Advanced Search

2018 Vol. 40, No. 3

Display Method:
Construction of Almost Optimal Binary Mutiple Zero Correlation Zone Sequence Sets
LI Yubo, LIU Tao, CHEN Xiaoyu
2018, 40(3): 705-712. doi: 10.11999/JEIT170603
Abstract:
Multiple Zero Correlation Zone (ZCZ) sequence sets are sutilable to Quasi-Synchronous Code-Division Multiple-Access (QS_CDMA) systems to remove both the Multi-Path Interference (MPI) and the Inter-Cell Interference (ICI). In this paper, multiple bina...
A Fast Sparse Decomposition for Three-order Polynomial Phase Signal Based on Subspace
OU Guojian, JIANG Qingping, QING Changchun
2018, 40(3): 648-655. doi: 10.11999/JEIT170593
Abstract:
In view of the defect for large number of atoms in the over-complete dictionary during sparse decomposition, this paper presents a fast sparse decomposition algorithm for three-order polynomial phase signal based on subspace. According to the charact...
A Robust Kernelized Correlation Tracking Algorithm for Infrared Targets Based on Ensemble Learning
XIE Tao, WU Ensi
2018, 40(3): 602-609. doi: 10.11999/JEIT170527
Abstract:
In the infrared object tracking, the single classifier is not enough to fit the multimodal data due to the complex background information of the target and the significant change in the appearance. In this paper, Kernelized Correlation Filters (KCF) ...
Novel Interference Alignment Scheme Based on Dynamic Feedback and Power Allocation
LI Shibao, HE Chang, LIU Jianhang, WANG Yixin
2018, 40(3): 728-733. doi: 10.11999/JEIT170505
Abstract:
In multi-user MIMO systems, the accuracy of the Channel State Information (CSI) has a sufficient effect on performance of interference alignment scheme. To solve the problem of interference leakage caused by limited feedback of CSI, a novel method fo...
Attribute-based Proxy Re-encryption Scheme with Keyword Search
LIU Zhenhua, ZHOU Peilin, DUAN Shuhong
2018, 40(3): 683-689. doi: 10.11999/JEIT170448
Abstract:
Attribute-based proxy re-encryption mechanism can not only realize data sharing but also achieve data forwarding. However, this mechanism can not support the functionality of data retrieval, which hinders the applications of attribute-based proxy re-...
Block-Sparse Reconstruction for Electrical Impedance Tomography
WANG Qi, ZHANG Pengcheng, WANG Jianming, LI Xiuyan, LIAN Zhijie, CHEN Qingliang, CHEN Tongyun, CHEN Xiaojing, HE Jing, DUAN Xiaojie, WANG Huaxiang
2018, 40(3): 676-682. doi: 10.11999/JEIT170425
Abstract:
An electrical impedance image reconstruction algorithm based on adaptive block-sparse dictionary is proposed. A block-sparse dictionary is constructed creatively, which preferably preserves the details of reconstructed images. Meanwhile, the sparsify...
A GPS/INS Integrated Navigation Method Based on Weighting Adaptive Square-root Cubature Kalman Filter
YUE Zhe, LIAN Baowang, TANG Chengkai
2018, 40(3): 565-572. doi: 10.11999/JEIT170597
Abstract:
In the GPS/INS integrated navigation system, the filtering precision of Square-root Cubature Kalman Filter (SCKF) will decrease or even diverge resulting from the uncertainty of the measured noise statistics, therefore, a Weighting Aaptive Square-roo...
New Approach for Calculating Inversed Order Sequence in FFT
LIU Daqing, LIN Haoran, CHEN Shuyue
2018, 40(3): 758-762. doi: 10.11999/JEIT170595
Abstract:
In order to improve the efficiency of Fast Fourier Transform (FFT) and reduce the computation time, an algorithm of inversed order sequence in FFT is studied. It is revealed that the inversed order sequences with different length N are not independen...
Facial Expression Recognition Based on the Fusion of Spatio-temporal Features in Video Sequences
WANG Xiaohua, XIA Chen, HU Min, REN Fuji
2018, 40(3): 626-632. doi: 10.11999/JEIT170592
Abstract:
For facial expression recognition based on video sequences, the changing information of facial regions along the time axis can be described by dynamic descriptors more effectively than static descriptors. This paper proposes an expression recognition...
Minimum Bayesian Risk Based Robust Spectrum Prediction in Dynamic Spectrum Access
CHEN Xi, YANG Jian
2018, 40(3): 734-742. doi: 10.11999/JEIT170519
Abstract:
The accumulation of miss detection and false alarm in spectrum sensing leads to the persistently decreasing of prediction accuracy in spectrum prediction. This paper takes neural network based spectrum prediction for example, and presents a minimum B...
Three-Dimensional Imaging of Ballistic Targets with Vanes Based on Netted Radar
FENG Cunqian, CHEN Rong, HUANG Darong, XU Xuguang
2018, 40(3): 517-524. doi: 10.11999/JEIT170481
Abstract:
The multi-angle characteristic of netted radar is helpful in obtaining the actual space structure of ballistic targets. In this paper, the echo model for precession targets with vanes is established. Based on the model, the rate of change of micro-Do...
A Novel Coherent Ladar System with High Repetition Frequency and Wide Bandwidth
LI Guangzuo, MO Di, WANG Ning, WANG Ran, ZHANG Keshu, ZHANG Zenghui, WU Yirong
2018, 40(3): 525-531. doi: 10.11999/JEIT170479
Abstract:
A novel coherent ladar system with high repetition and wide bandwidth is proposed. Based on the IQ modulator from the fiber communication community and the bandwidth synthesis technique, the proposed system provides wide bandwidth with high repetitio...
Weakly Supervised Semantic Segmentation Based on Semantic Texton Forest and Saliency Prior
HAN Zheng, XIAO Zhitao
2018, 40(3): 610-617. doi: 10.11999/JEIT170472
Abstract:
Most previous weakly supervised semantic segmentation works utilize the labels of the whole training set and thereby need the construction of a relationship graph about image labels. This method lack of structure information in single image and suffe...
Real-time Estimation of Tropospheric Slant Delay in Two-way Troposphere Time Transfer
LIU Jiye, CHEN Xihong, LIU Zan
2018, 40(3): 587-593. doi: 10.11999/JEIT170581
Abstract:
Tropospheric slant delay is a main error source in two way time transfer via tropospheric scatter communication. A method for real-time estimation of tropospheric slant in two way time transfer via tropospheric scatter communication is proposed. The ...
Robust Multisensor Bias Estimation Under Nonideal Association
TIAN Wei, HUANG Gaoming
2018, 40(3): 641-647. doi: 10.11999/JEIT170579
Abstract:
In the data fusion system, sensor biases lead to systematic deviation of the position states of targets reported to the fusion center. If sensor biases could not be estimated and compensated correctly, the fusion system will fail to achieve the expec...
Quantum Color Image Filtering in the Frequency Domain
LI Panchi, SUN Hao
2018, 40(3): 594-601. doi: 10.11999/JEIT170575
Abstract:
To solve the problem of quantum color image filtering, this paper proposes a frequency domain filtering method based on Quantum Fourier Transform (QFT). Firstly, the classical color image is represented as a quantum image by Novel Enhanced Quantum Re...
Optimization Analysis Method on Ship RCS Based on Sea Conditions and Cubic Spline Interpolation Algorithm
YAN Wei, GENG Lu, ZHOU Lei, ZHAO Yang, WANG Enrong, ZHU Da
2018, 40(3): 579-586. doi: 10.11999/JEIT170562
Abstract:
The sea under different wave levels has an strong impact on the ship target Radar Cross Section (RCS) analysis. The far-field single-station RCS analysis model is established for the ship under different sea conditions based on the Physical Optics wi...
Low-PAR Robust Waveform Design for Cognitive Radar with Imprecise Prior Knowledge
HAO Tianduo, ZHOU Qingsong, SUN Congyi, CUI Chen
2018, 40(3): 532-540. doi: 10.11999/JEIT170560
Abstract:
In view of the detection waveform design for cognitive radar with imprecise prior knowledge of target and clutter, while considering the demand of power amplifier on low Peak-to-Average power Ratio (PAR) waveform, a low-PAR robust waveform design met...
Design of Hardware Obfuscation AES Based on State Deflection Strategy
2018, 40(3): 750-757. doi: 10.11999/JEIT170556
Abstract:
Obfuscation is used to safeguard lawful rights and interests of developers and users in software security, by protecting critical information and algorithms with the system logic relation. Also, how to achieve obfuscation method to protect the hardwa...
Adaptive Measurement Matrix Optimization for ISAR Imaging with Sparse Frequency-stepped Chirp Signals
CHEN Yijun, LI Kaiming, ZHANG Qun, LUO Ying
2018, 40(3): 509-516. doi: 10.11999/JEIT170554
Abstract:
The ISAR imaging technology with sparse Stepped-Frequency Chirp Signals (SFCS) based on Compressive Sensing (CS) theory can construct the target image from a few of measurements with high probability, where the measurement matrix optimization is an e...
A Phase Delay Estimation Algorithm of Frequency Hopping Signal Based on Chinese Reminder Theorem
ZHAO Peiyan, OUYANG Xinxin, PENG Huafeng
2018, 40(3): 656-662. doi: 10.11999/JEIT170544
Abstract:
The bandwidth of each hop in frequency hopping signal is very narrow, and the accumulating between multiple hop is difficult, thus the accuracy of time delay estimation for frequency hopping is low. To deal with the problem, the potential of wide ban...
An Optimal Allocation Model of Wireless In-band Full-duplex Channel for Multiple Access
WANG Wennai, HUANG Yanan, WU Wei, WANG Bin
2018, 40(3): 721-727. doi: 10.11999/JEIT170538
Abstract:
The potential of wireless In-Band Full-Duplex (IBFD) in doubling spectral efficiency raises a special issue in channel allocation for Multi-user applications in capacity improvement. This paper presents an analysis on mutual interferences, contention...
Parameter Estimation of Frequency-hopping Signals Based on Sparse Time-frequency Distribution
JIN Yan, ZHOU Lei, JI Hongbing
2018, 40(3): 663-669. doi: 10.11999/JEIT170525
Abstract:
In the case of parameter estimation of Frequency Hopping (FH) signal based on conventional time- frequency analysis, the suppression of cross-terms in Time-Frequency Distribution (TFD) by kernel function always leads to the decrease of time-frequency...
New Algebraic Algorithm for Moving Target Localization in Distributed MIMO Radar Systems
2018, 40(3): 548-556. doi: 10.11999/JEIT170510
Abstract:
To solve the moving target localization problem in distributed MIMO radar systems, with the Bistatic Range (BR) and Bistatic Range Rate (BRR) used as the measurements, an algebraic algorithm based on multi- stage Weighted Least Squares (WLS) is propo...
Active Noised-mixed Forensics Algorithm for Tampering of Video Motion-compensated Frame Rate Up-conversion
LI Ran, MEI Lala, WU Chang'an, ZHU Xiuchang
2018, 40(3): 713-720. doi: 10.11999/JEIT170502
Abstract:
Motion-Compensated Frame Rate Up-Conversion (MC-FRUC) is one of the common temporal-domain tampering methods of video. The existing methods recognize MC-FRUC tampering by passively analyzing statistical characteristics of video; however, the non-stat...
Fast Calculation of Wide-angel RCS of Objects Using Improved Primary Characteristic Basis Functions
WANG Zhonggen, TANG Xiaowan, WANG Qiang
2018, 40(3): 573-578. doi: 10.11999/JEIT170499
Abstract:
Characteristic basis function method is one of the effective methods to analyze wide-angle electromagnetic scattering characteristics of objects. However, the incident wave excitations used to construct the Characteristic Basis Functions (CBFs) conta...
Robot Perceptual Learning Method Based on Incremental Bidirectional Principal Component Analysis
WANG Xiaofeng, ZHANG Minglu, LIU Jun
2018, 40(3): 618-625. doi: 10.11999/JEIT170561
Abstract:
Existing Candid Covariance-free Incremental PCA (CCIPCA) has the limitation of the stable image inherent covariance, and a Generalized CCIPCA (GCCIPCA) with an appended term of the mean difference vector is presented. It can be considered that the CC...
Feedback and Reverse Transmission Mechanism Based Two-stage Switch Architecture
SHEN Zhijun, GAO Jing, WU Rigeng
2018, 40(3): 697-704. doi: 10.11999/JEIT170531
Abstract:
In order to solve the problems arising from the 2-Staggered Symmetry connection pattern (2-SS) in Feedback mechanism based load balanced Two-stage Switch Architecture (FTSA), a Feedback and Reverse Transmission Mechanism based Two-stage Switch Archit...
Binarization Representation of Image Microstructure and the Application of Object Recognition
ZHANG Dongbo, CHEN Zhiqiang, YI Liangling, XU Haixia
2018, 40(3): 633-640. doi: 10.11999/JEIT170513
Abstract:
A novel expression based on Binary Image Microstructure Pattern (BIMP) and Gray Image Micorstructure Maximum Response Pattern (GIMMRP) coding method is proposed. Through the binary coding of the 33 neighborhood structure of the image, the description...
Maneuvering Target Detection Algorithm Based on Hankel Matrix Decomposition in Over-The-Horizon Radar (OTHR)
2018, 40(3): 541-547. doi: 10.11999/JEIT170511
Abstract:
Maneuvering target detection is one of the focuses in skywave Over-The-Horizon Radar (OTHR). The performance of existing algorithms is good for single maneuvering target in the condition of high SNR. However, the performance for multiple maneuvering ...
DoA Estimation Based on Matrix Preconditioning Through Sparse Reconstruction in Impulsive Noise
ZHAO Jihong, MA Zhaotian, QU Hua, WANG Weihua
2018, 40(3): 670-675. doi: 10.11999/JEIT170371
Abstract:
Sparse reconstruction method suffers severe degradation in presence of impulsive noise. To deal with this problem, this paper proposed a DoA estimation method based on polynomial matrix preconditioning through sparse reconstruction. Based on the spar...
Energy-saving Mechanism of Integrated Fiber-wireless Access Network with Uplink Data Frame Aggregation
WU Dapeng, WU Guangkai, WANG Ruyan
2018, 40(3): 690-696. doi: 10.11999/JEIT170508
Abstract:
Integrated Fiber-Wireless (FiWi) access network has the problems of low utilization rate of optical network unit and large control overhead during data transmission. In this paper, an energy saving mechanism with uplink data frame aggregation is prop...
Code Phase Estimate and Discrimination Method for BOC Modulated Signal Based on Partial Correlation Function Interpolation
LI Wengang, WANG Yiwei
2018, 40(3): 557-564. doi: 10.11999/JEIT170506
Abstract:
In order to further improve the BOC (1,1) and its derived types modulated signals code discrimination quality and tracking ability of the satellite navigation receiver, especially in high dynamic. This paper proposes a method to determine the BOC (1,...
Hardware Trojan Detection Through Temperature Characteristics Analysis
ZHONG Jingxin, WANG Jianye, KAN Baoqiang
2018, 40(3): 743-749. doi: 10.11999/JEIT170443
Abstract:
Hardware Trojan is the malicious circuit modification which can disable the Integrated Circuit (IC) or leak confidential information covertly to the adversary, and brings potential safety hazard for ICs. In this paper, a new approach for hardware Tro...