Advanced Search

2017 Vol. 39, No. 1

Display Method:
Optimal Energy-efficient Design for Two-hop Massive MIMO Relaying Systems with Multi-pair Users
WANG Yi, LIN Yan, HUANG Yongming, LI Chunguo, YANG Luxi
2017, 39(1): 1-8. doi: 10.11999/JEIT160245
Abstract:
The optimal system design based on maximizing the Energy Efficiency (EE) is investigated for the multi- pair massive Multiple-Input Multiple-Output (MIMO) relaying system. By virtue of the law of large numbers, an analytical expression of the involve...
Cross-layer Optimization Design of Energy Efficiency in HARQ Based Multihop Relay Networks
XIAO Bo, XI Yong, HAN Junmei, GE Songhu
2017, 39(1): 9-15. doi: 10.11999/JEIT160264
Abstract:
The cross-layer optimum scheme of Energy Efficiency (EE) for a multihop relay network with Chase- Combining based Hybrid Automatic Repeat reQuest (CC-HARQ) in Rayleigh fading channels is proposed. In order to maximize EE, a closed-form expression of ...
Energy-efficiency Optimization of Pilot Duration and Power Allocation for Downlink Massive MIMO FDD Systems
WANG Yi, LIN Yan, LI Chunguo, HUANG Yongming, YANG Luxi
2017, 39(1): 16-23. doi: 10.11999/JEIT160226
Abstract:
An energy-efficient resource allocation method is provided for the downlink massive Multiple-Input Multiple-Output (MIMO) Frequency Division Duplexing (FDD) system, which jointly evaluates the channel estimation stage and data transmission stage. The...
Auxiliary Symbol-based Nonlinear Self-interference Cancellation Algorithm and Simplified Implementation
WANG Dan, HUANG Kaizhi, LI Yunzhou
2017, 39(1): 24-30. doi: 10.11999/JEIT160291
Abstract:
In-band full duplex is a key concept brought up in 5G, and digital Self-Interference (SI) cancellation has become an important field attracting much attention. SI channel estimation error introduced by nonlinear distortion leads to deleterious effect...
Optimal Target Channel Selection Algorithm Based on Hybrid Spectrum Handoffs in Cognitive Radio Networks
MA Bin, BAO Xiaomin, XIE Xianzhong
2017, 39(1): 31-37. doi: 10.11999/JEIT160268
Abstract:
The predetermined target channel has high risk of being unavailable in the proactive-decision spectrum handoff. To solve this problem, an optimum target channel selection algorithm based on hybrid spectrum handoff is proposed. This algorithm coordina...
Resource Allocation for Heterogeneous Wireless Networks: A Robust Layered Game Learning Solutions
SHAO Hongxiang, ZHAO Hangsheng, SUN Youming, SUN Fenggang
2017, 39(1): 38-44. doi: 10.11999/JEIT160285
Abstract:
This paper investigates a resource allocation scheme in heterogeneous wireless small cell networks with imperfect Channel State Information (CSI). In this work, the math expression for the stochastic dynamic uncertainty in CSI is proposed for model a...
Target Localization Method Based on Parzen Window in Underwater Wireless Sensor Network
PANG Feifei, ZHANG Qunfei, SHI Wentao, HAN Jing, MENG Qingwei
2017, 39(1): 45-50. doi: 10.11999/JEIT160246
Abstract:
In Underwater Wireless Sensor Network (UWSN) the accuracy of target localization suffers from invalid anchors. To reduce the impact, an improved cross-bearing localization method is proposed based on the Parzen window. In this method, the probability...
Second-order Consensus Time Synchronization for Wireless Sensor Networks
HUANG Yourui, CHEN Zhenping, LI Dequan, TANG Chaoli, QU Liguo
2017, 39(1): 51-57. doi: 10.11999/JEIT160382
Abstract:
Since in wireless sensor networks, the joint of new nodes or the death of old nodes lead to a dynamic topology, this paper studies one completely distributed Second-Order Consensus Time Synchronization (SOCTS) algorithm. The clock feature of each nod...
Adaptive k Steganography Based on Dynamic Updating Distortion Cost
TANG Guangming, BIAN Yuan, WEI Dawei, GAO Zhanzhan, ZHU Yaozhen
2017, 39(1): 58-65. doi: 10.11999/JEIT160254
Abstract:
Adaptive steganography ignores the interactive impact introduced by the embedding operation during the embedding operation. Considering the cross impact of the embedding operation, an adaptive k steganography is put forward based on the dynamic disto...
X-Decaf : Detection of Cache File Leaks in Android Social Apps
LI Hui, WANG Bin, ZHANG Wen, TANG Qi, ZHANG Yanli
2017, 39(1): 66-74. doi: 10.11999/JEIT160555
Abstract:
Since social applications involve various types of information related to the user privacy, events of privacy leakage occur frequently along with their popular applications and few studies are available on the privacy leakage detection for social app...
Adaptive Peak-to-average Power Ratio Reduction Method for ProlateSpheroidal Wave Function Orthogonal Modulation Signal
WANG Hongxing, LU Faping, LIU Chuanhui, LIU Xiao
2017, 39(1): 75-81. doi: 10.11999/JEIT160139
Abstract:
A new companding transform based on-law companding schemes is proposed for the reduction of Peak-to-Average Power Ratio (PAPR) of Prolate Spheroidal Wave Function (PSWF) orthogonal modulation signal, which causes serious degradation in performance wh...
Estimation of Micro-motion Feature for Large Accelerated Target
LI Yanbing, ZHANG Xiwen, LI Fei, CHEN Daqing, GAO Hongwei
2017, 39(1): 82-87. doi: 10.11999/JEIT160261
Abstract:
In a certain observation time duration, the instantaneous frequency of motion target with large acceleration is ambiguous. This case is usually met in flexible-motion target with high velocity. If target has micro-motion, it will cause micro-Doppler ...
Target Detection Algorithm for Multistatic Radar with Registration Errors
HU Qinzhen, SU Hongtao, LIU Ziwei, ZHOU Shenghua, YANG Yang
2017, 39(1): 88-94. doi: 10.11999/JEIT160207
Abstract:
In a multistatic radar system, perfect registration is unavailable in practice even after a registration process. In this paper, a target detection problem for a distributed Multiple-Input Multiple-Output (MIMO) radar with registration errors is cons...
Differential SAR Tomography Imaging Based on Khatri-Rao Subspace and Block Compressive Sensing
WANG Aichun, XIANG Maosheng, WANG Bingnan
2017, 39(1): 95-102. doi: 10.11999/JEIT160222
Abstract:
While the use of differential SAR tomography based on Compressive Sensing (CS) makes it possible to reconstruct the four-dimensional information of an observed scene, the performance of the reconstruction decreases for a sparse and structural observe...
PolSAR Ship Detection Method Based on Multiple Polarimetric Scattering Mechanisms
WEN Wei, CAO Xuefei, ZHANG Xuefeng, CHEN Bo, WANG Yinghua, LIU Hongwei
2017, 39(1): 103-109. doi: 10.11999/JEIT160204
Abstract:
Considering the shortcoming of detection method based on polarimetric contrast enhanced with single polarimetric scattering mechanism, a PolSAR detection method based on multiple polarimetric mechanisms called Dirichlet Process mixture of Latent Vari...
Hybrid Phased-MIMO Radar with Non-monotone Increasing Frequency Offset for Target Tracking
WANG Yuxi, HUANG Guoce, LI Wei, WANG Yequn
2017, 39(1): 110-116. doi: 10.11999/JEIT160134
Abstract:
The traditional radar system can form an angle-dependent beam for target tracking, which is independent on the range of target and as a result can not make the transmit energy focus on the targets position. For this problem, a novel hybrid phased-MIM...
Unified Constrained Cascade Interactive Multi-model Filter and Its Application in Tracking of Manoeuvring Target
XIA Xiaohu, LIU Ming
2017, 39(1): 117-123. doi: 10.11999/JEIT160384
Abstract:
A novel unified cascade constrained interactive multi-model Kalman filter is put forward. The filter is composed of two cascade connected filters, a standard interactive-multiple-model and a unified constrained filter. The latter is effective for eve...
Design of Tapered-slot Antenna with Optimized End-fire Characteristics
WANG Youcheng, DONG Mingyu, ZHANG Feng, YE Shengbo, JI Yicai, FANG Guangyou, ZHANG Xiaojuan
2017, 39(1): 124-128. doi: 10.11999/JEIT160203
Abstract:
Based on optimized geometry structure of tapered slot antenna, an end-fire printed antenna is designed with rectangular-grooved and periodic structure. Its effects on the radiation pattern of antenna is studied and simulated. From 1 GHz to 3.5 GHz, t...
Motion Compensation Imaging Algorithm of TeraHertz Synthetic Aperture Radar
ZHANG Qunying, JIANG Zhaofeng, LI Chao, WU Shiyou, FANG Guangyou
2017, 39(1): 129-137. doi: 10.11999/JEIT160201
Abstract:
Theoretical analysis and engineering experience of SAR imaging shows that radar platforms motion error will affect the quality of the image if its amplitude is greater than sub wavelength. Compared with traditional SAR working in microwave frequency ...
Research on Repeater Jamming Against Distributed Multiple-radar System
ZHAO Shanshan, ZHANG Linrang, LI Qiang, LIU Jieyi
2017, 39(1): 138-143. doi: 10.11999/JEIT160118
Abstract:
As an effective category of deception jamming, repeater jamming generates range false targets appearing dispersedly by modulating and retransmitting intercepted radar signals. However, distributed multiple-radar system will reject the false targets o...
Fast Computation of Threshold Based on Multi-threshold Otsu Criterion
SHEN Xuanjing, LIU Xiang, CHEN Haipeng
2017, 39(1): 144-149. doi: 10.11999/JEIT160248
Abstract:
To resolve the problem of low efficiency which traditional multi-threshold Otsu existing in searching of optimal thresholds on the brute-force method, the thresholds properties of multi-threshold Otsu are analyzed, and the mathematical correspondence...
Word Similarity Measurement Based on Concept Primitive
CHI Zhejie, ZHANG Quan
2017, 39(1): 150-158. doi: 10.11999/JEIT160176
Abstract:
Word similarity measurement plays an important role in machine learning, information retrieval and many other fields. Regarding the concept primitive symbol system of Hierarchical network of concepts theory as semantic resource and comparing commonne...
Motif Discovery Algorithm for Multiple Attributes Uncertain Data Stream
WANG Ju, LIU Fuxian
2017, 39(1): 159-166. doi: 10.11999/JEIT160247
Abstract:
Algorithm of motif discovery for multiple attributes uncertain data stream is proposed on the basis of MEME (Multiple Expectation-maximization for Motif Elicitation), which consults the thought of sequential pattern discovery in bioinformatics to sol...
Affective Abstract Image Classification Based on Convolutional Sparse Autoencoders across Different Domains
FAN Yangyu, LI Zuhe, WANG Fengqin, MA Jiangtao
2017, 39(1): 167-175. doi: 10.11999/JEIT160241
Abstract:
To apply unsupervised feature learning to emotional semantic analysis for images in small sample size situations, convolutional sparse autoencoder based self-taught learning for domain adaption is adopted for affective classification of a small amoun...
Physiological Features Based Coordinate System for Multi-view Analysis in Mammograms
CAO Lin, CHEN Houjin, LI Jupeng, CHENG Lin
2017, 39(1): 176-182. doi: 10.11999/JEIT160193
Abstract:
A breast coordinate system based on physiological features is developed for multi-view analysis in mammograms. It is constructed according to the locations of nipple, pectoral muscle and the fitted breast boundary. The breast regions in mammograms ar...
Sound Event Recognition Based on Optimized Orthogonal Matching Pursuit
LI Ying, CHEN Qiuju
2017, 39(1): 183-190. doi: 10.11999/JEIT160120
Abstract:
A sound event recognition method based on optimized Orthogonal Matching Pursuit (OMP) is proposed for decreasing the influence of sound event recognition on various environments. Firstly, OMP is used for sparse decomposition and reconstruction of sou...
Hierarchical Classification-based Smartphone Displacement Free Activity Recognition
WANG Changhai, XU Yuwei, ZHANG Jianzhong
2017, 39(1): 191-197. doi: 10.11999/JEIT160253
Abstract:
Human activity recognition based on accelerometer embedded in smartphones is wildly applied to inertial positioning, personalized recommendation, daily exercise estimating and other fields. The low recognition rate which caused by varying phone displ...
Improved Grouping Genetic Algorithm for Solving Multiple Traveling Salesman Problem
WANG Yongzhen, CHEN Yan, YU Yingying
2017, 39(1): 198-205. doi: 10.11999/JEIT160211
Abstract:
In order to solve the total-path-shortest Multiple Traveling Salesman Problem (MTSP), an improved grouping genetic algorithm is proposed. This algorithm employs a new encoding scheme called ordered grouping encoding, which makes the adjusted individu...
Research of Reconfigurable Very Large Instruction Word on Cipher Stream Architecture
YAN Yingjian, WANG Shoucheng, XU Jinhui, CHEN Tao
2017, 39(1): 206-212. doi: 10.11999/JEIT160213
Abstract:
Reconfigurable cipher stream architecture is a newly proposed architecture for cipher processing, but poor Very Large Instruction Word (VLIW) code density and huge Kernel level code cubage are always serious problems on this architecture. Through ana...
Adaptive Voltage Scaling Technique for DC-DC Converter Based on Pulse Skip Modulation
WANG Dongjun, LUO Ping, PENG Xuanlin, ZHEN Shaowei, HE Yajuan
2017, 39(1): 213-220. doi: 10.11999/JEIT160283
Abstract:
In order to decrease energy consumption of digital circuits by reducing the supply voltage, an Adaptive Voltage Scaling (AVS) for DC-DC converter based on Pulse Skip Modulation (PSM) is proposed. The AVS technique can scale supply voltage adaptively ...
Special Type of Domino Extending-contracting Operations
LIU Xiaoqing, XU Jin
2017, 39(1): 221-230. doi: 10.11999/JEIT160886
Abstract:
In this paper, a new domino extending-contracting operation, called 334 extending-contracting operation, is put forward, on the basis of which, it is proposed to construct a particular kind of graphs, i.e., 334-type maximal planar graphs, and proved ...
Spoof Surface Plasmon Polariton and Its Applications to Microwave Frequencies
TANG Wenxuan, ZHANG Haochi, CUI Tiejun
2017, 39(1): 231-239. doi: 10.11999/JEIT160692
Abstract:
Spoof Surface Plasmon Polariton (SSPP), which possesses extraordinary ability of sub-wavelength- scaled field confinement, can be realized by an ultrathin corrugated metallic strip at microwave frequencies. Advantages of SSPP such as the high confine...
Binarization Method Based on Local Contrast Enhancement
LU Di, HUANG Xin, LIU Changyuan, LIN Xue, ZHANG Huayu, YAN Jun
2017, 39(1): 240-244. doi: 10.11999/JEIT160197
Abstract:
Binarization for degraded document images is a difficult point in image processing. This paper presents a new binarization method for the degraded document images by analyzing the differences of image grayscale contrast in different areas. Firstly, t...
FPGA-based Soft Error Sensitivity Analysis Method for Microprocessor
LIANG Huaguo, SUN Hongyun, SUN Jun, HUANG Zhengfeng, XU Xiumin, YI Maoxiang, OUYANG Yiming, LU Yingchun, YAN Aibin
2017, 39(1): 245-249. doi: 10.11999/JEIT160225
Abstract:
In order to quickly and automatically analyze the soft error sensitivity for microprocessors, a soft error sensitivity analysis method using FPGA-based fault injection is proposed. The fault and fault-free microprocessors on a FPGA are board run simu...
Anti-collision Algorithm of RFID System Based on Grouped Tag
GUO Zhenjun, SUN Yingfei
2017, 39(1): 250-254. doi: 10.11999/JEIT160186
Abstract:
Anti-collision algorithm is a key technique to improve identification efficiency in Radio Frequency IDentification (RFID) system. For this problem of the efficient identification and the large amount of data transmission, a group-based anti-collision...