Abstract: The high squint SAR signal features large range walk and small range curvature, which enable the raw data be compressed in range and azimuth separately. But in case of large azimuth scene size , complex algorithms must be used to cope with the constr...
Abstract: SAR image matching is important to SAR applications. This paper presents a method to fast match SAR images based on image feature. Edge detection and image segmentation are carried out firstly. Then image matching is performed based on the feature of...
Abstract: In a general radar and communication system, the digital quadrature detection is necessary for implementing direct IF or RF sampling. The Digital Product Detection (DPD), applied easily in a real engineering, is a method to implement the digital quad...
Abstract: A new IMM algorithm for tracking maneuvering target is proposed, which only uses two models that consist of a CS model and an augmented CV model for interaction. The CS model which uses the state variable with normal acceleration and tangent accelera...
Abstract: Fast and precise location method plays an important role in the data association and the target tracking for the passive sensor system. In order to solve the typical problem of the target location encountered in the netted passive sensor system, the ...
Abstract: In this paper, a new time-frequency representation method, adaptive signal expansion algorithm! is presented. The algorithm is based on that essential character of signal space, initial value estimation and precise resolution are obtained simultaneou...
Abstract: Based on a novel windowed overlapping adaptive filter, LMS algorithm with overlapping idea is introduced. In terms of the smoothness of signals processed by overlapping, a new Windowed Overlapping LMS algorithm(WO-LMS)is presented that combines the w...
Abstract: Information authentication technique is an important inspects of network security, and its motive lies in authentication of the integrity and creditability of information. Based on the analysis of the previous image authentication techniques, a new e...
Abstract: A new method of super-resolution image restoration is proposed in the paper. In this method, the piecewise smoothness of space-adaptive regularization combines with the rapid convergence of incremental Wiener filter and through an iteration process w...
Abstract: A method of moving object detection based on two dimensional (2D) spatio-temporal entropic thresholding is proposed in this paper. The characteristics of several common approaches for moving object detection are analyzed, and 2D entropic thresholding...
Abstract: An approach to detecting moving objects from infrared image sequence on displacing background is proposed in this paper. First the correlation matching technique is used for registering five pictures with the sixth one. Then the registered images are...
Abstract: This paper presents a research on the algorithm of optimal set of statistically uncorrelated discriminant vectors. An improved algorithm has been proposed on the basis of the analysis of the conventional algorithm of statistical uncorrelated discrimi...
Abstract: This paper proposes a method that can automatically obtain common lineshape in the spectrum data set based on Complex Principal Component Analysis(CPCA). which can correct frequency shifts and damping factor shifts effectively. This method aligns fre...
Abstract: A novel image fusion algorithm using wavelet transform multiscale edges detection is proposed in this paper. This wavelet analysis image fusion method is feature-based. The source images are fused using their multiscale edges information. In order to...
Abstract: The embedded systems are gradually becoming the first choice of platforms which should be used for real-time speech recognition system. This paper discusses the computation complexity factors of HMM-based continuous speech recognition for embedded sy...
Abstract: This paper presents a robust visual feature based on Visemic LDA for audio visual speech recognition, which captures dynamic lip contour information and reflects the viseme classes of visual speech. The paper also introduces an automatic labeling met...
Abstract: A new distance metric for MLC/PDL (MultiLevel Coding/ Parallel Decoding of Levels) with MQAM constellation is proved to be applicable when punctured convolutional code is used as component code over Rayleigh fading channel. The efficiency has been de...
Abstract: The semi-blind Constant Modulus (CM) algorithm which applied in the Multi-User Detection (MUD) of CDMA is studied. This approach fully utilizes all known users information, performs not-blind detector to suppress the interferes within the cell, and e...
Abstract: Power control and multiuser detection are two ways to cope with Multiple Access Interference (MAI) and near-far effect. This paper proposed a new scheme for DS-CDMA system combined power control and multiuser detection. This scheme can effectively mi...
Abstract: In the paper, a varied step length LMS algorithm is adopted in space-time multiuser receiver, in which a new bierror function is used to solve the constrained optimization problem. Furthermore, based on the character of the users signals in fading ch...
Abstract: A novel CDMA BLAST space-time code technique is proposed in this paper for the down link in a cellular CDMA system. Scrambling codes and orthogonal spreading codes are employed to identify different transmit antennas and different users, respectively...
Abstract: This paper presents a novel power-limited pre-compensation method in MC-CDMA/TDD systems, which can avoid pilot insertion on the uplink and increase the spectral/power efficiency. To keep the transmission power constant, only the phase of signal is p...
Abstract: A Single Carrier/Frequency Domain Equalization (SC/FDE) system with time multiplexed pilot channel is designed. In this system, the Doppler-shift of the time-varying multi-path channel is estimated by calculating the Level Crossing Rate (LCR) of the ...
Abstract: In this paper, the Doppler-shift of the time-varying multi-path channel is estimated by calculating the Level Crossing Rate (LCR) of the signal envelope of the channel coefficient estimates on the effective fingers. The effect of noise is analyzed , ...
Abstract: Since the channel has slowly-varying delays and directions of arrival and fast-varying faded amplitudes, benefits can be obtained by space-time processing base these channel features. In this paper, the space-time subspace and amplitude tracking algo...
Abstract: This paper proposes an adaptive rood pattern search, a new fast block-matching motion estimation algorithm. It combines the advantages of fixed search pattern and spatial correlation search pattern. Compared to the popular diamond search pattern, it ...
Abstract: An improved scalable video coding scheme is proposed in this paper. The method generates the base layer including some sub-base layers by DCT coefficients reordering and VLC reshuffling, and the residues between the original DCT coefficients and the ...
Abstract: Current Internet video transmission is characterized mainly by variations in throughput and packet loss. Scalable Coding(SC) and Multiple Description Coding(MDC) have been proposed as source coding techniques that are robust to such channel problems....
Abstract: Taking the normal distribution as an example, this article discusses the problems of minimized entropy quantization in image compression, including single coefficient entropy quantization and multi-coefficients entropy quantization. It provides a qua...
Abstract: This paper generalizes the conclusion of Perfect nonlinear S-boxes by Nyberg(1991), and introduces the conception of inverse regular generalized vector Bent function. It shows that for inverse regular generalized vector Bent function f(m) with even v...
Abstract: As DRR fails to provide strong latency bound, in this paper, a new scheduling discipline named Prioritized Nested DRR (PNDRR) is presented, which introduces a token bucket with virtual allocated token quantum and changes the entering order of the sch...
Abstract: Research work on dynamic routing for traffic engineering is investigated. And an improved routing algorithm for optimizing network throughput is proposed. It is characterized by taking into account both network topology and traffic distribution condi...
Abstract: The basis of IEEE 802.11 wireless LAN Medium Access Control (MAC) is Distributed Coordination Function (DCF), When network load in WLAN is moderate or even higher, with DCF a station may need to defer several seconds before successful transmission. T...
Abstract: A theoretical model of Iterative Physical Optics (IPO) is established for the ElectroMagnetic (EM) scattering problem with imperfectly conducting boundaiy and applied to the analysis of EM scattering by a dielectric coated electrically large cavity. ...
Abstract: A coupling technique is proposed based on parametric yields centering design and tolerance optimization. The technique is convergence to the optimal normal values from given initial design variable and tolerance with little knowledge of circuit, devi...
Abstract: A new robust adaptive identification-based control of chaotic system with uncertain parameters in view of modeling error is proposed in this paper. The objective is to adjust the unknown chaos to a fixed point. It is fulfilled by taking following two...
Abstract: Through simulation this paper studies the performance of the system of V-BLAST combined with turbo code. The current methods process the V-BLAST algorithm and turbo decode algorithm independently. So it does not utilize the soft information of the re...
Abstract: A new fast Kalman filtering algorithm is illustrated in detail. For some filtering courses whose coefficients can not be caculated offline, this way offers high work speed and has certain accuracy, at the same time, it takes less resource. The idea i...
Abstract: Although using pipelining structure in the hardware implementation can generally provide higher throughput, the application of this structure in current cryptography is limited, because they are not suitable for most common feedback modes. This paper...
Abstract: In this paper, an auto-verification platform for schematic design is presented based on the extended TCL as a script language. Using the extensible property of the TCL, constructed a set of extended TCL command on the general data structure of the sc...
Abstract: Framework of distributed cryptography is presented based on its development and relations among its branches. A systematical model of distributed cryptography is described at the same time. And researching content of distributed cryptography is revie...