Abstract: Compared with optimal maximum-likelihood multiuser detection algorithm (MUD) in Space Division Multiuser Access (SDMA) system, probabilistic data association (PDA) algorithm is a near-optimal MUD with low complexity. This paper analyzes the relation ...
Abstract: This paper proposes a new method for the wireless cellular locating and tracking. The method is based on the E-OTD to get the position of the MS, and the MS profile is tracked on the bases of Markov models and detection gate. This method is concise a...
Abstract: This paper analyzes the performance of DEC- Parallel Interference Canceling(DEC-PIC) multiuser detector exploited in MC-CDMA system. It is compared with Haras Minimum Mean Square Error Combining(MMSEC) single-user detector in the uplink and downlink ...
Abstract: The performance of infrared wireless synchronous Code Division Multiple Ac-cess(CDMA) with Pulse Position Modulation(PPM) signaling systems without optical hard limiter and with optical hard limiter using modified prime sequence codes as signature co...
Abstract: A heuristic algorithm based on group local search and double spiral process is proposed in this article, which is applied to optimizing global routing with the objective of network congestion minimization. It makes use of chaos variable to find initi...
Abstract: Recent years, space-time coding technique is gotten more attention. However, the space-time coding application is often under non-frequeucy-selective channel while the channel knowledge is known. All of these constrains the application of space-time ...
Abstract: Traffic grooming, which can multiplex many low-rate traffic streams into one wavelength, has been received much research attention. Much work related to traffic grooming has been done in WDM/SDH rings, and the work is relatively less in WDM mesh netw...
Abstract: This paper addresses the dynamic establishment of dependable connections for grooming WDM mesh networks. A shared path-protection algorithm under Shared Risk Link Group(SRLG) constraints for multi-granularity traffic is proposed. The presented scheme...
Abstract: In this paper, a specification method using PVS is presented. Higher order logic is chosen as the specification language. Strong spy and ideal encryption are assumed, and trace model is used to define protocols behaviors. Moreover, useful structures ...
Abstract: Compared with RSA and ECC, XTR keys are much smaller than RSA keys of equivalent security, and are at most twice as big as ECC keys, but parameter and key selections for XTR are much faster than ECC. With the fast method for computing the trace of th...
Abstract: In this paper, a new adaptive filtering algorithm is proposed based on the anal-ysis of the orthogonal projection of gradient vectors described in Lim(2000). In the new algorithm, a time-variant forgetting factor is introduced to estimate the Mean Sq...
Abstract: An adaptive global motion estimation algorithm is proposed in this article. Based on the statistic feature of block matching moving vector, the method calculates the basic translation vector between current frame and referenced frame through a revisa...
Abstract: At UHF or SHF, the notable effects of Doppler due to platform dynamics must be taken into account. This paper researches on several carrier tracking loop systems. The software with the algorithms of serial PN acquisition and full time early-late DLL,...
Abstract: The problem of optimal polarization filtering of partially polarized signals in the interference background is studied. With the index of Signal-to-Interference-and-Noise-Ratio (SINR) as the optimization object, a nonlinear optimization model is buil...
Abstract: This paper addresses the research of ground moving target imaging and posi-tioning in Synthetic Aperture Radar (SAR) system. First it analyzes the difference between ground moving target imaging process and that for stationary ones. The method brough...
Abstract: The azimuth resolution, the Pulse Repetition Frequency(PRF) and the mapping width of the bistatic Synthetic Aperture Radar (bistatic-SAR) are studied in detail in this paper , and the analytical solutions are obtained. The computer simulation results...
Abstract: Since the surveillance area of sky wave Over-The-Horizon Radar (OTHR) is very vast, realizing the ship detection with short coherent integration time (GIT) is an operational requirement for OTHR. However, short CIT and the resulting low Doppler resol...
Abstract: A method of hyperspectral baud reduction based on Rough Sets (RS) and Fuzzy C-Means (FCM) clustering is proposed, which consists of the following two steps. First, Fuzzy C-Means clustering algorithm is used to classify the original bands into equival...
Abstract: This paper presents a new method of stock market time series data mining. It combines regularized neural network with rough set. The process includes preprocessing of time series and data mining. The preprocessing cleans and filters time series. Then...
Abstract: Influence of the shielding box 011 the propagation and dispersion characteristics of microstrip has been analyzed by the spectral domain immittance approach. This greatly simplified the formulation process in traditional spectral domain method and th...
Abstract: A multi-cavity output system with radial coupling is provided with broadband characteristics (frequency dispersed distribution in broadband). In this paper, using the method of equivalent circuit, the equivalent circuit of the radial coupling multi-c...
Abstract: How to select an optimum set of test points or test vectors has become very critical to analog integrated circuit fault diagnosis. A test point selection method based on testability measure is presented in this paper. Using Determinant Decision Diagr...
Abstract: A novel fieldmill used as space electric field sensor is introduced, accompanying with its application. Amplitude and direction of DC electric field are measured with detecting alternating induced charge varying with the rotation of a rotator. Adopti...
Abstract: In this paper, the effect on shaping of self-similar traffic is investigated through leaky bucket. Analysis and simulation show that the self-similar character of output traffic of the leaky bucket will be increased for long-range dependence traffic ...
Abstract: The lifting scheme is a new idea of constructing wavelet filters. Its key element is to find the predict operator and the update operator. The polynomial local regression is used to find these operators in the paper. These lifting steps take integers...
Abstract: The model of fractional multipole is presented for calculating the characteristic impedance of coaxial transmission line with circular outer conductor and complex inner conductor. The model has a higher accuracy in analyzing the potential of a point ...
Abstract: A H-plane waveguide duplexer is analysized with a multi-mode microwave network method in this paper. This method is carried out through three steps: dividing the microwave device to be analyzed into a group of unit components at first, then numerical...