Advanced Search

2018 Vol. 40, No. 7

Display Method:
Satellite Platform Jitter Detection and Image Geometric Quality Compensation Based on High-frequency Angular Displacement Data
HU Kun, HUANG Xu, ZHANG Yongjun, YOU Hongjian
2018, 40(7): 1525-1531. doi: 10.11999/JEIT170990
Abstract:
With the improvement of imaging resolution and on-orbit mobility of earth observation satellites, the imaging geometric quality is more apparently influenced by the attitude’s high-frequency jittering of satellite platform. The traditional time-divis...
Three Dimensional Path Planning of UAV with Improved Ant Lion Optimizer
HUANG Changqiang, ZHAO Kexin
2018, 40(7): 1532-1538. doi: 10.11999/JEIT170961
Abstract:
Unmanned Aerial Vehicle (UAV) 3D path planning is the most complex and important part of mission planning. Considering at the problem that the problem of 3D path planning can not be solved by the original algorithm perfectly, so firstly the chaotic a...
Research on Detection Methods to Periodic Pulsed Interference for L Band Microwave Radiometer in Time Domain
JIANG Tao, ZHAO Kai, WAN Xiangkun
2018, 40(7): 1539-1545. doi: 10.11999/JEIT170954
Abstract:
L-band passive microwave remote sensing is an effective method for detection of soil moisture and ocean salinity. However, spectrum pollution from Global Positioning System (GPS), radar and electromagnetic radiation from some commercial electronic pr...
Target Point Tracks Association and Error Correction with Optical Satellite in Geostationary Orbit and Automatic Identification System
LIU Yong, YAO Libo, WU Yuzhou, XIU Jianjuan, ZHOU Zhimin
2018, 40(7): 1546-1552. doi: 10.11999/JEIT170896
Abstract:
When ship target is monitored by the geostationary optical satellite, the positioning error is large due to the long distance between the target and the satellite, which affects the accuracy of the follow-up target tracking. As the monitoring area is...
Equivalent Simulation Method for Pulse Radar ISAR Imaging in Radio Frequency Simulation
LIU Xiaobin, LIU Jin, LIU Guangjun, ZHAO Feng, WANG Guoyu
2018, 40(7): 1553-1560. doi: 10.11999/JEIT170931
Abstract:
Pulse radar signal is widely used in Inverse Synthetic Aperture Radar (ISAR) imaging. However, because the propagation distance obtained by the pulse width is larger than the size of anechoic chamber, target echo returns before the pulse signal is fu...
Robust Channel Mismatch Estimation in Multichannel HRWS SAR Based on Range Spectrum Analysis
FANG Chao, LIU Yanyang, SUO Zhiyong, LI Zhenfang, CHEN Junli
2018, 40(7): 1561-1566. doi: 10.11999/JEIT170996
Abstract:
In multichannel High-Resolution and Wide-Swath (HRWS) Synthetic Aperture Radar (SAR) systems, channel amplitude and phase mismatches would degrade the performance of azimuth ambiguity suppression as well as range sampling mismatches. To address this ...
Recognition of Pulse Repetition Interval of Multilayer Percetron Network Based on Multi-parameter TDOA Sorting
CHEN Tao, WANG Tianhang, GUO Limin
2018, 40(7): 1567-1574. doi: 10.11999/JEIT170913
Abstract:
In modern warfare, the radar system is developing rapidly. To recognize complex modulation mode of radar signal and hybrid pulse repetition interval radar, this paper proposes a sorting method based on multi station acquired pulse time-difference par...
Range Scaling Compensation Method Based on STOLT Interpolation in Broadband Squint SAS Imaging
WANG Jinbo, TANG Jinsong, ZHANG Sen, ZHONG Heping
2018, 40(7): 1575-1582. doi: 10.11999/JEIT171068
Abstract:
Considering the problem of large squint synthetic aperture sonar imaging, the analytical expression of the wavenumber spectrum is analyzed in detail in the radial and azimuth wavenumber fields under the wide-band high-squint conditions. The spectrum ...
Variational Bayesian-interacting Multiple Model Tracking Filter with Angle Glint Noise
XU Hong, YUAN Huadong, XIE Wenchong, LIU Weijian, WANG Yongliang
2018, 40(7): 1583-1590. doi: 10.11999/JEIT171025
Abstract:
Research on target tracking with glint noise is important to improve detection performance of sensor, in which the glint noise’s unknown distribution and non-stationary property puzzle researchers for a long time. In order to solve this problem, the ...
Time Difference of Arrival Passive Location Based on Salp Swarm Algorithm
CHEN Tao, WANG Mengxin, HUANG Xiangsong
2018, 40(7): 1591-1597. doi: 10.11999/JEIT170979
Abstract:
To solve the nonlinear equation problems of Time-Difference-Of-Arrival (TDOA) passive location, a new swarm intelligence optimization algorithm called Salp-Swarm-Algorithm (SSA) is used. Firstly, a new renewal model of salps is proposed to balance ex...
Symbol Rate Estimation Based on Sparse Bayesian Learning
JIN Yan, TIAN Tian, JI Hongbing
2018, 40(7): 1598-1603. doi: 10.11999/JEIT170906
Abstract:
Existing methods for symbol rate estimation of phase coded signals require amounts of sensing data, and are of high computational complexity. This paper analyzes the structure characteristics of BPSK signals, which are employed as the prior informati...
DOA Estimation for Co-prime Array Based on Fast Sparse Bayesian Learning Using Bessel Priors
FENG Mingyue, HE Minghao, CHEN Changxiao, HAN Jun
2018, 40(7): 1604-1611. doi: 10.11999/JEIT170951
Abstract:
In order to improve DOA estimation accuracy of co-prime array while the number of snapshots is small, a novel fast Sparse Bayesian Learning (SBL) algorithm using Bessel priors is proposed. Focusing on the multi-snapshots complex output data of coprim...
Teager Energy Operator and Empirical Mode Decomposition Based Voice Activity Detection Method
SHEN Xizhong, ZHENG Xiaoxiu
2018, 40(7): 1612-1618. doi: 10.11999/JEIT171014
Abstract:
In recent years, Teager energy operator is proposed as a kind of nonlinear method characterized with tracking a time-varying signal. The operator is combined with empirical mode decomposition, and a new method of voice activity detection is proposed ...
Canonical Correlation Analysis Based Sparse Representation Model for Robust Visual Tracking
KANG Bin, CAO Wenwen, YAN Jun, ZHANG Suofei
2018, 40(7): 1619-1626. doi: 10.11999/JEIT170939
Abstract:
In traditional sparse representation based visual tracking, particle sampling is first achieved by particle filter method. Then the particle observations are represented by intensity feature. Finally, the visual tracking is achieved by the intensity ...
Research and Implementation on Flower Plants Rendering Technology Based on Physical Light Simulation for VR Application
HUAI Yongjian, ZHANG Han, ZHANG Shuai
2018, 40(7): 1627-1634. doi: 10.11999/JEIJ170995
Abstract:
The high realism simulation interaction of flower plants is an important direction of virtual plant visualization. More and more applications are presented by the Virtual Reality (VR) headset device with the popularity of virtual reality technology. ...
Efficient Audio-visual Cross-modal Speaker Tagging via Supervised Joint Correspondence Auto-encoder
LIU Xin, LI Heyang, ZHONG Bineng, DU Jixiang
2018, 40(7): 1635-1642. doi: 10.11999/JEIT171011
Abstract:
Cross-modal speaker tagging aims to learn the latent relationship between different biometrics for mutual annotation, which can potentially be utilized in various human-computer interactions. In order to solve the “semantic gap” between the face and ...
Improved Binary Glowworm Swarm Optimization Combined with Complementarity Measure for Ensemble Pruning
ZHU Xuhui, NI Zhiwei, NI Liping, JIN Feifei, CHENG Meiying, LI Jingming
2018, 40(7): 1643-1651. doi: 10.11999/JEIT170984
Abstract:
The key to the success of an ensemble system are the diversity and the average accuracy of base classifiers. The increase of diversity among base classifiers will lead to the decrease of the average accuracy, and vice versa. So there exists a tradeof...
An Efficient Ciphertext-policy Attribute-based Encryption on Ideal Lattices
ZHAO Jian, GAO Haiying, HU Bin
2018, 40(7): 1652-1660. doi: 10.11999/JEIT170863
Abstract:
The existing Ciphertext-Policy Attribute-Based Encryption (CP-ABE) schemes from lattices are inefficient while they are performed in matrix operation, and these Key-Policy Attribute-Based Encryption (KP-ABE) schemes from ideal lattices with higher ef...
Expressive Ciphertext-policy Attribute-based Encryption Scheme with Fast Decryption and Constant-size Secret Keys
LI Long, GU Tianlong, CHANG Liang, XU Zhoubo, QIAN Junyan
2018, 40(7): 1661-1668. doi: 10.11999/JEIT171086
Abstract:
Under the premise of ensuring the security of Ciphertext-Policy Attribute Based Encryption (CP-ABE), to enhance efficiency as much as possible is always a research hotspot in the field of cryptography. Starting from the access structure, which is the...
Analysis of Constructing Fully Homomorphic Encryption Based on the Abstract Decryption Structure
SONG Xinxia, CHEN Zhigang
2018, 40(7): 1669-1675. doi: 10.11999/JEIT170997
Abstract:
Why can fully homomorphic encryption be constructed based on lattice What is the essence and construction of the matrix An important concept is proposed: Abstract decryption structure. Based on the abstract decryption structure, the main factors rela...
Malicious Attack-resistant Secure Localization Algorithm for ZigBee Network
YU Bin, LIU Ziqing
2018, 40(7): 1676-1683. doi: 10.11999/JEIT170962
Abstract:
A malicious attack-resistant secure localization algorithm Evolutionary Location Algorithm with the Maximum Probability value (ELAMP) based on evolutionism is proposed. According to the maximum likelihood estimation probability model and the distribu...
A Virtual Network Embedding Algorithm Based on Topology Potential
LIU Xinbo, WANG Buhong, YANG Zhixian, LIU Shuaiqi
2018, 40(7): 1684-1690. doi: 10.11999/JEIT170981
Abstract:
To improve the low acceptance ratio and revenue-cost ratio caused by the negligence of the topology attribute of the nodes in the existing virtual network embedding algorithm, the theory of fields in physics is introduced into the virtual network emb...
Delay Minimization Retransmission Scheme Based on Instantly Decodable Network Coding for D2D Communications
WANG Lian, WANG Meng, REN Zhihao, BAI Jiajie
2018, 40(7): 1691-1698. doi: 10.11999/JEIT170976
Abstract:
A delay minimization retransmission scheme based on an instantly decodable network coding is proposed to solve the conflict problem when multiple devices cooperatively retransmit in Device-to-Device (D2D) wireless networks concurrently. In retransmis...
Online Task Allocation of Spatial Crowdsourcing Based on Dynamic Utility
YU Dunhui, ZHANG Lingli, FU Cong
2018, 40(7): 1699-1706. doi: 10.11999/JEIT170930
Abstract:
In order to improve the overall effectiveness of the online assignment of crowdsourcing tasks, an online task assignment method is proposed for the space-time crowdsourcing environment. To deal with the problem of online task assignment in spatiotemp...
Information Propagation Control Method in Social Networks Based on Exact Controllability Theory
HUANG Hongcheng, LAI Licheng, HU Min, SUN Xinran, TAO Yang
2018, 40(7): 1707-1714. doi: 10.11999/JEIT170966
Abstract:
In order to control the information propagation of the whole network at a lower cost, some information propagation control methods are introduced into social networks to select the best control point at a proper time. However, few work considers the ...
Research of Network Capacity and Transmission Energy  Consumption in WSNs Based on Game Theory
HAO Xiaochen, LIU Jinshuo, YAO Ning, XIE Lixia, WANG Liyuan
2018, 40(7): 1715-1722. doi: 10.11999/JEIT170927
Abstract:
To solve the problem that the network capacity decreases with the increasing interference in Wireless Sensor Networks (WSNs), a joint power control and channel allocation optimization game model is constructed, which considers the limitation of netwo...
Algorithm for Computing the k-error Linear Complexity and the Corresponding Error Sequence of 2pn-periodic Sequences over GF(q)
NIU Zhihua, KONG Deyu
2018, 40(7): 1723-1730. doi: 10.11999/JEIT170972
Abstract:
The k-error linear complexity of a sequence is a fundamental concept for assessing the stability of the linear complexity. After computing the k-error linear complexity of a sequence, those bits that make the linear complexity reduced also need to be...
Stochastic Programming and Buyer-seller Game Methods for Workload Distribution in an Ad-hoc Mobile Cloud
ZHANG Long, CAO Bin
2018, 40(7): 1731-1737. doi: 10.11999/JEIT170895
Abstract:

In order to solve the limitation of processing capacity and energy of single mobile equipment, the conception of Ad-hoc mobile cloud is proposed recently, in which a mobile device can use the idle resources at other neighboring devices for processing...

Resource Scheduling Mechanism for Virtual Network Slice Based on Online Double Auction
CHEN Qianbin, SHI Yingjie, YANG Xixi, TANG Lun
2018, 40(7): 1738-1744. doi: 10.11999/JEIT170902
Abstract:
In order to solve the problem of resource allocation between 5G virtual network slice, a resource scheduling mechanism based on Online Double Auction (ODA) is proposed. Firstly, the priority of network slices and unit resource quotes are determined a...
Study on Tropospheric Scatter Beyond-line-of-sight Channel Transmission Loss for Short-term and Long-term Fading
WEI Peipei, DU Xiaoyan, JIANG Changyin
2018, 40(7): 1745-1751. doi: 10.11999/JEIT170952
Abstract:
Tropospheric scatter (Troposcatter) communication is an important means for ground microwave beyond-line-of-sight propagation. Available troposcatter transmission loss models are inefficient to describe the random variables resulting from atmosphere ...
Construction of Nearly Perfect Gaussian Integer Sequences
LI Yubo, CHEN Miao
2018, 40(7): 1752-1758. doi: 10.11999/JEIT170844
Abstract:
A construction of Gaussian integer sequences based on pseudo-random sequences. Gaussian integer sequences with periodpm-1 whose degree p-1 are constructed from p-ary pseudo-random sequences with periodpm-1. The presented sequences are nearly perfect ...
Fault-tolerant Last Level Cache Architecture Design at Near-threshold Voltage
LIU Wei, WEI Zhigang, DU Wei, CAO Guangyi, WANG Wei
2018, 40(7): 1759-1766. doi: 10.11999/JEIT170989
Abstract:
Near-threshold voltage computing enables transistor voltage scaling to continue with Moore’s Law projection and dramatically improves power and energy efficiency. However, a great number of bit-cell errors occur in large SRAM structures, such as Last...
Investigation of Quasi-optical Mode Converter for W Band Gyrotron
ZHAO Guohui, XUE Qianzhong, WANG Yong, WANG Hu, GENG Zhihui, ZHANG Shan, WANG Xuewei
2018, 40(7): 1767-1773. doi: 10.11999/JEIT170998
Abstract:
The design and experimental verification of the launcher and mirror system of W band TE62 mode gyrotron quasi optical mode converter are presented. Based on the coupled mode theory, two order perturbation is used to design the launcher. The field dis...
Cognitive Radar Waveform Design with A Peak to Average Power Ration Constraint for Spectrally Dense Environments
ZOU Kun, LUO Yanbo, LI Wei, LI Hailin
2018, 40(7): 1774-1778. doi: 10.11999/JEIT170834
Abstract:
The most important characteristic of the complex electromagnetic environment is the limitation of the radio frequency resource. As a result, the smart use of the limiting spectral resource is necessary to the waveform design for the cognitive radar. ...