Abstract: Ant Colony Optimization (ACO) is a novel evolutionary algorithm derived from the foraging behavior of real ants of nature, which can find the shortest path between a food source and their nest. The main characteristics of ACO are robustness, positive...
Abstract: Grid feature is a popular feature extraction scheme in image recognition, and usually higher performance could be obtained with the help of deformable template, espe-cially in such difficult image recognition tasks as character recognition, digit rec...
Abstract: On the basis of information fusion, an Evolutionary Algorithm based on Helrnholtz Machine and Kalman Filter (KFHMEA) is proposed. In KFHMEA, the population is divided into several sub-populations and Helmholtz machine is used to estimate the state of...
Abstract: Target tracking with angle only measurements is quite difficult, but there is a strong application potential. Based on the example of two passive sensors respectively on two moving platforms, this paper systematically analyzes the fusion method in su...
Abstract: In the field of data mining, it is often encountered to perform cluster analysis on large data sets with mixed numerical and categorical values. However, most existing clustering algorithms are only efficient for the numerical data rather than the mi...
Abstract: This paper analyzes the model and algorithm of Nonlinear Blind Source Sepa-ration(NBSS) systematically, proposes a novel NBSS algorithm based on mutual cumulates, and puts forward a new optimum method using Multi-universe Parallel Quantum Genetic Alg...
Abstract: Blind multiuser detection in multipath fading channel is an interesting topic in code division multiple access systems. In this paper a blind adaptive multiuser detector based on Minimum Mean Square Error (MMSE) criterion is proposed. In order to gua...
Abstract: This paper presents a new approch for estimating the multipath time delay of signals with unknown shape from observations received by one sensor. In th? paper, a frequency domain model for the received data is developed, and multipath timo delay esti...
Abstract: In processing of array signal, Direction Of Arrival(DOA) of target can be ob-tained by extracting spatial frequency of echo. This article mainly proposes a new method of beam-forming using continuous wavelet transform. It is based on the traditional ...
Abstract: So far many fruitful results have been obtained for stability of equilibrium points of Bidirectional Associative Memory (BAM) neural networks with axonal signal transmission delays (DBAM). A novel neural network model named as Standard Neural Network...
Abstract: High Performance Computing (HPC) system is an important part of a modern SAR processing system. SAR imaging has its specific characteristics compared with other HPC problems. It performs with great difference on different HPC architectures. The effec...
Abstract: A method of simulating distributed targets raw data of spaceborne SAR is given. Based on the theory of Kirchhoff approach and facet, the algorithm of computing the facets backscatter coefficients is discussed. Then the echo signal model of the distri...
Abstract: For Ultra WideBand (UWB) communication technology, the design of Time-Hopping (TH) sequences is a critical point and good TPI correlation property is desired. In this paper, through analyzing TH correlation property, the TH correlation function is de...
Abstract: Low-Density Parity-Check (LDPC) codes are a class of channel codes based on graphs and iterative decoding whose performance is very close to the Shannon limit with low complexity and have strong error control strength. In this paper, encoding and dec...
Abstract: In spread spectrum system, frequency-domain interference suppression algo-rithms always use data windows to reduce the spectral leakage associated with truncation, and employ overlap to lessen the SNR degradation due to windowing. In this paper, the ...
Abstract: Multiple outputs logic function is an important tool for constructing cryptog-raphy systems, and correlation immunity is a critical criterion in designing secure logic functions. In this paper, a very simple method is used to prove that two descripti...
Abstract: Verifiable secret sharing widely applies in the areas such as safeguarding and legal use of confidential information, key escrow, group oriented cryptography, secured mul-tiparty computation, access control and electronic commerce. In this paper, the...
Abstract: In this paper, combining both neural networks and fuzzy systems merits, a chaotic sequence generation model is proposed and constructed on the basis of Adaptive Neural Fuzzy Inference System(ANPIS) firstly. Its basic system parameters are adjusted by...
Abstract: By extending MPAS technology to subcarrier domain, a novel broadband op-tical network scheme to fuse TV networks and optical internet with high efficiency-multi-protocol subcarrier/lambda label switching networks based on subcarrier label and switchi...
Abstract: DCF performs unfairly within multi-rate wireless LAN. Higher rate stations occupy channel for less time, and they can only obtain the same throughput as lower rate stations. This paper presents fair-time-share MDCF, which sets different initial conte...
Abstract: To improve the spectral efficiency for wireless data transmissions, a subband-by-subband adaptive turbo coded modulation scheme based on capacity evaluation is proposed for Orthogonal Frequency Division Multiplexing (OFDM). The target is to optimize ...
Abstract: The frequency source in Global Positioning System (GPS) receiver has a great many influence on the whole performance of the receiver. Based on the analysis of error characteristics and performance effect of the mostly used crystal oscillator, a metho...
Abstract: A novel current-mode CMOS parallel structure is proposed. This parallel switch structure allows current-mode CMOS circuits to perform under lower source voltage which makes low power consuming possible. Beside, the current-mode circuits based on the ...
Abstract: Quantum Neural Networks (QNN) is a promising area which integrates Arti-ficial Neural Netowrk(ANN) with quantum computing. The field of QNN is discussed, in particular, the motivation of ANN towards QNN, the advantages and the possible candi-dates fo...
Abstract: The fair exchange protocols are classified. Based on publicly verifiable secret sharing scheme and group encryption scheme, a new multi-party fair exchange protocol with an off-line Semi-Trusted Third Party(off-STTP) is presented. The off-STTP interv...
Abstract: A twice-correlate code-acquisition circuit and a rapid acquisition algorithm are proposed according to the characteristics of multi-code and time-limited acquisition for Phys-ical Random Access Channel (PRACH) preamble part in WCDMA reverse link. Com...