Advanced Search

2016 Vol. 38, No. 3

Display Method:
A Fast Feature Extraction and Matching Algorithm for Unmanned Aerial Vehicle Images
YU Huai, YANG Wen
2016, 38(3): 509-516. doi: 10.11999/JEIT150676
Abstract:
Unmanned Aerial Vehicle (UAV) images are characterized by a very high spatial resolution, and consequently by more abundant information of the edge and the texture. The conventional stitching methods, which use Speeded Up Robust Features (SURF) and k...
Inferring Social Roles with Spatio-temporal Awareness
HU Yahui, LI Shijun, YU Wei, YANG Sha, FANG Qiqing
2016, 38(3): 517-522. doi: 10.11999/JEIT150700
Abstract:
With the development of big data and information technology, a better understanding of users trajectories is of great importance for the design of many applications, such as personalized recommendation, behavioral targeting and computational advertis...
Knowledge Transfer Clustering Algorithm with Privacy Protection
CHEN Aiguo, WANG Shitong
2016, 38(3): 523-531. doi: 10.11999/JEIT150645
Abstract:
For the traditional clustering algorithms efficiency problems in situations of insufficient datasets or datasets with noises, a Knowledge Transfer Clustering Algorithm with Privacy Protection (KTCAPP) is proposed based on the classical Fuzzy C-Means ...
Intraclass-Distance-Sum-Minimization Based Classification Algorithm
WANG Xiaochu, WANG Shitong, BAO Fang, JIANG Yizhang
2016, 38(3): 532-540. doi: 10.11999/JEIT150633
Abstract:
Classification algorithm of Support Vector Machine (SVM) is introduced the penalty factor to adjust the overfit and nonlinear problem. The method is beneficial for seeking the optimal solution by allowing a part of samples error classified. But it al...
Auto Exposure Algorithm for Aerial Camera Based on Histogram Statistics Method
SHEN Xiaohe, LIU Jinghong, CHU Guangsheng
2016, 38(3): 541-548. doi: 10.11999/JEIT150530
Abstract:
The aerial camera takes photographs from sky. Conventional auto exposure algorithms can not be suitable for some special scenes such as the background is bright or dark and few strong interference points exist. Unsuitable exposure causes information ...
An Improved Scheme of Visual Words Description and Action Recognition Using Local Enhanced Distribution Information
ZHANG Liang, LU Mengmeng, JIANG Hua
2016, 38(3): 549-556. doi: 10.11999/JEIT150410
Abstract:
The traditional Bag-Of-Words (BOW) model easy causes confusion of different action classes due to the lack of distribution information among features. And the size of BOW has a large effect on recognition rate. In order to reflect the distribution in...
Eigenvalue Proximal Support Vector Machine Algorithm Based on Eigenvalue Decoposition
CHEN Sugen, WU Xiaojun
2016, 38(3): 557-564. doi: 10.11999/JEIT150693
Abstract:
To deal with the consistency problem of training process and decision process in Generalized Eigenvalue Proximal Support Vector Machine (GEPSVM), an improved version of eigenvalue proximal support vector machine, called IGEPSVM for short is proposed....
Robust Sidelobes Cancellation Algorithm with Null Broadening
LIU Ziwei, SU Hongtao, HU Qinzhen
2016, 38(3): 565-570. doi: 10.11999/JEIT150686
Abstract:
In practical application, the adaptive weight of the sidelobe canceller can not be updated frequently. Thus, the spatial nonstationary interference would lead to the mismatch between the weight and the snapshots, which seriously deteriorates the canc...
Real-time Superpixels Based Tracking Method
WANG Wei, WANG Chunping, FU Qiang, XU Yan
2016, 38(3): 571-577. doi: 10.11999/JEIT150705
Abstract:
Target appearance model is crucial for tracking. In this paper, a Real-time SuperPixels based Tracking (RSPT) method is proposed in a tracking-by-detection framework, by investigating mid-level vision cue superpixels. Firstly, a discriminative appear...
A Color Image Quality Assessment Method Based onNon-negative Matrix Factorization
XU Haiyong, YU Mei, LUO Ting, Lü Yaqi, JIANG Gangyi
2016, 38(3): 578-585. doi: 10.11999/JEIT150610
Abstract:
For the sparse representation of image quality assessment model are based on gray image and the lack of color information, a Non-negative Matrix Factorization (NMF)-based full reference color image quality assessment method is proposed. Firstly, from...
Voiced/Unvoiced Classification and Pitch Estimation Based on Amplitude Compression Filter
XU Jingyun, ZHAO Xiaoqun, WANG Qiao, WANG Digang
2016, 38(3): 586-593. doi: 10.11999/JEIT150778
Abstract:
A method of voiced/unvoiced classification and pitch estimation based on Pitch Estimation Filter with Amplitude Compression (PEFAC) is proposed in this paper. The method first attenuates strong noise components at the?low frequencies based on PEFAC a...
Group Strategy for Remaining Tags in Anti-collision Algorithm for RFID System
WANG Yong, TANG Xiaohu, ZHANG Lijuan
2016, 38(3): 594-599. doi: 10.11999/JEIT150745
Abstract:
In RFID systems, tag anti-collision algorithm is significantly important for fast tag identification, especially in mobile scenarios. A Group Strategy for Remaining tags Algorithm (GSRA) is proposed. It is divided into two phases, which are the ident...
Countering DRFM Range Gate Pull-off Jamming Based on Singular Spectrum Analysis
LU Yunlong, Li Ming, CHEN Hongmeng, WANG Zeyu, ZUO Lei
2016, 38(3): 600-606. doi: 10.11999/JEIT150550
Abstract:
Countering the active deception jamming which is repeated by a Digital Radio Frequency Memory (DRFM) has been a challenging problem. Utilizing the characteristics that the Range Gate Pull Off (RGPO) jamming has a slightly different center frequency f...
High-resolution Imaging for Spotlight Mode SAR from Gapped-data
DUAN Huajun, ZHU Daiyin, MAO Xinhua, WU Di
2016, 38(3): 607-612. doi: 10.11999/JEIT150575
Abstract:
The existing approaches with missing data for SAR by Gapped-data Amplitude and Phase EStimation (GAPES) ignore the range migration and phase error, which lead to the decrease of the imaging quality. An imaging method of gapped-data for spotlight mode...
Phase Space-variance Correction Method for Missile-borne Bistatic Forward-looking SAR Based on Equivalent Range Equation
MENG Ziqiang, LI Yachao, XING Mengdao, BAO Zheng
2016, 38(3): 613-621. doi: 10.11999/JEIT150782
Abstract:
As a new and special bistatic SAR imaging mode, Missile-borne Bistatic Forward-Looking SAR (MBFL-SAR) can perform Two-Dimensional (2D) imaging during the terminal diving period of missile. However, double square root and high order terms in range his...
A New Method for DOA Estimation for VHF MIMO Radar in Low-angle Tracking Environment
LIU Yuan, WANG Hongxian, JIU Bo, YAN Junkun, ZHAO Yongbo, LIU Hongwei
2016, 38(3): 622-628. doi: 10.11999/JEIT150555
Abstract:
The issue of Direction-Of-Arrival (DOA) estimation in low-angle tracking environment for Very High Frequency (VHF) MIMO radar is investigated in this paper. Under the condition of the reflecting surface height is unknown, an algorithm for the target ...
Low-complexity DOA Estimation via Subspace Rotation Technique
YAN Fenggang, QI Xiaohui, LIU Shuai, SHEN Yi, JIN Ming
2016, 38(3): 629-634. doi: 10.11999/JEIT150539
Abstract:
The MUltiple SIgnal Classification (MUSIC) algorithm is one of the most important techniques for Direction-Of-Arrival (DOA) estimate. However, this method is found expensive in practical applications, due to the heavy computational cost involved. To ...
Research on Clutter Suppression for Multichannel High-resolution Wide-swath SAR System
HOU Lili, ZHENG Mingjie, SONG Hongjun, QI Lijuan
2016, 38(3): 635-642. doi: 10.11999/JEIT150659
Abstract:
For multichannel High-Resolution Wide-Swath SAR (HRWS SAR), to achieve high resolution wide cover mapping ability, the echoes of each channel suffer Doppler ambiguity, thus current clutter suppression approaches may not perform well. To solve the pro...
A Robust Interference Alignment Algorithm Based on Weighted Mean Square Error Minimization
LI Ning, WANG Siwen, ZHAI Lijun, LIU Yun
2016, 38(3): 643-648. doi: 10.11999/JEIT150648
Abstract:
Sum rate maximization is often used as the target of linear Interference Alignment (IA). However, the sum rate function is non-convex and hard to be solved. This problem is solved according to the relationship of mean square error and sum rate which ...
A Handover Algorithm Based on Prediction of Adjustable Threshold Hysteresis Margin in Ultra Dense Network
ZHAO Su, ZHANG Tao, ZHU Xiaorong
2016, 38(3): 649-654. doi: 10.11999/JEIT150681
Abstract:
In the fifth generation (5G) mobile communication system, massive MIMO antenna and ultra dense deployment of the network are the two ways to achieve high throughput. To solve the mobility management problems in ultra dense clustering network, this pa...
An Optimized Inter-prediction Algorithm for High Efficiency Video Coding Based on Texture Similarity
WU Xianyun, GAO Yuanyuan, LIU Kai, LI Yunsong
2016, 38(3): 655-660. doi: 10.11999/JEIT150672
Abstract:
In this paper, an optimized inter-prediction algorithm is proposed for High Efficiency Video Coding (HEVC) based on video texture similarity. With the increasing of the video resolution, spatial statistical redundancy is increased meanwhile. HEVC imp...
Context Modeling Based on Description Length
CHEN Jianhua, WANG Yong, ZHANG Hong
2016, 38(3): 661-667. doi: 10.11999/JEIT150562
Abstract:
In entropy coding systems based on the context modeling, the context dilution problem introduced by high-order context models needs to be alleviated by the context quantization to achieve the desired compression gain. Therefore, an algorithm is propo...
An Algorithm for Blind Classification of Space-time Block Code Based on Higher-order Statistics
YAN Wenjun, ZHANG Limin, LING Qing, HONG Danfeng
2016, 38(3): 668-673. doi: 10.11999/JEIT150739
Abstract:
Blind recognition of Space-Time Block Code (STBC) is a new important task in cognitive radio system. Most of the previous researches require multiple receive antennas, however, in many practical applications, size and power on the receivers may favor...
Mixed Recognition Algorithm for Signal Modulation Schemes by High-order Cumulants and Cyclic Spectrum
ZHAO Xiongwen, GUO Chunxia, LI Jingchun
2016, 38(3): 674-680. doi: 10.11999/JEIT150747
Abstract:
To recognize the major modulation schemes which are applied to concurrent communication systems, a joint method based on the high-order cumulants and cyclic spectrum with intelligent decision algorithm (neural network) is proposed to recognize the mo...
Correlation Delay Shift Keying Chaotic Communication Scheme with No Intrasignal Interference
DUAN Junyi, JIANG Guoping, YANG Hua
2016, 38(3): 681-687. doi: 10.11999/JEIT150660
Abstract:
This paper proposes a novel chaotic communication scheme named Correlation-Delay-Shift-Keying with No Intrasignal Interference (CDSK-NII). By utilizing the repeated chaotic sequence as the reference signal and taking advantage of the zero-sum sequenc...
Weighted Bit-flipping Decoding Algorithm for LDPC Codes Based on Updating of Variable Nodes
TAO Xiongfei, WANG Yuedong, LIU Pan
2016, 38(3): 688-693. doi: 10.11999/JEIT150720
Abstract:
An improved weighted bit-flipping decoding algorithm for LDPC codes is presented. The proposed algorithm introduces an updating rule for variable nodes to efficiently improve the reliability of the flipped bits and reduces the error codes caused by t...
Symbol-variance Feedback Equalizer for Turbo Equalization
WU Yanbo, FANG Xiaofang, ZHU Min
2016, 38(3): 694-699. doi: 10.11999/JEIT150825
Abstract:
A novel Symbol-Variance Feedback Equalizer (SVEF) algorithm is proposed to reduce the computational complexity of the equalizer in Turbo equalization. The derivation of the algorithm is based on the Taylor expansion of the Linear Minimum Mean Squared...
Fault Tolerance Mechanism for Sensors Monitoring Overhead Transmission Line in Smart Grid
TANG Xiaoxuan, GUO Shaoyong, QI Feng
2016, 38(3): 700-706. doi: 10.11999/JEIT150576
Abstract:
In the process of monitoring and controlling power distribution network, condition monitoring and fault tolerance of towers and other facilities become an urgent problem in power system. The existing monitoring system can not maintain transmission of...
An Efficient Algorithm for Rapidly Establishing Bidirectional Label Switch Paths Based on Single Trips of Control Packets
2016, 38(3): 707-712. doi: 10.11999/JEIT150754
Abstract:
Bidirectional Label Switch Paths (LSPs) are important parts of Multi-Protocol Label Switching- Transport Profile (MPLS-TP) networking technology. However, the existing algorithms of establishing bidirectional LSPs have redundancy in operation, contro...
Data Compression Algorithm Based on Sequence Correlation for WSN
ZHAI Shuang, QIAN Zhihong, LIU Xiaohui, SUN Dayang
2016, 38(3): 713-719. doi: 10.11999/JEIT150280
Abstract:
The data has correlations and redundancy in Wireless Sensor Network (WSN). How to reduce effectively the amount of communication data and extend the network life cycle is one of researching hot points. The Two-Step data Compression algorithm based on...
A Distributed Algorithm for Constructing 1-barrier Coverage
2016, 38(3): 720-727. doi: 10.11999/JEIT150664
Abstract:
The constructing cost and lifetime are two core problems when constructing a barrier coverage of Wireless Sensor Network (WSN). For the former, the amount of nodes and information transferred are considered very much. And the WSN shutdown Caused by j...
Research on Virtual Network Embedding Across Multiple Domains
2016, 38(3): 728-734. doi: 10.11999/JEIT150656
Abstract:
Virtual network embedding is researched across multiple domains under network virtualization environment. A hierarchical virtual resource provisioning architecture with centralized management and distributed control is proposed. On this basis, an eff...
Some Progresses of Chaotic Cipher and Its Applications in Multimedia Secure Communications
YU Simin, Lü Jinhu, LI Chengqing
2016, 38(3): 735-752. doi: 10.11999/JEIT151356
Abstract:
This paper reviews the past situation and existing problems in chaotic cipher theories and applications, and reports the recent progress of some issues on theoretical design and hardware implementation of ciphers based on high-dimensional chaos syste...
Positioning Performance Evaluation for Passive Radar Network and Experimental Verification
XIE Rui, WAN Xianrong, FANG Gao, YI Jianxin, CHENG Feng
2016, 38(3): 753-757. doi: 10.11999/JEIT150733
Abstract:
Detection performance of Passive Radar Network (PRN) is affected by many factors including network geometry, radio propagation environment, performance of system, signal and data processing capability, and so on. Optimized disposition with passive ra...
Cramr-Rao Bound for Near-field Source Localization
BAO Tao, ZHOU Deyun, LI Lixin, HU Chufeng
2016, 38(3): 758-762. doi: 10.11999/JEIT150578
Abstract:
In view of the existing CRB (Cramr-Rao Bound) for near-field single source is based on the uniform linear array, and analyzes less fully the CRB's characteristics and the influence factors of specific. In this paper, non-matrix, closed-form expressio...