Advanced Search

2014 Vol. 36, No. 7

Display Method:
Articles
Sparse Bayesian Representation of the ISAR Imaging Method Based on ExCoV
Su Wu-Ge, Wang Hong-Qiang, Deng Bin, Qin Yu-Liang, Ling Yong-Shun
2014, 36(7): 1525-1531. doi: 10.3724/SP.J.1146.2013.01338
Abstract:
By taking into account of the prior information of the sparse signal and the additive noise encountered in the measurement process, the sparse recover algorithm under the Bayesian framework can reconstruct the coefficient better. However, the traditi...
Target Shape Imaging Algorithm with an Envelope of Ellipses for UWB-TW Pulse Radars
Li Yu-Hui, Ouang Shan, Jin Liang-Nian, Liao Gui-Sheng
2014, 36(7): 1532-1537. doi: 10.3724/SP.J.1146.2013.01419
Abstract:
The target shape imaging algorithms receive great attention in applications of Ultra WideBand Through Wall (UWB-TW) radar, because it overcomes the shortcomings of real-time imaging and image quality in traditional Back Projection (BP) imaging algori...
An Approach for Quasi-regularized Precession Parameters Estimation of Rotation Symmetric Object Based on Two-dimesional Motion Reconstruction
Hong Ling, Dai Feng-Zhou, Liu Hong-Wei
2014, 36(7): 1538-1544. doi: 10.3724/SP.J.1146.2013.01310
Abstract:
Under the effects of the initial perturbation and torque, the motion of the spin-stability spacecraft is the compound of nutation and precession, named quasi-regularized precession. The motion parameters estimation of the quasi-regularized precession...
Robust Beamforming via Semidefinite Rank Relaxation
Luo Tao, Liu Hong-Wei, Yan Jun-Kun, Jiu Bo, Lu Hong-Xi
2014, 36(7): 1545-1551. doi: 10.3724/SP.J.1146.2013.01046
Abstract:
The existing vector weighted robust beamforming is able to estimate the signal power of target only in situations of a small steering angle error. For a larger steering angle error case, although the matrix weighted beamforming can effectively estima...
Deceptive Mainlobe Jamming Suppression for Airborne Radar Based on Joint Processing in Polarizational and Spatial Domains
Wen Cai, Wang Tong, Wu Yi-Feng, Wu Jian-Xin
2014, 36(7): 1552-1559. doi: 10.3724/SP.J.1146.2013.01739
Abstract:
The deceptive mainlobe jamming of airborne radar not only causes a large amount of false alarms but also contaminates samples of the Space-Time Adaptive Processor (STAP). Hence, the performance on clutter suppression is degraded and signal self-cance...
Application of Smoothing Algorithm in SINS/GPS Integrated System for Airborne SAR Real-time Motion Compensation
Gong Xiao-Lin, Qin Ting-Ting
2014, 36(7): 1560-1565. doi: 10.3724/SP.J.1146.2013.01258
Abstract:
Considering the urgent need of high precision motion parameter for SAR motion compensation in real-time, a motion compensation scheme using the Strapdown Inertial Navigation System/Global Positioning System (SINS/GPS) integrated system based on Rauch...
Adaptive Scheduling Algorithm for Phased Array Radar Based on Cognitive ISAR Imaging
Chen Yi-Jun, Luo Ying, Zhang Qun, Li Kai-Ming, Sun Feng-Lian
2014, 36(7): 1566-1572. doi: 10.3724/SP.J.1146.2013.00822
Abstract:
The mission of imaging is usually not considered in existing resource scheduling strategies of phased array radar, and it is required to separate a fixed part of resources for target imaging. In this paper, the concept of cognitive imaging is introdu...
Angle Estimation of Distributed Source for Monostatic MIMO Radar in Colored Noise
Wang Wei, Wang Ben, Wang Guan-Nan
2014, 36(7): 1573-1578. doi: 10.3724/SP.J.1146.2013.01123
Abstract:
An angle estimation algorithm based on fourth-order cumulants for distributed targets in monostatic Multiple Input Multiple Output (MIMO) radar is proposed in this paper, which could be used to deal with the problem of the performance declining in co...
Pose Angle Aided Target Tracking Algorithm Based on Gaussian Sum Square-root Cubature Kalman Filter
Shan Gan-Lin, Zhang Kai, Ji Bing
2014, 36(7): 1579-1584. doi: 10.3724/SP.J.1146.2013.01474
Abstract:
Based on the relationship between the velocities of 2D motion and the pose angle, a pose angle aided target tracking algorithm is proposed. In terms of target kinematics, the tracking models, in which the state vector includes pose information, are c...
Processing of the Airborne InSAR Data Based on the BP Algorithm and the Time-varying Baseline
Pan Zhou-Hao, Li Dao-Jing, Liu Bo, Zhang Qing-Juan
2014, 36(7): 1585-1591. doi: 10.3724/SP.J.1146.2013.00715
Abstract:
A systematic review of the phase error of the conventional airborne InSAR data processing method is firstly presented, which is caused by the center-beam approximation, and the unknown terrain, and its effects on imaging quality and height accuracy a...
Four-order Polynomial Based Range-Doppler Algorithm for Multi-receiver Synhetic Aperture Sonar
Zhang Xue-Bo, Tang Jin-Song, Zhang Sen, Bai Sheng-Xiang, Zhong He-Ping
2014, 36(7): 1592-1598. doi: 10.3724/SP.J.1146.2013.01317
Abstract:
The sub-system composed of an element of the receiver array and the transmitter in Synthetic Aperture Sonar (SAS) is studied. Due to the double square rooted terms in the slant range history of the sub-system, the fourth-order Taylor expansion is use...
Cascade Estimation Method of Mutual Coupling Matrix and Direction of Arrival
Si Wei-Jian, Wu Di, Chen Tao, Wu Na
2014, 36(7): 1599-1604. doi: 10.3724/SP.J.1146.2013.01330
Abstract:
The performance of direction finding of traditional MUltiple SIgnal Classification (MUSIC) method decreases sharply in the presence of sensor mutual coupling. In order to estimate effectively Mutual Coupling Matrix (MCM) of array and Direction Of Arr...
Online Target Tracking Based on Mulitiple Instance Learning and Random Ferns Detection
Luo Yan, Xiang Jun, Yan Ming-Jun, Hou Jian-Hua
2014, 36(7): 1605-1611. doi: 10.3724/SP.J.1146.2013.01358
Abstract:
Recently, a class of tracking techniques called tracking by detection receive much attention in computer vision. These methods train a discriminative classsifier to separate the object from the background. The classifier bootstraps itself by using th...
A Statistical Inference Approach for Person Re-identification
Du Yu-Ning, Ai Hai-Zhou
2014, 36(7): 1612-1618. doi: 10.3724/SP.J.1146.2013.01144
Abstract:
Person re-identification, identifying the same persons images in an existing database come from non-overlapping camera views, is a valuable but challenging task. This paper proposes a statistical inference approach for person re-identification. A sim...
Road Edge Detection Based on Vanishing Point Iteration Revaluation
Liu Peng-Hui, Li Sui-Lao, He Ying
2014, 36(7): 1619-1624. doi: 10.3724/SP.J.1146.2013.01203
Abstract:
Few traditional road edge detection algorithms can be employed in rural road. An edge detection method based on vanishing point iteration revaluation is presented in this paper. Firstly, the texture orientation of pixel is estimated by Gabor filter, ...
System Modeling and Performance Analysis for Remote Target Detection of Small-scale Sensor Networks
Yan Yong-Sheng, Wang Hai-Yan, Shen Xiao-Hong
2014, 36(7): 1625-1630. doi: 10.3724/SP.J.1146.2013.01089
Abstract:
In view of practical application of the target detection based on sensor networks, the remote target detection model is established. This paper addresses a novel Fusion Rule for Small-scale Sensor networks (FRSS) under the Neyman-Pearson criteria. Th...
A Prediction Model of Airport Noise Based on the Dynamic Ensemble Learning
Xu Tao, Yang Qi-Chuan, Lv Zong-Lei
2014, 36(7): 1631-1636. doi: 10.3724/SP.J.1146.2013.01410
Abstract:
The prediction of airport noise plays an important role in airport noise control, flight schedule planning and surrounding designs of airport. However, the existing prediction models are complex and need so many highly accurate parameters that are mo...
High-resolution Direction-of-arrival and Power Estimation Using Two-stage Weighted L1-norm Penalty
Tian Ye, Sun Xiao-Ying, Qin Yu-Di
2014, 36(7): 1637-1641. doi: 10.3724/SP.J.1146.2013.01365
Abstract:
This paper presents a new Direction-Of-Arrival (DOA) and power estimation algorithm based on two-stage weighted L1-norm penalty. In this scheme, this paper first obtains a better statistical performance vector measurement model by sum-average arithme...
Investigation on Ideal Access Structure of XOR-based Visual Cryptography
Fu Zheng-Xin, Shen Gang, Kong Zhi-Yin, Yu Bin
2014, 36(7): 1642-1647. doi: 10.3724/SP.J.1146.2013.01395
Abstract:
The definition of ideal access structure of XOR-based visual cryptography is given in this paper. The characteristics of ideal access structure are analyzed, and the construction algorithm of shares under ideal access structure is designed. Based on ...
The Research on Countermeasure against Fault Attacks for NCL Circuits
Ou, Qing-Yu , Luo Fang, Wu Xiao-Ping
2014, 36(7): 1648-1655. doi: 10.3724/SP.J.1146.2013.00750
Abstract:
As an important method of Side Channel Attacks (SCA), fault attacks offer the attacker plenty of possibilities to attack a cryptosystem, and nearly all the cryptographic algorithms are broken by using such kinds of attacks. So far many countermeasure...
On the Uniqueness of Decomposition of a NFSRinto a Cascade Connection of Smaller NFSRs
Wang Zhong-Xiao, Qi Wen-Feng
2014, 36(7): 1656-1660. doi: 10.3724/SP.J.1146.2013.01062
Abstract:
The Nonlinear Feedback Shift Register.(NFSR) is one of hot topics of stream cipher in recent studies. The uniqueness of a NFSR assuming to be decomposed into a cascade connection of smaller NFSRs is discussed in this paper. Firstly, the decomposition...
Differential Analysis of the Nonlinear Functions of SHACAL-2 Algorithm and the Application
Shen Xuan, Li Rui-Lin, Li Chao, Zhao Guang-Yao
2014, 36(7): 1661-1666. doi: 10.3724/SP.J.1146.2013.01717
Abstract:
SHACAL-2 algorithm is one of the standard block ciphers recommended by European NESSIE plan. It includes two kinds of nonlinear functions, the choice function and the major function. This paper studies mainly differential properties of the two nonlin...
Private Database Queries With a Quantum Third Party
Zhang Zhao, Wang Hong, Ma Zhi
2014, 36(7): 1667-1672. doi: 10.3724/SP.J.1146.2013.00682
Abstract:
It is of great importance to guarantee the privacy of the database and users when the database is being queried. A private database queries protocol based on a quantum Third Party (TP) is proposed by utilizing the quantum correlation of three-photon ...
Optimal Energy-efficient Power Allocation in OFDMA System
Wu Fan, Mao Yu-Ming, Huang Xiao-Yan, Leng Su-Peng
2014, 36(7): 1673-1679. doi: 10.3724/SP.J.1146.2013.01291
Abstract:
This paper focuses on the energy-efficient power allocation in OFDMA systems. Different from the existing work, this paper proves that the optimal energy-efficient power allocation must have a special water-filling structure, named energy-efficient w...
Optimization for Average Throughput of Secondary Users in Cognitive Radio Networks
Liu Yang, Cui Ying, Li Ou
2014, 36(7): 1680-1685. doi: 10.3724/SP.J.1146.2013.01177
Abstract:
In cooperative spectrum sensing, previous numerical studies show that the sensing performance and the throughput of channel can be improved by increasing the secondary users which are participate in cooperative sensing. Due to the existence of channe...
LTE-A Uplink Resource Sharing Mechanism Based on Matching and Interference Quantizing in Cognitive Radio Network
Fei Xin-Wei, Wang Man-Xi, Bai Bo, Chen Wei, Cao Zhi-Gang
2014, 36(7): 1686-1692. doi: 10.3724/SP.J.1146.2013.01241
Abstract:
In cognitive radio network, the underlay coexistence problem of the OFDMA based Secondary System (SS) with LTE-A systems is more and more important. This paper focuses on the resource allocation and interference mitigation issues in the aforementione...
Spectrum Sensing Algorithm in Cognitive Radio Based on Array Antenna and Covariance Matrix
Zhao Xiao-Hui, Li Xiao-Yan
2014, 36(7): 1693-1698. doi: 10.3724/SP.J.1146.2013.01057
Abstract:
A spectrum sensing algorithm based on covariance matrix and array antenna is reported. It can perform blind spectrum sensing under a condition of uncertainty noise. The new test statistics for spectrum sensing based on the covariance matrix is constr...
Fast Coding Unit Splitting Algorithm for High Efficiency Video Coding Intra Prediction
Qi Mei-Bin, Chen Xiu-Li, Yang Yan-Fang, Jiang Jian-Guo, Jin Yu-Long, Zhang Jun-Jie
2014, 36(7): 1699-1705. doi: 10.3724/SP.J.1146.2013.01148
Abstract:
High Efficiency Video Coding (HEVC) adopts a quadtree-based Coding Unit (CU) block partitioning structure which is flexible to adapt to various texture characteristics of images and can improve the coding efficiency significantly; however, it also in...
Optimized Opportunistic Network Coding Mechanism for Video Transmission in Wireless Networks
Ge Qing, Bai Guang-Wei, Shen Hang, Zhang Peng
2014, 36(7): 1706-1712. doi: 10.3724/SP.J.1146.2013.01373
Abstract:
Most existing wireless network coding mechanisms do not consider the impact of wireless link quality on video transmission, resulting in the degradation in video quality. To address the above issue, this paper proposes an Optimized Opportunistic Netw...
Design on the Elastic Protocol Customizable Data Plane and Its Mapping Algorithm
Liu Zhong-Jin, Li Yong, Su Li, Jin De-Peng, Zeng Lie-Guang
2014, 36(7): 1713-1719. doi: 10.3724/SP.J.1146.2013.01151
Abstract:
Along with the growing expansion of network functions and continuous emerging of new protocols, the novel packet types and processing requirements are established in these protocols. The Software Defined Networking (SDN) makes the network innovation ...
Joint Channel and Power Optimal Game-theoretic Algorithm for Concurrent Transmission in Wireless Sensor Network
Hao Xiao-Chen, Gong Qian-Qian, Hou Shuang, Liu Bin, Sun Chao
2014, 36(7): 1720-1727. doi: 10.3724/SP.J.1146.2013.01058
Abstract:
To deal with the issue that the interference increasing will make network capacity decrease and energy consumption increase in Wireless Sensor Network (WSN), the joint channel allocation and power control optimal game-theoretic model is established. ...
Crucial Node Decision Algorithm Based on Energy in WSNs
Liu Bin, Wang Wen-Ji, Li Ya-Qian, Yin Rong-Rong, Han Tao
2014, 36(7): 1728-1734. doi: 10.3724/SP.J.1146.2013.01066
Abstract:
Crucial node decision plays an important role during the network survivability study. Taking into account the node energy is limited, this study consider both the remaining life of the network and the added value of network energy consumption due to ...
Mitigating Interest Flooding Attack Based on PrefixIdentification in Content-centric Networking
Tang Jian-Qiang, Zhou Hua-Chun, Liu Ying, Zhang Hong-Ke
2014, 36(7): 1735-1742. doi: 10.3724/SP.J.1146.2013.01770
Abstract:
As for the interest flooding attack in Content-Centric Networking (CCN), this study proposes a new approach to mitigate interest flooding attack based on abnormal name prefix identification. This study utilizes the forwarding state in CCN routers to ...
Secure Data Aggregation Scheme Based on Homomorphic MAC for Wireless Sensor Networks
Zhou Qiang, Yang Geng, Chen Lei, Chen Zheng-Yu, Dai Hua
2014, 36(7): 1743-1748. doi: 10.3724/SP.J.1146.2013.01079
Abstract:
Data aggregation is one of the most important approaches to alleviate the bottlenecks of resource in the Wireless Sensor Networks (WSNs). However, it is vulnerable to the attacks directing toward data confidentiality and integrity in an open and hete...
A Replica Placement Method during Data Stream Processing
Ding Wei-Long, Han Yan-Bo
2014, 36(7): 1755-1761. doi: 10.3724/SP.J.1146.2013.01051
Abstract:
Many applications of Internet of Things (IoT) are performed by the continuous stream processing of the senor data and nodes replicas are required to guarantee system availability. However, the replicas backup and placement often bring the processing ...
Effect of Optical Phase-shifting Network on Beam Levels of Phased Array Antenna
Su Jun, Qiu Qi, Shi Shuang-Jin
2014, 36(7): 1762-1766. doi: 10.3724/SP.J.1146.2013.01427
Abstract:
The performance of optically controlled phased array antenna is greatly improved by the optical phase- shifting network with its advantages of broad bandwidth and high precision, however the additional phase noise of the optical phase-shifting networ...
Antenna Height Optimization Based on Object Functionfor Microwave Over-the-horizon Radar
Kang Shi-Feng, Cao Zhong-Qing, Wang Hong-Guang, Guo Xiang-Ming
2014, 36(7): 1767-1770. doi: 10.3724/SP.J.1146.2013.01039
Abstract:
Microwave over-the-horizon radar can detect long distance and low altitude targets by means of the evaporation ducts over sea, however, the super refraction and multi-path propagation effects produce radar blind areas in evaporation duct where target...
Design of a Novel Dual-band High Gain Antenna
Ding You, Li Min-Quan, Peng Meng, Rong Bo, Qin Kun
2014, 36(7): 1771-1774. doi: 10.3724/SP.J.1146.2013.01256
Abstract:
In order to adapt to the requirement of the modern dual-band communication system, this paper presents a novel dual-band high gain antenna by adding an annular metal cylinder to the aperture in the center based on enhanced microwave transmission prop...
A Multiplication-based Analog Network Coding Relaying Scheme
Huang Xue-Jun, Zhu Hong-Bo
2014, 36(7): 1775-1778. doi: 10.3724/SP.J.1146.2013.01018
Abstract:
The current wireless Network Coding Relaying (NCR) is based on XOR operation or superposition operation, this paper proposes an Amplify-and-Forward NCR (AFNCR) cooperative scheme based on the multiplication operation. The relay node realizes the anal...
Reviews
Attribute Based Sanitizable Signature Scheme in Cloud Computing
Liu Xi-Meng, Ma Jian-Feng, Xiong Jin-Bo, He Tuo, Li Qi
2014, 36(7): 1749-1754. doi: 10.3724/SP.J.1146.2013.01154
Abstract:
Attribute signature attracts much attention due to the large-scale applications of cloud computing. Sensitive information in the document needs to be hidden in cloud computing environment, and Attribute Based Sanitizable Signature (ABSS) scheme in cl...