Advanced Search

2019 Vol. 41, No. 11

contents
2019, 41(11): 1-4.
Abstract:
Wireless Communication and Internet of Things
Performance Analysis of Massive MIMO-OFDM System with Mixed-precision Analog-to-digital Converter
Kai LIU, Guichao CHEN, Cheng TAO, Tao ZHOU
2019, 41(11): 2541-2548. doi: 10.11999/JEIT181136
Abstract:
The spectral efficiency and energy efficiency of the uplink of massive MIMO-OFDM system is studied using mixed-precision Analog-Digital Converter (ADC) and Zero-Forcing (ZF) reception algorithm at the receiver. By using the additive quantization nois...
Optimal Scheme of Resource Allocation for Ultra-reliable and Low-latency in Machine Type Communications Based on Non-orthogonal Multiple Access with Short Block Transmission
Xianzhong XIE, Jia LI, Qian HUANG, Jie CHEN
2019, 41(11): 2549-2556. doi: 10.11999/JEIT190128
Abstract:
For the service characteristics and Quality of Service (QoS) requirements of Machine Type Communications (MTC), short-packet/short-coded block transmission in MTC based on Non-Orthogonal Multiple Access (NOMA) is considered in this paper, and the res...
Power Control Algorithm Based on Q-Learning in Femtocell
Yun LI, Ying TANG, Hanxiao LIU
2019, 41(11): 2557-2564. doi: 10.11999/JEIT181191
Abstract:
The power control problem of mobile users in macro-femto heterogeneous cellular networks is studied. Firstly, an optimization model that maximizes the total energy efficiency of femtocells with the minimum received signal-to-noise ratio as the constr...
Joint Clustering and Content Deployment Algorithm for Cellular D2D Communication Based on Delay Optimization
Rong CHAI, Ling WANG, Minglong CHEN, Qianbin CHEN
2019, 41(11): 2565-2570. doi: 10.11999/JEIT180408
Abstract:
Due to the limited transmission performance of cellular network and the buffering capabilities of the Base Station (BS), it is very difficult to achieve the Quality of Service (QoS) requirements of multi-user content requests. In this paper, a joint ...
Energy-efficient Scheduling Algorithm for All Optical IP Multicast Based on Colorless, Directionless and Contentionless-Flexible Reconfigurable Optical Add/Drop Multiplexer Node
Huanlin LIU, Fei FANG, Yong CHEN, Min XIANG, Yue MA
2019, 41(11): 2571-2577. doi: 10.11999/JEIT180937
Abstract:
In order to improve multicast’s spectrum energy-efficient of elastic optical network configured with Colorless, Directionless and Contentionless-Flexible Reconfigurable Optical Add/Drop Multiplexer (CDC-F ROADM) nodes, an All-optical Multicast Energy...
Circuit and System Design
Design of Convolutional Neural Networks Accelerator Based on Fast Filter Algorithm
Wei WANG, Kaili ZHOU, Yichang WANG, Guang WANG, Jun YUAN
2019, 41(11): 2578-2584. doi: 10.11999/JEIT190037
Abstract:
In order to reduce the computational complexity of Convolutional Neural Network(CNN), the two-dimensional fast filtering algorithm is introduced into the CNN, and a hardware architecture for implementing CNN layer-by-layer acceleration on FPGA is pro...
Research on Efficient FPGA Bitstream Generation System Based on Mode Matching and Hierarchical Mapping
Kaihui TU, Zhihong HUANG, Zhengrong HOU, Haigang YANG
2019, 41(11): 2585-2591. doi: 10.11999/JEIT190143
Abstract:
Bitstream generator in FPGA Electronic Design Automation(EDA) offers precise configuration information, which enables the application circuits to be implemented on the target device. On one hand, modern FPGAs tend to have larger device scale and more...
A Capacitor-less Low Dropout Regulator with Fast Response
Xingyuan TONG, Mao LI, Siwan DONG
2019, 41(11): 2592-2598. doi: 10.11999/JEIT181060
Abstract:
A novel technique for increasing the load response speed of Capacitor-Less Low-DropOut linear regulator (CL-LDO) is proposed to improve the transient response of CL-LDO when its load current changes. With an additional fast signal feedback path, the ...
Design of Convolutional Neural Networks Hardware Acceleration Based on FPGA
Huabiao QIN, Qinping CAO
2019, 41(11): 2599-2605. doi: 10.11999/JEIT190058
Abstract:
Considering the large computational complexity and the long-time calculation of Convolutional Neural Networks (CNN), an Field-Programmable Gate Array(FPGA)-based CNN hardware accelerator is proposed. Firstly, by deeply analyzing the forward computing...
Integrated Programmable Microwave Photonic Filter with High Shape-factor
Shasha LIAO, Ke LIAO, Xi LIAO, Li LIU
2019, 41(11): 2606-2613. doi: 10.11999/JEIT181156
Abstract:
In order to accommodate the development of new communication technology, an integrated programmable microwave photonic filter with high shape-factor is proposed in this paper. This filter is based on Silicon-On-Insulator (SOI) and an eight-tap finite...
A Time-frequency Analysis Method for Linear Frequency Modulation Signal with Low Sidelobe and Nonaliasing Property
Huijie LIU, Xinhai GAO, Rujiang GUO
2019, 41(11): 2614-2622. doi: 10.11999/JEIT181190
Abstract:
Chirp signals are widely used in communication and exploration. The parameter analysis of the chirp signals often uses a Wigner-Ville Distribution (WVD) based time-frequency analysis method, which achieves high time-frequency resolution. However, thi...
A Fast and Robust Design Method for Dense Focal Plane Array Feed
Shanhong HE, Mengqian JI, Liangyu XIE, Jin FAN, Chong FAN
2019, 41(11): 2623-2631. doi: 10.11999/JEIT190026
Abstract:
The Dense Focal Plane Array Feed (DFPAF), which integrates the characters of multi-beam feed with multiple independent horns and Phased Array Feed (PAF), can simultaneously provide more fixed shaped beams and wider field of view than multi-beam feed ...
The Application of the G-matrix Modification Methods to the Imaging of the 1-D Synthetic Aperture Microwave Radiometer
Aili ZHANG, Hao LIU, Lin WU, Lijie NIU, Cheng ZHANG, Xue CHEN, Ji WU
2019, 41(11): 2632-2638. doi: 10.11999/JEIT181067
Abstract:
The G -matrix model method is usually used to achieve the brightness temperature reconstruction for the one-Dimensional (1-D) synthetic aperture microwave radiometer system. For the 1-D radiometer system, the imaging process mainly includes: the rad...
Radar Signal Processing
An Anti-Dense False Target Jamming Algorithm Based on Agile Frequency Joint Hough Transform
Yinghui QUAN, Xiada CHEN, Feng RUAN, Xia GAO, Yachao LI, Mengdao XING
2019, 41(11): 2639-2645. doi: 10.11999/JEIT190010
Abstract:
Forwarding dense false target jamming disturbs the detection and recognition of real targets by generating multiple false targets in the range dimension. Because the false echo signal is highly correlated with the real signal, it is difficult for rad...
Inverse Synthetic Aperture Radar Imaging with Non-Coherent Short Pulse Radar and Its Sparse Recovery
Haibo WANG, Wenhua HUANG, Tao BA, Yue JIANG
2019, 41(11): 2646-2653. doi: 10.11999/JEIT180912
Abstract:
The microwave source of Non-Coherent Short Pulse (NCSP) radar transmits short pulse. Thus, for high velocity targets, the motion effect in the pulse duration can be neglected, and the echo signal does not need special motion compensation. In order to...
Research on Radar Waveform Design Strategy under Game Condition
Wei LI, Honglin WANG, Jiayi ZHENG, Jianye XU, Junlong ZHAO, Kun ZOU
2019, 41(11): 2654-2660. doi: 10.11999/JEIT190114
Abstract:
In order to improve missile-borne radar detection performance in modern electronic warfare, a radar waveform design method based on Nash equilibrium is proposed. Firstly, the radar and jammer game signal models are established in electronic warfare. ...
A Novel Radiometric Signature of Time-Division Multiple Access Signals and Its Application to Specific Emitter Identification
Yiwei PAN, Hua PENG, Tianyun LI, Wenya WANG
2019, 41(11): 2661-2668. doi: 10.11999/JEIT190163
Abstract:
For Time-Division Multiple Access (TDMA) signals, the performance of Specific Emitter Identification (SEI) is primarily limited by burst duration. To remedy this shortcoming, a novel radiometric signature is presented, which reveals whether the users...
Network and Information Security
A SDN Routing Optimization Mechanism Based on Deep Reinforcement Learning
Julong LAN, Changhe YU, Yuxiang HU, Ziyong LI
2019, 41(11): 2669-2674. doi: 10.11999/JEIT180870
Abstract:
In order to achieve routing optimization in the Software Defined Network (SDN) environment, deep reinforcement learning is imposed to the SDN routing process and a mechanism based on deep reinforcement learning is proposed to optimize routing. This m...
A Spatial and Temporal Optimal Method of Service Function Chain Orchestration Based on Overlay Network Structure
Yunjie GU, Yuxiang HU, Jichao XIE
2019, 41(11): 2675-2683. doi: 10.11999/JEIT190145
Abstract:
With the introduction of Network Function Virtualization (NFV), the operating costs of operators can be greatly reduced. However, most existing Service Function Chain (SFC) orchestration researches can not optimize the resources utilization while gua...
A Computation Offloading and Resource Allocation Mechanism Based on Minimizing Devices Energy Consumption and System Delay
Meiling DAI, Zhoubin LIU, Shaoyong GUO, Sujie SHAO, Xuesong QIU
2019, 41(11): 2684-2690. doi: 10.11999/JEIT180970
Abstract:
To support the execution of computation-intensive, delay-sensitive computing task by moving down the computing and processing capability in mobile edge computing becomes the current trend. However, when serving a large number of mobile users, how to ...
Multi-party Contract Signing Protocol Based on Certificateless
Suzhen CAO, Fei WANG, Xiaoli LANG, Rui WANG, Xueyan LIU
2019, 41(11): 2691-2698. doi: 10.11999/JEIT190166
Abstract:
Online contract signing is becoming more and more popular in e-commerce. It is not easy to sign a contract between two parties who do not trust each other. Many of these protocols involve the participation of third parties, but they are not advantage...
A Service Function Chain Deployment Method Against Side Channel Attack
Peng YI, Jichao XIE, Zhen ZHANG, Yunjie GU, Dan ZHAO
2019, 41(11): 2699-2707. doi: 10.11999/JEIT190127
Abstract:
Side channel attack is the primary way to leak information between tenants in current cloud computing environment. However, existing Service Function Chain (SFC) deployment methods do not fully consider the side channel attack problem faced by the Vi...
Security Analysis and Improvements of Hybrid Group Signcryption Scheme Based on Heterogeneous Cryptosystem
Yulei ZHANG, Xiangzhen LIU, Xiaoli LANG, Yongjie ZHANG, Caifen WANG
2019, 41(11): 2708-2714. doi: 10.11999/JEIT190129
Abstract:
Heterogeneous hybrid group signcryption can not only solve the confidentiality and unforgeability of data transmission under different cryptosystems, but also encrypt data of any length. Firstly, the security of a hybrid group signcryption scheme und...
Pattern Recognition and Intelligent Information Processing
Research on Shift Generation of Foreign Airlines Service Personnel Based on Tabu Search Algorithm
Xia FENG, Ling TANG, Min LU
2019, 41(11): 2715-2721. doi: 10.11999/JEIT181196
Abstract:
To solve the problem for the large amount of tasks, complex constraint conditions and manual which is hard to generation shifts of airport foreign airline service personnel. A shift generation model is studied and constructed for multi-task hierarchi...
A Novel Fuzzy Clustering Algorithm Based on Similarity of Attribute Space
Weifeng SHI, Jinbao ZHUO, Ying LAN
2019, 41(11): 2722-2728. doi: 10.11999/JEIT180974
Abstract:
With the attribute feature information of the fuzzy membership matrix and cluster centers after the iteration not fully utilized, the results of Fuzzy C-Means (FCM) Clustering and related modified algorithms are determined based on the principle of m...
Transfer Weight Based Conditional Adversarial Domain Adaptation
Jin WANG, Ke WANG, Zijian MIN, Kaiwei SUN, Xin DENG
2019, 41(11): 2729-2735. doi: 10.11999/JEIT190115
Abstract:
Considering the failure of the Conditional adversarial Domain AdaptatioN(CDAN) to fully utilize the sample transferability, which still struggle with some hard-to-transfer source samples disturbed the distribution of the target domain samples, a Tran...
Adaptive Knowledge Transfer Based on Classification-error Consensus Regularization
Shuang LIANG, Wenlong HANG, Wei FENG, Xuejun LIU
2019, 41(11): 2736-2743. doi: 10.11999/JEIT181054
Abstract:
Most current transfer learning methods are modeled by utilizing the source data with the assumption that all data in the source domain are equally related to the target domain. In many practical applications, however, this assumption may induce negat...
A Small Moving Object Detection Algorithm Based on Track in Video Surveillance
Yifeng SUN, Jiang WU, Yanyan HUANG, Guangming TANG
2019, 41(11): 2744-2751. doi: 10.11999/JEIT181110
Abstract:
To solve the problem that small moving object is difficult to be detected in video surveillance, a track-based detection algorithm is proposed. Firstly, in order to reduce missing alarm, an adaptive foreground extraction method combining regional tex...
Facial Expression Recognition Method Based on Multi-scale Detail Enhancement
Xiaohui TAN, Zhaowei LI, Yachun FAN
2019, 41(11): 2752-2759. doi: 10.11999/JEIT181088
Abstract:
Facial expression is the most intuitive description of changes in psychological emotions, and different people have great differences in facial expressions. The existing facial expression recognition methods use facial statistical features to disting...
Depth Map Error Concealment for 3D High Efficiency Video Coding
Yang ZHOU, Jiayi WU, Yu LU, Haibing YIN
2019, 41(11): 2760-2767. doi: 10.11999/JEIT180926
Abstract:
By using the intra-view and inter-view correlations and the motion vector-sharing, a depth map error concealment approach is proposed for 3D video coding based on the High Efficiency Video Coding (3D-HEVC) to combat the packet loss of the depth video...
An Incremental Feature Extraction Method without Estimating Image Covariance Matrix
Xiaofeng WANG, Mingyue SUN, Weimin GE
2019, 41(11): 2768-2776. doi: 10.11999/JEIT181138
Abstract:
To solve the problems that Two-Dimensional Principal Component Analysis (2DPCA) can not implement the on-line feature extraction and can not represent the complete structure information, an Incremental 2DPCA (I2DPCA) without estimating covariance mat...
Image Semantic Segmentation Based on Region and Deep Residual Network
Huilan LUO, Fei LU, Fansheng KONG
2019, 41(11): 2777-2786. doi: 10.11999/JEIT190056
Abstract:
An image semantic segmentation model based on region and deep residual network is proposed. Region based methods use multi-scale to create overlapping regions, which can identify multi-scale objects and obtain fine object segmentation boundary. Fully...
Automatic Rank Estimation Based Riemannian Optimization Matrix Completion Algorithm and Application to Image Completion
Jing LIU, Han LIU, Kaiyu HUANG, Liyu SU
2019, 41(11): 2787-2794. doi: 10.11999/JEIT181076
Abstract:
As an extension of Compressed Sensing(CS), Matrix Completion(MC) is widely applied to different fields. Recently, the Riemannian optimization based MC algorithm attracts a lot of attention from researchers due to its high accuracy in reconstruction a...