Advanced Search

2022 Vol. 44, No. 12

cover
cover
2022, 44(12)
Abstract:
2022, 44(12): 1-4.
Abstract:
Special Topic on Metasurfaces
Off-grid Imaging Method for Computational Microwave Imaging System of Metamaterial Aperture Based on Sparse Bayesian Learning
FU Haosheng, HONG Ling, DAI Fengzhou
2022, 44(12): 4075-4084. doi: 10.11999/JEIT220363
Abstract:
Computational microwave imaging based on metamaterial aperture can be considered as microwave compression sensing imaging. The imaging effect of this imaging method is seriously affected by the grid mismatch error. In this paper, a Two-Dimensional (2...
Design of Wideband High-gain Circularly-polarized Antenna Based on Partially Polarization-conversion Surface and Partially Reflection Surface
CHENG Youfeng, WANG Yingxi, ZHONG Jiali, LIAO Cheng
2022, 44(12): 4085-4094. doi: 10.11999/JEIT220539
Abstract:
This paper presents an electromagnetic metasurface structure with partially polarization-conversion and partially reflection functions and its application to the Fabry-Perot (F-P) cavity antenna design with wideband, high-gain and Circularly Polarize...
Wideband Ultralow-profile Folded Transmitarray Based on Metasurface
ZHONG Xianjiang, XU Hexiu, HOU Jianqiang, CHEN Lei, XIAO Qinkun
2022, 44(12): 4095-4103. doi: 10.11999/JEIT220007
Abstract:
This paper proposes a novel design strategy for wideband ultralow-profile Folded TransmitArray (FTA) antenna using metasurfaces. It consists of two kinds of metasurfaces and an open waveguide antenna as the feed source. The bottom metasurface is appl...
A Reconfgurable Transmitarray Based on Row-column Beamsteering Method
TIAN Xiuwen, SONG Lizhong
2022, 44(12): 4104-4110. doi: 10.11999/JEIT211057
Abstract:
In this paper, to simplify the control circuit of the Reconfigurable TransmitArray(RTA), a RTA based on row-column beamsteering method is proposed, which is composed of a double-layer Frequency Selective Surfaces(FSS). By tunning a capacitance value ...
Design of Luneburg Lens Antenna Based on Novel Foam Materials
YAN Xiulin, SHI Yunqi, ZHU Lina
2022, 44(12): 4111-4115. doi: 10.11999/JEIT220569
Abstract:
In this paper, a new type of foam material PolyMethacrylimIde (PMI) is used to design a millimeter-wave Luneburg lens antenna for the detection of complex space environment. By correlating the density of the foam material with the dielectric constant...
Research on Ultra-wideband Linear Polarization Conversion Characteristics Based on Metasurfaces
WANG Yue, YAO Zhenyu, CUI Zijian, ZHU Yongqiang, ZHANG Dachi, HU Hui, ZHANG Kuang
2022, 44(12): 4116-4124. doi: 10.11999/JEIT220447
Abstract:
Polarization conversion has important research significance and application value in the field of terahertz modulation. Traditional polarization conversion devices have many shortcomings, such as large size, low integration, high loss and narrow band...
Radar, Sonar and Array Signal Processing
A Passive Ranging Method for Shallow Water Sound Sources Based on Large Aperture Horizontal Array
CHEN Yawei, XING Mengdao, WANG Jun, YANG Yuhao
2022, 44(12): 4125-4133. doi: 10.11999/JEIT211111
Abstract:
In order to meet the demand for passive ranging of sound sources in shallow water, a normal mode separation and ranging method based on a large-aperture horizontal array is proposed. This method deals with the problem of modal separation that caused ...
Research on Maneuvering State Recognition Method of Hypersonic Glide Vehicle
ZHANG Junbiao, XIONG Jiajun, LAN Xuhui, CHEN Xin, LI Fan
2022, 44(12): 4134-4143. doi: 10.11999/JEIT211009
Abstract:
The rapid development of Hypersonic Glide Vehicle (HGV) has changed the traditional combat style and opened a new field of military struggle. Identifying the maneuvering state of HGV can provide a powerful support for threat assessment, trajectory pr...
A Non-fuzzy Parameter Pairing Method Based on Estimating Signal Parameter via Rotational Invariance Techniques
JIE Yunkang, YE Xiaodong, WANG Hao, LI Li, TAO Shifei
2022, 44(12): 4144-4150. doi: 10.11999/JEIT210942
Abstract:
There are some mismatches for the estimation of signal parameters in mult-dimention Estimating Signal Parameter via Rotational Invariance Techniques (ESPRIT) algorithm. In this paper, a parameter pairing method based on eigenvalue fractal dimension i...
Adaptive Resource Management Method for Phased Array Radar Based on RCS Prediction of Hypersonic Gliding Vehicle
DUAN Yi, TAN Xiansi, QU Zhiguo, WANG Hong, XIE Zhenhua
2022, 44(12): 4151-4158. doi: 10.11999/JEIT201061
Abstract:
For the problem of Phased Array Radar (PAR) has excessive resource consumption and low measurement accuracy in the process of detecting Hypersonic Gliding Vehicle (HGV). An adaptive radar power allocation method based Radar Cross-Section (RCS) predic...
Robust Beamforming Algorithm Based on Double-layer Estimation of Steering Vector and Covariance Matrix Reconstruction
LÜ Yan, CAO Fei, YANG Jian, FENG Xiaowei
2022, 44(12): 4159-4167. doi: 10.11999/JEIT211120
Abstract:
Considering the problem of the low resolution of the Capon Power Spectrum (CPS) in the reconstruction of Interference plus Noise Covariance Matrix (INCM), two Robust Adaptive Beamforming (RAB) algorithms are proposed. The proposed algorithm first sea...
A Multi-sensor Adaptive Observation Iteratively Updating GM-PHD Tracking Algorithm
SHENTU Han, LI Kaibin, RONG Yingjiao, LI Yanxin, GUO Yunfei
2022, 44(12): 4168-4177. doi: 10.11999/JEIT211138
Abstract:
For the problem that the results of multi-sensor measurement iteratively updating Gaussian Mixture Probability Hypothesis Density (GM-PHD) tracking algorithm is sensitive to the updating order if the qualities of multi-sensor observation data are dif...
Research on Passive Millimeter-wave Stealth Technology Based on Active Cancellation for Armored Target
WANG Wentao, HUANG Jialu
2022, 44(12): 4178-4184. doi: 10.11999/JEIT210944
Abstract:
Armored target is currently great threatened by passive millimeter wave detection and guidance technology. An active cancellation millimeter-wave stealth method is proposed for enhancing the survivability of armored target in the future battlefield. ...
Wireless Communication and Internet of Things
Multi-carrier Index Modulation Based on Prolate Spheroidal Wave Functions with Better Multiple-mode
WANG Hongxing, ZHANG Lifan, LU Faping, KANG Jiafang, LIU Chuanhui, ZHANG Lei
2022, 44(12): 4185-4193. doi: 10.11999/JEIT210921
Abstract:
Focusing on how to improve the system spectral efficiency of Prolate Spheroidal Wave Functions(PSWFs) multi-carrier modulation system, a third constellation composed of additional constellation points on the basis of multi-carrier index modulation ba...
Characteristic Analysis and Statistical Modeling of Millimeter Wave OAM Channel in Indoor Corridor Environment
LIAO Xi, HE Changwen, WANG Yang, WAN Yangliang, CHEN Qianbin, ZHANG Jie
2022, 44(12): 4194-4203. doi: 10.11999/JEIT211145
Abstract:
Focusing on the problem that the free space propagation model could only describe the propagation characteristics of vortex channel carrying Orbital Angular Momentum (OAM) in free space scenario, and the deterministic sparse multipath vortex channel ...
Research on Symbol Detection of Mixed Signals Based on Sparse AutoEncoder Detector
HAO Chongzheng, DANG Xiaoyu, LI Sai, WANG Chenghua
2022, 44(12): 4204-4210. doi: 10.11999/JEIT211074
Abstract:
The architecture of Deep Neural Network (DNN) based detectors can affect the Symbol Detection (SD) accuracy and computational complexity. However, most of the works ignore the architecture selection method when establishing a DNN-based symbol detecto...
Trusted Geographic Routing Protocol Based on Deep Reinforcement Learning for Unmanned Aerial Vehicle Network
ZHANG Yanan, QIU Hongbing
2022, 44(12): 4211-4217. doi: 10.11999/JEIT220649
Abstract:
Considering the problems of high mobility and abnormal nodes in Unmanned Aerial Vehicle (UAV) communication, a Deep reinforcement learning based Trusted Geographic Routing protocol (DTGR) is proposed. A trusted third party is introduced to provide th...
Vertical Handoff Algorithm Considering Load Balance and User Experience
MA Bin, ZHONG Shilin, XIE Xianzhong, CHEN Xin
2022, 44(12): 4218-4228. doi: 10.11999/JEIT210958
Abstract:
In ultra dense heterogeneous wireless networks, a vertical handoff algorithm considering Load Balancing and User Experience (LBUE) is proposed to solve the problem of network congestion caused by large-scale mobile terminals clustering in short time ...
Self-interference Digital Cancellation Algorithm in Simultaneous Transceiver System Based on Deep Neural Network
JIANG Yilin, WANG Linsen, LI Jinxin
2022, 44(12): 4229-4237. doi: 10.11999/JEIT211103
Abstract:
In order to solve the problem that the self-interference is difficult to eliminate in the transceiver system of the repeater jammer, a self-interference cancellation algorithm based on Deep Neural Network(DNN) is presented in this paper. This propose...
Age of Information Updates in Non-Orthogonal Multiple Access-mobile Edge Computing System Based on Reinforcement Learning
LI Baogang, SHI Tai, CHEN Jing, LI Shilu, WANG Yu, ZHANG Tiankui
2022, 44(12): 4238-4245. doi: 10.11999/JEIT211021
Abstract:
With the development of the Internet of Things, the demand for timeliness of information is increasing, and the freshness of information is becoming crucial. In order to maintain the freshness of information, the transmission scenario of multiple dev...
Research on Optimization of Camera-based Visible Light Positioning System
LIU Xiangyu, LIU Baorui, SONG Song, GUO Lei
2022, 44(12): 4246-4255. doi: 10.11999/JEIT211019
Abstract:
The existing indoor visible light positioning systems focus more on the positioning accuracy improvement and ignores the system's decoding success rate and the applicability of the positioning algorithm. The specific aspects are as follows: (1) Captu...
Collaborative Trustworthy Framework for Edge Computing
HE Xinfeng, TIAN Junfeng, LOU Jian
2022, 44(12): 4256-4264. doi: 10.11999/JEIT211045
Abstract:
In the edge computing environment, the edge nodes have various kinds, wide distribution range and great differences in working environment, which makes the data security guarantee become very complicated. It is difficult to evaluate the credibility o...
Partial Overlapped Channel Assignment for Wireless Mesh Networks Based on Improved Discrete Bat Algorithm
YE Fang, SUN Xue, LI Yibing
2022, 44(12): 4265-4273. doi: 10.11999/JEIT211029
Abstract:
To address the problems of channel interference and inadequate utilization of spectrum resources in Wireless Mesh Networks (WMN) in the context of emergency communications, an Improved Discrete Bat Algorithm (IDBA) is proposed for solving the optimal...
Cryption and Information Security
A High Throughput SM2 Digital Signature Computing Scheme Based on Graphics Processing Unit Platform
ZHU Hui, HUANG Yukun, WANG Fengwei, YANG Xiaopeng, LI Hui
2022, 44(12): 4274-4283. doi: 10.11999/JEIT211049
Abstract:
With the pervasiveness of secure data transmission techniques and increasing requirements of information authentication, the public key-based digital signature scheme has been extensively used in various fields. However, the process speed of digital ...
Quantum Image Chaotic Cryptography Scheme Based on Arnold Transforms
SHI Jinjing, CHEN Tian, CHEN Shuhui, LI Qin, SHI Ronghua
2022, 44(12): 4284-4293. doi: 10.11999/JEIT211143
Abstract:
For improving the resolution of quantum decrypted image and computation complexity under the premise of ensuring quantum image cryptography algorithm security, an approach to quantum image chaotic encryption scheme based on Arnold transforms is propo...
Cryptoanalysis on the Forward Security of Two Authenticated Key Protocols
CHENG Qingfeng, MA Yuqian
2022, 44(12): 4294-4303. doi: 10.11999/JEIT211137
Abstract:
At present, network security and privacy have attracted extensive attention. Forward security is a security attribute of Authenticated Key Agreement protocol (AKA) proposed by Günther in 1989. Since then, this property has become one of the hot topic...
Constructions of Two Optimal Zero Correlation Zone Aperiodic Complementary Sequence Sets
CUI Li, XU Chengqian
2022, 44(12): 4304-4311. doi: 10.11999/JEIT210950
Abstract:
Based on orthogonal matrices, constructions of two Zero Correlation Zone (ZCZ) Aperiodic Complementary Sequence Sets (ZACSS) are proposed through different matrix transformation methods. Under the condition that the order of the orthogonal matrices c...
Weight Distributions of Some Classes of Irreducible Quasi-cyclic Codes of Index 2
GAO Jian, ZHANG Yaozong, MENG Xiangrui, MA Fanghui
2022, 44(12): 4312-4318. doi: 10.11999/JEIT211104
Abstract:
Few-weight linear codes have important applications in constructing authentication codes, association schemes and secret sharing schemes. How to construct few-weight linear codes has always been an important topic of coding theory. In this paper, irr...
Research on Timed-Release Encryption System Based on Multiple Time Servers
YUAN Ke, CHENG Ziwei, YANG Longwei, YAN Yonghang, JIA Chunfu, HE Yuan
2022, 44(12): 4319-4327. doi: 10.11999/JEIT211066
Abstract:
Timed-Release Encryption (TRE) is a cryptographic primitive called "sending messages into the future", the receiver can not decrypt the ciphertext until a designed time in the future. Currently, most TRE schemes use a non-interactive single time serv...
A Multi-Scroll System and Its Application for Image Encryption Based on Logistic Level Pulse
XU Changbiao, LI Jinlong, XU Haonan
2022, 44(12): 4328-4336. doi: 10.11999/JEIT211169
Abstract:
The nonlinear functions introduced into the existing multi-scroll attractor chaotic systems are mostly step function, saturation function, multi-logic level pulse function and so on. Therefore, the system hardware complexity increases with the increa...
Reversible Data Hiding in Encrypted Images Based on Polynomial Secret Sharing
ZHANG Minqing, WANG Zexi, KE Yan, KONG Yongjun, DI Fuqiang
2022, 44(12): 4337-4347. doi: 10.11999/JEIT211054
Abstract:
In order to solve the problems of low embedding rate of reversible data hiding in encrypted domain with multi-users and weak disaster tolerance of cover image, a reversible data hiding in encrypted images based on polynomial secret sharing scheme is ...
Lightweight Integrity Verification Scheme for Outsourced Medical Data in Cloud Storage Supporting Conditional Identity Anonymity
ZHANG Xiaojun, WANG Xin, LIAO Wencai, ZHAO Jie, FU Xingbing
2022, 44(12): 4348-4356. doi: 10.11999/JEIT210971
Abstract:
Medical cloud storage service is one of the most significant applications in cloud computing. Simultaneously, the integrity of outsourced medical data and users’ identity privacy-preservation have been more and more important. To this end, an outsour...
Pattern Recognition and Intelligent Information Processing
Fast Partition Algorithm in Depth Map Intra-frame Coding Unit Based on Multi-branch Network
LIU Chang, JIA Kebin, LIU Pengyu
2022, 44(12): 4357-4366. doi: 10.11999/JEIT211010
Abstract:
Three Dimensional-High Efficiency Video Coding (3D-HEVC) standard is the latest Three-Dimensional (3D) video coding standard, but the coding complexity increases greatly due to the introduction of depth map coding technology. Among them, the quad-tre...
Compliance Analysis Method of Hive Data Operation Based on Subgraph Isomorphism
CHEN Li, CHEN Xingshu, LUO Yonggang, YANG Lu, YUAN Daohua
2022, 44(12): 4367-4375. doi: 10.11999/JEIT211081
Abstract:
Hive's existing audit function can not make compliance judgment on the purpose of data operation. To solve the above problems, a Hive data operation compliance analysis method based on subgraph isomorphism is proposed. Firstly, the modeling method of...
A Meta-learning Knowledge Reasoning Framework Combining Semantic Path and Language Model
DUAN Li, FENG Haojun, ZHANG Biying, LIU Jiangzhou, LIU Haichao
2022, 44(12): 4376-4383. doi: 10.11999/JEIT211034
Abstract:
In order to solve the problems that traditional knowledge reasoning methods can not combine computing power and interpretability, and it is difficult to learn quickly in few-shot scenarios, a Model-Agnostic Meta-Learning (MAML) reasoning framework is...
Multi-constrained Non-negative Matrix Factorization Algorithm Based on Sinkhorn Distance Feature Scaling
LI Songtao, LI Weigang, GAN Pin, JIANG Lin
2022, 44(12): 4384-4394. doi: 10.11999/JEIT210946
Abstract:
In order to reduce the co-adaptability interference of the original feature to the Non-negative Matrix Factorization (NMF) algorithm and improve the performance of non-negative matrix factorization subspace learning and clustering performance, a nove...
Cross-modal Video Moment Retrieval Based on Enhancing Significant Features
YANG Jinfu, LIU Yubin, SONG Lin, YAN Xue
2022, 44(12): 4395-4404. doi: 10.11999/JEIT211101
Abstract:
With the continuous development of video acquisition equipment and technology, the number of videos has grown rapidly. It is a challenging task in video retrieval to find target video moments accurately in massive videos. Cross-modal video moment ret...
Infrared and Visible Image Fusion Method Based on Degradation Model
JIANG Yichun, LIU Yunqing, ZHAN Weida, ZHU Depeng
2022, 44(12): 4405-4415. doi: 10.11999/JEIT211112
Abstract:
Infrared and visible image fusion algorithms based on deep learning rely on artificially designed similarity functions to measure the similarity between input and output. The unsupervised learning method can not effectively utilize the ability of neu...
Overviews
Space Edge Computing: Requirement, Architecture and Key Technique
YU Zhigang, FENG Xu, DAI Tian, LU Zhou
2022, 44(12): 4416-4425. doi: 10.11999/JEIT211157
Abstract:
With the rapid development of aerospace electronic technology, especially the wide use of Commercial Off-The-Shelf(COTS), the space computing capacity has increased significantly. Space edge computing organizes the widely dispersed space-based comput...
Research Progress Analysis of Point Cloud Segmentation Based on Deep Learning
ZHAO Jiaqi, ZHOU Yong, HE Xin, BU Yifan, YAO Rui, GUO Rui
2022, 44(12): 4426-4440. doi: 10.11999/JEIT210972
Abstract:
The rapid development of depth sensor and laser scanning technology allows people to collect easily a large amount of point cloud data. Point cloud data can provide rich scene and object information, and has become the preferred research object for a...