Advanced Search

2016 Vol. 38, No. 9

Display Method:
FANG Binxing
2016, 38(9): 2129-2129.
Abstract:
Review of Social Marketing Performance Maximization Problem and Its Extension
LIU Yezheng, LI Lingfei, JIANG Yuanchun
2016, 38(9): 2130-2140. doi: 10.11999/JEIT160517
Abstract:
Many enterprises try to promote their products in online social network since information propagation in this network have several advantages such as fast transmission speed, low marketing costs, and large influence area. However, it is a challenging...
Research on Online Group Classification Based on the Response Function of Social System
LIU Jiaqi, QI Jiayin
2016, 38(9): 2141-2149. doi: 10.11999/JEIT160515
Abstract:
Devoted to enriching the research system of online group, and laying the foundation for exploring deep scientific problem in the future, this paper discusses the definition of online group, online topic, common classification methods, and primarily i...
A Group Recommendation Framework Based on Social Network Community
LIU Yu, WU Bin, ZENG Xuelin, ZHANG Yunlei, WANG Bai
2016, 38(9): 2150-2157. doi: 10.11999/JEIT160544
Abstract:
Group recommendation confronts two major problems, i.e., unambiguous definition and identification of groups and efficient recommendation to users in groups. To tackle the two problems, a group recommendation framework based on social network communi...
The Method of Trajectory Privacy Preserving Based on Agent Forwarding Mechanism in Mobile Social Networks
2016, 38(9): 2158-2164. doi: 10.11999/JEIT151136
Abstract:
The trajectory K-anonymous is the mainstream of the current trajectory privacy protection, but the method has some defects such as privacy leakage. In this paper, a method of trajectory privacy preserving is proposed Based on Agent Forwarding Mechani...
A Novel Friends Matching Privacy Preserving Strategy in Mobile Social Networks
LUO Entao, WANG Guojun
2016, 38(9): 2165-2172. doi: 10.11999/JEIT151479
Abstract:
In mobile social networks, people can quickly find potential friends with the same attributes by sharing personal attribute profile. These attribute profiles, however, usually contain sensitive information, if this information gets intercepted by mal...
The Method of Location Privacy Protection Based on Grid Identifier Matching
ZHANG Shaobo, LIU Qin, WANG Guojun
2016, 38(9): 2173-2179. doi: 10.11999/JEIT160350
Abstract:
The model based on fully-trusted third party is a major model for location privacy protection in location-based services, but the model has some risk of exposing privacy. In this paper, a location privacy protection method based on Grid Identifier Ma...
Information Coupling of Local Topology Promoting the Network Evolution
LIU Shuxin, JI Xinsheng, LIU Caixia, TANG Hongbo, GONG Xiaorui
2016, 38(9): 2180-2187. doi: 10.11999/JEIT151338
Abstract:
To study the effects of information coupling of local topology on the complex network evolution, a new weighted method is proposed based on local topology information, which can measure the closeness of connection and the coupling degree of topology ...
A Dynamic Request Scheduling Algorithm Based on Allocation Matrix in Multi-core Web Server
YOU Guohua, CHEN Junjun, ZHAO Ying
2016, 38(9): 2188-2193. doi: 10.11999/JEIT151328
Abstract:
To implement the high performance web server, it is a key to exploit fully the performance of multi-core CPUs in web servers. Traditional First Come First Served (FCFS) policy does not consider the characteristic of multi-core processors, and could n...
Node Status Aware Distributed Cooperative CachingMechanism for Opportunistic Networks
WANG Ruyan, YANG Huiping, YING Jun, SHU Na
2016, 38(9): 2194-2201. doi: 10.11999/JEIT151374
Abstract:
By reasonably exploiting the collaborative relationships between nodes and the limited cache resources of neighbor nodes, the cache utilization rate and the message delivery probability of opportunistic networks can be effectively improved. A node st...
The Inhibition and Clearup of the Mobile Worm in Wireless Sensor Networks
WANG Tian, WU Qun, WEN Sheng, CAI Yiqiao, TIAN Hui, CHEN Yonghong
2016, 38(9): 2202-2207. doi: 10.11999/JEIT151311
Abstract:
The network performance of WSNs (Wireless Sensor Networks) can be improved significantly by injecting mobile elements. However, the infection process of worm will be greatly accelerated once the mobile element has been captured and become the new inf...
Firefly-inspired Synchronicity Algorithm Based on Multi Granularity Phase
HAO Chuangbo, SONG Ping, YANG Cheng, WU Jiangpeng
2016, 38(9): 2208-2214. doi: 10.11999/JEIT151395
Abstract:
Considering that conventional distributed synchronicity algorithm may lead to a state of partial synchronization separately with small couple coefficient or unsteadiness with large couple coefficient, a multi granularity firefly-inspired synchronicit...
Location Optimization of Antenna Based on the Capacity and Transmit Interference Pre-nulling in Full-duplex
WU Fei, SHAO Shihai, TANG Youxi
2016, 38(9): 2215-2220. doi: 10.11999/JEIT151385
Abstract:
Considering the line-of-sight path interference cancellation in Co-time and Co-frequency Full-Duplex (CCFD), the pre-nulling technique of transceiver is usually used. However, this method forms a subsidence zone of signal power for the remote receive...
Multiple Antenna Channel Estimation Technology in Complex Electromagnetic Environment
HU Su, GUO Huiting, WU Gang
2016, 38(9): 2221-2226. doi: 10.11999/JEIT151316
Abstract:
For channel estimation technology of multiple antenna communication system based on cognitive radio architecture, traditional zero correlation zone sequences (which assume the availability of the entire spectral band) can not be used because their or...
Novel Design of Linear Full-duplex MIMO Radios
ZHANG Zhiliang, SHEN Ying, SHAO Shihai, PAN Wensheng, TANG Youxi
2016, 38(9): 2227-2232. doi: 10.11999/JEIT151363
Abstract:
Considering the issues of nonlinearity and self-interference in transmitting and receiving channels of a full-duplex MIMO radio respectively, a novel low hardware cost and low software complexity design scheme with transmitting channels linearization...
Secrecy Rate Optimization for Single Antenna Two-hop Relay System in Energy-saving-then-transmitting Mode
LEI Weijia, YANG Xiaoyan, JIANG Xue, XIE Xianzhong
2016, 38(9): 2233-2240. doi: 10.11999/JEIJ151371
Abstract:
A physical layer security transmission protocol in a two-hop relay system is studied. All nodes are equipped with an antenna and have the ability of energy harvesting. There are direct links between the source node and the eavesdropper as well as the...
A Robust Interference Alignment Algorithm Based on Maximizing the Rayleigh Entropy
XIE Xianzhong, LI Dan, ZHANG Senlin, LEI Weijia
2016, 38(9): 2241-2247. doi: 10.11999/JEIT160103
Abstract:
Interference alignment has the advantage of eliminating interference, but it needs the perfect Channel State Information (CSI) which is difficult to achieve in practical systems. The advantages and disadvantages of robust interference alignment algor...
Cooperative Cognitive Transmission Scheme Based on Adaptive Multi-dimensional Resource Allocation
LI Zhao, LI Yiwen
2016, 38(9): 2248-2254. doi: 10.11999/JEIT151286
Abstract:
A transmission mechanism based on the joint management of time, frequency and space domain resources is proposed in the Cooperative Cognitive Radio Network (CCRN), with which the cooperative cognitive users can obtain proper reward under the premise ...
Reduced Constellation Equalization Algorithm for Sparse Multipath Channels Based on Sparse Bayesian Learning
ZHANG Kai, YU Hongyi, HU Yunpeng, SHEN Zhixiang
2016, 38(9): 2255-2260. doi: 10.11999/JEIT151307
Abstract:
This paper deals with blind equalization of sparse multipath channels. A linear model is built under the framework of Reduced Constellation Algorithm (RCA). And the inherent sparse nature of the equalizer is exploited by employing a sparse promoting ...
Optimization Survivable Multipath Provisioning Based on Multi-objectives Genetic Algorithm for Elastic Optical Networks
LIU Huanlin, LI Ruiyan, KONG Deqian, CHEN Yong
2016, 38(9): 2261-2267. doi: 10.11999/JEIT151384
Abstract:
Multipath provisioning algorithm outperforms single-path provisioning algorithm in terms of bandwidth blocking probability. However, multipath transmission causes the differential delay among different paths and affects the usage of spectrum resource...
An Efficient LDPC Encoder Scheme with Low-power Low-parallel
YAN Wei, XUE Changbin
2016, 38(9): 2268-2273. doi: 10.11999/JEIT151362
Abstract:
Low-density parity-check code is the one of error-correction codes most approaching Shannon limit, which is adopted as a standard for channel coding by many international communication standard organizations. CCSDS recommends LDPC as channel coding s...
New Ensemble of Time-invariant LDPC Convolutional Codes with High Performance
MU Liwei, LIU Xingcheng, ZHANG Han
2016, 38(9): 2274-2279. doi: 10.11999/JEIT151376
Abstract:
In this paper, a new ensemble of the polynomial matrix of a time-invariant LDPC convolutional code is proposed. Based on the method of deriving time-invariant LDPC convolutional codes from QC (Quasi-Cyclic)- LDPC block codes, the elements over finite...
Proactive Threshold RSA Signature Scheme Based on Polynomial Secret Sharing
XU Fu
2016, 38(9): 2280-2286. doi: 10.11999/JEIT151164
Abstract:
All the existing provable secure proactive threshold RSA signature schemes rely on additive secret sharing, in which all players have to cooperate to produce a signature, valid players secret shares may be exposed, and the computing efficiency is too...
A Lattice-based Signcryption Scheme Without Trapdoors
LU Xiuhua, WEN Qiaoyan, WANG Licheng, DU Jiao
2016, 38(9): 2287-2293. doi: 10.11999/JEIT151044
Abstract:
The existing lattice-based signcryption schemes are based on trapdoor generation algorithm and preimage sample algorithm. However, both algorithms are complex, require a lot of time to run, and affect the efficiency of latticed-based signcryption sch...
Secure Multi-party Computation of Spatial Relationship and Its Application
ZHANG Weiguo, SUN Man, CHEN Zhenhua, CHEN Wei
2016, 38(9): 2294-2300. doi: 10.11999/JEIT160102
Abstract:
Privacy-preserving determination of spatial relationship belongs to spatial geometry problem in secure multiparty computation, which is significant to confidential business, engineering, military, etc. However, most existing schemes transform the ori...
ISAR Imaging of Targets with Complex Motion Based on the Modified Fast Bilinear Parameter Estimation
Lü Qian, SU Tao
2016, 38(9): 2301-2308. doi: 10.11999/JEIT151359
Abstract:
In view of image defocus caused by Doppler frequency shift in ISAR imaging of targets with complex motion, this paper characterizes the azimuth echoes as Cubic Phase Signal (CPS) and proposes an ISAR imaging algorithm for targets with complex motion ...
Low-angle Estimation Method via Sparse Bayesian Learning
ZHANG Yongshun, GE Qichao, DING Shanshan, GUO Yiduo
2016, 38(9): 2309-2313. doi: 10.11999/JEIT151319
Abstract:
In order to improve the accuracy of low-angle estimation in meter-wave radars, combined with sparse Bayesian learning, this paper makes use of the Kronecker product and the similarity of the sparse structure between adjacent snapshots to transform th...
Improved Local Linear Regression Estimator and Its Application to Estimation for Radar Altimeter Sea State Bias
JIANG Maofei, XU Ke, LIU Yalong, WANG Lei
2016, 38(9): 2314-2320. doi: 10.11999/JEIT151280
Abstract:
The Local Linear Regression (LLR) estimator is usually used when developing a nonparametric model for radar altimeter Sea State Bias (SSB). However, the conventional LLR estimator contains matrices with high dimension. When a large number of data are...
Feature Extraction of Hyperspectral Image Using Semi-supervised Sparse Manifold Embedding
LUO Fulin, HUANG Hong, LIU Jiamin, FENG Hailiang
2016, 38(9): 2321-2329. doi: 10.11999/JEIT151340
Abstract:
Hyperspectral image contains the properties of much bands and high redundancy, and the research of hyperspectral image classification focuses on feature extraction. To overcome this problem, a Semi-Supervised Sparse Manifold Embedding (S3ME) algorith...
Fast and High Precision Multi-target Positioning via Imaging Strategy
ZHANG Xiaoling, YU Lei, WU Xiliang, HE Shufeng
2016, 38(9): 2330-2335. doi: 10.11999/JEIT151315
Abstract:
The association between multiple targets and echo data is the main problem for multi-target location method, which causes huge calculation and the problem of extracting the targets accurately. The location method based on Bistatic Range Space Project...
Single-observer Passive DOA-TDOA Location Based on Regularized Constrained Total Least Squares
ZHAO Yongjun, ZHAO Yongsheng, ZHAO Chuang
2016, 38(9): 2336-2343. doi: 10.11999/JEIT151379
Abstract:
To solve the single-observer passive location estimation using illuminators of opportunity, a jointing Direction Of Arrival (DOA) and Time Difference Of Arrival (TDOA) location method based on Regularized Constrained Total Least Squares (RCTLS) algor...
Joint GNSS Interference Mitigation Approach for Jamming and Spoofing Based on Multi-antenna Array
WANG Lu, WU Renbiao, WANG Wenyi, LU Dan, JIA Qiongqiong
2016, 38(9): 2344-2350. doi: 10.11999/JEIT151295
Abstract:
Jamming and spoofing are the most common and serious threat intentional interferences for Global Navigation Satellite?System (GNSS). A joint GNSS interference mitigation approach is proposed for jamming and spoofing issue based on multi-antenna array...
Optimal Allocation of Shared Aperture in Radar-communication Integrated System Based on Pareto Optimality
SHI Changan, LIU Yimin, WANG Xiqin, YU Peng
2016, 38(9): 2351-2357. doi: 10.11999/JEIT151377
Abstract:
In this work, considering a radar-communication integrated radio frequency system, a dynamic allocation method of shared aperture using relevant environmental information is proposed. Firstly, the shared aperture allocation task is formulated as a Mu...
Lung Segmentation Method Based on 3D Region Growing Method and Improved Convex Hull Algorithm
DAI Shuangfeng, Lü Ke, ZHAI Rui, DONG Jiyang
2016, 38(9): 2358-2364. doi: 10.11999/JEIT151365
Abstract:
The accuracy of lung segmented results is important in actual clinical application. However, all kinds of segmentation methods can not be uniform for all the chest CT (Computed Tomography) images because of the irregularities and diversity of lung di...
Image Quality Assessment Based on Non-localHigh Dimensional Feature Analysis
DING Yong, LI Nan
2016, 38(9): 2365-2370. doi: 10.11999/JEIT151430
Abstract:
Traditionally, low dimensional features for partial information are extracted to analyze image quality. Though high dimensional features are difficult to be analyzed, they contain more information to fully analyze image quality. On this condition, th...
DOA Estimation Based on the Improved Direct Data Domain Method with One Sample
XIE Hu, DANG Hongxing, TAN Xiaomin, FENG Dazheng
2016, 38(9): 2371-2376. doi: 10.11999/JEIT151398
Abstract:
Many of the high-resolution Direction Of Arrival (DOA) estimation methods fail to estimate the DOAs of incoming signals and distinguish the two close signals under small sample support; especially only one snapshot is available. To handle this proble...
Online Estimation Algorithm of 2D-DOA and Frequency Tracking for Multiple Frequency-hopping Signals
ZHANG Dongwei, GUO Ying, ZHANG Kunfeng, QI Zisen, HAN Lifeng, SHANG Yaobo
2016, 38(9): 2377-2384. doi: 10.11999/JEIT151170
Abstract:
In order to extract Frequency-Hopping (FH) communication parameters and provide the necessary information for the communication countermeasure, an online estimation algorithm of 2D-DOA and frequency tracking for multiple FH signals is proposed in thi...
Novel Method for Designing Near-perfect-reconstruction Nonuniform Cosine Modulated Filter Banks
JIANG Junzheng, JIANG Qing, OUYANG Shan
2016, 38(9): 2385-2390. doi: 10.11999/JEIT151260
Abstract:
This paper proposes a new algorithm to design near-perfect-reconstruction nonuniform Cosine modulated filter banks. Due to the infeasibility of directly controlling the performance of Nonuniform Filter Banks (NUFBs) in the existing combined algorithm...
Design of Glitch Physical Unclonable Functions Circuit Based on Signal Transmission Theory
ZHANG Yuejun, WANG Pengjun, LI Gang, QIAN Haoyu
2016, 38(9): 2391-2396. doi: 10.11999/JEIT151312
Abstract:
In this paper, a Glitch-PUF circuit technique is proposed by taking into consideration various aspects i.e. the signal transmission theory, race and hazard phenomenon, and Physical Unclonable Functions (PUF). First and foremost, the glitch circuit is...
An Input Crossbar Optimisation Method for And-inverter Cone Based FPGA
HUANG Zhihong, LI Wei, YANG Liqun, JIANG Zhenghong, WEI Xing, LIN Yu, YANG Haigang
2016, 38(9): 2397-2404. doi: 10.11999/JEIT151216
Abstract:
In order to break through the bottleneck of the huge cluster area in AIC (And-Inverter Cone) architecture based FPGA, the research on the optimisation of the input crossbar architecture is carried on. A post-pack netlist statistics method is creative...
Higher-order Markov Random Fields Defogging Based on Color Lines
BI Duyan, SUI Ping, HE Linyuan, MA Shiping
2016, 38(9): 2405-2409. doi: 10.11999/JEIT151308
Abstract:
Compared with the first-order Markov random fields, higher-order Markov random fields could incorporate more statistical priors, thus have much expressive power of modeling. And the defogged images which based on dark channel prior have much error in...
An Ultra-high-speed Fully-parallel Fast Fourier Transform Design
CHEN Jienan, FEI Chao, YUAN Jiansheng, ZENG Weiqi, LU Hao, HU Jianhao
2016, 38(9): 2410-2414. doi: 10.11999/JEIT160036
Abstract:
The design and implementation of ultra-high-speed FFT processor is imperative in radar system and prospective wireless communication system. In this paper, the fully-parallel-architecture FFT with bit-serial arithmetic is proposed. This method avoids...