Advanced Search

2014 Vol. 36, No. 12

Display Method:
Articles
Collaborative Caching Algorithm Based on Request Correlation in Named Data Networking
Ge Guo-Dong, Guo Yun-Fei, Liu Cai-Xia, Lan Ju-Long
2014, 36(12): 2795-2801. doi: 10.3724/SP.J.1146.2014.00114
Abstract:
How to efficiently utilize the finite storage space and cache content chunks in the content store poses challenges to the caching policy in Named Data Networking (NDN). Using the differentiated caching strategy, a collaborative caching algorithm is p...
Delay-aware Controller Placement for Fast Response in Software-defined Network
Yao Lin-Yuan, Chen Ying, Song Fei, Zhang Hong-Ke
2014, 36(12): 2802-2808. doi: 10.3724/SP.J.1146.2014.00211
Abstract:
Most of Controller placements take the Propagation Delay (PD) as the important consideration in Software-Defined Network (SDN), ignoring the influence of the Transmission Delay (TD) on the network performance. This paper provides a delay-aware contro...
Detecting Local Community Structure Based on the Identification of Boundary Nodes in Complex Networks
Liu Yang, Ji Xin-Sheng, Liu Cai-Xia
2014, 36(12): 2809-2815. doi: 10.3724/SP.J.1146.2013.01955
Abstract:
In the context that social network becomes more and more complicated and huge, it is extremely difficult and complex to mine the global community structures of large networks. Therefore, the local community detection has important application signifi...
Research on the Resource Allocation of OFDMA Relay Network Based on Secrecy Ratio
Zhao Jun, Zheng Wei, Wen Xiang-Ming, Zhang Hai-Jun, Lu Zhao-Ming, Jing Wen-Peng
2014, 36(12): 2816-2821. doi: 10.3724/SP.J.1146.2014.00042
Abstract:
Considering the security resource allocation problem in the two-way relay networks exiting an eavesdropper, to improve the security of the relay, a security secrecy ratio scheme under the constraint of subchannel allocation and power is studied in th...
Uplink Resource Allocation in Device-to-Device Enabled Cellular Networks
Cheng Yong-Sheng, Zhu Jiang, Lin Xiao-Kang
2014, 36(12): 2822-2827. doi: 10.3724/SP.J.1146.2014.00056
Abstract:
Uplink resource allocation in Device-to-Device (D2D) enabled cellular systems is studied. The sum-rate maximization problem is transformed into a concise Binary Integer Programming (BIP) problem, which is NP-hard. Then based on the Canonical duality ...
Wideband Compressive Spectrum Sensing Without Reconstruction Based on Random Matrix Theory
Cao Kai-Tian, Gao Xi-Qi, Wang Dong-Lin
2014, 36(12): 2828-2834. doi: 10.3724/SP.J.1146.2014.00028
Abstract:
This paper proposes a novel wideband compressive spectrum sensing scheme based on the Generalized Likelihood Ratio Test (GLRT), in which the GLRT statistic and the decision threshold are derived according to Random Matrix Theory (RMT). The proposed s...
A Method Based on Puncturing Polar Codes for Physical Layer Security
Yi Ming, Ji Xin-Sheng, Huang Kai-Zhi, Jin Liang, Wang Jing
2014, 36(12): 2835-2841. doi: 10.3724/SP.J.1146.2014.00013
Abstract:
To solve the confliction between the security and reliability of physical layer security codes and improve the secrecy rate, a security coding method based on puncturing polar codes is proposed. In order to keep the security and reliability, the conf...
An Anti-collision Algorithm Based on Collided Bits Indicator in Radio Frequency Identification Systems
Li Zhi-Jian, Lai Shun-Qiao
2014, 36(12): 2842-2847. doi: 10.3724/SP.J.1146.2013.01759
Abstract:
Multiple tags collision becomes an important factor blocking the popularization of Radio Frequency IDentification (RFID). To improve the identification efficiency and reduce the communication overhead, an novel algorithm, anti-Collided Bits Indicator...
Provably Secure Authenticated Key Agreement Protocol Based on Hierarchical Identity
Cao Chen-Lei, Liu Ming-Qi, Zhang Ru, Yang Yi-Xian
2014, 36(12): 2848-2854. doi: 10.3724/SP.J.1146.2014.00684
Abstract:
At present most Identity-based authenticated key agreement protocols are built on the security infrastructure in which a single Private Key Generator (PKG) is contained as the only trusted third party of the whole system, however such kind of infrast...
A Real-time Video Compression for UAV Based on Affine Model
Shen Qiu, Li Xiao-Fan, Kong Fan-Qiang, Dai Yu-Xi
2014, 36(12): 2855-2860. doi: 10.3724/SP.J.1146.2014.00080
Abstract:
Since the existing algorithms can not meet the requirements of real-time compression and transmission for UAV(Unmanned Aerial Vehicle) videos, a new real-time compression algorithm with low complexity for UAV videos is proposed. Considering the plane...
An Improved Intra Quantization Matrix for High Efficiency Video Coding Based on Visual Perception
Zheng Ming-Kui, Su Kai-Xiong, Wang Wei-Xing, Yang Xiu-Zhi, Lan Cheng-Dong
2014, 36(12): 2861-2868. doi: 10.3724/SP.J.1146.2014.00318
Abstract:
A Discrete Cosine Transform (DCT) based Modulation Transfer Function (MTF) is used to improve the intra quantization matrix for the High Efficiency Video Coding (HEVC) standard. A new method is used to calculate the spatial frequency in the calculati...
Low Complexity Early Stopping Criterion for Weighted Bit Flipping Decodings of LDPC Codes
Zhang Gao-Yuan, Zhou Liang, Wen Hong
2014, 36(12): 2869-2875. doi: 10.3724/SP.J.1146.2013.02001
Abstract:
Recently, extensive researches have been focused on the early stoping criterion for Belief-Propagation(BP) decoding of LDPC codes. However, there is little study on suitable design of early stopping criterion for Weighted Bit Flipping (WBF) decodings...
DOA Estimation Based on Eigenvalue Reconstruction of Noise Subspace
Fang Qing-Yuan, Han Yong, Jin Ming, Song Li-Zhong, Qiao Xiao-Lin
2014, 36(12): 2876-2881. doi: 10.3724/SP.J.1146.2013.02014
Abstract:
This paper proposes an Eigenvalue Reconstruction method in Noise Subspace (ERNS) for Direction of Arrival DOA estimation with high resolution, provided that the powers of sources are different. The noise subspace eigenvalues belonging to the covarian...
A New Algorithm for Null Broadening Beamforming
Li Wen-Xing, Mao Xiao-Jun, Sun Ya-Xiu
2014, 36(12): 2882-2888. doi: 10.3724/SP.J.1146.2013.02018
Abstract:
Since the adaptive beamformer suffers from the output performance degradation when the position of the interference moves, a new null broadening technique is proposed. The algorithm uses the projection technology to transform the array receives data,...
Localization of Noise Sources on Underwater Vehicle via Chirp-Fourier Processing
Tian Feng, Yang Yi-Xin, Wu Yao-Zhen, Yang Long
2014, 36(12): 2889-2895. doi: 10.3724/SP.J.1146.2014.00106
Abstract:
The radiated noise sources of underwater vehicle can be localized by analysis of Doppler information. Then effective suppression of noise can be taken. However, traditional time-frequency methods can hardly distinguish the Doppler shift of noise sour...
Acoustic Echo Control Based on Frequency-domain Stage-wise Regression
Jiang Kai-Yu, Wu Chao, Guo Yan-Meng, Fu Qiang, Yan Yong-Hong
2014, 36(12): 2896-2901. doi: 10.3724/SP.J.1146.2014.00131
Abstract:
Traditional echo control techniques as Partitioned Block Frequency Domain Adaptive Filter (PBFDAF) with stochastic gradient adaptive method usually endure slow convergence and insufficient echo suppression in reverberant room when the echo is speech ...
Indoor Positioning Technology Based on Powerline and Location Fingerprint
He Jian, Wan Zhi-Jiang, Liu Jin-Wei
2014, 36(12): 2902-2908. doi: 10.3724/SP.J.1146.2013.02022
Abstract:
The power line being indispensable under indoor environment is firstly introduced to be as the antenna, which wideband high-frequency signals are injected into it to obtain the location fingerprint so as to achieve precise indoor positioning. Firstly...
Combination of Conflicting Evidence by Using the Total Uncertainty Degree of Information
Liu Zhe-Xi, Yang Jian-Hong, Yang De-Bin, Li Min
2014, 36(12): 2909-2914. doi: 10.3724/SP.J.1146.2014.00039
Abstract:
The common way of conflicting evidence combination is to modify the basic probability mass assignment of evidence bodies by a certain indicator which can reflect or describe the information uncertainty of the conflicting evidence. In existing conflic...
Human Motion Estimation Based on Dual Latent Variable Spaces Local Particle Search
Li Wan-Yi, Sun Ji-Feng, Wang Yu-Long
2014, 36(12): 2915-2922. doi: 10.3724/SP.J.1146.2013.01915
Abstract:
A novel algorithm called Dual Latent Variable Spaces Local Particle Search (DLVSLPS) is proposed. It can estimate the 3D human motion sequence from silhouettes of multi-view image sequence more accurately. Gaussian Process Dynamical Models (GPDM) is ...
Technique of Remote Sensing Image Target Recognition Based on Affinity Propagation and Kernel Matching Pursuit
Chu Yue-Zhong, Xu Bo, Gao You-Tao, Tai Wei-Peng
2014, 36(12): 2923-2928. doi: 10.3724/SP.J.1146.2014.00422
Abstract:
The processing of generating dictionary of function in Kernel Matching Pursuit (KMP) often uses greedy algorithm for global optimal searching, the dictionary learning time of KMP is too long. To overcome the above drawbacks, a novel classification al...
Analysis of a New Wideband Blanket Jamming Type to GPS Receiver
Mao Hu, Wu De-Wei, Lu Hu, Yan Zhan-Jie
2014, 36(12): 2929-2934. doi: 10.3724/SP.J.1146.2014.00123
Abstract:
Aiming at the problem that a Continuous Wave (CW) is easy to be suppressed by the frequency domain filtering and the efficiency of a broadband continuous blanket jamming is low, this paper presents a new broadband comb spectrum jamming type which is ...
Broadband 2-D DOA Estimation Based on Compressed Sensing
Shen Zhi-Bo, Dong Chun-Xi, Huang Long, Zhao Guo-Qing
2014, 36(12): 2935-2941. doi: 10.3724/SP.J.1146.2013.01931
Abstract:
For the problem of two Dimensional Direction Of Arrival (2-D DOA) estimation, a broadband 2-D DOA algorithm is proposed based on the Compressed Sensing (CS). It can obtain the center frequency, azimuth angle and pitch angle of multiple narrowband sig...
Compressed Sensing Reconstruction of Hyperspectral Image Using the Graph Sparsity Regularized Multiple Measurement Vector Model
Sun Yu-Bao, Li Huan, Wu Min, Wu Ze-Bin, He Jin-Ping, Liu Qing-Shan
2014, 36(12): 2942-2948. doi: 10.3724/SP.J.1146.2014.00566
Abstract:
Compressed Sensing (CS) reconstruction of hyperspectral image is an effective mechanism to comedy the traditional hyperspectral imaging pattern with the drawback of high redundancy and vast data volume. This paper presents a new multiple measurement ...
Feature Extraction Method for Radar High Resolution Range Profile Targets Based on Robust Deep Networks
Feng Bo, Chen Bo, Wang Peng-Hui, Liu Hong-Wei
2014, 36(12): 2949-2955. doi: 10.3724/SP.J.1146.2014.00808
Abstract:
Feature extraction is the key technique for Radar Automatic Target Recognition (RATR) based on High Resolution Range Profile (HRRP). Traditional feature extraction algorithms usually use shallow models. When applying such models, the inherent structu...
Feature Extraction of Space Cone-shaped Target Based on Narrow-band Radar Networks
Han Xun, Du Lan, Liu Hong-Wei
2014, 36(12): 2956-2962. doi: 10.3724/SP.J.1146.2013.02037
Abstract:
The micro-Doppler modulation caused by precession is considered as an important signature for the discrimination of space cone-shaped target. A novel feature extraction method for precessing cone-shaped target with narrow-band radar networks is propo...
Radar Target Detection Method Based on the Alpha-stable Distribution Clutter Model
Zheng Zuo-Hu, Wang Shou-Yong
2014, 36(12): 2963-2968. doi: 10.3724/SP.J.1146.2014.00072
Abstract:
The detection performance of the Moving Target Detection (MTD) method descends badly in a non-Gaussian correlated clutter background. Therefore, a radar target detection method in the non-Gaussian correlated clutter background is proposed, which is o...
Robust Adaptive Coherence Estimator Based on Ellipsoid Uncertainty Set Constraint
Dai Bao-Quan, Wang Tong, Tong Ya-Long, Wu Jian-Xin, Bao Zheng
2014, 36(12): 2969-2974. doi: 10.3724/SP.J.1146.2014.00563
Abstract:
Adaptive Coherence Estimator (ACE) often suffers considerable performance degradation in the presence of steering vector errors. In this paper, a robust ACE detector based on the ellipsoid uncertainty set constraint is proposed. A detailed analysis o...
A Method of Automatic Recognition of Sidelobe Tracking Based on Magnitude-phase Characteristics
Wang Yi-Bo, Shi Hai-Rong, Zhao Wei
2014, 36(12): 2975-2979. doi: 10.3724/SP.J.1146.2014.00045
Abstract:
The traditional methods for automatic recognition of sidelobe tracking of angle measurement system in radar techniques are presented based on the different magnitude between the signals of sum channel and difference channel. By researching the princi...
A Novel Linear MIMO Array Through-the-wall Imaging Model and Its Associated Environmental Parameters Estimation
Song Yong-Ping, Jin Tian, Lu Bi-Ying, Zhou Zhi-Min
2014, 36(12): 2980-2985. doi: 10.3724/SP.J.1146.2014.00018
Abstract:
Through-the-wall radar imaging by estimating the wall thickness and the dielectric constant is a hot research field in recent years. In order to lift strict restriction that the antenna should parallel to the wall in the traditional through-wall imag...
An Imaging Algorithm of Sparse Stepped Frequency SAR Based on Multiple Measurement Vectors Model
Chen Yi-Chang, Zhang Qun, Chen Xiao-Ping, Luo Ying, Gu Fu-Fei
2014, 36(12): 2986-2993. doi: 10.3724/SP.J.1146.2013.01831
Abstract:
The SAR imaging algorithm based on Compressed Sensing (CS), could complete the high-resolution imaging of sparse target with the sampling data below the Nyquist sampling rate. However, the Single Measurement Vectors (SMV) model used for range profile...
Study on Space-borne SAR Mosaic Mode Based on Azimuth Multichannel
Yu Wei-Dong, Xiong Ming-Nan, Tian Yu-Run
2014, 36(12): 2994-3000. doi: 10.3724/SP.J.1146.2013.02031
Abstract:
The Mosaic mode is a hybrid mode of spotlight and ScanSAR, which can obtain SAR images with a large coverage and a high resolution. In this paper, a new Mosaic mode is proposed. The image scene is divided into several sub imaging blocks along the ran...
Multitarget Localization Based on Sparse Representation for Bistatic MIMO Radar in the Presence of Impulsive Noise
Zheng Zhi-Dong, Yuan Hong-Gang, Zhang Jian-Yun
2014, 36(12): 3001-3007. doi: 10.3724/SP.J.1146.2013.01861
Abstract:
This paper is concerned with the multitarget localization for bistatic MIMO radar in the presence of Symmetric-Stable (SS) impulsive noise. As the non-existence of the second-order matrix degrades the estimation performance of the subspace-based algo...
A Novel Algorithm for Detection of a Maneuvering Target in Passive Radar
Yang Yu-Xiang, Tong Wu-Qin, Xiong Jin-Yu
2014, 36(12): 3008-3013. doi: 10.3724/SP.J.1146.2013.01984
Abstract:
For passive radar, the maneuvering target causes range cell migration and Doppler cell migration, leading to a detection ability loss. The signal model is established and a novel detection algorithm is proposed to solve the problem. Firstly, the fast...
Optimization Design of Sparse 2-D Arrays for Over-The-Horizon Radar (OTHR) Based on Improved Genetic Algorithm
Yan Tao, Chen Jian-Wen, Bao Zheng
2014, 36(12): 3014-3020. doi: 10.3724/SP.J.1146.2013.02011
Abstract:
In light of the fact that enormous elements exist when applying the uniform rectangular planar array to skywave Over-The-Horizon Radar (OTHR), the sparse optimization approach of the uniform 2-D arrays using an improved genetic algorithm is proposed ...
An Efficient Antenna Optimization Method Based on Kriging Model and Multidimensional Uniform Sampling
Chen Xiao-Hui, Pei Jin-Ming, Guo Xin-Xin, Qi Song
2014, 36(12): 3021-3026. doi: 10.3724/SP.J.1146.2013.01826
Abstract:
During the process of antenna design and optimization, classical optimization methods often require hundreds or even thousands trials of different parameter combinations, which leads to a low efficiency in solving multi-parameter and large scale opti...
An Architecture of Stream Based Reconfigurable Clustered Block Cipher Processing Array
Chen Tao, Luo Xing-Guo, LI Xiao-Nan, LI Wei
2014, 36(12): 3027-3034. doi: 10.3724/SP.J.1146.2014.00023
Abstract:
Reconfigurable cipher processing architecture is a newly proposed architecture for security information processing, but it has the shortage of low throughput and low utilization. To solve the problem, this paper proposes the Stream based Reconfigurab...
Study on the Prediction of Single-event Effects Induced Failure Rate for Embedded Memories
Zhi Tian, Yang Hai-Gang, Cai Gang, Qiu Xiao-Qiang, Li Tian-Wen, Wang Xin-Gang
2014, 36(12): 3035-3041. doi: 10.3724/SP.J.1146.2013.02025
Abstract:
Embedded memories are easily influenced by Single-Event Effects (SEE). A model to calculate the SEE failure rate of an embedded memory is proposed, which considers the likelihood that an single-event upset or single-event transient will become an err...
The Relationship between the Group Delay and Envelope Delay of a Narrow-band Dispersive System
Wang Jian-Wu, Feng Zheng-He
2014, 36(12): 3042-3045. doi: 10.3724/SP.J.1146.2014.00008
Abstract:
In this paper, the relationship between the group delay and correlation delay is discussed, and the influence of dispersion on the calibration of a system is analyzed, when a modulated signal passes through a dispersive narrow-band system. The envelo...
Broadband Radio Frequency Power Amplifier Modeling Basedon Generalized Augmented Hammerstein Models
Xu Gao-Ming, Liu Tai-Jun, Ye Yan, Wen Hua-Feng, Li Jun
2014, 36(12): 3046-3050. doi: 10.3724/SP.J.1146.2014.00545
Abstract:
In order to improve the modeling accuracy of the AH model,this paper introduces some lagging envelope terms and leading envelope terms to the weak nonlinear module with memory in the AH model to simulate the lagging and the leading envelope effects o...