Advanced Search

2018 Vol. 40, No. 2

Display Method:
Multi-focus Image Fusion Based on Hess Matrix
XIAO Bin, TANG Han, XU Yunqiu, LI Weisheng
2018, 40(2): 255-263. doi: 10.11999/JEIT170497
Abstract:
This paper proposes a Hess (also known as Hessian) matrix-based multi-focus image fusion method. In this method, multi-scale Hess matrix is utilized to detect feature and background regions. On this basis, source images are split into two different p...
Combination of Dark-channel Prior with Sparse Representation for Underwater Image Restoration
WANG Xin, ZHU Hangcheng, NING Chen, Lü Guofang
2018, 40(2): 264-271. doi: 10.11999/JEIT170381
Abstract:
Due to the influences of scattering of the light and interference of the noise, underwater image quality is always degraded severely. In order to remove the blur and suppress the noise, and improve the quality of underwater image, a novel underwater ...
Object Tracking Method Based on Sparse Optimization of Local Sensing
LIU Daqian, LIU Wanjun, FEI Bowen
2018, 40(2): 272-281. doi: 10.11999/JEIT170473
Abstract:
The problem of tracking drift is produced easily by traditional sparse representation tracking methods in complex scene. To solve this problem, a novel tracking approach based on sparse optimization of local sensing is proposed. Firstly, the object a...
Extraction Algorithm for Active Contour Based on Disparity Information of Stereoscopic Image
REN Hui, SU Zhibin, GAO Nan, Lü Chaohui
2018, 40(2): 282-288. doi: 10.11999/JEIT170496
Abstract:
To get the closed boundary of target object of given stereoscopic image, this paper proposes an improved algorithm with disparity-guided constraint for active contour extraction based on greedy snake model. The disparity relationship between the cont...
A Quick Response Code Beautification Method Based on Saliency Weighted Random Optimization
YANG Junfeng, LIN Yaping, OU bo, JIANG Junqiang, LI Qiang
2018, 40(2): 289-297. doi: 10.11999/JEIT170521
Abstract:
With the development of smart phones and mobile internet, Quick Response (QR) codes are widely applied to mobile information interaction. However, the appearance of the standard QR code is similar to the noise signal. It is lack of visual aesthetics,...
Underwater Image Visibility Restoration Based on Underwater Imaging Model
2018, 40(2): 298-305. doi: 10.11999/JEIT170460
Abstract:
As a result of the existence of organisms and suspended particles under underwater conditions, images captured under water usually have low contrast, color distortion and loss of visibility. At the same time, due to the existence of the artificial li...
A Scalable Lightweight Radio Fingerprint Map Construction Method
LIU Wenyuan, LIU Huixiang, WEN Liyun, WANG Lin
2018, 40(2): 306-313. doi: 10.11999/JEIT170338
Abstract:
Fingerprint-based indoor localization technology is attracted extensive attention of researchers with the fusion of crowd-sensing and machine learning. However, existing approaches have the bottleneck of scalability and instantaneity caused by high r...
A Many-objective Evolutionary Algorithm Based on Angle Penalized Distance
BI Xiaojun, WANG Chao
2018, 40(2): 314-322. doi: 10.11999/JEIT170454
Abstract:
In order to balance between convergence and distribution in Multi-Objective Evolutionary Algorithms (MOEAs), a Many-Objective Evolutionary Algorithm based on Angle Penalized Distance (MaOEA-APD) is proposed. Firstly, considering the importance of con...
Research on Face Reduction Algorithm Based on Generative Adversarial Nets with Semi-supervised Learning
CAO Zhiyi, NIU Shaozhang, ZHANG Jiwei
2018, 40(2): 323-330. doi: 10.11999/JEIT170357
Abstract:
Based on a large number of training samples to generate high confidence images, generative adversarial nets achieve good results, but the existing network of image generation in the training sample basis, the training parameters can not be used to ge...
An Improved Seam Carving Algorithm Based on Image Blocking and Optimized Cumulative Energy Map
2018, 40(2): 331-337. doi: 10.11999/JEIT170501
Abstract:
For the image distortion of over-carved, this paper proposes a modified Seam Carving (SC) method based on image blocking. Images are segmented into protected and non-protected blocks according to the labelled averaged column summation energy vectors,...
Dynamic Expression Recognition Based on Dynamic Time Warping and Active Appearance Model
XU Liangfeng, WANG Jiayong, CUI Jingnan, HU Min, ZHANG Keke, TENG Wendi
2018, 40(2): 338-345. doi: 10.11999/JEIT170416
Abstract:
To overcome the deficiency of static expression feature, which lacks time information and can not reflect the subtle changes of expression adequately, a dynamic expression recognition method is proposed for non-specific face: the dynamic expression r...
Target Extraction of Hand Infrared Trace Images Based on Artificial Targeting Immunotherapy
FU Dongmei, SUN Jing, YANG Tao
2018, 40(2): 346-352. doi: 10.11999/JEIT170282
Abstract:
Hand infrared trace images can not clearly reflect the original contact contour of hand, which belong to a special kind of infrared blurred images. Inspired by biological immune, an artificial targeting immunotherapy is proposed to extract the hand t...
Research About Cuff-less Continuous Blood Pressure Estimation by Multi-parameter Fusion Method
XU Zhihong, FANG Zhen, CHEN Xianxiang, QIN Li, DU Lidong, ZHAO Zhan, LIU Jiexin
2018, 40(2): 353-362. doi: 10.11999/JEIT170238
Abstract:
For the problem of noninvasive continuous blood pressure algorithm with un-accuracy, a novel multi- parameter fusion algorithm based on BP neural network is proposed, according to the formation from electrocardiogram and photoplethysmograph of arteri...
Solving the Time Optimal Traveling Salesman Problem Based on Hybrid Shuffled Frog Leaping Algorithm-Genetic Algorithm
ZHANG Yong, GAO Xinxin, WANG Yujie
2018, 40(2): 363-370. doi: 10.11999/JEIT170484
Abstract:
In order to provide a recommended-path service for tourists with the shortest traveling time in the peak-season, the Time Optimal Traveling Salesman Problem (TOTSP) is further studied and the fit function is introduced into the fitness function of th...
Direct Position Determination of the Distributed Source
WANG Daming, REN Yanqing, LU Zhiyu, BA Bin
2018, 40(2): 371-377. doi: 10.11999/JEIT170365
Abstract:
The traditional Direct Position Determination (DPD) methods have localization accuracy decrease when locating distributed sources. DPD methods of the distributed source is proposed in this paper to overcome mentioned above shortcoming. Firstly, a DPD...
Dual-mode Blind Equalization Algorithm Based on Renyi Entropy and Fractional Lower Order Statistics Under Impulsive Noise
MA Jitong, QIU Tianshuang, LI Rong, XIA Nan, LI Jingchun
2018, 40(2): 378-385. doi: 10.11999/JEIT170366
Abstract:
To improve the convergence speed and noise suppression effects of blind equalizer under impulsive noise environment, a new dual-mode blind equalization algorithm based on Renyi entropy and fractional lower order statistics is presented. Renyi entropy...
A Repaired Algorithm Based on Improved Compressed Sensing to Repair Damaged Fiber Bragg Grating Sensing Signal
CHEN Yong, WU Chunting, LIU Huanlin
2018, 40(2): 386-393. doi: 10.11999/JEIT170424
Abstract:
To solve the problem of data loss in the field of Fiber Bragg Grating (FBG) sensing, a signal repaired method based on compressed sensing with improved reconstruction algorithm is proposed. According to the characteristics of signal, the suitable obs...
A Blind Recognition Method of Binary Pseudo-random Sequence
ZHANG Tianqi, ZHAO Liang, ZHANG Ting, YANG Kai
2018, 40(2): 394-399. doi: 10.11999/JEIT170552
Abstract:
For the generator polynomial blind recognition method of binary pseudo-random sequences, it is necessary to know the polynomials order in advance, the algorithm with poor fault tolerance and high complexity. In this paper, the analysis matrix is firs...
Study on Frame Structure Detection in Physical Layer Based on Multi-fractal Spectrum
LI Xinhao, ZHANG Min, HAN Shunan
2018, 40(2): 400-407. doi: 10.11999/JEIT170356
Abstract:
In order to achieve the justification of whether a frame structure detection exists or not under the condition that protocol is unknown, an algorithm for frame structure detection in physical layer based on multi-fractal spectrum is proposed. Firstly...
OFDM Symbol Duration Based Cyclostationary Spectrum Sensing Method
WANG Jun, YIN Jiajia, HUANG Fengying, CHEN Zhe, XU Yang
2018, 40(2): 408-415. doi: 10.11999/JEIT170577
Abstract:
This paper proposes a new OFDM symbol duration based cyclostationary spectrum sensing method. The method first estimates the cyclic autocorrelation function from every received OFDM symbol during its symbol period, then constructs the test statistic ...
Low Complexity Detection Algorithm Based on Two-diagonal Matrix Decomposition in Massive MIMO Systems
CAO Haiyan, YANG Jingwei, FANG Xin, XU Fangmin
2018, 40(2): 416-420. doi: 10.11999/JEIT170498
Abstract:
Minimum Mean Square Error (MMSE) algorithm is near-optimal for uplink massive MIMO systems, but it involves high-complexity matrix inversion. Recently, the proposed detection algorithm based on Neumann series approximation reduces the complexity with...
Two-sided Matching Model Based Vertical Handover Algorithm in Heterogeneous Wireless Networks
MA Bin, DENG Hong, XIE Xianzhong
2018, 40(2): 421-429. doi: 10.11999/JEIT170300
Abstract:
Most of the existing vertical handover algorithms are only based on user centric or network centric, which do not fully consider the common impact of the two sides on the handover decision. In order to solve this problem, a two-sided matching model b...
A Method of Constructing Impossible Differential Distinguishers Based on Completeness
LI Junzhi, GUAN Jie
2018, 40(2): 430-437. doi: 10.11999/JEIT170422
Abstract:
Mixed Operation based Ciphers (MOC) attract cryptographers owing to their high security and high efficiency on both software and hardware platforms. As a basic principle of cryptosystem design, completeness refers to that every output bit contains th...
Optical Image Encryption Algorithm Based on Coherent Superposition and Equal Modulus Vector Decomposition
ZHANG Bo, LONG Hui, JIANG Feibo
2018, 40(2): 438-446. doi: 10.11999/JEIT170489
Abstract:
In order to overcome the defects such as contour emerging induced by the cipher phase information mainly concentrated in the pure phase mask and difficult to resist the amplitude phase retrieval attack in current optical image encryption technology, ...
Distributed Energy-balanced Dynamic Packet Forwarding Strategy in WSN
ZHEN Yan, LI Xing, YANG Jing
2018, 40(2): 447-454. doi: 10.11999/JEIT170465
Abstract:
As for energy hole issue in Wireless Sensor Network (WSN), an energy-balanced dynamic hierarchical data forwarding strategy is proposed. According to the node usable energy, relative position and the energy consumption of cluster head in different ar...
Multi-controller Deployment Algorithm Based on Load Balance in Software Defined Network
SHI Jiugen, ZHU Wei, JIA Kunying, XU Ying
2018, 40(2): 455-461. doi: 10.11999/JEIT170464
Abstract:
With the expansion of Software Defined Network (SDN), the decoupling of control layer and data layer brings new problems such as controller deployment. In this paper, a Multi-Controller Deployment Algorithm Based on Load Balance (MCDALB) in SDN is pr...
Ocean Surface Wind Speed Retrieval Using Spaceborne GNSS-R
YANG Dongkai, LIU Yi, WANG Feng
2018, 40(2): 462-469. doi: 10.11999/JEIT170490
Abstract:
For spaceborne GNSS-R, Delay-Doppler Map (DDM) shape is less sensitive to wind speed, resulting in poor retrieval accuracy measured by fitting theoretical DDM to the measured one. To solve this problem, a method directly linking the individual DDM po...
Inter-pulse Periodical Shift-frequency Jamming Against Synthetic Aperture Radar
CHANG Xin, DONG Chunxi, TANG Zhengzhao, DONG Yangyang, LIU Mingming
2018, 40(2): 470-478. doi: 10.11999/JEIT170439
Abstract:
The regular false targets which are generated by the intermittent sampling repeater jamming can be easily recognized. To overcome this disadvantage, an inter-pulse periodical shift-frequency jamming method is proposed against Synthetic Aperture Radar...
Persymmetric Detectors Without Training Data for Colocated MIMO Radar
YANG Haifeng, JIANG Guoxi, LIU Weijian, XIE Wenchong, WANG Yongliang
2018, 40(2): 479-485. doi: 10.11999/JEIT170295
Abstract:
The traditional detectors of colocated MIMO radar can detect a target without training data. However, the detection performance is poor with low number of waveform sampling. In this paper, two detectors, based on the Generalized Likelihood Ratio Test...
Multiple Source Parameter Estimation for Rotating Interferometer Using Circular Array Processing
XIN Jinlong, LIAO Guisheng, YANG Zhiwei, XIE Hu
2018, 40(2): 486-492. doi: 10.11999/JEIT170217
Abstract:
Focus on the problem of phase ambiguity and the issue that it is impossible to estimate the unambiguous angles of multiple sources with the same frequency and time of arrival. An approach for multiple sources parameters estimation with rotating inter...
Millimeter Wave Antenna Design Based on Fast Swarm Intelligence Algorithm
CHEN Yueyun, JIAN Rongling, ZHAO Yongxu
2018, 40(2): 493-499. doi: 10.11999/JEIT170455
Abstract:
Considering the problem of mismatched impedance of millimeter wave antenna, an algorithm based on Particle Swarm Ant Colony Optimization (PSACO) is proposed to optimize antenna patch parameters and the pheromone guidance mechanism of the ant colony a...
Certificateless Aggregate Signcryption Scheme with Internal Security and Const Pairings
ZHANG Yongjie, ZHANG Yulei, WANG Caifen
2018, 40(2): 500-508. doi: 10.11999/JEIT170419
Abstract:
Aggregate signcryption can not only reduce the cost of the verification of ciphertexts, but also ensure the confidentiality and authentication. Analyzed Liu et al s CertificateLess Aggregate SignCryption (CLASC) scheme with Const Pairings, it is foun...