattered signal theoretical model. Then the delay waveform of sea surface scattered signal is ana...
A Design Method and Anti-jamming Performance Analysis for Vector Tracking Loop
Wang Wei, Li Qiang, Xu Ding-Jie, Shen Feng
2013, 35(7): 1581-1586. doi: 10.3724/SP.J.1146.2012.01490
Abstract:
Due to the power of GPS signal is weak at the receiver, it is easy for receiver to be disturbed in lower carrier-to-noise power density ratio (C/N0) environment, a design method of vector tracking loop is proposed, that jamming signals are suppressed...
Extended Kalman Particle Filter Algorithm for Target Tracking in Stand-off Jammer
Hou Jing, Jing Zhan-Rong, Yang Yan
2013, 35(7): 1587-1592. doi: 10.3724/SP.J.1146.2012.01476
Abstract:
An Extended Kalman Particle Filter (EKPF) integrated with negative information (scans or dwells with no measurements) is implemented for target tracking in the Stand-Off Jammer (SOJ). In the EKPF, the Gaussian sum likelihood function which is derived...
Adaptive Kalman Filtering with Time-varying Colored Measurement Noise by Variational Bayesian Learning
Xu Ding-Jie, Shen Chen, Shen Feng
2013, 35(7): 1593-1598. doi: 10.3724/SP.J.1146.2012.01457
Abstract:
An adaptive Kalman filtering algorithm based on variational Bayesian learning is suggested to cope with the problem in which colored and time-varying measurement noise is introduced. By use of differencing, the model is converted back to a normal mod...
Extraction Algorithm of Radio Steady State Characteristics Based on High Order Spectrum and Time-domain Analysis
Qian Zu-Ping, Xu Yuan, Shao Wei, Chen Jin
2013, 35(7): 1599-1605. doi: 10.3724/SP.J.1146.2012.01227
Abstract:
A radio extraction algorithm of steady state based on the high order spectrum and time-domain analysis is presented for the radio fingerprint features extraction problem on the condition of steady-state operation. Firstly, the mathematical model of s...
Sampling Complex Pulse Streams with Finite Rate of Innovation Methods
Wang Ya-Jun, Li Ming, Liu Gao-Feng
2013, 35(7): 1606-1611. doi: 10.3724/SP.J.1146.2012.01329
Abstract:
The framework of Finite Rate of Innovation (FRI) is an effective theory for sampling and reconstruction of non-bandlimited signals. However, the method may be invalid when the pulse shape is complex, since it requires that the frequency spectrum of p...
Blending Mechanism of Optimization-based Colorization
Zhang Ke-Wei, Shen Qun-Tai
2013, 35(7): 1612-1618. doi: 10.3724/SP.J.1146.2012.01454
Abstract:
Optimization colorization methods base on a specific local relation model, it can not afford to describe global characteristics such as direct connection between visual result and user-provided scribbles. Hence a general frame is put forward, and the...
A Classification and Prediction Model of Multi Spike Train Based on Bayes Theory
Fan Yi-Na, Lang Bo, Wei Hui
2013, 35(7): 1619-1623. doi: 10.3724/SP.J.1146.2012.01453
Abstract:
Neural population encoding and analysis of spike train play an important role in the field of neural inforamtion processing. In this study, a classification method of spike train is proposed based on high-order multiple Possion model, and a mathemati...
A Modified Distance of Evidence
Peng Ying, Hu Zeng-Hui, Shen Huai-Rong
2013, 35(7): 1624-1629. doi: 10.3724/SP.J.1146.2012.01680
Abstract:
Jousselme advanced the distance of evidence to measure the degree of difference between evidence that represents the identification result and evidence that represents the real solution. The distance of evidence becomes smaller with the increase of d...
An Improved Training Algorithm for Quantum Neural Networks
Zhang Yi-Peng, Chen Liang, Hao Huan
2013, 35(7): 1630-1635. doi: 10.3724/SP.J.1146.2012.01417
Abstract:
An improved training algorithm is proposed to solve the conflict of objective functions between weights and quantum interval during the training process of Multilevel Activation Functions-Quantum Neural Network (MAF-QNN), which will result in the deg...
Visual Saliency Detection: An Information Theoretic Algorithm Combined Long-term with Short-term Features
Qian Xiao-Liang, Guo Lei, Han Jun-Wei, Hu Xin-Tao, Cheng Gong
2013, 35(7): 1636-1643. doi: 10.3724/SP.J.1146.2012.01251
Abstract:
In order for removing the drawback of the traditional visual saliency detection methods which solely used the information of current viewing image or prior knowledge, this paper proposes an information theoretic algorithm to combine the long-term fea...
A New Spatiogram Similarity Measure Method and Its Application to Object Tracking
Yao Zhi-Jun
2013, 35(7): 1644-1649. doi: 10.3724/SP.J.1146.2012.01535
Abstract:
For spatiogram based object tracking, suitable similarity measure is critical. In this paper, a new spatiogram similarity measure is presented. The spatial distribution of the pixels corresponding to each bin is regarded as a Gaussian distribution, w...
A Moving Object Detection Method Based on Sliding Window Gaussian Mixture Model
Zhou Jian-Ying, Wu Xiao-Pei, Zhang Chao, Lv Zhao
2013, 35(7): 1650-1656. doi: 10.3724/SP.J.1146.2012.01449
Abstract:
在复杂场景下,传统混合高斯模型能较好地检测出运动目标,但随着时间的推移,模型参数收敛缓慢且难以适应场景中真实背景的实时变化,从而导致运动目标的错误检测率增加。该文利用滑动窗技术的短时历史记忆特性,提出一种新颖的基于滑动窗的混合高斯模型运动目标检测方法,该方法弥补了传统混合高斯背景模型不能及时形成新背景的缺点,提高了运动检测的完整性,并进一步降低了算法对场景光照变化的敏感性。多场景下的对比实验结果表明,该方法能更准确、完整地检测出运动目标并具有更好的环境适应性。
A Total Variation-based Lowpass Weight Function Optimization in Multiscale Image Fusion
Deng Miao, Zhang Ji-Hong, Liu Wei, Liang Yong-Sheng
2013, 35(7): 1657-1663. doi: 10.3724/SP.J.1146.2012.01183
Abstract:
In the image fusion methods which are based on multiscale transform, the lowpass subbands are usually fused through a weighed sum rule, this may lead the intensity of the fused image to a balenced level, some bright or dark objects will not preserved...
Mass Detection in Mammogram Based on Marker-pulse Coupled Neural Networks
Han Zhen-Zhong, Chen Hou-Jin, Li Ju-Peng, Yao Chang, Cheng Lin
2013, 35(7): 1664-1670. doi: 10.3724/SP.J.1146.2012.01473
Abstract:
Mass detection in mammogram plays an important role in early breast cancer diagnosis. A novel method of mass detection in mammogram is proposed. Combined with Pulse Coupled Neural Network (PCNN) model and marker-controlled watershed method, an image ...
Blind Recognition of (n,1,m) Convolutional Code Based on Maximum Likelihood Detection
Jie Hui, Wang Feng-Hua, Huang Zhi-Tao
2013, 35(7): 1671-1676. doi: 10.3724/SP.J.1146.2012.01578
Abstract:
Considering recognition of (n,1,m) convolutional code in non-cooperative signal processing, an algorithm based on maximum likelihood detection is proposed. Firstly, the linear equations of check polynomial coefficients are constructed with different ...
A Decoding Algorithm Based on Layered Decoding and Min-max for Nonbinary LDPC Codes
Yang Wei, Zhang Wei
2013, 35(7): 1677-1681. doi: 10.3724/SP.J.1146.2012.01634
Abstract:
Based on decoding algorithms available nowadays, a high efficiency decoding algorithm for nonbinary low-density parity-check codes is proposed. The algorithm takes advantage of both the layered decoding algorithm and the Min-max algorithm, which not ...
Reduce Complexity of Ordered Statistics Soft-decision Decoding by Side Information
Zhu Shi-Xin, Yu Yi-Chao
2013, 35(7): 1682-1686. doi: 10.3724/SP.J.1146.2012.01595
Abstract:
An algorithm of complexity reduction of list decoding is given by using side information. Then in-depth analysis the reasons of complexity reduction and side information based on shift register sequence is provided. Compared with the method of using ...
On Power Spectrum Optimization of M-ary Position PSK Modulations
Miao Pu, Wu Le-Nan, Jin Yi
2013, 35(7): 1687-1693. doi: 10.3724/SP.J.1146.2012.01259
Abstract:
Aimed at the discrete components affecting power spectrum sideband level, the spectral properties of the M-ary Position Phase Shift Keying (MPPSK) modulated signal is derived. The waveform optimization and full M-ary position is proposed to suppress ...
Optimization of Cycle Transmission Mechanism in Cognitive Radio
Xu Rui-Chen, Jiang Ting
2013, 35(7): 1694-1699. doi: 10.3724/SP.J.1146.2012.01361
Abstract:
Selecting appropriate spectrum sensing time and data transmission time to maximize systemic transmission efficiency is a core research region in Cognitive Radio (CR), it has comprehensive application background. In this paper, a cycle transmission op...
Multiple Relay Selection Scheme for Cognitive Relay Networks
Yang Long, Kuo Yong-Hong, Chen Jian, Ding Yan-Jun
2013, 35(7): 1700-1706. doi: 10.3724/SP.J.1146.2012.01337
Abstract:
Cognitive relay networks can mitigate channel fading and enhance the spectrum utilization effectively. However, relay selection is a problem of great importance to be solved. According to the features of first order partial derivative of the Signal-t...
Opportunistic Relaying and Power Allocation for Bidirectional Regenerative Relaying in Asymmetric Two-way Relay Channels
JI Xiao-Dong, Zheng Bao-Yu, Cui Jing-Wu
2013, 35(7): 1707-1712. doi: 10.3724/SP.J.1146.2012.01313
Abstract:
The problem of reactive relay selection for two-way decode-and-forward relaying is investigated. First, the achievable rate region of conventional three-node scenario is characterized. Then, a closed-form expression of the outage probability is deriv...
Fast Realization of Zoom-spectrum Wigner-Ville Distribution Analysis in a Narrowband
Tian Feng, Yang Yi-Xin, Wu Yao-Zhen, Yang Long
2013, 35(7): 1713-1719. doi: 10.3724/SP.J.1146.2012.01446
Abstract:
Doppler information of line spectrum can be used to estimate the parameters of radiated noise sources on underwater target. Because of the low frequency and low speed characteristics, the Doppler frequency shift changes weakly. Its time-frequency ana...
Transient Signal Detection Method Based on Partial Instantaneous Energy Density Level
Wang Yan, Zou Nan, Fu Jin, Liang Guo-Long
2013, 35(7): 1720-1724. doi: 10.3724/SP.J.1146.2012.01239
Abstract:
In order to detect acoustic transient signal at low SNR, a double noise reduction method of sub-wave detection and partial instantaneous energy density level is proposed. A certain order of Intrinsic Mode Function (IMF) containing useful signal is se...
Game Theoretical Bandwidth Request Allocation Policy in P2P Streaming Network
Chen Zhuo, Feng Gang, Zhou Jiang, Zhou Yang
2013, 35(7): 1725-1731. doi: 1013724/SP.J.1146.2012.01586
Abstract:

Due to the merits of lower bandwidth consumption at streaming server and higher scalability, P2P streaming systems are widely adopted and deployed. However, the heterogeneity of bandwidth resource and playback position at peers may easily lead to loa...

Online Botnet Detection Algorithm Using MapReduce
Jiang Hong-Ling, Shao Xiu-Li, Li Yao-Fang
2013, 35(7): 1732-1738. doi: 10.3724/SP.J.1146.2012.01444
Abstract:
Most current botnet detection approaches are based on analyzing network traffic and they usually rely on malicious behaviors of bots or need information provided by external systems. Besides, the huge computation of traditional approaches is difficul...
Detecting App-DDoS Attacks Based on Maximal Frequent Sequential Pattern Mining
Li Jin-Ling, Wang Bin-Qiang
2013, 35(7): 1739-1745. doi: 10.3724/SP.J.1146.2012.01372
Abstract:
In order to describe the users access behavior dynamically, efficiently and accurately, a novel detection model for Application-layer Distributed Denial of Service (App-DDoS) attack based on maximal frequent sequential pattern mining is proposed, nam...
Classification Based Consistent Flow Update Scheme in Software Defined Network
Zhou Ye, Yang Xu, Li Yong, Su Li, Jin De-Peng, Zeng Lie-Guang
2013, 35(7): 1746-1752. doi: 10.3724/SP.J.1146.2012.01431
Abstract:
Software Defined Network (SDN) becomes a hot topic in recent years, in which flow update is one of important issues. In this paper, a classification based consistent flow update scheme is proposed, which has the advantage of strong generality and eff...
Load-balancing Based on Particle Swarm Optimization in Virtual Network Mapping
Huang Bin-Bin, Lin Rong-Heng, Peng Kai, Zou Hua, Yang Fang-Chun
2013, 35(7): 1753-1759. doi: 10.3724/SP.J.1146.2012.01212
Abstract:
Virtual networking mapping aims at minimal resource consumption or shortest path at substrate network, but ignores the resource demanded by the hidden hops, making bottlenecks due to the resource shortage at the hidden hops, and finally influences th...
Adaptive Business Process Modeling and Analyzing Based on Markov Decision Process
Zhang Hong-Xia, Zou Hua, Lin Rong-Heng, Yang Fang-Chun
2013, 35(7): 1760-1765. doi: 10.3724/SP.J.1146.2012.01413
Abstract:
Research on modeling and analyzing adaptive business processes based on Web services is very important for developing and deploying applications in the mobile Internet. In order to modeling and verifying the reliability and adaptability of services e...
Trusted Platform Module-based Scheme for Secure Access to Outsourced Data
Fu Dong-Lai, Peng Xin-Guang, Yang Yu-Li
2013, 35(7): 1766-1773. doi: 10.3724/SP.J.1146.2012.01321
Abstract:
To improve the security on accessing outsourced data in cloud computing, the established tree-based key management scheme, which is suitable for the owner-write-users-read/write scenario, is perfected. The new scheme takes full advantage of a hardwar...
Cache-optimized Implementation of Long Sequences FFT on TS201
Ma Xiao, Gao Li-Ning, Liu Teng-Fei, Jin Ye
2013, 35(7): 1774-1778. doi: 10.3724/SP.J.1146.2012.01608
Abstract:
This paper proposes an improved method for Winograd algorithm to solve the problem that the existing methods of long sequences Fast Fourier Transform (FFT) on the TS201 processor does not take full account of the Caches miss influence on efficiency. ...