电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Quick Search  
  Advanced Search
2014 Vol.36 No.12, Published: 19 December 2014
Articles |
 
 
Articles
Select  |    Cite this article 
Ge Guo-Dong, Guo Yun-Fei, Liu Cai-Xia, Lan Ju-Long
Collaborative Caching Algorithm Based on Request  Correlation in Named Data Networking
2014 Vol. 36 (12): 2795-2801 [Abstract] ( 1225 ) [PDF 377KB] ( 1415 )    DOI: 10.3724/SP.J.1146.2014.00114

How to efficiently utilize the finite storage space and cache content chunks in the content store poses challenges to the caching policy in Named Data Networking (NDN). Using the differentiated caching strategy, a collaborative caching algorithm is proposed based on the request correlation. In the scheme, the subsequent correlated content chunks are requested in advance to increase the hit ratio for content requesting. When making the caching decision, a two-dimensional differentiated caching policy combining the caching location and cache-resident time is proposed. According to the change of content activity, the caching location is pushed downstream hop by hop in the spatial dimension in order to spread popular contents to the network edge in a gradual manner, and the cache-resident time is adjusted dynamically in the time dimension. The simulation results show that the proposed algorithm can efficiently decrease the request latency, reduce the cache redundancy, and achieve higher cache hit ratio than other caching strategies.

Select  |    Cite this article 
Yao Lin-Yuan, Chen Ying, Song Fei, Zhang Hong-Ke
Delay-aware Controller Placement for Fast Response in Software-defined Network
2014 Vol. 36 (12): 2802-2808 [Abstract] ( 1212 ) [PDF 350KB] ( 1336 )    DOI: 10.3724/SP.J.1146.2014.00211

Most of Controller placements take the Propagation Delay (PD) as the important consideration in Software-Defined Network (SDN), ignoring the influence of the Transmission Delay (TD) on the network performance. This paper provides a delay-aware controller placement for fast response. First, the Controller placement is formulated as an optimization problem based on PD and TD. Average delay and maximum delay minimization models are updated, of which the processes about the optimal solution are circumstantiated. Further, delay optimization model is deduced by fuzzy set theory. Finally, according to whether or not considering TD, two placement algorithms, Transmission and Propagation Algorithm (TPA) and Propagation Algorithm (PA), are presented. In order to measure the performance of the solutions, a factual network topology is chosen and the simulation result shows that TPA superiorities over PA in terms of response speed and network stability, the total delay of delay optimization model is less than the others.

Select  |    Cite this article 
Liu Yang, Ji Xin-Sheng, Liu Cai-Xia
Detecting Local Community Structure Based on the Identification of Boundary Nodes in Complex Networks
2014 Vol. 36 (12): 2809-2815 [Abstract] ( 1073 ) [PDF 336KB] ( 1456 )    DOI: 10.3724/SP.J.1146.2013.01955

In the context that social network becomes more and more complicated and huge, it is extremely difficult and complex to mine the global community structures of large networks. Therefore, the local community detection has important application significance for studying and understanding the community structure of complex networks. The existing algorithms often have some defects, such as low accuracy and stability, the preset thresholds difficult to obtain, etc.. In this paper, a local community detecting algorithm is proposed based on boundary nodes identification, and a comprehensive consideration of the external and internal link similarity of neighborhood nodes for community clustering is given. Meanwhile, the method can effectively control the scale and scope of the local community based on the boundary node identification, so as the complete structure information of the local community is obtained. Through the experiments on both computer-generated and real-world networks, the results show that the proposed algorithm can automatically mine local community structure from the given node without predefined parameters, and improve the performance of local community detection in stability and accuracy.

Select  |    Cite this article 
Zhao Jun, Zheng Wei, Wen Xiang-Ming, Zhang Hai-Jun, Lu Zhao-Ming, Jing Wen-Peng
Research on the Resource Allocation of OFDMA Relay Network Based on Secrecy Ratio
2014 Vol. 36 (12): 2816-2821 [Abstract] ( 1042 ) [PDF 293KB] ( 756 )    DOI: 10.3724/SP.J.1146.2014.00042

Considering the security resource allocation problem in the two-way relay networks exiting an eavesdropper, to improve the security of the relay, a security secrecy ratio scheme under the constraint of subchannel allocation and power is studied in this paper. Compared to the traditional secrecy capacity scheme, the security secrecy ratio scheme pays more attention to reflecting the user’s own security extent. Based on the proposed scheme, security Quality of  Service (QoS) requirement for different users and the network fairness are further considered. Besides, power allocation, subchannel allocation and subchannel pairing are joint considered. Then, the optimal solution is obtained through Constraint Particle Swarm Optimization (CPSO) algorithm, Binary CPSO (B_CPSO) algorithm and Classic Hungarian Algorithm (CHA), respectively. Finally, the network resources are allocated in an optimal manner and the secrecy ratio for legitimate users is improved. Simulations results show the effectiveness of the proposed algorithm.

Select  |    Cite this article 
Cheng Yong-Sheng, Zhu Jiang, Lin Xiao-Kang
Uplink Resource Allocation in Device-to-Device Enabled Cellular Networks
2014 Vol. 36 (12): 2822-2827 [Abstract] ( 926 ) [PDF 261KB] ( 1449 )    DOI: 10.3724/SP.J.1146.2014.00056

Uplink resource allocation in Device-to-Device (D2D) enabled cellular systems is studied. The sum-rate maximization problem is transformed into a concise Binary Integer Programming (BIP) problem, which is NP-hard. Then based on the Canonical duality theory, a dual problem is obtained. The dual problem is a convex problem in a continuous domain. Under appropriate conditions, the dual method attains the global optimal solution of the primal problem with zero duality gap. An algorithm based on the Barrier method is proposed to solve the dual problem. Simulation results show that the proposed algorithm performs close to optimal and outperforms the existing algorithm.

Select  |    Cite this article 
Cao Kai-Tian, Gao Xi-Qi, Wang Dong-Lin
Wideband Compressive Spectrum Sensing Without Reconstruction Based on Random Matrix Theory
2014 Vol. 36 (12): 2828-2834 [Abstract] ( 1103 ) [PDF 321KB] ( 942 )    DOI: 10.3724/SP.J.1146.2014.00028

This paper proposes a novel wideband compressive spectrum sensing scheme based on the Generalized Likelihood Ratio Test (GLRT), in which the GLRT statistic and the decision threshold are derived according to Random Matrix Theory (RMT). The proposed scheme exploits only compressive measurements to detect the occupancy status of each sub-band in a wide spectral range without requiring signal reconstruction or priori information. In addition, to alleviate the communication and data acquisition overhead of Secondary Users (SUs), a Sensor Node (SN)-assisted cooperative sensing framework is also addressed. In this sensing framework, the sensor nodes perform compressive sampling instead of the SUs at the sub-Nyquist rate. Both theoretical analysis and simulation results show that compared with the traditional GLRT algorithm with signal reconstruction and the Roy’s Largest Root Test (RLRT) algorithm, the proposed scheme not only has lower computational complexity and cost and more robust sensing performance, but also can achieve better detection performance with a fewer number of SNs.

Select  |    Cite this article 
Yi Ming, Ji Xin-Sheng, Huang Kai-Zhi, Jin Liang, Wang Jing
A Method Based on Puncturing Polar Codes for Physical Layer Security
2014 Vol. 36 (12): 2835-2841 [Abstract] ( 1170 ) [PDF 329KB] ( 1287 )    DOI: 10.3724/SP.J.1146.2014.00013

To solve the confliction between the security and reliability of physical layer security codes and improve the secrecy rate, a security coding method based on puncturing polar codes is proposed. In order to keep the security and reliability, the confidential information is mapped to the specific input proposition which could be decoded by legal receiver but be equivocal for eavesdropper based on channel polarization theory. By analyzing the check trees of polar codes, the puncturing pattern is designed based on the influences of outputs on confidential information which are described by three parameters. The theoretical analysis and simulation results verify that the proposed method is able to guarantee simultaneously the security and reliability while improving the efficiency of the confidential information.

Select  |    Cite this article 
Li Zhi-Jian, Lai Shun-Qiao
An Anti-collision Algorithm Based on Collided Bits Indicator in Radio Frequency Identification Systems
2014 Vol. 36 (12): 2842-2847 [Abstract] ( 1250 ) [PDF 288KB] ( 796 )    DOI: 10.3724/SP.J.1146.2013.01759

Multiple tags collision becomes an important factor blocking the popularization of Radio Frequency IDentification (RFID). To improve the identification efficiency and reduce the communication overhead, an novel algorithm, anti-Collided Bits Indicator Algorithm (CBIA) is proposed base don Bits Indicator Algorthm (BIA). Using the collision bit tracking technology and collided bits coding technology, the reader splits the tags into smaller subsets according to the identified collided bits. This process is repeated until all collided bits are solved. CBIA groups the tags into determinate subsets to avoid generating idle slots. The analysis and simulation results show that the average throughput of CBIA is 0.7 tags per slot, which is better than that of other algorithms, such as Optimal Query Tracking Tree protocol (OQTT) and Collision Tracking Tree Algorithm (CTTA).

Select  |    Cite this article 
Cao Chen-Lei, Liu Ming-Qi, Zhang Ru, Yang Yi-Xian
Provably Secure Authenticated Key Agreement Protocol Based on Hierarchical Identity
2014 Vol. 36 (12): 2848-2854 [Abstract] ( 893 ) [PDF 258KB] ( 880 )    DOI: 10.3724/SP.J.1146.2014.00684

At present most Identity-based authenticated key agreement protocols are built on the security infrastructure in which a single Private Key Generator (PKG) is contained as the only trusted third party of the whole system, however such kind of infrastructure can not satisfy the requirements of hierarchical identity register and authentication. On the basis of Hierarchical Identity Based Encryption (HIBE) system, this paper reconstructs the private key and proposes a new hierarchical identity based authenticated key agreement protocol using the bilinear map in multiplicative cyclic group and it provides secure session key exchange mechanism for cloud entities on different hierarchical levels. Based on the Computational Diffie-Hellman (CDH) and Gap Diffie-Hellman (GDH) assumptions, this paper proves that the new protocol not only achieves known-key security, forward secrecy and PKG forward secrecy, but also resists key-compromise impersonation attacks in the eCK model.

Select  |    Cite this article 
Shen Qiu, Li Xiao-Fan, Kong Fan-Qiang, Dai Yu-Xi
A Real-time Video Compression for UAV Based on Affine Model
2014 Vol. 36 (12): 2855-2860 [Abstract] ( 970 ) [PDF 440KB] ( 889 )    DOI: 10.3724/SP.J.1146.2014.00080

Since the existing algorithms can not meet the requirements of real-time compression and transmission for UAV(Unmanned Aerial Vehicle) videos, a new real-time compression algorithm with low complexity for UAV videos is proposed. Considering the plane background and unified motion of UAV videos, the proposed method establishes an affine model for global motion estimation and compression. The experimental results demonstrate that the proposed algorithm is able to reduce the total encoding time while maintaining the performance compared with H.264, which the quality requirement and real-time performance for UAV videos transmission can be satisfied in most cases.

Select  |    Cite this article 
Zheng Ming-Kui, Su Kai-Xiong, Wang Wei-Xing, Yang Xiu-Zhi, Lan Cheng-Dong
An Improved Intra Quantization Matrix for High Efficiency Video Coding Based on Visual Perception
2014 Vol. 36 (12): 2861-2868 [Abstract] ( 993 ) [PDF 279KB] ( 1166 )    DOI: 10.3724/SP.J.1146.2014.00318

A Discrete Cosine Transform (DCT) based Modulation Transfer Function (MTF) is used to improve the intra quantization matrix for the High Efficiency Video Coding (HEVC) standard. A new method is used to calculate the spatial frequency in the calculation process. The integer DCT for the HEVC is achieved by scaling and hand-tuning the DCT matrix. Due to difference between these two transforms, the quantization matrices are optimized. The experimental results show that the proposed HEVC intra quantization matrix based on the visual perception can reduce more bit rate at the similar video quality by using a Structural SIMilarity (SSIM) based Bjontegaard Delta Bit Rate (BDBR) performance evaluation. Since only the quantization matrices are changed in the encoding process, the proposed algorithm does not affect the structure of the encoding algorithm and does not add the coding complexity.

Select  |    Cite this article 
Zhang Gao-Yuan, Zhou Liang, Wen Hong
Low Complexity Early Stopping Criterion for Weighted Bit Flipping Decodings of LDPC Codes
2014 Vol. 36 (12): 2869-2875 [Abstract] ( 851 ) [PDF 302KB] ( 1020 )    DOI: 10.3724/SP.J.1146.2013.02001

Recently, extensive researches have been focused on the early stoping criterion for Belief-Propagation(BP) decoding of LDPC codes. However, there is little study on suitable design of early stopping criterion for Weighted Bit Flipping (WBF) decodings. Based on the whole novel understanding of WBF algorithm, this paper study presents a low complexity and high adaptable stopping criterion which detects most of the undecodable blocks in an early stage of the decoding process. The simulation results show that the proposed method can significatly reduce the average number of required iterations with negligible performance loss, which is able to achieve appealing tradeoff between the complexity and the performance.

Select  |    Cite this article 
Fang Qing-Yuan, Han Yong, Jin Ming, Song Li-Zhong, Qiao Xiao-Lin
DOA Estimation Based on Eigenvalue Reconstruction of Noise Subspace
2014 Vol. 36 (12): 2876-2881 [Abstract] ( 1036 ) [PDF 293KB] ( 1000 )    DOI: 10.3724/SP.J.1146.2013.02014

This paper proposes an Eigenvalue Reconstruction method in Noise Subspace (ERNS) for Direction of Arrival DOA estimation with high resolution, provided that the powers of sources are different. The noise subspace eigenvalues belonging to the covariance matrix of received signals, obtained by EigenValue Decomposition (EVD), are modified to construct a new covariance matrix with respect to virtual source. The noise subspace eigenvalues corresponding to the new covariance matrix remain the same as before they are modified. The invariance of the noise subspace is utilized to estimate the DOA of emitters. The theory and process of ERNS algorithm are provided, at the same time, the theory and performance of ERNS algorithm is validated by computer simulations. The simulation results show that the ERNS algorithm has a better performance in successful probability of weak signal estimation compared with other subspace methods and MUSIC algorithm.

Select  |    Cite this article 
Li Wen-Xing, Mao Xiao-Jun, Sun Ya-Xiu
A New Algorithm for Null Broadening Beamforming
2014 Vol. 36 (12): 2882-2888 [Abstract] ( 880 ) [PDF 318KB] ( 1515 )    DOI: 10.3724/SP.J.1146.2013.02018

Since the adaptive beamformer suffers from the output performance degradation when the position of the interference moves, a new null broadening technique is proposed. The algorithm uses the projection technology to transform the array receives data, combined with diagonal loading techniques to get the new covariance matrix. The original covariance matrix is replaced by a new covariance matrix as such, and then a null broadening beam can be obtained using the adaptive beamforming technique. The simulations results show that this method can effectively broadening the beam null width and enhance the null depth, so the new algorithm can suppress strong interference with rapid movement; and the algorithm is easy processing, which can still work effectively even in the condition of low snapshot, the algorithm enhanced robustness of the beamformer.

Select  |    Cite this article 
Tian Feng, Yang Yi-Xin, Wu Yao-Zhen, Yang Long
Localization of Noise Sources on Underwater Vehicle via Chirp-Fourier Processing
2014 Vol. 36 (12): 2889-2895 [Abstract] ( 844 ) [PDF 408KB] ( 764 )    DOI: 10.3724/SP.J.1146.2014.00106

The radiated noise sources of underwater vehicle can be localized by analysis of Doppler information.  Then effective suppression of noise can be taken. However, traditional time-frequency methods can hardly distinguish the Doppler shift of noise sources with a single frequency. In this paper, a method of multi-Doppler signals analysis based on Chirp-Fourier transform is presented.  The Doppler signal is decomposed into a sum of Linear Frequency Modulate (LFM) components, and transformed into two-dimensional frequency-modulate factor domain.  Then the location of multiple noise sources can be estimated by the extracted Doppler information and the interference caused by single frequency sources can be suppressed. Computer simulation and experimental result at sea demonstrate the validity of the proposed method.

Select  |    Cite this article 
Jiang Kai-Yu, Wu Chao, Guo Yan-Meng, Fu Qiang, Yan Yong-Hong
Acoustic Echo Control Based on Frequency-domain Stage-wise Regression
2014 Vol. 36 (12): 2896-2901 [Abstract] ( 1007 ) [PDF 280KB] ( 1300 )    DOI: 10.3724/SP.J.1146.2014.00131

Traditional echo control techniques as Partitioned Block Frequency Domain Adaptive Filter (PBFDAF) with stochastic gradient adaptive method usually endure slow convergence and insufficient echo suppression in reverberant room when the echo is speech and the echo path is unstable. An algorithm based on frequency domain stage-wise regression is proposed for acoustic echo control to achieve faster convergence of the system estimation with insignificant bias. Commonly used additional double-talk detector and inter-channel coherence based residual echo suppressor are not needed since short-time coherence analysis is performed in each stage. By further making mild assumptions on the quasi-stationarity of the near-end background noise, both fast convergence and stability of the estimation can be achieved simultaneously with a non-stationarity controlled smoothing factor. Experiments are carried out to show the superiority of the proposed approach in terms of convergence speed and steady state error in distant talking mode in ordinary room environment with various common levels of background noise.

Select  |    Cite this article 
He Jian, Wan Zhi-Jiang, Liu Jin-Wei
Indoor Positioning Technology Based on Powerline and Location Fingerprint
2014 Vol. 36 (12): 2902-2908 [Abstract] ( 1280 ) [PDF 417KB] ( 1712 )    DOI: 10.3724/SP.J.1146.2013.02022

The power line being indispensable under indoor environment is firstly introduced to be as the antenna, which wideband high-frequency signals are injected into it to obtain the location fingerprint so as to achieve precise indoor positioning. Firstly, the realization technology about the injection of the wideband high-frequency signal analysis is proposed, and the construction method of the indoor location fingerprint is deeply described. Meanwhile, the indoor positioning technology based on the naive Bias classification algorithm is discussed at detail. Finally, the experimental analysis shows that the positioning technology based on naive Bayes classification algorithm has higher positioning accuracy and better adaptive ability of time migration than the positioning technology based on K-Nearest Neighbor (KNN) classification algorithm, in the case of multiple training samples.

Select  |    Cite this article 
Liu Zhe-Xi, Yang Jian-Hong, Yang De-Bin, Li Min
Combination of Conflicting Evidence by Using the Total Uncertainty Degree of Information
2014 Vol. 36 (12): 2909-2914 [Abstract] ( 963 ) [PDF 257KB] ( 810 )    DOI: 10.3724/SP.J.1146.2014.00039

The common way of conflicting evidence combination is to modify the basic probability mass assignment of evidence bodies by a certain indicator which can reflect or describe the information uncertainty of the conflicting evidence. In existing conflicting evidence combination methods, indicators such as the distance of evidence and ambiguity are used. However, these indicators reflect only one or several aspects of the characteristics of the conflicting information uncertainty. A novel method of conflicting evidence combination is proposed based on the total uncertainty degree of information. The concept of combined total uncertainty of information is defined based on Cartesian product. An approach of predicting the range of fused information’s combined total uncertainty degree by the total uncertainty degree of each body of evidence before information fusion is also presented. Weights for each evidence body are obtained according to the total uncertainty degree of each evidence body and the combined total uncertainty on their Cartesian product. Then, the bodies of conflicting evidence are combined by the weighted average according to Dempster’s rule. Results of numerical examples of information fusion show that, compared with the existing approaches, the total uncertainty degree of the combined information obtained by the proposed method is smaller, which means the combined information is more helpful to subsquent decision analysis and data applications.

Select  |    Cite this article 
Li Wan-Yi, Sun Ji-Feng, Wang Yu-Long
Human Motion Estimation Based on Dual Latent Variable Spaces Local Particle Search
2014 Vol. 36 (12): 2915-2922 [Abstract] ( 775 ) [PDF 486KB] ( 814 )    DOI: 10.3724/SP.J.1146.2013.01915

A novel algorithm called Dual Latent Variable Spaces Local Particle Search (DLVSLPS) is proposed. It can estimate the 3D human motion sequence from silhouettes of multi-view image sequence more accurately. Gaussian Process Dynamical Models (GPDM) is used to reduce the dimension to build the dual latent variable spaces and the mapping from low dimensional latent variable data to high dimensional data. Then, the low dimensional particles are searched in these spaces by the method called Neighbor Weight Prior Condition Search (NWPCS). The better high dimensional data are generated from the mapping to estimate the 3D human motion of the corresponding frame. The proposed algorithm aims to solve the problem of traditional particle filters. The problem is that sampling in high dimensional data space can not get the valid and correct data to estimate the 3D human motion. The simulating experiments show the proposed algorithm has better performance than the traditional particle filters. The better performance includes the multi-view and discontinuous frame estimation, overcoming the silhouette ambiguity and reducing the estimation error.

Select  |    Cite this article 
Chu Yue-Zhong, Xu Bo, Gao You-Tao, Tai Wei-Peng
Technique of Remote Sensing Image Target Recognition Based on Affinity Propagation and Kernel Matching Pursuit
2014 Vol. 36 (12): 2923-2928 [Abstract] ( 1034 ) [PDF 266KB] ( 1075 )    DOI: 10.3724/SP.J.1146.2014.00422

The processing of generating dictionary of function in Kernel Matching Pursuit (KMP) often uses greedy algorithm for global optimal searching, the dictionary learning time of KMP is too long. To overcome the above drawbacks, a novel classification algorithm (AP-KMP) based on Affinity Propagation (AP) and KMP is proposed. This method utilizes clustering algorithms to optimize dictionary division process in KMP algorithm, then the KMP algorithm is used to search in these local dictionary space, thus reducing the computation time. Finally, four algorithms and AP-KMP are carried out respectively for some UCI datasets and remote sensing image datasets, the conclusion of which fully demonstrates that the AP-KMP algorithm is superior over another four algorithms in computation time and classification performance.

Select  |    Cite this article 
Mao Hu, Wu De-Wei, Lu Hu, Yan Zhan-Jie
Analysis of a New Wideband Blanket Jamming Type to GPS Receiver
2014 Vol. 36 (12): 2929-2934 [Abstract] ( 1099 ) [PDF 330KB] ( 1354 )    DOI: 10.3724/SP.J.1146.2014.00123

Aiming at the problem that a Continuous Wave (CW) is easy to be suppressed by the frequency domain filtering and the efficiency of a broadband continuous blanket jamming is low, this paper presents a new broadband comb spectrum jamming type which is called single pulse CW. The jamming frequency domain range of single pulse CW is set respectively according to the power spectral density characteristic of C/A code, P(Y) code and M code signal. Taking code tracking error as the evaluation index of jamming effect, the GPS receiver code tracking performance of using a narrowband non-coherent delay lock loop is simulated and analyzed under different jamming circumstance. The simulation results show that the influence of single pulse CW jamming to C/A code and M code with the different Pseudo Random Noise Code (PRN) and phase of modulating sub-carrier are different, under the same Jamming-to-Signal Ratio (JSR) condition, the jamming effect of single pulse CW is better than the broadband Gaussian noise and matched spectrum.

Select  |    Cite this article 
Shen Zhi-Bo, Dong Chun-Xi, Huang Long, Zhao Guo-Qing
Broadband 2-D DOA Estimation Based on Compressed Sensing
2014 Vol. 36 (12): 2935-2941 [Abstract] ( 935 ) [PDF 351KB] ( 907 )    DOI: 10.3724/SP.J.1146.2013.01931

For the problem of two Dimensional Direction Of Arrival (2-D DOA) estimation, a broadband 2-D DOA algorithm is proposed based on the Compressed Sensing (CS). It can obtain the center frequency, azimuth angle and pitch angle of multiple narrowband signal. Firstly, an overcomplete sparse dictionary is established using the space frequency of azimuth and pitch. Then the high resolution estimation of space frequency is achieved with the compressed sampling array receiving data. Finally, the spatial filtering is used to realize the match of center frequency, azimuth angle and pitch angle. Theoretical analysis shows that the proposed algorithm has a higher estimation precision and lower SNR threshold without multidimensional search process. It reduces the computation by compressed sampling and the simulation results verify the effectiveness and correctness.

Select  |    Cite this article 
Sun Yu-Bao, Li Huan, Wu Min, Wu Ze-Bin, He Jin-Ping, Liu Qing-Shan
Compressed Sensing Reconstruction of Hyperspectral Image Using the Graph Sparsity Regularized Multiple Measurement Vector Model
2014 Vol. 36 (12): 2942-2948 [Abstract] ( 961 ) [PDF 547KB] ( 1425 )    DOI: 10.3724/SP.J.1146.2014.00566

Compressed Sensing (CS) reconstruction of hyperspectral image is an effective mechanism to comedy the traditional hyperspectral imaging pattern with the drawback of high redundancy and vast data volume. This paper presents a new multiple measurement vector model for compressed sensing reconstruction of hyperspectral data in consideration of its multiple channel character. In the encoding side, the random convolution operator is used to rapidly obtain the measurement vector of each channel which is subsequently reorganized as a measurement vector matrix. In the decoding side, a joint reconstruction model is proposed to reconstruct the hyperspectral data from the multiple measurement vectors. The model decomposes the hyperspectral data into the inter-channel correlated and differenced component in the sparsifying transform domain, where the correlated component with high spatial and spectral correlation is constrained to be graph structured sparse and the differenced component is constrained to be  sparse. A numerical optimization algorithm is also proposed to solve the reconstruction model by the alternating direction method of multiplier. Every sub-problem in the iteration formula admits analysis solution by introducing the auxiliary variable and linearization operation. The complexity of the numerical optimization algorithm is reduced. The experimental results demonstrate the effectiveness of the proposed algorithm.

Select  |    Cite this article 
Feng Bo, Chen Bo, Wang Peng-Hui, Liu Hong-Wei
Feature Extraction Method for Radar High Resolution Range Profile Targets Based on Robust Deep Networks
2014 Vol. 36 (12): 2949-2955 [Abstract] ( 989 ) [PDF 355KB] ( 1372 )    DOI: 10.3724/SP.J.1146.2014.00808

Feature extraction is the key technique for Radar Automatic Target Recognition (RATR) based on High Resolution Range Profile (HRRP). Traditional feature extraction algorithms usually use shallow models. When applying such models, the inherent structure of the target is always ignored, which is disadvantageous for learning effective features. To address this issue, a deep framework for radar HRRP target recognition is proposed, which adopts multi-layered nonlinear networks for feature learning. Ground on the stable physical properties of the average profile in each HRRP frame without migration through resolution cell, Stacked Robust Auto-Encoders (SRAEs) are further developed, which are stacked by a series of RAEs. SRAEs can not only reconstruct the original HRRP samples, but also constrain the HRRPs in one frame close to the average profile. Then the top-level output of the networks is used as the input to the classifier. Experimental results on measured radar HRRP dataset validate the effectiveness of the proposed method.

Select  |    Cite this article 
Han Xun, Du Lan, Liu Hong-Wei
Feature Extraction of Space Cone-shaped Target Based on Narrow-band Radar Networks
2014 Vol. 36 (12): 2956-2962 [Abstract] ( 930 ) [PDF 406KB] ( 977 )    DOI: 10.3724/SP.J.1146.2013.02037

The micro-Doppler modulation caused by precession is considered as an important signature for the discrimination of space cone-shaped target. A novel feature extraction method for precessing cone-shaped target with narrow-band radar networks is proposed in this paper. Based on analysis of the scattering properties of the cone-shaped target, this paper first derives the scattering centers’ theoretical Instantaneous Frequency (IF) variations induced by precession, and the IF variations obtained from multiple radar aspects are matched according to their spectrum entropy. Then according to the properties of IF variations of the top and bottom scattering centers under different radar aspects, the precession and geometry feature extraction method is proposed for estimating the target’s parameters, such as height, bottom radius, location of barycentric, precession angle etc. Experiments based on the electromagnetic computation data verify the validness and accuracy of the proposed method.

Select  |    Cite this article 
Zheng Zuo-Hu, Wang Shou-Yong
Radar Target Detection Method Based on the Alpha-stable Distribution Clutter Model
2014 Vol. 36 (12): 2963-2968 [Abstract] ( 871 ) [PDF 334KB] ( 870 )    DOI: 10.3724/SP.J.1146.2014.00072

The detection performance of the Moving Target Detection (MTD) method descends badly in a non-Gaussian correlated clutter background. Therefore, a radar target detection method in the non-Gaussian correlated clutter background is proposed, which is obtained based on the alpha-stable distribution clutter model and the eigenfilter. The proposed method suppresses the non-Gaussian clutter by the signed power and whitens the correlated clutter of the fractional lower order correlate matrix, which is based on the alpha-stable distribution clutter model. Finally, the eigenfilter is used to get a higher signal clutter ratio. Simulations and real data results show that, the detection performance of the proposed method obviously outperforms the MTD method in the non-Gaussian correlated clutter background.

Select  |    Cite this article 
Dai Bao-Quan, Wang Tong, Tong Ya-Long, Wu Jian-Xin, Bao Zheng
Robust Adaptive Coherence Estimator Based on Ellipsoid Uncertainty Set Constraint
2014 Vol. 36 (12): 2969-2974 [Abstract] ( 866 ) [PDF 273KB] ( 868 )    DOI: 10.3724/SP.J.1146.2014.00563

Adaptive Coherence Estimator (ACE) often suffers considerable performance degradation in the presence of steering vector errors. In this paper, a robust ACE detector based on the ellipsoid uncertainty set constraint is proposed. A detailed analysis of ACE detector is first conducted, which results in an interesting observation that scaling of the steering vector does not affect the statistical test of ACE. With this property exploited, a model for designing robust ACE detector is constructed and is subsequently converted into a convex optimization problem. Then, the solution to the problem is given with the powerful Newton-Raphson method. Simulation results show that the robustness of the proposed detector against the steering vector errors can be improved significantly compared with the standard ACE.

Select  |    Cite this article 
Wang Yi-Bo, Shi Hai-Rong, Zhao Wei
A Method of Automatic Recognition of Sidelobe Tracking Based on Magnitude-phase Characteristics
2014 Vol. 36 (12): 2975-2979 [Abstract] ( 965 ) [PDF 300KB] ( 734 )    DOI: 10.3724/SP.J.1146.2014.00045

The traditional methods for automatic recognition of sidelobe tracking of angle measurement system in radar techniques are presented based on the different magnitude between the signals of sum channel and difference channel. By researching the principal of sidelobe tracking, analyzing it through the computer simulations or the experimental results, a new conclusion about the features of sidelobe tracking is presented as the phases of the signals of sum channel and difference channel are orthogonal and the signal of difference channel is with high magnitude at the sidelobe tracking position. According to the above conclusion, a method based on the magnitude-phase characteristics is proposed: The eigenvector revealing magnitude-phase characteristics for recognizing sidelobe tracking is constructed and the Support Vector Machine (SVM) is employed for later classification process. It demonstrates in experiments that the recognition accuracy is significantly improved by using the new approach which is with strong robustness and high real-time performance.

Select  |    Cite this article 
Song Yong-Ping, Jin Tian, Lu Bi-Ying, Zhou Zhi-Min
A Novel Linear MIMO Array Through-the-wall Imaging Model and Its Associated Environmental Parameters Estimation
2014 Vol. 36 (12): 2980-2985 [Abstract] ( 858 ) [PDF 312KB] ( 801 )    DOI: 10.3724/SP.J.1146.2014.00018

Through-the-wall radar imaging by estimating the wall thickness and the dielectric constant is a hot research field in recent years. In order to lift strict restriction that the antenna should parallel to the wall in the traditional through-wall imaging model, and to solve the existing environmental parameters estimation algorithm with low computational efficiency and poor robustness problem, a novel linear MIMO array through-wall imaging model is proposed to adapt to the situation with unknown positional relationship between the array and the wall. Furthermore, based on the analysis of the echo path of the front and rear walls, this paper also presents a novel environmental parameters estimation algorithm with high estimation robustness and low computational complexity. Comparing to the conventional environmental parameters estimation algorithm, this proposed algorithm needs neither extra operations nor special targets to assist. The results calculated from Finite Difference Time Domain (FDTD) simulation verify the effectiveness of the proposed imaging model and environmental parameters estimation algorithm.

Select  |    Cite this article 
Chen Yi-Chang, Zhang Qun, Chen Xiao-Ping, Luo Ying, Gu Fu-Fei
An Imaging Algorithm of Sparse Stepped Frequency SAR Based on Multiple Measurement Vectors Model
2014 Vol. 36 (12): 2986-2993 [Abstract] ( 913 ) [PDF 374KB] ( 1020 )    DOI: 10.3724/SP.J.1146.2013.01831

The SAR imaging algorithm based on Compressed Sensing (CS), could complete the high-resolution imaging of sparse target with the sampling data below the Nyquist sampling rate. However, the Single Measurement Vectors (SMV) model used for range profile reconstruction in existing algorithms, is time-consuming and noise-affected. Based on the Multiple Measurement Vectors (MMV) model, this paper proposes to recovery the joint sparse target signal source of the same sparse structure by MMV. The range profile imaging performance is analyzed theoretically and experimentally. Then, a 2-D SAR imaging algorithm, in which the range imaging is realized based on MMV model and azimuth imaging is realized based on SMV model, is proposed. This algorithm is superior to the SMV-based CS algorithm both on time-consuming and reconstruction precision. The processing of simulation data and radar measured data verifies the effectiveness of this algorithm.

Select  |    Cite this article 
Yu Wei-Dong, Xiong Ming-Nan, Tian Yu-Run
Study on Space-borne SAR Mosaic Mode Based on Azimuth Multichannel
2014 Vol. 36 (12): 2994-3000 [Abstract] ( 743 ) [PDF 379KB] ( 787 )    DOI: 10.3724/SP.J.1146.2013.02031

The Mosaic mode is a hybrid mode of spotlight and ScanSAR, which can obtain SAR images with a large coverage and a high resolution. In this paper, a new Mosaic mode is proposed. The image scene is divided into several sub imaging blocks along the range and azimuth direction. Each block is imaged by sliding spotlight and then pieced together. Short transmit sub-aperture makes the scanning angle decrease significantly, which reduces the difficulty of system design. It also makes the range migration of each block smaller. Azimuth multichannel is helpful to improve the system Signal to Noise Ratio (SNR). PRF (Pulse Repetition Frequency) can be reduced by space sampling, which is constructive to select the proper PRF in the timing diagram.

Select  |    Cite this article 
Zheng Zhi-Dong, Yuan Hong-Gang, Zhang Jian-Yun
Multitarget Localization Based on Sparse Representation for Bistatic MIMO Radar in the Presence of Impulsive Noise
2014 Vol. 36 (12): 3001-3007 [Abstract] ( 783 ) [PDF 382KB] ( 802 )    DOI: 10.3724/SP.J.1146.2013.01861

This paper is concerned with the multitarget localization for bistatic MIMO radar in the presence of Symmetric  α-Stable (SαS) impulsive noise. As the non-existence of the second-order matrix degrades the estimation performance of the subspace-based algorithm in SαS impulsive noise environment, the preprocessing method is proposed to normalize the received data by maximizing the 2-norm of the row of data. The theoretical analysis proves that the covariance matrix of normalized data is finite. Then the sparse linear model is constructed by performing the vectorization operation on the covariance matrix. And the Covariance Matrix Smoothed L0 norm (CMSL0) method is proposed to estimate the angle of the target. Finally, the Fractional Lower Order Moments (FLOM)-maximum likelihood method is utilized to obtain the location of the target. The simulation results show that both the MUSIC and CMSL0 algorithms can estimate the angle of target effectively after maximizing the 2-norm of the row of received data. The CMSL0 algorithm can obtain better estimation performance and has better robustness against the impulsive noise than the MUSIC algorithm. In addition, compared with the MUSIC algorithm, the CMSL0 algorithm does not require to estimate the actual number of the targets and is not restricted to be within a half wavelength interelement spacing.

Select  |    Cite this article 
Yang Yu-Xiang, Tong Wu-Qin, Xiong Jin-Yu
A Novel Algorithm for Detection of a Maneuvering Target in Passive Radar
2014 Vol. 36 (12): 3008-3013 [Abstract] ( 773 ) [PDF 327KB] ( 861 )    DOI: 10.3724/SP.J.1146.2013.01984

For passive radar, the maneuvering target causes range cell migration and Doppler cell migration, leading to a detection ability loss. The signal model is established and a novel detection algorithm is proposed to solve the problem. Firstly, the fast and slow time domains are divided by the overlapping segment method and the Keystone transform is adopted in order to correct the range cell migration due to differential velocity. Then the signal is divided into segments second time in the slow time domain. Finally range cell migration and Doppler cell migration induced by differential acceleration are corrected by the segmentation implementation method of the Fourier transform to achieve long term coherent integration. Experiments based on simulated and practical signals verify the effectiveness of the proposed algorithm.

Select  |    Cite this article 
Yan Tao, Chen Jian-Wen, Bao Zheng
Optimization Design of Sparse 2-D Arrays for Over-The-Horizon Radar (OTHR) Based on Improved Genetic Algorithm
2014 Vol. 36 (12): 3014-3020 [Abstract] ( 814 ) [PDF 320KB] ( 974 )    DOI: 10.3724/SP.J.1146.2013.02011

In light of the fact that enormous elements exist when applying the uniform rectangular planar array to skywave Over-The-Horizon Radar (OTHR), the sparse optimization approach of the uniform 2-D arrays using an improved genetic algorithm is proposed as follows: an optimal model for the sparse rectangular planar array is established from the view of beam shaping; initial population of the genetic algorithm is identified by elevation beam on the bases of the Direction-Of-Arrival (DOA) of multi-mode propagation echoes; the fitness function is revised for the purpose of avoiding early maturing and random walk; and both crossover and mutation operators are improved in order to achieve precise control of the sparsity ratio. Simulation results indicate that the precise control of the sparsity ratio and the optimized performance are obtained by using the improved genetic algorithm. Finally, the paper analyses the feasibility of 2-D arrays application into the OTHR engineering, indicates the conditions for application and existing technical challenges, and then presents the solutions accordingly.

Select  |    Cite this article 
Chen Xiao-Hui, Pei Jin-Ming, Guo Xin-Xin, Qi Song
An Efficient Antenna Optimization Method Based on Kriging Model and Multidimensional Uniform Sampling
2014 Vol. 36 (12): 3021-3026 [Abstract] ( 761 ) [PDF 356KB] ( 1128 )    DOI: 10.3724/SP.J.1146.2013.01826

During the process of antenna design and optimization, classical optimization methods often require hundreds or even thousands trials of different parameter combinations, which leads to a low efficiency in solving multi-parameter and large scale optimization problems. In this paper, a quick and approximate computation of the EM response can be realized though a Kriging model, which is created by fitting the simulation results to their structural parameters. The number of EM simulation needed can be reduced by Latin Hypercube Sampling for MultiDimensional Uniformity (LHS-MDU) at the initial stage and a candidate-selecting method in the following optimization loops. In order to optimize the resonant frequency and impedance bandwidth, the feed position of a rectangular patch antenna and the dipole lengths of a dual-band monopole antenna are adjusted by the proposed method and compared with the genetic optimization, the numbers of EM simulation are reduced by 75% and 84% respectively.

Select  |    Cite this article 
Chen Tao, Luo Xing-Guo, LI Xiao-Nan, LI Wei
An Architecture of Stream Based Reconfigurable Clustered Block Cipher Processing Array
2014 Vol. 36 (12): 3027-3034 [Abstract] ( 848 ) [PDF 394KB] ( 837 )    DOI: 10.3724/SP.J.1146.2014.00023

Reconfigurable cipher processing architecture is a newly proposed architecture for security information processing, but it has the shortage of low throughput and low utilization. To solve the problem, this paper proposes the Stream based Reconfigurable Clustered block Cipher Processing Array (S-RCCPA) architecture based on the steam processor architecture. S-RCCPA incorporates coarse-grained reconfigurable function unit, hierarchy Crossbar interconnection network and distributed key storage, and it supports combined static-dynamic reconfiguration and variable virtual pipeline partition. Experiment results show that, for technology, classical block ciphers can achieve 5.28~47.84 times speedup when mapped to 4×1 S-RCCPA.

Select  |    Cite this article 
Zhi Tian, Yang Hai-Gang, Cai Gang, Qiu Xiao-Qiang, Li Tian-Wen, Wang Xin-Gang
Study on the Prediction of Single-event Effects Induced Failure Rate for Embedded Memories
2014 Vol. 36 (12): 3035-3041 [Abstract] ( 854 ) [PDF 304KB] ( 825 )    DOI: 10.3724/SP.J.1146.2013.02025

Embedded memories are easily influenced by Single-Event Effects (SEE). A model to calculate the SEE failure rate of an embedded memory is proposed, which considers the likelihood that an single-event upset or single-event transient will become an error in different types of circuits. It can also be used for the quantitative analysis of SEE mitigation techniques for versatile memories. Experimental investigations are performed using heavy ion accelerators on an experimental embedded programmable memory, which is designed by Institute of Electronics, Chinese Academy of Sciences. The result of 10.5% average error verifies the effectiveness of the proposed model.

Select  |    Cite this article 
Wang Jian-Wu, Feng Zheng-He
The Relationship between the Group Delay and Envelope Delay of a Narrow-band Dispersive System
2014 Vol. 36 (12): 3042-3045 [Abstract] ( 950 ) [PDF 225KB] ( 1354 )    DOI: 10.3724/SP.J.1146.2014.00008

In this paper, the relationship between the group delay and correlation delay is discussed, and the influence of dispersion on the calibration of a system is analyzed, when a modulated signal passes through a dispersive narrow-band system. The envelope delay of a modulated signal is caused by the distortion of its rising and falling edges when it passes through a system. The researches on the modulated signals, including the rectangular pulse modulation, triangular pulse modulation, cosine pulse modulation and chirp modulation, show that the correlation delay is different from the group delay of the system at the point of the carrier frequency. The correlation delay is approximate to the weighted average of the group delay, and the weighting factor is the product of the spectrum of the signal and the amplitude response of the system. When the group delay is used to calibrate the correlation delay, the linearity of the phase response of the system becomes better, the calibration is higher.

Select  |    Cite this article 
Xu Gao-Ming, Liu Tai-Jun, Ye Yan, Wen Hua-Feng, Li Jun
Broadband Radio Frequency Power Amplifier Modeling Based on Generalized Augmented Hammerstein Models
2014 Vol. 36 (12): 3046-3050 [Abstract] ( 699 ) [PDF 530KB] ( 938 )    DOI: 10.3724/SP.J.1146.2014.00545

In order to improve the modeling accuracy of the AH model,this paper introduces some lagging envelope terms and leading envelope terms to the weak nonlinear module with memory in the AH model to simulate the lagging and the leading envelope effects of the broadband RFPA. In this way, a Generalized Augmented Hammerstein (GAH) model is proposed. This paper experimentally compares the modeling accuracy and model computational complexity of the GAH, AH, memory polynomial, fractional-order memory polynomial and generalized memory polynomial models. The experimental results illustrate that the GAH model can characterize the memory effects of the RFPA well with low computational complexity.

电子与信息学报
Author Center
Online Submission
Author Instruction
FAQ
Template
Copyright Agreement
MSN:je-jeit@hotmail.com
Links
More>>  
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech