Advanced Search

2015 Vol. 37, No. 2

Display Method:
Articles
Hyperspectral Image Compression Algorithm with Maximum Error Controlled Based on Clustering
LI Qiu-Fu, Chen De-Rong, He Guang-Lin, Feng Hui, Yang Liu-Xin
2015, 37(2): 255-260. doi: 10.11999/JEIT140451
Abstract:
Aiming at the problem that the maximum Error Controllable compression based on SVD (EC-SVD) algorithm can not make full use of spectral vectors redundancy in hyperspectral image, a hyperspectral image compression algorithm with maximum error controll...
SAR Image Segmentation Algorithm Using Hierarchical Region Merging with Edge Penalty
Zhang Ze-Jun, Shui Peng-Lang
2015, 37(2): 261-267. doi: 10.11999/JEIT140331
Abstract:
A new SAR image segmentation model with edge penalty is constructed, which uses oriented edge strength information and a minimized hierarchical region merging algorithm is proposed in this paper. The edge strength information is extracted by using Mu...
Speckle Reduction for PolSAR Image Based on Structure Preserving Bilateral Filtering
Yang Xue-Zhi, Ye Ming, Wu Ke-Wei, Lang Wen-Hui, Zheng Xin, Li Guo-Qiang
2015, 37(2): 268-275. doi: 10.11999/JEIT140199
Abstract:
A Structure Preserving Bilateral Filtering (SPBF) is proposed to address the problem of preserving structural information for reducing speckle in a PolSAR image. The edge structural characteristics and surface scattering features are adopted to measu...
Active Repeater Jamming Suppression Using Polarimetric Monopulse Radar
Li Yong-Zhen, Hu Wan-Qiu, Chen Si-Wei, Yin Jia-Peng, Wang Xue-Song
2015, 37(2): 276-282. doi: 10.11999/JEIT140146
Abstract:
The active repeater jamming is a very important jamming technique in the modern warfare, especially for the air defense, anti-missile and anti-warship operations. It becomes a serious threat for the modern radar systems. This paper focuses on the rep...
Forest Parameters Inversion Based on Nonstationarity Compensation and Mapping Space Regularization
Lu Hong-Xi, Song Wen-Qing, Li Fei, Wang Ying-Hua, Liu Hong-Wei, Bao Zheng, Huang Hai-Feng
2015, 37(2): 283-290. doi: 10.11999/JEIT140261
Abstract:
Forest parameters inversion is an important application of Polarimetric Interference Synthetic Aperture Radar (PolInSAR). The traditional inversion method does not take into account the amplitude and phase non-stationary of observation, and its non-u...
Translation Compensation and Resolution of Multi-ballistic Targets in Midcourse
Hu Xiao-Wei, Tong Ning-Ning, Dong Hui-Xu, Chu Hong-Shuai
2015, 37(2): 291-296. doi: 10.11999/JEIT140494
Abstract:
Time-frequency image of multi-ballistic targets is composed of micro-Doppler of multi-targets with multi-scattering centers, which makes the methods for single target invalid. Firstly, micro-Doppler of precessing missile and swinging decoy is analyze...
Research on Methods of Targets RCS Near-field-to-far-field Transformation Based on 3-D SAR Imaging
Zhang Xiao-Ling, Chen Ming-Ling, Liao Ke-Fei, Shi Jun, Wei Shun-Jun
2015, 37(2): 297-302. doi: 10.11999/JEIT140535
[Abstract](1633) [PDF 417KB](1075) [Cited by] (18)
Abstract:
Microwave 3-D imaging technique can accurately separate and extract the attractive targets from the background noise. So it can be utilized to analyze and study the ElectroMagnetic (EM) scattering characteristics of the outfield targets. Thus researc...
A Modified Polar Format Algorithm Applied to Squinted Spotlight SAR Imaging
Shao Peng, Li Ya-Chao, Li Xue-Shi, Xing Meng-Dao
2015, 37(2): 303-308. doi: 10.11999/JEIT140564
Abstract:
For broadside spotlight Synthetic Aperture Radar (SAR) imaging, Polar Format Algorithm (PFA) is applied widely as a kind of general interpolation algorithm. When PFA is applied to the squinted spotlight, coordinate rotation causes azimuth spectrum un...
Two-dimensional Imaging Using MIMO Radar and ISAR Technique Based on Linear Array
Dong Hui-Xu, Zhang Yong-Shun, Feng Cun-Qian, Li Zhe
2015, 37(2): 309-314. doi: 10.11999/JEIT140529
Abstract:
In view of the uneven imaging data caused by the uneven space-time array in the MIMO-ISAR imaging, the echo signal model of a target is established based on a linear array, an imaging algorithm that focuses on the cross-range direction following rang...
Compressive Sensing Using Complex Factor Analysis for Stepped-frequency Data
Xu Dan-Lei, Du Lan, Liu Hong-Wei, Wang Peng-Hui, Cong Yu-Lai
2015, 37(2): 315-321. doi: 10.11999/JEIT140407
Abstract:
It usually takes a long observing time when a cognitive radar transmits the High-Range-Resolution (HRR) stepped-frequency signal. To save time, partial pulses of the stepped-frequency signal are transmitted to obtain the incomplete frequency data, an...
A Cyclic Iterative Method for MIMO Radar Transmit Beampattern Design
Wu Meng, Liu Hong-Wei, Wang Xu
2015, 37(2): 322-327. doi: 10.11999/JEIT141043
Abstract:
Transmit beampattern design for Multiple Input Multiple Output (MIMO) radar is obtained by synthesizing the signal covariance matrix, which can be achieved by convex optimization approaches. Due to the high computational complexity, these approaches ...
Parameter Estimation for the K-distribution in PolSAR Imagery Based on Hybrid Moments
Cui Hao-Gui, Liu Tao, Jiang Yu-Zhong, Gao Jun
2015, 37(2): 328-333. doi: 10.11999/JEIT140551
Abstract:
The K-distribution is usually used to model the Polarimetric Synthetic Aperture Radar (PolSAR) imagery. The parameter estimation method for K-distribution is very important,which affects the fitting degree of the model. However, the classical method ...
Two-stage Reduced-dimension Adaptive Processing Method Based on the Spatial Data Decomposition
Zhou Yan, Feng Da-Zheng, Zhu Guo-Hui, Xiang Ping-Ye
2015, 37(2): 334-338. doi: 10.11999/JEIT140508
Abstract:
The traditional post-Doppler adaptive processing approaches such as Factored Approach (FA) and Extended Factored Approach (EFA) can significantly reduce the computation-cost and training sample requirement in adaptive processing. However, their clutt...
Two Dimensional Geometric Feature Inversion Method for Midcourse Target Based on ISAR Image
Xu Shao-Kun, Liu Ji-Hong, Yuan Xiang-Yu, Lu Jing
2015, 37(2): 339-345. doi: 10.11999/JEIT140338
Abstract:
This paper focuses on Two Dimensional (2D) geometric feature inversion method of midcourse targets, serving for the target recognition problem of ballistic missile defense system. Based on the figuration characteristic of midcourse targets, a stable ...
Investigation on Visual Background Extractor Based on Gray Feature and Adaptive Threshold
Zhuang Zhe-Min, Zhang Cong-You, Yang Jin-Yao, Li Fen-Lan
2015, 37(2): 346-352. doi: 10.11999/JEIT140317
Abstract:
In order to solve the problem of the ghost and the shadow of moving object, an improved Visual Background extractor (ViBe) algorithm is proposed based on gray feature and adaptive threshold. The new method firstly applies the ViBe algorithm to obtain...
A Leap Motion Based Intuitive Volume Interaction Technology
Xu Chong-Bin, Zhou Ming-Quan, Shen Jun-Chen, Luo Yan-Lin, Wu Zhong-Ke
2015, 37(2): 353-359. doi: 10.11999/JEIT140370
Abstract:
The Leap Motion sensor can detect the position and speed information of hands and fingers with high precision in real-time, which provides an effective way for volume interaction with large screen at long-distance. A set of understandable gesture for...
Conflict Detection Algorithm Based on Overall Conflict Probability and Three Dimensional Brownian Motion
Shi Lei, Wu Ren-Biao, Huang Xiao-Xiao
2015, 37(2): 360-366. doi: 10.11999/JEIT140363
Abstract:
With the increasing of the air traffic flow, conflict detection plays an increasingly important role in air traffic management system. A probabilistic conflict detection algorithm is proposed. Overall conflict probability in look-ahead time is calcul...
Automatic Electrooculogram Separation Method for Single Channel Electroencephalogram Signals
Wu Ming-Quan, Li Hai-Feng, Ma Lin
2015, 37(2): 367-372. doi: 10.11999/JEIT140602
[Abstract](1811) [PDF 680KB](1056) [Cited by] (34)
Abstract:
The traditional ElectroOculoGram (EOG) correction methods usually use the correlation information of multi-channel ElectroEncephaloGram (EEG), and are difficult to apply to portable Brain-Computer Interface (BCI) in single channel. An automatic EOG s...
A Stereo Acoustic Echo Cancellation Method Based on the Hybrid of Spectral Dominance and Nonlinear Transformation
Yang He-Fei, Zheng Cheng-Shi, Li Xiao-Dong
2015, 37(2): 373-379. doi: 10.11999/JEIT140274
Abstract:
In stereophonic Acoustic Echo Cancellation (AEC) systems, the strong correlation between the two stereophonic channels leads to nonuniqueness of adaptive solutions and further large filter misalignment. To solve this problem and preserve speech quali...
The Research on the Algorithm of Inverse Beamforming for Interference Suppression with Good Robust
Ge Shi-Bin, Chen Xin-Hua, Sun Chang-Yu
2015, 37(2): 380-385. doi: 10.11999/JEIT140578
Abstract:
In the array signal processing, the inverse beamforming for interference suppression algorithm uses the azimuth information of interference to estimate and suppress the interference. In the complex marine environment the phase of the interference whi...
Ensemble One-class Classifiers Based on Hybrid Diversity Generation and Pruning
Liu Jia-Chen, Miao Qi-Guang, Cao Ying, Song Jian-Feng, Quan Yi-Ning
2015, 37(2): 386-393. doi: 10.11999/JEIT140161
Abstract:
Combining one-class classifiers using the classical ensemble methods is not satisfactory. To address this problem, this paper first proves that though one-class classification performance can be improved by a classifier ensemble, it can also degrade ...
Construction of Quasi-cyclic Low-density Parity-check Codes with a Large Girth Based on Arithmetic Progression
Zhang Yi, Da Xin-Yu, Su Yi-Dong
2015, 37(2): 394-398. doi: 10.11999/JEIT140538
Abstract:
To cope with the issue of determining cyclic shift coefficients of the quasi-cyclic sub-matrix in the Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) codes, a method is presented based on the Arithmetic Progression (AP) to compute the cyclic shift co...
A Resource Allocation Algorithm Based on Proportional Fairness and Refined Bandwidth Allocation for Multi-radio Systems
Pan Su, Cao Pao-Pao, Liu Sheng-Mei
2015, 37(2): 399-404. doi: 10.11999/JEIT140339
Abstract:
A joint resource allocation algorithm is proposed to solve the problem of the proportional fairness and the system efficiency in multi-radio systems based on OFDMA (Orthogonal Frequency Division Multiple Access). The algorithm optimizes the system th...
Reciprocity Calibration for Base Station Antenna in Massive MIMO Time Division Duplex Systems
Gu Zhe-Qi, Zhang Zhong-Pei
2015, 37(2): 405-410. doi: 10.11999/JEIT140472
Abstract:
The downlink transmission performance of the massive MIMO Time Division Duplex (TDD) system is bottlenecked by the channel reciprocity errors called antenna reciprocity errors. Antenna reciprocity errors are caused by the mismatch and mutual coupling...
Multi-cell Cooperative Scheduling and Power Control in SC-FDMA Systems
Niu Jin-Ping, Su Tao
2015, 37(2): 411-416. doi: 10.11999/JEIT140542
Abstract:
Inter-cell interference is a major factor that limits the performance of multi-cell systems. In this paper, a cooperative scheduling and power control algorithm for Single-Carrier Frequency-Division Multiple Access (SC-FDMA) multi-cell systems is pro...
Integral Cryptanalysis of Reduced Round FOX64
Guo Rui, Jin Chen-Hui
2015, 37(2): 417-422. doi: 10.11999/JEIT140373
Abstract:
FOX family block ciphers are based on Lai-Massey scheme. Firstly, the evaluation is performed on the ability of the reduced round FOX64 to resist zero-correlation linear cryptanalysis, and some 4-round zero- correlation linear distinguishers are pres...
A Lattice-based Revocable Adaptive-ID Secure Encryption Scheme
Zhang Yan-Hua, Hu Yu-Pu, Jiang Ming-Ming, Lai Qi-Qi
2015, 37(2): 423-428. doi: 10.11999/JEIT140421
Abstract:
User revocation is crucial to the practical application of Identity Based Encryption (IBE). The first Revocable Identity Based Encryption (RIBE) scheme from lattice is given by Chen et al. in ACISP 2012, but its security can only be proved in the sel...
Physical Layer Proposal Design and Interference Analysis Based on Chinese Medical Band in Wireless Body Area Network
Zou Wei-Xia, Kang Feng-Yuan, Du Guang-Long, Zhang Chun-Qing
2015, 37(2): 429-434. doi: 10.11999/JEIT140901
Abstract:
An OQPSK modulation scheme used spread spectrum is proposed which is based on the Chinese medical band. The analysis is done under variety of interference, the simulation results indicate that this scheme has good performance of the broadband interfe...
Collaborative Caching and Routing Scheme Based on Local Request Similarity in Named Data Networking
Ge Guo-Dong, Guo Yun-Fei, Liu Cai-Xia, Lan Ju-Long
2015, 37(2): 435-442. doi: 10.11999/JEIT140246
Abstract:
How to efficiently cache and take advantage of largely distributed copies poses challenges to the retrieval process of Named Data Networking (NDN). On the basis of similarity in local request, a collaborative caching and routing scheme is proposed. I...
Cache Management Mechanism with Node Status Evaluation for Intermittently Connected Wireless Networks
Wu Da-Peng, Bai Na, Wang Ru-Yan
2015, 37(2): 443-448. doi: 10.11999/JEIT140333
Abstract:
Considering the limited cache resources of nodes in intermittently connected wireless networks, a cache management mechanism is proposed based on node state estimate. The direct and indirect connection status, service rate and connectivity degree bet...
Adaptive Synchronization of Uncertain Fractional-order Chaotic Systems Based on Projective Method
Zhang You-An, Yu Ming-Zhe, Geng Bao-Liang
2015, 37(2): 455-460. doi: 10.11999/JEIT140514
Abstract:
Based on the stability theory of fractional-order system and Lyapunov stability theory, and using the sliding mode adaptive control and projective method, a synchronization control strategy is proposed for a class of fractional-order chaotic systems ...
Estimation and Simulation Analysis of the Submarine Magnetic Field Based on Current-line Mode
Chen Cong, Wei Yong, Yao Lu-Feng, Jiang Zhi-Guo, Gong Shen-Guang
2015, 37(2): 461-467. doi: 10.11999/JEIT140063
Abstract:
According to the generation mechanism of the underwater corrosion-relative-electromagnetic field of submarine, a current-line which is regarded as end-to-end electric dipole is proposed to simulate the field distribution. Firstly, the underwater stat...
A Statistical Static Timing Analysis Incorporating Process Variations with Spatial Correlations
Yu Wei, Yang Hai-Gang, Liu Yang, Huang Juan, Cai Bo-Rui, Chen Rui
2015, 37(2): 468-476. doi: 10.11999/JEIT140295
Abstract:
To evaluate effects of process variations on circuit delay accurately, this study proposes a Statistical Static Timing Analysis (SSTA) which incorporates process variations with spatial correlations. The algorithm applies a second order delay model t...
Research on Test Scheduling of 3D NoC under Number Constraint of TSV (Through-Silicon-Vias) Using Evolution Algorithm Based on Cloud Model
Xu Chuan-Pei, Chen Jia-Dong, Wan Chun-Ting
2015, 37(2): 477-483. doi: 10.11999/JEIT140165
Abstract:
As Through-Silicon-Vias (TSVs) in three-Dimensional Network-on-Chip (3D NoC) accompany some overhead such as the cost and the area, in order to optimize the number of TSVs of 3D NoC in test mode and reduce the test time, a new method using evolution ...
A Particle Filter Method for Pedestrian Navigation Using Foot-mounted Inertial Sensors
Gu Yang, Song Qian, Li Yang-Huan, Ma Ming, Zhou Zhi-Min
2015, 37(2): 484-488. doi: 10.11999/JEIT140362
Abstract:
During GPS outages, the foot-mounted inertial-based sensors are common replacement in pedestrian navigation. The Zero velocity UPdaTe-aided Extended Kalman Filter (ZUPT-aided EKF) is often used to resolve the trajectory of a walking pedestrian with a...
Contour Optimization of Multi-channel 3D Chinese Ink Rendering Model
Chen Tian-Ding, Jin Wei-Wei, Chen Ying-Dan, Xu Xian-Li, Yu Chang-Hong
2015, 37(2): 494-498. doi: 10.11999/JEIT140434
Abstract:
The simulation of 3D Chinese ink painting style is an important research topic of the Non-Photorealistic Rendering (NPR). The traditional rendering methods are mostly confined to black and white ink. This paper puts forward a contour optimization of ...
A Fast Algorithm for Burrows-Wheeler Transform Using Suffix Sorting
Li Bing, Long Bing-Jie, Liu Yong
2015, 37(2): 504-508. doi: 10.11999/JEIT140232
Abstract:
Bzip2, a lossless compression algorithm, is widely used in recent years because of its high compression ratio. Burrows-Wheeler Transform (BWT) is the key factor in Bzip2. This method can gather the same symbols together. The traditional methods which...
Reviews
Clustering Algorithms for Large-scale Social Networks Based on Structural Similarity
Chen Ji-Meng, Chen Jia-Jun, Liu Jie, Huang Ya-Lou, Wang Yuan, Feng Xia
2015, 37(2): 449-454. doi: 10.11999/JEIT140512
Abstract:
To cluster the directed and large-scale social networks, a Structural Clustering Algorithm for Directed Networks (DirSCAN) and a corresponding Parallel algorithm (PDirSCAN) are proposed. Considering oriented behavioral relation between two vertices, ...
A Multimedia Traffic Classification Method Based on Improved Hidden Markov Model
Wang Zai-Jian, Dong Yu-Ning, Zhang Hui, Feng You-Hong
2015, 37(2): 499-503. doi: 10.11999/JEIT140340
Abstract:
This paper proposes an improved Hidden Markov Model (HMM) based multimedia traffic classification method. This method preserves the classical HMM model structure, and improves the performance of multimedia traffic classification by changing the emitt...
A Low Complexity Parameter Estimation Algorithm of LFM Signals
Xiong Zhu-Lin, Liu Ce-Lun, An Jian-Ping
2015, 37(2): 489-493. doi: 10.11999/JEIT140166
Abstract:
A quadratic estimation algorithm is proposed to reduce the complexity of accurate Linear Frequency Modulation (LFM) parameter estimation. First, the frequency rate and initial frequency are estimated coarsely by short time coherent integral and incoh...