Advanced Search

2016 Vol. 38, No. 2

Display Method:
Outage Performance for Heterogeneous Cellular Networks with Interference Cancellation
SONG Kang, WEI Lei, JI Baofeng, WANG Yafang, HUANG Yongming, YANG Lüxi
2016, 38(2): 255-261. doi: 10.11999/JEIT150532
Abstract:
In heterogeneous cellular networks, small cells provide for the handover of users from the macro cell and organize itself during the transmission. This paper studies the downlink outage performance of heterogeneous cellular networks with an interfere...
A Cluster-based Resource Allocation in a Two-tier OFDMA Femtocell Networks
ZHANG Haibo, MU Lixiong, CHEN Shanxue, PENG Jiaoyang
2016, 38(2): 262-268. doi: 10.11999/JEIT150699
Abstract:
Femtocell is a promising technology to enhance indoor coverage and system capacity. However, the co-tier and cross-tier interference impair greatly the network performance for spectrum-sharing OFDMA femtocell networks. To mitigate the co-tier/cross-t...
A Multi-attribute Vertical Handoff Decision Algorithm Based on Motion Trend Quantification
PAN Su, LIANG Yu, LIU Shengmei
2016, 38(2): 269-275. doi: 10.11999/JEIT150443
Abstract:
The base station will initiate handoff blindly and cause high failure rate of handoff if the knowledge of the terminal,s motion trend is absent. An optimized algorithm is proposed to optmize existing vertical handoff algorithm in the LTE-WiMAX hetero...
The Non-data-aided Channel Order and Noise VarianceEstimation in the Low SNR Region of OFDM Signals
WANG Dong, ZHAO Jiaxiang, YU Lihong
2016, 38(2): 276-281. doi: 10.11999/JEIT150599
Abstract:
This paper proposes a new Non-Data-Aided (NDA) scheme to estimate the channel order and noise variance in the low Signal to Noise Ratio (SNR) region of Orthogonal Frequency Division Multiplexing (OFDM) signals. In this scheme, a new cost function is ...
Compressed Sensing Channel Estimation Algorithm Based on Deterministic Sensing with Golay Complementary Sequences
YAO Zhiqiang, LI Guanglong, WANG Shiguo, YOU Zhihong
2016, 38(2): 282-287. doi: 10.11999/JEIT150594
Abstract:
To deal with problems of large Peak-to-Average Power Ratio (PAPR) and computation complexity in existing channel estimation algorithm based on compressed sensing, Golay complementary sequence is utilized to estimate sparse channel as a deterministic ...
Maximum Likelihood Decoding of Fountain Codes in Underwater Acoustic Communication
WU Yanbo, ZHU Min
2016, 38(2): 288-293. doi: 10.11999/JEIT150572
Abstract:
Considering the characteristics of underwater acoustic communication, random linear fountain codes with maximum likelihood decoding are studied to correct erasure errors in the short packet transmission. In existing maximum likelihood decoding method...
Objective Visual Comfort Assessment Model of Stereo Image Based on Scene Mode
YING Hongwei, JIANG Gangyi, YU Mei, PENG Zongju, SHAO Feng
2016, 38(2): 294-302. doi: 10.11999/JEIT150267
Abstract:
To predict the effects induced by stereo image content on visual health, a new objective Visual Comfort Assessment (VCA) method of stereo image is proposed based on scene modes. Natural scene is abstracted as multiple scene modes according to two pos...
Autocorrelation Distribution of Binary Generalized Legendre-Sidelnikov Sequences
KE Pinhui, YE Zhifan, CHANG Zuling
2016, 38(2): 303-309. doi: 10.11999/JEIT150687
Abstract:
Compared with the original Legendre-Sidelnikov sequence, the generalized Legendre-Sidelnikov sequence has a better balanced property. For its autocorrelation distribution, however, only some special cases are known. In this paper, using the character...
Data Forwarding Mechanism with Blackhole Attack Detection in Intermittently Connected Wireless Networks
2016, 38(2): 310-317. doi: 10.11999/JEIT150459
Abstract:
Intermittently connected wireless networks transmit data through opportunities caused by nodes movements. But malicious nodes in the network can attack and delete data by falsifying information about their routings, in order to impact the performance...
Design of Zero Correlation Zone Punctured Quaternary Periodic Complementary Sequence Pairs Sets
LI Qi, LI Ding, GAO Junping, HAN Jin, ZHAO Yang
2016, 38(2): 318-324. doi: 10.11999/JEIT150636
Abstract:
A design method of Zero Correlation Zone (ZCZ) punctured quaternary periodic complementary sequence pairs set is proposed. Based on perfect punctured binary sequences pairs and orthogonal matrix, ZCZ punctured sequence pairs sets can be constructed. ...
Popularity and Centrality Based Selective Caching Scheme for Information-centric Networks
RUI Lanlan, PENG Hao, HUANG Haoqiu, QIU Xuesong, SHI Ruichang
2016, 38(2): 325-331. doi: 10.11999/JEIT150626
Abstract:
Information-Centric Network (ICN) architectures seek to provide the necessary foundations for a more cost-efficient content acquirement and content distribution using universal in-network caching, also universal in-network caching is a key design pri...
Multi-hop Hybrid Cooperative Geographic Routing Algorithm with Outage-probability-constrained
ZHANG Song, MA Linhua, RU Le, ZHANG Haiwei, TANG Hong, HU Xing
2016, 38(2): 332-339. doi: 10.11999/JEIT150487
Abstract:
A Multi-hop Hybrid Cooperative Geographic Routing (MHCGR) algorithm with outage-probability- constrained is proposed to reduce the path length for routing in wireless sensor networks. The cooperative links using different cooperative strategies are a...
Enhancing Privacy Preserving for Crowdsourced Monitoring A Game Theoretic Analysis Based Approach
HE Yunhua, SUN Limin, YANG Weidong, LI Hong
2016, 38(2): 340-346. doi: 10.11999/JEIT150721
Abstract:
Crowdsourcing traffic monitoring is a promising application, which exploits ubiquitous mobile devices to upload GPS samples to obtain live road traffic. However, uploading the sensitive location information raises significant privacy issues. By analy...
Certificateless Encryption over NTRU Lattices
CHEN Hu, HU Yupu
2016, 38(2): 347-353. doi: 10.11999/JEIT150380
Abstract:
To lower the sizes of keys, a certificateless encryption scheme is put forward by using a trapdoor sampling algorithm over a selected NTRU lattice to extract partial private keys and using Ring Learning With Errors (RLWE) problem to generate public k...
Reversible Steganography in Encrypted Domain Based on LWE
ZHANG Minqing, KE Yan, SU Tingting
2016, 38(2): 354-360. doi: 10.11999/JEIT150702
Abstract:
This paper proposes a novel scheme of reversible steganography in encrypted domain based on Learning With Errors (LWE). The original data is encrypted by the cryptographic algorithms with LWE. Then additional data could be embedded into the cipher te...
RFID Mutual Authentication Protocol on Pseudo-random Hash Function with Shared Secrets
SHI Leyi, JIA Cong, GONG Jian, LIU Xin, CHEN Honglong
2016, 38(2): 361-366. doi: 10.11999/JEIT150653
Abstract:
Concerning the resource-limited RFID tags, this paper presents a lightweight mutual authentication scheme based on Hash function, combining with the pseudo-random number and shared secret mechanisms, and implements the mutual authentication among the...
Speaker Recognition Based on Fisher Discrimination Dictionary Learning
WANG Wei, HAN Jiqing, ZHENG Tieran, ZHENG Guibin, TAO Yao
2016, 38(2): 367-372. doi: 10.11999/JEIT 150566
Abstract:
Motivated by the success of sparse representation in speaker recognition,?a good?dictionary?plays an important role in?sparse representation. In this paper, the structured dictionary learning is introduced to speaker recognition based on the Fisher c...
Multi-class Adaboost Algorithm Based on the Adjusted Weak Classifier
YANG Xinwu, MA Zhuang, YUAN Shun
2016, 38(2): 373-380. doi: 10.11999/JEIT150544
Abstract:
Adaboost.M1 requires each weak classifier,s accuracy rate more than 1/2. But it is difficult to find a weak classifier which accuracy rate more than 1/2 in a multiple classification issues. Some scholars put forward the Stagewise Additive Modeling us...
Fast Single Image Dehazing Based on Interval Estimation
LIU Haibo, YANG Jie, WU Zhengping, ZHANG Qingnian, DENG Yong
2016, 38(2): 381-388. doi: 10.11999/JEIT150403
Abstract:
In order to solve the problem of degraded images captured in hazy weather, a single image dehazing method based on interval estimation is proposed. From the atmospheric scattering model, the minimal filtering and gray-scale opening operation are used...
Interacting Multiple System Tracking Algorithm
ZHANG Xiaoguang, WEI Dongyan, XU Ying, YUAN Hong
2016, 38(2): 389-393. doi: 10.11999/JEIT150543
Abstract:
Interacting algorithm is widely used in multi-model target tracking, but it is rarely used in multi-system target tracking. In this paper, the interacting idea is used as a reference, and an interacting multi-system tracking algorithm is proposed. Th...
Low Rank Tensor Completion for Recovering Missing Data in Multi-channel Audio Signal
YANG Lidong, WANG Jing, XIE Xiang, ZHAO Yi, KUANG Jingming
2016, 38(2): 394-399. doi: 10.11999/JEIT150589
Abstract:
The data maybe miss due to problems in the acquisition, compression or transmission process of multi- channel audio signal. In order to take audiences real auditory sense, an approach of signal recovery based on low rank tensor completion is proposed...
An Adaptive Closed-loop Image Dehazing Algorithm Based on the Feedback Mechanism
MA Shiping, LI Quanhe, ZHANG Shengchong
2016, 38(2): 400-407. doi: 10.11999/JEIT150494
Abstract:
To solve the problem of low adaptability in existing dehazing algorithms caused by the randomness and complexity of atmospheric environment, an adaptive closed-loop dehazing algorithm based on the feedback mechanism is proposed. Firstly, parameters i...
Estimating Tropospheric Slant Scatter Delay at Low Elevation
CHEN Xihong, LIU Zan, LIU Jiye, LIU Jin, ZHANG Qun
2016, 38(2): 408-412. doi: 10.11999/JEIT150628
Abstract:
Troposphere slant delay is the main error source in two way troposphere time transfer. But there is not an accurate model to estimate the slant delay caused by tropospheric in this system. In order to estimate accurately slant delay, the method of ra...
An Improved Fuzzy Connectedness Method to Recognize Automatically the Road Network Information from Remote Sensing Image
ZHENG Jin, LIU Su, SUN Wei
2016, 38(2): 413-417. doi: 10.11999/JEIT150563
Abstract:
To recognize automatically road network from remote sensing image, an improved fuzzy connectedness method is proposed by combining traditional fuzzy connectedness theory with wavelet modulus maximum algorithm. The wavelet modulus maximum image edge d...
Correction Methods of Calibration Reference Targets RadiometricCharacteristic in High-resolution SAR Systems
HONG Jun, LEI Dali, WANG Yu, FEI Chunjiao
2016, 38(2): 418-424. doi: 10.11999/JEIT150570
Abstract:
The calibration reference point targets Radar Cross Section (RCS) is a inherent property depending on frequency and incidence angle, for traditional SAR systems, which can be approximately regarded as a constant under the condition of narrowband and ...
A Super-resolution Design Method for Integration of OFDM Radar and Communication
LIU Yongjun, LIAO Guisheng, YANG Zhiwei, XU Jingwei
2016, 38(2): 425-433. doi: 10.11999/JEIT150320
Abstract:
The traditional OFDM radar is usually without regard to transmit communication information. A new radar transmitting pattern based on OFDM is designed to realize the integration of radar and communication. And a new method based on compensated commun...
Polarization Scattering Characteristics Based Range Alignment for Bandwidth Echoes of Space Coning Target
SHAO Changyu, DU Lan, HAN Xun, LIU Hongwei
2016, 38(2): 434-441. doi: 10.11999/JEIT150316
Abstract:
Range alignment is an important step in the preprocessing of wideband radar echoes. However for the echoes of space coning target with micro-motions that only has several scatter centers, the range alignment methods available do not work well. Range ...
Partially Correlation Signal Design for MIMO Radar in the Presence of Interference
CHEN Cheng, LI Hongtao, ZHU Xiaohua, HU Heng, ZENG Wenhao
2016, 38(2): 442-449. doi: 10.11999/JEIT150637
Abstract:
Transmitted waveform can be designed to improve the SINR performance of colocated MIMO in the preference of interference. However, the optimized waveforms generally have high auto-correlation sidelobes which worsen the detection performance of weak t...
Array ISAR of Precessional Cone Target Generated by Intermittent Sampling Repeater Jamming in Fast and Slow Time
WANG Ying, SHU Changyong, ZHANG Shengjun, HUANG Peilin, JI Jinzu
2016, 38(2): 450-454. doi: 10.11999/JEIT150464
Abstract:
In order to improve the penetration ability of the cone target, [d6]a method is proposed[d7] to generate the array ISAR distributed along the range and azimuth direction by the intermittent sampling repeater jamming in fast and slow time. The ISAR im...
The Multifractal Properties of AR Spectrum and Weak Target Detection in Sea Clutter Background
FAN Yifei, LUO Feng, LI Ming, HU Chong, CHEN Shuailin
2016, 38(2): 455-463. doi: 10.11999/JEIT150581
Abstract:
This paper focuses on the multifractal properties of sea clutter in power spectrum domain. To overcome the deficiencies of Fourier transform analysis, the power spectrum of the sea clutter is obtained by AutoRegressive (AR) spectrum estimation. The A...
A Multi-Bernoulli Filtering Algorithm Using Amplitude Information
YUAN Changshun, WANG Jun, SUN Jinping, SUN Zhongsheng, BI Yanxian
2016, 38(2): 464-471. doi: 10.11999/JEIT150683
Abstract:
In many multi-target tracking scenarios, the amplitude of target returns are stronger than those coming from false alarms. This amplitude information can be used to improve the multi-target state estimation by obtaining more accurate target and false...
Theoretical Performance Analysis for Parameter Estimation of Hybrid Modulated Signal Combining Pseudo-random Binary-phase Code and Linear Frequency Modulation
WANG Pei, ZHU Jun, TANG Bin
2016, 38(2): 472-477. doi: 10.11999/JEIT150523
Abstract:
According to the theoretical performance for parameter estimators of a signal combined Pseudo-Random Binary-phase Code (PRBC) and Linear Frequency Modulation (LFM), this paper analyzes the impact of step-by- step method on the signal estimation probl...
Research on Signatures of Scattering Centers Shown in Time-frequency Representation
GUO Kunyi, NIU Tongyao, QU Quanyou, SHENG Xinqing
2016, 38(2): 478-485. doi: 10.11999/JEIT150598
Abstract:
Scattering centers are important features of electromagnetic scattering at high frequencies. The aspect dependency of the amplitude and location of a scattering center has a significant influence on radar imaging and target recognition. Compared with...
Backscatter Analysis of Lossy Dielectric Sea Surface Using SMCG-PBTG Method--Comparison with Experimental Data
SU Xiang, WU Zhensen, WANG Xiaobin, DAI Fei
2016, 38(2): 486-494. doi: 10.11999/JEIT150401
Abstract:
The traditional numerical method of calculating electromagnetic scattering from the dielectric sea surface requires large amounts of memory and computation time as irradiated area increasing rapidly at low grazing angles. The method of Sparse Matrix ...
Overview of Radar Imaging Technique and Application Based on Compressive Sensing Theory
LI Shaodong, YANG Jun, CHEN Wenfeng, MA Xiaoyan
2016, 38(2): 495-508. doi: 10.11999/JEIT150874
Abstract:
Compressive Sensing (CS) theory, based on the sparsity of interested signal, samples degree-of-freedom of signal. CS is expected to improve the performance of imaging radar in the following aspects: improving the quality of imaging, simplifying the d...