Abstract: In this paper, conjugate cyclic ESPRIT with minimum-redundancy linear-arrays is presented. Theoretical analysis and computer simulation show that the algorithm has better performance, such as extending aperture, being insensitive to noise, having hig...
Abstract: This paper constructs a family of compactly supported interpolating wavelets with compactly supported duals. Comparing with the existed interpolating wavelets, the new wavelets are greater flexible in design and the decomposition and synthesis algori...
Abstract: This paper considers the single record estimators for cumulants of sinusoids in additive noise. The strong convergence of sample autocorrelation is proved, and the convergence rate is obtained. Conditions for the fourth-order ergodicity are given. Un...
Abstract: A new DOA estimator based on beam output is presented in this paper. It uses subarray to form beam and regards these subarrays as equivalent sensors. So a new array is generated. Employing original high-resolution DOA estimators, such as MUSIC, on th...
Abstract: This paper constructs a family of M-band orthogonal compactly supported interpolating scaling function, gives a 3-band scaling function and shows that it is not only compactly supported, but also orthogonal and continuous. G.Walter s wavelet sampling...
Abstract: In this paper, an error calibration method of quadrature detector based on SVD technique is presented. The method has been applied to target imaging of high resolution step-frequency MMV radar. The simulation results show good performance of the prop...
Abstract: A new method to resolve fractal inverse problem based on neural network was presented in this paper which can be employed to model a time sequences.The precondition to assure the model was also provided. A piece of echo from a lake was taken to test ...
Abstract: The estimates of attractive domain and convergent rate of nonlinear continuous memory neural network are obtained, and some sufficient conditions for the network to be globally exponentially stable are developed, these results generalize ones in refe...
Abstract: Real clutter data collected from land radar are fractally processed. Fractal-based methods for signal detection are presented, and the detector performances are given experimentally. Multifractal is also used to extract multilevel fractal features an...
Abstract: This paper presents a new method to evaluate edge detectors objectively and quantitatively. This method is capable of showing correctly the performance of detecting the contour of images, as well as of detecting the fine details of images. The effect...
Abstract: A high order all digital phase locked loop with tandem structure is presented. A 2-order all digital PLL is implemented and its performance is verified by simulation. An example is given for SDH 2048Kb/s tributary recovery. Its performances are simul...
Abstract: The problem of finite precision degrades the cyptologic and statistical properties of chaotic maps, and sequences generated from maps conjugated with Tent map can be reconstructed precisely by short-sequence-prediction. This paper discusses topologic...
Abstract: All the ABR congestion control algorithms reported are designed to achieve max-min fairness. In this paper, a new algorithm named dynamic bandwidth allocation algorithm is presented. Under the same framework, the algorithm can achieve fairness under ...
Abstract: A new method for construction of authentication codes with arbitration and secret authentication codes with arbitration is presented, some results are given.
Abstract: In this paper, we present three different kinds of motion compensation methods for stepped frequency radar, which are time domain compensation method, frequency domain compensation method and mini entropy compensation method. Then, an improved method...
Abstract: In order to overcome the conflicts between high range resolution and wide bandwidth of Linear Frequency Modulated (LFM) signal, a new operating mode of radar is suggested. The radar signal is a series of LFM signal-LFM burst. When the echoes return, ...
Abstract: The scatter spectrum of radio waves by a dusty plasma has been studed with the dynamic factor which was derived from the kinetic theory. It is found that for the case of cooled electrons kD1 (D is the Debye length, and k=|k|=|ks-k0|, k0 and ks is the...
Abstract: The photocurrent-voltage characteristics and photoelectric sensitivity of a-Si:H samples with slit and comb electrodes are measured. A method for calculating the charge intensifying gain from the photoelectric sensitivity is proposed. The obtained ch...
Abstract: The single-walled carbon nanotubes(SWCNTs) are synthesized and purified.A water colloid of SWCNTs is prepared and used to assemble SWCNTs on a gold film surface.Its STM image shows sorter SWCNTs standing-on gold film surface.The crystal grain image o...
Abstract: This paper presnets a globall optimal composite filtering solution for a two-level hybrid multisensor system.It is shown that the fusion center first neeeds to fuse the local estimates from the L sensors,and then to update recursively the fused track...
Abstract: A new algorithm, concerned with the anti-collision used in recognition of transponders in RFID (Radio Frequency Identification) system is built and its stability condition is pointed out as well. The mathematical model works very well in computer sim...
Abstract: This paper reviews different properties of non-stationary signals and white noise after wavelet decomposition, and presents a new method of white noise reduction based on wavelet transform which can be realized with fast algorithm. The simulation res...
Abstract: In this paper the superior partial properties in time and frequency fiels of wavelet transform are used to classify these two kinds signals.The results are that only requiring three parameters,this algorithm can reach high recogniton probability.This...
Abstract: Gabor representations are signal expansion using sets of functions that are localized and concentrated in time and frequency domain. This characteristic makes them be suitable for processing time-dependent or nonstationary signal. It is shown that Ga...
Abstract: A key escrow cryptosystem can not only provide protection for user s privacy, while at the same time, allows for the wiretapping when lawfully authorized. In this paper, a secret key escrow system based on Asmuth-Bloom threshold scheme is given and i...