Advanced Search

2017 Vol. 39, No. 5

Display Method:
Radar Micro-Doppler Signature Extraction and Detection via Short-time Sparse Time-frequency Distribution
CHEN Xiaolong, GUAN Jian, YU Xiaohan, HE You
2017, 39(5): 1017-1023. doi: 10.11999/JEIT161040
Abstract:
In order to effectively improve radar detection ability of moving target under the conditions of strong clutter and complex motion characteristics, the principle framework of Short-Time sparse Time-Frequency Distribution (ST-TFD) is established combi...
Time-varying Baseline Estimation Method for FMCW InSAR
FU Xikai, XIANG Maosheng, WANG Bingnan, JIANG Shuai, YANG Yu
2017, 39(5): 1024-1029. doi: 10.11999/JEIT160763
Abstract:
For airborne dual-antenna FMCW InSAR systems, the time-varying baseline can be considerably high due to its low flight height, atmospheric turbulence, location and attitude errors and low accuracy of MEMS IMU, seriously affecting the DEM accuracy. To...
Imaging Algorithm of Millimeter-wave LFMCW Radar for Water Surface Texture Detection
WEI Xiangfei, CHONG Jinsong, WANG Xiaoqing, LI Yuan, MENG Hui
2017, 39(5): 1030-1035. doi: 10.11999/JEIT160684
Abstract:
In the application of millimeter-wave Linear Frequency Modulated Continuous Wave (LFMCW) radar for water surface detection, the echo of water surface itself is always covered by the echo of stationary targets and noises, leading to the result that wa...
Robust Approach for Clutter Covariance Matrix Estimation with STAP in Heterogeneous Environment
XU Huajian, YANG Zhiwei, LIAO Guisheng, TIAN Min
2017, 39(5): 1036-1043. doi: 10.11999/JEIT160747
Abstract:
The conventional statistical Space-Time Adaptive Processing (STAP) methods, such as sample selection and sample weighting methods, and so forth, have a very low utilization ratio of sample data, which results in that the problem of training samples l...
Novel Channel Estimation of Reference Signal Reconstruction for DTMB-based Passive Radar
WAN Xianrong, CHENG Yiyao, YI Jianxin, ZHANG Xun
2017, 39(5): 1044-1050. doi: 10.11999/JEIT160796
Abstract:
The steady reference signal reconstruction is one of the key technologies of passive radar with digital waveform, and the accuracy of channel estimation is directly related to the reference signal purity. To deal with the problem of reference signal ...
Topography and Tree Height Estimation Based on the Best Normal Matrix Approximation for PolInSAR Coherence Region
SUN Ningxiao, WU Qiongzhi, Sun Lin
2017, 39(5): 1051-1057. doi: 10.11999/JEIT160774
Abstract:
The inversion of topography and tree height in forest area is one of the most important applications in the Polarimetric SAR Interferometry (PolInSAR). In this paper, the coherent region of the PolInSAR data is modeled and the best normal matrix is u...
Performance Analysis on Airship-borne Passive Radar Based on Conformal Sparse Array
ZHOU Jianwei, LI Daojing, TIAN He, PAN Jie, HU Xuan
2017, 39(5): 1058-1063. doi: 10.11999/JEIT160846
Abstract:
The application of conformal sparse array to airship-borne passive radar is studied, and the target detection performance of airship-borne passive radar is analyzed. Because of the importance of antenna in radar system, embattle method of sparse arra...
Improved ACM Algorithm for Poyang Lake Monitoring
LENG Ying, LIU Zhongling, ZHANG Heng, WANG Yu, LI Ning
2017, 39(5): 1064-1070. doi: 10.11999/JEIT160870
Abstract:
Sentinel-1 satellite constellation offers enough Synthetic Aperture Radar (SAR) images for long-term water monitoring, due to its relative large swath, great revisit frequency and high resolution. The middle and upper Yangtze River suffers serious fl...
Surpervised Segmentation Algorithm Based on GMM with Spatial Relationship for High Resolution Ranchromatic Remote Sensing Image
WANG Chunyan, XU Aigong, SUN Chuan, ZHAO Xuemei
2017, 39(5): 1071-1078. doi: 10.11999/JEIT160798
Abstract:
This paper proposes a supervised image segmentation algorithm for high resolution remote sensing images by introducing the Gaussian Mixture Model (GMM) with spatial relationship in order to solve the problem of the increasing dissimilarity in the sam...
Online Visual Tracking via Adaptive Deep Sparse Neural Network
HOU Zhiqiang, WANG Xin, YU Wangsheng, DAI Bo, JIN Zefenfen
2017, 39(5): 1079-1087. doi: 10.11999/JEIT160762
Abstract:
In visual tracking, the efficient and robust feature representation is the key factor to solve the problem of tracking drift in complex environments. Therefore, to solve the problems of the complex and time-consuming of the pre-training process of de...
Moving Hand Segmentation Based on Multi-cues
RUAN Xiaogang, LIN Jia, YU Naigong, ZHU Xiaoqing, OUATTARA Sie
2017, 39(5): 1088-1095. doi: 10.11999/JEIT160730
Abstract:
For moving hand segmentation, in order not to use unreasonable assumptions and to solve the hand-face occlusion, a segmentation method based on skin color, grayscale, depth and motion cues is proposed. Firstly, according to the variance information o...
Remote Sensing of Sea Ice Thickness with GNSS Reflected Signal
GAO Hongxing, YANG Dongkai, ZHANG Bo, WANG Qiang, WANG Feng
2017, 39(5): 1096-1100. doi: 10.11999/JEIT160765
Abstract:
To detect the sea ice in small-scale fixed sea area, a shore-based sea ice detecting method is developed using GNSS reflected signal. Firstly, the method needs to calculate the intensity ratio of GNSS satellite reflected signal and direct signal, whi...
Retinal Nerve Fiber Layer Segmentation of Spectral Domain Optical Coherence Tomography Images Based on Random Forest
CHEN Qiang, XU Jun, NIU Sijie
2017, 39(5): 1101-1108. doi: 10.11999/JEIT160663
Abstract:
Spectral Domain Optical Coherence Tomography (SD-OCT) imaging technique is widely used in the diagnosis of ophthalmology diseases. The segmentation of retinal layers plays a very important role in the diagnosis of glaucoma. In this paper, a random fo...
A Total Variational Approach Based on Meridian Norm for Restoring Noisy Images with Alpha-stable Noise
YANG Zhenzhen, YANG Zhen, LI Lei, JIN Zhengmeng
2017, 39(5): 1109-1115. doi: 10.11999/JEIT160657
Abstract:
In actual applications, noises may inevitably exist, and thus to study the denoising method for images is great significant task in image processing filed that attracts much attention in recent years. In this paper, based on the statistical property ...
Analytical Processing Method of Big Surveillance Video Data Based on Smart Monitoring Cameras
SHAO Zhenfeng, CAI Jiajun, WANG Zhongyuan, MA Zhaoting
2017, 39(5): 1116-1122. doi: 10.11999/JEIT160712
Abstract:
As an important part in the security and protection system of cities, smart monitoring cameras which are equipped with intelligent video analytics ability can monitor in different scenes and pre-alarm abnormal behaviors or events. Nevertheless, with ...
Improved FCM Clustering Algorithm Based on Spatial Correlation and Membership Smoothing
XIAO Mansheng, XIAO Zhe, WEN Zhicheng, ZHOU Liqian
2017, 39(5): 1123-1129. doi: 10.11999/JEIT160710
Abstract:
Concerning the problem that general Fuzzy C-Means (FCM) and its improved algorithm are sensitive to noise in the samples clustering and clustering boundary is not accurate enough, an improved FCM clustering algorithm based on spatial correlation is p...
Extracting Fuzzy Rules from the Maximum Ball Containing the Homogeneous Data
XU Mingliang, WANG Shitong
2017, 39(5): 1130-1135. doi: 10.11999/JEIT160779
Abstract:
In order to improve the interpretability and effectiveness of the fuzzy classifier rules, this paper presents a new method to extract the fuzzy rules based on the maximum ball only containing the homogeneous data. At first, every sample constructs a ...
An Improved HARQ Scheme with Polar Codes
ZHU Hongbin, DAI Shengchen, KANG Kai, QIAN Hua
2017, 39(5): 1136-1141. doi: 10.11999/JEIT160736
Abstract:
Hybrid Automatic Repeat reQuest (HARQ) scheme with polar codes is suitable for short packets applied to Internet of Things (IoT). Existing HARQ scheme with Chase Combing (HARQ-CC) provides combining gain without coding gain. The HARQ scheme with Incr...
Social Network Information Based Relay Selection and Power Allocation in D2D Communication Systems
XU Shaoyi, ZHANG Peng
2017, 39(5): 1142-1149. doi: 10.11999/JEIT160746
Abstract:
The combination of Device-to-Device (D2D) and social networks is one of the hot topics in the current and future communication industry. Cooperative communication is with characteristics of the high data rate and wide coverage range. In order to prom...
Energy-constrained Dynamic Scheduling and Dynamic Pricing Algorithm in Wireless Cloud Computing
PAN Su, Lü Pupu, CHEN Yuqing
2017, 39(5): 1150-1156. doi: 10.11999/JEIT160590
Abstract:
A novel energy-constrained joint dynamic scheduling and pricing algorithm in wireless cloud computing system is proposed. A Lyapunov function of energy constraints and traffic restrictions is constructed. The long-term profit optimization problem?wit...
DBSCAN Based Subspace Matching for Indoor Cellular Network Fingerprint Positioning Algorithm
TIAN Zengshan, WANG Xiangyong, ZHOU Mu, LI Lingxia
2017, 39(5): 1157-1163. doi: 10.11999/JEIT160768
Abstract:
For the sake of reducing the indoor localization errors caused by dynamic signal fading in cellular network, this paper propose a novel Density-Based Spatial Clustering of Applications with Noise (DBSCAN) based subspace matching algorithm for indoor ...
Lattice Reduction Aided Multiple Access Interference Cancellation Algorithm of Spread Spectrum Communication
BAO Yachuan, YU Baoguo
2017, 39(5): 1164-1169. doi: 10.11999/JEIT161104
Abstract:
In the application of spread spectrum communication with limited wireless resource, Multiple Access Interference (MAI) is the main restraint element of the multiple user service capability and communication performance. Focusing on the MAI problem, l...
Hierarchical Coordination Strategy for vEPC Virtual Network Embedding Based on Subgraph Isomorphism
LIU Caixia, LI Lingshu, TANG Hongbo, WANG Xiaolei, LU Ganqiang
2017, 39(5): 1170-1177. doi: 10.11999/JEIT160642
Abstract:
In 5G and the future mobile communication network, resource management and scheduling are the key issues to achieve efficient service deployment of virtual Evolved Packet Core (vEPC) nerwork. Service deployment in vEPC is based on Service Function Ch...
Multi-objective Sink Nodes Coverage Algorithm Based on Quantum Wolf Pack Evolution
JIN Shan, JIN Zhigang
2017, 39(5): 1178-1184. doi: 10.11999/JEIT160693
Abstract:
Satisfying non-repeated coverage, connectedness, and energy balance of sink layer are critical problems in multi-layers Wireless Sensor Networks (WSNs). They are overall planed as a Multi-objective Optimization Problem (MOP). For resolving it, the Qu...
Field-trimming Compression Model for Rule Set of Packet Classification
SUN Penghao, LAN Julong, LU Xiaoyuan, HU Yuxiang, MA Teng
2017, 39(5): 1185-1192. doi: 10.11999/JEIT160740
Abstract:
With the emergence of multi-field packet classification such as OpenFlow, the increasing number of match fields, continuous growth in bit-width of entries and ever growing scale of rule set all bring much pressure on the storage space in hardware. To...
Research on the Migration Queue of Data Centers Virtual Machine in Software Defined Networks
SHI Jiugen, XU Huiliang, LU Lipeng
2017, 39(5): 1193-1199. doi: 10.11999/JEIT160792
Abstract:
Virtual machine migration is one of the important features of the data center, which can effectively balance the workload of each infrastructure. In order to reduce the total time of virtual machine migration and impact on service performance, a Heur...
A Novel Adaptive Cross-layer Broadcasting Protocol NABP for Three-dimensional Flying Ad Hoc Networks
WANG Qingwen, QI Qian, CHENG Wei, LI Dong, WANG Li, LI Xuesong
2017, 39(5): 1200-1205. doi: 10.11999/JEIT160687
Abstract:
To alleviate the broadcast storm problem caused by blind flooding, a Novel Adaptive Broadcasting Protocol (NABP) for three-dimensional Flying Ad hoc NETworks (FANETs) is proposed. NABP adopts the cross-layer design, which lets routing layer share the...
Fine-grained Access Control with User Revocation in Cloud-based Personal Health Record System
LIU Qin, LIU Xuhui, HU Baishuang, ZHANG Shaobo
2017, 39(5): 1206-1212. doi: 10.11999/JEIT160621
Abstract:
With the development of cloud computing, more and more users employ cloud-based Personal Health Record (PHR) systems. The PHR is correlated with patient privacy, thus existing research suggests to encrypt PHRs before outsourcing. Comparison-Based Enc...
A Provable Aggregate Signcryption for Heterogeneous Systems
NIU Shufen, NIU Ling, WANG Caifen, DU Xiaoni
2017, 39(5): 1213-1218. doi: 10.11999/JEIT160829
Abstract:
Heterogeneous signcryption can ensure the confidentiality, authentication and unforgeability of information transmission of cross cryptograph environment. Through analyzing some existing heterogeneous signcryption schemes, it is found that they can o...
Multiuser Communication Scheme Based on Segment Shift Differential Chaos Shift Keying
ZHANG Gang, MENG Wei, ZHANG Tianqi
2017, 39(5): 1219-1225. doi: 10.11999/JEIT160795
Abstract:
In order to meet the demand of modern communication, multiuser access technology is an important development trend of current chaotic communication. To improve the Bit Error Rate (BER) performance of the existing multiuser chaotic communication schem...
Hardware Implementation and Utilization Model Research for Reconfigurable Non-linear Boolean Function
DAI Zibin, WANG Zhouchuang, LI Wei, LI Jiamin, Nan Longmei
2017, 39(5): 1226-1232. doi: 10.11999/JEIT160733
Abstract:
In order to solve the problem that the Non-Linear Boolean Function (NLBF) unit in sequence cryptogram possesses poor hardware resource utilization, the utilization model of basic component composed by Look-Up Table (LUT) is studied and three essentia...
Kempe Equivalence of Colorings of 4-regular Graphs
LIU Xiaoqing, XU Jin
2017, 39(5): 1233-1244. doi: 10.11999/JEIT160716
Abstract:
Given a graphG and a proper vertex coloring ofG, a 2-coloring induced subgraph ofG is a subgraph induced by all the vertices with one of two colors, a component of a 2-coloring induced subgraph is called a 2-coloring component. To make a Kempe change...
Design of a Ka-band Filter with Narrow Pass Band Based on Substrate Integrated Waveguide
GE Junxiang, LI Hao, YANG Xianzhi, WANG Jie
2017, 39(5): 1245-1249. doi: 10.11999/JEIT160647
Abstract:
In view of the difficulty of implementing the narrow band and integration simultaneously for the traditional Ka-band filter, a Ka-band filter with narrow pass band is designed based on Substrate Integrated Waveguide (SIW). The filter adopts the struc...
Induced Fields Produced on Iron Rotation Long Ellipsoid Cavity under Uniform Constant Magnetic Field
PENG Huaiyun, WANG Yuanxin, PAN Weiyan, GUO Lixin, ZHANG Hongqi, CHEN Yu
2017, 39(5): 1250-1255. doi: 10.11999/JEIT160683
Abstract:
The shape of the submarine is idealized as a rotation symmetrical long ellipsoid cavity in order to study the induced fields around the submarine. The expressions of the induced magnetic fields in inside and outside cavity are derived. The contour di...
Research and Implementation of Power Analysis Based on Moving Average
WANG Jianxin, FANG Huawei, DUAN Xiaoyi, SHE Gaojian
2017, 39(5): 1256-1260. doi: 10.11999/JEIT160637
Abstract:
In order to improve the efficiency of attack and reduce the influence of noise on power analysis, a growing number of preprocessing methods are discussed and numerous remarkable results are reported. The AES-128 algorithm running on the ATmega16 is t...
Design of Two-dimensional Modified DFT Modulated Filter Banks Based on Lagrange Multiplier Method
ZHOU Fang, SHUI Penglang, JIANG Junzheng
2017, 39(5): 1261-1265. doi: 10.11999/JEIT160651
Abstract:
Base on Lagrange multiplier method, an iterative algorithm is proposed to design the two-dimensional modified Discrete Fourier Transform (DFT) modulated filter bank. In each iteration, the design problem is described as a Quadratically Constrained Qu...
Metric for Defences Against Fault Attacks of Block Ciphers
OU Qingyu, LUO Fang, YE Weiwei, ZHOU Xueguang
2017, 39(5): 1266-1270. doi: 10.11999/JEIT160548
Abstract:
A detailed analysis of the fault features for the block cipher is performed, and an analysis framework for propagation of faults is proposed. Furthermore, a security evaluation methodology with single fault injection or multi fault injection is prese...