Advanced Search

2019 Vol. 41, No. 12

Total directory
2019, 41(12): 1-30.
Abstract:
contents
2019, 41(12): 1-4.
Abstract:
Wireless Communication and Internet of Things
Performances Analysis in Uplink Non-Orthogonal Multiple Access System with Imperfect Successive Interference Cancellation
Xiyu WANG, Xiaoming Xu, Yajun CHEN
2019, 41(12): 2795-2801. doi: 10.11999/JEIT181165
Abstract:
Non-Orthogonal Multiple Access (NOMA) serves multiple transmitters using the same resource block, and the receiver decodes the information from different transmitters through Successive Interference Cancellation (SIC). However, most of the researches...
Long Range Backscatter Communication Method Based on Direct Digital Frequency Synthesis
Xiaoqing TANG, Guihui XIE, Yajun SHE, Shuai ZHANG
2019, 41(12): 2802-2809. doi: 10.11999/JEIT190001
Abstract:
Long Range(LoRa) Backscattering Communication (BC) not only has the advantages of low cost and low power consumption, but also has a long communication distance. However, the existing LoRa BC scheme is complex and can not be applied to actual enginee...
Research on D2D Multi-multiplex Communication Resource Blocks Allocation Algorithm Based on Unbalanced Solution
Zhihong QIAN, Liangshuai HU, Chunsheng TIAN, Xue WANG
2019, 41(12): 2810-2816. doi: 10.11999/JEIT190171
Abstract:
In order to solve the problem of the Device to Device (D2D) multi-multiplex communication resource blocks allocation in a cell, the resource blocks allocation scheme about D2D multi-multiplex mode based on non-equilibrium solution is proposed after a...
Energy Efficiency and System Capacity Based Multi-Objective Radio Resource Management in M2M Communications
Shaoyi XU, Shuai GAO
2019, 41(12): 2817-2825. doi: 10.11999/JEIT181168
Abstract:
Machine-to-Machine (M2M) and Device-to-Device (D2D) communications are both key technologies in the Fifth Generation (5G) mobile communication systems. In M2M communications, the Energy Efficiency (EE) especially needs to be improved to extend the li...
Radar Signal Processing
Robust and Efficient Sparse-feature Enhancementfor Generalized SAR Imagery
Lei YANG, Pucheng LI, Huijuan LI, Cheng FANG
2019, 41(12): 2826-2835. doi: 10.11999/JEIT190173
Abstract:
For the problem of sparse feature enhancement in Synthetic Aperture Radar (SAR) imagery, conventional methods are difficult to achieve a preferable balance between accuracy and efficiency. In this paper, a robust and efficient SAR imaging algorithm b...
Combined Bipercentile Parameter Estimation of Generalized Pareto Distributed Sea Clutter Model
Han YU, Penglang SHUI, Sainan SHI, Chunjiao YANG
2019, 41(12): 2836-2843. doi: 10.11999/JEIT190148
Abstract:
The generalized Pareto distributed sea clutter model, known as one of the compound-Gaussian models, is able to describe heavy-tailed characteristic of sea clutter under high-resolution and low grazing angle detection scene efficiently, and the accura...
Target Assignment Method for Phased Array Radar Network Based on Quality of Service
Shanchao YANG, Kangsheng TIAN, Changfei WU
2019, 41(12): 2844-2851. doi: 10.11999/JEIT181133
Abstract:
The constraint conditions of target assignment model for phased array radar network are unreasonable and the performance of model solving algorithms are not good enough. To solve these problems, a target assignment model for radar network based on Qu...
Imaging Technology of Doppler Diversity Forward-looking SAR Imaging for Unmanned Aerial Vehicle
Zhichao MENG, Jinyue LU, Pengfei XIE, Lei ZHANG, Hongxian WANG
2019, 41(12): 2852-2858. doi: 10.11999/JEIT190096
Abstract:
Forward-looking Synthetic Aperture Radar (SAR) imaging has the problem of left-right Doppler ambiguity, so it is necessary to use spatial resources for ambiguity resolution. Due to the weight and size of Unmanned Aerial Vehicle (UAV), the receiving a...
Performance of Rank Sum Nonparametric Detector at Clutter Edge
Xiangwei MENG
2019, 41(12): 2859-2864. doi: 10.11999/JEIT190136
Abstract:
The performance of a Constant False Alarm Rate (CFAR) detector is often evaluated in three typical backgrounds - homogeneous environment, multiple targets situation and clutter edges described by Prof. Rohling. However, there is a lack of the analyti...
Bistatic Radar Coincidence Imaging Based on Sparse Bayesian Learning
Rui LI, Qun ZHANG, Linghua SU, Jia LIANG, Ying LUO
2019, 41(12): 2865-2872. doi: 10.11999/JEIT180933
Abstract:
Bistatic radar has the advantages of high concealment and strong anti-interference performance, and plays an important role in modern electronic warfare. Based on the principle of radar coincidence imaging, the problem of bistatic radar coincidence i...
A Doppler Resampling Based Imaging Algorithm for High Squint SAR with Constant Acceleration
Ning LI, Bowen BIE, Mengdao XING, Guangcai SUN
2019, 41(12): 2873-2880. doi: 10.11999/JEIT180953
Abstract:
A modified SPECtral ANalysis (SPECAN) algorithm based on Doppler resampling is proposed to deal with the azimuth Space-Variant (SV) phase coefficients of the High Squint (HS) SAR data acquired from maneuvering platform. Firstly, for HS SAR with const...
An Improved Four-component Decomposition Method Based on the Characteristic of Polarization and the Optimal Parameters of PolInSAR
Yu WANG, Weidong YU, Xiuqing LIU
2019, 41(12): 2881-2888. doi: 10.11999/JEIT190108
Abstract:
The backscattering of the radar targets is sensitive to the relative geometry between orientations of the targets and the radar line of sight. When the orientations of the same target are different from the radar line of sight, the scattering charact...
A Novel Micro-motion Multi-target Wideband Resolution Algorithm Based on Curve Overlap Extrapolation
Jiaqi WEI, Lei ZHANG, Hongwei LIU, Jialian SHENG
2019, 41(12): 2889-2895. doi: 10.11999/JEIT190033
Abstract:
To solve the problem that the traditional micro-Doppler feature extraction technologies are generally hard to achieve resolution and parameter estimation of multi-target, a novel curve overlap extrapolation algorithm for wide-band resolution of micro...
A Satellite Calibration Method for the Baseline Coordinate and Phase Difference of Distributed Radar Array
Lu LU, Meiguo GAO
2019, 41(12): 2896-2902. doi: 10.11999/JEIT181152
Abstract:
In the system of distributed radar array system using phase interference angle measurement, the phase center coordinate error of arrays and the phase difference error have relatively large influence on the angle measurement. The phase center position...
Doppler Frequency Estimation Method Based on Chinese Remainder Theorem with Spectrum Correction
Chenghu CAO, Yongbo ZHAO, Zhiling SUO, Xiaojiao PANG, Baoqing XU
2019, 41(12): 2903-2910. doi: 10.11999/JEIT181102
Abstract:
It makes the Pulse Doppler (PD) radar widely applied that the PD radar has the obvious advantages of detecting the Doppler frequency of the target and suppressing the clutter effectively. However, it is difficult for the PD radar to detect the target...
Electromagnetic Field and Electromagnetic Wave Technology
A Novel Shaping Design Technique of the Elliptical Beam Antenna
Xinglong LIU, Biao DU, Jianzhai ZHOU
2019, 41(12): 2911-2918. doi: 10.11999/JEIT190142
Abstract:
In order to satisfy the requirement of elliptical beam antenna with low profile, a novel design technique of the hybrid-structural antenna with elliptical beam is proposed. The hybrid-structural antenna consists of the ring-focus elliptical antenna i...
Analysis of Beam Wave Interaction in a Planar Metallic Grating Based on Cyclotron Resonance Enhancement Effect
Jing WANG, Yu FAN, Ding ZHAO, Chen YANG, Gang WANG, Jirun LUO
2019, 41(12): 2919-2924. doi: 10.11999/JEIT181145
Abstract:
Based on the beam wave synchronization interaction in transverse and longitudinal directions at the same time and derived from Maxwell’s equation and linear Vlasov equation, the planar metallic grating beam-wave interaction " hot” dispersion equation...
Design of A Novel Broadband Low RCS Array Based on Three Types of Reflective Cell Shared Aperture
Guowen ZHANG, Jun GAO, Xiangyu CAO, Huanhuan YANG, Sijia LI
2019, 41(12): 2925-2931. doi: 10.11999/JEIT181049
Abstract:
A novel wideband low RCS new super-surface array based on three reflective cell shared aperture is designed, which is composed of three kinds of Artificial Magnetic Conductor (AMC). Compared with the traditional AMC array, the new array uses one of A...
Image and Digital Signal Processing
Binaural Target Sound Source Localization Based on Time-frequency Units Selection
Ruwei LI, Tao LI, Xiaoyue SUN, Dengcai YANG, Qi WANG
2019, 41(12): 2932-2938. doi: 10.11999/JEIT181127
Abstract:
The performance of the existing target localization algorithms is not ideal in complex acoustic environment. In order to improve this problem, a novel target binaural sound localization algorithm is presented. First, the algorithm uses binaural spect...
An Error Bound of Signal Recovery for Penalized Programs in Linear Inverse Problems
Huan ZHANG, Hong LEI
2019, 41(12): 2939-2944. doi: 10.11999/JEIT181125
Abstract:
Penalized programs are widely used to solve linear inverse problems in the presence of noise. For now, the study of the performance of panelized programs has two disadvantages. First, the results have some limitations on the tradeoff parameters. Seco...
Signal Detection Based on Sigmoid Function in Non-Gaussian Noise
Zhen DAI, Pingbo WANG, Hongkai WEI
2019, 41(12): 2945-2950. doi: 10.11999/JEIT190012
Abstract:
To solve the problem of weak signals detection in non-Gaussian background, a method based on Sigmoid function is proposed which is named Sigmoid Function Detector (SFD). Firstly, the non-Gaussian background is modeled as a mixed Gaussian model. Based...
Deep Convolution Blind Separation of Acoustic Signals Based on Joint Diagonalization
Yang LI, Weitao ZHANG, Shuntian LOU
2019, 41(12): 2951-2956. doi: 10.11999/JEIT190067
Abstract:
The propagation of acoustic signal in space has a strong multipath effect, and the receiver often overlaps in the form of convolution. Especially in strong reverberation conditions such as ocean and theatre, where the length of impulse response of hy...
Design and Implementation of Robust Particle Filter Algorithms under Student-t Measurement Distribution
Zongyuan WANG, Weidong ZHOU
2019, 41(12): 2957-2964. doi: 10.11999/JEIT190144
Abstract:
Outliers are non-Gaussian measurement values far from the bulk of data. In practical transmission, the signals added with outlier often have the heavy-tailed property. Particle filter is based on the Bayesian framework and applicable to the non-linea...
Frequency-hopping Transmitter Classification Based on Chaotic Attractor Reconstruction and Low-rank Clustering
Ping SUI, Ying GUO, Hongguang LI, Yuzhou WANG
2019, 41(12): 2965-2971. doi: 10.11999/JEIT180947
Abstract:
The transient signal without modulation information of the radiation source can characterize the unintentional modulation characteristics of the radiation source. The analysis of the transient signal can realize the radiation source identification. I...
Research on Non-local Multi-scale Fractional Differential Image Enhancement Algorithm
Guo HUANG, Li XU, Qingli CHEN, Yifei Pu
2019, 41(12): 2972-2979. doi: 10.11999/JEIT190032
Abstract:
In order to enhance the useful information in the image and improve the visual effect of the image, a Non-local Multi-scale Fractional Differential(NMFD) image enhancement operator is proposed. The operator divides the image into several sub-images a...
BP Neural Network Fuzzy Image Restoration Basedon Brain Storming Optimization Algorithm
Xiaoping LIANG, Zhenjun GUO, Changhong ZHU
2019, 41(12): 2980-2986. doi: 10.11999/JEIT190261
Abstract:
A kind of restoration method of BP neural network fuzzy image based on Optimized Brain Storming intelligent Optimized(OBSO-BP) algorithm is proposed in this paper. With the method of brain storming intelligent optimized algorithm which is optimized i...
Image Forgery Detection Algorithm Based on Cascaded Convolutional Neural Network
Xiuli BI, Yang WEI, Bin XIAO, Weisheng LI, Jianfeng MA
2019, 41(12): 2987-2994. doi: 10.11999/JEIT190043
Abstract:
The image forgery detection algorithm based on convolutional neural network can implement the image forgery detection that does not depend on a single image attribute by using the learning ability of convolutional neural network, and make up for the ...
Cryption and Information Security
Construction of a Class of Linear Codes with Four-weight and Six-weight
Xiaoni DU, Hongxia LÜ, Rong WANG
2019, 41(12): 2995-2999. doi: 10.11999/JEIT180939
Abstract:
Due to the wide applications in association schemes, authentication codes and secret sharing schemes etc., construction of the linear codes with a few weights is an important research topic. A class of linear codes with four-weight and six-weight ove...
Linear Complexity of Binary Sequences Derived from Euler Quotients Modulo 2pm
Xiaoni DU, Li LI, Fujun ZHANG
2019, 41(12): 3000-3005. doi: 10.11999/JEIT190071
Abstract:
Families of pseudorandom sequences derived from Euler quotients modulo odd prime power possess sound cryptographic properties. In this paper, according to the theory of residue class ring, a new classes of binary sequences with period \begin{document...
A Reliability-guarantee Method for Service Function Chain Deployment Based on Joint Backup
Hongbo TANG, Hang QIU, Wei YOU, Xinsheng JI
2019, 41(12): 3006-3013. doi: 10.11999/JEIT190013
Abstract:
In the Network Function Virtualization (NFV) environment, for the reliability problem of Service Function Chain (SFC) deployment, a joint optimization method is proposed for backup Virtual Network Function (VNF) selection, backup instance placement a...
Semi-Markov Decision Process-based Resource Allocation Strategy for Virtual Sensor Network
Ruyan WANG, Hongjuan LI, Dapeng WU, Hongxia LI
2019, 41(12): 3014-3021. doi: 10.11999/JEIT190016
Abstract:
The close relationship between resource deployment and specific tasks in traditional Wireless Sensor Network(WSN) leads to low resource utilization and revenue. According to the dynamic changes of Virtual Sensor Network Request(VSNR), the resource al...
A Distributed Node Localization Algorithm for Large Scale Sensor Networks
Junzheng JIANG, Yangjian LI, Haibing ZHAO, Shan OUYANG
2019, 41(12): 3022-3028. doi: 10.11999/JEIT181101
Abstract:
A distributed algorithm based on modified Newton method is proposed to solve the nodes localization problem in large scale Wireless Sensor Network(WSN). The algorithm includes network partitioning and distributed algorithm. Firstly, the network is di...
Energy-saving Virtual Network Embedding Algorithm Based on Sliding Region Particle Swarm
Lei ZHUANG, Shuaikui TIAN, Mengyang HE, Yu SONG, Guoqing WANG, Wentan LIU, Ling MA
2019, 41(12): 3029-3035. doi: 10.11999/JEIT190168
Abstract:
Considering the problem of scattered node mapping and more hops of link mapping in the traditional virtual network energy-saving embedding, the node and link are mapped simultaneously by using the minimum spanning tree topology of the virtual network...
Quality of Service-aware Elastic Flow Aggregation Based on Enhanced Rough K-Means
Zheng WU, Yuning DONG, Wei TIAN, Pingping TANG
2019, 41(12): 3036-3042. doi: 10.11999/JEIT181169
Abstract:
Facing changeable network environment, current Quality of Service (QoS)-aware flow aggregation scheme is lack of flexibility. A dynamic flow aggregation method to overcome present problems is proposed. An Enhanced Rough K-Means (ERKM) algorithm is us...
A Hardware Trojan Detection Method Based on Compression Marginal Fisher Analysis
Xiaohan WANG, Tao WANG, Xiongwei LI, Yang ZHANG, Changyang HUANG
2019, 41(12): 3043-3050. doi: 10.11999/JEIT190004
Abstract:
Against the problem of low detection rate to detect small hardware Trojan by side-channel in physical environment, the Marginal Fisher Analysis (MFA) is introduced. On the basis, a hardware Trojan detection method based on Compression Marginal Fisher...