Email alert
2016 Vol. 38, No. 11
Display Method:
2016, 38(11): 2701-2708.
doi: 10.11999/JEIT160011
Abstract:
In this paper, a multi-task jointly sparse spectral unmixing method based on spectral similarity measure of hyperspectral imagery is proposed, which is a refinement of collaborative sparse spectral unmixing method. First, a threshold value is obtaine...
In this paper, a multi-task jointly sparse spectral unmixing method based on spectral similarity measure of hyperspectral imagery is proposed, which is a refinement of collaborative sparse spectral unmixing method. First, a threshold value is obtaine...
2016, 38(11): 2709-2714.
doi: 10.11999/JEIT151439
Abstract:
To improve the compression ratio of lossless compression scheme based on prediction, a lossless compression scheme for hyperspectral images using K-means Clustering method and Conventional Recursive Least-Squares (C-CRLS) predictor is presented in th...
To improve the compression ratio of lossless compression scheme based on prediction, a lossless compression scheme for hyperspectral images using K-means Clustering method and Conventional Recursive Least-Squares (C-CRLS) predictor is presented in th...
2016, 38(11): 2715-2723.
doi: 10.11999/JEIT160052
Abstract:
The high dimensions of hyperspectral remote sensing images will cause the redundancy of information and complexity of data processing, which also brings tremendous computing workload and damages application accuracy. Therefore, before the analysis of...
The high dimensions of hyperspectral remote sensing images will cause the redundancy of information and complexity of data processing, which also brings tremendous computing workload and damages application accuracy. Therefore, before the analysis of...
2016, 38(11): 2724-2730.
doi: 10.11999/JEIT160104
Abstract:
At present, the amount of data collection of microwave radiometric imaging system in one snapshot is massive, so it is difficult to achieve the high spatial resolution by conventional microwave radiation imaging method based on the Nyquist sampling. ...
At present, the amount of data collection of microwave radiometric imaging system in one snapshot is massive, so it is difficult to achieve the high spatial resolution by conventional microwave radiation imaging method based on the Nyquist sampling. ...
2016, 38(11): 2731-2738.
doi: 10.11999/JEIT160195
Abstract:
The Sea State Bias (SSB) is an important source of error in satellite altimetry. Operational SSB correction models are based on the altimeter-measured wind speed (U) and Significant Wave Height (SWH). This paper presents a new method to estimate the ...
The Sea State Bias (SSB) is an important source of error in satellite altimetry. Operational SSB correction models are based on the altimeter-measured wind speed (U) and Significant Wave Height (SWH). This paper presents a new method to estimate the ...
2016, 38(11): 2739-2744.
doi: 10.11999/JEIT160051
Abstract:
In the electronic system, it occasionally needs to accomplish the transmission and reception of signal in the same platform, at this time, certain transceiver isolation and signal cancellation processing technology are usually adopted. Relative to no...
In the electronic system, it occasionally needs to accomplish the transmission and reception of signal in the same platform, at this time, certain transceiver isolation and signal cancellation processing technology are usually adopted. Relative to no...
2016, 38(11): 2745-2752.
doi: 10.11999/JEIT160050
Abstract:
This paper investigates the joint estimation of Time Difference Of Arrival (TDOA) and Frequency Difference Of Arrival (FDOA) in passive location system, where the true value of the reference signal is unknown. A novel Maximum Likelihood (ML) estimato...
This paper investigates the joint estimation of Time Difference Of Arrival (TDOA) and Frequency Difference Of Arrival (FDOA) in passive location system, where the true value of the reference signal is unknown. A novel Maximum Likelihood (ML) estimato...
2016, 38(11): 2753-2759.
doi: 10.11999/JEIT160125
Abstract:
Traditional design methods of two-dimensional large-scale filter banks suffer from high-complexity. This paper presents an algorithm to design two-dimensional double-prototype fully oversampled Discrete Fourier Transform (DFT) modulated filter bank w...
Traditional design methods of two-dimensional large-scale filter banks suffer from high-complexity. This paper presents an algorithm to design two-dimensional double-prototype fully oversampled Discrete Fourier Transform (DFT) modulated filter bank w...
2016, 38(11): 2760-2766.
doi: 10.11999/JEIT160042
Abstract:
For the problem of Time Division Data Modulation-Binary Offset Carrier (TDDM-BOC) modulation signal under low Signal-to-Noise Ratio (SNR), including blind estimation of the combination code sequence and information sequence, a revised method using Si...
For the problem of Time Division Data Modulation-Binary Offset Carrier (TDDM-BOC) modulation signal under low Signal-to-Noise Ratio (SNR), including blind estimation of the combination code sequence and information sequence, a revised method using Si...
2016, 38(11): 2767-2773.
doi: 10.11999/JEIT160093
Abstract:
An algorithm of Directions Of Arrival (DOA) estimation based on the state-space method is proposed to deal with the problem of estimating DOA of multiple source signals from a single observation vector of distributed array. Hankle matrixes are firstl...
An algorithm of Directions Of Arrival (DOA) estimation based on the state-space method is proposed to deal with the problem of estimating DOA of multiple source signals from a single observation vector of distributed array. Hankle matrixes are firstl...
2016, 38(11): 2774-2779.
doi: 10.11999/JEIT160133
Abstract:
Distance-weighted coefficients between unlabeled sample point and its nearest neighbors belonging to same sample set are determined subjectively in the Pseudo Nearest Neighbor (PNN) classification algorithm, which makes it difficult to obtain optimal...
Distance-weighted coefficients between unlabeled sample point and its nearest neighbors belonging to same sample set are determined subjectively in the Pseudo Nearest Neighbor (PNN) classification algorithm, which makes it difficult to obtain optimal...
2016, 38(11): 2780-2786.
doi: 10.11999/JEIT160099
Abstract:
The constant modulus algorithm is widely used in the blind equalization of wireless communication system, in order to reduce further the steady-state error, it is usually combined with the decision directed least mean square algorithm. The traditiona...
The constant modulus algorithm is widely used in the blind equalization of wireless communication system, in order to reduce further the steady-state error, it is usually combined with the decision directed least mean square algorithm. The traditiona...
2016, 38(11): 2787-2794.
doi: 10.11999/JEIT160161
Abstract:
A novel image forensic algorithm against contrast modification based on superpixel and histogram of run length is proposed. In the proposed algorithm, images are firstly divided by superpixel, then run length histogram features of each block are extr...
A novel image forensic algorithm against contrast modification based on superpixel and histogram of run length is proposed. In the proposed algorithm, images are firstly divided by superpixel, then run length histogram features of each block are extr...
2016, 38(11): 2795-2802.
doi: 10.11999/JEIT160013
Abstract:
Considering that the existing high-order models have limitations in forecast range and accuracy, a heuristic adaptive-order intuitionistic fuzzy time series forecasting model is built with the combination of the intuitionistic fuzzy sets theory. In t...
Considering that the existing high-order models have limitations in forecast range and accuracy, a heuristic adaptive-order intuitionistic fuzzy time series forecasting model is built with the combination of the intuitionistic fuzzy sets theory. In t...
2016, 38(11): 2803-2810.
doi: 10.11999/JEIT160122
Abstract:
Under the framework of the Bayesian inference, tracking methods based on PCA subspace and L2-norm minimization can deal with some complex appearance changes in the video scene successfully. However, they are prone to drifting or failure when the targ...
Under the framework of the Bayesian inference, tracking methods based on PCA subspace and L2-norm minimization can deal with some complex appearance changes in the video scene successfully. However, they are prone to drifting or failure when the targ...
2016, 38(11): 2811-2818.
doi: 10.11999/JEIT160009
Abstract:
The nuclear norm is used to replace the rank function in the subspace clustering algorithm based on low rank representation, it can not estimate the rank of the matrix effectively and it is sensitive to Gauss noise. In this paper, a novel algorithm i...
The nuclear norm is used to replace the rank function in the subspace clustering algorithm based on low rank representation, it can not estimate the rank of the matrix effectively and it is sensitive to Gauss noise. In this paper, a novel algorithm i...
2016, 38(11): 2819-2825.
doi: 10.11999/JEIT160114
Abstract:
As a typical implementation of the Probability Hypothesis Density (PHD) filter, Particle PHD (P-PHD) is suitable for highly nonlinear systems and widely used in Multi-Target Tracking (MTT). However, the resampling in P-PHD filter, recommended to avoi...
As a typical implementation of the Probability Hypothesis Density (PHD) filter, Particle PHD (P-PHD) is suitable for highly nonlinear systems and widely used in Multi-Target Tracking (MTT). However, the resampling in P-PHD filter, recommended to avoi...
2016, 38(11): 2826-2831.
doi: 10.11999/JEIT160150
Abstract:
One significant advantage of rate selection algorithms based on bandwidth estimation is the high bandwidth utilization rate. They are, however, vulnerable to network bandwidth fluctuations, leading to appearance of rate instantaneous peak value and h...
One significant advantage of rate selection algorithms based on bandwidth estimation is the high bandwidth utilization rate. They are, however, vulnerable to network bandwidth fluctuations, leading to appearance of rate instantaneous peak value and h...
2016, 38(11): 2832-2839.
doi: 10.11999/JEIT160169
Abstract:
Some existing color image adaptive watermarking algorithms do not fully utilize the color information in the adaptive process, or do not consider the holistic property of the components of a color host image. To overcome these drawbacks, this paper p...
Some existing color image adaptive watermarking algorithms do not fully utilize the color information in the adaptive process, or do not consider the holistic property of the components of a color host image. To overcome these drawbacks, this paper p...
2016, 38(11): 2840-2847.
doi: 10.11999/JEIT160209
Abstract:
ElectroEncephaloGram (EEG) data are often contaminated by various electrophysiological artifacts. Among all these artifacts, removing the ones related to muscle activity is particularly challenging. In past studies, Independent Component Analysis (IC...
ElectroEncephaloGram (EEG) data are often contaminated by various electrophysiological artifacts. Among all these artifacts, removing the ones related to muscle activity is particularly challenging. In past studies, Independent Component Analysis (IC...
2016, 38(11): 2848-2855.
doi: 10.11999/JEIT160082
Abstract:
ElectroEncephaloGram (EEG) signal detection and recognition is an important diagnostic method for the epilepsy. Radial Basis Function (RBF) neural network has excellent performance on approximation and generalization, and can directly recognize EEG s...
ElectroEncephaloGram (EEG) signal detection and recognition is an important diagnostic method for the epilepsy. Radial Basis Function (RBF) neural network has excellent performance on approximation and generalization, and can directly recognize EEG s...
2016, 38(11): 2856-2863.
doi: 10.11999/JEIT160181
Abstract:
Texture factor is one of the most important characteristics in the image description. In order to describe the texture feature accurately, and enhance image distinguish ability, a method of texture image retrieval is proposed based on Dual-Tree Compl...
Texture factor is one of the most important characteristics in the image description. In order to describe the texture feature accurately, and enhance image distinguish ability, a method of texture image retrieval is proposed based on Dual-Tree Compl...
2016, 38(11): 2864-2870.
doi: 10.11999/JEIT160080
Abstract:
To solve the speed bottleneck of deformable part models in the detection process, this paper proposes a cascade deformable part model with rapid computation of feature pyramids for the detection process of the model. Because the speed of the detectio...
To solve the speed bottleneck of deformable part models in the detection process, this paper proposes a cascade deformable part model with rapid computation of feature pyramids for the detection process of the model. Because the speed of the detectio...
2016, 38(11): 2871-2878.
doi: 10.11999/JEIT160165
Abstract:
Many systemic diseases can cause changes of the diameters of retinal vessels and Arteriolar-to-Venular diameter Ratios (AVR), so it is of great importance to make quantitative analysis of the diameter of retinal vessels accurately in the diagnosis of...
Many systemic diseases can cause changes of the diameters of retinal vessels and Arteriolar-to-Venular diameter Ratios (AVR), so it is of great importance to make quantitative analysis of the diameter of retinal vessels accurately in the diagnosis of...
2016, 38(11): 2879-2886.
doi: 10.11999/JEIT160157
Abstract:
In order to improve the correct rate of Voice Activity Detection (VAD) in low Signal Noise Ratio (SNR) environment, the paper presents an adaptive reserved likelihood ratio VAD method, which is based on sub-band double features. The method employs su...
In order to improve the correct rate of Voice Activity Detection (VAD) in low Signal Noise Ratio (SNR) environment, the paper presents an adaptive reserved likelihood ratio VAD method, which is based on sub-band double features. The method employs su...
2016, 38(11): 2887-2892.
doi: 10.11999/JEIT160054
Abstract:
A physical layer security scheme is studied, which employs the advantage of artificial noise to improve the performance of legitimate user for multiple antenna systems using beamforming technology and artificial noise. Based on the transmitted symbol...
A physical layer security scheme is studied, which employs the advantage of artificial noise to improve the performance of legitimate user for multiple antenna systems using beamforming technology and artificial noise. Based on the transmitted symbol...
2016, 38(11): 2893-2899.
doi: 10.11999/JEIT151444
Abstract:
In order to solve the problem of blind detection of MIMO system, this paper takes maximum-likelihood sequence detection as the criterion and derives the formulas to get a model based on SemidDefinite Relaxation. The rank of SDR solution equals to the...
In order to solve the problem of blind detection of MIMO system, this paper takes maximum-likelihood sequence detection as the criterion and derives the formulas to get a model based on SemidDefinite Relaxation. The rank of SDR solution equals to the...
2016, 38(11): 2900-2907.
doi: 10.11999/JEIT160007
Abstract:
To solve the problem of key leakages in existing physical layer challenge-response authentication schemes, a physical layer authentication scheme based on hash method is proposed. The channel characteristics are extracted and linked with the key whic...
To solve the problem of key leakages in existing physical layer challenge-response authentication schemes, a physical layer authentication scheme based on hash method is proposed. The channel characteristics are extracted and linked with the key whic...
2016, 38(11): 2908-2915.
doi: 10.11999/JEIT151477
Abstract:
Shuffled-BP (SBP) decoding algorithm is a variable-node-based serial decoding algorithm, which converges faster than the original Belief-Propagation (BP) decoding algorithm. However, due to the semi-parallel processing, there is a decrease in terms o...
Shuffled-BP (SBP) decoding algorithm is a variable-node-based serial decoding algorithm, which converges faster than the original Belief-Propagation (BP) decoding algorithm. However, due to the semi-parallel processing, there is a decrease in terms o...
2016, 38(11): 2916-2921.
doi: 10.11999/JEIT160074
Abstract:
Because the matroid search algorithm is very complicated and the local matroid search algorithm can not search all optimal codes, this paper proposes a variable matroid search algorithm to search the quasi-cyclic codes by researching matroid search a...
Because the matroid search algorithm is very complicated and the local matroid search algorithm can not search all optimal codes, this paper proposes a variable matroid search algorithm to search the quasi-cyclic codes by researching matroid search a...
2016, 38(11): 2922-2930.
doi: 10.11999/JEIT160045
Abstract:
In order to deal with the explosive growth of mobile data traffic, a novel design of network architecture will be adopted in 5G. Software Defined Network (SDN) and Network Function Virtualization (NFV) are the key technologies for network transformat...
In order to deal with the explosive growth of mobile data traffic, a novel design of network architecture will be adopted in 5G. Software Defined Network (SDN) and Network Function Virtualization (NFV) are the key technologies for network transformat...
2016, 38(11): 2931-2939.
doi: 10.11999/JEIT160064
Abstract:
Attribute-Based Encryption (ABE) is often used in cloud storage to achieve fine-grained access control. In order to further protect the sensitive information of access control policy and solve the key escrow caused by the authority center generating ...
Attribute-Based Encryption (ABE) is often used in cloud storage to achieve fine-grained access control. In order to further protect the sensitive information of access control policy and solve the key escrow caused by the authority center generating ...
2016, 38(11): 2940-2947.
doi: 10.11999/JEIT160105
Abstract:
In order to provide differentiated services in information centric networking, a Differentiated Service Model based on Meta Module (DSM3) is proposed. DSM3 defines the basic network control unit as meta module, and matches different meta module combi...
In order to provide differentiated services in information centric networking, a Differentiated Service Model based on Meta Module (DSM3) is proposed. DSM3 defines the basic network control unit as meta module, and matches different meta module combi...
2016, 38(11): 2948-2953.
doi: 10.11999/JEIT160056
Abstract:
In the past studies, it is generally assumed that both sides of communication are in the same environment of public key cryptography, but with the development of technology and the popularity of the network, different regions may have different publi...
In the past studies, it is generally assumed that both sides of communication are in the same environment of public key cryptography, but with the development of technology and the popularity of the network, different regions may have different publi...
2016, 38(11): 2954-2959.
doi: 10.11999/JEIT160049
Abstract:
In the design of ultra wideband TEM horn antenna, it is difficult to combine both the character optimization in low frequency and the miniaturization of an antenna, which always limits the usage of TEM horns in some applications. For the problem of l...
In the design of ultra wideband TEM horn antenna, it is difficult to combine both the character optimization in low frequency and the miniaturization of an antenna, which always limits the usage of TEM horns in some applications. For the problem of l...
2016, 38(11): 2960-2964.
doi: 10.11999/JEIT160608
Abstract:
To improve the environmental adaptation of the package of electric field micro sensor, this article introducs a new electrode package. Different from placing the sensing chip and package inside the measured environment, a package electrode, which is ...
To improve the environmental adaptation of the package of electric field micro sensor, this article introducs a new electrode package. Different from placing the sensing chip and package inside the measured environment, a package electrode, which is ...
2016, 38(11): 2965-2971.
doi: 10.11999/JEIT160035
Abstract:
As the core component of space traveling wave tubes, the cathode-heater assembly is required to be stable, reliable, long life and low power consumption. In this paper, an estimation method of thermal contact resistance is proposed, and the thermal c...
As the core component of space traveling wave tubes, the cathode-heater assembly is required to be stable, reliable, long life and low power consumption. In this paper, an estimation method of thermal contact resistance is proposed, and the thermal c...
2016, 38(11): 2972-2976.
doi: 10.11999/JEIT160031
Abstract:
A novel recognition algorithm for Low Probability of Intercept (LPI) radar signal based on deep learning of radar signals Bispectra Diagonal Slice (BDS) is proposed in this paper. Firstly, a Deep Belief Network (DBN) model is established on stacked R...
A novel recognition algorithm for Low Probability of Intercept (LPI) radar signal based on deep learning of radar signals Bispectra Diagonal Slice (BDS) is proposed in this paper. Firstly, a Deep Belief Network (DBN) model is established on stacked R...
2016, 38(11): 2977-2981.
doi: 10.11999/JEIT160089
Abstract:
The Theory of Characteristic Modes (TCM) provides the antenna designer with physical insight regarding the antenna operating principles. Based on TCM, this paper analyzes in detail the characteristic modes properties of the several transfigurations o...
The Theory of Characteristic Modes (TCM) provides the antenna designer with physical insight regarding the antenna operating principles. Based on TCM, this paper analyzes in detail the characteristic modes properties of the several transfigurations o...
2016, 38(11): 2982-2986.
doi: 10.11999/JEIT160140
Abstract:
In order to alleviate the influence of network congestion in space delay/disruption tolerant networks, a QoS based congestion control algorithm is proposed in this paper. The algorithm consists of contact congestion forecasting scheme and QoS based d...
In order to alleviate the influence of network congestion in space delay/disruption tolerant networks, a QoS based congestion control algorithm is proposed in this paper. The algorithm consists of contact congestion forecasting scheme and QoS based d...