Advanced Search

2015 Vol. 37, No. 12

Display Method:
A Hierarchical Clustering Method Based on the Threshold of Semantic Feature in Big Data
Luo En-tao, Wang Guo-jun
2015, 37(12): 2795-2801. doi: 10.11999/JEIT150422
Abstract:
The type and scale of data has been promoted with a hitherto unknown speed by the emerging services including cloud computing, health care, street view services recommendation system and so on. However, the surge in the volume of data may lead to man...
Ad hoc Network Cooperation Enforcement Model Based on Game Theory
Li Tian-ze, Wu Mu-qing, Li Pei-zhe, Liao Wen-xing, Ma Wei
2015, 37(12): 2802-2807. doi: 10.11999/JEIT150356
Abstract:
In order to solve the selfishness problem that forwarding nodes in the wireless ad hoc network refuse to cooperation due to the limit of energy and storage space, a wireless ad hoc network cooperation enhancement model combined with the game theory i...
A Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks
Ding Chao, Yang Li-jun, Wu Meng
2015, 37(12): 2808-2814. doi: 10.11999/JEIT150208
Abstract:
To address the contradiction between data aggregation and data security in Wireless Sensor Networks (WSNs), a recoverable privacy-preserving integrity-assured data aggregation scheme is proposed based on the technologies of privacy homomorphism and a...
An Entity State Matching Prediction Method for Content-basedSearch in the Internet of Things
Zhang Pu-ning, Liu Yuan-an, Wu Fan, Tang Bi-hua, Wu Chao
2015, 37(12): 2815-2820. doi: 10.11999/JEIT150191
Abstract:
Matching prediction with high accuracy of entity state can cansignificantly improve the efficiency of content-based search in the Internet of Things and reduce communication overhead while searching. The equal-interval and during the period entity st...
Signature Selection for Kernel Malware Based on Cluster Analysis
Chen Zhi-feng, Li Qing-bao, Zhang Ping, Feng Pei-jun
2015, 37(12): 2821-2829. doi: 10.11999/JEIT150387
Abstract:
As current kernel malware detection method based on data signature exists the problem that its efficiency decreases with the growth of the number of signatures, a signature selection method for kernel malware based on hierarchical cluster is presente...
Expanded Generalized Integer Transform Based Lossless Informaiton Hiding Method
Qiu Ying-qiang, Yu Lun
2015, 37(12): 2830-2837. doi: 10.11999/JEIT150477
Abstract:
To make the generalized interger transform used for lossless information hiding more generalized and improve the data embedded capacity, a new lossless information hiding method based on expanded generalized integer transform is proposed for image. B...
Provable Secure and Compact Certificateless Aggregate Signcryption Scheme
2015, 37(12): 2838-2844. doi: 10.11999/JEIT150407
Abstract:
Certificateless aggregate signcryption not only can ensure the confidentiality and authentication of information transmission, but also can reduce the cost of data communication and the verification of ciphertexts. Through analyzing some existing cer...
Related-key Rectangle Attack on MD-64
Guo Jian-sheng, Cui Jing-yi, Luo Wei, Liu Yi-peng
2015, 37(12): 2845-2851. doi: 10.11999/JEIT150049
Abstract:
The security of MD-64 block cipher under related-key rectangle attack is studied. Firstly, when the weight of input difference is 1, the differential properties of high order DDOs (Data Dependent Operations) and SPN structures are researched. By the ...
Advance Trigger Handover Algorithm Based on the Speed in LTE-R
Mi Gen-suo, Ma Shuo-mei
2015, 37(12): 2852-2857. doi: 10.11999/JEIT150577
Abstract:
With the rapid development of high-speed railway, the railway mobile communication system has more demands on the handover delay and handover success rate. This paper proposes an advance trigger handover algorithm based on the speed in LTE-R. It is d...
Real-time Distributed Cooperative Spectrum DetectionAlgorithm Based on Diffusion Strategy
Zhang Zheng-bao, Yao Shao-lin, Xu Xin, Liu Guang-kai
2015, 37(12): 2858-2865. doi: 10.11999/JEIT150460
Abstract:
Considering the problem of real-time distributed cooperative spectrum detection of cognitive users, a real-time distributed cooperative spectrum detection algorithm based on diffusion strategy is proposed. Global cost function can be approximated by ...
Cascaded Stochastic Resonance for Digitized Receiving of Linear Frequency Modulation Signal
Hou Cheng-guo, Luo Bo-wen, Li Di
2015, 37(12): 2866-2871. doi: 10.11999/JEIT 141496
Abstract:
In order to eliminate the narrowband limit of stochastic resonance system, and to complete the digitized receiving of linear frequency modulation signal with high gain, a method based on the frequency setting of received digital samples is proposed. ...
Research on Self-adjusting OFDM Underwater Acoustic Communication Algorithm for Transmission Rate Maximization
Luo Ya-song, Xu Jiang-hu, Hu Hong-ning, He Jing-bo, Chen Zhan-wei
2015, 37(12): 2872-2876. doi: 10.11999/JEIT150440
Abstract:
Based on the modeling of transmission rate maximization problem for Orthogonal Frequency Division Multiplexing (OFDM) underwater acoustic communication, the computing amount for water-filling algorithm is reduced reasonably, which realizes rapid assi...
Subspace Detection of Sub-Nyquist Sampling System Based on Highly Redundant Gabor Frames
Chen Peng, Meng Chen, Wang Cheng
2015, 37(12): 2877-2884. doi: 10.11999/JEIT150327
Abstract:
The sampling system based on Gabor frames with exponential reproducing windows holds nice performance for short pulses in general cases, but when the frames are highly redundant, the traditional coefficient oriented methods for subspace detection may...
Parameter Estimation Method of Incoherently Distributed Source via Sparse Representation
Cheng Zeng-fei, Zhao Yong-bo, Shui Peng-lang, Xu Bao-qing
2015, 37(12): 2885-2890. doi: 10.11999/JEIT150340
Abstract:
By analyzing the signal model of the Incoherently Distribute Source (IDS), a sparse representation based parameter estimation method of IDS is presented. Through using the Toeplitz characteristic and the two point approximation model as well as the J...
Non-ambiguity Beamforming of Nonuniform Linear Array Based on Consecutive Difference Coarray
Huang Yan, Liao Gui-sheng, Li Jun, Li Jie
2015, 37(12): 2891-2897. doi: 10.11999/JEIT150321
Abstract:
As the beamforming of Nonuniform Linear Array (NLA) may occur grating lobes phenomenon, a beamforming method is proposed for working on the NLA with consecutive difference coarray. Firstly, this method analyzes the array optimization of the NLA based...
Normalized Residual-based Outlier Detection with False-alarm Probability Controlling
Ru Xiao-hu, Liu Zheng, Jiang Wen-li, Huang Zhi-tao
2015, 37(12): 2898-2905. doi: 10.11999/JEIT150469
Abstract:
Outlier detection, also called anomaly detection, is an important issue in pattern recognition and knowledge discovery. Previous outlier detection methods can not effectively control the false-alarm probability. To solve the problem, a supervised met...
Target Tracking Based on Multiple Instance Deep Learning
Cheng Shuai, Sun Jun-xi, Cao Yong-gang, Liu Guang-wen, Hang Guang-liang
2015, 37(12): 2906-2912. doi: 10.11999/JEIT150319
Abstract:
To overcome the problem that the deficiency of the appearance model and the motion model often leads to low precision in original Multiple Instance Learning (MIL), a target tracking algorithm is proposed based on multiple instance deep learning. In o...
Modified Covariate-shift Multi-source Ensemble Method in Transferability Metric
Yang Xing-ming, Wu Ke-wei, Sun Yong-xuan, Xie Zhao
2015, 37(12): 2913-2920. doi: 10.11999/JEIT150323
Abstract:
Transfer learning usually focuses on dealing with small training set in target domain by sharing knowledge generated from source ones, in which one main challenge is divergence metric of distributed samples between training and test data. In order to...
Determining Next Best View Using Occlusion and Contour Information of Visual Object
Zhang Shi-hui, Han De-wei, He Huan
2015, 37(12): 2921-2928. doi: 10.11999/JEIT150190
Abstract:
Determining cameras next best view is a difficult issue in visual field. A next best view approach based on depth image of visual object is proposed by using occlusion and contour information in this paper. Firstly, the occlusion detection is accompl...
A High Resolution Algorithm of Direct Path Interference Suppression for Bistatic Sonar
Xu Jing-feng, Han Shu-ping, Shu Xiang-lan, Ma Xin, Dong Yong-feng
2015, 37(12): 2929-2934. doi: 10.11999/JEIT150198
Abstract:
In view of the problem of target echoes interfered by strong direct path-wave in bistatic sonar, a high resolution algorithm of direct path interference suppression is proposed when the deployment is known. The method divides the space of N dimension...
A Novel Method of DOA Estimation for Wideband Signals Based on Sparse Representation
Zhao Yong-hong, Zhang Lin-rang, Liu Nan, Xie Hu
2015, 37(12): 2935-2940. doi: 10.11999/JEIT150423
Abstract:
A novel wideband signals Direction-Of-Arrival (DOA) estimation method based on sparse representation is proposed. This algorithm can reduce the storage and calculation of the traditional sparse representation methods in wideband signals process, whic...
ISAR Imaging Method Based on the Bayesian Group-sparse Modeling
Wu Cheng-guang, Deng Bin, Su Wu-ge, Wang Hong-qiang, Qin Yu-liang
2015, 37(12): 2941-2947. doi: 10.11999/JEIT141624
Abstract:
The traditional sparse ISAR imaging method mainly considers the recovery of coefficients on individual scatters. However, in the practice situation, the target scatters presented by blocks or groups do not emerge on individual. In this case, the usua...
A Novel Design Method of Radar Target Angle Tracking Loop Filter
Jiang Bing-bing, Sheng Wei-xing, Zhang Ren-li, Han Yu-bing
2015, 37(12): 2948-2955. doi: 10.11999/JEIT150389
Abstract:
The angle tracking loop in airborne radar facing to a maneuvering target plays a vital role in the joint 3D-tracking of range, velocity and angle. This paper analyses the disadvantage of the conventional Kalman filter algorithm employed to track a ma...
Joint Transmit and Receive Array Position Error Calibration for Bistatic MIMO Radar Based on Clutter
Liu Yuan, Jiu Bo, Liu Hong-wei, Xia Xiang-gen
2015, 37(12): 2956-2963. doi: 10.11999/JEIT150347
Abstract:
The issue of position error estimation for transmit and receive array of a bistatic Multiple-Input Multiple-Output (MIMO) radar is investigated, and an algorithm for the joint estimation based on clutter echo is proposed. The algorithm is based on th...
Optimal Waveform Design for Instantaneous Polarization Radar via Spectral Approximation
Zhao Yi-nan, Jiang Zhi-zhuo, Li Feng-cong, Feng Xiang, Zhou Zhi-quan
2015, 37(12): 2964-2970. doi: 10.11999/JEIT150299
Abstract:
To reduce estimation error caused by high correlation level of two transmitted waveforms, a novel method is proposed to design a couple of waveforms with low correlation level, named Phase Only Spectral Approximation Algorithm (POSAA). Firstly, the o...
Compensating Method of L-band Radar ISAR Imaging for Ionosphereic Target with High-velocity
Huang Xiao-hong, Wen Gong-jian
2015, 37(12): 2971-2976. doi: 10.11999/JEIT150646
Abstract:
High velocity and Ionosphereic both modulate the phase of low carrier frequency wide-band linearly frequency modulated radar signal , It make the resolution of Inverse SAR (ISAR) image lower. In order to get clean ISAR image, the effect of high veloc...
Detection of Moving Targets for Wideband Radar Based on Joint-sparse Recovery
Fang Ming, Dai Feng-zhou, Liu Hong-wei, Wang Xiao-mo, Qin Tong
2015, 37(12): 2977-2983. doi: 10.11999/JEIT150442
Abstract:
Range migration is the basic and troublesome problem in moving target detection for wideband radar. To solve this problem, a detection algorithm of moving targets based on joint-sparse recovery is proposed for wideband radar. Firstly, a prewhitening ...
Combined Adaptive GLRT-LTD against Sea Clutter
Liu Ming, Shui Peng-lang
2015, 37(12): 2984-2990. doi: 10.11999/JEIT150588
Abstract:
Long integration is often required to detect weak moving target in sea clutter. However, the Doppler frequency spread and amplitude fluctuation in long integration and limited reference cells resulting from spatial non-homogeneity of sea clutter make...
Polarimetric SAR Image Despeckling Using Non Local Means Filter Based on Homogeneous Pixels Preselection
Yang Xue-zhi, Chen Jing, Zhou Fang, Lang Wen-hui, Zheng Xin, Li Guo-qiang
2015, 37(12): 2991-2999. doi: 10.11999/JEIT150314
Abstract:
A Non Local Means (NLM) filtering based on Homogeneous Pixels Preselection (NLM-HPP) is proposed to solve the problem of preserving structural feature and polarimetric scattering properties in speckle reduction of Polarimetric SAR (PolSAR) images. Fi...
Compressed Sensing Reconstruction of Hyperspectral Images Based on Spatial-spectral Multihypothesis Prediction
Wang Li, Feng Yan
2015, 37(12): 3000-3008. doi: 10.11999/JEIT150480
Abstract:
Compressed Sensing (CS) reconstruction of hyperspectral images driven by spatial-spectral multihypothesis prediction is proposed in order to take full advantage of spatial and spectral correlation of hyperspectral images. The hyperspectral images are...
Robust Optimal Control for Unmanned Aerial Vehicles Three-dimensional Trajectory Tracking in Wind Disturbance
Zhang Kun, Gao Xiao-guang
2015, 37(12): 3009-3015. doi: 10.11999/JEIT150047
Abstract:
This paper presents a robust optimal guidance control law for precise three-dimensional (3D) trajectory tracking of an Unmanned Aerial Vehicle (UAV) in wind disturbance. The wind disturbance is considered in the UAVs kinematic model. The reference pa...
Kinematics Model Prediction of Skid-steering Robot Using Adaptive Kalman Filter Estimation
Wu Yao, Wang Tian-miao, Wang Xiao-gang, Liu Miao
2015, 37(12): 3016-3024. doi: 10.11999/JEIT150289
Abstract:
Exact and real-time kinematics model plays a very important role in the mobile robot motion control and path planning. Compared to the off-line model estimation, based on an Instantaneous Centers of Rotation (ICRs) based kinematic model of skid-steer...
Near-field to Far-field Transformations Based on Spherical Wave Expansions and Fast Algorithm
Li Nan-jing, Li Yuan-xin, Hu Chu-feng
2015, 37(12): 3025-3029. doi: 10.11999/JEIT150203
Abstract:
The theory of near-field to far-field transformation using spherical-wave expansions is the key to implement the spherical near-field antenna measurement system. It can develop the field in the space which is built by antenna expanding into the sum o...
Interconnect Architecture of a Novel And-inverter Cone Based FPGA Cluster
Huang Zhi-hong, Yang Hai-gang, Yang Li-qun, Li Wei, Jiang Zheng-hong, Lin Yu
2015, 37(12): 3030-3040. doi: 10.11999/JEIT150249
Abstract:
With deep understanding of the characteristics of And-Inverter Cone (AIC), an alternative logic element for FPGA, a series of improvements are proposed to get an optimized interconnect architecture inside the logic cluster. The enhancements include r...
Channel-equalization Using Joint Approximate Diagonalization of Eigen-matrices-independent Component Analysis in Polarization Division Multiplexed in Optical OFDM Systems
Feng Ping-xing, Wei Ping, Zhang Hong-bo
2015, 37(12): 3041-3045. doi: 10.11999/JEIT150455
Abstract:
In this study, a complex-valued Joint Approximate Diagonalization of Eigen-matrices (JADE)- Independent Component Analysis (JADE-ICA) algorithm is proposed for the Polarization Division Multiplexed in Optical Orthogonal Frequency Division Multiplexin...
Application of Denoising Method to Local Strong Reflection Based on Fractional Differentials
Tang Rui-yin, Shen Hong-hai, He Hong-kun
2015, 37(12): 3046-3050. doi: 10.11999/JEIT150500
Abstract:
To deal with the problem of the serious speckle or composite speckle noise in the image of the strong reflection surface, an image denoising algorithm based on fractional differential enhancement is proposed, which can highlight the granular characte...