Advanced Search

2018 Vol. 40, No. 5

Display Method:
Study on Secret Key Generation Based on Frequency Domain Response of Channel in Single Carrier Frequency Domain Equalization Systems
KONG Yuanyuan, YANG Zhen, Lü Bin, TIAN Feng
2018, 40(5): 1017-1023. doi: 10.11999/JEIT170772
Abstract:
A secret key generation scheme is proposed in a Single Carrier Frequency Domain Equalization system (SC-FDE). The scheme uses the Channel Frequency Response (CFR) to generate the secret keys, which is termed as CFR-Key. The principle of the CFR-Key s...
Energy Efficient Resource Allocation in Cooperative Cognitive Radio Networks
QU Hua, ZHAO Yongqiang, ZHAO Jihong, YAN Feiyu, XU Xiguang
2018, 40(5): 1024-1030. doi: 10.11999/JEIT170671
Abstract:
Considering the energy-constrained cooperative cognitive radio networks, the maximization problem of Energy Efficiency (EE) with Quality of Service (QoS) constraint of primary user is investigated. Secondary user receives the signals of primary user ...
Application and Optimal Design of 3D MIMO for Simultaneous Wireless Information and Power Transfer
FAN Lixing, HUA Meng, HUANG Yongming, YANG Luxi
2018, 40(5): 1031-1036. doi: 10.11999/JEIT170751
Abstract:
In order to improve the Simultaneous Wireless Information and Power Transfer (SWIPT) efficiency, the Base Station (BS) employs the Three-Dimensional (3D) directional antennas and exploits the vertical domain by dynamically adjusting the antenna tilt....
A Sequential Cooperative Spectrum Sensing Algorithm Based on Dynamic Adaptive Double-threshold Energy Detection
HUANG He, YUAN Chaowei
2018, 40(5): 1037-1043. doi: 10.11999/JEIT170731
Abstract:
In order to overcome the problem of ignoring the sensing information between the two fixed thresholds for double-thresholds energy detection algorithm, the sequential cooperative sensing algorithm based on dynamic adaptive double-threshold energy det...
An Improved Threshold-based Low Complexity Multiuser Detection Scheme for Sparse Code Multiple Access System
YANG Wei, ZHAO Yiwei, HOU Jianqi
2018, 40(5): 1044-1049. doi: 10.11999/JEIT170647
Abstract:
Sparse Code Multiple Access (SCMA) is a non-orthogonal multiple access technology based on multi-dimensional codebook, which can effectively address challenges in 5G such as massive connectivity, high spectral efficiency and millisecond delay. For th...
Indoor Mobility Map Construction and Localization Based on Wi-Fi Simultaneous Localization and Mapping Pixel Template Matching
ZHOU Mu, LIU Yiyao, YANG Xiaolong, ZHANG Qiao, TIAN Zengshan
2018, 40(5): 1050-1058. doi: 10.11999/JEIT170781
Abstract:
This papers propose a novel integrated Wi-Fi and Micro Electronic Mechanical Systems (MEMS) indoor mobility map construction and localization approach. First of all, a method is proposed for constructing mobility map based on trajectory main path by ...
TD-LTE Distributed Antenna System Based Indoor Localization Algorithm with Correlation Sequence
LI Lingxia, GUO Keke, TIAN Zengshan, ZHOU Mu
2018, 40(5): 1059-1065. doi: 10.11999/JEIT170655
Abstract:
In the Time Division Long Term Evolution (TD-LTE) indoor distributed network, the signal differences among different positions are insignificant, thus accurate localization can not be achieved by reference point calibration. To solve this compelling ...
Physical Layer Authentication Based on Tag Signal
SONG Huawei, JIN Liang, ZHANG Shengjun
2018, 40(5): 1066-1071. doi: 10.11999/JEIT170672
Abstract:
This paper proposes a new method of authentication based on piling up tag signal. Using the advantage of legality sides sharing a private key and having coherent channel state information in short time, the sender produces a tag signal from spread fr...
Constacyclic Hermitian Dual-containing Codes over Finite Fields and Their Application
ZHU Shixin, HUANG Shan, LI Jin
2018, 40(5): 1072-1078. doi: 10.11999/JEIT170735
Abstract:
In this paper, constacyclic codes over the finite fieldGF(q2) of length(q2m-1)/(q2-1) are studied. A sufficient and necessary condition for a class of constacyclic codes to be Hermitian dual-containing codes is given, and the parameters of this class...
Provable and Secure Traditional Public Key Infrastructure-certificateless Public Key Cryptography Heterogeneous Aggregate Signcryption Scheme
ZHANG Yulei, WANG Huan, MA Yanli, LIU Wenjing, WANG Caifen
2018, 40(5): 1079-1086. doi: 10.11999/JEIT170712
Abstract:
Heterogeneous signcryption can be used to guarantee the confidentiality and the unforgeability in the different cryptographies. By analyzing some existing heterogeneous signcryption schemes, it is found that they only deal with a single message and c...
Research on Heterogeneous-backup Virtual Network Embedding
JI Xinsheng, ZHAO Shuo, AI Jianjian, CHENG Guozhen, QI Chao
2018, 40(5): 1087-1093. doi: 10.11999/JEIT170730
Abstract:
The failure of a single physical server will cause a bad impact on the performance of the virtual networks in the cloud computing and data center environments. The existing approaches that provision redundant and backup physical resources are able to...
Network Video Traffic Classification Based on Probability Distribution of M Value
YANG Lingyun, DONG Yuning, WANG Zaijian, TANG Pingping
2018, 40(5): 1094-1100. doi: 10.11999/JEIT170617
Abstract:
To obtain better results for fine-grained video traffic classification, this paper analyzes the relationship between the feature variations during transmission and video traffic classification. According to the nature that different types of video se...
Coverage-preserving Clustering Algorithm for Underwater Sensor Networks Based on the Sleeping Mechanism
DIAO Pengfei, WANG Yanjiao
2018, 40(5): 1101-1107. doi: 10.11999/JEIT170787
Abstract:
A new network deployment algorithm is proposed for the problem of low network lifetime and low network coverage of underwater sensor networks. Firstly, the node which has a higher network coverage redundancy should be asleep. Then the network coverag...
Dynamic MAC Mechanism for Underwater Glider Networks
JIN Zhigang, WU Ting, SU Yishan, YANG Qiuling
2018, 40(5): 1108-1114. doi: 10.11999/JEIT170590
Abstract:
The movement of the underwater gliders leads to the change in the position and relative distance among the gliders, which causes a change in the propagation delay of packets between gliders, and then it leads to a decrease in the reliability of commu...
Synthesis of Flat-topped Beams in Wireless Power Transmission
CHEN Cheng, HUANG Kama
2018, 40(5): 1115-1121. doi: 10.11999/JEIT170710
Abstract:
Flat-topped beams can provide a uniform power density to the receiver in wireless power transmission, which is of great significance to improve the receiving efficiency and to simplify the design of rectifier circuit. This paper firstly studies the c...
Low Radar Cross Section of Planar Printed Magneto-electric Dipole Antenna Based on Wide-band Metamaterial Absorber
LAN Junxiang, CAO Xiangyu, GAO Jun, ZHENG Yuejun, ZHANG Chen
2018, 40(5): 1122-1129. doi: 10.11999/JEIT170721
Abstract:
A broadband planar printed Magneto-Electric (ME) dipole antenna and a Wide-Band Metamaterial Absorber (WBMA) with polarization-insensitive and wide-angle absorption are designed for X band application. The absorber exhibits absorptivity above 90% fro...
Signal Sorting Algorithm for Stagger Pulse Repetition Interval Radar Based on Data Association Processing
LIU Zheng, GAO Chao, LI Yue
2018, 40(5): 1130-1135. doi: 10.11999/JEIT170793
Abstract:
To solve the technical problem of blind sorting of electronic interception signal, combined with the characteristics of pulse repetition interval stagger mode, based on the statistical clustering and data association, the algorithm for stagger pulse ...
Multi-target DOA Estimation Using Beam-Doppler Unitary ESPRIT
WEN Cai, WU Jianxin, WANG Tong, ZHOU Yan, PENG Jinye
2018, 40(5): 1136-1143. doi: 10.11999/JEIT170707
Abstract:
High-resolution Direction Of Arrival (DOA) estimation is a critical issue for mainbeam multi-target tracking in ground-based or airborne early warning radar system. A Beam-Doppler Unitary ESPRIT (BD- UESPRIT) algorithm is proposed to deal with this p...
Research on Self-calibration Method of Domestic Spiral Scanning Laser Radar System
YANG Shujuan, SHAO Yongshe, ZHANG Keshu
2018, 40(5): 1144-1150. doi: 10.11999/JEIT170723
Abstract:
This paper presents a new algorithm for self-calibration of spiral scanning airborne laser radar system. Firstly, the mathematic model of the point cloud location of the spiral scanning laser radar is deduced. Then the surface features of the overlap...
MIMO Radar Orthogonal Waveform Set Design Based on Chirp Durations
LI Hui, ZHAO Yongbo, CHENG Zengfei
2018, 40(5): 1151-1158. doi: 10.11999/JEIT170426
Abstract:
Due to the large time-bandwidth product, Linear Frequency Modulation (LFM) signals are widely used, and their diversity can be applied to orthogonal waveform set design for MIMO radar. To solve the problems of the correlation functions of the existin...
An Improved Multi-baseline InSAR Height Reconstruction Method Based on Interferogram Residues
XIE Xianming, TANG Chao
2018, 40(5): 1159-1165. doi: 10.11999/JEIT170775
Abstract:
This paper proposes an improved multi-baseline InSAR height reconstruction approach to reconstruct height models of discontinuous terrains through combining with the Maximum A Posteriori (MAP) estimation based on Total Variation (TV) model energy fun...
Edge Detection Algorithm for SAR Image Based on Enhanced ROEWA
HU Yan, SHAN Zili, GAO Feng
2018, 40(5): 1166-1172. doi: 10.11999/JEIT170806
Abstract:
Researchers generally consider that Ratio Of Exponentially Weighted Averages (ROEWA) can not calculate the edge directions of SAR images. Therefore, some directional filters are used to add directions to ROEWA. In this paper, an Enhanced ROEWA (EROEW...
A Direction of Arrial Estimation Algorithm for Translational Nested Array Besed on Sparse Bayesian Learning
CHEN Lu, BI Daping, PAN Jifei
2018, 40(5): 1173-1180. doi: 10.11999/JEIT170737
Abstract:
The performance of direction finding for nested array degrades due to the mutual coupling effect among the elements. Two different translational nested array structures are proposed. In order to ensure that the virtual array has no holes, a translati...
An Underwater Measurement and Control Network Centralized Data Fusion Localization Algorithm Based on Chan-algorithm
LIANG Guolong, ZHAO Tianbai, ZOU Nan, ZHANG Boxuan
2018, 40(5): 1181-1186. doi: 10.11999/JEIT170727
Abstract:
In order to exploit the development potential of current measurement and control equipment and to build an omnibus underwater measurement and control network with higher precision, according to the working characteristics of the system itself, an und...
A Dual Micro-array Speech Enhancement Method
ZENG Qingning, XIAO Qiang, WANG Yao, XIE Xianming, LONG Chao
2018, 40(5): 1187-1194. doi: 10.11999/JEIT170758
Abstract:
In order to improve the performance of speech communication system in noisy environment, a dual micro-array speech enhancement method based on subband spectrum subtraction and generalized sidelobe canceller is proposed. Based on dual micro-array stru...
Noise Variance Estimation Method Based on Regression Analysis and Principal Component Analysis
WU Jiang, YOU Fei, JIANG Ping
2018, 40(5): 1195-1201. doi: 10.11999/JEIT170624
Abstract:
Accurate and reliable blind noise estimation is an important research topic of digital image processing. The main challenge is how to extract pure noise information for estimating. In recent years, many algorithms use principal component analysis tec...
Visual Object Tracking Based on Multi-exemplar Regression Model
ZHANG Yuanqiang, ZHA Yufei, KU Tao, WU Min, BI Duyan
2018, 40(5): 1202-1209. doi: 10.11999/JEIT170717
Abstract:
Most of the tracking-by-detection algorithms treat the tracking task as a category classification task, when the target experience deformation or encounter similar objects interference, the model drift is prone to occur. In this paper, a multi-exempl...
Salient Object Detection via Multi-feature Diffusion-based Method
YE Feng, HONG Siting, CHEN Jiazhen, ZHENG Zihua, LIU Guanghai
2018, 40(5): 1210-1218. doi: 10.11999/JEIT170827
Abstract:
Most existing salient object detection methods based on diffusion theory usually only use one feature of image to construct graph and diffusion matrix, and ignore the possibility that salient objects appear at the border regions of the image. In this...
Array-based Direct Position Determination Method Fusing Doppler Frequency Shift Information
WANG Daming, REN Yanqing, LU Zhiyu, BA Bin, CUI Weijia
2018, 40(5): 1219-1225. doi: 10.11999/JEIT170608
Abstract:
The Direct Position Determination (DPD) methods outperform the classic two-step localization methods in localization accuracy, while the existing DPD methods based on array antenna models do not exploit Doppler frequency shift information to improve ...
Fast DOA Estimation of Distributed Noncircular Sources by Cross-correlation Sampling Decomposition
CUI Weijia, DAI Zhengliang, BA Bin, LU Hang
2018, 40(5): 1226-1233. doi: 10.11999/JEIT170663
Abstract:
In the Direction Of Arrival (DOA) estimation of incoherently distributed noncircular sources, the increase of dimension caused by array output matrix extension can cause a large computational complexity. To solve this problem, a rapid DOA estimation ...
Learning Bayesian Network Structure from Node Ordering Searching Optimal
LIU Bin, WANG Haiyu, SUN Meiting, LIU Haoran, IU Yongji, HANG Chunlan
2018, 40(5): 1234-1241. doi: 10.11999/JEIT170675
Abstract:
The performance of the K2 algorithm depends on node ordering heavily, and the genetic algorithm can not find the node ordering effectively. For these problems, a new Bayesian structure learning algorithm, named NOK2 (Node Ordering searching for K2 al...
Research on Target Tracking Algorithm from Fisheye Camera Based on Compressive Sensing
LI Yaqian, JIA Lu, LI Haibin, ZHANG Wenming, ZHANG Yansong
2018, 40(5): 1242-1249. doi: 10.11999/JEIT170745
Abstract:
For object detection in fisheye images which present serious distortion, an object tracking method is proposed to deal with scale variance, pose change and distortion. Firstly, gray feature and gradient feature are combined to obtain a high dimension...
Image Reconstruction Algorithm for Electrical Capacitance Tomography Based on Sparsity Adaptive Compressed Sensing
WU Xinjie, YAN Shiyu, XU Panfeng, YAN Hua
2018, 40(5): 1250-1257. doi: 10.11999/JEIT170794
Abstract:
In order to improve quality of the reconstructed images of the Electrical Capacitance Tomography (ECT) system, an improved sparsity adaptive matching pursuit compressed sensing algorithm is proposed. Based on the coherence point of Compressed Sensing...
Multi-feature Fusion Based on Semantic Understanding Attention Neural Network for Chinese Text Categorization
XIE Jinbao, HOU Yongjin, KANG Shouqiang, LI Baiwei, ZHANG Xiao
2018, 40(5): 1258-1265. doi: 10.11999/JEIT170815
Abstract:
In Chinese text categorization tasks, the locations of the important features in the Chinese texts are disperse and sparse, and the different characteristics of Chinese texts contributes differently for the recognition of their categories. In order t...
High Resolution W-band SAR
DONG Yongwei, LI Yanlei, DING Manlai, LIANG Xingdong
2018, 40(5): 1266-1270. doi: 10.11999/JEIT170461
Abstract:
A miniaturized high resolution W-band SAR system developed by the Institute of Electronics of the Chinese Academy of Sciences is introduced. The parameters, architecture of the system and signal processing method are described in detail. The solution...