Advanced Search

2018 Vol. 40, No. 12

Display Method:
Journal of electronics and information 2018-12 catalogue
2018, 40(12)
Abstract:
PolSAR Image Classification Based on Discriminative Clustering
Zhiqiang WEI, Haixia BI
2018, 40(12): 2795-2803. doi: 10.11999/JEIT180229
Abstract:
This paper presents a novel unsupervised image classification method for Polarimetric Synthetic Aperture Radar (PolSAR) data. The proposed method is based on a discriminative clustering framework that explicitly relies on a discriminative supervised ...
Remote Sensing Image Fusion Based on Optimized Dictionary Learning
Fan LIU, Xiaopeng PEI, Jing ZHANG, Zehua CHEN
2018, 40(12): 2804-2811. doi: 10.11999/JEIT180263
Abstract:
In order to improve the fusion quality of panchromatic image and multi-spectral image, a remote sensing image fusion method based on optimized dictionary learning is proposed. Firstly, K-means cluster is applied to image blocks in the image database,...
Vehicle Detection in Remote Sensing Images of Dense Areas Based on Deformable Convolution Neural Network
Xin GAO, Hui LI, Yi ZHANG, Menglong YAN, Zongshuo ZHANG, Xian SUN, Hao SUN, Hongfeng YU
2018, 40(12): 2812-2819. doi: 10.11999/JEIT180209
Abstract:
Vehicle detection is one of the hotspots in the field of remote sensing image analysis. The intelligent extraction and identification of vehicles are of great significance to traffic management and urban construction. In remote sensing field, the exi...
Ambiguity Resolving and Imaging Algorithm for Multi-channel Forward-looking Synthetic Aperture Radar
Jingyue LU, Lei ZHANG, Guanyong WANG
2018, 40(12): 2820-2825. doi: 10.11999/JEIT180177
Abstract:
The azimuth resolution of traditional synthetic aperture radar is only provided by synthetic aperture. However, in the forward looking area, the Doppler diversity is limited, so the imaging performance declines rapidly. And forward looking imaging al...
A Low-communication-rate Fusion Approach Based on Censored Data
Ding CAO, Shenghua ZHOU, Hongwei LIU, Chang GAO, Zhiqiang SHAO
2018, 40(12): 2826-2833. doi: 10.11999/JEIT180039
Abstract:
In multistatic radar, a Censored Data-Based Decentralized Fusion (CDDF) is proposed to address the issue of fusing local observations with communication constraints. The local likelihood ratio is calculated based on the observation of moving target i...
Method for Frequency Error Compensation Based on Raw Data for SAR System with Bandwidth Synthesis
Sujuan FANG, Guangzuo LI, Yifei ZHANG, Wenxian YU, Yirong WU
2018, 40(12): 2834-2840. doi: 10.11999/JEIT180079
Abstract:
To improve the resolution of the SAR system, radar bandwidth should be improved. By means of synthetic bandwidth, wide bandwidth can be achieved with less hardware complexity. For frequency band synthesis SAR system, frequency difference should be ac...
Multipath Clutter Rejection Approach Based on Carrier Domain Adaptive Iterative Filter in Passive Bistatic Radar
Zhixin ZHAO, Xinhua ZHOU, Sheng HONG, Tao WENG, Yuhao WANG
2018, 40(12): 2841-2847. doi: 10.11999/JEIT180097
Abstract:
In passive bistatic radar systems, there exists the zero and non-zero Doppler shift multipath clutter in the surveillance channel. The multipath clutter affects the target detection. Temporal adaptive iterative filter such as Least Mean Square (LMS),...
A Precise Method for Calculating the Resolution of SAR Distribution Targets
Yanfei WANG, Xinxing CHEN
2018, 40(12): 2848-2853. doi: 10.11999/JEIT180294
Abstract:
The separable probability is a significant criterion to evaluate the resolution characteristics of SAR distribution targets. On the basis of refining the separable condition of targets and taking the statistic characteristic of SAR distribution targe...
Forward Derivation and Analysis for 3-D Scattering Center Position of Radar Target
Lei ZHANG, Siyuan HE, Guoqiang ZHU, Yunhua ZHANG, Hongcheng YIN, Hua YAN
2018, 40(12): 2854-2860. doi: 10.11999/JEIT180115
Abstract:
To link better scattering centers with target structures, a forward method is presented to deduce the component-level 3-D scattering center position of radar target under the mechanisms of single and double scattering based on target geometric model....
Threat Assessment Based Sensor Control for Multi-target Tracking
Hui CHEN, Zhongliang HE, Feng LIAN, Chen LI
2018, 40(12): 2861-2867. doi: 10.11999/JEIT180212
Abstract:
This paper proposes a threat assessment based sensor control by using multi-target filter with random finite set. First, the general sensor control approach based on information theory is presented in the framework of Partially Observable Markov Deci...
Wi-Fi Indoor Localization Based on Hybrid Hypothesis Test of Signal Distribution
Mu ZHOU, Xiaolong GENG, Liangbo XIE, Zengshan TIAN, Yacong WEI
2018, 40(12): 2868-2873. doi: 10.11999/JEIT180147
Abstract:
Wi-Fi indoor localization technique is one of the current research hotspots in the field of mobile computing, however, the conventional location fingerprinting based localization scheme does not consider the diversity of Wi-Fi signal distribution in ...
Steering Vector and Covariance Matrix Joint Iterative Estimations for Robust Beamforming
Zhiwei YANG, Pan ZHANG, Ying CHEN, Huajian XU
2018, 40(12): 2874-2880. doi: 10.11999/JEIT180225
Abstract:
Focusing on the problem of adaptive beamformer performance decreasing due to target steering vector constraint errors, an algorithm for robust beamforming with joint iterative estimations of steering vector and covariance matrix is proposed. First, t...
Fast Two-dimensional DOA Estimation for Coherently Distributed Noncircular Signals with Automatic Pairing
Weijia CUI, Zhengliang DAI, Daming WANG, Xiangzhi LI
2018, 40(12): 2881-2888. doi: 10.11999/JEIT171058
Abstract:
In the two-dimensional Direction Of Arrival (DOA) estimation of coherently distributed noncircular sources, the problem of large complexity is caused by dimension expansion after exploiting noncircular property, meanwhile the existing low-complexity ...
Adaptive Affine Propagation Clustering Algorithm for WiFi Indoor Positioning
Jiusong HU, Hongli LIU, Guoxuan XIAO, Kun XU
2018, 40(12): 2889-2895. doi: 10.11999/JEIT180186
Abstract:
There are a large number of indoor WiFi signals which can be used for indoor positioning. Although many WiFi indoor positioning technology is proposed, it's positioning accuracy still does not meet the actual application requirements. For this proble...
Co-saliency Detection Based on Convolutional Neural Network and Global Optimization
Zemin WU, Jun WANG, Lei HU, Chang TIAN, Mingyong ZENG, Lin DU
2018, 40(12): 2896-2904. doi: 10.11999/JEIT180241
Abstract:
To solve the problems in current co-saliency detection algorithms, a novel co-saliency detection algorithm is proposed which applies fully convolution neural network and global optimization model. First, a fully convolution saliency detection network...
Detection of Sound Event under Low SNR Using Multi-band Power Distribution
Ying LI, Lingfei WU
2018, 40(12): 2905-2912. doi: 10.11999/JEIT180180
Abstract:
As to the problem of sound event detection in low Signal-Noise-Ratio (SNR) noise environments, a method is proposed based on discrete cosine transform coefficients extracted from multi-band power distribution image. First, by using gammatone spectrog...
Analysis of FM Signals Based on Viterbi Synchrosqueezing S-transform in Mixture Noise
Mingzhe ZHU, Rui XIAO, Xiaofan SU, Guanghui WANG
2018, 40(12): 2913-2918. doi: 10.11999/JEIT171091
Abstract:
A new robust Generalized Synchrosqueezing S-Transform(GSST) is proposed to solve the distortion problem of SynchroSqueezing S-Transform(SSST) in mixture noise. Firstly, the method improves the Viterbi algorithm for improving the Time-Frequency(TF) an...
Plane-wave Compounding with Short-lag Coherence Factor Weighting
Chichao ZHENG, Lunan ZHANG, Hao WANG, Hu PENG
2018, 40(12): 2919-2927. doi: 10.11999/JEIT180120
Abstract:
The Coherent Plane-Wave Compounding (CPWC) algorithm is based on the recombination of several plane-waves with different steering angles, which can achieve high-quality images with high frame rate. However, CPWC ignores the coherence between the plan...
A Novel Method for Nonlinear Processing in Impulsive Noise Based on Gaussianization and Generalized Matching
Zhongtao LUO, Peng LU, Yangyong ZHANG, Gang ZHANG
2018, 40(12): 2928-2935. doi: 10.11999/JEIT180191
Abstract:
A method based on Gaussianization and generalized matching, called Gaussianization-Generalized Matching (GGM) method is proposed, for nonlinear processing in impulsive noise. The GGM method can be designed based on noise samples, aided by nonparametr...
Design and Implementation for Chroma Extensions Video Coding Based on AVS2 Platform
Shuhui WANG
2018, 40(12): 2936-2944. doi: 10.11999/JEIT180154
Abstract:
Chroma extensions video coding is a hot topic in the field of video coding. Chroma extensions video coding scheme based on AVS2 platform is proposed. The most direct solution is pseudo444/422 coding. In this method, chroma component in the input imag...
A Robust Optical Flow Calculation Method Based on Wavelet
Hongyan WANG, Jia ZHENG, Bingnan PEI
2018, 40(12): 2945-2953. doi: 10.11999/JEIT180077
Abstract:
Focusing on the issue that the systematic errors lead to poor robustness and low accuracy of optical flow calculation, a robust optical flow calculation method is proposed in this paper, which is based on the wavelet multi-resolution theory. With the...
Relative Mobility Prediction Based k-Hop Clustering Algorithm in AdHoc Networks
Luoming MENG, Yanfu JIANG, Yanjun LIU, Han SU, Siya XU, Feng QI
2018, 40(12): 2954-2961. doi: 10.11999/JEIT180192
Abstract:
To solve the problem of network structure change and route failure caused by random movement of network nodes, a relative mobility prediction based k-hop clustering algorithm is proposed, the movement of nodes are analyzed and predicted, the cluster ...
Network Slice Virtual Resource Allocation Algorithm Based on Constrained Markov Decision Process in Non-orthogonal Multiple Access
Lun TANG, Yingjie SHI, Xixi YANY, Qianbin CHEN
2018, 40(12): 2962-2969. doi: 10.11999/JEIT180131
Abstract:
An adaptive virtual resource allocation algorithm is proposed based on Constrained Markov Decision Process (CMDP) for wireless access network slice virtual resource allocation. First of all, this algorithm in the Non-Orthogonal Multiple Access (NOMA)...
Low Complexity Iterative Parallel Interference Cancellation Detection Algorithms for Massive MIMO Systems
Bin SHEN, Shufeng ZHAO, Chun JIN
2018, 40(12): 2970-2978. doi: 10.11999/JEIT180111
Abstract:
Based on interference cancellation method, a low complexity Iterative Parallel Interference Cancellation (IPIC) algorithm is proposed for the uplink of massive MIMO systems. The proposed algorithm avoids the high complexity matrix inversion required ...
Energy Efficient Joint Power Allocation and Beamforming for Cloud Radio Access Network
Jiakuo ZUO, Longxiang YANG, Nan BAO, Guanming LU
2018, 40(12): 2979-2985. doi: 10.11999/JEIT180218
Abstract:
The resource allocation for Cloud Radio Access Network (C-RAN) is investigated. The max-min fairness criterion is used as the optimization criterion and the Energy Efficiency (EE) of C-RAN users is taken as the optimization objective function, by max...
Upper Bound Estimation of Average Differential Probability and Average Linear Chains Probability of Lai-Massey Structure
Ruya FAN, Chenhui JIN, Ting CUI
2018, 40(12): 2986-2991. doi: 10.11999/JEIT180196
Abstract:
Lai-Massey structure is a block cipher structure developed from IDEA algorithm. FOX is the representative of this cipher structure. In this paper, the keys are assumed to be generated independently and uniform randomly, and then the provable security...
Linear Complexity of Quaternary Sequences over Z4 Derived from Generalized Cyclotomic Classes Modulo 2p2
Xiaoni DU, Liping ZHAO, Lianhua WANG
2018, 40(12): 2992-2997. doi: 10.11999/JEIT180189
Abstract:
Based on the theory of Galois rings of characteristic 4, a new class of quaternary sequences with period 2p2 is established over Z4 using generated cyclotomy, where p is an odd prime. The linear complexity of the new sequences is determined. Results ...
Efficient Offline/Online Attribute Based Encryption with Verifiable Outsourced Decryption
Zhiyuan ZHAO, Lei SUN, Jiafu HU, Shie ZHOU
2018, 40(12): 2998-3006. doi: 10.11999/JEIT180122
Abstract:
Attribute based encryption can provide data confidentiality protection and fine-grained access control for fog-cloud computing, however mobile devices in fog cloud computing system are difficult to bear the burdensome computing burden of attribute ba...
New Privacy Preserving Aggregate Signcryption for Heterogeneous Systems
Yulei ZHANG, Xiangzhen LIU, Xiaoli LANG, Wenjuan CHEN, Caifen WANG
2018, 40(12): 3007-3012. doi: 10.11999/JEIT180249
Abstract:
The privacy preserving aggregate signcryption for heterogeneous systems can ensure the confidentiality and unforgeability of the data between heterogeneous cryptosystems, it also can provide multi-ciphertext batch verification. This paper analyzes th...
Resource Allocation for Wireless Powered Hybrid Multiple Access Networks
Guangchi ZHANG, Zhichao ZENG, Miao CUI, Fan LIN
2018, 40(12): 3013-3019. doi: 10.11999/JEIT180219
Abstract:
Wireless powered technology is an effective way to extend the lifetime of wireless network nodes. A wireless powered hybrid multiple access system is studied that is consist of a base station and multiple users in clusters. The transmission of the sy...
Sensor Search Based on Sensor Similarity Computing in the Internet of Things
Suyan LIU, Yuanan LIU, Fan WU, Wenhao FAN
2018, 40(12): 3020-3027. doi: 10.11999/JEIT171085
Abstract:
The Internet of Things (IoT) is becoming a hot research area, and tens of billions of devices are being connected to the Internet which are advancing on the sensor search service. IoT features (searches are strong spatiotemporal variability, limited ...
Research on SDN-based Load Balancing Technology of Server Cluster
Tianfang YU, Lanlan RUI, Xuesong QIU
2018, 40(12): 3028-3035. doi: 10.11999/JEIT180207
Abstract:
Under the present network architecture, it is disadvantageous for scalability and service performance of server cluster to adopt hardware systems to realize load balancing of server cluster, because there are some restriction factors in such a method...
Power-frequency Electric Field Measurement Using a Micromachined Electric Field Sensor
Jie TONG, Yuqing LEI, Guohua LIU, He WANG, Xueming JIN, Pengfei YANG, Chunrong PENG
2018, 40(12): 3036-3041. doi: 10.11999/JEIT180217
Abstract:
A novel power frequency electric field measurement system based on high-performance MEMS electric field sensing chips is developed. Based on cross-correlation detection principle, a power frequency electric field demodulation algorithm of MEMS sensin...
High Throughput Dual-mode Reconfigurable Floating-point FFT Processor
Xing WEI, Zhihong HUANG, Haigang YANG
2018, 40(12): 3042-3050. doi: 10.11999/JEIT180170
Abstract:
In the advanced applications of real-time radar imaging and high-precision scientific computing systems, the design of high throughput and reconfigurable Floating-Point (FP) FFT accelerator is significant. Achieving high throughput FP FFT with low ar...