Advanced Search

2020 Vol. 42, No. 7

contents
2020, 42(7): 1-4.
Abstract:
Radar and Satellite Navigation
Joint Transmitting Subarray Partition and Beamforming Design Method Based on Two-Dimensional Phased-MIMO Radar
Junsheng HUANG, Hongtao SU
2020, 42(7): 1557-1565. doi: 10.11999/JEIT190429
Abstract:

In order to suppress effectively the interference signal and improve further the performance of radar system, a joint transmitting subarray partition and beamforming design method based on two-dimensional phased-MIMO radar is proposed. Firstly, the t...

Distributed Coherent Radar LFM Wideband Stretch Parameter Estimation Method
Baoliang ZHOU
2020, 42(7): 1566-1572. doi: 10.11999/JEIT190398
Abstract:

Wideband distributed coherent radar technology can effectively improve the target measurement accuracy and recognition performance, and has important research value. For the existing radar equipment generally does not have the ability to stretch the ...

Researches on Pro-retirement Signal Quality of BeiDou Navigation Satellite System GEO-3 Satellite B1 Signal
Huihui SHI, Meng WANG, Yongnan RAO, Xiaochun LU, Xue WANG
2020, 42(7): 1573-1580. doi: 10.11999/JEIT190383
Abstract:

The BDS-2 (BeiDou-2 System) officially provided services to the Asia-Pacific region in 2012. The GEO-3 satellite has been retired and replaced by the GEO-7 satellite. Studying the signal quality characteristics of the satellite during the pro-retirem...

Low-elevation DOA Estimation for VHF Radar Based on Multi-frame Phase Feature Enhancement
Houhong XIANG, Baixiao CHEN, Ting YANG, Minglei YANG
2020, 42(7): 1581-1589. doi: 10.11999/JEIT190432
Abstract:

For the DOA estimation problem of low-elevation target of VHF radar, a new multi-frame phase feature enhancement based method is proposed, which solves effectively the phase feature ambiguity of direct signal, and thus improves the accuracy of DOA es...

Inversion of Yellow River Runoff Based on Multi-source Radar Remote Sensing Technology
Lin MIN, Ning WANG, Lin WU, Ning LI, Jianhui ZHAO
2020, 42(7): 1590-1598. doi: 10.11999/JEIT190494
Abstract:

The Yellow River is an important water resource in China. Using radar remote sensing to monitor the runoff of the Yellow River can conveniently reflect the changing trend of drought and flood, which has important practical significance. At present, R...

A TDOA-FDOA Passive Positioning Algorithm Based on the Semi-Definite Relaxation Technique
Ting SUN, Chunxi DONG, Yu MAO
2020, 42(7): 1599-1605. doi: 10.11999/JEIT190435
Abstract:

In the passive location of moving target, the closed-form solution can reach Cramér-Rao Lower Bound (CRLB) under the low noise level, but these algorithms often can not adapt to the large measurement noise condition. For this problem, this paper prop...

Study on Time Delay Characteristics of Low Frequency One-hop Sky Waves in the Isotropic Ionosphere
Lili ZHOU, Jingjing YAN, Zhonglin MU, Qiaoqiao WANG, Chenglin LIU, Lifeng HE
2020, 42(7): 1606-1610. doi: 10.11999/JEIT190528
Abstract:

Accurate prediction of low-frequency sky-wave has significance for the lower ionosphere detection and remote navigation timing. The characteristics of sky-wave propagation time delay in the Earth-ionosphere waveguide are studied in this paper based o...

High Speed Multi-target Parameter Estimation for FA-OFDM Radar Based on Expectation Maximization Algorithm
Yinghui QUAN, Xia GAO, Minghui SHA, Xiada CHEN, Yachao LI, Mengdao XING, Chaoliang YUE
2020, 42(7): 1611-1618. doi: 10.11999/JEIT190474
Abstract:

Parameter estimation is very important for radar to detect and recognize targets. In this paper, a high speed multi-target parameter estimation method for Frequency Agility-Orthogonal Frequency Division Multiplexing(FA-OFDM) radar based on Expectatio...

Tracking Method without Prior Information when Multi-group Targets Appear Successively
Wei XIONG, Xiangqi GU, Congan XU, Yaqi CUI
2020, 42(7): 1619-1626. doi: 10.11999/JEIT190508
Abstract:

Considering the problem of multi-group maneuvering target tracking, a fast tracking method based on Interactive Multiple Maneuvering Gaussian Mixture Probability Hypothesis Density (IMM-GM-PHD) algorithm is proposed. Firstly, based on the completion ...

Non-coherent Integration Constant False Alarm Rate Detectors against K-distributed Sea Clutter for Coherent Radar Systems
Kun ZHANG, Penglang SHUI, Guanghui WANG
2020, 42(7): 1627-1635. doi: 10.11999/JEIT190441
Abstract:

The non-coherent integration detectors for coherent radar systems can promote the detection rate of the radar and meet the required real-time processing, however, these detectors are not Constant False Alarm Rate (CFAR) with respect to the reference ...

Amplifying Circuit Interface Model for LiDAR Signal Processing Systems
Ruqing LIU, Yan JIANG, Chenghao JIANG, Feng LI, Jingguo ZHU
2020, 42(7): 1636-1642. doi: 10.11999/JEIT190427
Abstract:

The monolithic signal processing circuit system for Light Detection And Ranging (LiDAR) measurement has significant practical values in terms of improving LiDAR measurement accuracy and data rate, shortening measurement time, and reducing equipment s...

Application of SVM Machine Learning to Hardware Trojan Detection Using Side-channel Analysis
Xin TONG, Ying LI, Lan CHEN
2020, 42(7): 1643-1651. doi: 10.11999/JEIT190532
Abstract:

Integrated Circuits (ICs) are suffering severer threats caused by Hardware Trojans (HTs), some of which hide in routine operations by coercing firmware or hardware. Along with conventional side-channel detection not always getting golden-chip, HTs be...

Influence of Platform Movement on Acoustic Navigation Circle Intersection Model and Error Analysis
Jin FU, Jing LI, Sibo SUN
2020, 42(7): 1652-1660. doi: 10.11999/JEIT190438
Abstract:

Acoustic navigation technology is widely used for autonomous navigation of underwater mobile platforms. The commonly used acoustic navigation models are mostly circle intersection models. The model is simple in structure and convenient in calculation...

Research on a New FM Broadcasting Timing Signal System
Zhaopeng HU, Shifeng LI, Yu XIANG
2020, 42(7): 1661-1665. doi: 10.11999/JEIT190123
Abstract:

Use of FM radio of additional information channel as a carrier lays a solid foundation for time pass for FM radio. Based on the research of FM radio additional channels, a new design method of time-sharing spread spectrum code is proposed and the con...

Wireless Communication and Internet of Things
A Survey of Orbital Angular Momentum in Wireless Communication
Xi LIAO, Chenhong ZHOU, Yang WANG, Shasha LIAO, Jihua ZHOU, Jie ZHANG
2020, 42(7): 1666-1677. doi: 10.11999/JEIT190372
Abstract:

Electromagnetic vortices are introduced into wireless communication to improve spectral efficiency and anti-interference capability. In this paper, the basic principle and characteristics of Orbital Angular Momentum (OAM) and electromagnetic eddy are...

Distributed Source Coding Using Improved Side Information
Jianhua CHEN, Zhiyuan HE, Jiong WANG
2020, 42(7): 1678-1685. doi: 10.11999/JEIT190522
Abstract:

Considering the shortcomings on the Bit Error Rate (BER) and the compression ratio of the existing asymmetric Distributed Source Coding (DSC) schemes, a scheme named Distributed Source Coding Using Improved Side Information (DSCUISI) is proposed. At ...

Dynamic Pilot Allocation Scheme for Joint User Grouping and Alliance Game in Massive MIMO Systems
Hui ZHI, Feiyue WANG, Ziju HUANG
2020, 42(7): 1686-1693. doi: 10.11999/5EIT190445
Abstract:

Many researches demonstrate that cell-edge users are more susceptible to pilot contamination than the cell-center users in massive MIMO systems. Therefore, this paper proposes a dynamic pilot allocation scheme called Joint User Grouping and Alliance ...

A Preferential Recovery Method of Interdependent Networks under Load
Fengzeng LIU, Bing XIAO, Shisi CHEN, Jiaxun CHEN
2020, 42(7): 1694-1701. doi: 10.11999/JEIT190486
Abstract:

Optimal node recovery is an effective measure to control cascading failure of interdependent networks. In view of the fact that the previous recovery model does not consider the node load, this paper analyzes first the cascading failure process inclu...

Efficient Search Method for IoT Entities with Similarity Adaptive Estimation
Puning ZHANG, Xuyuan KANG, Yuzhe LIU, Xuefang LI, Dapeng WU, Ruyan WANG
2020, 42(7): 1702-1709. doi: 10.11999/JEIT190541
Abstract:

The existing similar entity search method has poor adaptability to the length of the observed sequence, and the data storage overhead in the search process is too large, and the accuracy of the search result is insufficient. To this end, an efficient...

Disaster Prediction-based Survivable Virtual Optical Network Mapping for Multi-Area Faults
Huanlin LIU, Lixiang DU, Yong CHEN, Zhanpeng WANG
2020, 42(7): 1710-1717. doi: 10.11999/JEIT190561
Abstract:

Survivable virtual optical network mapping is an important technology to improve the optical network response to disaster failures. In order to solve the problem of bandwidth capacity loss caused by multi-area faults resulted from disasters in Elasti...

Crosstalk-aware Spectrum Converters Sparse Configuration and Resource Allocation for Space Division Multiplexing Elastic Optical Networks
Huanlin LIU, Lixiang DU, Yong CHEN, Huixia HU
2020, 42(7): 1718-1725. doi: 10.11999/JEIT190533
Abstract:

In order to solve the problem of inter-core crosstalk in Space Division Multiplexing Elastic Optical Network (SDM-EON), which leads to the decline of service transmission quality and the increase of blocking probability, a routing, fiber core and spe...

Energy Saving Mechanism with Incentive of Offloading Compression in Cloudlet Enhanced Fiber-Wireless Network
Haiying PENG, Zedong WANG, Dapeng WU
2020, 42(7): 1726-1733. doi: 10.11999/JEIT190405
Abstract:

In cloudlet enhanced Fiber-Wireless (FiWi) network, there is a problem that energy consumption and communication overhead of offloading are too large. An Energy Saving mechanism with Adaptive Offloading Compression (ESAOC) is proposed. According to t...

Pattern Recognition and Intelligent Information Processing
A Batch Inheritance Extreme Learning Machine Algorithm Based on Regular Optimization
Bin LIU, Youheng YANG, Zhibiao ZHAO, Chao WU, Haoran LIU, Yan WEN
2020, 42(7): 1734-1742. doi: 10.11999/JEIT190502
Abstract:

As a new type of neural network, Extreme Learning Machine (ELM) has extremely fast training speed and good generalization performance. Considering the problem that the Extreme Learning Machine has high computational complexity and huge memory demand ...

Detection of Paroxysmal Atrial Fibrillation Based on Kernel Sparse Coding
Ming LIU, Xianhui MENG, Peng XIONG, Xiuling LIU
2020, 42(7): 1743-1749. doi: 10.11999/JEIT190582
Abstract:

Paroxysmal Atrial Fibrillation (PAF) is a kind of accidental arrhythmia, and its high missed detection rate leads to the increase of heart-related diseases. An automatic detection method is proposed based on kernel sparse coding, which can identify P...

Quality Evaluation of Night Vision Anti-halation Fusion Image Based on Adaptive Partition
Quanmin GUO, Gaixia CHAI, Hanshan LI
2020, 42(7): 1750-1757. doi: 10.11999/JEIT190453
Abstract:

To solve the failure of existing evaluation methods of infrared and visible fusion image caused by high brightness halation information in night vision halation scene, a novel fusion image quality evaluation method based on adaptive partition is prop...

Research on the Dynamic Sparse Bayesian Recovery of Multi-task Observed Streaming Signals in Time Domain
Daoguang DONG, Guosheng RUI, Wenbiao TIAN
2020, 42(7): 1758-1765. doi: 10.11999/JEIT190558
Abstract:

To eliminate the blocking effects in the dynamic recovery of the streaming signals observed from multiple tasks in time domain, a streaming multi-task sparse Bayesian learning based algorithm and its robust enhanced version are proposed in this paper...

Motion Defocus Infrared Image Restoration Based on Multi Scale Generative Adversarial Network
Shi YI, Zhijuan WU, Jingming ZHU, Xinrong LI, Xuesong YUAN
2020, 42(7): 1766-1773. doi: 10.11999/JEIT190495
Abstract:

Infrared thermal imaging system has obvious advantages in target recognition and detection at night, and the motion defocus blur caused by dynamic environment on mobile platform affects the application of the above imaging system. In order to solve t...

Robust Fuzzy C-Means Based on Adaptive Relaxation
Yunlong GAO, Zhihao WANG, Jinyan PAN, Sizhe LUO, Dexin WANG
2020, 42(7): 1774-1781. doi: 10.11999/JEIT190556
Abstract:

Noise is one of the most important influences for clustering. Existing fuzzy clustering methods try to reduce the impact of noise by relaxing the constraint condition of membership. But there are still two basic problems to be solved. The first is ho...

An Adaptive Medical Ultrasound Images Despeckling Method Based on Deep Learning
Xiaowei FU, Xuefei YANG, Fang CHEN, Xi LI
2020, 42(7): 1782-1789. doi: 10.11999/JEIT190580
Abstract:

Considering the shortage of traditional medical ultrasound image despeckle methods, an adaptive multi-exposure fusion framework and feedforward convolutional neural network model image despeckle method is proposed. Firstly, an ultrasound image traini...

Cryption and Information Security
Research on Linear Properties of Keccak-like S-box
Jie GUAN, Junjun HUANG
2020, 42(7): 1790-1795. doi: 10.11999/JEIT190570
Abstract:

In this paper, the S-box of Keccak is generalized into n-variable Keccak-like S-box, and the linear properties of n-variable Keccak-like S-box is studied. It is proved that all the values of correlation advantages of this kind of S-box are 0 or

\begin...
A Variant BISON Block Cipher Algorithm and Its Analysis
Haixia ZHAO, Yongzhuang WEI, Zhenghong LIU
2020, 42(7): 1796-1802. doi: 10.11999/JEIT190517
Abstract:

Based on the characteristics of Whitened Swap−or−Not (WSN) construction, the maximum expected differential probability (MEDP) of Bent whItened Swap Or Not -like (BISON-like) algorithm proposed by Canteaut et al. is analyzed in this paper. In particul...

Identity-based Searchable Encryption Scheme for Encrypted Email System
Shufen NIU, Yaya XIE, Pingping YANG, Caifen WANG, Xiaoni DU
2020, 42(7): 1803-1810. doi: 10.11999/JEIT190578
Abstract:

In encrypted email system, the public key searchable encryption technology can effectively solve the problem of searching for encrypted emails without decryption. In view of the complex key management problem of public key searchable encryption, an i...