Advanced Search

2015 Vol. 37, No. 8

Display Method:
DSm Evidence Modeling and Radar Emitter Fusion Recognition Method Based on Cloud Model
Guo Qiang, He You
2015, 37(8): 1779-1785. doi: 10.11999/JEIT150053
Abstract:
To improve the correct radar emitter recognition rate in cases that radar emitter characteristic parameters are overlapped with each other and existence of multiple modes, a DSm (Dezert-Smarandache) evidence modeling and radar emitter fusion recognit...
Space-time Adaptive Processing via Dynamic Environment Sensing
Fang Ming, Liu Hong-wei, Dai Feng-zhou, Wang Xiao-mo
2015, 37(8): 1786-1792. doi: 10.11999/JEIT141505
Abstract:
In heterogeneous clutter environments, Space-Time Adaptive Processing (STAP) shows notable performance degradation for lacking sufficient Independent Identically Distributed (IID) training samples. To solve this problem, a STAP approach is proposed b...
Group-sparse Complex Approximate Message Passing Algorithm for Wide Angle Synthetic Aperture Radar Imaging
Jiang Cheng-long, Zhang Bing-chen, Wang Zheng-dao, Hong Wen
2015, 37(8): 1793-1800. doi: 10.11999/JEIT141300
Abstract:
Conventional matched filtering based algorithms are not sufficiently good at dealing with the anisotropic backscattering behavior of targets in Wide Angle SAR (WASAR) imaging. Sparse signal processing provides a new idea for this problem, the anisotr...
Theory and Performance Analysis of Coherent Transmission for Distributed Radars
Zang Hui-kai, Lei Huan, Dan Xiao-dong, Zhou Sheng-hua, Liu Hong-wei
2015, 37(8): 1801-1807. doi: 10.11999/JEIT141563
Abstract:
By adjusting the transmitting time and the initial phase of distributed radar antennas, the spatial distribution of signal energy transmission can be controlled and then the signal energy can be improved in the spatial region of interest. The fundame...
Innovative Strategy for Stripmap SAR Imaging Using Fast Factorized Back-projection
Li Hao-lin, Zhang Lei, Xing Meng-dao, Bao Zheng
2015, 37(8): 1808-1813. doi: 10.11999/JEIT141633
Abstract:
Fast Factorized Back-Projection (FFBP) is originally developed for Ultra-WideBand (UWB) Synthetic Aperture Radar (SAR), and it shows great success for spotlight SAR signal processing. However, its implementation is not straightforward for stripmap SA...
New Subaperture Imaging Algorithm and Geometric Correction Method for High Squint Diving SAR Based on Equivalent Squint Model
Li Zhen-yu, Liang Yi, Xing Meng-dao, Bao Zheng
2015, 37(8): 1814-1820. doi: 10.11999/JEIT141516
Abstract:
The ordinary full-aperture SAR imaging algorithms are inapplicable to focus high squint diving SAR subaperture data due to its property of vertical velocity which brings variance in azimuth. Based on the equivalent squint model and the characteristic...
Positive-semidefinite Based Target Decomposition Using Optimal Model-matching with Polarization Similarity
Fan Qing-hui, Lu Hong-xi, Bao Zheng, Xiao Chun-bao
2015, 37(8): 1821-1827. doi: 10.11999/JEIT141468
Abstract:
Target decomposition is an important tool to realize target classification, detection and recognition applications with Polarimetric SAR (PolSAR). However, the traditional method with priority of volume scattering component extraction seriously perfo...
Reduced-dimensional DOA Estimation Based on ESPRIT Algorithm in MIMO Radar with L-shaped Array
Liang Hao, Cui Chen, Dai Lin, Yu Jian
2015, 37(8): 1828-1835. doi: 10.11999/JEIT141295
Abstract:
In order to solve the issue of two dimensional angles estimation for MIMO radar with L-shaped array, two novel reduced-dimensional Direction Of Arrival (DOA) estimation methods using ESPRIT algorithm are proposed. Firstly, through the reduced-dimensi...
Circular SAR Trajectory Reconstruction Based on Phase Gradient of Calibrators
Guo Zhen-yu, Lin Yun, Hong Wen, Tan Wei-xian, Wang Yan-ping
2015, 37(8): 1836-1842. doi: 10.11999/JEIT140950
Abstract:
Circular SAR (CSAR) high resolution imaging requires a more accurate and stable Inertial Navigation System (INS), therefore motion compensation is one of the key technologies. In this paper, the phase error caused by trajectory measurement error is f...
Maneuvering Target Detection Algorithm Based on Improved Time-frequency Analysis Method in Skywave Radar
2015, 37(8): 1843-1848. doi: 10.11999/JEIT141485
Abstract:
In Over-The-Horizon Radar (OTHR), the maneuvering target detection algorithms based on time- frequency analysis methods have the advantage of low signal to noise ratio requirement and high parameter estimation precision. However, the calculation amou...
Radar Cross Section Prediction Method for Radar Resource Management
Qin Tong, Dai Feng-zhou, Liu Hong-wei
2015, 37(8): 1849-1854. doi: 10.11999/JEIT141466
Abstract:
In the application of planning and management of the limited resources of radar, the fluctuation of the targets Radar Cross Section (RCS) area will have a significant impact on the effects of allocation of resources. For this problem, this paper puts...
Anti-bias Association Algorithm for Automatic Identification System and Radar Based on Bias Detection
Qi Lin, Cui Ya-qi, Xiong Wei, Wang Cong
2015, 37(8): 1855-1861. doi: 10.11999/JEIT141472
Abstract:
The classical multi-sensor anti-bias association algorithms require complex calculation procedure, can not be used in real-time condition, for instance the algorithms based on image matching and reference topology feature. On the basis of tracks dist...
Ocean Moving Ship Detection Method for Remote Sensing Satellite in Geostationary Orbit
2015, 37(8): 1862-1867. doi: 10.11999/JEIT141615
Abstract:
A moving ship detection method is presented for ocean moving objects detection of remote sensing satellite in geostationary orbit. First, the multi-structural and multiscale element morphological filter is used to suppress background information of o...
Analysis on Ultra-wideband Scattering Characteristics of Complex Missile with Empennages
Zhou Xin-peng, Wei Guo-hua, Wu Si-liang, Wang Xu, Wang Da-wei
2015, 37(8): 1868-1873. doi: 10.11999/JEIT141238
Abstract:
In order to meet the requirement for measurement and detection of complex missile targets, a complex missile model with empennages is established and its scattering characteristics are studied under the conditions of the missile irradiated by extreme...
Compressive Sensing MUSIC Algorithm Based on Difference Map
Lü Zhi-feng, Lei Hong
2015, 37(8): 1874-1878. doi: 10.11999/JEIT141542
Abstract:
The Multiple Measurement Vectors (MMV) problem addresses the recovery of unknown input vectors which share the same sparse support. The Compressed Sensing (CS) has the capability of estimating the sparse support even in coherent cases, where the trad...
Rank Reduction Estimator Based Algorithm for Estimating 2D-DOA with L-shaped Array
Wei Zi-xiang, Cui Wei, Hou Jian-gang, Wu Si-liang
2015, 37(8): 1879-1885. doi: 10.11999/JEIT141538
Abstract:
A novel algorithm is proposed for Two-Dimensional (2D) Direction Of Arrival (DOA) estimation issue with L-shaped array. By introducing an auxiliary electrical angle, 2D-DOA estimation problem is solved by two-step 1D-DOA estimation. Firstly auxiliary...
Improved Multiple Signal Classification Algorithm for Direction of Arrival Estimation Based on Covariance Matrix of Cross-correlation
Mao Lin-lin, Zhang Qun-fei, Huang Jian-guo, Shi Wen-tao, Han Jing
2015, 37(8): 1886-1891. doi: 10.11999/JEIT141208
Abstract:
In view of the poor performance of traditional Direction of Arrival (DOA) methods at low signal-to-noise ratios, an improved MUltiple SIgnal Classification (MUSIC) algorithm for DOA estimation applied to active detection system based on covariance ma...
Image Interpolation with Corner Preserving Based on Partial Differential Equation
Xiao Zhi-tao, Feng Tie-jun, Zhang Fang, Geng Lei, Wu Jun, Li Yue-long, Wang Dan-yu, Chen Ying
2015, 37(8): 1892-1899. doi: 10.11999/JEIT141420
Abstract:
Image interpolation is a basic issue in digital image processing, which can be used to realize image magnification and restoration, etc.. Traditional interpolation methods are easy to make the edge structures produce staircase artifacts or make the i...
Robust Covariance Intersection Fusion Steady-state Kalman Filter for Uncertain Systems
Wang Xue-mei, Liu Wen-qiang, Deng Zi-li
2015, 37(8): 1900-1905. doi: 10.11999/JEIT141515
Abstract:
For the linear discrete time multisensor system with uncertain model parameters and noise variances, a Covariance Intersection (CI) fusion robust steady-state Kalman filter based on the minimax robust estimation principle is presented. Firstly, intro...
Video Coding Parameters Effect on Object Recognition
Wu Ze-min, Liu Tao, Jiang Qing-zhu, Hu Lei
2015, 37(8): 1906-1912. doi: 10.11999/JEIT141613
Abstract:
Researchers have done a great number of studies on the object recognition and the video coding transmission respectively. However, there are still no public reports about the influence on the object recognition raised by the video encoding parameters...
Improved Sparse Representation Algorithm for Face Recognition Via Dense SIFT Feature Alignment
Zhou Quan, Wei Xin, Chen Jian-xin, Zheng Bao-yu
2015, 37(8): 1913-1919. doi: 10.11999/JEIT141194
Abstract:
In order to address the non-rigid deformation (e.g., misalignment, poses, and expression) of facial images, this paper proposes a novel sparse representation face recognition algorithm using Dense Scale Invariant Feature Transform (SIFT) Feature Alig...
Performance Analysis of Energy Metrics for Viterbi Soft Decoding Algorithm Based on M-FSK Signal
Dong Bin-hong, Tang Peng, Du Yang, Zhao Yan
2015, 37(8): 1920-1925. doi: 10.11999/JEIT141532
Abstract:
The Viterbi decoding algorithm is widely used in the wireless digital communication system, generally using the bit Log-Likelihood Ratio (LLR) as its input. For an M-ary Frequency Shift Keying (M-FSK) signal, a corresponding Viterbi decoding algorith...
Reconstruction of Turbo-code Interleaver at High Bit Error Rate
Ren Ya-bo, Zhang Jian, Liu Yi-nong
2015, 37(8): 1926-1930. doi: 10.11999/JEIT141556
Abstract:
An algorithm to recover a Turbo-code interleaver is proposed at high Bit Error Rate (BER), and it is applied to the 1/3 parallel concatenated Turbo-code. The recognition of channel coding plays an important part in the field of non-cooperative signal...
Novel Scheme of Unequal Error Protection Based on Regularized Variable-node and Expanding Window Fountain Codes
Huang Tai-qi, Yi Ben-shun, Yao Wei-qing, Fang Hua-meng, Li Wei-zhong
2015, 37(8): 1931-1936. doi: 10.11999/JEIT141530
Abstract:
A novel scheme named EWF-RLT codes, which produces Unequal Error Protection (UEP) for Luby Transform (LT) codes over Additive White Gaussian Noise (AWGN) channel by using a windowing technique before regularizing variable-node distribution, is propos...
Design of Dynamic Adaptive LDPC Decoder Based on FPGA
Lan Ya-zhu, Yang Hai-gang, Lin Yu
2015, 37(8): 1937-1943. doi: 10.11999/JEIT141609
Abstract:
Faced with the complex environment of deep space communication, the adaptive capacity can have an impact on the ability of the Low Density Parity Check (LDPC) code decoder to maintain long-term stability. This paper proposes a design method of dynami...
Low-complexity Error Correction Algorithms for Redundant Residue Number Systems
Xiao Han-shen, Hu Jian-hao, Ma Shang
2015, 37(8): 1944-1949. doi: 10.11999/JEIT141454
Abstract:
Redundant Residue Number System (RRNS) is widely used in communication systems for WLAN (Wireless LAN) and CDMA (Code Division Multiple Access) etc. due to its strong ability to enhance robustness of information in parallel processing environments. E...
Iterative Frequency Domain Combining Equalization Algorithm for Single Carrier Systems
Qiao Liang, Xin Ji-rong, Zheng Hui
2015, 37(8): 1950-1956. doi: 10.11999/JEIT141507
Abstract:
To combat the effect of InterSymbol Interference (ISI) while transmitting data over wireless fading channels, the issue of single carrier communication signal receiving with multiple antennas is studied and an iterative frequency domain combining equ...
Robust Interference Alignment Algorithm Based on QR Decomposition
Xie Xian-zhong, Zhang Sen-lin, Xiao Zheng-ying
2015, 37(8): 1957-1963. doi: 10.11999/JEIT141585
Abstract:
Most interference alignment algorithms assume that the senders know perfect Channel State Information (CSI), but in practical communication systems, due to the channel estimation error, the delayed feedback and so on, the CSI often exists the error. ...
Method of Optical Grooming for Distance-adaptive and Effective Sharing Path-aware
Liu Huan-lin, Sui Meng, Xu Yi-fan, Chen Yong, Zhang Sheng-feng
2015, 37(8): 1964-1970. doi: 10.11999/JEIT141442
Abstract:
In order to address the problem of reducing the resources of transponder and spectrum in flexible grid optical networks, a lightpath circle mechanism is studied for many-to-many multicast requests, and a method of optical grooming is proposed based o...
Chosen-IV Correlation Power Analysis Attack of ZUC Stream Cipher
Yan Ying-jian, Yang Chang-sheng, Li Wei, Zhang Li-chao
2015, 37(8): 1971-1977. doi: 10.11999/JEIT141604
Abstract:
To analyze the immunity of ZUC stream cipher in aspect of correlation power analysis attack, some relevant researches are conducted. In order to improve the pertinence of attack, a rapid assessment method of the attack scheme is presented, and accord...
XOR-based Region Incrementing Visual Cryptography Scheme with Share Block Construction
Yu Bin, Hu Hao, Chen Wu-ping, Shen Gang
2015, 37(8): 1978-1983. doi: 10.11999/JEIT141385
Abstract:
By designing the block construction for each share, which is divided into several blocks according to the number of qualified sets, the secret sharing and recovering algorithms of the XOR-based region incrementing visual cryptography are designed wit...
New Authenticated Key Exchange Scheme Based on Ring Learning with Errors Problem
Yang Xiao-peng, Ma Wen-ping, Zhang Cheng-li
2015, 37(8): 1984-1988. doi: 10.11999/JEIT141506
Abstract:
Using the hard assumption of Ring-Decision Learning With Errors (Ring-DLWE) in the lattice, a new Authenticated Key Exchange (AKE) scheme is proposed, which is based on the Peikerts reconciliation technique. Under the standard model, the proposed sch...
Simpler Termination Proof on Homogeneous F5 Algorithm
Pan Sen-shan, Hu Yu-pu, Wang Bao-cang
2015, 37(8): 1989-1993. doi: 10.11999/JEIT141601
Abstract:
Since the F5 algorithm is proposed, a bunch of signature-based Gr?bner basis algorithms appear. They use different selection strategies to get the basis gradually and use different criteria to discard redundant polynomials as many as possible. The st...
Security Analysis and Improvements of Certificateless Aggregate Signature Schemes
Zhang Yu-lei, Li Chen-yi, Wang Cai-fen, Zhang Yong-jie
2015, 37(8): 1994-1999. doi: 10.11999/JEIT141635
Abstract:
The security of certificateless signature scheme which was proposed by He et al. (2014) is analyzed, and the security of the certificateless aggregate signature scheme which was proposed by Ming et al. (2014) is analyzed too. It is pointed out that t...
Energy Efficiency Study of Secret Communication Method on ClusteringSecure Routing in WSNs
Long Zhao-hua, Gong Jun, Wang Bo, Qin Xiao-huan, Liu Da-ming
2015, 37(8): 2000-2006. doi: 10.11999/JEIT141284
Abstract:
The method of secure communications is the critical techniques for Wireless Sensor Networks (WSNs) to guarantee the routing information security in the process of transmission. But most of wireless sensor network routing protocol have problems involv...
Dynamic Active Servers Allocating Policy for Cloud Computing Data Centers
Wei Xing, Zhang Jian-jun, Shi Lei, Zhai Yan
2015, 37(8): 2007-2013. doi: 10.11999/JEIT141286
Abstract:
Cloud computing data centers generally consist of a large number of servers connected via high speed network. One promising approach to saving energy is to maintain enough active severs in proportion to system load, while switch left servers to idle ...
Header Recovery Algorithm Based on Subset Constraint
Wang Xiao-mei, Fan Liang, Chen Yan, Hong Xian-qiang
2015, 37(8): 2014-2020. doi: 10.11999/JEIT141574
Abstract:
For the protocol headers of wireless network data prone to errors, this paper puts forward with a bit-flip subset restriction header recovery algorithm after studying the one based on Cyclic Redundancy Check (CRC). A constraint subset of the received...
Energy-aware Virtual Network Embedding Algorithm for Heterogeneous Nodes
Gong Shui-qing, Chen Jing, Wang Wei
2015, 37(8): 2021-2027. doi: 10.11999/JEIT141527
Abstract:
The energy optimized virtual network embedding problem in the substrate network with heterogeneous nodes is not to minimize the number of working nodes and links. The load-based energy consumption models of the node and link in the substrate network ...
Study on Pseudo-noise Code Tracking Method for Compressive Domain Direct Sequence Tracking Telemetry and Command Communication Signals
Cheng Yan-he, Yang Wen-ge
2015, 37(8): 2028-2032. doi: 10.11999/JEIT141654
Abstract:
Compressive sensing has a preliminary application to the field of Tracking, Telemetry, and Command (TTC) and communication, which can effectively decrease sampling and data rate, but there is a contradiction between the real-time requirement and the ...