Advanced Search

2016 Vol. 38, No. 8

Display Method:
Energy-efficiency Aware Probabilistic Caching Scheme for Content-centric Networks
LUO Xi, AN Ying, WANG Jianxin, LIU Yao
2016, 38(8): 1843-1849. doi: 10.11999/JEIT151244
Abstract:
In-network caching is one of the key technologies of Content-Centric Networking (CCN), which is widely concerned recently. However, most existing works are targeted for optimizing network resource utilization, and the energy consumption aspect is lar...
Link Failure Recovery Algorithm Based on Multiple Backup Paths with QoS Constraint
CUI Wenyan, MENG Xiangru, YANG Huanhuan, LI Jizhen, CHEN Tianping, KANG Qiaoyan
2016, 38(8): 1850-1857. doi: 10.11999/JEIT151230
Abstract:
Recovery of link failure is not only the issue of selecting a connected backup path, but the QoS requirement in the process of failure recovery of the network service should be also taken into account. The probabilistically correlated failure model a...
Mobile Target Localization Algorithm Using Compressive Sensing in Wireless Sensor Networks
SUN Baoming, GUO Yan, LI Ning, QIAN Peng
2016, 38(8): 1858-1864. doi: 10.11999/JEIT151203
Abstract:
Traditional mobile target localization algorithms are not suitable for wireless sensor networks as they need to collect, store, and process a mass of data. To address this issue, a mobile target localization algorithm based on compressive sensing is ...
Protocol Ciphertext Field Identification by Entropy Estimating
ZHU Yuna, HAN Jihong, YUAN Lin, GU Wen, FAN Yudan
2016, 38(8): 1865-1871. doi: 10.11999/JEIT151205
Abstract:
Previous network-trace-based methods only consider the plaintext format of payload data, and are not suitable for security protocols which include a large number of ciphertext data; therefore, a novel approach named CFIA (Ciphertext Field Identificat...
Efficient Range Matching Method Based on Bloom Filter and Ternary Content Addressable Memory
DAI Zibin, LIU Hangtian
2016, 38(8): 1872-1879. doi: 10.11999/JEIT151264
Abstract:
An efficient range matching method based on Bloom Filter algorithm and Ternary Content Addressable Memory (BF-TCAM) technology is proposed to resolve the problem that there generally exit low memory using ratio and high power dissipation in current T...
An Efficient Dynamic Resource Allocation Strategy with Grey Prediction in Hybrid Multiplex Passive Optical Network
WANG Ruyan, JIANG Jing, XIONG Yu, TANG Jianbo
2016, 38(8): 1880-1887. doi: 10.11999/JEIT151201
Abstract:
With the access distance of users increasing in hybrid Time and Wavelength Division Multiplexing Passive Optical Networks (TWDM-PONs), the round trip time becomes very long, and idle time is increased in the network. It leads to the problem of bandwi...
Multiuser Detection Scheme for SCMA Systems Based on Serial Strategy
DU Yang, DONG Binhong, WANG Xianjun, DANG Guanbin, GAO Pengyu
2016, 38(8): 1888-1893. doi: 10.11999/JEIT151259
Abstract:
Sparse Code Multiple Access (SCMA) is a promising air-interface technology for 5 G wireless communication networks, which can enable massive connectivity. The existing multiuser detection schemes are based on a parallel message updating for Message P...
Improved Transient Performance Analysis Algorithm of Multichannel S-ALOHA and Its Applications
JIAN Xin, ZENG Xiaoping, TAN Xiaoheng, TIAN Mi, MIAO Lijuan
2016, 38(8): 1894-1900. doi: 10.11999/JEIT151207
Abstract:
Concurrent data transmission from massive Machine Type Communications (MTC) devices makes the traffic pattern of MTC more bursty, which invalidates the commonly-used methodologies of traffic engineering for multichannel S-ALOHA under the assumption o...
Dynamic Pilot Allocation in Massive MIMO System
FANG Xin, ZHANG Jianfeng, CAO Haiyan, LIU Chao, PAN Peng
2016, 38(8): 1901-1907. doi: 10.11999/JEIT151091
Abstract:
A dynamic pilot allocation scheme is proposed in case of the pilot contamination existing in massive MIMO system. Based on the signal to interference difference between the aim cell user and the interference cell user, the interference cell is divide...
Precoding Scheme for Up-link Multi-user MIMO System with Imperfect Channel State Information
CHEN Xiaomin, ZHU Yimin, SU Junxu, ZHU Qiuming, HU Xujun
2016, 38(8): 1908-1912. doi: 10.11999/JEIT151161
Abstract:
This paper investigates transceiver design for dual-hop up-link multi-user Multiple-Input Multiple- Output (MIMO) system with Amplify-and-Forward (AF) relay to improve the performance of Bit Error Ratio (BER) under the imperfect Channel State Informa...
Secrecy Performance Analysis of MIMO Decode-and-forward Relay Systems in Nakagami Channels
ZHAO Rui, LIN Hongxin, HE Yucheng, PENG Shengliang, ZHOU Lin
2016, 38(8): 1913-1919. doi: 10.11999/JEIT151236
Abstract:
The physical layer security performances of low-complexity opportunistic transmission strategy based on multiple antenna are investigated for cooperative adaptive decode-and-forward relaying system in Nakagami-m fading channels. To fully utilize the ...
Compressed Sensing Estimation of Underwater Acoustic MIMO Channels Based on Temporal Joint Sparse Recovery
ZHOU Yuehai, WU Yanyi, CHEN Dongsheng, TONG Feng
2016, 38(8): 1920-1927. doi: 10.11999/JEIT151158
Abstract:
Multiple-Input-Multiple-Output (MIMO) under water acoustic communication is capable of improving the channel capacity in extremely limited bandwidth. However, the performance of traditional channel estimation algorithms, such as Least Squares (LS) me...
Rebound Attack on the Feistel-SPS Structure
DONG Le, ZOU Jian, WU Wenling, DU Jiao
2016, 38(8): 1928-1934. doi: 10.11999/JEIT151255
Abstract:
This paper shows the rebound attack on the Feistel-SPS structure, which has the Feistel network with a Substitution-Permutation-Substitution (SPS) round function. A 6-round known-key truncated differential distinguisher is obtained by studying the di...
Access Control Method for Supporting Update Operations in Dataspace
PAN Ying, YUAN Chang'an, LI Wenjing, CHENG Maohua
2016, 38(8): 1935-1941. doi: 10.11999/JEIT151212
Abstract:
Dataspace is a new type of data management, which can manage the mass, heterogeneous, and dynamic data in a pay-as-you-go fashion. However, it is difficult to construct an effective access control mechanism in dataspace environment, because of the da...
A Robust Colored-loading Factor Optimization Approach for KA-STAP
ZHANG Shengmiao, HE Zishu, LI Jun, ZHAO Xiang
2016, 38(8): 1942-1949. doi: 10.11999/JEIT151335
Abstract:
In colored-loading Knowledge Aided STAP (KA-STAP) techniques, the colored-loading factor should be determined according to the performance of the a priori information. The existing Pre-Whitening (PW) colored-loading factor optimization method can not...
Compact Sensing Matrix Pursuit Algorithm for Radars with High Resolution
LIU Jing, SHENG Mingxing, SONG Dawei, SHANG She, HAN Chongzhao
2016, 38(8): 1950-1955. doi: 10.11999/JEIT151135
Abstract:
In this paper, a novel algorithm named Compact Sensing Matrix Pursuit (CSMP) is proposed to deal with the high coherence problem encountered in the compressed sensing based radar system with high resolution. The CSMP algorithm is applied to the two d...
Extraction Method for Anisotropy Characteristic of Scattering Center in Wide-angle SAR Imagery
GAO Yuexin, LI Zhenyu, SHENG Jialian, XING Mengdao
2016, 38(8): 1956-1961. doi: 10.11999/JEIT151261
Abstract:
Based on the fact that anisotropy characteristic represents some intrinsic properties of scattering centers, an algorithm for extracting anisotropy characteristic of scattering centers is proposed when wide-angle SAR is used. Firstly, the components ...
Translation Motion High Accuracy Compensation for Procession Ballistic Target in Midcourse
HE Sisan, ZHAO Huining, ZHANG Yongshun
2016, 38(8): 1962-1968. doi: 10.11999/JEIT151231
Abstract:
To compensate the translation motion of precession ballistic targets, the characters of translation and precession are analyzed and it is found out that the precession has the center symmetry character. Using this character, a method based on conjuga...
Coherent Detection Based on Texture Structure in Compound-Gaussian Clutter
SHI Sainan, SHUI Penglang, LIU Ming
2016, 38(8): 1969-1976. doi: 10.11999/JEIT151194
Abstract:
Traditional adaptive detectors are mostly derived under the assumption of independent and identically distributed texture. However, the texture correlation along the range cell exists in real sea clutter datasets. A new coherent detector based on tex...
Design of Dual-band Dual-polarized Spaceborne Precipitation Radar Antenna
FANG Gang, ZHANG Yumei
2016, 38(8): 1977-1983. doi: 10.11999/JEIT160016
Abstract:
In order to achieve the matched beams goal of the dual-band dual-polarized spaceborne precipitation radar, the solution that a shared aperture feeding array illuminates the parabolic cylindrical reflector is proposed. The shared aperture feeding arra...
Spoofing Mitigation Method for Navigation Receiver Based on Cross Correlation and Projection
WANG Chun, ZHANG Linrang
2016, 38(8): 1984-1990. doi: 10.11999/JEIT151139
Abstract:
Since spoofing send similar navigation satellites C/A code, this kind of interferences can lead to the receiver misled easily, receiver will provide a wrong location information. Considering both navigation signal and spoofing with same navigation si...
Phase Retrieval Algorithm Based on Cartoon-texture Model
LIAN Qiusheng, ZHAO Xiaorui, SHI Baoshun, CHEN Shuzhen
2016, 38(8): 1991-1998. doi: 10.11999/JEIT151156
Abstract:
Phase retrieval is an issue that tries to recover an image from its Fourier magnitude measurements. Since the Fourier magnitude measurements contain less information, the traditional phase retrieval algorithms can not reconstruct the image efficientl...
Non-local Means Image Denoising with Multi-stage Residual Filtering
SUN Weifeng, DAI Yongshou
2016, 38(8): 1999-2006. doi: 10.11999/JEIT151227
Abstract:
In order to sufficiently exploit the image information residing in the residual image for boosting the denoising performance of the Non-local Means (NLM) algorithm, a novel multi-stage residual filtering method is proposed. Firstly, the Non-Local Mea...
A Novel Generalized Correntropy Based Method for Direction of Arrival Estimation in Symmetric Alpha Stable Noise Environments
WANG Peng, QIU Tianshuang, REN Fuquan, LI Jingchun, TAN Haifeng
2016, 38(8): 2007-2013. doi: 10.11999/JEIT151217
Abstract:
To overcome the limitation that the alpha stable distributed variable possesses infinite second-order moment, a novel generalized correntropy is defined and the bounded property of the generalized correntropy for the symmetric alpha stable variable i...
Improved Double Constraint Robust Capon Beamforming Algorithm
LI Lixin, BAI Tongtong, ZHANG Huisheng, BAO Tao, SHEN Libin
2016, 38(8): 2014-2019. doi: 10.11999/JEIT151213
Abstract:
Traditional double constraint robust Capon beamforming algorithm uses Newton iterative method for solving the optimal loading, presenting the problems of low accuracy and large amount of computation. An improved Double Constraint Robust Capon Beamfor...
A New Voice and Noise Activity Detection Algorithm and Its Applicationto Dual Microphone Noise Suppression System for Handset
ZHANG Luofei, ZHANG Ming, LI Chen
2016, 38(8): 2020-2026. doi: 10.11999/JEIT151302
Abstract:
Existing dual microphone Voice Activity Detection (VAD) algorithms use normally a fixed threshold. The fixed threshold can not provide an accurate VAD under various noise environments. In such case, it causes voice quality degradation, particularly i...
Object Optimization Tracking via PLS Representation and Stochastic Gradient
JIN Guangzhi, SHI Linsuo, LIU Hao, MU Weijie, CAI Yanping
2016, 38(8): 2027-2032. doi: 10.11999/JEIT151082
Abstract:
In order to improve the stability and accuracy of the object tracking under nonlinear conditions, an object tracking algorithm based on Partial Least Squares (PLS) representation and stochastic gradient object optimization tracking is proposed. In th...
Activity Mining for Airport Event Logs Based on RankClus Algorithm
XU Tao, MENG Ye, LU Min
2016, 38(8): 2033-2039. doi: 10.11999/JEIT151137
Abstract:
Process mining is a technology which can extract non-trivial and useful information from airport event logs. However, the airport event logs are always on a detailed level of abstraction, which may not be in line with the expected abstract level of a...
A Method of Spatial Place Representation Based on Biological Place Cells Firing
LI Weilong, WU Dewei, ZHOU Yang, DU Jia
2016, 38(8): 2040-2046. doi: 10.11999/JEIT151331
Abstract:
In order to realize intelligent and autonomous navigation of vehicles, a method of spatial place representation based on biological place cells firing is proposed. A relationship is built that the spatial location of vehicle is corresponding with the...
Constrained Multi-objective Optimization Algorithm with Adaptive Truncation Strategy
BI Xiaojun, ZHANG Lei
2016, 38(8): 2047-2053. doi: 10.11999/JEIT151237
Abstract:
To improve distribution and convergence of the obtained solution set in constrained multi-objective optimization problems, this paper presents a constrained multi-objective optimization algorithm based on adaptive truncation strategy. Firstly, throug...
Multi-view TSK Fuzzy System via Collaborative Learning
CHENG Yang, GU Xiaoqing, JIANG Yizhang, HANG Wenlong, QIAN Pengjiang, WANG Shitong
2016, 38(8): 2054-2061. doi: 10.11999/JEIT151209
Abstract:
Conventional fuzzy system modeling methods essentially belong to the single-view learning modality. In multi-view-oriented data scenarios, they can only cope with each view separately, which is prone to incurring their unsatisfactory generalization p...
Adaptive Generalized Combination Complex Synchronization and Parameter Identification of Hyperchaotic Complex Systems
WANG Shibing, WANG Xingyuan
2016, 38(8): 2062-2067. doi: 10.11999/JEIT160101
Abstract:
Based on adaptive control and Lyapunov stability theory, a novel adaptive Generalized Combination Complex Synchronization (GCCS) scheme is proposed for nonidentical hyperchaotic complex systems with unknown parameters. Firstly, the definition of GCCS...
Image Retrieval Based on Deep Convolutional NeuralNetworks and Binary Hashing Learning
PENG Tianqiang, LI Fang
2016, 38(8): 2068-2075. doi: 10.11999/JEIT151346
Abstract:
With the increasing amount of image data, the image retrieval methods have several drawbacks, such as the low expression ability of visual feature, high dimension of feature, low precision of image retrieval and so on. To solve these problems, a lear...
Transfer Affinity Propagation Clustering Algorithm Based on Kullback-Leiber Distance
BI Anqi, WANG Shitong
2016, 38(8): 2076-2084. doi: 10.11999/JEIT151132
Abstract:
For solving the clustering problem of transfer learning, a new algorithm called Transfer Affinity Propagation clustering algorithm is proposed based on Kullback-Leiber distance (TAP_KL). Based on the probabilistic framework, a new interpretation of t...
Moment Invariants Based on Two Dimensional Non-separable Wavelet Transform
LIU Bin, GAO Qiang
2016, 38(8): 2085-2090. doi: 10.11999/JEIT151218
Abstract:
Searching for wavelet invariants is a key issue in multiresolution analysis. On the other hand,the method of moment invariants is fully developed both in the theory and the practice. A kind of wavelet moment invariants are given based on the image in...
Provable Secure for the Lightweight RFID Ownership Transfer Protocol
CHEN Xiuqing, CAO Tianjie, ZHAI Jingxuan
2016, 38(8): 2091-2098. doi: 10.11999/JEIT151049
Abstract:
In order to implement the wisdom city planning and build perfect wisdom network, it is important to design the security Radio Frequency IDentification (RFID) protocol. A secure RFID ownership transfer protocol should be evaluated in terms of the secu...
Stochastic Logics with Two-dimensional State Transfer Structure and Its Application in the Artificial Neural Network
JI Yuan, CHEN Wendong, RAN Feng, ZHANG Jinyi, David LILJA
2016, 38(8): 2099-2106. doi: 10.11999/JEIT151233
Abstract:
Stochastic computing is a special algorithm that performs mathematical operations with probabilistic values of bit streams rather than traditional deterministic values. The main advantage of stochastic computing is its great simplicity of hardware ar...
Modified GA-FFT for Synthesizing Shaped Pattern of Unequally Spaced Array in Presence of Mutual Coupling
YOU Pengfei, LIU Yanhui, HUANG Xin, ZHU Chunhui, LIU Qinghuo
2016, 38(8): 2107-2112. doi: 10.11999/JEIT151189
Abstract:
A new Virtual Least-Square Active Element Pattern Expansion (VLS-AEPE) method is presented in this paper, which considers each active element pattern of an unequally spaced array as the one radiated by some of equally spaced elements of a virtual arr...
Propagation Mechanism of Single Event Transient and Soft Error Rate Analysis Method Based on Four-value Pulse Parameters Model
LI Yue, CAI Gang, LI Tianwen, YANG Haigang
2016, 38(8): 2113-2121. doi: 10.11999/JEIT151254
Abstract:
With the shrinking of feature size, soft errors due to Single Event Transient (SET) effect become the main reliability threat for aerospace deep sub-micron VLSI circuits, and the generation and propagation of SET pulse is also a hot issue in the stud...
A -100 dB Power Supply Rejection Ratio Non-bandgap Voltage Reference
HUANG Guocheng, YIN Tao, ZHU Yuanming, XU Xiaodong, ZHANG Yachao, YANG Haigang
2016, 38(8): 2122-2128. doi: 10.11999/JEIT151256
Abstract:
This paper presents a non-bandgap voltage reference, which contains a pre-regulated circuit with a super source follower. The pre-regulated circuit includes a super source follower, which attenuates the impedance from the supply of the core reference...