Advanced Search

2016 Vol. 38, No. 4

Display Method:
Theory on the Structure and Coloring of Maximal Planar Graphs (1)Recursion Formula of Chromatic Polynomial and FourColor Conjecture
XU Jin
2016, 38(4): 763-779. doi: 10.11999/JEIT160072
Abstract:
In this paper, two recursion formulae of chromatic polynomial of a maximal planar graph G are obtained: when δ(G)=4, let Wν4 be a 4-wheel of G with wheel-center ν and wheel-cycle ν1ν2ν3ν4ν1, then $f(G,4)=f((G,4)\...
TCP Congestion Control Algorithm for Heterogeneous Networks
WANG Zhiming, ZENG Xiaoping, LIU Xue, CHEN Li, GUO Bowen
2016, 38(4): 780-786. doi: 10.11999/JEIT150774
Abstract:
The end-to-end bandwidth, the Round Trip Time (RTT) and the packet loss rate vary over many orders of magnitude in Internet, which cause significant performance degradation of Transmission Control Protocol (TCP). To cope with this, a path-adaptive TC...
Distributed Storage Strategy Based on LT Codes in Space Information Network
KONG Bo, ZHANG Gengxin, ZHANG Wei, CHENG Lei
2016, 38(4): 787-794. doi: 10.11999/JEIT150674
Abstract:
To solve the limited storage resource and the data storage reliability problem of Space Information Network (SIN), a novel Distributed Storage Strategy based on Luby Transform (LT) codes (DSSLT) is proposed. According to the proposed strategy, source...
Minimum Vertex Covering and Feedback Vertex Set-based Algorithm for Influence Maximization in Social Network
XU Yuguang, PAN Jingzhi, XIE Huiyang
2016, 38(4): 795-802. doi: 10.11999/IEIT160019
Abstract:
Influence maximization is an optimization issue of finding a subset of nodes under a given diffusion model, which can maximize the spread of influence. This optimization issue has been proved to be NP-hard. Leveraging the fact that vertices in minimu...
Incentive Adaptive Trust Model Based on Integrated Intuitionistic Fuzzy Information
XU Jun, ZHONG Yuansheng, WAN Shuping
2016, 38(4): 803-810. doi: 10.11999/JEIT150750
Abstract:
Existing trust models can not effectively express the uncertainty of trust relationship and deal with such issues as dishonest feedbacks and strategic frauds from malicious entities in the distributed network, an adaptive trust model based on aggrega...
Credible Nearest Neighbor Query in Uncertain Network
GUO Changyou, ZHENG Xuefeng, GAO Xiulian
2016, 38(4): 811-818. doi: 10.11999/JEIT150748
Abstract:
Uncertain factors are a common phenomenon in the real world; therefore, it is very meaningful to study on the trusted neighbor query under uncertain network conditions. This paper puts forwards a new solution. The uncertain network is modeled as unce...
Integral and Zero-correlation Linear Cryptanalysis of Lightweight Block Cipher MIBS
YI Wentan, LU Linzhen, CHEN Shaozhen
2016, 38(4): 819-826. doi: 10.11999/JEIT150498
Abstract:
MIBS is a light weight block cipher for constrained resources environments such as RFID tags and sensor networks. This paper investigates the construction of zero-correlation linear approximations of 8-round MIBS and presents an attack on 13-round MI...
Performance Model of Multicore Crypto Processor Based on Amdahls Law
FENG Xiao, DAI Zibin, LI Wei, CAI Luting
2016, 38(4): 827-833. doi: 10.11999/JEIT150474
Abstract:
This paper builds a performance model of multicore processor, which applies to the crypto algorithms, and some advisable suggestions and academic supports are given for its design. By introducing parallelism degree, transformation overhead and synchr...
Novel Audio Information Hiding Algorithm Based on Wavelet Transform
WU Qiuling, WU Meng
2016, 38(4): 834-840. doi: 10.11999/JEIT150856
Abstract:
In view of the small hiding capacity, low concealment and poor robustness of the audio carrier, a novel audio information hiding algorithm is proposed based on wavelet transform. The algorithm regulates the high-frequency wavelet coefficients in ever...
Green Communications Based on Physical-layer Security for Amplify-and-forward Relay Networks
WANG Dong, LI Yongcheng, BAI Bo, WANG Manxi
2016, 38(4): 841-847. doi: 10.11999/JEIT150695
Abstract:
In this paper, a green communication scheme based on physical layer security is addressed considering the energy and secrecy constraints. This scheme maximizes the secure Energy Efficiency (EE) of the network by power allocation subject to the maximu...
Impossible Differential Cryptanalysis on 13-round MIBS-80
FU Lishi, JIN Chenhui
2016, 38(4): 848-855. doi: 10.11999/JEIT150673
Abstract:
This paper presents the 13-round impossible differential cryptanalysis on MIBS-80 for the first time. Firstly, this paper filters the plaintexts based on the impossible differentia of S-box in MIBS-80. Secondly, by taking advantage of the restrict re...
Base Station Selection Algorithm for Distributed Massive MIMO System over Rician Fading Channels
LI Yongzhi, TAO Cheng, LIU Liu, LU Yanping, LIU Kai
2016, 38(4): 856-862. doi: 10.11999/JEIT150811
Abstract:
The Base Station (BS) selection for distributed massive MIMO system is studied. The channels between the BSs and the users are assumed to be Rician fading. First the closed-form expressions of downlink achievable rates for Matched-Filter (MF) and Zer...
Communication Modulation Recognition Based on Multi-fractal Dimension Characteristics
CHEN Hong, CAI Xiaoxia, XU Yun, LIU Wentao
2016, 38(4): 863-869. doi: 10.11999/JEIT150703
Abstract:
A new modulation recognition algorithm of digital communication signals based on the multi-fractal dimension characteristics is proposed. Employing preprocessing the received signal, the generalized dimension and the multi-fractal spectrum can be cal...
Directional Modulation Signal Synthesis Algorithm Based on the Phase Beam-forming
HONG Tao
2016, 38(4): 870-876. doi: 10.11999/JEIT150463
Abstract:
Directional Modulation (DM) technique is a hot research area for physical layer security communication in recent years. The baseband modulation signal is synthesized at the antenna level for transmitting different signal constellations at different d...
Noncoherent Multiple Symbol Detection for Continuous Phase Modulation in Physical-layer Network Coding
DANG Xiaoyu, LIU Zhaotong, LI Baolong, LI Qiang
2016, 38(4): 877-884. doi: 10.11999/JEIT150671
Abstract:
Physical-layer Network Coding (PNC) with Continuous Phase Modulation (CPM) attractes much attention due to its high efficiency in the throughput and the spectrum. Most present research on the detection of CPM-PNC signals is based on the assumption th...
Iterative Block Decision Feedback Equalizer with Soft Detection for Underwater Acoustic Channels
JING Lianyou, HE Chengbing, ZHANG Lingling, MENG Qingwei, HUANG Jianguo, ZHANG Qunfei
2016, 38(4): 885-891. doi: 10.11999/JEIT150669
Abstract:
In single-carrier modulation system with frequency domain equalization, Decision Feedback Equalizer with a Hybrid time-frequency structure (H-DFE) is attractive for its performance; the complexity is also significant, especially for very dispersive c...
Spectrum-aware Traffic Split-Merge Resource Allocation Strategy for Elastic Optical Networks
LIU Huanlin, XU Yifan, CHEN Yong
2016, 38(4): 892-898. doi: 10.11999/JEIT150842
Abstract:
Traffic split provisioning scheme leads to extra guard band and equipment ports occupation, which decreases the spectrum utilization and increases the energy consumption for elastic optical networks. To address the problem, a spectrum-aware traffic s...
Jamming Resource Allocation via Improved Discrete Cuckoo Search Algorithm
LI Dongsheng, GAO Yang, YONG Aixia
2016, 38(4): 899-905. doi: 10.11999/JEIT150726
Abstract:
Jamming resource distribution of cooperative identification friend or foe via secondary radar is researched by introducing Discrete Cuckoo Search (DCS) algorithm. The jamming effect evaluation rules and indexes are given, and the aim function and dis...
Tolerance Analysis of Rotating Cross-eye Jamming Based on Angle Factor Specific Boundary Value
LIU Songyang, DONG Chunxi, ZHU Yingtong, ZHAO Guoqing, XU Jin
2016, 38(4): 906-912. doi: 10.11999/JEIT150903
Abstract:
In the case that the jammer platform rotates or is pointed in all different directions for radar detcting, the tolerance analysis is made between the conventional retrodirective cross-eye and the orthogonal four jamming elements. In the analysis proc...
Space Time Null Widening Method of Navigation Receiver in Missile for High Dynamic Conditions
ZHANG Baihua, MA Hongguang, SUN Xinli, TAN Qiaoying, PAN Hanjin
2016, 38(4): 913-918. doi: 10.11999/JEIT150654
Abstract:
According to the characteristic of navigation receiver in the missile, the anti-jamming model of high dynamic conditions is built. Taking into account the characteristic of interferences in high dynamic conditions and the shortcomings of traditional ...
SAR Accelerating Moving Target Parameter Estimation and Imaging Based on Three-order Polynomial Fourier Transform
ZHOU Hui, ZHAO Fengjun, YANG Jian
2016, 38(4): 919-926. doi: 10.11999/JEIT150679
Abstract:
This paper aims at the issue of accelerating moving target parameter estimation and imaging. The SAR echo spectrum of target with acceleration is calculated, and the necessity of estimation and compensation of the three-order moving target echo phase...
MIMO Radar Waveform Design for OFD-LFM with Various Frequency Steps
LI Hui, ZHAO Yongbo, FENG Dazheng, CHENG Zengfei
2016, 38(4): 927-933. doi: 10.11999/JEIT150814
Abstract:
Orthogonal Frequency Division-Linear Frequency Modulation (OFD-LFM) signal is widely used in Multiple Input Multiple Output (MIMO) radar systems. For solving the problems of the auto-correlation sidelobes of the spatial synthesized signals, an analys...
An Improved Matrix CFAR Detection Method Base on KL Divergence
ZHAO Xinggang, WANG Shouyong
2016, 38(4): 934-940. doi: 10.11999/JEIT150711
Abstract:
The matrix CFAR detector is proposed according to information geometry theory, but its constant false alarm property is not analysed, and the matrix CFARs detection performance still needs to be improved. Firstly, the matrix CFARs constant false alar...
Fast Factorized Back Projection Algorithm for Bistatic Forward-looking Low Frequency Ultra Wide Band SAR Imaging
FENG Dong, AN Daoxiang, XIE Hongtu, HUANG Xiaotao
2016, 38(4): 941-949. doi: 10.11999/JEIT150736
Abstract:
Bistatic forward looking low frequency Ultra Wide Band (UWB) Synthetic Aperture Radar (SAR) has both complicated imaging geometry and strong range-azimuth coupling, which increases the difficulty of high-precision imaging extremely. In order to solve...
Identifier for Radar Ground Target Based on Distribution of Space of Training Features
LI Long, LIU Zheng
2016, 38(4): 950-957. doi: 10.11999/JEIT150786
Abstract:
To identify the out-of-database targets in the process of radar ground target recognition with High Resolution Range Profile (HRRP), this paper proposes an improved radar ground target identifier based on the distribution of the space of training fea...
A New Region of Interest Coding Algorithm Based on JPEG2000 for Remote Sensing Images and Its VLSI Design
WANG Jianxin, ZHU En, LIU Wensong, QI Youjie
2016, 38(4): 958-963. doi: 10.11999/JEIT150812
Abstract:
To resolve the conflict between the amount of image data and the channel bandwidth, a Region Of Interest (ROI) coding method based on JPEG2000 is proposed in this paper. The mainstream methods for JPEG2000 ROI coding have a difficulty in balancing RO...
Investigation on THz Interferometer System Based onHigh Speed Digital Correlator
2016, 38(4): 964-969. doi: 10.11999/JEIT150841
Abstract:
As a conventional unit in interferometric imager, correlator has a wide range of applications to get visibility functions. THz imager has more and more applied to security check and military scouting area. To solve the phase synchronization problem i...
Interleaved Thinned Linear Arrays Based on Modified Iterative FFT Technique
LI Longjun, WANG Buhong, XIA Chunhe
2016, 38(4): 970-977. doi: 10.11999/JEIT 150749
Abstract:
Interleaved thinned arrays sharing aperture based on the aperture ratio of reuse is an effective way to realize airborne multifunction. A new method to interleave thinned linear arrays is proposed in this paper based on the modified Iterative Fast Fo...
Research on Recognition Method Based on Spectral Regression and Back Propagation Neural Network
WU Zhanjun, NIU Min, XU Bing, NIU Yanxiong, GENG Tianqi, ZHANG Fan, MAN Da
2016, 38(4): 978-984. doi: 10.11999/JEIT150781
Abstract:
When using Back Propagation (BP) neural network to recognize the spatial target, the high dimensional input features induce the complexity of the network structure and the poor performance of the recognition. In this paper, a new recognition method b...
v-Soft Margin Logistic Regression Classifier
HUANG Chengquan, WANG Shitong, JIANG Yizhang, DONG Aimei
2016, 38(4): 985-992. doi: 10.11999/JEIT150769
Abstract:
Coordinate Descent (CD) is a promising method for large scale pattern classification issues with straightforward operation and fast convergence speed. In this paper, inspired by v-soft margin Support Vector Machine (v-SVM) for pattern classification,...
Visual Tracking via Locality-sensitive Kernel Sparse Representation
HUANG Hongtu, BI Duyan, GAO Shan, ZHA Yufei, HOU Zhiqiang
2016, 38(4): 993-999. doi: 10.11999/JEIT150785
Abstract:
In order to solve the problem of lack of discriminability in thel1-norm constraint sparse representation, visual tracking via locality-sensitive kernel sparse representation is proposed. To improve the linear discriminable power, the candidates Scale...
Frequency Diverse Array Radar: Concept, Principle and Application
WANG Wenqin, SHAO Huaizong, CHEN Hui
2016, 38(4): 1000-1011. doi: 10.11999/JEIT151235
Abstract:
Frequency Diverse Array (FDA) radar is a new radar technique proposed in recent years. FDA uses a small frequency increments across its array elements to provide a range-dependent transmit beampattern, which overcomes the disadvantages of a phased-ar...
Low Radar Cross Section and Broadband Magneto-electric Dipole Patch Antenna
ZHANG Chen, CAO Xiangyu, GAO Jun, LI Sijia, HUANG He
2016, 38(4): 1012-1016. doi: 10.11999/JEIT150897
Abstract:
A low Radar Cross Section (RCS) and broadband Magneto-Electric (ME) dipole patch antenna from 7.81 GHz to 13.65 GHz covering the whole X band is designed and fabricated. Metal patches printed on the substrate form the electric dipoles, three metallic...