Advanced Search

2020 Vol. 42, No. 3

contents
2020, 42(3): 1-4.
Abstract:
Radar System and Signal Processing
A Moving Target Imaging Approach for the Multichannel in Azimuth High Resolution Wide Swath SAR System
Yuying WANG, Zhimin ZHANG, Ning LI, Huaitao FAN, Qingchao ZHAO
2020, 42(3): 541-546. doi: 10.11999/JEIT190211
Abstract:

Since the echo characteristics of moving targets are different from that of stationary targets, the traditional reconstruction filter bank algorithm, i.e., the reconstruction filter algorithm, is not applicable. In this paper, a novel reconstruction ...

Error Analysis of Dynamic Sea Surface Height Measurement by Near-nadir Interferometric SAR
Yao CHEN, Mo HUANG, Xiaoqing WANG, Haifeng HUANG
2020, 42(3): 547-554. doi: 10.11999/JEIT190191
Abstract:

The wide-swath interferometric altimeter working at near-nadir is a newly developed ocean surface topography measurement technology in recent years. Different from land elevation measurement, for the dynamic ocean surface waves, they move randomly al...

Algebraic Solution for 3D Localization of Multistatic Passive Radar in the Presence of Sensor Position Errors
Yan ZUO, Xialei ZHOU, Taoran JIANG
2020, 42(3): 555-562. doi: 10.11999/JEIT190292
Abstract:

An observer is placed on the airborne in the multistatic passive radar localization system. The error in observer position may seriously affect the localization accuracy. An algebraic closed-form solution is proposed for 3D localization of multistati...

Research on the Detection Algorithm for Sea Surface Targets Based on Passive Interferometric Microwave Images
Hailiang LU, Zhiqiang WANG, Chao GAO, Yinan LI, Taiyang HU, Jiakun WANG, Xiaojiao YANG, Rongchuan LÜ, Hao LI
2020, 42(3): 563-572. doi: 10.11999/JEIT190256
Abstract:

To effectively detect sea surface targets by the passive interferometric microwave technology considered as an important complement for the space-based early warning system of China, a detection algorithm is proposed based on the Passive Interferomet...

Magnetic Dipole Object Tracking Algorithm Based on Magnetometer Array in Geomagnetic Background
Luzhao CHEN, Yongqiang FENG, Ruijie GUO, Wanhua ZHU, Guangyou FANG
2020, 42(3): 573-581. doi: 10.11999/JEIT190236
Abstract:

In order to solve the problem of geomagnetic interference and model nonlinearity in the tracking process of magnetic dipole under geomagnetic background, Monte Carlo Kalman Filter (MCKF) tracking method based on differential magnetic anomaly is propo...

Design of Ka-band Linear Tapered Slot Antennas Based on Substrate Integrated Waveguide Feed
Honggang HAO, Jiang LI, Ting ZHANG, Wei RUAN
2020, 42(3): 582-588. doi: 10.11999/JEIT190218
Abstract:

Linear Tapered Slot Antennas (TSA) have significant advantages over traditional horn antennas, dielectric rod antenna when used as feed elements in Focal Plane Arrays (FPA) of Passive MilliMeter Wave(PMMW) imaging. In this paper, a novel Antipodal Li...

Sparse and Low Rank Recovery Based Robust DOA Estimation Method
Hongyan WANG, Ruonan YU
2020, 42(3): 589-596. doi: 10.11999/JEIT190263
Abstract:

Focusing on the problem of rather large estimation error in the traditional Direction Of Arrival (DOA) estimation algorithm induced by finite subsampling, a robust DOA estimation method based on Sparseand Low Rank Decomposition (SLRD) is proposed in ...

Adaptive Null Broadening Algorithm Based on Sidelobes Cancellation
Yunhe CAO, Yongqiang GUO, Shuai LIU, Yutao LIU
2020, 42(3): 597-602. doi: 10.11999/JEIT190296
Abstract:

In existing null broadening algorithm, the taper matrix does not contain phase information, and when it is used to against strong directional and large deviation angle interference, the null depth becomes shallow and the interference suppression perf...

Indoor Through-the-wall Passive Human Target Detection Algorithm
Xiaolong YANG, Shiming WU, Mu ZHOU, Liangbo XIE, Jiacheng WANG
2020, 42(3): 603-612. doi: 10.11999/JEIT190378
Abstract:

In through-the-wall scene, due to the serious attenuation of signal caused by wall, the energy of target reflection signal in the received signal decreases significantly and the received signal is submerged in the direct signal of the transceiver and...

High-performance Co-prime Spectral Analysis Method Based on Parallelled All-phase Point-pass Filtering
Xiangdong HUANG, Yuxuan SHAN, Jian WANG
2020, 42(3): 613-620. doi: 10.11999/JEIT190317
Abstract:

In order to completely remove the spurious-peak side effect in the undersampling based wide-band spectral analysis, this paper proposes a high-performance co-prime spectral analysis method based on paralleled all-phase point-pass filtering. On basis ...

Wireless Communication and Internet of Things
An Optimal Number of Indices Aided gOMP Algorithm for Multi-user Detection in NOMA System
Bin SHEN, Hebiao WU, Taiping CUI, Qianbin CHEN
2020, 42(3): 621-628. doi: 10.11999/JEIT190270
Abstract:

As one of the key 5G technologies, Non-Orthogonal Multiple Access (NOMA) can improve spectrum efficiency and increase the number of user connections by utilizing the resources in a non-orthogonal manner. In the uplink grant-free NOMA system, the Comp...

A Hierarchical Vertical Handover Algorithm Based on Fuzzy Logic in Heterogeneous Wireless Networks
Bin MA, Shangru LI, Xianzhong XIE
2020, 42(3): 629-636. doi: 10.11999/JEIT190190
Abstract:

In the heterogeneous wireless networks, the parameter weight is difficult to determine for the vertical handover algorithm considering the parameters of the network and the user, at the same time, the vertical handover algorithm based on fuzzy logic ...

Energy Efficient Resource Allocation Scheme Based on Inactive Users in Small Cell Networks
Xiaoge HUANG, Weiwei FAN, Chunyan CAO, Qianbin CHEN
2020, 42(3): 637-644. doi: 10.11999/JEIT190303
Abstract:

Considering the interference problem of overlapping areas of cells, the service continuity of mobile users and the utilization of spectrum resources in the 5G network, an Energy Efficient resource allocation scheme for the Inactive user(EEI) is propo...

An Offloading Mechanism Based on Software Defined Network and Mobile Edge Computing in Vehicular Networks
Haibo ZHANG, Kunlun JING, Kaijian LIU, Xiaofan HE
2020, 42(3): 645-652. doi: 10.11999/JEIT190304
Abstract:

In the emerging vehicular networks, the task of the car terminal requesting offloading has more stringent requirements for network bandwidth and offload delay, and the proposed Mobile Edge Computing (MEC) in the new communication network research sol...

A New Link Prediction Method for Complex Networks Based onTopological Effectiveness of Resource Transmission Paths
Kai WANG, Xing LI, Julong LAN, Hongquan WEI, Shuxin LIU
2020, 42(3): 653-660. doi: 10.11999/JEIT190333
Abstract:

Link prediction considers to discover the unknown or missing links of complex networks by using the existing topology or other information. Resource Allocation index can achieve a good performance with low complexity. However, it ignores the path eff...

Control Resource Optimization Mechanism of SDN Based on Traffic Engineering
Yuxiang HU, Ziyong LI, Zongkui HU, Tao HU
2020, 42(3): 661-668. doi: 10.11999/JEIT190276
Abstract:

In Software-Defined Networking (SDN) with distributed control plane, network expansion problems arise due to network domain management. To address this issue, a Traffic Engineering-based control Resource Optimization (TERO) mechanism of SDN is propos...

Virtual Network Function Migration Algorithm Based on Reinforcement Learning for 5G Network Slicing
Lun TANG, Yu ZHOU, Qi TAN, Yannan WEI, Qianbin CHEN
2020, 42(3): 669-677. doi: 10.11999/JEIT190290
Abstract:

In order to solve the Virtual Network Function (VNF) migration optimization problem caused by the dynamicity of service requests on the 5G network slicing architecture, firstly, a stochastic optimization model based on Constrained Markov Decision Pro...

An Adaptive Point-Of-Interest Recommendation Method Based on Check-in Activity and Temporal-Spatial Probabilistic Models
Yali SI, Fuzhi ZHANG, Wenyuan LIU
2020, 42(3): 678-686. doi: 10.11999/JEIT190287
Abstract:

Existing Point-Of-Interest (POI) recommendation algorithms lack adaptability for users with different check-in features. To solve this problem, an adaptive POI recommendation method UCA-TS based on User Check-in Activity (UCA) feature and Temporal-Sp...

Network and Information Security
Double Encryption Method Based on Neural Network and Composite Discrete Chaotic System
Chenglong XIAO, Ying SUN, Bangjiang LIN, Xuan TANG, Shanshan WANG, Min ZHANG, Yufang XIE, Lingfeng DAI, Jiabin LUO
2020, 42(3): 687-694. doi: 10.11999/JEIT190213
Abstract:

Orthogonal Frequency Division Multiplexing(OFDM) is widely used in wireless communication systems, and its data transmission security has certain practical significance. A double encryption scheme is proposed which enhances the confidentiality of the...

Network Traffic Anomaly Detection Method Based on Deep Features Learning
Shuqin DONG, Bin ZHANG
2020, 42(3): 695-703. doi: 10.11999/JEIT190266
Abstract:

In view of the problems of low attack detection rate and high false positive rate caused by poor accuracy and robustness of the extracted traffic features in network traffic anomaly detection, a network traffic anomaly detection method based on deep ...

A Privacy-aware Computation Offloading Method Based on Lyapunov Optimization
Xing ZHAO, Jianhua PENG, Wei YOU
2020, 42(3): 704-711. doi: 10.11999/JEIT190170
Abstract:

The decision on computation offloading to Mobile Edge Computing (MEC) may expose user’s characteristics and cause the user to be locked. A privacy-aware computation offloading method based on Lyapunov optimization is proposed in this paper. Firstly, ...

The Method of Virtual Machine Live Migration Based on HashGraph
Junfeng TIAN, Xueqing QU, Xinfeng HE, Zhen LI
2020, 42(3): 712-719. doi: 10.11999/JEIT190200
Abstract:

Live migration of Virtual Machines(VMs) across WANs is an important support for multi-datacenter cloud computing environments. The current live migration of VMs across WANs faces many technical challenges due to the limitations of small bandwidth and...

Integral Attacks on SIMON64
Hong XU, Yuying FANG, Wenfeng QI
2020, 42(3): 720-728. doi: 10.11999/JEIT190230
Abstract:

The SIMON block cipher receives extensive attention since its proposed. With respect to integral attacks, some integral attacks on SIMON32 and SIMON48 are presented by Wang, Fu and Chu et al. In this paper, on the basis of the existing analysis resul...

Pattern Recognition and Intelligent Information Processing
Application of Improved Bird Swarm Algorithm Based on Nonlinear Factor in Dynamic Energy Management
Jun LUO, Zewei LIU, Ping ZHAGN, Xueming LIU, Zheng LIU
2020, 42(3): 729-736. doi: 10.11999/JEIT190264
Abstract:

The application of Dynamic Voltage Scaling (DVS) technique in real-time system energy management will result in the decrease of system reliability. A dynamic energy management method based on Improved Bird Swarm Algorithm (IoBSA) is proposed in this ...

Earthquake Emergency Resource Multiobjective Schedule Algorithm Based on Particle Swarm Optimization
Hongliang TANG, Bolin WU, Wang HU, Chengxu KANG
2020, 42(3): 737-745. doi: 10.11999/JEIT190277
Abstract:

It is of great significance to optimize emergency resource schedule for earthquake emergency rescue. The conflicting multiple schedule goals, such as time, fairness, and cost, should be taken into consideration together in an earthquake emergency res...

Iterative Fuzzy C-means Clustering Algorithm & K-Nearest Neighbor and Dictionary Data Based Ensemble TSK Fuzzy Classifiers
Xiongtao ZHANG, Yunliang JIANG, Xingguang PAN, Wenjun HU, Shitong WANG
2020, 42(3): 746-754. doi: 10.11999/JEIT190214
Abstract:

A new ensemble TSK fuzzy classifier (i,e. IK-D-TSK) is proposed. First, all zero-order TSK fuzzy sub-classifiers are organized in a parallel way, then the output of each sub-classifier is augmented to the original (validation) input space, finally, t...

Adaptive Image Dehazing Algorithm Based on Mean Unequal Relation Optimization
Yan YANG, Zhiwei WANG
2020, 42(3): 755-763. doi: 10.11999/JEIT190368
Abstract:

In view of shortcomings of dark channel prior dehazing methods, such as transmission in sky areas is small and halo effects are prone to occur in the edges, this paper proposes a novel and efficient dehazing algorithm. Firstly, the fan-shaped model w...

Minimal Surface Filter Driven by Curvature Difference
Manli WANG, Zijian TIAN, Yuangang ZHANG
2020, 42(3): 764-771. doi: 10.11999/JEIT190216
Abstract:

To improve performance of denoising and edge preservation of the total variational image denoising model, a curvature difference driven minimal surface filter is proposed. Firstly, the presented filter model is constructed by adding an adaptive edge ...

Multi-level Attention Feature Network for Few-shot Learning
Ronggui WANG, Mengya HAN, Juan YANG, Lixia XUE, Min HU
2020, 42(3): 772-778. doi: 10.11999/JEIT190242
Abstract:

Existing few-shot methods have problems that feature extraction scale is single, the learned class representations are inaccurate, the similarity calculation still relies on standard metrics. In order to solve the above problems, multi-level attentio...

Circuit and System Design
Design and Implementation of Generic Low-entropy High-order Composite Field Based Masking Scheme
Jiuxing JIANG, Yuying ZHAO, Hai HUANG, Guanghui XIE, Jiao HOU, Xinxin FENG
2020, 42(3): 779-786. doi: 10.11999/JEIT190257
Abstract:

Based on the in-depth research on the S-box constitution arithmetic of composite, an area optimized generic low-entropy higher-order masking scheme is proposed in this paper. The low entropy masking method is introduced on GF(24), and the partial mod...

Circuits Optimization and System Linearization for High Efficiency and Wideband Envelope Tracking Architecture
Tao CAO, Youjiang LIU, Chun YANG, Jie ZHOU
2020, 42(3): 787-794. doi: 10.11999/JEIT190275
Abstract:

To improve bandwidth, efficiency and linearity of Envelope Tracking (ET) architecture, it is necessary to optimize the performance of envelope supply modulator and linearize nonlinear behavior of the ET system. The optimization procedure of the suppl...