Advanced Search

2019 Vol. 41, No. 4

contents
Catalog
2019, 41(4)
Abstract:
Radar Signal Processing
A New Prompt 2-D Attitude Steering Approach for Zero Doppler Centroid of GEOsynchronous SAR
Bingji ZHAO, Qingjun ZHANG, Chao DAI, Liping LIU, Zhihua TANG, Weiping SHU, Chong NI
2019, 41(4): 763-769. doi: 10.11999/JEIT180643
Abstract:

A new prompt 2-D attitude steering approach for zero Doppler centroid of GEOsynchronous SAR (GEOSAR) is proposed. Large yaw angle of GEOSAR in traditional 2-D yaw steering condition can be solved by this method. It is suited to the large satellite su...

Candidate Region Extraction Method for Multi-satellite and Multi-resolution SAR Ships
Yan HU, Zili SHAN, Feng GAO
2019, 41(4): 770-778. doi: 10.11999/JEIT180525
Abstract:

The traditional methods based on CFAR and Kernel Density Estimation (KDE) for SAR ship candidate region extraction has the following defects: The choice of false alarm rate of CFAR depends on artificial experience; CFAR only models the sea clutter di...

A Novel Joint ISAR Cross-range Scaling and Phase Autofocus Algorithm Based on Image Contrast Maximization
Shuai SHAO, Lei ZHANG, Hongwei LIU
2019, 41(4): 779-786. doi: 10.11999/JEIT180521
Abstract:

Due to the selection of dominant scatterers is easy to be affected by noise, a novel Inverse Synthetic Aperture Radar (ISAR) cross-range scaling algorithm based on image contrast maximization is proposed, which can realize the cross-range scaling whi...

Micro-motion Parameters Estimation of Ballistic Targets Based on Wide-band Radar Three Dimensional Interferometry
Jiaqi WEI, Lei ZHANG, Hongwei LIU
2019, 41(4): 787-794. doi: 10.11999/JEIT180452
Abstract:

Three dimensional interferometry of wide-band radar can provide crucial information for estimating the micro-motion and geometric parameters of targets. For estimation of the micro-motion parameters via three dimensional interferometry in the case of...

An Improved Knowledge-aided Space-time Adaptive Signal Processing Algorithm for MIMO Radar
Jing HOU, Mengkai HU, Ziwei WANG
2019, 41(4): 795-800. doi: 10.11999/JEIT180557
Abstract:

Focusing on the clutter suppression problem of the airborne Multiple Input Multiple Output (MIMO) radar, an improved method based on Knowledge-Aided Space-Time Adaptive signal Processing (KA-STAP) algorithm is proposed. The clutter subspace is constr...

Integration of MIMO Radar and Communication with OFDM-LFM Signals
Bingfan LIU, Baixiao CHEN
2019, 41(4): 801-808. doi: 10.11999/JEIT180547
Abstract:

Integration of radar and communication on the electronic war platform is an effective method to reduce volume and enhance spectrum usage and efficiency. A transmitted pattern based on OFDM-LFM MIMO radar is designed to realize the integration of rada...

Hydrometeor Classification Method in Dual-polarization Weather Radar Based on Fuzzy Neural Network-fuzzy C-means
Hai LI, Jiawei REN, Jinlei SHANG
2019, 41(4): 809-815. doi: 10.11999/JEIT180529
Abstract:

For the problem of hydrometeor classification in the presence of ground clutter, traditional methods produce large classification errors under different weather and environmental conditions. A new method for the classification of Hydrometeor based on...

Interference Modeling of Two Point Source Retrodirective Cross-eye Considering Target Echo
Liang ZHOU, Jin MENG, Hao WU, Yongcai LIU, Wei LIU
2019, 41(4): 816-821. doi: 10.11999/JEIT180482
Abstract:

In view of the strong anti-jamming capability of monopulse radar, the cross eye is used to interfere with monopulse radar. Monopulse radar is widely used in missile terminal guidance for precise attack on aircraft and ship targets. Based on the radar...

Gesture Recognition with Multi-dimensional Parameter Using FMCW Radar
Yong WANG, Jinjun WU, Zengshan TIAN, Mu ZHOU, Shasha WANG
2019, 41(4): 822-829. doi: 10.11999/JEIT180485
Abstract:

A multi-parameter convolutional neural network method is proposed for gesture recognition based on Frequency Modulated Continuous Wave (FMCW) radar. A multidimensional parameter dataset is constructed for gestures by performing time-frequency analysi...

Direction Finding for Electromagnetic Radiation Source Using Ultra-short Baseline Array
Xiaodong QU, Yang SUN, Chong CHEN, Junlong SHI, Xin XU, Jutao LI, Wanhua ZHU, Guangyou FANG
2019, 41(4): 830-836. doi: 10.11999/JEIT180516
Abstract:

To improve the location resolution of electromagnetic radiation source, a ultra-short baseline network CASMA (Mini-Array by Chinese Academy of Sciences) is proposed for detection, utilizing optical fiber for timing. CASMA contains 5 electromagnetic d...

Investigation on the Radiated Interference E-field Threshold Testing for Common-mode Interference of Transmission Lines in Reverberation Chambers
Dezhou HU, Guanghui WEI, Xiaodong PAN, Xinfu LU
2019, 41(4): 837-844. doi: 10.11999/JEIT180328
Abstract:

To test the radiated interference E-field threshold of Equipment Under Test (EUT) with common-mode interference of transmission lines in reverberation chambers and unify the test results with the open areas, the range of the maximum directivity of th...

Parallel MoM Using the Six Hundred Thousand Cores on Domestically-made and Many-core Supercomputer
Zongjing GU, Haoxiang WU, Xunwang ZHAO, Zhongchao LIN, Yu ZHANG, Qi ZHANG
2019, 41(4): 845-850. doi: 10.11999/JEIT180562
Abstract:

In order to realize safety, reliability and self-control of electromagnetic computing, the large-scale parallel MoM is studied based on domestically-made many-core supercomputer platform named " Tianhe-2”. A new LU decomposition algorithm named Block...

A Robust Broadband Interference Suppression Algorithm Based on Few Snapshots
Hao WANG, Xiaonan XU, Qiming MA
2019, 41(4): 851-857. doi: 10.11999/JEIT180505
Abstract:

For the requirement of broadband interference suppression for passive sonar, a robust broadband interference suppression algorithm using few snapshots is proposed. Based on the estimated bearing of the broadband interference, the algorithm obtains th...

Missing Data Prediction Based on Kronecker Compressing Sensing in Multivariable Time Series
Yan GUO, Xiaoxiang SONG, Ning LI, Peng QIAN
2019, 41(4): 858-864. doi: 10.11999/JEIT180541
Abstract:

In view of the problem that the existing methods are not applicable or are only feasible to the case where only a low ratio of data are missing in multivariable time series, a missing data prediction algorithm is proposed based on Kronecker Compresse...

Pattern Recognition and Intelligent Information Processing
Dictionary Refinement Method for Compressive Sensing Based Multi-target Device-free Localization
Dongping YU, Yan GUO, Ning LI, Sixing YANG, Xiaoxiang SONG
2019, 41(4): 865-871. doi: 10.11999/JEIT180531
Abstract:

In order to solve the dictionary mismatch problem of Compressive Sensing (CS) based multi-target Device-Free Localization (DFL) under the wireless localization environments, a Variational Expectation Maximization (VEM) based dictionary refinement met...

Training Multi-layer Perceptrons Using Chaos Grey Wolf Optimizer
Fu YAN, Jianzhong XU, Fengshu LI
2019, 41(4): 872-879. doi: 10.11999/JEIT180519
Abstract:

The Grey Wolf Optimizer (GWO) algorithm mimics the leadership hierarchy and hunting mechanism of grey wolves in nature, and it is an algorithm with high level of exploration and exploitation capability. This algorithm has good performance in searchin...

Hybrid Point of Interest Recommendation Algorithm Based on Deep Learning
Hao FENG, Kun HUANG, Jing LI, Rong GAO, Donghua LIU, Chengfang SONG
2019, 41(4): 880-887. doi: 10.11999/JEIT180458
Abstract:

When modeling user preferences, the current researches of recommendation ignore the problem of modeling initialization and the review information accompanied with rating information for recommender models, integrating deep learning into the recommend...

Optical Image Encryption Algorithm Based on Differential Mixed Mask and Chaotic Gyrator Transform
Yanhao CHEN, Zhongyan LIU, Liyan ZHOU
2019, 41(4): 888-895. doi: 10.11999/JEIT180456
Abstract:

In order to improve the ability of anti-chosen plaintext attack and decryption quality under unknown attack in current optical encryption technology, an optical image encryption algorithm based on chaotic Gyrator transform and differential mixed mask...

Multi-scale Local Region Structure Dominant Binary Pattern Learning for Image Representation
Dongbo ZHANG, Liangling YI, Haixia XU, Ying ZHANG
2019, 41(4): 896-903. doi: 10.11999/JEIT180512
Abstract:

By means of Zero-mean Microstructure Pattern Binarization (ZMPB), an image representation method based on image local microstructure binary pattern extraction is proposed. The method can express all the important patterns with visual meaning that may...

A Perspective-independent Method for Behavior Recognition in Depth Video via Temporal-spatial Correlating
Peiliang WU, Xiao YANG, Bingyi MAO, Lingfu KONG, Zengguang HOU
2019, 41(4): 904-910. doi: 10.11999/JEIT180477
Abstract:

Considering the low recognition accuracy of behavior recognition from different perspectives at present, this paper presents a perspective-independent method for depth videos. Firstly, the fully connected layer of depth Convolution Neural Network (CN...

Sensing Matrix Optimization for Sparse Signal under Structured Noise Interference
Ruchun LI, Yunxiao CHENG, Yali QIN
2019, 41(4): 911-916. doi: 10.11999/JEIT180513
Abstract:

To solve sparse signal processing problem with structural noise interference, a method of sensing matrix optimization design based on sparse Bayesian theory is proposed. Combining the sparse signal model with additive interference, the design of the ...

Wireless Communication and Internet of Things
Blind Estimation of the Pseudo Code Period and Combination Code Sequence for Composite Binary Offset Carrier Signal
Tianqi ZHANG, Donghua LIU, Shuai YUAN, Sheng WANG
2019, 41(4): 917-924. doi: 10.11999/JEIT180444
Abstract:

For the problems of the Composite Binary Offset Carrier (CBOC) signal pseudo code period and combination code sequence are difficult to estimate in a non-cooperative context, two blind methods are proposed based on power spectrum reprocessing and Rad...

An Adaptive Consistent Iterative Hard Thresholding Alogorith for Audio Declipping
Xia ZOU, Penglong WU, Meng SUN, Xingyu ZHANG
2019, 41(4): 925-931. doi: 10.11999/JEIT180543
Abstract:

Audio clipping distortion can be solved by the Consistent Iterative Hard Thresholding (CIHT) algorithm, but the performance of restoration will decrease when the clipping degree is large, so, an algorithm based on adaptive threshold is proposed. The ...

An Improvement Project of Roundoff Noise Performance of FIR Filters Based on Structure Optimization
Ling ZHUANG, Juan GUAN, Jingyi MA, Guangyu WANG
2019, 41(4): 932-938. doi: 10.11999/JEIT180480
Abstract:

For the problem of the finite word length effect of prototype filters in hardware implementation of the filter bank system, this paper studies how to improve the performance of roundoff noise caused by signal quantization for the FIR prototype filter...

A Novel Design Algorithm for Low Complexity Sparse FIR Notch Filters
Wei XU, Anyu LI, Boya SHI
2019, 41(4): 939-944. doi: 10.11999/JEIT180548
Abstract:

FIR notch filter has many advantages such as linear phase, high precision and good stability. However, when the notch performance is required to be high, a higher order is usually required, resulting in increased greatly hardware complexity of the FI...

Backhaul Scheme and Performance Study of Full-duplex Multi-tier Heterogeneous Networks Based on Non-orthogonal Multiple Access
Xiangdong JIA, Shanshan JI, Qiaoling FAN, Xiaorong YANG
2019, 41(4): 945-951. doi: 10.11999/JEIT180463
Abstract:

To establish effective backhaul connection in multi-tiers Heterogeneous Network (HetNet), by exploiting advanced Non-Orthogonal Multiple Access (NOMA) a novel in-band wireless backhaul scheme is proposed at full-duplex Small cell Base Stations (SBSs)...

Security Hybrid Beamforming Algorithm for Millimeter Wave Downlink Multiuser System
Kaizhi HUANG, Shaoyu WANG, Xiaoming XU, Yajun CHEN
2019, 41(4): 952-958. doi: 10.11999/JEIT180713
Abstract:

The millimeter-wave hybrid beamforming becomes a widely accepted beamforming method in millimeter-wave systems. However there is almost no hybrid beamforming algorithm based on security. Especially when the eavesdropper has multi-user decoding capabi...

Pre-decoding Based Maximum-likelihood Simplified Successive-cancellation Decoding of Polar Codes
Jianhang LIU, Yijing HE, Shibao LI, Lijin LU, Yunqiang DENG
2019, 41(4): 959-966. doi: 10.11999/JEIT180324
Abstract:

To solve the long decoding latency caused by the serial nature of the decoding of polar codes, a pre-decoding based maximum-likelihood simplified successive-cancellation decoding algorithm is proposed. First, the signs of the likelihood values stored...

Cluster-based Algorithm of Reconnaissance UAV Swarm Based on Wireless Ultraviolet Secret Communication
Taifei ZHAO, Shan XU, Yao QU, Jing WANG, Jie ZHANG
2019, 41(4): 967-972. doi: 10.11999/JEIT180491
Abstract:

Focusing on the reconnaissance mission of Unmanned Aerial Vehicle (UAV) swarm under complex battlefield environment, the non-uniform energy consumption during the information transmission between UAVs affects the efficient implementation of the recon...

Joint Optimization of Virtualized Network Function  Placement and Routing Allocation for Operational Expenditure
Jiugen SHI, Jing ZHANG, Hao XU, Ji WANG, Li SUN
2019, 41(4): 973-979. doi: 10.11999/JEIT180522
Abstract:

With the development of Network Function Virtualization (NFV), Virtual Network Functions (VNFs) can be deployed in a common platform such as virtual machines in the form of Service Function Chaining (SFC), providing flexibility for management. Howeve...

Multi-objective Virtual Network Embedding Algorithm Based on Nash Bargaining
Mengyang HE, Lei ZHUANG, Weibing LONG, Guoqing WANG
2019, 41(4): 980-986. doi: 10.11999/JEIT180419
Abstract:

Request acceptance rate and energy saving are the two most important indicators in the virtual network mapping process. However, the current virtual network embedding problem considers only a single index, ignoring the correlation and constraints bet...

A Traffic Scheduling Algorithm for Bandwidth Fragmentation Minimization and QoS Guarantee in Data Center Network
Hong TANG, Xinxin WANG, Yixing LIU
2019, 41(4): 987-994. doi: 10.11999/JEIT180466
Abstract:

With the rapid growth of Data Center Network (DCN) traffic, how to improve the performance and service quality of data center network become a research hotspot. However, when the network load increases, the existing traffic scheduling algorithm on th...

A Fragment-aware Secure Virtual Network Reconfiguration Method
Xinbo LIU, Buhong WANG, Zhixian YANG, Haiou SHEN
2019, 41(4): 995-1001. doi: 10.11999/JEIT180474
Abstract:

The existing virtual network reconfiguration algorithms do not consider the fragment resources generated in the physical network, which results in the improvement of the performance of the online virtual network embedding algorithms is not obvious. T...

Incentive and Restraint Mechanism of Rewards and Punishment in Access Control Based on Game Theory
Bin ZHAO, Chuangbai XIAO, Wenyin ZHANG, Xue GU
2019, 41(4): 1002-1009. doi: 10.11999/JEIT180406
Abstract:

Trust based access control is a research hotspot in open network that access control is one of the importation technology of information security. For the interactive access behaviors of non-honest cooperation between network interactive entities in ...

Academic review
Resistance to Misuse Ciphertext of Signcryption Scheme
Ming CHEN, Fei WANG
2019, 41(4): 1010-1016. doi: 10.11999/JEIT180129
Abstract:

The misuse of signcryption ciphertext means that the malicious recipient uses the received signcryption ciphertext to forge a new ciphertext that has a different recipient. It is found that the Existential UnForgeability against adaptive Chosen Messa...