电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Quick Search  
  Advanced Search
2013 Vol.35 No.4, Published: 19 April 2013
Articles |
 
 
Articles
Select  |    Cite this article 
Sun Jing-Le, Tang Lin-Bo, Zhao Bao-Jun, Liu Qing
A New Particle Filter Tracking Algorithm Based on Rayleigh Distribution
2013 Vol. 35 (4): 763-769 [Abstract] ( 1636 ) [PDF 467KB] ( 1534 )    DOI: 10.3724/SP.J.1146.2012.01225

The particle filter is a nonlinear filtering algorithm and it is widely used in target tracking. In the basic particle filter, the particles are scattered by Gaussian distributions, and the target for low-speed movement and gentle changes can be better captured. However, when the motion status of target suddenly changed, such as sudden acceleration, deceleration, or turning, etc., it often leads to the target loss. The reason is that the tailing of the Gaussian distribution curve is relatively lighter than that of the Rayleigh distribution, and then it causes the distributing range of particles is too small to capture the target. Considering this issue, the Rayleigh distribution is proposed to spread the particles, and then achieve the particles reproduction and dissemination, the Rayleigh distribution parameters is adaptively adjusted according to the rate of movement of the target, and through the secondary particle filter method to improve tracking accuracy. The experiments demonstrate that the particle propagation mechanism based on Rayleigh distribution can effectively enhance the ability of capturing target.

Select  |    Cite this article 
Dong Wen-Hui, Chang Fa-Liang, Li Tian-Ping
Adaptive Fragments-based Target Tracking Method Fusing Color Histogram and SIFT Features
2013 Vol. 35 (4): 770-776 [Abstract] ( 1853 ) [PDF 482KB] ( 1595 )    DOI: 10.3724/SP.J.1146.2012.01095

In order to solve the problems of color similar target, scale change and occlusion in target tracking, this paper proposes an adaptive fragments-based target tracking method fusing color histogram and SIFT features. Taking color projection and imaging angle as the standard, the adaptive fragment method can ensure not only the distinctive features of fragments but also the number. Each fragment is represented by color histogram and SIFT features. Adaptive scale selection can be obtained by computing the scale change of SIFT features. The weighting factor and corresponding template of each fragment are updated during tracking and the whole target template will be divided again if the target appearance changes significantly. Experimental results demonstrate that the method can track the target accurately and effectively and has advantage in color similar target tracking, adaptive scale selection and occlusion handling.

Select  |    Cite this article 
Cui Zhi-Gao, Li Ai-Hua, Jiang Ke, Zhou Jie
A Master-slave Tracking Algorithm Using Two PTZ Cameras
2013 Vol. 35 (4): 777-783 [Abstract] ( 1804 ) [PDF 361KB] ( 1499 )    DOI: 10.3724/SP.J.1146.2012.01023

This paper presents a master-salve tracking framework for wide area video surveillance with two Pan-Tilt-Zoom (PTZ) cameras, which is inspired by the chameleon vision of highly independent and symmetric, attention to both overall and local visual events. Because of the symmetry of two cameras and variability and controllability of camera parameters, compared with master-salve tracking system consisting of one static and one PTZ camera, the proposed system increases the surveillance coverage. Compared with system configuration using multiple static cameras and PTZ cameras, the proposed system decreases hardware cost. Compared with surveillance system composed of one omnidirectional and one PTZ camera, the proposed system is easy to fuse to exact more useful information. A master-slave control method is also designed using sphere coordinate model. Each camera can achieve cooperative master-slave tracking at arbitrary pan-tilt-zoom values. Therefore, visual attention of multi-resolution can be obtained. Quantitative results in the outdoor scene show good performance of the proposed approach.

Select  |    Cite this article 
Wei Long-Xiang, He Xiao-Hai, Teng Qi-Zhi, Gao Ming-Liang
Trajectory Classification Based on Hausdorff Distance and Longest Common SubSequence
2013 Vol. 35 (4): 784-790 [Abstract] ( 1914 ) [PDF 369KB] ( 1931 )    DOI: 10.3724/SP.J.1146.2012.01078

Considering the position and direction of trajectories of moving objects, a trajectory classification algorithm is proposed based on improved Hausdorff distance and Longest Common SubSequence (LCSS) to improve the trajectories classification. In this algorithm, the position similarity between trajectories is measured by the modified Hausdorff distances. And then the direction of the trajectories is distinguished by the modified LCSS distances. Comparing with other trajectory classification algorithms, the proposed algorithm compromises the merits of both Hausdorff distance and LCSS in trajectory classification and enhances the trajectory classification accuracy. Furthermore, to reduce the computational complexity of the similarity measure, a method of modified isometric transformation algorithm and an LCSS fast algorithm are realized. Experimental results show that the clustering accuracy of the proposed algorithm is greatly improved and the clustering accuracy rate can achieve 96%. Meanwhile, the computational cost is greatly reduced by the modified isometric transformation algorithm and the LCSS fast algorithm, and the magnitude of the declines can reach to 80%. The proposed algorithm can satisfy the system requirements of higher precision, real time and robustness.

Select  |    Cite this article 
Li Wei-Bin, Gao Er, Song Song-He
A Global Minimization Method for Image Segmentation
2013 Vol. 35 (4): 791-796 [Abstract] ( 1556 ) [PDF 446KB] ( 1300 )    DOI: 10.3724/SP.J.1146.2012.00759

Active contour models are successfully and widely used in image segmentation. However, they always get local minima which make wrong segmentation results. In this paper, based on previous work named background removed model, a convex energy which is obtained by approximating the Heaviside function in the previous nonconvex energy is proposed. By minimizing it, the evolution equation is given. Experimental results show that the proposed method is accurate, fast and antinoise. Moreover, it is not sensitive to the location of the initial curve.

Select  |    Cite this article 
Zhang Qiu-Yu, Sun Yuan, Yan Yan
A Reversible Watermarking Algorithm Based on Block Adaptive Compressed Sensing
2013 Vol. 35 (4): 797-804 [Abstract] ( 1600 ) [PDF 429KB] ( 1210 )    DOI: 10.3724/SP.J.1146.2012.00914

To balance high embedding capacity and imperceptibility of reversible watermarking algorithm for digital images, a novel Reversible Watermarking Algorithm based on Block Adaptive Compressed Sensing (BACS-RWA) is proposed. The host image is divided into blocks and the types of these blocks are determined with the statistical relationship between the surrounding image blocks and the target block. The capacity parameters are adaptively selected to do block compressed sensing and the watermarking is embedded with integer transformation. In order to improve embedding capacity, the smooth and normal blocks of compressed sensing host image are used to embed watermarking. Complex blocks are not processed to insure image quality and imperceptibility. Reconstruction algorithm of block compressed sensing and reversible integer transformation are used to reconstruct the host image accurately. Simulation of this algorithm is performed on different texture images and compared with similar algorithms. Experimental results show that the optimal embedding capacity can reach up to 1.87 bpp when Plane is used as host image. The introduction of block adaptive compressed sensing theory leads to better comprehensive performance. It can not only improve embedding capacity, but also reduce effectively the influence of embedding data on the quality of the host image.

Select  |    Cite this article 
Sun Zhi-Jun, Xue Lei, Xu Yang-Ming
Marginal Fisher Feature Extraction Algorithm Based on Deep Learning
2013 Vol. 35 (4): 805-811 [Abstract] ( 2432 ) [PDF 358KB] ( 2759 )    DOI: 10.3724/SP.J.1146.2012.00949

It is always important issue to extract features that are most effective for preserving the distribution architecture in pattern recognition community. Kernel based methods are assumed to extract nonlinear features. However, it is very sensitive to the selection of its mapping function and parameters. This paper proposes a feature extraction algorithm based on multi-layer auto-encoder, which consists of two phases of unsupervised pretraining and supervised fine-tuning based on marginal Fisher rule. Generative pretraining and regularization methods within fine-tuning phase are adopted to avoid overfitting of model’s training. The validity of algorithm is proved within the result of classification experiments in several datasets.

Select  |    Cite this article 
Zhu Bo, Wen De-Sheng, Wang Fei, Li Hua, Song Zong-Xi
Improvement of Bayer-pattern Demosaicking with Dictionary Learning Algorithm
2013 Vol. 35 (4): 812-819 [Abstract] ( 1716 ) [PDF 623KB] ( 1162 )    DOI: 10.3724/SP.J.1146.2012.00947

Demosaicking is important for the quality of digital images in resource-constrained single chip devices. This paper presents an improved dictionary learning-based color demosaicking algorithm. Firstly, an initial interpolation is applied to the,channel by Local Directional Interpolation (LDI) and fused by analysis the joint distribution of the gradient. Gaussian Mixture Model (GMM)-based clustering is used to classify dictionary image into different classes. The Principal Component Analysis (PCA) is performed on these classes to choose the principal components for the dictionary construction. And then, dictionary learning is applied to obtain the interpolated G^ and the lost R^ and B^ are interpolated by the help of the reconstructed G^, accordingly. Since,  R^, G^ and B^ of the given pixels are better represented, the whole image can be reconstructed accurately. Taking McMaster color image dataset as dictionary, standard image and image from DALSA CMOS camera are used for effect evaluation of the demosaicking algorithm. Experimental results prove that the proposed algorithm outperforms some state-of-the-art demosaicking methods both in PSNR measure and visual quality.

Select  |    Cite this article 
Ren Fu-Quan, Qiu Tian-Shuang
Video Restore Method Based on Spatial Temporal Weighted Total Variation
2013 Vol. 35 (4): 820-825 [Abstract] ( 1482 ) [PDF 407KB] ( 1016 )    DOI: 10.3724/SP.J.1146.2012.00589

By improving the Spatial-Temporal Total Variation (ST-TV) method, a video image reconstruction approach based on the Spatial Temporal Weighted Total Variation (ST-WTV) is proposed in this paper. By introducing ST-WTV as a regular term, a new model is got for video image sequences reconstruction. An algorithm based on split Bregman iterative method is given in this paper. Finally, the simulated and real data experimental results show that the proposed spatially ST-WTV video restoration algorithm not only efficiently reduces the “artifacts” produced with a TV model in fat regions of the image, but also preserves the edge information, getting more nature and detail-preserving image sequences.

Select  |    Cite this article 
Yang Zhen-Zhen, Yang Zhen
l0-regularisation Signal Reconstruction Based on Fast Alternating Direction Method of Multipliers for Compressed Sensing
2013 Vol. 35 (4): 826-831 [Abstract] ( 1695 ) [PDF 317KB] ( 1679 )    DOI: 10.3724/SP.J.1146.2012.00921

Fast Alternating Direction Method of Multipliers (FADMM) is proposed to solve the l0-regularisation issue, which is a problem of signal compression and reconstruction for Compressed Sensing (CS). The first step of FADMM is to express the l0-regularisation issue of the sparse coefficient as a constrained optimization issue by using variable splitting technology. Then, by introducing the function of multipliers, the two variables are alternatively minimized by Gauss-Seidel method. And the two variables are updated once again to speed up the convergence rate, and then, the variable of multipliers is updated. Finally, the original signal is reconstructed by the orthogonal inverse transform. FADMM is better than other state-of-the-art algorithms on reconstructing image. And the experimental simulations demonstrate that the FADMM algorithm has a higher Peak Signal to Noise Ratio (PSNR) and a faster convergence rate.

Select  |    Cite this article 
Li Ming-Yang, Bai Peng, Wang Xu-Hua, Peng Wei-Dong, Lu Hu, Lin Jin-Fu
A Precise Synchronization Method Based on Iterative Least Square Algorithm
2013 Vol. 35 (4): 832-837 [Abstract] ( 1862 ) [PDF 258KB] ( 1161 )    DOI: 10.3724/SP.J.1146.2012.01047

Precise synchronization can be achieved by fitting phase discrimination curve exploiting Least Squares (LS). However, this method not only has very high requirement of coarse synchronization, but also can not counteract frequency- offset effectively. It is analyzed and proved that the measured value of LS is between zero and real value as coarse synchronization error is between the earlier and later chip. Accordingly a precise synchronization method based on iterative least squares is proposed and a modulus of split correlation strategy is also introduced in this paper to counteract frequency-offset. Theoretical analysis shows that this method can outstandingly eliminate influence of noise as well as frequency-offset with short segments. Besides its strong anti frequency-offset and noise capability, the proposed method still has very high measurement precision as the error of coarse synchronization covers the earlier and later half chip according to simulation results.

Select  |    Cite this article 
Jin Yao, Cai Zhi-Hua, Liang Ding-Wen
Adaptive Unscented Kalman Filter Based on Differential Evolution Algorithm
2013 Vol. 35 (4): 838-843 [Abstract] ( 1333 ) [PDF 261KB] ( 1329 )    DOI: 10.3724/SP.J.1146.2012.00912

This paper discusses choice for scaling parameter of the unscented transformation. By analyzing and comparing some scaling parameter selection methods, the scaling parameter is selected as an optimization objective. Differential Evolution (DE) algorithm is applied to the Unscented Kalman Filter (UKF), the optimized scaling parameter leads to the minimum error at each time interval. An adaptive UKF based on DE is proposed. The experiments show that the accuracy of UKF is significantly improved by the adaptive strategy which not only to avoid random divergence with the constant parameter but also suitable for any form of UKF without the constraints of the number of parameters.

Select  |    Cite this article 
Jie Kai, Ding Xue-Jie, Sun Gui-Qing, Huang Hai-Ning, Li Qi-Hu
The Signal Fluctuating Detection Algorithm Based on the Target Radiated Noise
2013 Vol. 35 (4): 844-851 [Abstract] ( 1398 ) [PDF 493KB] ( 974 )    DOI: 10.3724/SP.J.1146.2012.01008

The analysis of the target radiated noise model is made as a precondition under the background of fluctuating sound field firstly. A broad and narrow band integrated coherent detection algorithm based on phase fluctuation and differential alignment is proposed for the issue of target azimuth estimation and narrow-band line-spectrum detection. The background noise energy disturbances can be restrained by using the differences of temporal correlated radius and phase fluctuation uniformity for the periodic spectrum signals and broadband noise; The ability to identify different DOA targets can also be improved by combining phase fluctuation aligned gain of the output signal in focused beam domain and spatial coherent gain of the signal processing in array domain. It is proved that the proposed algorithm can significantly enhance the detection SNR gain of the target line spectral component and relative energy spectrum level of the coherent target’s beam azimuth by analyzing the simulation and sea experiment results. It has better application prospects in the detection and identification areas of anti-complex channel.

Select  |    Cite this article 
Liu Yan, Wu Yuan, Sun Guang-Cai, Xing Meng-Dao
Fast Imaging Processing of Circular SAR
2013 Vol. 35 (4): 852-858 [Abstract] ( 1346 ) [PDF 414KB] ( 943 )    DOI: 10.3724/SP.J.1146.2012.00607

Because of the special track of circular SAR, the imaging algorithms of SAR in linear track can not be used in processing the circular SAR data directly. However, the response functions of the circular SAR systems can remain the consistency by changing the same aspect angle both of the target and the starting position of the radar. Because of this characteristic, circular SAR can be processed in the azimuth frequency domain by using the fast imaging algorithm of SAR in linear track for reference. In this paper, the exact signal spectrum expressions of circular SAR are derived. By using the reasonable approximations of the exact signal spectrum expressions, the fast imaging algorithms are presented. The simulations show the good performance of the proposed algorithms.

Select  |    Cite this article 
Chen Jin-Li, Li Jia-Qiang, Gu Hong
Joint DOD and DOA Estimation of High Speed Moving Target in Bistatic MIMO Radar
2013 Vol. 35 (4): 859-864 [Abstract] ( 1716 ) [PDF 256KB] ( 954 )    DOI: 10.3724/SP.J.1146.2012.01121

Owning to the fact that the high speed moving target moves across several range cells during the long coherent observation period, joint Direction Of Departures (DODs) and Direction Of Arrivals (DOAs) estimation with the echo data located at the single rang cell has considerable error that affect the cross-positioning for the high speed moving targets in bistatic MIMO radar. A method for estimating the parameters of high speed moving targets is presented. The average of the sample covariance matrixes estimated from the pulse compression outputs at different range cells is exploited to obtain the high precision estimation of the covariance matrix. Then, DODs and DOAs of targets can be estimated by using the traditional supper-resolution algorithm. The simulation results indicate that the angle estimation accuracy of the proposed method for the high speed moving targets, which is independent of the number of range cells that target moves across, is better than that of the existence approaches, and is close to that of the existence approaches with no range migration occurrence.

Select  |    Cite this article 
Liu Li-Guo, Mo Jin-Jun, Fu Yun-Qi, Yuan Nai-Chang
Study on Near Field Angular Glint Computation Based on GRECO
2013 Vol. 35 (4): 865-870 [Abstract] ( 1405 ) [PDF 294KB] ( 680 )    DOI: 10.3724/SP.J.1146.2012.01573

The common predictions of angular glint are usually based on the condition of far-field hypothesis. However, computation of near field angular glint is very meaningful?both in academic studies and engineering applications due to its huge impact on tracking error. This paper presents an analytic prediction of near field angular glint computing based on Graphic Electromagnetic Computing (GRECO), which is both in real time and on omission of the process of scattering center extraction. The condition that targets cannot be covered by radar beam is firstly considered, which makes the prediction of tracking error more complete. The correctness is validated by comparison between the simulated results and the theoretical ones of several models.

Select  |    Cite this article 
Zhao Zhi-Xin, Wan Xian-Rong, Xie Rui, Ke Heng-Yu
Impact of Carrier Frequency Offset on Passive Bistatic Radar with Orthogonal Frequency Division Multiplexing Waveform
2013 Vol. 35 (4): 871-876 [Abstract] ( 1697 ) [PDF 394KB] ( 856 )    DOI: 10.3724/SP.J.1146.2012.01011

Using passive radar with Orthogonal Frequency Division Multiplexing (OFDM) waveform for target track and location is recently a research spot at home and abroad. This paper first introduces the signal model for passive radar with OFDM waveform and key techniques during the signal processing. On that basis, how the estimation error of carrier frequency offset influences the detection performance of this radar is mainly investigated through simulation from different aspects, including the influences on target parameter estimation after match filtering, clutter rejection performance and bit error rate during reference signal reconstruction. The simulation results show that different temporal clutter rejection methods require different estimation accuracy of carrier frequency offset. The reconstruction bit error rate has a great impact on the temporal clutter rejection performance while having a little effect on match filtering. Finally, the analysis results are verified based on the measurement data.

Select  |    Cite this article 
Wang Hai-Tao, Wang Jun
Super-resolution DOA Estimation in Passive Radar Based on Compressed Sensing
2013 Vol. 35 (4): 877-881 [Abstract] ( 1750 ) [PDF 214KB] ( 1447 )    DOI: 10.3724/SP.J.1146.2012.00797

The information of target’s Direction Of Arriving (DOA) is very important for target location. But in passive radar, the weak target echoes are usually embedded in the background of strong direct signal, multipath and noise. So it is very difficult to estimate the DOA of target in passive radar, especially when there are multiple targets. In this paper, a method based on compressed sensing is proposed to perform high resolution DOA estimation in passive radar. In order to remove the strong direct signal and multipath and improve the SNR of targets, first the temporal interference cancellation and range-Doppler 2D correlation are utilized. Finally, the signal of targets’ delay-Doppler bin is reconstructed according to DOA using reconstruction algorithm of compressed sensing. Simulation results show that the proposed method can perform the super-resolution DOA estimation in passive radar.

Select  |    Cite this article 
Sun Kang, Jin Gang, Zhu Xiao-Hua
Small Target Detection within Sea Clutter Based on the Fluctuation Analysis
2013 Vol. 35 (4): 882-887 [Abstract] ( 1723 ) [PDF 325KB] ( 868 )    DOI: 10.3724/SP.J.1146.2012.00927

Based on the fluctuation analysis, a novel approach for target detection in sea clutter is proposed. The self-affinity and scaling behaviors of sea clutter is analyzed by using the mean fluctuation. The q order normalized slope of fluctuation curve, as the characteristic parameter, is suggested to describe the fractal property of the target and sea clutter. The tests on the real data show that the target could be clearly distinguished from the sea clutter background with the proposed approach.

Select  |    Cite this article 
Zhang Li-Feng, Wang Tong, Wu Jian-Xin, Bao Zheng
Clutter Suppression Improvement for Airborne Bistatic Sidelooking Radar with Overlapped Subarrays Alternate Transmitting
2013 Vol. 35 (4): 888-893 [Abstract] ( 1212 ) [PDF 317KB] ( 716 )    DOI: 10.3724/SP.J.1146.2012.01462

Range-dependent clutter suppression is one of the most important problem in the airborne bistatic radar Space-Time Adaptive Processing (STAP). To overcome the problem, a novel technique using overlapped subarray alternate transmitting is developed. By virtue of the alternate transmitting, the clutter ridges of all range bins of airborne bistatic sidelooking radar are located in the same plane of a three-dimensional space which is constructed by transmitting spatial frequency, receiving frequency and Doppler frequency. Due to the range-independence of the clutter plane, it can be well suppressed by STAP. Then range-dependent clutter is efficiently suppressed. Numerical examples are given to demonstrate the effectiveness of the presented method.

Select  |    Cite this article 
Li Yan-Bing, Du Lan, Liu Hong-Wei, Wang Bao-Shuai
Study on Classification of Wheeled and Tracked Vehicles Based on Micro-Doppler Effect and Multilevel Wavelet Decomposition
2013 Vol. 35 (4): 894-900 [Abstract] ( 1402 ) [PDF 332KB] ( 870 )    DOI: 10.3724/SP.J.1146.2012.01026

Classification of moving vehicles within short dwell time is a promising way to the introduction of the target identification function to battlefield surveillance radar system. In this paper, radar returned echoes of moving wheeled and tracked vehicle are analyzed using micro-Doppler effect. According to the distinction between the micro-Doppler signals of these two kinds of vehicles, a wavelet transform based classification method is proposed. In this method, the influence induced by the change of main bulk velocity is alleviated by using multirate signal processing and the distinctions between wheeled and tracked vehicles are well depicted due to the separation of the bulk motion and micro motion components. Experiment results based on the measured data show the proposed method simultaneously achieves good classification performance and robustness to the change of the bulk velocity.

Select  |    Cite this article 
Yan Jun-Kun, Dai Feng-Zhou, Qin Tong, Liu Hong-Wei, Bao Zheng
A Power Allocation Approach for 3D Target Tracking in Multistatic Radar Systems
2013 Vol. 35 (4): 901-907 [Abstract] ( 1464 ) [PDF 338KB] ( 867 )    DOI: 10.3724/SP.J.1146.2012.00883

For the requirement of making full use of the limited resource in real application, this paper proposes a power allocation scheme for 3D target tracking in multistatic radar systems. Firstly, the Bayesian Cramer Rao Lower Bound (BCRLB) for 3D target tracking mean square error is derived and utilized as a criterion for the power allocation strategy. Then, the resulting nonlinear convex problem is solved by gradient projection algorithm. Finally, simulation results suggest that the tracking accuracy of the whole system is enormously improved by using the proposed algorithm compared with the results achieved with equal power allocation.

Select  |    Cite this article 
Wang Lei, Xu Ke, Xu Xi-Yu, Shi Ling-Wei
A New Method for Computing Radar Altimeter Look–up Correction Table and Its Application
2013 Vol. 35 (4): 908-914 [Abstract] ( 1258 ) [PDF 306KB] ( 753 )    DOI: 10.3724/SP.J.1146.2012.01058

Presently, the radar altimeter look-up correction tables are usually computed with an approximate exponential flat sea surface response function, and the effects of this approximation are neglected. In this paper, the errors of this approximation method are analyzed, and a new method of using the accurate flat sea surface response function is derived to compute the look-up correction tables. This new method can greatly decrease the errors when antenna mispointing angle is large. The new method is applied to HY-2 altimeter, and obtains a more accurate result.

Select  |    Cite this article 
Yu Jian-Guo, Liu Mei, Bao Jiu-Hong, Yao Lu
Space-based Sensor Online Calibration Based on Celestial Observations for Tracking Ballistic Missile Target
2013 Vol. 35 (4): 915-920 [Abstract] ( 1507 ) [PDF 315KB] ( 864 )    DOI: 10.3724/SP.J.1146.2012.01200

The systemic bias of space-based sensor hinders accurate threat identification and target location of coming targets. The correction of this systematic bias has unique difficulties including unable to in-situ commissioning and systemic bias periodically change as the satellite undergoes a cyclical heating and cooling due to its orbit. Combining the satellite altitude determination system, this paper firstly obtains the star vector measurement from electro-optical sensor and monitors the deviation of these measurements from expected value in navigation star table. Then, on the basis of systemic bias, this paper derives bias model and design the Bias Corrected Shift Rayleigh Filter (BCSRF). Simulation results show that the proposed filter can achieve in-situ calibration, and yields significant improvements in tracking ballistic targets compared with classical intersection and Unscented Kalman Filter (UKF) methods.

Select  |    Cite this article 
Li Jiang, Qian Fu-Cai, Liu Ding, Hu Shao-Lin
Tracking and Identification for GPS/DR Integrated Navigation System with Unknown Parameters
2013 Vol. 35 (4): 921-926 [Abstract] ( 1212 ) [PDF 282KB] ( 787 )    DOI: 10.3724/SP.J.1146.2012.01065

This paper propses a filtering method for GPS/DR (Global Positioning System/Dead-Reckoning) integrated navigation system with unknown parameters. This method firstly structures a self-organizing state space model, and then estimates the state vector by using Monte Carlo filtering method for this new system model. Because particle filter is easy to make a search of the unknown parameters into a subset of the initial sampling for the self-organization model an artificial fish swarm-partical filter algorithm is put forward. The algorithm not only can estimate the system state, but also can make the sampling distribution of the unknown parameters move to the true parameter distribution. Ultimately, the true value of the unknown parameters are identified. The simuliation results show the effectiveness of the proposed method.

Select  |    Cite this article 
Sun Feng-Lin, Zhang Sheng-Wei
Fast Image Reconstruction for Non-uniform Sampling of Thinned Array of Synthesis Aperture Radiometer
2013 Vol. 35 (4): 927-932 [Abstract] ( 1434 ) [PDF 561KB] ( 1012 )    DOI: 10.3724/SP.J.1146.2012.00688

Some thinned array, such as circle thinned array, is used by synthetic aperture interferometric radiometer to realize time-shared sampling. The thinned array may take non-uniform sampling of spatial frequencies due to antenna array structure optimization, the limitation of affined area and the physical size of antenna elements as well. In some traditional image reconstruction methods, non-uniform spatial frequency samplings are usually inserted to uniform Cartesian coordinate. And the spatial frequency densities are compensated. However, as the spatial sampling intensity is assumed to be quite smooth, these methods still bring errors and blurring in spite of different interpolation functions. Moreover, iterative methods that adopted straight Fourier transform are time consuming as they applied to non-uniform spatial frequency samplings. In this paper, another fast interactive image reconstruction method is introduced. The kernel of this algorithm is min-max formulation. The specific procedure of this method is as follows: (1)initiating the image; (2)taking non-uniform fast Fourier transform; (3)operating iterative conjugate gradient matched algorithm. The numerical simulating experiments show that, as spatial frequency samplings density is not smooth, the image can be still reestablished fast and accurately.

Select  |    Cite this article 
Yu Li, Luo Jing-Jing, Jiang Lie, Zhang Jie
Stochastic Delay Boundary Analysis of Multi-hop Wireless Networks Based on Stochastic Network Calculus
2013 Vol. 35 (4): 933-938 [Abstract] ( 1258 ) [PDF 258KB] ( 1054 )    DOI: 10.3724/SP.J.1146.2012.01029

To guarantee the QoS of multi-hop wireless networks, it is necessary to analyse the delay bound of the system. Based on stochastic network calculus, this paper models traffic flowing scenarios of multi-hop wireless networks utilizing three flow operators and proposes a general analysis method for the delay performance. The method simplifies the analysis of complex traffic flowing scenarios and is capable of deriving the delay bound of different traffic flowing scenarios. Applying the method to a traffic flowing scenario, the method can accurately estimate the probability distribution of the actual delay. Furthermore, the analytical bound is very close to the simulation results and is obviously superior to the deterministic upper delay bound.

Select  |    Cite this article 
Shi Hua, Li Jian-Dong, Li Zhao, Zheng Jie
Dynamic Spectrum Allocation Based on Coverage Probability in Heterogeneous Wireless Networks
2013 Vol. 35 (4): 939-945 [Abstract] ( 1360 ) [PDF 336KB] ( 843 )    DOI: 10.3724/SP.J.1146.2012.01088

Dynamic Spectrum Allocation (DSA) in heterogeneous wireless networks is investigated for the downlink communication of cellular Base Stations (BSs). A new Interference Control (IC) model for the case of log-normal shadowing is proposed based on Coverage Probability (CP). Such IC model considers the users distribution and transforms the SIR (Signal to Interference Ratio) requirement of users with different services into the coverage performance of BSs. Based on the IC model, DSA is formulated as a combinatorial optimization problem with nonlinear constraints. An algorithm of greedy CP-DSA is designed for the DSA issue. Simulation results indicate that CP-DSA can increase the network utility, control effectively the interference among BSs and satisfy the SIR requirement of users.

Select  |    Cite this article 
Zhang Hong, Fang Xu-Ming
On Mobile User Behavior and Half Time-variant Pricing Mechanism
2013 Vol. 35 (4): 946-951 [Abstract] ( 1042 ) [PDF 236KB] ( 774 )    DOI: 10.3724/SP.J.1146.2012.01110

The demand of broadband access to mobile Internet has experienced rapid growth in recent years, which brings both great opportunities and challenges to the mobile operators. It is the operators’ focus of concern to find optimized pricing mechanism to guide the mobile user,s behavior and improve their revenue. This paper, with the analysis of mobile user behavior and the influence of price on it, not only proves that only by using time-variant pricing can the operators maximize their revenue, but also gives some methods to guide mobile user behavior. Considering the user’s resistance to the frequent pricing changes, this paper has also examined the feasibility of half time-variant pricing, and shows how to get the loss rate of network revenue. Research results show that half time-variant pricing can effectively mitigate the operator’s revenue loss while maintaining appropriate user acceptability.

Select  |    Cite this article 
Zhao Qi, Zhao A-Qun
A Multi-path Routing Algorithm Base on A* Algorithm
2013 Vol. 35 (4): 952-957 [Abstract] ( 1009 ) [PDF 244KB] ( 1070 )    DOI: 10.3724/SP.J.1146.2012.00983

With the rapid growth of network traffic, applications of the multi-path transmission are becoming more popular. The multi-path routing algorithms are the base to implement multi-path transmission. In this paper, a new Multi-path routing algorithm based on the A* algorithm called MA* algorithm is proposed which combining the path similarity objective with the heuristic method. A new evaluation function construction method is devised for the MA* algorithm, which is proved to be feasible through theoretical analysis. The simulation experiments are carried out to compare the MA* algorithm with other multi-path routing algorithms applying network topology generation tool. The results show that the MA* algorithm can acquire multiple paths with reasonable path cost and path similarity at quite low search times. In addition, the balance of path cost and path similarity can be achieved through reasonable adjustment of the punishing parameter. The MA* algorithm can be applied to wider multi-path transmission environments as a more common multi-path routing algorithm.

Select  |    Cite this article 
Zhang Zhen, Wang Bin-Qiang, Chen Hong-Chang, Ma Hai-Long
Internet Traffic Classification Based on Host Connection Graph
2013 Vol. 35 (4): 958-964 [Abstract] ( 1162 ) [PDF 372KB] ( 972 )    DOI: 10.3724/SP.J.1146.2012.01040

Considering at the concept drift issue of machine learning identification, a novel algorithm called traffic classification based on Host Connection Graph (HCG) is proposed. Considering {IP Address, Port} as the unique user identifier, HCG constructs a host connection graph and innovates the concept of user similarity. Based on the theory of graph mining, social community is abstracted from communications among hosts by partitioning the graph into mutually intersectant behavior clusters. In order to reach traffic classification, HCG not only conceives a definition called User Behavior Mode (UBM) to analyse the implicit traffic characteristics, but also maps application labels to every host behavior by employing UBM and Port. Finally, simulations are conducted based on the real network trace. Results demonstrate that HCG can circumvent the concept shift problem and ameliorate gracefully computational complication without sacrificing accuracy.

Select  |    Cite this article 
Tang Lin, Wu Ji
Study of QoS for Heterogeneous Wireless Multimedia Sensor Networks
2013 Vol. 35 (4): 965-969 [Abstract] ( 1341 ) [PDF 236KB] ( 691 )    DOI: 10.3724/SP.J.1146.2012.01128

With the rapid development of heterogeneous wireless multimedia sensor networks, how to satisfy all the requirement of data source and provide QoS for it becomes a hot research issue. Differentiated Queuing Service (DQS) is introduced into wireless multimedia sensor network. Based on the algorithm, scalar node can inform sink in time and real time traffic can be forwarded rapidly through setting packet lifetime. The result of simulation show that the sink can gather enough event scalar packets and real time packets delay is satisfied. The effectiveness of the method is verified.

Select  |    Cite this article 
Dai Hua, Qin Xiao-Lin, Liu Liang, Ji Yi-Mu, Fu Xiong, Sun Yan
Z-O Encoding Based Privacy-preserving MAX/MIN Query Protocol in Two-tiered Wireless Sensor Networks
2013 Vol. 35 (4): 970-976 [Abstract] ( 1339 ) [PDF 284KB] ( 738 )    DOI: 10.3724/SP.J.1146.2012.00940

Privacy preservation in wireless sensor networks has attracted more and more attentions. Computing MAX/MIN query result in wireless sensor networks while preserving data privacy is a challenge. This paper proposes a Zero-One (Z-O) encoding based Privacy-Preserving MAX/MIN query protocol in two-tiered wireless sensor networks (ZOPPM). In ZOPPM, sensor nodes in the query range firstly convert their sensory data into encoded data, by using Z-O encoding and hashed message authentication code mechanism, and send the encoded data to the corresponding storage node, and encrypt sensory data and send the ciphertext to it in the demand. According to the numerical comparison theory of Z-O encoding method, every storage node generates a local MAX/MIN sensor node in its own query cell, without sensory data in plaintext. Then, the storage node constructs a local query result when receiving the encrypted data from a sensor node, and sends it to the sink node. Finally, the sink node calculates the MAX/MIN query result after receiving the local query result from all storage nodes. The theoretical analysis and experimental results show that the ZOPPM protocol can ensure the privacy of sensory data and the query result, and it costs less energy consumption than other similar method.

Select  |    Cite this article 
Xiao Jie-Bin, Zhang Shao-Wu
An Algorithm of Integrating Random Walk and Increment Correlative Vertexes for Mining Community of Dynamic Networks
2013 Vol. 35 (4): 977-981 [Abstract] ( 2083 ) [PDF 261KB] ( 537 )    DOI: 10.3724/SP.J.1146.2012.01118

Community mining in dynamic networks can help to obtain the whole network characteristics and the trend of network development. As dynamic networks usually consist of many consecutive static networks, traditional methods of identifying network communities will lead to significant variations between communities close in time and high time complexity. Although the general incremental methods (e.g. Incremental algorithm for Community identification (IC) and Increment and Density based Community detection Method (IDCM)) can reduce the time complexity at a certain extent, but they need to manually set the judgment parameter, and fail to identify large networks in acceptable time. In this paper, an algorithm of integrating Random Walk and Increment correction Vertexes (RWIV) is proposed to identify the dynamic network structure. RWIV algorithm first deals with increment correlative vertexes with random walk, and then adjusts the residual vertexes by analyzing their community affinity. The simulation results and analysis show that RWIV avoid manually selecting the parameter of IC or IDCM, which affect the accuracy of community mining, the cumulative error. RWIV can fit the situation of community structure sharp changes. The performance of RWIV is super than that of IC and IDCM methods.

Select  |    Cite this article 
Wu He-Sheng, Wang Chong-Jun, Xie Jun-Yuan
A Lock-free Multi-processing Session Persistence Mechanism for Load Balancing in Multi-core Environment
2013 Vol. 35 (4): 982-987 [Abstract] ( 1874 ) [PDF 244KB] ( 1387 )    DOI: 10.3724/SP.J.1146.2012.01282

Load balancing is a fundamental problem for cloud computing, multi-processing load balancing session persistence in multi-core environment have drawn more attention and have become a focus. For the issue, based on the idea of Hash Linux kernel network data packets passing, a lock-free multi-processing load balancing architecture is proposed, which avoids the use of locks, and can quickly change the existing single-processing load balancing procedure for multi-processing architecture without structural changes. The theory analysis and experimental results show that the proposed architecture is able to improve the overall performance of load balancing system in multi-core environment. Compared with the traditional shared memory architecture, the proposed is able to get better performance and has stronger applicability.

Select  |    Cite this article 
Guang Yan, Gu Chun-Xiang, Zhu Yue-Fei, Zheng Yong-Hui, Fei Jin-Long
Certificateless Fully Homomorphic Encryption Based on LWE Problem
2013 Vol. 35 (4): 988-993 [Abstract] ( 1759 ) [PDF 232KB] ( 1803 )    DOI: 10.3724/SP.J.1146.2012.01102

Fully homomorphic encryption has important application in cloud computing. However, the existing fully homomorphic encryption schemes share a common flaw that they all use public keys of large scales. And this flaw may cause inefficiency of these schemes in the key and identity management. To solve this problem, a certificateless fully homomorphic encryption scheme is presented based on Learning With Errors (LWE) problem. The scheme builds the connection between the user’s identity and its public key with the trapdoor one-way function with preimage sampling so that the certificates are no longer necessary. The private keys are chosen by the users without key escrow. In the random oracle model, the security of the scheme strictly reduces to hardness of decisional LWE problem.

Select  |    Cite this article 
Zhao Lei, Wang Zu-Lin, Guo Xu-Jing, Hua Geng-Xin
A Physical Design Approach for Mitigating Soft Errors in SRAM-based FPGAs
2013 Vol. 35 (4): 994-1000 [Abstract] ( 1309 ) [PDF 298KB] ( 869 )    DOI: 10.3724/SP.J.1146.2012.01030

To solve the problem of soft error caused by Single Event Upset (SEU) in Static Random Access Memory (SRAM)-based Field Programmable Gate Arrays (FPGAs), the impact of routing resources by Single Bit Upset (SBU) and Multiple Bit Upset (MBU) is analyzed. A new method of soft-error-mitigation physical design approach is presented. In the approach, the error probability of routing resources is introduced for evaluation soft error. Combined with error propagation probability, system failure rate is calculated for driving placement and routing. The experimental results show that the system failure rate decreases about 18% using proposed method. This method can also effectively mitigate effect of multiple bit upset.

Select  |    Cite this article 
Chen Chen, Chen Zhi-Jian, Meng Jian-Yi, Yan Xiao-Lang
Branch Prediction Based on Dynamic Polarity Transformation
2013 Vol. 35 (4): 1001-1006 [Abstract] ( 1199 ) [PDF 302KB] ( 1124 )    DOI: 10.3724/SP.J.1146.2012.00650

Periods with high branch misprediction rate tend to be uneven and concentrated during execution of programs. To address this problem, a new branch prediction strategy is proposed, which based on dynamic polarity transformation. This approach monitors original branch misprediction rate whose polarity has not been transformed, and detects the periods with original branch misprediction rate higher than a threshold. These periods are called as peaks of misprediction. The polarity of original prediction results will be transformed to make the final prediction during peaks of misprediction. As a result, the final branch misprediction rate whose polarity has been transformed will always be lower than the threshold during execution of programs. The prediction method can be divided into three categories according to the monitoring mechanism, which are global monitor, set monitor and per-address monitor. The experimental results show that this methodology gives better prediction accuracy than Gshare and Bi-Mode prediction schemes for the same cost.

Select  |    Cite this article 
Wang Xiao-Fei, Zhang Xi, Zhang Quan, Tang Chao-Jing
Modeling and Performance Analysis of Random Access MAC Protocols in Cognitive Radio Networks
2013 Vol. 35 (4): 1007-1011 [Abstract] ( 1311 ) [PDF 279KB] ( 1010 )    DOI: 10.3724/SP.J.1146.2012.01090

A modeling and analysis scheme based on Markov chain for Random Access MAC (RA-MAC) protocol of cognitive radio networks are proposed. A three-state Markov chain model of channel is presented, while the problem of dynamic characteristic of channel is dealt with by introducing the channel constraint rate and the available channel number of stability. A channel negotiation model is designed based on discrete two-dimensional Markov chain. An algorithm to evaluate the saturation throughput of RA-MAC is presented, considering constraints of capacity of the control channel. The simulation results demonstrate the effectiveness of the proposals, and the relationship between protocol performance and parameters is analyzed.

Select  |    Cite this article 
Niu Xiao-Peng, Li Qing-Bao, Wang Wei
A Robust Network Covert Channel Algorithm Based on Spread Coding
2013 Vol. 35 (4): 1012-1016 [Abstract] ( 1265 ) [PDF 263KB] ( 777 )    DOI: 10.3724/SP.J.1146.2012.01106

In order to solve the problem that the covert timing channel works unstable in the noisy network, a method of designing robust covert channel is proposed. The method uses the interval time of network packets to transfer information, the sender codes covert information using hash spreading spectrum, and the receiver forecasts the channel noise and eliminates it. In order to solve the contradictory relationship between transmission rate and robustness, the strategy of maximizing robustness under fixed transmission rate is proposed. The experimental environment of this covert channel is constructed and several experiments are conducted. The results show that the ability to resist noise is increased about by 20%, compared with other methods on the same problem.

电子与信息学报
Author Center
Online Submission
Author Instruction
FAQ
Template
Copyright Agreement
MSN:je-jeit@hotmail.com
Links
More>>  
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech