Advanced Search

2021 Vol. 43, No. 11

2021, 43(11): .
Abstract:
2021, (11): 1-4.
Abstract:
Overview
Research Status of Vortex Electromagnetic Wave Wireless Communication Technologies
Linjun ZHAO, Hailin ZHANG, Naian LIU
2021, 43(11): 3075-3085. doi: 10.11999/JEIT200899
Abstract:
It is known from electromagnetic momentum that electromagnetic waves can carry Spin Angular Momentum (SAM) related to polarization and Orbital Angular Momentum (OAM) related to the trajectory of the Poynting vector. When OAM is not zero, the wave-fro...
Communication and Internet of Thing
An Intelligent Decision-making Algorithm for Communication Countermeasure Jamming Resource Allocation
Hua XU, Bailin SONG, Lei JIANG, Ning RAO, Yunhao SHI
2021, 43(11): 3086-3095. doi: 10.11999/JEIT210115
Abstract:
Considering the intelligent decision of battlefield communication countermeasure, based on the overall confrontation, a Bootstrapped expert trajectory memory replay - Hierarchical reinforcement learning - Jamming resources distribution decision - Mak...
Intelligent Multi-carrier Waveform Modulation System: Signal Generation and Recognition
Kai SHAO, Xuyang FU, Guangyu WANG
2021, 43(11): 3096-3104. doi: 10.11999/JEIT201064
Abstract:
Mobile communication applications scenarios are becoming complexity and diversity. It is difficult to have a universal transmission waveform to meet all communication needs, which puts forward high requirements for the coordination and collaboration ...
Off-grid Sparse Representation Based Localization Method for Near-field Sources
Yi JIN, Changzhi XU, Tao JING, Xiaohuan WU, Jun YAN, Mingyu LI
2021, 43(11): 3105-3110. doi: 10.11999/JEIT200784
Abstract:
Near-field source localization is a potential research topic in next-generation wireless communications. Most existing methods focus on traditional subspace based methods or on-grid sparse methods. For the problem that the accuracy of subspace class ...
Two Novel Downlink Precoding Schemes for TDD Massive MIMO Systems
Hui ZHI, Ziju HUANG, Yukun ZHA, Feiyue WANG
2021, 43(11): 3111-3121. doi: 10.11999/JEIT200196
Abstract:
For time-division duplex massive MIMO systems, two new downlink precoding schemes are proposed, namely New Maximum Ratio Combining (NMRC) and New Zero-Forcing (NZF) scheme. Through theoretical analysis, the expressions of downlink signal to interfere...
Online Service Function Chain Deployment Method Based on Deep Q Network
Hang QIU, Hongbo TANG, Wei YOU
2021, 43(11): 3122-3130. doi: 10.11999/JEIT201009
Abstract:
To deal with the dynamic nature of 5G network resource state and the difficulty of service function chain deployment under the high-dimensional network state model, an online Service function Chain Deployment method based on Deep Q network (DeePSCD) ...
Orthogonal Multiuser Short Reference High Rate Differential Chaos Shift Keying Communication System
Gang ZHANG, Kerong XU, Lifang He
2021, 43(11): 3131-3140. doi: 10.11999/JEIT200739
Abstract:
An Orthogonal MultiUser Short Reference High Rate DCSK (OMU-SRHR-DCSK) communication system is proposed to solve the problem of low transmission rate and low energy efficiency of traditional MultiUser Short Reference Differential Chaos Shift Keying c...
Man-in-the-middle Pilot Attack for Physical Layer Authentication
Shaoyu WANG, Kaizhi HUANG, Xiaoming XU, Keming MA, Yajun CHEN
2021, 43(11): 3141-3148. doi: 10.11999/JEIT200831
Abstract:
The existing physical layer authentication mechanism relies on the privacy of the legitimate channel. Once the attacker can manipulate or obtain legitimate channel information, the physical layer authentication mechanism will face the threat of being...
A Puncturing Algorithm of Polar Code Based on Gaussian Approximation
Shibao LI, Xun GAO, Zhenwei DONG, Jianhang LIU, Xuerong CUI
2021, 43(11): 3149-3155. doi: 10.11999/JEIT201007
Abstract:
The influence of channel construction process on the algorithm performance is not considered in the existing polar code puncturing algorithms. To solve this problem, a Puncturing algorithm of Polar Code based on Gaussian Approximation (GAPPC) is prop...
Research on Optical Wireless Orbital Angular Momentum Multiplexing System Based on Signal Detection
Yang WANG, Jian CUI, Xi LIAO, Yanzhi ZENG, Jie ZHANG
2021, 43(11): 3156-3165. doi: 10.11999/JEIT200955
Abstract:
The wireless communication technology based on Orbital Angular Momentum (OAM) can greatly improve the performance of the communication system under ideal transmission conditions. However, in the actual environment, atmospheric turbulence and aperture...
An under-Sampling Restoration Digital Predistortion Technique Based on Landweber Iteration Algorithm
Tianfu CAI, Mingyu LI, Yi JIN, Changzhi XU
2021, 43(11): 3166-3173. doi: 10.11999/JEIT201051
Abstract:
In order to better correct the nonlinear characteristics of Power Amplifier (PA), conventional broadband Digital PreDistortion (DPD) requires usually the feedback channel bandwidth to be 5 times of the transmitting signal bandwidth, and Analog to Dig...
Radar, Sonar and Navigation
Contour Matching Method for SAR Images Based on Salient Contour Features
Xiaorui MA, Changwen ZHENG, Yi LIANG
2021, 43(11): 3174-3184. doi: 10.11999/JEIT210368
Abstract:
In the research of matching navigation and precision guidance using spaceborne SAR image as the reference image and airborne/missile SAR image as the real-time image, the traditional point feature-based matching method has too many feature points, hi...
Floating Small Target Detection Based on Graph Connected Density in Sea Surface
Yanling SHI, Tingting YAO, Yaxing GUO
2021, 43(11): 3185-3192. doi: 10.11999/JEIT201028
Abstract:
Due to the weak energy of the floating small targets, it is hard to be detected in sea surface. Relying on the energy, the traditional detectors based on statistical model inevitable loss the detection performance, regardless of the correlation betwe...
Reference Signal Trusted Reconstruction for Passive Radar Based on Optimal Clutter Rejection
Xun ZHANG, Xianrong WAN, Jianxin YI, Ziping GONG
2021, 43(11): 3193-3200. doi: 10.11999/JEIT201020
Abstract:
Reference signal reconstruction is one of the key technologies for signal processing of passive radar based on digital TV signals. The quality of the reconstructed signal affects directly the time-domain clutter suppression effect of the surveillance...
Joint Design of Millimeter-wave Radar Waveform Parameters and Receiving Weight under Resolution Constraints
Hongyan WANG, Xiyang XUE, Xiaofeng YANG, Zumin WANG
2021, 43(11): 3201-3210. doi: 10.11999/JEIT200978
Abstract:
Considering the issue of poor target detection performance of millimeter-wave radar caused by the limited platform space and transmitting power in the case of autonomous driving, a joint design approach of waveform parameters and receiving weight is ...
Clustering Method to Discriminate Active False Targets in Multistatic Radar System
Ziwei LIU, Shanshan ZHAO, Biao YANG, Minju YI
2021, 43(11): 3211-3219. doi: 10.11999/JEIT210147
Abstract:
The available deception anti-jamming methods in multistatic radar can not be applied to multiple jamming sources. In view of this problem, a clustering analysis-based method is proposed to discriminate active false targets in multistatic radar, accor...
An Automatic Decision Algorithm for Foreign Objects Debris Based on Duffing Oscillator
Jun ZHONG, Meng XING, Xing LIU, Qi ZENG
2021, 43(11): 3220-3227. doi: 10.11999/JEIT201043
Abstract:
The Foreign Objects Debris (FOD) detection technology based on millimeter wave radar has the advantages of high resolution and low power consumption, but the traditional Constant False Alarm Rate (CFAR) detection algorithm has high false alarm probab...
A Parameter Estimation Method for Sub-Nyquist Sampled Radar Signals Based on Frequency-domain Delay-Doppler Two-dimensional Focusing
Zhiliang WEI, Ning FU, Liyan QIAO
2021, 43(11): 3228-3236. doi: 10.11999/JEIT200714
Abstract:
In the problem of sub-Nyquist sampled pulse Doppler radar signals, the existing methods have poor anti-noise performance, and the subsequent parameter estimation in the sequential parameter estimation methods is seriously affected by the accuracy of ...
Underwater Target Depth Classification Method Based on Vertical Acoustic Intensity Flux
Xuejie BI, Juan HUI, Anbang ZHAO, Biao WANG, Lin MA, Xiaoman LI
2021, 43(11): 3237-3246. doi: 10.11999/JEIT201045
Abstract:
The existing target depth classification methods based on acoustic interference structure characteristics have a limited frequency range, and are only suitable for the case where target frequency can excite first two modes. Aiming to this problem, a ...
Image and Intelligent Information Processing
Whale Optimization Algorithm for Multi-group with Information Exchange and Vertical and Horizontal Bidirectional Learning
Xiaolong LIU
2021, 43(11): 3247-3256. doi: 10.11999/JEIT201080
Abstract:
Compared with traditional swarm intelligence optimization algorithms, the Whale Optimization Algorithm(WOA) has better optimization capabilities and robustness, but there are still problems such as limited global optimization capabilities and difficu...
Gesture Recognition Based on Improved YOLOv4-tiny Algorithm
Di LU, Wenqiang MA
2021, 43(11): 3257-3265. doi: 10.11999/JEIT201047
Abstract:
With the development of human-computer interaction, gesture recognition is becoming more and more important. At the same time, mobile terminal applications are developing rapidly, it is a development trend to implement human-computer interaction tech...
A Multiscale Feature Extraction Method for Text-independent Speaker Recognition
Zhigao CHEN, Peng LI, Runqiu XIAO, Ta LI, Wenchao WANG
2021, 43(11): 3266-3271. doi: 10.11999/JEIT200917
Abstract:
Recently in speaker recognition tasks, consistent performance gains have been continually achieved by various Convolutional Neural Networks (CNNs), which have shown increasingly stronger multiscale representation abilities. However, most existing met...
Bayesian Network Structure Algorithm Based on V-structure & Log-Likelihood Orientation and Tabu Hill Climbing
Haoran LIU, Niantai WANG, Yi WANG, Liyue ZHANG, Zhaoyu SU, Wen LIU, Xudan ZHAO
2021, 43(11): 3272-3281. doi: 10.11999/JEIT210032
Abstract:
Hill climbing algorithm has too large search space and is easy to fall into local optimum. In this paper, a new Bayesian network structure algorithm based on V-structure & log-likelihood orientation and Tabu Hill (VTH) climbing is proposed. The a...
An Interactive Graph Attention Networks Model for Aspect-level Sentiment Analysis
Hu HAN, Yuanhang WU, Xiaoya QIN
2021, 43(11): 3282-3290. doi: 10.11999/JEIT210036
Abstract:
At present, aspect-level sentiment analysis uses mainly the method of combining attention mechanism and traditional neural network to model aspect and contextual words.These methods ignore the syntactic dependency information and position information...
Mixed Noise Suppression Algorithm Based on Developable Local Surface of Image
Manli WANG, Fengying MA, Changsen ZHANG
2021, 43(11): 3291-3300. doi: 10.11999/JEIT201096
Abstract:
In order to meet the requirement of low resource cost and mixed noise suppression for outdoor target detection based on rotor Unmanned Aerial Vehicle (UAV), a mixed noise suppression algorithm based on Developable Local Surface (DLS) is proposed. Thi...
Semi Supervised Learning of Metallographic Data Based on Self-organizing Incremental and Graph Convolution Neural Network
Weigang LI, Jingcheng SHEN, Lu XIE, Yuntao ZHAO
2021, 43(11): 3301-3308. doi: 10.11999/JEIT201029
Abstract:
It needs a large number of training sets with annotation information to classify microstructure images of steel materials by deep learning. To solve the problem of low efficiency of manual image annotation, a new semi-supervised learning method combi...
Optimization in Capsule Network Based on Mutual Information Autoencoder and Variational Routing
Jingyi BAO, Ning XU, Yunhao SHANG, Xin CHU
2021, 43(11): 3309-3318. doi: 10.11999/JEIT201094
Abstract:
Capsule network is a new type of network model which is different from convolutional neural network. This paper attempts to improve its generalization and accuracy. Firstly, variational routing is used to alleviate the problem of classic routing that...
Method on Alzheimer’s Disease Classification Utilizing Fuzzy Logic Feature Selection and Heterogeneous Ensemble Learning
Liang HAN, Ting YANG, Xiujuan PU, Qian HUANG
2021, 43(11): 3319-3326. doi: 10.11999/JEIT200963
Abstract:
Early diagnosis of dementia is critical for timely treatment and intervention. Alzheimer’s Disease(AD) classification is an effective method on identifying AD at its early stage. In this paper, a feature selection method using improved Gauss fuzzy lo...
Seal Text Detection and Recognition Algorithm with Angle Optimization Network
Jinsheng XIAO, Tao ZHAO, Wenxin XIONG, Tian YANG, Weiqing YAO
2021, 43(11): 3327-3334. doi: 10.11999/JEIT201008
Abstract:
Using the methods of Optical Character Recognition (OCR) to detect and recognize the seal characters can speed up the classification speed and identification efficiency of all kinds of contracts. According to the characteristics of the cycle seal cha...
Object Tracking Based on Cost Sensitive Structured SVM
Guanglin YUAN, Ziwen SUN, Xiaoyan QIN, Liang XIA, Hong ZHU
2021, 43(11): 3335-3341. doi: 10.11999/JEIT200708
Abstract:
Object tracking based on structured SVM attracts much attention due to its excellent performance. However, the existing methods have the problem of imbalance between positive and negative samples. To solve the problem, a cost sensitive structured SVM...
Graph Enhanced Canonical Correlation Analysis and Its Application to Image Recognition
Shuzhi SU, Jun XIE, Xinrui PING, Penglian GAO
2021, 43(11): 3342-3349. doi: 10.11999/JEIT210154
Abstract:
As a traditional feature extraction algorithm, Canonical Correlation Analysis (CCA) has been excellently used for the field of pattern recognition. It aims to find the projection direction that makes the maximum of the correlation between two groups ...
Cryption and Information Security
Threshold- Based Pairing-free Conditional Anonymous Proxy Re-Encryption Scheme
Zhaobin LI, Hong ZHAO, Zhanzhen WEI
2021, 43(11): 3350-3358. doi: 10.11999/JEIT200946
Abstract:
Conditional Proxy Re-Encryption (CPRE) can grant fine-grained authorization to the original ciphertext according to the conditions. The existing CPRE schemes only check the conditions of the original ciphertext, but ignore the conditions of the re-en...
Research on Linear Properties of SIMON Class Nonlinear Function
Jie GUAN, Jianwei LU
2021, 43(11): 3359-3366. doi: 10.11999/JEIT200999
Abstract:
SIMON algorithm is a group of lightweight block cipher algorithms introduced by the National Security Agency (NSA) in 2013. It has the advantages of low implementation cost and good security performance. Its round function adopts \begin{document}$F(x...
Adversarial Training Defense Based on Second-order Adversarial Examples
Yaguan QIAN, Ximin ZHANG, Bin WANG, Zhaoquan GU, Wei LI, Bensheng YUN
2021, 43(11): 3367-3373. doi: 10.11999/JEIT200723
Abstract:
Although Deep Neural Networks (DNN) achieves high accuracy in image recognition, it is significantly vulnerable to adversarial examples. Adversarial training is one of the effective methods to resist adversarial examples empirically. Generating more ...
Circuit and System Design
A Locally Active Memristor Circuit and Its Application to a Coupled Hindmarsh-Rose Neuron Network
Liang SUN, Jia LUO, Yinhu QIAO
2021, 43(11): 3374-3383. doi: 10.11999/JEIT210026
Abstract:
In this paper, a new locally active memristor is proposed. The characteristics and local activity of the memristor are analyzed by using standard nonlinear theory and the circuit theoretic technique direct current loci. Furthermore, the locally activ...
The Analysis of Symmetrical Behavior for a Dual Flux-controlled Memristive Shinriki Oscillator Based on FPGA
Fuhong MIN, Hongliang ZHENG, Zhi RUI, Yi CAO
2021, 43(11): 3384-3392. doi: 10.11999/JEIT201079
Abstract:
In this paper, a passive flux-controlled memristor is used to replace the diode series-parallel branch in the Shinriki oscillator, and the active flux-controlled memristor is introduced to substitute the resistance in the RLC resonant loop. At the sa...