Advanced Search

2018 Vol. 40, No. 6

Display Method:
UAV Distributed Swarm Situation Awareness Model
GAO Yang, LI Dongsheng, CHENG Zexin
2018, 40(6): 1271-1278. doi: 10.11999/JEIT170877
Abstract:
The distributed swarm operation of unmanned systems represented by Unmanned Aerial Vehicle (UAV) is the growth point of the future war, and the swarm situation awareness is an important part. Based on the typical situation awareness model, the distri...
Improved Gaussian Inverse Wishart Probability Hypothesis Density for Extended Target Tracking
LI Wenjuan, Lü Jing, GU Hong, SU Weimin, MA Chao, YANG Jianchao
2018, 40(6): 1279-1286. doi: 10.11999/JEIT170883
Abstract:
Assumed that extension and measurement number of Extended Targets (ET) are respectively modeled as ellipse and Poisson, a Gaussian Inverse Wishart Probability Hypothesis Density (GIW-PHD) filter can estimate kinematic and extension states. However, f...
Ordered Code-based Kernel Extreme Learning Machine for Ordinal Regression
LI Peijia, SHI Yong, WANG Huadong, NIU Lingfeng
2018, 40(6): 1287-1293. doi: 10.11999/JEIT170765
Abstract:
Ordinal regression is one of the supervised learning issues, which resides between classification and regression in machine learning fields. There exist many real problems in practice, which can be modeled as ordinal regression problems due to the or...
Infrared and Visible Image Fusion Based on Contrast Enhancement and Multi-scale Edge-preserving Decomposition
ZHU Haoran, LIU Yunqing, ZHANG Wenying
2018, 40(6): 1294-1300. doi: 10.11999/JEIT170956
Abstract:
The visibility of the visible images is not good under the poor lighting condition. If the visible and infrared images are fused directly, the resolution of the fused images is not ideal. In order to solve this problem, a modified infrared and visibl...
Robust Texture Classification Method Based on Pyramid Decomposition and Sectored Local Mean Binary Pattern
SONG Tiecheng, LUO Lin, ZHANG Gang, LUO Zhongtao, ZHANG Tianqi
2018, 40(6): 1301-1308. doi: 10.11999/JEIT170884
Abstract:
The traditional Local Binary Pattern (LBP) has limited feature discrimination and is sensitive to the noise. In order to alleviate these problems, this paper proposes a method to extract texture features based on pyramid decomposition and sectored lo...
Moving Object Detection Optimization Algorithm Based on Robust Principal Component Analysis
YANG Yizhong, WANG Pengfei, HU Xionglou, WU Nengju
2018, 40(6): 1309-1315. doi: 10.11999/JEIT170789
Abstract:
Since dynamic background may be erroneously detected as a moving object in the Robust Principal Component Analysis (RPCA) algorithm, a RPCA-based moving object detection optimization algorithm is proposed to improve it. After detected by the RPCA alg...
Cluster Ensemble Approach Based on T-distributed Stochastic Neighbor Embedding
XU Sen, HUA Xiaopeng, XU Jing, XU Xiufang, GAO Jun, AN Jing
2018, 40(6): 1316-1322. doi: 10.11999/JEIT170937
Abstract:
T-distributed Stochastic Neighbor Embedding (TSNE) is introduced into cluster ensemble problem and a cluster ensemble approach based on TSNE is proposed. First, TSNE is utilized to minimize Kullback-Leibler divergences between the high-dimensinal poi...
Positioning and Calibration Method of Underground Personnel Based on Priori Features
YUAN Yazhou, SUN Xiaoqin, LI Yuefeng, GUAN Xinping
2018, 40(6): 1323-1329. doi: 10.11999/JEIT170749
Abstract:
Focusing on the problem that the personnel positioning methods are seriously influenced by the indoor environment, big cumulative error and other issues, a method is proposed to correct the position, which combines the prior knowledge of the map and ...
Nighttime Haze Removal Based on New Imaging Model with Artificial Light Sources
YANG Aiping, WANG Nan, PANG Yanwei, YANG Suhui
2018, 40(6): 1330-1337. doi: 10.11999/JEIT170704
Abstract:
The non-uniform illumination, low brightness, serious color deviation and halo effects around artificial light sources lead to the difficulty in haze removal for night-time image. The existing dehazing methods are mostly designed for daytime image an...
Facial Expression Recognition Based on Local Texture and Shape Features
HU Min, TENG Wendi, WANG Xiaohua, XU Liangfeng, YANG Juan
2018, 40(6): 1338-1344. doi: 10.11999/JEIT170799
Abstract:
In order to improve the inadequacies of Local Binary Pattern (LBP), Center-Symmetric Local Binary Pattern (CS-LBP) and Histogram of Oriented Gradient (HOG) algorithm, Center-Symmetric Local Smooth Binary Pattern (CS-LSBP) and Histogram of Oriented Ab...
Heart Rate Estimation from Face Videos Against Motion Interference
YANG Zhao, YANG Xuezhi, HUO Liang, LIU Xuenan, LI Jiangshan
2018, 40(6): 1345-1352. doi: 10.11999/JEIT170824
Abstract:
A novel non-contact heart rate estimation method is proposed to deal with the issue of heart rate measurement from face videos under motion interference in realistic situations, it is hard to estimate heart rate accurately using existing methods. Fir...
Low Dose CT Lung Denoising Model Based on Deep Convolution Neural Network
Lü Xiaoqi, WU Liang, GU Yu, ZHANG Ming, LI Jing
2018, 40(6): 1353-1359. doi: 10.11999/JEIT170769
Abstract:
In order to reduce the effect of low dose CT lung noise on the late diagnosis of lung cancer screening, a denoising model of low-dose CT lung based on deep convolution neural network is proposed. The input of the model is the complete CT lung image. ...
Online Sequential Extreme Learning Machine Based on M-estimator and Variable Forgetting Factor
GUO Wei, XU Tao, YU Jianjiang, TANG Keming
2018, 40(6): 1360-1367. doi: 10.11999/JEIT170800
Abstract:
To solve the online learning problem under the scenario of time-varying and containing outliers, this paper proposes an M-estimator and Variable Forgetting Factor based Online Sequential Extreme Learning Machine (VFF-M-OSELM). The VFF-M-OSELM is deve...
Calculation Optimization for Convolutional Neural Networks and FPGA-based Accelerator Design Using the Parameters Sparsity
LIU Qinrang, LIU Chongyang
2018, 40(6): 1368-1374. doi: 10.11999/JEIT170819
Abstract:
Concerning the problem of real-time restriction on the application of Convolution Neural Network (CNN) in embedded field, and the large degree of sparsity in CNN convolution calculations, this paper proposes an implement method of CNN accelerator bas...
2-D DOA Estimation of Distributed Array with Single Snapshot
WANG Jun, XIANG Hong, WEI Shaoming, JIANG Hai
2018, 40(6): 1375-1382. doi: 10.11999/JEIT170856
Abstract:
An algorithm of Direction Of Arrival (DOA) estimation based on the single-snapshot data is proposed for distributed Two-Dimensional (2-D) array. 2-D Hankle matrixes are firstly constructed using the single observation of every subarray element. Then ...
Matrix Completion Based Second Order Statistic Reconstruction DOA Estimation Method
WANG Hongyan, FANG Yunfei, PEI Bingnan
2018, 40(6): 1383-1389. doi: 10.11999/JEIT170826
Abstract:
Focusing on the problem of poor accuracy and low resolution of traditional Direction Of Arrival (DOA) estimation algorithm in the presence of non-uniform noise, based on the Matrix Complement theory, a Weighted L1 Sparse Reconstruction DOA estimation...
APG-MUSIC Algorithm Based on Sparse Sampling Array Optimization
SONG Hu, JIANG Naiti, LIU Rong, LI Hongtao
2018, 40(6): 1390-1396. doi: 10.11999/JEIT170807
Abstract:
A novel Two Dimension Direction Of Arrive (2D-DOA) estimation method based on sparse sampling array optimization is proposed, which is combined with Accelerated Proximal Gradient (APG) and MUltiple SIgnal Classification (MUSIC). First, a 2D-DOA estim...
Compressive Tracking Algorithm Based on Particle Filter and Sample Weighting
ZHANG Hongying, WANG Sainan, HU Wenbo
2018, 40(6): 1397-1403. doi: 10.11999/JEIT170854
Abstract:
To solve the problem that Compressive Tracking (CT) algorithm is unable to adapt to the scale change of the object and ignores the sample weight, an optimized compressive tracking algorithm based on particle filter and sample weighting is presented. ...
A Novel Takagi-Sugeno Fuzzy Systems Modeling Method for High Dimensional Data
LIN Defu, WANG Jun, JIANG Yizhang, WANG Shitong
2018, 40(6): 1404-1411. doi: 10.11999/JEIT170792
Abstract:
It is a great challenge to model Takagi-Sugeno(T-S) fuzzy systems on high dimensional data due to the problem of the curse of dimensionality. To this end, a novel T-S fuzzy system modeling method called WOMP-GS-FIS is proposed. The proposed method co...
Research on the Full Polarimetric Electromagnetic Scattering Characteristics of Ocean Rough Surface
WANG Tong, TONG Chuangming, LI Ximin, JI Weijie
2018, 40(6): 1412-1418. doi: 10.11999/JEIT170924
Abstract:
Considering the fact that the classical two scale model which is based on the Geometrical Optics-Small Perturbation Method (GO-SPM) is sensitive to the cut-off wave number, a two scale model derived from the Geometrical Optics-Small Slope Approximati...
Spectrum Shifting for UHF Radar Based on Salisbury Screen
LIAO Xi, WANG Yang, CHEN Qianbin, SHAO Yu, YE Zhihong
2018, 40(6): 1419-1425. doi: 10.11999/JEIT170833
Abstract:
To reduce Radar Cross-Section (RCS), improve operation bandwidth, this paper proposes an innovative Salisbury screen based on time-controlled surface and researches the frequency shifting of UHF radar signal. First, a reflective modulation board whic...
Peak-to-average Power Ratio Reduction Algorithm of Artificial-noise-aided Secure Signal
HONG Tao, ZHANG Gengxin
2018, 40(6): 1426-1432. doi: 10.11999/JEIT170739
Abstract:
The research of improving the Secrecy Capacity (SC) of wireless communication system using Artificial Noise (AN) is one of the classics models in the field of physical layer security communication. Considering the Peak-to-Average Power Ratio (PAPR) p...
Design of Efficient Broadcast Transmission Strategy for Spatial Networks Based on LT Codes with Feedback Channel
SUO Longlong, ZHANG Genxin, BIAN Dongmin, Lü Jing, XIE Zhidong
2018, 40(6): 1433-1437. doi: 10.11999/JEIT170820
Abstract:
Since its wide coverage area, data broadcast is the major service of spatial system. However, due to the long distance and the complex, varied climate, data transmission suffers large round-trip-time and poor error performance. In order to achieve be...
An Hiding Algorithm of Nonzero Pulses Position Information Based on G.729 Speech Coding
WU Zhijun, GUO Anxin, SHEN Dandan
2018, 40(6): 1438-1445. doi: 10.11999/JEIT170879
Abstract:
VoIP (Voice over Internet Protocol) is based on voice stream, which has the advantages of large data transmission and wide application. But the VoIP system is confronted with the security threats of data security and privacy disclosure. Thus, accordi...
Intrusion Detection Method for MANET Based on Graph Theory
ZHANG Bingtao, WANG Xiaopeng, WANG Lücheng, ZHANG Zhonglin, LI Yanlin, LIU Hu
2018, 40(6): 1446-1452. doi: 10.11999/JEIT170756
Abstract:
Mobile Ad hoc NETwork (MANET) is vulnerable to various security threats, and intrusion detection is an effective guarantee for its safe operation. However, existing methods mainly focus on feature selection and feature weighting, and ignore the poten...
Temporal-aware Multi-category Products Recommendation Model Based on Aspect-level Sentiment Analysis
DING Yonggang, LI Shijun, FU Xing, LIU Mengjun
2018, 40(6): 1453-1460. doi: 10.11999/JEIT170938
Abstract:
Review data in e-commerce websites implicates items features and users sentiment. Most existing recommendation researches based on aspect-level sentiment analysis capture users aspect preference for items by extracting users sentiment towards differe...
Secrecy Performance Analysis of Cooperative Transmission for Multi-floor Building Indoor Wireless Networks
QI Xiaohui, HUANG Kaizhi, ZHONG Zhihao, JIN Liang, JI Xinsheng
2018, 40(6): 1461-1467. doi: 10.11999/JEIT170874
Abstract:
The particularity of security threats for Multi-floor building Indoor Wireless Networks (MIWNs) is mainly caused by its stochastic, dynamic and complex spatial topology. According to the features of MIWNs, such as the randomization of node distributi...
Adaptive Secure Transmission Strategy for Multiuser Massive MIMO
JIN Liang, SONG Haotian, ZHONG Zhou, XU Xiaoming
2018, 40(6): 1468-1475. doi: 10.11999/JEIT170974
Abstract:
Massive MIMO system using Space Division Multiple Access (SDMA) can improve system throughput, and the use of multi-user downlink signal collaboration can cause superimposed interference to the eavesdropper, bringing a natural security gain. However,...
Joint Design of Distributed MIMO Radar Orthogonal Waveforms and Mismatched Filter Bank
XU Leilei, ZHOU Shenghua, LIU Hongwei, MA Lin, YAN Junkun
2018, 40(6): 1476-1483. doi: 10.11999/JEIT170836
Abstract:
For the high Range Sidelobe Level (RSL) of designing distributed MIMO radar orthogonal phase coded waveforms and its mismatched filter bank separately, a joint design method of Orthogonal Phase Coded Waveforms and Mismatched Filter Bank (OPCW-MFB) is...
Integrated Electromechanical Model and Applications of Bridge Height and Phase Shift in Distributed MEMS Phase Shifter
WANG Congsi, YIN Lei, LI Fei, YING Kang, ZHANG Yiqun, WANG Meng
2018, 40(6): 1484-1491. doi: 10.11999/JEIT170762
Abstract:
Phase shifter is the steering wheel to control the beam direction of Phased Array Antenna (PAA), which determines the performance of the PAA. Micro Electronic Mechanical System (MEMS) phase shifter has obvious advantages for PAA, but there always exi...
A New Lossless Compression Algorithm Based on Array Configuration Speedup Model
XU Jinfu, LIU Lu, LI Wei, WANG Zhouchuang, YANG Yuhang
2018, 40(6): 1492-1498. doi: 10.11999/JEIT170900
Abstract:
In order to obtain efficient information transmission, the existing compression algorithms reduce the compression ratio by increasing complexity. In view of this problem, an array configuration speedup model is proposed in this paper. It is proved th...
Inversion of Disturbed Electron Temperature by Anomalous Incoherent Scatter Spectra with Pure-growth Mode Line
LI Haiying, KONG Pengfei, XU Bin, WU Zhensen
2018, 40(6): 1499-1504. doi: 10.11999/JEIT170823
Abstract:
In the fitting process of the incoherent scatter power spectra with pure-growth mode line and the inversion of the disturbed ionospheric parameters, the GUISDAP package which is based on the equilibrium incoherent scatter theory, always exits serious...
Overview on RF Stealth Technology Research
WANG Qianzhe, HE Zhaoyang, SONG Bowen, LI Huanyu
2018, 40(6): 1505-1514. doi: 10.11999/JEIT170945
Abstract:
With the development of airborne equipment and the intercepted receiving technology, the survivability of aircraft in electronic confrontation is seriously threatened. The concept and basic principles of radio frequency stealth, the research status a...
Synchronization Modeling and Stability of Cyberspace Operation Based on Collective Defensive Mechanism
WANG Gang, HU Xin, MA Runnian, LIU Wenbin
2018, 40(6): 1515-1519. doi: 10.11999/JEIT170619
Abstract:
Based on cyberspace security collective defensive mechanism and its synchronization, uncertainty factors are introduced in the synchronization of cyberspace operation, and the improved synchronization model is established. The stability of cyberspace...
Coarse Grained Reconfigurable Architecture Loop Mapping Algorithm Based on Memory Partitioning and Path Reuse
ZHANG Xingming, YUAN Kaijian, GAO Yanzhao
2018, 40(6): 1520-1524. doi: 10.11999/JEIT170748
Abstract:
The current research on Coarse Grained Reconfigurable Architecture (CGRA) loop mapping mainly focuses on operation placement and data routing, but seldom involves data mapping. To solve this problem, a mapping flow based on memory partitioning and pa...