Email alert
2015 Vol. 37, No. 2
Display Method:
2015, 37(2): 255-260.
doi: 10.11999/JEIT140451
Abstract:
Aiming at the problem that the maximum Error Controllable compression based on SVD (EC-SVD) algorithm can not make full use of spectral vectors redundancy in hyperspectral image, a hyperspectral image compression algorithm with maximum error controll...
Aiming at the problem that the maximum Error Controllable compression based on SVD (EC-SVD) algorithm can not make full use of spectral vectors redundancy in hyperspectral image, a hyperspectral image compression algorithm with maximum error controll...
2015, 37(2): 261-267.
doi: 10.11999/JEIT140331
Abstract:
A new SAR image segmentation model with edge penalty is constructed, which uses oriented edge strength information and a minimized hierarchical region merging algorithm is proposed in this paper. The edge strength information is extracted by using Mu...
A new SAR image segmentation model with edge penalty is constructed, which uses oriented edge strength information and a minimized hierarchical region merging algorithm is proposed in this paper. The edge strength information is extracted by using Mu...
2015, 37(2): 268-275.
doi: 10.11999/JEIT140199
Abstract:
A Structure Preserving Bilateral Filtering (SPBF) is proposed to address the problem of preserving structural information for reducing speckle in a PolSAR image. The edge structural characteristics and surface scattering features are adopted to measu...
A Structure Preserving Bilateral Filtering (SPBF) is proposed to address the problem of preserving structural information for reducing speckle in a PolSAR image. The edge structural characteristics and surface scattering features are adopted to measu...
2015, 37(2): 276-282.
doi: 10.11999/JEIT140146
Abstract:
The active repeater jamming is a very important jamming technique in the modern warfare, especially for the air defense, anti-missile and anti-warship operations. It becomes a serious threat for the modern radar systems. This paper focuses on the rep...
The active repeater jamming is a very important jamming technique in the modern warfare, especially for the air defense, anti-missile and anti-warship operations. It becomes a serious threat for the modern radar systems. This paper focuses on the rep...
2015, 37(2): 283-290.
doi: 10.11999/JEIT140261
Abstract:
Forest parameters inversion is an important application of Polarimetric Interference Synthetic Aperture Radar (PolInSAR). The traditional inversion method does not take into account the amplitude and phase non-stationary of observation, and its non-u...
Forest parameters inversion is an important application of Polarimetric Interference Synthetic Aperture Radar (PolInSAR). The traditional inversion method does not take into account the amplitude and phase non-stationary of observation, and its non-u...
2015, 37(2): 291-296.
doi: 10.11999/JEIT140494
Abstract:
Time-frequency image of multi-ballistic targets is composed of micro-Doppler of multi-targets with multi-scattering centers, which makes the methods for single target invalid. Firstly, micro-Doppler of precessing missile and swinging decoy is analyze...
Time-frequency image of multi-ballistic targets is composed of micro-Doppler of multi-targets with multi-scattering centers, which makes the methods for single target invalid. Firstly, micro-Doppler of precessing missile and swinging decoy is analyze...
2015, 37(2): 297-302.
doi: 10.11999/JEIT140535
Abstract:
Microwave 3-D imaging technique can accurately separate and extract the attractive targets from the background noise. So it can be utilized to analyze and study the ElectroMagnetic (EM) scattering characteristics of the outfield targets. Thus researc...
Microwave 3-D imaging technique can accurately separate and extract the attractive targets from the background noise. So it can be utilized to analyze and study the ElectroMagnetic (EM) scattering characteristics of the outfield targets. Thus researc...
2015, 37(2): 303-308.
doi: 10.11999/JEIT140564
Abstract:
For broadside spotlight Synthetic Aperture Radar (SAR) imaging, Polar Format Algorithm (PFA) is applied widely as a kind of general interpolation algorithm. When PFA is applied to the squinted spotlight, coordinate rotation causes azimuth spectrum un...
For broadside spotlight Synthetic Aperture Radar (SAR) imaging, Polar Format Algorithm (PFA) is applied widely as a kind of general interpolation algorithm. When PFA is applied to the squinted spotlight, coordinate rotation causes azimuth spectrum un...
2015, 37(2): 309-314.
doi: 10.11999/JEIT140529
Abstract:
In view of the uneven imaging data caused by the uneven space-time array in the MIMO-ISAR imaging, the echo signal model of a target is established based on a linear array, an imaging algorithm that focuses on the cross-range direction following rang...
In view of the uneven imaging data caused by the uneven space-time array in the MIMO-ISAR imaging, the echo signal model of a target is established based on a linear array, an imaging algorithm that focuses on the cross-range direction following rang...
2015, 37(2): 315-321.
doi: 10.11999/JEIT140407
Abstract:
It usually takes a long observing time when a cognitive radar transmits the High-Range-Resolution (HRR) stepped-frequency signal. To save time, partial pulses of the stepped-frequency signal are transmitted to obtain the incomplete frequency data, an...
It usually takes a long observing time when a cognitive radar transmits the High-Range-Resolution (HRR) stepped-frequency signal. To save time, partial pulses of the stepped-frequency signal are transmitted to obtain the incomplete frequency data, an...
2015, 37(2): 322-327.
doi: 10.11999/JEIT141043
Abstract:
Transmit beampattern design for Multiple Input Multiple Output (MIMO) radar is obtained by synthesizing the signal covariance matrix, which can be achieved by convex optimization approaches. Due to the high computational complexity, these approaches ...
Transmit beampattern design for Multiple Input Multiple Output (MIMO) radar is obtained by synthesizing the signal covariance matrix, which can be achieved by convex optimization approaches. Due to the high computational complexity, these approaches ...
2015, 37(2): 328-333.
doi: 10.11999/JEIT140551
Abstract:
The K-distribution is usually used to model the Polarimetric Synthetic Aperture Radar (PolSAR) imagery. The parameter estimation method for K-distribution is very important,which affects the fitting degree of the model. However, the classical method ...
The K-distribution is usually used to model the Polarimetric Synthetic Aperture Radar (PolSAR) imagery. The parameter estimation method for K-distribution is very important,which affects the fitting degree of the model. However, the classical method ...
2015, 37(2): 334-338.
doi: 10.11999/JEIT140508
Abstract:
The traditional post-Doppler adaptive processing approaches such as Factored Approach (FA) and Extended Factored Approach (EFA) can significantly reduce the computation-cost and training sample requirement in adaptive processing. However, their clutt...
The traditional post-Doppler adaptive processing approaches such as Factored Approach (FA) and Extended Factored Approach (EFA) can significantly reduce the computation-cost and training sample requirement in adaptive processing. However, their clutt...
2015, 37(2): 339-345.
doi: 10.11999/JEIT140338
Abstract:
This paper focuses on Two Dimensional (2D) geometric feature inversion method of midcourse targets, serving for the target recognition problem of ballistic missile defense system. Based on the figuration characteristic of midcourse targets, a stable ...
This paper focuses on Two Dimensional (2D) geometric feature inversion method of midcourse targets, serving for the target recognition problem of ballistic missile defense system. Based on the figuration characteristic of midcourse targets, a stable ...
2015, 37(2): 346-352.
doi: 10.11999/JEIT140317
Abstract:
In order to solve the problem of the ghost and the shadow of moving object, an improved Visual Background extractor (ViBe) algorithm is proposed based on gray feature and adaptive threshold. The new method firstly applies the ViBe algorithm to obtain...
In order to solve the problem of the ghost and the shadow of moving object, an improved Visual Background extractor (ViBe) algorithm is proposed based on gray feature and adaptive threshold. The new method firstly applies the ViBe algorithm to obtain...
2015, 37(2): 353-359.
doi: 10.11999/JEIT140370
Abstract:
The Leap Motion sensor can detect the position and speed information of hands and fingers with high precision in real-time, which provides an effective way for volume interaction with large screen at long-distance. A set of understandable gesture for...
The Leap Motion sensor can detect the position and speed information of hands and fingers with high precision in real-time, which provides an effective way for volume interaction with large screen at long-distance. A set of understandable gesture for...
2015, 37(2): 360-366.
doi: 10.11999/JEIT140363
Abstract:
With the increasing of the air traffic flow, conflict detection plays an increasingly important role in air traffic management system. A probabilistic conflict detection algorithm is proposed. Overall conflict probability in look-ahead time is calcul...
With the increasing of the air traffic flow, conflict detection plays an increasingly important role in air traffic management system. A probabilistic conflict detection algorithm is proposed. Overall conflict probability in look-ahead time is calcul...
2015, 37(2): 367-372.
doi: 10.11999/JEIT140602
Abstract:
The traditional ElectroOculoGram (EOG) correction methods usually use the correlation information of multi-channel ElectroEncephaloGram (EEG), and are difficult to apply to portable Brain-Computer Interface (BCI) in single channel. An automatic EOG s...
The traditional ElectroOculoGram (EOG) correction methods usually use the correlation information of multi-channel ElectroEncephaloGram (EEG), and are difficult to apply to portable Brain-Computer Interface (BCI) in single channel. An automatic EOG s...
2015, 37(2): 373-379.
doi: 10.11999/JEIT140274
Abstract:
In stereophonic Acoustic Echo Cancellation (AEC) systems, the strong correlation between the two stereophonic channels leads to nonuniqueness of adaptive solutions and further large filter misalignment. To solve this problem and preserve speech quali...
In stereophonic Acoustic Echo Cancellation (AEC) systems, the strong correlation between the two stereophonic channels leads to nonuniqueness of adaptive solutions and further large filter misalignment. To solve this problem and preserve speech quali...
2015, 37(2): 380-385.
doi: 10.11999/JEIT140578
Abstract:
In the array signal processing, the inverse beamforming for interference suppression algorithm uses the azimuth information of interference to estimate and suppress the interference. In the complex marine environment the phase of the interference whi...
In the array signal processing, the inverse beamforming for interference suppression algorithm uses the azimuth information of interference to estimate and suppress the interference. In the complex marine environment the phase of the interference whi...
2015, 37(2): 386-393.
doi: 10.11999/JEIT140161
Abstract:
Combining one-class classifiers using the classical ensemble methods is not satisfactory. To address this problem, this paper first proves that though one-class classification performance can be improved by a classifier ensemble, it can also degrade ...
Combining one-class classifiers using the classical ensemble methods is not satisfactory. To address this problem, this paper first proves that though one-class classification performance can be improved by a classifier ensemble, it can also degrade ...
2015, 37(2): 394-398.
doi: 10.11999/JEIT140538
Abstract:
To cope with the issue of determining cyclic shift coefficients of the quasi-cyclic sub-matrix in the Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) codes, a method is presented based on the Arithmetic Progression (AP) to compute the cyclic shift co...
To cope with the issue of determining cyclic shift coefficients of the quasi-cyclic sub-matrix in the Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) codes, a method is presented based on the Arithmetic Progression (AP) to compute the cyclic shift co...
2015, 37(2): 399-404.
doi: 10.11999/JEIT140339
Abstract:
A joint resource allocation algorithm is proposed to solve the problem of the proportional fairness and the system efficiency in multi-radio systems based on OFDMA (Orthogonal Frequency Division Multiple Access). The algorithm optimizes the system th...
A joint resource allocation algorithm is proposed to solve the problem of the proportional fairness and the system efficiency in multi-radio systems based on OFDMA (Orthogonal Frequency Division Multiple Access). The algorithm optimizes the system th...
2015, 37(2): 405-410.
doi: 10.11999/JEIT140472
Abstract:
The downlink transmission performance of the massive MIMO Time Division Duplex (TDD) system is bottlenecked by the channel reciprocity errors called antenna reciprocity errors. Antenna reciprocity errors are caused by the mismatch and mutual coupling...
The downlink transmission performance of the massive MIMO Time Division Duplex (TDD) system is bottlenecked by the channel reciprocity errors called antenna reciprocity errors. Antenna reciprocity errors are caused by the mismatch and mutual coupling...
2015, 37(2): 411-416.
doi: 10.11999/JEIT140542
Abstract:
Inter-cell interference is a major factor that limits the performance of multi-cell systems. In this paper, a cooperative scheduling and power control algorithm for Single-Carrier Frequency-Division Multiple Access (SC-FDMA) multi-cell systems is pro...
Inter-cell interference is a major factor that limits the performance of multi-cell systems. In this paper, a cooperative scheduling and power control algorithm for Single-Carrier Frequency-Division Multiple Access (SC-FDMA) multi-cell systems is pro...
2015, 37(2): 417-422.
doi: 10.11999/JEIT140373
Abstract:
FOX family block ciphers are based on Lai-Massey scheme. Firstly, the evaluation is performed on the ability of the reduced round FOX64 to resist zero-correlation linear cryptanalysis, and some 4-round zero- correlation linear distinguishers are pres...
FOX family block ciphers are based on Lai-Massey scheme. Firstly, the evaluation is performed on the ability of the reduced round FOX64 to resist zero-correlation linear cryptanalysis, and some 4-round zero- correlation linear distinguishers are pres...
2015, 37(2): 423-428.
doi: 10.11999/JEIT140421
Abstract:
User revocation is crucial to the practical application of Identity Based Encryption (IBE). The first Revocable Identity Based Encryption (RIBE) scheme from lattice is given by Chen et al. in ACISP 2012, but its security can only be proved in the sel...
User revocation is crucial to the practical application of Identity Based Encryption (IBE). The first Revocable Identity Based Encryption (RIBE) scheme from lattice is given by Chen et al. in ACISP 2012, but its security can only be proved in the sel...
2015, 37(2): 429-434.
doi: 10.11999/JEIT140901
Abstract:
An OQPSK modulation scheme used spread spectrum is proposed which is based on the Chinese medical band. The analysis is done under variety of interference, the simulation results indicate that this scheme has good performance of the broadband interfe...
An OQPSK modulation scheme used spread spectrum is proposed which is based on the Chinese medical band. The analysis is done under variety of interference, the simulation results indicate that this scheme has good performance of the broadband interfe...
2015, 37(2): 435-442.
doi: 10.11999/JEIT140246
Abstract:
How to efficiently cache and take advantage of largely distributed copies poses challenges to the retrieval process of Named Data Networking (NDN). On the basis of similarity in local request, a collaborative caching and routing scheme is proposed. I...
How to efficiently cache and take advantage of largely distributed copies poses challenges to the retrieval process of Named Data Networking (NDN). On the basis of similarity in local request, a collaborative caching and routing scheme is proposed. I...
2015, 37(2): 443-448.
doi: 10.11999/JEIT140333
Abstract:
Considering the limited cache resources of nodes in intermittently connected wireless networks, a cache management mechanism is proposed based on node state estimate. The direct and indirect connection status, service rate and connectivity degree bet...
Considering the limited cache resources of nodes in intermittently connected wireless networks, a cache management mechanism is proposed based on node state estimate. The direct and indirect connection status, service rate and connectivity degree bet...
2015, 37(2): 455-460.
doi: 10.11999/JEIT140514
Abstract:
Based on the stability theory of fractional-order system and Lyapunov stability theory, and using the sliding mode adaptive control and projective method, a synchronization control strategy is proposed for a class of fractional-order chaotic systems ...
Based on the stability theory of fractional-order system and Lyapunov stability theory, and using the sliding mode adaptive control and projective method, a synchronization control strategy is proposed for a class of fractional-order chaotic systems ...
2015, 37(2): 461-467.
doi: 10.11999/JEIT140063
Abstract:
According to the generation mechanism of the underwater corrosion-relative-electromagnetic field of submarine, a current-line which is regarded as end-to-end electric dipole is proposed to simulate the field distribution. Firstly, the underwater stat...
According to the generation mechanism of the underwater corrosion-relative-electromagnetic field of submarine, a current-line which is regarded as end-to-end electric dipole is proposed to simulate the field distribution. Firstly, the underwater stat...
2015, 37(2): 468-476.
doi: 10.11999/JEIT140295
Abstract:
To evaluate effects of process variations on circuit delay accurately, this study proposes a Statistical Static Timing Analysis (SSTA) which incorporates process variations with spatial correlations. The algorithm applies a second order delay model t...
To evaluate effects of process variations on circuit delay accurately, this study proposes a Statistical Static Timing Analysis (SSTA) which incorporates process variations with spatial correlations. The algorithm applies a second order delay model t...
2015, 37(2): 477-483.
doi: 10.11999/JEIT140165
Abstract:
As Through-Silicon-Vias (TSVs) in three-Dimensional Network-on-Chip (3D NoC) accompany some overhead such as the cost and the area, in order to optimize the number of TSVs of 3D NoC in test mode and reduce the test time, a new method using evolution ...
As Through-Silicon-Vias (TSVs) in three-Dimensional Network-on-Chip (3D NoC) accompany some overhead such as the cost and the area, in order to optimize the number of TSVs of 3D NoC in test mode and reduce the test time, a new method using evolution ...
2015, 37(2): 484-488.
doi: 10.11999/JEIT140362
Abstract:
During GPS outages, the foot-mounted inertial-based sensors are common replacement in pedestrian navigation. The Zero velocity UPdaTe-aided Extended Kalman Filter (ZUPT-aided EKF) is often used to resolve the trajectory of a walking pedestrian with a...
During GPS outages, the foot-mounted inertial-based sensors are common replacement in pedestrian navigation. The Zero velocity UPdaTe-aided Extended Kalman Filter (ZUPT-aided EKF) is often used to resolve the trajectory of a walking pedestrian with a...
2015, 37(2): 494-498.
doi: 10.11999/JEIT140434
Abstract:
The simulation of 3D Chinese ink painting style is an important research topic of the Non-Photorealistic Rendering (NPR). The traditional rendering methods are mostly confined to black and white ink. This paper puts forward a contour optimization of ...
The simulation of 3D Chinese ink painting style is an important research topic of the Non-Photorealistic Rendering (NPR). The traditional rendering methods are mostly confined to black and white ink. This paper puts forward a contour optimization of ...
2015, 37(2): 504-508.
doi: 10.11999/JEIT140232
Abstract:
Bzip2, a lossless compression algorithm, is widely used in recent years because of its high compression ratio. Burrows-Wheeler Transform (BWT) is the key factor in Bzip2. This method can gather the same symbols together. The traditional methods which...
Bzip2, a lossless compression algorithm, is widely used in recent years because of its high compression ratio. Burrows-Wheeler Transform (BWT) is the key factor in Bzip2. This method can gather the same symbols together. The traditional methods which...
2015, 37(2): 449-454.
doi: 10.11999/JEIT140512
Abstract:
To cluster the directed and large-scale social networks, a Structural Clustering Algorithm for Directed Networks (DirSCAN) and a corresponding Parallel algorithm (PDirSCAN) are proposed. Considering oriented behavioral relation between two vertices, ...
To cluster the directed and large-scale social networks, a Structural Clustering Algorithm for Directed Networks (DirSCAN) and a corresponding Parallel algorithm (PDirSCAN) are proposed. Considering oriented behavioral relation between two vertices, ...
2015, 37(2): 499-503.
doi: 10.11999/JEIT140340
Abstract:
This paper proposes an improved Hidden Markov Model (HMM) based multimedia traffic classification method. This method preserves the classical HMM model structure, and improves the performance of multimedia traffic classification by changing the emitt...
This paper proposes an improved Hidden Markov Model (HMM) based multimedia traffic classification method. This method preserves the classical HMM model structure, and improves the performance of multimedia traffic classification by changing the emitt...
2015, 37(2): 489-493.
doi: 10.11999/JEIT140166
Abstract:
A quadratic estimation algorithm is proposed to reduce the complexity of accurate Linear Frequency Modulation (LFM) parameter estimation. First, the frequency rate and initial frequency are estimated coarsely by short time coherent integral and incoh...
A quadratic estimation algorithm is proposed to reduce the complexity of accurate Linear Frequency Modulation (LFM) parameter estimation. First, the frequency rate and initial frequency are estimated coarsely by short time coherent integral and incoh...