Advanced Search

2019 Vol. 41, No. 1

contents
电子与信息学报2019-01期目录
2019, 41(1)
Abstract:
Network and Information Security
Robust Secure Transmission Scheme Based on Artificial Noise-aided for Heterogeneous Networks with Simultaneous Wireless Information and Power Transfer
Bo ZHANG, Kaizhi HUANG
2019, 41(1): 1-8. doi: 10.11999/JEIT180269
Abstract:

When the Channel State Information (CSI) is not accurate in heterogeneous networks with simultaneous wireless information and power transfer, to guarantee the security and reliability of information and energy transfer simultaneously, a robust secure...

Research on Joint Interference Coordination Approach in Ultra-dense Heterogeneous Network
Li LI, Peng YE, Zhangjie PENG, Yanzhi TANG
2019, 41(1): 9-15. doi: 10.11999/JEIT180290
Abstract:

This paper presents an approach of combining the existing enhanced inter-cell interference coordination technology and the downlink joint transmission scheme of coordinated multi-point transmission technology to solve the problem of serious cross-lay...

ARMA-prediction Based Online Adaptive Dynamic Resource Allocation in Wireless Virtualized Networks
Lun TANG, Xixi YANG, Yingjie SHI, Qianbin CHEN
2019, 41(1): 16-23. doi: 10.11999/JEIT180048
Abstract:

In order to solve the unreasonable virtual resource allocation caused by the uncertainty of service and delay of information feedback in wireless virtualized networks, an online adaptive virtual resource allocation algorithm proposed based on Auto Re...

Optimization Design Method for Sparse Code Multiple Access Codebooks
Xiaorong JING, Hongbao TAO
2019, 41(1): 24-31. doi: 10.11999/JEIT180208
Abstract:

As a competitive Non-Orthogonal Multiple Access (NOMA) technique, Sparse Code Multiple Access (SCMA) improves efficiently the system spectral efficiency by combining the high dimensional modulation and sparse spread spectrum. To address the existing ...

Diversity Gain of Distributed Linear Convolutive Space-time Code on Fast Fading Rayleigh Channels
Yi LIU, Ying MA, Xuan LIU
2019, 41(1): 32-37. doi: 10.11999/JEIT180343
Abstract:

In wireless relay networks, random transmission delays among relay nodes will lead to substantial performance degradation, for which delay-tolerant Distributed Linear Convolutive Space-Time Code (DLC-STC) is proposed. However, its diversity gain on f...

Dynamic Routing and Spectrum Assignment Algorithm Based on Differentiated Degraded-service and Adaptive Modulation in Elastic Optical Networks
Cunqian YU, Li ZHANG, Rongxi HE
2019, 41(1): 38-45. doi: 10.11999/JEIT180075
Abstract:

Oriented to the high-rapid development of Internet applications, new challenges are encountered by the conventional Routing and Spectrum Assignment (RSA). A new direction for the blocking rate reduction and the Quality of Experience (QoE) assurance i...

Impossible Differential Cryptanalysis of the Digital Video Broadcasting-common Scrambling Algorithm
Xuan SHEN, Bing SUN, Guoqiang LIU, Chao LI
2019, 41(1): 46-52. doi: 10.11999/JEIT180245
Abstract:

The Digital Video Broadcasting-Common Scrambling Algorithm (DVB-CSA) is a hybrid symmetric cipher. It is made up of the block cipher encryption and the stream cipher encryption. DVB-CSA is often used to protect MPEG-2 signal streams. This paper focus...

Verifiable Multi-keyword Search Encryption Scheme with Attribute Revocation
Jin SUN, Xiaojing WANG, Shangping WANG, Lili REN
2019, 41(1): 53-60. doi: 10.11999/JEIT180237
Abstract:

In recent years, searchable encryption technology and fine-grained access control attribute encryption is widely used in cloud storage environment. Considering that the existing searchable attribute-based encryption schemes have some flaws: It only s...

Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model
Mingming JIANG, Yuyan GUO, Lei YU, Wangan SONG, Shimin WEI
2019, 41(1): 61-66. doi: 10.11999/JEIT180146
Abstract:

Proxy re-encryption plays an important role for encrypted data sharing and so on in cloud computing. Currently, almost all of the constructions of identity-based proxy re-encryption over lattice are in the random oracle model. According to this probl...

A Noise Injection Scheme Resistant to Massive MIMO Eavesdropper in IoT
Jianhua PENG, Shuai ZHANG, Xiaoming XU, Kaizhi HUANG, Liang JIN
2019, 41(1): 67-73. doi: 10.11999/JEIT180342
Abstract:

The security issue of wireless transmission becomes a significant bottleneck in the development of Internet of Things (IoT). The limited computing capability and hardware configuration of IoT terminals and eavesdroppers equipped with massive Multiple...

Research on Placement Algorithm of Service Function Chaining Oriented to Software Defined Networking
Yu LU, Yicen LIU, Xi LI, Xingkai CHEN, Wenxin QIAO, Liyun CHEN
2019, 41(1): 74-82. doi: 10.11999/JEIT180264
Abstract:

For Network Function Virtualization (NFV) environment, the existing placement methods can not guarantee the mapping cost while optimizing the network delay, a service function chaining optimal placement algorithm is proposed based on the IQGA-Viterbi...

Energy Consumption and Delay-aware Resource Allocation Mechanism for Virtualization Cloud Radio Access Network
Ruyan WANG, Ningning XU, Dapeng WU
2019, 41(1): 83-90. doi: 10.11999/JEIT180063
Abstract:

To solve the problems of low resource utilization rate, high energy consumption and poor user service quality in the existing virtualized Cloud Radio Access Network (C-RAN), a virtual resource allocation mechanism based on energy consumption and dela...

Distributed Firewall Policy Based on Traffic Engineering in Software Defined Network
Jiugen SHI, Ji WANG, Jing ZHANG, Hao XU
2019, 41(1): 91-98. doi: 10.11999/JEIT180223
Abstract:

Firewall policy is defined as access control rules in Software Definition Network (SDN), and distributing these ACL (Access Control List) rules across the networks, it can improve the quality of service. In order to reduce the number of rules placed ...

An Adaptive Directional MAC Protocol for Terahertz Wireless Personal Networks
Zhi REN, Yuhui LÜ, Zhaokun XU, Mingrui ZOU, Jieli TIAN
2019, 41(1): 99-106. doi: 10.11999/JEIT180306
Abstract:

To reduce the beamforming training cost and network delay, make the best of Beacon and S-CAP sub-period in the existing Terahertz Wireless Personal Access Network (TWPAN) directional MAC protocols, an Adaptive Directional MAC (AD-MAC) protocol for TW...

Radar and Array Signal Processing
Synthesis of Multi-constrained Sparse Rectangular Arrays
Dingcheng DAI, Minli YAO, Weimin JIA, Wei JIN, Fenggan ZHANG
2019, 41(1): 107-114. doi: 10.11999/JEIT180262
Abstract:

A Novel Matrix Mapping (NMM) method is proposed for the synthesis of sparse rectangular arrays with multiple constraints. Firstly, the sizes of element coordinate matrices are resized to improve the Degree Of Freedom (DOF) of elements by taking accou...

Metasurface Antenna Design with Ultra-wideband RCS Reduction
Liaori JIDI, Xiangyu CAO, Jun GAO
2019, 41(1): 115-122. doi: 10.11999/JEIT180254
Abstract:

In this paper, two novel Artificial Magnetic Conductor (AMC) structures, based on circular loop patch and substrate, are designed to realize 180° reflection phase difference in a wide frequency band. These two AMCs’ reflection phase property is appli...

Anti-bias Track Association Algorithm of Radar and Electronic Support Measurements Based on Track Vectors Detection
Baozhu LI, Jian GUAN, Yunlong DONG
2019, 41(1): 123-129. doi: 10.11999/JEIT180303
Abstract:

To address track-to-track association problem of radar and Electronic Support Measurements (ESM) in the presence of sensor biases and different targets reported by different sensors, an anti-bias track-to-track association algorithm based on track ve...

Quality Analysis of Early Warning Radar Intelligence Based on Asymmetrical Proximity
Renzheng LIU, Kangsheng TIAN, Fuqiang PENG, Hao LI
2019, 41(1): 130-135. doi: 10.11999/JEIT180116
Abstract:

Considering the limits of fuzzy comprehensive evaluation on quality of early warning radar intelligence in actual training, a method of quality evaluation on radar intelligence based on the theory of asymmetric proximity and multilevel fuzzy comprehe...

Medium-earth-orbit SAR Data Focusing Method Based on Two-step Azimuth Resampling
Wenkang LIU, Guobin JING, Guangcai SUN, Quan CHEN, Mengdao XING
2019, 41(1): 136-142. doi: 10.11999/JEIT180238
Abstract:

The obvious orbit curvature of Medium Earth Orbit (MEO) results in severe two-dimensional space variance in the received signals. Thus, the focusing of MEO SAR data is still a problem to be solved. Fourth-order polynomial is used to model the range h...

Ship Detection in SAR images Based on Generative Adversarial Network and Online Hard Examples Mining
Jianwei LI, Changwen QU, Shujuan PENG, Yuan JIANG
2019, 41(1): 143-149. doi: 10.11999/JEIT180050
Abstract:

Deep learning based ship detection method has a strict demand for the quantity and quality of the SAR image. It takes a lot of manpower and financial resources to collect the large volume of the image and make the corresponding label. In this paper, ...

A Hyperspectral Imagery Anomaly Detection Algorithm Based on Cokurtosis Tensor
Lingbo MENG, Xiurui GENG
2019, 41(1): 150-155. doi: 10.11999/JEIT180280
Abstract:

The abnormal pixels in hyperspectral images are often have the characteristics of low probability and scattered outside the background data cloud. How to automatically detect these abnormal pixels is an important research direction in hyperspectral i...

Real-time Correction Model for Zenith Tropospheric Delay Applied to the Chinese Region
Xiaoyan DU, Jiang QIAO, Peipei WEI
2019, 41(1): 156-164. doi: 10.11999/JEIT180353
Abstract:

In view of the correction for tropospheric delay is limited by the shortage of sounding data, which leads to the problem that the low correction efficiency, this paper proposes a model named Sa+GPT2w, combining Saastamoinen model with GPT2w model. In...

Radio-frequency Interference Detection Algorithm for L-band Phased Array Microwave Radiometer
Hao LI, Hailiang LU, Rui YU, Rongchuan LÜ, Yinan LI, Jiakun WANG, Jungang MIAO
2019, 41(1): 172-179. doi: 10.11999/JEIT180203
Abstract:

At present, microwave radiometers suffer from serious Radio Frequency Interference (RFI), especially in low frequency. In this paper, a radio frequency detection algorithm is proposed for L-band phased array radiometer, which is used to measure the s...

Radar and Array Signal Processing 
Single Beacon Location Algorithm Based on Nonlinear Fading Filter Under Multiplicative Noise Background
Ziyao ZHU, Shuping HAN, Zhengdong GUO, Jianbo LIU
2019, 41(1): 165-171. doi: 10.11999/JEIT180239
Abstract:

Single beacon location algorithm based on additive noise model can not accurately represent the actual characteristics of distance measurement, leading to a problem of model mismatch. A two step location algorithm considering the multiplicative noise...

Image and Intelligent Information Processing
Robust Recommendation Algorithm Based on Core User Extraction with User Trust and Similarity
Ming ZHAO, Han YAN, Gaofeng CAO, Xinhong LIU
2019, 41(1): 180-186. doi: 10.11999/JEIT180142
Abstract:

Recommendation systems can help people make decisions conveniently. However, few studies consider the effect of removing irrelevant noise users and retaining a small number of core users to make recommendations. A new method of core user extraction i...

Design of Fast Differential Frequency Measurement System Based on FPGA
Fenhua WANG, Bin XIE, Huatao WANG
2019, 41(1): 187-194. doi: 10.11999/JEIT180243
Abstract:

For the problem of high precision frequency measurement of dynamic signals with high fundamental frequency and small frequency change value in electronic measurement, a method of differential frequency measurement is introduced. A novel dynamic adjus...

Electromagnetic Environment Complex Evaluation Algorithm Based on Fast S-transform and Time-frequency Space Model
Baiqiang YIN, Shudong WANG, Yigang HE, Lei ZUO, Bing LI, Zhen CHENG
2019, 41(1): 195-201. doi: 10.11999/JEIT180256
Abstract:

For qualitative and quantitative complex evaluation problem of electromagnetic environment. This paper proposes a novel electromagnetic environment complex evaluation algorithm based on fast S-transform and time-frequency space model, which can count...

Orthogonal Opposition Based Firefly Algorithm
Lingyun ZHOU, Lixin DING, Maode MA, Wan TANG
2019, 41(1): 202-209. doi: 10.11999/JEIT180187
Abstract:

Firefly Algorithm (FA) may suffer from the defect of low convergence accuracy depending on the complexity of the optimization problem. To overcome the drawback, a novel learning strategy named Orthogonal Opposition Based Learning (OOBL) is proposed a...

Improved No-reference Noisy Image Quality Assessment Based on Masking Effect and Gradient Information
Hongyan LUO, Ziyan ZHU, Rui LIN, Zhen LIN, Yanjian LIAO
2019, 41(1): 210-218. doi: 10.11999/JEIT180195
Abstract:

Heavy computational burden, or complex training procedure and poor universality caused by the manual setting of the fixed thresholds are the main issues associated with most of the noise image quality evaluation algorithms using domain transformation...

Consistency Enhancement Quality Assessment Criterion in Confidence Interval for Image Set
Hao LIU, Xiaofan SUN, Xinsheng ZHANG, Leming WU, Qigang KUANG
2019, 41(1): 219-225. doi: 10.11999/JEIT180272
Abstract:

When evaluating the enhancement quality of a whole image set, the existing average score criterion varies inconsistently with different image sets and produces a large evaluation quality fluctuation. Therefore, this paper proposes a consistency enhan...

Method for Compensating Distortion Created by Mismatch Errors in Time-interleaved ADCs Based on Offline Estimation and Online Correction
Yingquan ZOU, Tailong WU, Yusong PENG, Yihang SUN, Yigang LIU, Cuifang ZHANG
2019, 41(1): 226-232. doi: 10.11999/JEIT180098
Abstract:

A improved method is proposed for compensating the distortion created by mismatches in Time-Interleaved Analog-to-Digital Converters (TI ADCs). The error compensation of offset and gain is realized by error parameters, and the error compensation of s...

Application of Residual Network to Infant Crying Recognition
Xiang XIE, Liqiang ZHANG, Jing WANG
2019, 41(1): 233-239. doi: 10.11999/JEIT180276
Abstract:

The deep learning model based on the residual network and the spectrogram is used to recognize infant crying. The corpus has balanced proportion of infant crying and non-crying samples. Finally, through the 5-fold cross validation, compared with thre...

Single Channel Blind Separation Performance Bound of Non-cooperative Received Paired Carrier Multiple Access Mixed Signal
Yiming GUO, Hua PENG
2019, 41(1): 240-247. doi: 10.11999/JEIT180226
Abstract:

Blind separation performance bound of Paired Carrier Multiple Access (PCMA) mixed signal is a measure of the separability of mixed signals and the performance of the separation algorithm. For the PCMA mixed signal, the spatial mapping of the modulati...

Information of National Natural Science Foundation of China
2019, 41(1): 248-254.
Abstract: