Advanced Search

2017 Vol. 39, No. 2

Display Method:
Double Clonal Selection Algorithm Based on Fuzzy Non-genetic Information Memory
SONG Dan, FAN Xiaoping, WEN Zhonghua, HUANG Dazu, QU Xilong
2017, 39(2): 255-262. doi: 10.11999/JEIT160359
Abstract:
To provide a better solution for search efficiency reduction problem caused by pseudo collision in the traditional intelligent optimization algorithms, this paper proposes a double clonal selection algorithm based on fuzzy non-genetic information mem...
Scene Adaptive Road Segmentation Algorithm Based on Deep Convolutional Neural Network
WANG Hai, CAI Yingfeng, JIA Yunyi, CHEN Long, JIANG Haobin
2017, 39(2): 263-269. doi: 10.11999/JEIT160329
Abstract:
The existed machine learning based road segmentation algorithms maintain obvious shortage that the detection effect decreases dramatically when the distribution of training samples and the scene target samples does not match. Focusing on this issue, ...
Image Classification Based on Fisher Constraint and Dictionary Pair
GUO Jichang, ZHANG Fan, WANG Nan
2017, 39(2): 270-277. doi: 10.11999/JEIT160296
Abstract:
Classification method based on sparse representation has won wide attention because of its simplicity and effectiveness, while how to adaptively build the relationship between dictionary atoms and class labels is still an important open question, at ...
Large Scale Spectral Clustering Based on Fast Landmark Sampling
YE Mao, LIU Wenfen
2017, 39(2): 278-284. doi: 10.11999/JEIT160260
Abstract:
The applicability of traditional spectral clustering is limited by its high complexity in large-scale data sets. Through construction of affinity matrix between landmark points and data points, the Landmark-based Spectral Clustering (LSC) algorithm c...
Acceleration Performance Study of Convolutional Neural Network Based on Split-radix-2/(2a) FFT Algorithms
WU Jiasong, DA Zhen, WEI Liming, SENHADJI Lotfi, SHU Huazhong
2017, 39(2): 285-292. doi: 10.11999/JEIT160357
Abstract:
Convolution Neural Networks (CNN) make breakthrough progress in many areas recently, such as speech recognition and image recognition. A limiting factor for use of CNN in large-scale application is, until recently, their computational expense, especi...
Study on Stochastic Resonance Algorithm Based on Bayes Criterion
LIU Shujun, YANG Ting, TANG Mingchun, WANG Pin, LI Yongming
2017, 39(2): 293-300. doi: 10.11999/JEIT160361
Abstract:
The optimal noise that minimizes Bayes risk for a binary hypothesis testing problem is analyzed firstly. As a result, the minimization of Bayes risk can be equivalent as the optimization of the detection probability and/or false alarm probability . S...
Robust Adaptive Beamforming Algorithm for Conformal Arrays Based on Sparse Reconstruction
CHEN Pei, ZHAO Yongjun, LIU Chengcheng
2017, 39(2): 301-308. doi: 10.11999/JEIT160436
Abstract:
Adaptive beamforming techniques for conformal arrays suffer from poor universality, difficulty to maintain the main beam and high computational cost. A novel robust adaptive beamforming algorithm for conformal arrays based on sparse reconstruction is...
Adapted Stopping Residue Error Based Sparse Representation for Speech Denoising
ZHOU Weili, HE Qianhua, WANG Yalou, PANG Wenfeng
2017, 39(2): 309-315. doi: 10.11999/JEIT160369
Abstract:
A sparse representation speech denoising method based on adapted stopping residue error is proposed. Firstly, an over complete dictionary of the clean speech power spectrum is learned by the K-Singular Value Decomposition (K-SVD) algorithm. In the sp...
Accurate Performance and Associated Influence Factors for Pulse Wave Velocity Measurement of Carotid Arteries Based on Ultrasonic Transit Time Method
DENG Li, ZHANG Yufeng, YANG Lichun, HU Xiao, LI Zhiyao, GAO Lian, ZHANG Junhua
2017, 39(2): 316-321. doi: 10.11999/JEIT160306
Abstract:
The estimation accuracy of the wall displacement, delay time, and linear-regression-based Pulse Wave Velocity (PWV) affected by different scanning frame rates and beam density is investigated quantitatively in the measurement of the regional PWV with...
Landing Point Location Algorithm Without Velocity Measurement in Target Range
LI Pengyu, CHE Lufeng, ZHENG Chunlei
2017, 39(2): 322-327. doi: 10.11999/JEIT160316
Abstract:
To overcome the large errors and complexity of measuring the wave velocity of landing point location algorithm in target range, a method based on poisoning algorithm without velocity measurement is proposed. Nine accelerate sensors constitute pozidri...
Construction of Gaussian Integer Sequence Sets with Zero Correlation Zone Based on Interleaving Technique
LIU Kai, JIANG Kun
2017, 39(2): 328-334. doi: 10.11999/JEIT160276
Abstract:
A new method of construction of shift sequence sets is proposed, and based on these shift sequences, a new class of Gaussian integer sequence sets with period 2N which can choose Zero Correlation Zone (ZCZ) length flexibly is obtained by interleaving...
High-speed Synchronous Backhaul Method with Aggregation of Multiple WiFi Channels
XUE Qing, FANG Xuming
2017, 39(2): 335-341. doi: 10.11999/JEIT160375
Abstract:
As the substantial growth of data traffic over the past few years, the deployment of cellular base stations tends to be smaller and denser which puts forward higher requirements for backhaul techniques. In this study, WiFi is taken as a backhaul tech...
Robust Secure Transmit Methods for Multibeam Satellite Communication with Imperfect Channel State Information
WANG Shu, DA Xinyu
2017, 39(2): 342-350. doi: 10.11999/JEIT160429
Abstract:
Considering a general eavesdropping case where the eavesdropper is equipped with multiple antennas and two uncertainty models for the imperfect Channel State Information (CSI) on the main and eavesdroppers channels at the transmitter. Two robust tran...
Lossless Compression Algorithm Based on String Matching with HighPerformance and Low Complexity for Screen Content Coding
LIN Tao, CAI Wenting, CHEN Xianyi, ZHOU Kailun, WANG Shuhui
2017, 39(2): 351-359. doi: 10.11999/JEIT160560
Abstract:
Traditional lossless compression algorithms are not efficient for screen content coding. To take the full advantage of special characteristics of screen content, a lossless compression algorithm based on String Matching with High Performance and Low ...
Carrier-less Position/Phase Modulation forVisible Light Communications
WU Nan, WANG Xudong, YAO Kaili, GAI Xindong, HE Rongxi
2017, 39(2): 360-366. doi: 10.11999/JEIT160343
Abstract:
In order to guarantee that Visible Light Communication (VLC) can provide both high-speed and low energy consumption data transmission services. A modulation named by Carrier-less Position/Phase (CPP) based on Pulse Position Modulation (PPM) is propos...
Benders Decomposition Based Cooperative Energy-saving Mechanism in Wireless Networks
ZHENG Fei, LI Wenjing, YU Peng, FENG Lei, MENG Luoming
2017, 39(2): 367-373. doi: 10.11999/JEIT160387
Abstract:
To reduce the energy consumption in wireless access networks, a Cooperative Energy-Saving Mechanism based on Benders Decomposition (BD-CESM) is presented to solve inadequate coverage problem caused by BS dormancy by means of cooperative BS selection ...
Data Link Bit Stream Oriented Association Analysis on Unknown Frame
XUE Kaiping, LIU Bin, WANG Jinsong, LI Wei, XUE Yingjie
2017, 39(2): 374-380. doi: 10.11999/JEIT160289
Abstract:
In the electronic countermeasure, the opponents bit stream can be captured. However, without any knowledge about the type of data link protocol, the existing protocol analyzing tools can not analyze the useful information from the bit stream. To furt...
Distributed Denial of Service Attack Detection Based on Object Character in Software Defined Network
YAO Linyuan, DONG Ping, ZHANG Hongke
2017, 39(2): 381-388. doi: 10.11999/JEIT160370
Abstract:
During the Distributed Denial of Service (DDoS) attack happening in Software Defined Network (SDN) network, the attackers send a large number of data packets. Large quantities of new terminal identifiers are generated. Accordingly, the network connec...
Multi-sever Multi-keyword Searchable Encryption Scheme Based on Cloud Storage
HUANG Haiping, DU Jianpeng, DAI Hua, WANG Ruchuan
2017, 39(2): 389-396. doi: 10.11999/JEIT160338
Abstract:
In the searchable encryption services provided by cloud severs, data owners expect that their data files can be partitioned and stored to multiple cloud severs with the form of ciphertext, so as to improve the searching efficiency of authorized users...
Dynamic Defense for DDoS Attack Using OpenFlow-based Switch Shuffling Approach
WU Zehui, WEI Qiang, REN Kailei, WANG Qingxian
2017, 39(2): 397-404. doi: 10.11999/JEIT160449
Abstract:
The limitations of network resource and the dispersion of network management are the two major difficulties for traditional networks to address the Distributed Denial of Service (DDoS) attacks. However, current defense methods are static and hysteres...
Bulk-FFBP: Fast Factorized Back-projection Algorithm Based on Range Bulk Processing
TANG Jiangwen, DENG Yunkai, WANG Robert, LI Ning
2017, 39(2): 405-411. doi: 10.11999/JEIT160373
Abstract:
Block Fast Factorized Back-Projection (Block-FFBP) algorithm adopts a subaperture synthesis approach to reduce the computing complexity of the conventional BP algorithm, and partitions the echo data into blocks in range to avoid the complicated trans...
Widening Efficacious Parameter Estimation Range of Multi-look Pareto Distribution
HU Chong, LUO Feng, ZHANG Linrang, FAN Yifei, CHEN Shuailin
2017, 39(2): 412-416. doi: 10.11999/JEIT160307
Abstract:
The method for estimating the parameters of multi-look Pareto distribution based onzln(z) can not estimate the shape parameter less than 1. To overcome the drawback, it is generalized byzrln(z), which widens the efficacious range for shape parameter ...
Direct Position Determination Using Asynchronous Observations of Multiple Moving Sensors
FENG Qi, QU Changwen, ZHOU Qiang
2017, 39(2): 417-422. doi: 10.11999/JEIT160314
Abstract:
A Direct Position Determination (DPD) algorithm based on spatial spectrum analysis for the issue of asynchronous observation in the multiple moving sensors passive fusion location system is proposed. At first, a direct determination mathematical mode...
Research on Multiple Phase Sectionalized Modulation Jamming Method for Inverse Synthetic Aperture Radar
YU Daobin, WU Yanhong, WANG Hongyan, JIA Xin
2017, 39(2): 423-429. doi: 10.11999/JEIT160397
Abstract:
The problem of ISAR image jamming is the main stream in radar countermeasures study. This paper proposes a new jamming technique for ISAR imaging based on Multiple Phase Sectionalized Modulation (MPSM) jamming method. Its basic principle and processi...
SAR Image Registration Using SAR-FAST Corner Detection
LIU Yan, YU Huai, YANG Wen, LI Li
2017, 39(2): 430-436. doi: 10.11999/JEIT160386
Abstract:
As the basis of change detection and image fusion, SAR image registration plays an important role in the interpretation of multi-temporal SAR images. This paper presents a method of SAR image registration based on corner detection using SAR-FAST, whi...
Signal Model and High-resolution Imaging Approach for Distributed SAR Based on LFMCW Signals
LI Kun, LIANG Xingdong, CHEN Longyong, WANG Jie, WU Yirong
2017, 39(2): 437-443. doi: 10.11999/JEIT160274
Abstract:
Distributed micro-satellites SAR has the capabilities of substantially miniaturizing the size and lowering the cost of space-borne SAR systems. However, one of the key issues is to take full advantage of the distributed resources and achieve high-res...
Image Mosaic Algorithm Based on Improved BRISK
DONG Qiang, LIU Jinghong, WANG Chao, ZHOU Qianfei
2017, 39(2): 444-450. doi: 10.11999/JEIT160324
Abstract:
In order to obtain accurate aerial stitching images, this paper proposes a novel image mosaic method based on Binary Robust Invariant Scalable Keypoints (BRISK) feature of directed line segment, aiming to resolve incident scaling, rotation, changes i...
Unambiguous General Acquisition for Binary Offset Carrier and Its Derivative Signals
ZHANG Tianqi, JIANG Xiaolei, ZHAO Juntao, WANG Junxia
2017, 39(2): 451-458. doi: 10.11999/JEIT160351
Abstract:
For the unambiguous general acquisition for Binary Offset Carrier (BOC) and its derivative signals is still scarce of analysis, a new unambiguous algorithm is proposed for all types of BOC signals and all kinds of modulation order. Firstly, the commo...
Attitude Determination Algorithm Based on Antenna Configuration
CUI Jianhua, CHENG Naiping
2017, 39(2): 459-465. doi: 10.11999/JEIT160347
Abstract:
In order to solve the problem of high computational complexity of the ambiguity in attitude measurement, a new attitude measurement method based on antenna configuration is proposed. In a certain range of measurement error, the antenna array for atti...
Characteristics of Lightning Electromagnetic Fields from Oblique Lightning Channel Considering Vertical Stratified Ground
WANG Xiaojia, CHEN Yazhou, WAN Haojiang, WANG Lipeng
2017, 39(2): 466-473. doi: 10.11999/JEIT160326
Abstract:
The electromagnetic fields from oblique lightning channel are studied by using FDTD and considering the effects of vertical layered ground conductivity and lightning channel tilt angle. The calculation results show that the initial peak values of lig...
Micro-strip Predistortion Circuit for Millimeter-wave Travelling Wave Tube
YU Chongzhi, HU Boxiong, TANG Kangsong, WANG Gang, SU Xiaobao
2017, 39(2): 474-481. doi: 10.11999/JEIT160395
Abstract:
With the development of communication technology, investigating predistortion circuit for Travelling Wave Tube (TWT) becomes more and more important. This paper analyzes the principle of nonlinearity generator based on the schottky diodes and the eff...
Application of LCLC Resonant Converters for Space Travelling-wave Tube Amplifiers
ZHAO Bin, WANG Gang, WANG Donglei, CHEN Yu, BI Lei
2017, 39(2): 482-488. doi: 10.11999/JEIT160334
Abstract:
The application of LCLC resonant converters for space Travelling-Wave Tube Amplifiers (TWTAs) is investigated in this paper. Based on the working principles under Zero Current Switching (ZCS) and Zero Voltage Switching (ZVS), the equivalent circuit o...
Quantum Bits Phase Based Representation and Application for Color Images
LI Panchi, CAO Ziqi
2017, 39(2): 489-493. doi: 10.11999/JEIT160303
Abstract:
To address the problem of the description and encryption of color images on the quantum computer, a new method based on the phase rotation of qubit is proposed. Firstly, the color image is described as a quantum superposition state by mapping the pix...
Time Reversal Imaging Algorithm Based on Signal-subspaceVectors from the Spatial-frequency Decomposition
ZHONG Xuanming, LI Junye, LIAO Cheng
2017, 39(2): 494-498. doi: 10.11999/JEIT160272
Abstract:
Basing on the signal-subspace vectors from the spatial-frequency decomposition, a novel time-reversal imaging algorithm is proposed. Using the backscattered data recorded by the antenna array, a spatial-frequency multistatic matrix is set up. Singula...
Body Biasing Linearization Technique for Wireless Body Area Network Transmitter
LIU Yang, YANG Yintang, LI Di, SHI Zuochen
2017, 39(2): 499-503. doi: 10.11999/JEIT160297
Abstract:
A body biasing linearization technique is proposed to shape output spectrum mask to meet the stringent specification of the Human Body Communication (HBC) standard for Wireless Body Area Network (WBAN). Body biasing of the buffer transistors is prope...
Study on Influence of Electric Power Conductor Circuits on Traveling Wave Tube Amplifier Phase Stability
DONG Ge, HU Boxiong, XIAO Xi
2017, 39(2): 504-508. doi: 10.11999/JEIT160876
Abstract:
Traveling Wave Tube Amplifier (TWTA) is used extensively in the fields of radars and communication. And its phase stability could exert influence upon the quality of transmission signals, the detection accuracy of target parameters and the electromag...