Advanced Search

2019 Vol. 41, No. 2

contents
电子与信息学报2019-02期目录
2019, 41(2)
Abstract:
Radar and Underwater Acoustic Signal Processing
An Estimation Method of Rotation Frequency of Unmanned Aerial Vehicle Based on Auto-correlation and Cepstrum
Chen SONG, Liangjiang ZHOU, Yirong WU, Chibiao DING
2019, 41(2): 255-261. doi: 10.11999/JEIT180399
Abstract:

Accurately estimating rotor rotation frequency of Unmanned Aerial Vehicle (UAV) is of great significance for UAV detection and recognition. For the UAV target echo model of LFMCW (Linear Frequency Modulated Continuous Wave) radar, this paper proposes...

Fast Cross-range Scaling for ISAR Imaging Based on Pseudo Polar Fourier Transform
Dong LI, Chengxiang ZHANG, Di ZHAO, Xiaoheng TAN, Xichuan ZHOU, Muyang ZHAN
2019, 41(2): 262-269. doi: 10.11999/JEIT180299
Abstract:

For the Inverse Synthetic Aperture Radar (ISAR) imaging, the ISAR image obtained by the Range-Doppler (RD) or time-frequency analysis methods can not display the target's real shape due to its azimuth relating to the target Doppler frequency, thus th...

Three-dimensional Interferometric Imaging and Micro-motion Feature Extraction of Rotating Space Targets Based on Narrowband Radar
Jian HU, Ying LUO, Qun ZHANG, Le KANG, Qifang He
2019, 41(2): 270-277. doi: 10.11999/JEIT180372
Abstract:

Inspired by the idea of multi-antenna interferometric processing in Interferometric Inverse Synthetic Aperture Radar (InISAR), by utilizing an L-shaped three-antenna imaging model, a Three-Dimensional (3-D) interferometric imaging and micro-motion fe...

Estimation of Ionospheric Incoherent Scatter Spectrum and Autocorrelation Function
Lin LI, Chengjiao HAN, Zonghua DING, Hongbing JI, Yajie WANG
2019, 41(2): 278-284. doi: 10.11999/JEIT180331
Abstract:

Incoherent scatter spectrum plays an important role in studying the physical parameters of the ionosphere. The conventional theoretical model of incoherent scatter spectrum for derivation and calculation is extremely complicated and the model of the ...

Unitary ESPRIT Based Multiband Fusion ISAR Imaging
Di XIONG, Junling WANG, Lizhi ZHAO, Shan ZHONG, Meiguo GAO
2019, 41(2): 285-292. doi: 10.11999/JEIT180438
Abstract:

Multiband fusion imaging can effectively improve the range resolution of Inverse Synthetic Aperture Radar (ISAR) imaging. The traditional Estimation of Signal Parameters via Rotational Invariance Techniques (ESPRIT) spectral estimation signal fusion ...

High-precision Digital Surface Model Inversion Approach in Forest Region Based on PolInSAR
Jinwei XIE, Zhiyong SUO, Zhenfang LI, Yuekun WANG
2019, 41(2): 293-301. doi: 10.11999/JEIT180387
Abstract:

The general method for inversion of Digital Surface Model (DSM) in forest region has great errors due to the inestimable waves’ penetration depth. For this problem, an approach to inversion of high-precision DSM is proposed. First, the phases of high...

Assessment Method for Gaps and Other Surface Defects
Jingcheng ZHAO, Xinru FU, Tao YANG, Xu GAO, Junqiang AI
2019, 41(2): 302-308. doi: 10.11999/JEIT180378
Abstract:

Surface defects such as gaps have a significant impact on the stealth performance of the aircraft. According to the scattering mechanism of surface defects such as gaps, a method of evaluating the surface defect targets based on vector cancellation i...

Improved Long-code Direct Acquisition Algorithm Based on Time-frequency Fusion
Fangling ZENG, Xiaofeng OUYANG, Hao XU, Daqian LÜ
2019, 41(2): 309-316. doi: 10.11999/JEIT180119
Abstract:

At present, long-code with the characteristic of high bit rate and long period is widely used in satellite navigation system as military signal. To overcome the shortcomings of the indirect acquisition method for long-code, the limitations of the ext...

BeiDou-reflectometry Sea Wind and Wave Retrieval System and Experiment
Dongkai YANG, Xiangyu WANG, Jianhua LIU, Feng WANG
2019, 41(2): 317-323. doi: 10.11999/JEIT180397
Abstract:

A low power and cost BeiDou-reflectometry used to retrieve Significiant Wave Height (SWH) and wind is designed and implemented. To improve the retrieval accuracy, a correction method based on the power function of the elevation angle sinusoidal and a...

Sonar Broadband Adaptive Beamforming Based on Enhanced Keystone Transform
Yuning QIAN, Yawei CHEN, Jun SUN
2019, 41(2): 324-331. doi: 10.11999/JEIT180394
Abstract:

Keystone transform is an effective broadband array signal pre-processing method, but it has a main problem of array data missing. In order to solve this problem, an enhanced Keystone transform algorithm, which combines the autoregression model with t...

Magnetic Anomaly Detection Algorithm Based on Fractal Features in Geomagnetic Background
Luzhao CHEN, Wanhua ZHU, Peilin WU, Chunjiao FEI, Guangyou FANG
2019, 41(2): 332-340. doi: 10.11999/JEIT180307
Abstract:

Magnetic Anomaly Detection (MAD) is a widely used passive target detection method. Its applications include surface warship target monitoring, underwater moving targets, and land target detection and identification. It is of great significance to res...

Network and Information Security
Malware Sandbox Evasion Detection Based on Code Evolution
Guanghui LIANG, Jianmin PANG, Zheng SHAN
2019, 41(2): 341-347. doi: 10.11999/JEIT180257
Abstract:

In order to resist the malware sandbox evasion behavior, improve the efficiency of malware analysis, a code-evolution-based sandbox evasion technique for detecting the malware behavior is proposed. The approach can effectively accomplish the detectio...

Random Addition-chain Based Countermeasure Against Side-channel Attack for Advanced Encryption Standard
Hai HUANG, Xinxin FENG, Hongyu LIU, Jiao HOU, Yuying ZHAO, Lili YIN, Jiuxing JIANG
2019, 41(2): 348-354. doi: 10.11999/JEIT171211
Abstract:

Side channel attacks have serious threat to the hardware security of Advanced Encryption Standard (AES), how to resist the side channel attack becomes an urgent problem. Byte substitution operation is the only nonlinear operation in AES algorithm, so...

Efficient Ciphertext Deduplication and Auditing Scheme with Attribute-based Encryption
Hua MA, Qianlong DANG, Jianfeng WANG, Zhenhua LIU
2019, 41(2): 355-361. doi: 10.11999/JEIT170935
Abstract:

Existing attribute-based deduplication schemes can support neither auditing of cloud storage data nor revocation of expired users. On the other hand, they are less efficient for deduplication search and users decryption. In order to solve these probl...

A Multiuser Noise Reduction Differential Chaos Shift Keying System
Gang ZHANG, Hexiang CHEN, Tianqi ZHANG
2019, 41(2): 362-368. doi: 10.11999/JEIT171173
Abstract:

One of the major drawbacks of the conventional Multiuser Differential Chaos Shift Keying is the poor Bit Error Rate (BER), a MultiUser Noise Reduction Differential Chaos Shift Keying (MU-NRDCSK) system is proposed. At the transmitter, M/P chaotic sam...

Efficient Workload Balance Technology on Many-core Crypto Processor
Zibin DAI, Anqi YIN, Tongzhou QU, Longmei NAN
2019, 41(2): 369-376. doi: 10.11999/JEIT180623
Abstract:

Imbalanced workload distribution results in low resource utilization of many-core crypto-platform. Dynamic workload allocation can improve the resource utilization with some overhead. Therefore, a higher frequency of workload balancing is not equival...

Stackelberg Game-based Resource Allocation Strategy in Virtualized Wireless Sensor Network
Ruyan WANG, Hongjuan LI, Dapeng WU
2019, 41(2): 377-384. doi: 10.11999/JEIT180277
Abstract:

Virtualization is a new technology that can effectively solve the low resource utilization and service inflexibility problem in the current Wireless Sensor Network (WSN). For the resource competition problem in virtualized WSN, a multi-task resource ...

A Collaborative Mapping Method for Service Chain Based on Matching Game
Hongqi ZHANG, Rui HUANG, Dexian CHANG
2019, 41(2): 385-393. doi: 10.11999/JEIT180385
Abstract:

Considering that it is difficult to balance efficiency and resource utilization of Service Chain (SC) mapping problem in Software Defined Network (SDN)/Network Function Virtualization (NFV) environment, this paper proposes a collaborative mapping met...

Energy Saving Mechanism with Offload Delay Aware in Cloudlet Enhanced Fi-Wi Access Network
Hong ZOU, Yishuang GAO, Junjie YAN
2019, 41(2): 394-401. doi: 10.11999/JEIT180274
Abstract:

In cloudlet enhanced Fiber-Wireless (FiWi) access network, there is a problem that the traditional energy saving mechanism does not match the offload traffic. An offload collaboration sleep mechanism with load transfer is proposed. By analyzing the l...

Wireless Communication and Signal Processing
High Spectrum Efficiency Full-duplex Two-way Relay Scheme for OFDM
Yi LIU, Jiong WU, Pu YANG, Haihan NAN, Hailin ZHANG
2019, 41(2): 402-408. doi: 10.11999/JEIT180451
Abstract:

For the full-duplex two-way relay network, a two-way relay transmission scheme that is robust to the relay residual self-interference signal is proposed. Firstly, the residual self-interference signal of the relay is analyzed, the infinite self-inter...

Hybrid Precoding Algorithm Based on Successive Interference Cancellation for Millimeter Wave MIMO Systems
Peizhong XIE, Rui SUN, Ting LI
2019, 41(2): 409-416. doi: 10.11999/JEIT180379
Abstract:

This paper investigates the design of hybrid analog and digital precoder and combiner for multi-user millimeter wave MIMO systems. Considering the problem of signal interference between multiple users due to diffuse scattering of signal propagation, ...

Deployment Algorithm of Service Function Chain of Access Network Based on Stochastic Learning
Qianbin CHEN, Youchao YANG, Yu ZHOU, Guofan ZHAO, Lun TANG
2019, 41(2): 417-423. doi: 10.11999/JEIT180310
Abstract:

To solve problem of the high delay caused by the change of physical network topology under the 5G access network C-RAN architecture, this paper proposes a scheme about dynamic deployment of Service Function Chain (SFC) in access network based on Part...

A Diverse Virtual Optical Network Mapping Strategy Based on Security Awareness in Elastic Optical Networks
Huanlin LIU, Zhenyu LIN, Xin WANG, Yong CHEN, Min XIANG, Yue MA
2019, 41(2): 424-432. doi: 10.11999/JEIT180335
Abstract:

Due to the probabilistic failure of the optical fiber of the underlying network in the virtual environment, traditional full protection configures one protection path at least which leads to high resource redundancy and low acceptance rate of the vir...

Wide Area Difference Calibration Algorithm Based on Virtual Reference Station for Tri-satellite TDOA Geolocation System
Kaiqiang REN, Zhengbo SUN
2019, 41(2): 433-439. doi: 10.11999/JEIT180289
Abstract:

A wide area difference calibration algorithm based on Virtual Reference Station (VRS) for tri-satellite Time Difference Of Arrival (TDOA) geolocation system is proposed to solve the problem that traditional difference calibration algorithm can not el...

Compressive Sensing Based Multi-target Device-free Passive Localization Algorithm Using Multidimensional Measurement Information
Dongping YU, Yan GUO, Ning LI, Jie LIU, Sixing YANG
2019, 41(2): 440-446. doi: 10.11999/JEIT180333
Abstract:

Device-free passive localization is a key issue of the intruder detection, environmental monitoring, and intelligent transportation. The existing device-free passive localization method can obtain the multidimensional measurement information by chann...

Gridless Sparse Method for Direction of Arrival Estimation for Two-dimensional Array
Jianshu WANG, Yangyu FAN, Rui DU, Guoyun LÜ
2019, 41(2): 447-454. doi: 10.11999/JEIT180340
Abstract:

For the fact that current gridless Direction Of Arrival (DOA) estimation methods with two-dimensional array suffer from unsatisfactory performance, a novel girdless DOA estimation method is proposed in this paper. For two-dimensional array, the atomi...

Received Signal Strength Indication Difference Location Algorithm Based on Kalman Filter
Youlin GENG, Chengbo XIE, Chuan YIN, Lantu GUO, Xianyi WANG
2019, 41(2): 455-461. doi: 10.11999/JEIT180268
Abstract:

The signal source position can only be estimated by passive monitoring of the signal in terms of that the signal monitored by the spectrum monitoring system can not be controlled and there is no prior knowledge. To address this issue, based on Receiv...

Sensor Selection Method for TDOA Passive Localization
Benjian HAO, Linlin WANG, Zan LI, Yue ZHAO
2019, 41(2): 462-468. doi: 10.11999/JEIT180293
Abstract:

This paper focuses on the sensor selection optimization problem in Time Difference Of Arrival (TDOA) passive localization scenario. Firstly, the localization accuracy metric is given by the error covariance matrix of classical closed-form solution, w...

Pattern Recognition and Intelligent Information Processing
Research of Chronic Obstructive Pulmonary Disease Monitoring System Based on Four-line Turbine-type
Rongjian ZHAO, Wang ZHOU, Minfang TANG, Xianxiang CHEN, Lidong DU, Zhan ZHAO, Ting YANF, Qingyuan ZHAN, Zhen FANG
2019, 41(2): 469-476. doi: 10.11999/JEIT180315
Abstract:

To improve accuracy and reliability of the traditional turbine-vital capacity meter, a novel four-line turbine-detection method is presented for the high precision and high reliability Chronic Obstructive Pulmonary Disease (COPD) monitoring system. O...

Improved Metric Learning Algorithm for Person Re-identification Based on Equidistance
Zhiheng ZHOU, Kaiyi LIU, Junchu HUANG, Zengqun CHEN
2019, 41(2): 477-483. doi: 10.11999/JEIT180336
Abstract:

In order to improve the robustness of MLAPG algorithm, a person re-identification algorithm, called Equid-MLAPG algorithm is proposed, which is based on the equidistance measurement learning strategy. Due to the imbalanced distribution of positive an...

Sub-Nyquist Sampling Recovery Algorithm Based on Kernel Space of the Random-compression Sampling Value Matrix
Jianxin GAI, Haochen DU, Qi LIU, Ziquan TONG
2019, 41(2): 484-491. doi: 10.11999/JEIT180323
Abstract:

To solve the low performance problem of the existing Modulated Wideband Converter (MWC)-based sub-Nyquist sampling recovery algorithm, this paper proposes a support recovery algorithm based on the kernel space of sampling value and a random compressi...

Cardinalized Probability Hypothesis Density Filter Based on Pairwise Markov Chains
Jiangyi LIU, Chunping WANG
2019, 41(2): 492-497. doi: 10.11999/JEIT180352
Abstract:

In view of the problem that the Cardinalized Probability Hypothesis Density (CPHD) probability hypothesis density filtering algorithm based on the Pairwise Markov Chains (PMC) model (PMC-CPHD) is not suitable for implementation, the PMC-CPHD algorith...

Overview
Latest Research Progress of Honeypot Technology
Leyi SHI, Yang LI, Mengfei MA
2019, 41(2): 498-508. doi: 10.11999/JEIT180292
Abstract:

Honeypot technology is a network trap in cyber defense. It can attract and deceive attackers and record their attack behavior, so as to study the target and attack means of the adversary and protect real service resources. However, because of the sta...