Advanced Search

2015 Vol. 37, No. 7

Display Method:
MIMO Spectrum Sensing Method Based on the Local Variance
Jia Qiong, Li Bing-bing
2015, 37(7): 1525-1530. doi: 10.11999/JEIT141540
Abstract:
Efficient and accurate spectrum sensing is a necessary part in cognitive radio network. This paper focuses on the spectrum sensing in MIMO environment. Based on the fact that the correlation structure of the received signals is different between the ...
Impact of Delay Setting, Amplitude and Phase Errors on Multi-tap Self-interference Cancellation in Full-duplex System
Wu Fei, Ma Wan-zhi, Shao Shi-hai, Tang You-xi
2015, 37(7): 1538-1543. doi: 10.11999/JEIT141275
Abstract:
In the context of multi-tap self-interference cancellation in the multipath channel in the Co-time Co- frequency Full Duplex (CCFD) system, the current studies focus on the experimental verification technologies in the RF-domain self-interference can...
Distributed Beamforming with Receive Filter
Zhang Li, Chen Hai-hua, He Ming
2015, 37(7): 1544-1549. doi: 10.11999/JEIT141382
Abstract:
In this paper, a new distributed beamforming technique for relay networks in frequency selective channels is proposed. The relay network consists of one transmitter, multiple relays and one receiver. To equalize the transmitter-to-relay and relay-to-...
Research on Users Joint Precoding and Detection in Two-way Relay Systems
Wang Lin, Rui Guo-sheng, Zhang Hai-bo
2015, 37(7): 1550-1555. doi: 10.11999/JEIT141455
Abstract:
Two-way relay cooperative communication system demonstrates significant gain in spectral efficiency when two user nodes exchange information via a relay node. For improving the Bit Error Rate (BER) performance, a joint precoding and detection algorit...
Estimation of PN Sequence in DSSS Signals with Unknown Carrier Frequency under Narrow Band Interferences
Shen Bin, Wang Jian-xin
2015, 37(7): 1556-1561. doi: 10.11999/JEIT141322
Abstract:
In this paper an approach of eigen-decomposition and Chirp Z Transform (CZT) for DSSS signals with unknown carrier frequency under narrow band interferences is proposed to estimate the PN sequence.The period and chip rate of PN sequence need to be kn...
Symbol Timing Estimation for Physical-layer Network Coding
Dang Xiao-yu, Li Qiang, Yu Xiang-bin, Wang Xu-dong
2015, 37(7): 1569-1574. doi: 10.11999/JEIT141364
Abstract:
Most of the existing research on Physical-layer Network Coding (PNC) is based on the assumption that the symbol timing at the relay is ideally synchronized, and rarely discusses the issue of symbol synchronization. However, in practice, the symbol ti...
Belief Ranking Based Low-complexity Maximum Likelihood Decoding Algorithm for Tail-biting Convolutional Codes
Wang Xiao-tao, Liu Zhen-hua
2015, 37(7): 1575-1579. doi: 10.11999/JEIT141459
Abstract:
For a long time, the circularity of the tail-biting trellis is ignored in conventional decoding algorithms of Tail-Biting Convolutional Codes (TBCC). This kind of algorithm starts decoding from the fixed location, and consequently exhibits relatively...
Full Diversity LDPC Codes Design and Energy Efficiency Analysis for Clustering Wireless Sensor Networks
Guo Rui, Liu Chun-yu, Zhang Hua, Bao Jian-rong, Jiang Bin
2015, 37(7): 1580-1585. doi: 10.11999/JEIT141294
Abstract:
Efficient Error Control Coding (ECC) can be used to enhance the stability and energy efficiency of Wireless Sensor Networks (WSNs). In order to deal with high bit error probability due to poor channel environment in WSNs, the paper study the error co...
Abnormal Event Detection Scheme Based on Compressive Sensing and GM (1,1) in Wireless Sensor Networks
Li Peng, Wang Jian-xin, Cao Jian-nong
2015, 37(7): 1586-1590. doi: 10.11999/JEIT141219
Abstract:
In order to solve the problems of the low accuracy and the high energy cost by the existing abnormal event detection algorithm in Wireless Sensor Networks (WSN), this paper proposes an abnormal event detection algorithm based on Compressive Sensing (...
Network Measurement Task Deploying Algorithm Based on Reconfiguration Model
Wang Jing, Wang Bin-qiang, Zhang Xiao-hui
2015, 37(7): 1598-1605. doi: 10.11999/JEIT141336
Abstract:
Since the conflict between the limitation of measurement resources and the diversity of measurement requirements becomes more and more serious, this paper models the issue of measurement task deployment and proposes a new deployment algorithm based o...
Adaptive Flow Sampling Algorithm Based on Sampled Packets and Force Sampling Threshold S Towards Anomaly Detection
Yi Peng, Qian Kun, Huang Wan-wei, Wang Jing, Zhang Zhen
2015, 37(7): 1606-1611. doi: 10.11999/JEIT141379
Abstract:
The network traffic measurement and anomaly detection for high-speed IP network become the hotspot research of network measurement field. Because the current measurement algorithms have large estimation error for the mice flows and poor performance f...
New Fuzzy-Clustering Algorithm for Data Stream
Sun Li-juan, Chen Xiao-dong, Han Chong, Guo Jian
2015, 37(7): 1620-1625. doi: 10.11999/JEIT141415
Abstract:
There is a great challenge in the data stream clustering due to a limitation of time and space. In order to solve this problem, a new fuzzy-clustering algorithm, called Weight Decay Streaming Micro Clustering (WDSMC), is presented in this paper. The ...
k-nearest Neighbor Classification Based on Influence Function
Zhi Wei-mei, Zhang Ting, Fan Ming
2015, 37(7): 1626-1632. doi: 10.11999/JEIT141433
Abstract:
Classification is a supervised learning. It determines the class label of an unlabeled instance by learning model based on the training dataset. Unlike traditional classification, this paper views classification problem from another perspective, that...
Prefetch Distance Control Strategy Based on Cache Behavior in Threaded Prefetching
Huang Yan, Zhang Qi-kun, Duan Zhao-lei, Gu Zhi-min③
2015, 37(7): 1633-1638. doi: 10.11999/JEIT141429
Abstract:
Due to the deficiencies in prefetch distance controlling of most threaded data prefetching methods for pointer application, a prefetch distance control strategy based on the cache behavior characteristics is proposed. In this paper, the prefetch dist...
Research of Infrared Compressive Imaging Based Point Target Tracking Method
Li Shao-yi, Liang Shuang, Zhang Kai, Dong Min-zhou, Yan Jie
2015, 37(7): 1639-1645. doi: 10.11999/JEIT141324
Abstract:
Currently the application research of compressive measurements is still focused on the image recovery, but the ultimate purpose is a task of target detection and tracking in many special applications. And the issue performing target detection and tra...
Target Tracking Based on Enhanced Flock of Tracker and Deep Learning
Cheng Shuai, Cao Yong-gang, Sun Jun-xi, Zhao Li-rong, Liu Guang-wen, Han Guang-liang
2015, 37(7): 1646-1653. doi: 10.11999/JEIT141362
Abstract:
To solve the problem that the tracking algorithm often leads to drift and failure based on the appearance model and traditional machine learning, a tracking algorithm is proposed based on the enhanced Flock of Tracker (FoT) and deep learning under th...
Robust Visual Tracking Based on Online Discrimination Dictionary Learning
Xue Mo-gen, Zhu Hong, Yuan Guang-lin
2015, 37(7): 1654-1659. doi: 10.11999/JEIT141325
Abstract:
The existing subspace tracking methods have well solved appearance changes and occlusions. However, they are weakly robust to complex background. To deal with this problem, firstly, this paper proposes an online discrimination dictionary learning mod...
Dual-kernel Tracking Approach Based on Second-order Spatiogram
Zhang Can-long, Tang Yan-ping, Li Zhi-xin, Ma Hai-fei, Cai Bing
2015, 37(7): 1660-1666. doi: 10.11999/JEIT141321
Abstract:
In order to avoid the loss of background and spatial information in mean shift tracker, a dual-kernel tracking approach based on the second-order spatiogram is proposed. In the method, the second-order spatiogram is employed to represent a target, th...
Image Multiple Copy-move Forgery Detection Algorithm Based on Reversed-generalized 2 Nearest-neighbor
Li Yan, Liu Nian, Zhang Bin, Yuan Kai-guo, Yang Yi-xian
2015, 37(7): 1667-1673. doi: 10.11999/JEIT141271
Abstract:
For the consideration of the multiple copy-move forgery detection of digital images, and to avoid missing the matching feature points when generalized 2 Nearest-Neighbor (g2NN) algorithm is applied, Reversed generalized 2 Nearest-Neighbor (Rg2NN) alg...
Iteration-based Variable Step-size LMS Algorithm and Its Performance Analysis
Liu Jian-cheng, Zhao Hong-zhi, Quan Hou-de, Tang You-xi
2015, 37(7): 1674-1680. doi: 10.11999/JEIT141501
Abstract:
The Iteration-based Variable Step-Size LMS (IVSSLMS) algorithm is proposed to overcome the compromise between the convergence speed and the steady-state misadjustment error, which cannot be handled in Fixed Step-Size LMS algorithm (FXSSLMS). This alg...
Novel Optimization Method for ProjectionMatrix in Compress Sensing Theory
Wu Guang-wen, Zhang Ai-jun, Wang Chang-ming
2015, 37(7): 1681-1687. doi: 10.11999/JEIT141450
Abstract:
Considering the influence of the projection matrix on Compressed Censing (CS), a novel method is proposed to optimize the projection matrix. In order to improve the signals reconstruction precise and the stability of the optimization algorithm of the...
Robust Beamforming with Phase Response Fixed and Magnitude Response Constraint
Yu Hong-bo, Feng Da-zheng, Xie Hu
2015, 37(7): 1688-1694. doi: 10.11999/JEIT141513
Abstract:
The conventional magnitude constraints beamformer is a non-convex issue which is reformulated as a linear programming issue. A robust beamformer with Phase response Fixed and Magnitude response Constraint (PFMC) is proposed for Uniform Linear Array (...
Coherent Parameters Estimation by Cross-correlation for Distributed Aperture Fully Coherent Radar
Song Jing, Zhou Qing-song, Zhang Jian-yun
2015, 37(7): 1710-1715. doi: 10.11999/JEIT141339
Abstract:
For distributed aperture coherent radar of general signal processing architecture, the estimating performance of time delay differences and phase differences, and the output Signal to Noise Ratio gain (oSNRg) based on cross-correlation are studied in...
Detection Performance Assessment of Near-space Hypersonic Target Based on Ground-based Radar
Xiao Song, Tan Xian-si, Wang Hong, Qu Zhi-guo
2015, 37(7): 1723-1728. doi: 10.11999/JEIT141024
Abstract:
Aiming at the problem that different Ground-Based Radar (GBR) deployment way influences the detection performance to the near-space hypersonic target, the near-space hypersonic target model and GBR detection model are established. On the basis of tar...
Imaging Algorithm for Geosynchronous Orbit SAR Based on Chirp_z Transform and Azimuth Scaling
Li Cai-pin, He Ming-yi
2015, 37(7): 1736-1742. doi: 10.11999/JEIT141491
Abstract:
Aiming at the problem of complex range processing and strong azimuth variant in GEosynchronous Orbit SAR (GEO SAR) imaging processing, an imaging algorithm based on Chirp_z transform and the azimuth scaling is proposed. Firstly, the stop-go-stop phas...
Modified Omega-K Algorithm for Sub-aperture High Squint SAR Imaging Based on Azimuth Resampling
Huai Yuan-yuan, Liang Yi, Li Zhen-yu, Xing Meng-dao
2015, 37(7): 1743-1750. doi: 10.11999/JEIT141383
Abstract:
Due to the skew Region Of Support (ROS) of the two-dimensional wavenumber domain for high squint SAR data, conventional Omega-K algorithm can not exploit the ROS efficiently enough and degrades the resolution when choosing the square region to proces...
Omni-directional Angle Measurement Algorithm under Interference with Double Circular Arrays
Tian Chao, Wen Shu-liang
2015, 37(7): 1751-1756. doi: 10.11999/JEIT141375
Abstract:
If the azimuth angle between the interference and the detected target is small, the energy of the received signal reflected by the target may have a great loss when the interference is cancelled for an omni-directional VHF radar with single circular ...
Fast Model-based Automatic Target Recognition Method for Synthetic Aperture Sonar Image
Zhu Zhao-tong, Peng Shi-bao, Xu Jia, Xu Xiao-mei
2015, 37(7): 1757-1762. doi: 10.11999/JEIT141228
Abstract:
A modified model-based method is proposed to obtain sufficient prior templates and reduce the computational complexity on Synthetic Aperture Sonar (SAS) automatic target recognition. First, a quick method based on build convex hull is proposed to est...
Weighted Line Spectrum Detector Based on Instantaneous Phase Variance
Zheng En-ming, Yu Hua-bing, Chen Xin-hua, Sun Chang-yu
2015, 37(7): 1763-1768. doi: 10.11999/JEIT141347
Abstract:
According to the feature that the underwater target radiated noise contains high intensive and stable line spectrum, a weighted line spectrum detection method based on the instantaneous phases variance is proposed with regard to the problem of unknow...
Mapper for AIC-based FPGAs
Jiang Zheng-hong, Lin Yu, Huang Zhi-hong, Yang Li-qun, Yang Hai-gang
2015, 37(7): 1769-1773. doi: 10.11999/JEIT141403
Abstract:
Exploring a new logic element of Field Programmable Gate Array (FPGA) is always a key field in FPGAs research, while And-Inverter Cones (AIC) is the most promising one. Implementing a highly-efficient and highly-flexible mapping tool is also an impor...
Study on Gain Characteristics of Dual Ultra-high-frequency Radio Frequency Identification Tag Antennas with Small Interval
Peng Zhang-you, Ren Xiu-fang, Meng Chun-yang, Li Shuai
2015, 37(7): 1774-1778. doi: 10.11999/JEIT141371
Abstract:
Parameters of the Ultra-High-Frequency Radio Frequency IDentification (UHF RFID) tags and the mutual coupling effect have great impact on antenna gain, and a corresponding theoretical model is developed. Firstly, from the perspective of the radiation...
Paper
Improved Cyclostationary Spectrum Sensing Scheme for Primary Users Randomly Arriving
Ma Bin, Fang Yuan, Xie Xian-zhong
2015, 37(7): 1531-1537. doi: 10.11999/JEIT141283
Abstract:
In the Cognitive Radio (CR) networks, the detection performance of Primary Users (PU) randomly arriving during the sensing period is poor. So, an improved spectrum sensing method exploiting the cyclostationary feature is proposed, which adds the seco...
Security Coalition Method Based on Game Theory
Huang Kai-zhi, Hong Ying, Luo Wen-yu, Lin Sheng-bin
2015, 37(7): 1562-1568. doi: 10.11999/JEIT141204
Abstract:
For the problems of reduced secrecy rate and energy according to noncooperation of selfish relay, this paper presents a security coalition method based on the game theory. Firstly, this paper introduces a benefit-sharing mechanism of cooperative game...
Malicious Node Tolerant Packet Forwarding Mechanism for Intermittently Connected Wireless Network
Wu Da-peng, Feng Yu, Wang Ru-yan, Liu Qiao-shou
2015, 37(7): 1591-1597. doi: 10.11999/JEIT141198
Abstract:
Packets in ICWN (Intermittently Connected Wireless Network) are delivered in a cooperation manner between nodes, which means the existence of malicious nodes will degrade the network performance. A malicious node tolerant message forwarding mechanism...
Scalable Access Control Model Based on Double-tier Role and Organization
Xiong Hou-ren, Chen Xing-yuan, Zhang Bin, Du Xue-hui
2015, 37(7): 1612-1619. doi: 10.11999/JEIT141255
Abstract:
For tackling the deficiencies of weak adaptability due to the singleness of the role establishment method, role or privilege redundancy, and little attention on resource management in the existing Role-Based Access Control (RBAC) researches, a Scalab...
Joint Estimation Algorithm of Direction of Arrival and Polarization for Multiple Frequency-hopping Signals
Zhang Dong-wei, Guo Ying, Qi Zi-sen, Hou Wen-lin, Zhang Bo, Li Jiao
2015, 37(7): 1695-1701. doi: 10.11999/JEIT141315
Abstract:
In this paper, with the purpose of sorting frequency-hopping networks, identifying and tracking signals, a joint estimation of Direction Of Arrival (DOA) and polarization for multiple frequency-hopping signals is carried out in underdetermined condit...
Single Channel Source Separation and Parameters Estimation of Multi-component Pseudo-random Code Modulated Pulse Train
Zhu Hang, Zhang Shu-ning, Zhao Hui-chang
2015, 37(7): 1702-1709. doi: 10.11999/JEIT141317
Abstract:
For the several kinds of pseudo-random code modulated pulse trains-the Pseudo-Random Binary Code (PRBC) pulse train, including the Pulse Position Modulation (PPM) pulse train, the Pseudo-Random Binary Code and Pulse Position Modulation (PRBC-PPM) pul...
Study on Ground Control Point Locating Strategy for Airborne Along-track Interferometric SAR
Zhang Hui, Hong Jun, Wang Yu, Li Ji-chuan
2015, 37(7): 1716-1722. doi: 10.11999/JEIT141220
Abstract:
The accuracy of the radial velocity estimated by the airborne Along-Track Interferometric SAR (ATI-SAR) is affected by the accuracy of different system parameter, such as the interferometric phase biases and the baseline components errors. Therefore,...
Multi-channel Synthetic Aperture Radar-Ground Moving Target Indication High-accuracy Focusing and Positioning Using Instantaneous Interferometry
Zhang Sheng, Sun Guang-cai, Li Xue-shi, Xing Meng-dao
2015, 37(7): 1729-1735. doi: 10.11999/JEIT141245
Abstract:
In Synthetic Aperture Radar-Ground Moving Target Indication (SAR-GMTI) processing, it is difficult to solve the Range Cell Migration (RCM) and azimuth defocusing problems simultaneously since the motion parameters of each moving target is different, ...