Advanced Search

2015 Vol. 37, No. 5

Display Method:
A Novel Migration Compensation Algorithm for Passive Radar using Digital TV Signals
Wang Hui, Hong Li-Na, Yi Jian-Xin, Wan Xian-Rong
2015, 37(5): 1017-1022. doi: 10.11999/JEIT141124
Abstract:
Increasing integration time is a main approach to improve performance of passive radar, but the range and Doppler migration may occur for high-speed and accelerated targets, and for non-uniform sampled signal in the slow time such as China mobile mul...
Granular Matrix Based Rapid Parallel Reduction Algorithm for MIMO Truth Table
Chen Ze-Hua, Ma He
2015, 37(5): 1260-1265. doi: 10.11999/JEIT141129
Abstract:
Truth table is an important tool to represent the logic causal relationships between inputs and outputs. The reduction of the truth table is of great significance in analysis and design of digital logic circuit. In this paper, the MIMO truth table is...
Articles
High-resolution Imaging of Passive Radar Based on Sparse Bayesian Learning
Wang Tian-Yun, Yu Xiao-Fei, Chen Wei-Dong, Ding Li, Chen Chang
2015, 37(5): 1023-1030. doi: 10.11999/JEIT140899
Abstract:
This paper presents a high-resolution imaging method based on Sparse Bayesian Learning (SBL) for passive radar compressed sensing imaging. Under the one-snapshot echo model, the proposed method firstly takes account of the frequency-dependent statist...
Sky-wave Radar Transient Interference Suppression Based on Matrix Completion
Li Mao, He Zi-Shu
2015, 37(5): 1031-1037. doi: 10.11999/JEIT140973
Abstract:
The transient interference can dramatically degrade the performance of over-the-horizon radar. The traditional interference suppression methods need to suppress the sea clutter, and only can suppress the strong transient interference, not mitigate th...
A Beampattern Design Method for Airborne MIMO Radar Based on Prior Information
Shi Jun-Nan, Jiu Bo, Liu Hong-Wei, Wang Xu
2015, 37(5): 1038-1043. doi: 10.11999/JEIT140911
Abstract:
A beampattern design method for the airborne Multiple Input Multiple Output (MIMO) radar based on the prior information is proposed to suppress the sidelobe clutter in the non-homogeneous clutter environment. Using the two Dimensional (2D) prior info...
A Robust Clutter Suppression Method for Airborne Non-sidelooking Radar
Tong Ya-Long, Wang Tong, Wen Cai, Wu Jian-Xin
2015, 37(5): 1044-1050. doi: 10.11999/JEIT141222
Abstract:
Non-sidelooking array configuration leads to heterogeneous airborne radar echo data, it degrades seriously the clutter suppression performance of the traditional Space-Time Adaptive Processing (STAP) algorithms. To solve this problem, a heterogeneous...
An Improved Space-time Adaptive Processing Algorithm Based on Low Rank Approximation
Jie Hu, Feng Da-Zheng, Yu Hong-Bo, Yuan Ming-Dong, Nie Wei-Ke
2015, 37(5): 1051-1057. doi: 10.11999/JEIT140832
Abstract:
To handle the small sample support problem under the heterogeneous clutter environment, a fast convergence Space-Time Adaptive Processing (STAP) algorithm based on low-rank approximation of the weight matrix is proposed. Unlike the traditional Low-Ra...
Quantitative Analysis of an Active Radar Stealth Device
Tang Guang-Fu, Gan Rong-Bing, Li Hua, Zhao Yao-Dong
2015, 37(5): 1058-1064. doi: 10.11999/JEIT141226
Abstract:
Active radar stealth technology is an important branch of target radar signature control technology (which is also called as stealth technology). A quantitative analysis is made for an active radar stealth device mentioned in a United States patent, ...
Reconstruction Method for Narrow-band Radar Returns withMissing Samples Based on Complex Gaussian Model
Wang Bao-Shuai, Du Lan, He Hua, Liu Hong-Wei
2015, 37(5): 1065-1070. doi: 10.11999/JEIT141041
Abstract:
This paper proposes a new signal reconstruction method for the signals with missing samples obtained by narrow-band radar. For the narrow-band radar system, the target echoes can be assumed to follow the complex Gaussian distribution. Based on this p...
Parameter Estimation of Maneuvering Targets in Wideband Noise Radar Based on Conjugate Noise Group
Wang Zhao, Gu Hong, Su Wei-Min, Chen Zhi-Ren, Chen Jin-Li
2015, 37(5): 1071-1077. doi: 10.11999/JEIT140737
Abstract:
The wideband cross-ambiguity function method is commonly adopted to execute the parameter estimation of wideband noise radar, but it needs three-dimensional search in distance, velocity and acceleration when dealing with maneuvering targets, which ta...
Precession and Structure Parameters Estimation of Precession Cone Target Based on ISAR Image Sequence
Shu Chang-Yong, Chen Shi-Chun, Wu Hong-Qian, Huang Pei-Lin, Ji Jin-Zu
2015, 37(5): 1078-1084. doi: 10.11999/JEIT141061
Abstract:
The extraction of the procession and structure parameters for ballistic targets is a critical point for success of the ballistic target identification. This paper proposes a method to deduct the procession and structure parameters of a cone target ba...
Coherent Integration Based on Random Pulse Repetition Interval Radon-Fourier Transform
Chen Qian, Fu Chao-Wei, Liu Jun-Hao, Wu Si-Liang
2015, 37(5): 1085-1090. doi: 10.11999/JEIT140818
Abstract:
The Random Pulse Repetition Interval Radon-Fourier Transform (RPRI-RFT) is proposed for long-time echo pulses coherent integration and Blind Speed Side Lobe (BSSL) suppression, which makes it a good resolution for low SNR target detection and paramet...
Micro-Doppler Frequency Extraction for Cone-shaped Target with Precession Based on Instantaneous Frequency Estimation
Cao Wen-Jie, Zhang Lei, Du Lan, Liu Hong-Wei
2015, 37(5): 1091-1096. doi: 10.11999/JEIT140985
Abstract:
Based on the equivalent scatter point model, the relationship between the micro-Doppler frequencies and the motion parameters of the cone-shaped target with precession is established. Due to the approximately sinusoidal form of the micro-Doppler freq...
A Novel Approach for Detecting and Tracking Weak Targets in High-PRF Radar
Yu Hong-Bo, Wang Guo-Hong, Cao Qian, Wang Na
2015, 37(5): 1097-1103. doi: 10.11999/JEIT140924
Abstract:
On the condition of a high Pulse Repetition Frequency (PRF) mode, radars may suffer from range ambiguity, which poses a significant challenge to detecting and tracking weak targets. To address this problem, a novel approach, which can handle ambiguou...
A Hough Transformation Detector for Range Spread Target
Wen Xiang, Liu Hong-Wei, Bao Min
2015, 37(5): 1104-1110. doi: 10.11999/JEIT140692
Abstract:
For the issue that the range spread targets got from the wideband radar signal are difficult to integrate for detect by the large velocity of target, a Hough Transformation Detector (HTD) is developed. Adjoin high resolution radar range profiles of r...
L+L1-norm Method for Multi-baseline Phase Unwrapping
Liu Hui-Tao, Xing Meng-Dao, Bao Zheng
2015, 37(5): 1111-1115. doi: 10.11999/JEIT140955
Abstract:
Multi-baseline phase unwrapping problem can be solved according to find the optimal solution of the L1-norm optimization. However, there are two problems: one is the huge memory required and the other is the difficulty in processing interferograms wi...
An Imaging Algorithm for Wide-field and Super High-resolution Spaceborne SAR Based on Acceleration Slant Range Model
Wu Yuan, Sun Guang-Cai, Yang Jun, Xing Meng-Dao
2015, 37(5): 1116-1121. doi: 10.11999/JEIT140928
Abstract:
In the wide-field and super high-resolution spaceborne Synthetic Aperture Radar (SAR), the traditional hyperbolic slant range model is no longer available, which is due to the variance of equivalent velocity in azimuth direction is able to cause azim...
SAR Images Change Detection Based on Comparison of Two-dimensional Probability Density Functions
Liu Yong-Chun, Wang Guang-Xue, LI Ping, Yan Xiao-Peng
2015, 37(5): 1122-1127. doi: 10.11999/JEIT141140
Abstract:
In this paper, the tradition change detection method based on local statistical feature is expanded to two-dimensional feature space, and a SAR image change detection method based on comparison of two-dimensional probability density functions is prop...
A Fast N-FINDR Algorithm Based on Cofactor of a Determinant
Li Lin, Meng Ling-Bo, Sun Kang, Zhao Yong-Chao
2015, 37(5): 1128-1134. doi: 10.11999/JEIT140923
Abstract:
Endmember extraction methods based on geometric?distribution of hyperspectral images usually divide into projection algorithm and the maximum volume formula for simplex, which the former has lower computational complexity and the latter has better pr...
Parameters Estimation Algorithm of Linear Frequency Modulated Continuous Wave Signals Based on Period Choi-Williams Hough Transform
Liu Ying, Chen Dian-Ren, Chen Lei, Li Xing-Guang
2015, 37(5): 1135-1140. doi: 10.11999/JEIT140876
Abstract:
When using a Choi-Williams Hough (CWH) transform to estimate the parameters of the Linear Frequency Modulated Continuous Wave (LFMCW) signals, the signal observation time is longer than a period, the output SNR at the true parameter value does not in...
Full-frame Video Stabilization Based on Preferred Feature Trajectories
Yu Jia-Lin, Sun Ji-Feng, Song Zhi-Guo
2015, 37(5): 1141-1148. doi: 10.11999/JEIT141019
Abstract:
A novel video stabilization algorithm based on preferred feature trajectories is presented. Firstly, Harris feature points are extracted from frames, and foreground feature points are eliminated via K-Means clustering algorithm. Then, the effective f...
A Simulation of Image Mosaic Algorithm Based on Vehicle Panorama System
Zhang Bao-Long, Li Hong-Rui, Li Dan, Dai Feng-Zhi
2015, 37(5): 1149-1153. doi: 10.11999/JEIT141185
Abstract:
For the mosaic algorithm of traditional panoramic image, the Harris corner extraction or the Scale-Invariant Feature Transform (SIFT) feature matching are the most commonly used methods for resolving the parts of image overlap. But for the vehicle pa...
Gait Recognition for Lower Extremity Electromyographic Signals Based on PSO-SVM Method
Gao Fa-Rong, Wang Jia-Jia, Xi Xu-Gang, She Qing-Shan, Luo Zhi-Zeng
2015, 37(5): 1154-1159. doi: 10.11999/JEIT141083
Abstract:
To improve the lower limb surface ElectroMyoGraphic (EMG) gait recognition accuracy and real time performance, this paper deals with a pattern recognition method for optimizing the Support Vector Machine (SVM) by using the Particle Swarm Optimization...
Tracking Using Weighted Block Compressed Sensing and Location Prediction
Luo Hui-Lan, Zhong Bao-Kang, Kong Fan-Sheng
2015, 37(5): 1160-1166. doi: 10.11999/JEIT140997
Abstract:
To reduce side effects of background information included in the outer parts of tracking rectangular boxes, a weighted block compressed sensing feature extraction method is proposed based on normalized gradient features. The compressed sensing measur...
A Dynamic Recognition Neighborhood Based Immune Network Classification Algorithm and Its Performance Analysis
Deng Ze-Lin, Tan Guan-Zheng, He Pei, Li Feng
2015, 37(5): 1167-1172. doi: 10.11999/JEIT141077
Abstract:
For lack of effective methods used by the traditional immune network algorithms to guide the memory cell determination, a dynamic recognition neighborhood based immune network classification algorithm is proposed. The algorithm uses a kernel function...
An Adaptive Reed-Solomon Iterative Correction Method Based on Data Layer-wise Decomposition and Its Application
Wang Juan, Wang Ping
2015, 37(5): 1173-1179. doi: 10.11999/JEIT140907
Abstract:
In order to reduce the computational complexity, an improved decoding algorithm based on a layer-wise decomposition transform is proposed for Reed-Solomon (RS) codes in this paper. Firstly, the received codewords are split into a number of sub-sequen...
Robust Precoding in Massive MIMO Time Division Duplex Systems
Gu Zhe-Qi, Wei Ning, Zhang Zhong-Pei
2015, 37(5): 1180-1186. doi: 10.11999/JEIT141073
Abstract:
The downlink transmission performance of the massive MIMO Time Division Duplex (TDD) system is bottlenecked by the channel reciprocity errors called antenna reciprocity errors. Antenna reciprocity errors are hard to be calibrated completely in practi...
Robust Secure Transmit Method with Imperfect Channel State Information
Zhang Li-Jian, Jin Liang, Liu Lu, Luo Wen-Yu
2015, 37(5): 1187-1193. doi: 10.11999/JEIT140994
Abstract:
The security performance of the communication system degrades dramatically when the covariance- based Channel State Information (CSI) is imperfect at the transmitter. To overcome this problem, a robust Artificial Noise (AN) aided transmit method is p...
Research on Interference Alignment Technique in Multi-cell Cooperative Systems Based on Poisson Point Process
Zhao Rui, Yang Lu-Xi
2015, 37(5): 1194-1199. doi: 10.11999/JEIT140986
Abstract:
In the multi-cell MIMO (Multiple-Input Multiple-Output) cooperative communication system, the performances of outage probability and network throughput of interference alignment applied by the cooperative Base Stations (BSs) and users are investigate...
A Fast Optimal Scheduling Algorithm for FlexRay Static Segment
Gong Zhi-Peng, Chen Te-Fang, Zou Fu-Min, Chen Yi-Jun, Chen Jun-Gen
2015, 37(5): 1200-1206. doi: 10.11999/JEIT140933
Abstract:
FlexRay is becoming the in-vehicle communication network of the next generation. To resolve the problem of Frame IDentification (FID) assignment in the FlexRay Static Segment Scheduling (FSSS), an Automatic Model Coefficient Matrix Generating (AMCMG)...
A Cell Outage Compensation Mechanism Based on Joint Optimization of Power and Tilt
Li Wen-Jing, Yin Meng-Jun, Yu Peng, Xiang Nan
2015, 37(5): 1207-1213. doi: 10.11999/JEIT140935
Abstract:
In order to compensate the outage cell autonomously, this paper derives a solution for Cell Outage Compensation (COC) in Self-Organizing Networks (SON) which is based on the joint adjustment of power and tilt. Firstly, the paper takes the power and t...
An Efficient Method for Skyline Recommendation in Distributed Networks
Huang Zhen-Hua, Zhang Bo
2015, 37(5): 1214-1219. doi: 10.11999/JEIT140615
Abstract:
Based on distributed networks of the Super-Peer Architecture (SPA), this paper proposes Efficient Method for Skyline Recommendation in Distributed Networks (EMSRDN), to handle u skyline recommendation instructions by prestore w skyline snapshots. The...
A Collaborative Caching Strategy for Privacy Protection in Content Centric Networking
Ge Guo-Dong, Guo Yun-Fei, Liu Cai-Xia, Lan Ju-Long
2015, 37(5): 1220-1226. doi: 10.11999/JEIT140874
Abstract:
How to mitigate the privacy attacks related to the ubiquitous presence of caching poses challenges to the content delivery in Content Centric Networking. On the basis of trade-off between content distribution performance and users privacy, a collabor...
A Chained Multicast Source Authentication Technology Based on the Threshold Cryptography in A Noisy Channel
Li Jian-Bing, Li Qing, Dong Qing-Kuan, Li Xiao-Ping
2015, 37(5): 1227-1233. doi: 10.11999/JEIT140884
Abstract:
Multicast is a widely applied communication technology. Multicast source authentication is an important problem in multicast security. Especially, it is a big challenge to implement the multicast source authentication in a noisy channel. In order to ...
Distributed Diffusion Least Mean Square Algorithm Based on the Reputation Mechanism
Lu Guang-Yue, Chen Wen-Xiao, Huang Qing-Dong
2015, 37(5): 1234-1240. doi: 10.11999/JEIT140851
Abstract:
To deal with the problem of signal estimation for Wireless Sensor Networks (WSN) in a untrustworthy environment where malicious nodes tamper the measured data, two reputation-based algorithms, that are, Reputation-based diffusion Least Mean Square (R...
An RFID Authentication Protocol Anonymous against Readers
Xie Run, Xu Chun-Xiang, Chen Wen-Jie, Li Wan-Peng
2015, 37(5): 1241-1247. doi: 10.11999/JEIT140902
Abstract:
In application of RFID (Radio Frequency IDentification), security threats are on the rise. The demand for the privacy protection of tag is becoming more and more urgent. In RFID system, the privacy protection is against not only the outside attacker,...
Robust and Separable Watermarking Algorithm in Encrypted Image Based on Compressive Sensing
Xiao Di, Deng Mi-Mi, Zhang Yu-Shu
2015, 37(5): 1248-1254. doi: 10.11999/JEIT141017
Abstract:
To meet the watermarking requirement in encrypted domain, a novel scheme for robust and separable watermarking in encrypted image is proposed based on Compressive Sensing (CS). Firstly, the content owner divides the original image into non-overlappin...
Analysis and Design of a New 22 Tapered Finline Array for Spatial Power Combining
Liu Ya-Wei, Su Xiao-Bao
2015, 37(5): 1255-1259. doi: 10.11999/JEIT140930
Abstract:
Tapered finline array plays an important role in waveguide-based spatial power combiner. This paper presents a simplified model of tapered finline array by taking it as a tapered TE mode wave impedance transformer. The spectral domain admittance meth...
Adaptive Spatial Steganography Based on Cannys Edge Detection
Han Tao, Zhu Yue-Fei
2015, 37(5): 1266-1270. doi: 10.11999/JEIT141121
Abstract:
Aiming at the essential problems of the design of adaptive spatial steganography, this paper proposes an adaptive spatial steganographic algorithm without synchronizing the side information, combining with Cannys edge detection algorithm and the Synd...