Advanced Search

2016 Vol. 38, No. 10

Display Method:
An Imaging Method for MIMO Radar Based on Hybrid Matching Pursuit
WANG Wei, ZHANG Bin, LI Xin
2016, 38(10): 2415-2422. doi: 10.11999/JEIT151453
Abstract:
MIMO radar is an emerging radar system that has significant potential. MIMO radar can provide high resolution and real-time imaging solution. Because of the sparsity of the observation zone, the task of MIMO radar imaging can be formulated as a probl...
A Novel SAR Imaging Algorithm Based on Modified Multiple Measurement Vectors Model
CHEN Yichang, ZHANG Qun, YANG Ting, LUO Ying
2016, 38(10): 2423-2429. doi: 10.11999/JEIT151391
Abstract:
Recently, the Compressed Sensing (CS) theory becomes the researching hot point in SAR imaging. The Multiple Measurement Vectors (MMV) model of CS theory can be used to effectively represent the jointly sparse signals, and it can obtain better perform...
Double Threshold CFAR Detection for Multisite Radar
HU Qinzhen, SU Hongtao, ZHOU Shenghua, LIU Ziwei
2016, 38(10): 2430-2436. doi: 10.11999/JEIT151163
Abstract:
For multisite radar system, to solve the data transmission rate problem, two kinds of Double Threshold Constant False Alarm Rate (DT-CFAR) detectors, the DT Generalized Likelihood Ratio Test (DT-GLRT) detector and the DT Adaptive Matched Filter (DT-A...
Joint Estimation of Two Dimensional DOA with High Accuracy and Polarization for MIMO Radar Using Electromagnetic Vector Sensor Arrays
LIANG Hao, CUI Chen, YU Jian, HAO Tianduo
2016, 38(10): 2437-2444. doi: 10.11999/JEIT151469
Abstract:
In this paper, monostatic MIMO radar with cross array using electromagnetic vector antennas is utilized and a novel algorithm for fast Two Dimensional (2D) Direction Of Arrival (DOA) with high accuracy and polarization estimation is proposed. First, ...
Robust MIMO Radar Waveform Design Algorithm Based on Uncertainty Set
LI Xiuyou, XUE Yonghua, HUANG Yong, GUAN Jian
2016, 38(10): 2445-2452. doi: 10.11999/JEIT151425
Abstract:
In order to solve the problem of performance losses in the MIMO radar waveform design when target signal is uncertainty, a novel joint optimization of transmitting waveforms and receiving filters in the MIMO radar for the case of target in flat ellip...
Resource Allocation Approach in Distributed MIMO Radar with Multiple Targets for Velocity Estimation
HU Hanying, SUN Yang, ZHENG Nae
2016, 38(10): 2453-2460. doi: 10.11999/JEIT151452
Abstract:
In order to improve the velocity estimation accuracy for multiple targets in distributed MIMO radar, this paper analyses the influence of transmitted power and signal effective time width on the estimation accuracy, and a joint resource allocation al...
Target Recognition for Polarimetric HRRP Based on Fast Density Search Clustering Method
WU Jiani, CHEN Yongguang, DAI Dahai, CHEN Siwei, WANG Xuesong
2016, 38(10): 2461-2467. doi: 10.11999/JEIT151457
Abstract:
A classification algorithm based on the fast density search clustering method is proposed for polarimetric High Resolution Range Profile (HRRP) of man-made target. The polarization and frequency features are used to discriminate scattering centers in...
Estimation of Tropospheric Slant Delay Based on Improved Ray Tracing Method
CHEN Xihong, WU Wenyi, LIU Zan
2016, 38(10): 2468-2474. doi: 10.11999/JEIT160023
Abstract:
The tradition tropospheric delay models and the method of ray-tracing have some limits like inefficiency, high cost and the the restrictions of radiosonde data and surface parameters. An improved method based on ray tracing is proposed. In this metho...
Ground Moving Target Detection Based on Robust Principal Component Analysis and Shape Constraint
GUO Xiaolu, TAO Haihong, YANG Dong
2016, 38(10): 2475-2481. doi: 10.11999/JEIT151462
Abstract:
Ground moving target detection is a major application in multichannel Synthetic Aperture Radar (SAR) system. In recent years, method based on Robust Principal Component Analysis (RPCA) has attracted much attention for its good performance in distingu...
Transient Interference Localization Method in the Skywave Over-the-horizon Radar
LIU Ziwei, SU Hongtao, HU Qinzhen
2016, 38(10): 2482-2487. doi: 10.11999/JEIT151475
Abstract:
In order to excise transient interferences in the skywave over-the-horizon radar, regular time-domain methods use steps as interference localization, interference blanking and data restoration. The interference excision performance depends highly on ...
Clutter Cancellation for Airborne Passive Radar Based on RDNLMS
2016, 38(10): 2488-2494. doi: 10.11999/JEIT151310
Abstract:
RDNLMS algorithm is used to cancel Doppler-spreading direct signal and strong echo of airborne passive radar. The transfer function of RDNLMS filter is deduced, based on which a method of non-uniform Doppler extraction is developed to decrease the co...
Precision Comparison and Airborne Experiment Validation between SAR Altimeter and Conventional Altimeter
LIU Peng, XU Ke, WANG Lei, SHI Lingwei, YU Xiufen
2016, 38(10): 2495-2501. doi: 10.11999/JEIT151354
Abstract:
Synthetic Aperture Radar ALtimeter (SARAL) is a new generation radar altimeter and has the best height precision now. As using synthetic aperture technique, the height precision of SARAL is improved by one fold. Based on studying the height precision...
High-order Coherent Scattering Model for Vegetation with Fractal Structures
RAO Liting, ZHANG Xiaojuan, WANG Youcheng, FANG Guangyou
2016, 38(10): 2502-2508. doi: 10.11999/JEIT160095
Abstract:
At low frequency, the assumption of independent scattering of the scatterers in vegetation medium is no longer valid. The coherent effect and near field interactions should be considered. In this paper, a high-order coherent scattering model for vege...
Novel Single Hazy Image Restoration Method Based on Nonlocal Total Variation Regularization Optimization
HE Renjie, FAN Yangyu, WANG Zhiyong, FENG David
2016, 38(10): 2509-2514. doi: 10.11999/JEIT160208
Abstract:
Based on the property that the scene radiance is of high contrast and the atmospheric veil is locally smooth, a novel single hazy image restoration method based on nonlocal total variation regularization optimization is proposed in this paper. In ord...
Recoding Error-correcting Output Codes Based on Receiver Operating Characteristics
LEI Lei, WAGN Xiaodan, LUO Xi
2016, 38(10): 2515-2522. doi: 10.11999/JEIT151343
Abstract:
As to the problem that the base classifiers in ternary Error Correcting Output Codes (ECOC) matrix do not contain the prior information of classes which are ignored in binary splits, a new recoding ECOC based on Receiver Operating Characteristic (ROC...
Fast Coding Unit Decision Algorithm for Depth Intra Coding in 3D-HEVC
ZHANG Hongbin, FU Changhong, SU Weimin, CHAN Yuilam, SIU Wanchi
2016, 38(10): 2523-2530. doi: 10.11999/JEIT151426
Abstract:
An efficient Coding Unit (CU) decision algorithm is proposed for depth intra coding, in which the depth level of CU is predicted by Corner-Point (CP) and the co-located texture CU. More specially, firstly, the CPs are obtained by corner detector in j...
A Generalized Principal Component Extraction Algorithm and Its Convergence Analysis
GAO Yingbin, KONG Xiangyu, HU Changhua, ZHANG Huihui, HOU Li’an
2016, 38(10): 2531-2537. doi: 10.11999/JEIT151433
Abstract:
The generalized principal component analysis plays an important roles in many fields of modern signal processing. However, up to now, there are few algorithms, which can extract the generalized principal component adaptively. In this paper, a general...
Acceleration Forward-backward Pursuit Algorithm Based on Compressed Sensing
WANG Feng, SUN Guiling, ZHANG Jianping, HE Jingfei
2016, 38(10): 2538-2545. doi: 10.11999/JEIT151422
Abstract:
The Forward-Backward Pursuit (FBP) algorithm, a novel two stage greedy approach, receives wide attention due to the high reconstruction accuracy and the feature without prior information of the sparsity. However, FBP has to run more time to get a hig...
Maximum Likelihood Modulation Recognition for Continuous Phase Modulation Signals Using Memory Factor
WU Bin, YUAN Yabo, WANG Bo
2016, 38(10): 2546-2552. doi: 10.11999/JEIT151445
Abstract:
In order to solve the problem of low recognition accuracy of Continuous Phase Modulation (CPM) which is non-linear and with memory, a new maximum likelihood modulation recognition approach using memory factor is proposed in this paper. The approach d...
Joint Source Channel and Security Arithmetic Coding Controlled by Chaotic Keys
YAN Yi, ZHANG Can, GUO Zhenyong, GAO Shaoshuai, CHEN Deyuan
2016, 38(10): 2553-2559. doi: 10.11999/JEIT151429
Abstract:
In order to transfer effective, reliable and secure information in resource-constrained networks such as deep space communications and mobile communications, a joint source channel security arithmetic coding method controlled by chaotic keys is propo...
Fast Nulls Tracking Pattern Synthesis Based on Jammer Subspace Orthogonal Projection
MA Xiaofeng, LU Le, SHENG Weixing, HAN Yubing, ZHANG Renli
2016, 38(10): 2560-2567. doi: 10.11999/JEIT151438
Abstract:
A fast nulls tracking pattern synthesis algorithm based on jammer subspace orthogonal projection is proposed, which can suppress the dynamic active jamming for LEO spaceborne array antenna. The algorithm corrects the nulls positions of radiation patt...
Physical-layer Network Coding Based on Hierarchical Modulation
TANG Meng, CHEN Jianhua, ZHANG Yan, ZHANG Yufeng
2016, 38(10): 2568-2574. doi: 10.11999/JEIT151470
Abstract:
In wireless communication network, the channel state information is complicated. A joint Hierarchical Modulation and Physical-layer Network Coding (HM-PNC) scheme is proposed for the asymmetric Two-Way Relay Channel (TWRC). In this scheme, the two so...
Secrecy Performance Analysis of Multiple-antenna Relay Systems with Artificial Noise Precoding
ZHAO Rui, HE Yucheng, ZHOU Lin, XIE Weibo
2016, 38(10): 2575-2581. doi: 10.11999/JEIT160053
Abstract:
To improve the secrecy performance of relay networks in the presence of one eavesdropper, the Artificial Noise Precoding (ANP) and Eigen-Beamforming (EB) secure transmission schemes are appilied at the multiple-antenna amplify-and-forward relay, and ...
CABAC Based H.264 Video Perceptual Encryption Algorithm with Adjustable Visual Quality
BAI Sen, GUO Yu, ZHAO Bo, DAI Qinfang
2016, 38(10): 2582-2589. doi: 10.11999/JEIT151478
Abstract:
In Video on Demand (VoD) applications it is desired that the encrypted multimedia data are still partially perceptible after encryption in order to stimulate the purchase of the high-quality versions of the multimedia products. This perceptual encryp...
Dynamic Double Threshold Energy Detection Based on Markov Model in Cognitive Radio
LIU Yulei, LIANG Jun, XIAO Nan, HU Yulong, HU Meng
2016, 38(10): 2590-2597. doi: 10.11999/JEIT151400
Abstract:
With the development of the technology of cognitive radio, the standards of spectrum sensing performance become the higher and the higher, especially in low Signal-to-Noise Ratio (SNR) environments. A Dynamic Double-threshold Energy sensing method ba...
Distribution of Downlink Inter-cell Interference Based on Gaussian Mixture Model
YAN Xiaojun, XU Jing, ZHU Yuanping, YANG Yang, WANG Jiang
2016, 38(10): 2598-2604. doi: 10.11999/JEIT151459
Abstract:
In Orthogonal Frequency Division Multiple Access (OFDMA)-based cellular networks, the statistical characteristics of the Inter-Cell Interference (ICI) are closely related to network performances. There is no closed-form expression for the Cumulative ...
Resource Allocation Algorithm Based on Stable Matching in Hierarchical Cognitive Radio Networks
CAO Long, ZHAO Hangsheng, BAO Lina, ZHANG Jianzhao
2016, 38(10): 2605-2611. doi: 10.11999/JEIT151460
Abstract:
The rational spectrum resource allocation is one of the goals of Cognitive Radio (CR) technology. With the rapid increase of Secondary Users (SUs) numbers, the precise and real-time management becomes more and more difficult to achieve. In order to s...
Physical Layer Secret Key Capacity Based on Wireless Channel Parameters
WANG Xu, JIN Liang, SONG Huawei, HUANG Kaizhi
2016, 38(10): 2612-2618. doi: 10.11999/JEIT160032
Abstract:
Physical layer secret key capacity is affected by such factors as additive noise, the time difference of channel sampling, terminals moving speed, sampling period, and the number of samples, whose effects on the physical layer secret key capacity are...
Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme
MAO Kefei, CHEN Jie, LIU Jianwei
2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443
Abstract:
The security of hierarchical identity based authenticated key agreement scheme which was proposed by CAO et al. (2014) is cryptanalyzed. First, it is pointed out that the scheme is not completely secure against the basic impersonation attack. Then, t...
Adaptive Link Fingerprint Authentication Scheme Against Sybil Attack in ZigBee Network
YU Bin, HUANG Meigen, HUANG Yicai, KONG Zhiyin
2016, 38(10): 2627-2632. doi: 10.11999/JEIT151476
Abstract:
To solve the problem that Sybil attack damages the uniqueness of node identity in ZigBee network, an adaptive link fingerprint authentication scheme against Sybil attack is proposed. First, a link fingerprint based on the characteristics of wireless ...
Improved Privacy Protection Handover Authentication Protocol for Vehicular Ad Hoc Networks
ZHOU Zhiping, ZHANG Huigen, SUN Ziwen, LI Jing
2016, 38(10): 2633-2639. doi: 10.11999/JEIT160015
Abstract:
To overcome the shortages in security and privacy of existing handover authentication protocols for vehicle network, an improved scheme based on the Lightweight Identity Authentication Protocol (LIAP) protocol is proposed in this paper. Firstly, term...
New Method for Checking the Data Stored with Fault Tolerance in Cloud
JI Qian, YANG Chao, ZHAO Wenhong, ZHANG Junwei
2016, 38(10): 2640-2646. doi: 10.11999/JEIT151344
Abstract:
Implementation of file fault tolerance is the key for preventing data loss in cloud. However, cloud storage service providers may not offer the committed level, which results in that users may suffer data loss and economic loss. Existing inspection a...
Region Incrementing Visual Cryptography Scheme with Decrypt Regions Perfectly Recovered
HU Hao, YU Bin, SHEN Gang, ZHANG Xuesi
2016, 38(10): 2647-2653. doi: 10.11999/JEIT151448
Abstract:
In order to optimize the recovery quality of Region Incrementing Visual Cryptography Scheme (RIVCS), by adding identities for shares and combing the random numbers, an XOR-based single-secret sharing Visual Cryptography Scheme (XVCS) with individual ...
Dynamical Weighted Scheduling Algorithm Supporting Fair Bandwidth Allocation of Virtual Networks
LIU Zhongjin, ZHUO Zihan, HE Yueying, LI Yong, SU Li, JIN Depeng, ZENG Lieguang
2016, 38(10): 2654-2659. doi: 10.11999/JEIT151485
Abstract:
Network virtualization is widely deployed in network experiment platforms and data center networks. As a key networking equipment in virtualized environment, the virtual router can build many virtual router instances to run different virtual networks...
Energy Aware Virtual Network Embedding Using Particle Swarm Optimization Algorithm Based on Adaptive
HU Ying, ZHUANG Lei, LAN Julong, MA Ding
2016, 38(10): 2660-2666. doi: 10.11999/JEIT151434
Abstract:
A novel adaptive co-evolutionary particle swarm optimization algorithm is presented for energy aware virtual network embedding problem. The polymerization degree is designed, which is used to adaptively select searching method, namely variation searc...
Sparse Array Pattern Synthesis Using Unitary Transformation Matrix Pencil Method
SHEN Haiou, WANG Buhong, LIU Xinbo
2016, 38(10): 2667-2673. doi: 10.11999/JEIT151437
Abstract:
A novel non-iterative method, named unitary matrix pencil method, is presented in this paper for the pattern synthesis of sparse linear arrays. Through unitary transformation of the centro-Hermit matrix constructed using sample data of the desired pa...
Study of the Reliability of the Output Structure for X-band Space Traveling Wave Tube
SHANG Xinwen, LI Xinwei, CAO Linlin, XIAO Liu, SU Xiaobao
2016, 38(10): 2674-2680. doi: 10.11999/JEIT160003
Abstract:
X-band pulsed space Traveling Wave Tube (TWT) is mainly used in such radar system as light-weight SAR, which is required to have high power, high efficiency and high reliability. The output structure is an important part of the TWT, and its reliabili...
New Memristor Chaotic Circuit and Its Application to Image Encryption
MIN Fuhong, WANG Zhulin, WANG Enrong, CAO Yi
2016, 38(10): 2681-2688. doi: 10.11999/JEIT160178
Abstract:
Memristor is a kind of resistance and in possession of the function of memory. The research hotspots and difficulties at present memristor lie in the application of the new model and related areas. A novel magnetron memristor model based on hyperboli...
Design of Optimized Conditional Speculative Decimal Adders CUI Xiaoping WANG Shumin LIU Weiqiang DONG Wenwen
CUI Xiaoping, WANG Shumin, LIU Weiqiang, DONG Wenwen
2016, 38(10): 2689-2694. doi: 10.11999/JEIT151416
Abstract:
There are increasing interests in hardware support for decimal arithmetic due to the demand of high accuracy computation in commercial computing, financial analysis, and other applications. New specifications for decimal floating-point arithmetic hav...
Security Analysis on Two Certificateless Aggregate Signature Schemes
LUO Min, SUN Teng, ZHANG Jingyin, LI Li
2016, 38(10): 2695-2700. doi: 10.11999/JEIT151350
Abstract:
Zhang et al. (2015) proposed two certificateless aggregate signature schemes, and they demonstrated that both of their schemes are provably secure in the random oracle model. This paper analyzes the security of two schemes proposed by Zhang et al. an...