Advanced Search

2019 Vol. 41, No. 5

contents
2019, 41(5): 1-4.
Abstract:
Radar and Satellite Navigation
Evil Waveform Evaluating Method for New GNSS Signals
Chengyan HE, Xiaochun LU, Ji GUO
2019, 41(5): 1017-1024. doi: 10.11999/JEIT180656
Abstract:

The waveform characteristics of the navigation signals of Global Navigation Satellite Systems (GNSSs) will be of vital importance for signal quality, which plays an imperative and direct role in achieving high performance of GNSS services. These trad...

Denoising of MEMS Gyroscope Based on Improved Wavelet Transform
Guangwu CHEN, Xiaobo LIU, Di WANG, Shede LIU
2019, 41(5): 1025-1031. doi: 10.11999/JEIT180590
Abstract:

In order to improve the measurement accuracy of Micro Electro Mechanical Systems (MEMS) gyroscopes, the influence of measurement noise on them is suppressed. The error characteristics of a certain type of MEMS gyroscope are analyzed. A strong trackin...

An Accurate Wideband Beampattern Synthesis Method Based on the Space-frequency Structure and the Space-time Structure Conversion
Xu WANG, Julan XIE, Zishu HE, Huiyong LI
2019, 41(5): 1032-1039. doi: 10.11999/JEIT180545
Abstract:

An accurate wideband beampattern synthesis method based on the space-time structure is proposed. Making use of the property that the magnitude response can be translated into linear function under the condition of conjugate symmetric weights, the bea...

DOA Estimation Under Active Deception Jamming Environment
Shanshan WANG, Zheng LIU, Rong XIE, Lei RAN
2019, 41(5): 1040-1046. doi: 10.11999/JEIT180488
Abstract:

For the target DOA estimation under active deception jamming environment with limited samples, a novel DOA estimation method based on the combination of Adaptive Polarization Filter(APF) and Block Sparse Bayesian Learning(BSBL) algorithm is proposed....

Fractional Fourier Transform and Compressed Sensing Adaptive Countering Smeared Spectrum Jamming
Yang ZHAO, Chaoxuan SHANG, Zhuangzhi HAN, Ning HAN, Hui XIE
2019, 41(5): 1047-1054. doi: 10.11999/JEIT180569
Abstract:

SMeared SPectrum (SMSP) jamming has lots of coupling in time and frequency domain with Linear Frequency Modulated (LFM) radar signals, which has good jamming performance. This paper proposes a signal processing method for countering SMSP jamming in i...

Velocity Estimation of Moving Targets Based on Least Square Fitting of High-resolution SAR Echo Sequences
Chao WANG, Yanfei WANG, Qi WANG, Xueli ZHAN
2019, 41(5): 1055-1062. doi: 10.11999/JEIT180695
Abstract:

Velocity estimation of moving targets is a key part of ground moving target imaging and positioning in airborne single-antenna high-resolution SAR system. In order to solute the defects of traditional algorithms, such as high computation brought by s...

An Airborne SAR Image Target Location Algorithm Based on Parameter Refining
Yuan WU
2019, 41(5): 1063-1068. doi: 10.11999/JEIT180564
Abstract:

The target location accuracy is an important technical parameter of airborne SAR system, thus the target location of airborne SAR image is important for application. The precision of the moving parameters directly influences the precision of the SAR ...

A Motion Error Estimation Method Joint Envelope and Phase for 10 GHz Ultra-wideband Microwave Photonic-based SAR Image
Xiaoxiang CEHN, Mengdao XING, Guangcai SUN, Guobin JING
2019, 41(5): 1069-1076. doi: 10.11999/JEIT180563
Abstract:

Due to the 2-D vacancies with serious motion errors when processing 10 GHz ultra-wideband microwave photonic-based SAR, current motion error estimation methods directly estimating with phase error can not obtain correct estimation result in this pape...

Research on Spaceborne High Resolution Wide Swath Imaging Method Based on Relax Algorithm
Xudong WANG, Di ZHANG, He YAN
2019, 41(5): 1077-1083. doi: 10.11999/JEIT180596
Abstract:

The modern spaceborne SAR system requires both high resolution and wide swath, and the conventional single channel spaceborne SAR system has a contradiction between the two important indexes, the azimuth multichannel method is proposed and used to so...

Radar Emitter Signal Identification Based on Multi-scale Information Entropy
Yingkun HUANG, Weidong JIN, Peng GE, Bing LI
2019, 41(5): 1084-1091. doi: 10.11999/JEIT180535
Abstract:

With the increasing complexity of radar signals, it is more and more difficult to extract features of the real sequences, but when they are transformed to a symbol sequence, it is usually easier to mine the effective feature parameters. Therefore, a ...

Design and Research of DC-6 GHz Broadband Electromagnetic Radiation Experimental Device
Shiqi WANG, Shaojun FANG, Peng CHEN
2019, 41(5): 1092-1097. doi: 10.11999/JEIT180593
Abstract:

As the bandwidth of the traditional TEM cell can not satisfy the growing demand for broadband, a broadband electromagnetic radiation device working from DC to 6 GHz is designed based on the coaxial structure. According to circuit principle and impeda...

Pattern Recognition and Intelligent Information Processing
Remote Sensing Image Classification Method Based on Deep Convolution Neural Network and Multi-kernel Learning
Xin WANG, Ke LI, Chen NING, Fengchen HUANG
2019, 41(5): 1098-1105. doi: 10.11999/JEIT180628
Abstract:

To solve the problems of complex feature extraction process and low characteristic expressiveness of traditional remote sensing image classification methods, a high resolution remote sensing image classification method based on deep convolution neura...

Multi-objective Evolutionary Semi-supervised Fuzzy Clustering Image Segmentation Motivated by Region Information
Feng ZHAO, Mimi ZHANG, Hanqiang LIU
2019, 41(5): 1106-1113. doi: 10.12000/JRIT180605
Abstract:

When multi-objective evolutionary clustering algorithms are applied to image segmentation, the image pixels are always utilized to be clustered. It results in a long running time. In addition, due to not considering the image region information, the ...

Robust Fuzzy C-means Clustering Algorithm Integrating Between-cluster Information
Yunlong GAO, Chengyu YANG, Zhihao WANG, Sizhe LUO, Jinyan PAN
2019, 41(5): 1114-1121. doi: 10.11999/JEIT180604
Abstract:

Comparing with K-means, Fuzzy logic is introduced in Fuzzy C-Means to handle the information between clusters. It can obtain better cluster results. However, fuzzy logic makes observations could belong to more than just one cluster, which results FCM...

Image Quality Assessment Algorithm Based on Non-local Gradient
Minjuan GAO, Hongshe DANG, Lili WEI, Xuande ZHANG
2019, 41(5): 1122-1129. doi: 10.11999/JEIT180597
Abstract:

The goal of Image Quality Assessment (IQA) research is to simulate the Human Visual System’s (HVS) perception process of assessing image quality and construct an objective evaluation algorithm that is as consistent as the subjective evaluation result...

A Fast Random-valued Impulse Noise Detection Algorithm Based on Deep Belief Network
Shaoping XU, Guizhen ZHANG, Chongxi LI, Tingyun LIU, Yiling TANG
2019, 41(5): 1130-1136. doi: 10.11999/JEIT180558
Abstract:

To improve the detection accuracy and execution efficiency of the existing Random-Valued Impulse Noise (RVIN) detectors, a fast training-based RVIN detection algorithm is implemented by constructing a more descriptive feature vector and training a de...

Spatial-temporal Stream Anomaly Detection Based on Bayesian Fusion
Ying CHEN, Dandan HE
2019, 41(5): 1137-1144. doi: 10.11999/JEIT180429
Abstract:

Focusing on the problem that convolutional auto-encoder network based anomaly detection ignores time information, a novel anomaly detection model based on Bayesian fusion of spatial-temporal stream is proposed. A convolution auto-encoder network is u...

A Direct Fusion Algorithm for Multiple Pieces of Evidence Based on Improved Conflict Measure
Li ZHOU, Xinming ZHANG, Weizhen GUO, Yan WANG
2019, 41(5): 1145-1151. doi: 10.11999/JEIT180578
Abstract:

In the light of the disadvantages that Jousselme’s evidential distance function can not describe the local conflicting information of evidence well and can not measure the conflict of high conflicting evidence accurately, an improved Jousselme’s evid...

Robust Application Mapping for Networks-on-chip Considering Uncertainty of Tasks
Xinyu WANG, Zhiying LI, Shuai SHAO, Zhigang YU
2019, 41(5): 1152-1159. doi: 10.11999/JEIT180600
Abstract:

In the standard application mapping problem, it is assumed that the communicating traffic of a task is a fixed value. In the real applications, the communication traffic is uncertain due to the time-varying and bursty characters. Therefore, it has th...

Adaptive Design of Limiters for Impulsive Noise Suppression
Zhongtao LUO, Peng LU, Yangyong ZHANG, Gang ZHANG
2019, 41(5): 1160-1166. doi: 10.11999/JEIT180609
Abstract:

An adaptive method of limiter design is proposed to suppress impulsive noise. With a purpose of maximizing the efficacy function, the proposed method searches for optimal thresholds of clipper and blanker, via adaptive line search. Firstly, based on ...

Cryption and Information Security
Constructions of Gaussian Integer Periodic Complementary Sequences Based on Difference Families
Tao LIU, Chengqian XU, Yubo LI
2019, 41(5): 1167-1172. doi: 10.11999/JEIT180646
Abstract:

Constructions of Gaussian integer periodic complementary sequences are presented in this paper. Based on the relationship between periodic complementary sequences and difference families, the sufficient condition of the existence of Gaussian integer ...

Related-key Impossible Differential Cryptanalysis on Lightweight Block Cipher ESF
Min XIE, Qiya ZENG
2019, 41(5): 1173-1179. doi: 10.11999/JEIT180576
Abstract:

Eight-Sided Fortress (ESF) is a lightweight block cipher with a generalized Feistel structure, which can be used in resource-constrained environments such as protecting Radio Frequency IDentification (RFID) tags in the internet of things. At present,...

Hybrid Group Signcryption Scheme Based on Heterogeneous Cryptosystem
Shufen NIU, Xiyan YANG, Caifen WANG, Miao TIAN, Xiaoni DU
2019, 41(5): 1180-1186. doi: 10.11999/JEIT180554
Abstract:

Group signcryption is a cryptosystem which can realize group signature and group encryption. However, the message sender and receiver of existing group signcryption schemes are basically in the same cryptosystem, which does not meet the needs of the ...

Wireless Communication Network
Resource Allocation Algorithm of Network Slicing Based on Online Auction
Liang LIANG, Yanfei WU, Gang FENG
2019, 41(5): 1187-1193. doi: 10.11999/JEIT180636
Abstract:

In order to meet the diversified service requirements in future mobile communication networks and provide users with customized services while improving network economic efficiency, a resource allocation algorithm of network slicing based on online a...

Computing Offloading and Resource Optimization in Ultra-dense Networks with Mobile Edge Computation
Haibo ZHANG, Hu LI, Shanxue CHEN, Xiaofan HE
2019, 41(5): 1194-1201. doi: 10.11999/JEIT180592
Abstract:

Mobile Edge Computing (MEC) improves the quality of users experience by providing users with computing capabilities at the edge of the wireless network. However, computing offloading in MEC still faces some problems. In this paper, a joint optimizati...

Energy Efficiency Routing Strategy with Lightpath Impairment Awareness in Service-Oriented Elastic Optical Networks
Huanlin LIU, Fei FANG, Jun HUANG, Yong CHEN, Min XIANG, Yue MA
2019, 41(5): 1202-1209. doi: 10.11999/JEIT180580
Abstract:

To address the problems of low spectrum utilization and high energy consumption caused by physical impairment in elastic optical networks, a service differentiated energy efficiency routing strategy with Link Impairment-Aware Spectrum Partition (LI-A...

An Adaptive Vertical Handover Algorithm Based on Artificial Neural Network in Heterogeneous Wireless Networks
Bin MA, Shangru LI, Xianzhong XIE
2019, 41(5): 1210-1216. doi: 10.11999/JEIT180534
Abstract:
Current research on Vertical HandOver algorithm based on Artificial Neural Network (ANN-VHO) has a poor service adaptability and high computational complexity. Considering this problem, an adaptive vertical handover algorithm based on artificial neur...
A Fast Convergent Cross-layer Resource Optimization Allocation Algorithm in Wireless Multi-hop Networks
Wei FENG, Yongxin XU, Hao LIU, Xiaorong XU, Yingbiao YAO
2019, 41(5): 1217-1224. doi: 10.11999/JEIT180581
Abstract:
In order to improve the performance of the large queue backlogs and low convergence rate in back pressure routing algorithm, the cross-layer optimization of joint congestion control, multi-path routing and power allocation in wireless multi-hop netwo...
A New Link Prediction Method for Complex Networks Based on Resources Carrying Capacity Between Nodes
Kai WANG, Shuxin LIU, Hongchang CHEN, Xing LI
2019, 41(5): 1225-1234. doi: 10.11999/JEIT180553
Abstract:
Link prediction aims to discover the unknown or missing links of complex networks, which plays an important role in practical application. The similarity-based link prediction methods attract a lot of attention due to their briefness and effectivenes...
Geographical Location Recognition of IP Based on Network Structure Features
Gaolei FEI, Yameng ZHANG, Zhiyu HU, Lei ZHOU, Guangmin HU
2019, 41(5): 1235-1242. doi: 10.11999/JEIT180589
Abstract:
The existing IP location technology determines the location of IP by querying IP to register information databases or using time-delay information. In fact, due to the influence of various factors, most of the IP in the network can not get accurate a...
Supervised Learning Based Truthful Auction Mechanism Design in Cloud Computing
Jixian ZHANG, Ning XIE, Xuejie ZHANG, Weidong LI
2019, 41(5): 1243-1250. doi: 10.11999/JEIT180587
Abstract:
Auction based resource allocation can make resource provider get more profit, which is a major challenging problem for cloud computing. However, the resource allocation problem is NP-hard and can not be solved in polynomial time. Existing studies mai...
Circuit and System Design
Accelerating Functional Verification for Digital Circuit with FPGA Hard Processor System
Xiaoqiang LIU, Guoshun YUAN, Shushan QIAO
2019, 41(5): 1251-1256. doi: 10.11999/JEIT180641
Abstract:
In order to reduce the functional verification cycle of application-specific integrated circuits and on-chip system, a method for accelerating functional verification with FPGA digital hard processor system is proposed. The proposed method combines t...
Design and Implementation of Hardware Trojan Detection Algorithm for Coarse-grained Reconfigurable Arrays
Yingjian YAN, Min LIU, Zhaoyang QIU
2019, 41(5): 1257-1264. doi: 10.11999/JEIT180484
Abstract:
Hardware Trojan horse detection has become a hot research topic in the field of chip security. Most existing detection algorithms are oriented to ASIC circuits and FPGA circuits, and rely on golden chips that are not infected with hardware Trojan hor...
Academic review
Security Analysis and Improvement of Certificateless Aggregate Signature Scheme for Vehicular Ad Hoc Networks
Xiaodong YANG, Tingchun MA, Chunlin CHEN, Jinli WANG, Caifen WANG
2019, 41(5): 1265-1270. doi: 10.11999/JEIT180571
Abstract:
In 2018, Wang Daxing and Teng Jikai proposed a certificateless aggregate signature scheme for vehicular ad-hoc networks, and proved that their scheme was existentially unforgeable in the random oracle model. To analyze the security of this scheme, th...