Abstract: Direct Interconnection Networks (DIN) are considered to build scalable switching fabrics for Internet routers/switches, clue to its easy scalability. Furthermore, QoS (Quality of Service) guarantee is very important in switching systems. In this pape...
Abstract: The input queued switch fabric, because of its scalability, has been implemented in more and more high speed switches and routers. Existing scheduling algorithms attempt to get the maximum throughput at the expense of fairness. As the need for Qualit...
Abstract: To defend against DDoS attacks on Internet, a new scheme called Ingress Address Marking (IAM) within an Autonomous System (AS) is proposed, with which the IP addresses of the ingress can be embedded into the forwarding packets. A victim can traceback...
Abstract: Exploit automation and massive global scanning for vulnerabilities enable adversaries to compromise computer systems shortly after vulnerabilities become known. Traditional honeypots have shortcomings to deal with these problems because their signatu...
Abstract: To guarantee quality of service of real-time traffic, an algorithm based on AODV is presented. In this algorithm, node maintains traffic information of nodes in its neighborhood. Reservable bandwidth is used as the main consult in routing.Simulation ...
Abstract: The IEEE 802.11 standard MAC is a hybrid protocol of random access and polling when both DCF (Distributed Coordination Function) and PCF (Point Coordination Function) are used. On the base of the performance analysis of the MAC protocol for integrate...
Abstract: OFDM systems are sensitive to the frequency offset. In this paper, a novel frequency ambiguity resolution algorithm in OFDM systems based on phase differential modulation between adjacent symbols is proposed to correct the frequency ambiguity. The su...
Abstract: The OFDM signal is analyzed as a continuous stochastic processes and the closed form expression of correlation function between any two given time instant is derived. When the sampling rate increases, the correlation increases quickly and the peak-to...
Abstract: A key obstacle to high accuracy mobile location is the None Line of Sight (NLOS) transmission of signal. This paper presents a new radio location algorithm-believable factor algorithm (BFA), based on the time of arrival (TOA) range measurements, usin...
Abstract: Space-time reveivers for the third-generation mobile communication systems is important. For a realistic simulation of such systems, a simple statistical space-time vector channel model is proposed, and the space-time-frequency correlation matrix of ...
Abstract: Chip equalization is one of the key technologies for improving the performance of the 3rd generation mobile communication system. In order to enhance the performance of the chip equalizer, a new scheme of chip equalizer jointed with pilot cancellatio...
Abstract: In this paper, a new linear blind adaptive multiuser detection based on LMK. criterion is proposed for synchronous DS/CDMA system over multipath fading channels, The new algorithm bases on HOS(High Order Statistics) and reduces complexity remarkably....
Abstract: In this paper, a chaotic optimization method is presented for computing the Maximum Likelihood Estimation (MLE) of Direction of Arrivals (DOA) in sensor array processing. Based on the properties of ergodicity, stochastic property and regularity of ch...
Abstract: This paper presents a fast algorithm to detect the Least Significant Bit (LSB) steganography. The new approach is inspired by the work of Dumitrescu et al(2003) who detected LSB steganography via sample pair analysis. The new algorithm combines with ...
Abstract: According to the theory of orthogonal designs, Tarokh et al.(1999) proved that a complex orthogonal space-time block code that provides full diversity and full transmission rate is not feasible for more than two antennas. Whereas the non-orthogonal s...
Abstract: A ROI-based rate allocation algorithm for the MPEG-4 FGS enhancement layer is proposed in this paper. On the basis of the ROI-oriented rate-distortion model, the proposed algorithm can perform optimal rate allocation for the enhancement layer after s...
Abstract: This paper investigates the performance of a reduced rank MMSE correlator for a RAKE receiver in the context of CDMA in frequency selective multipath. The MMSE correlator based on the Correlations Subtractive Architecture (CSA) is very suit for frequ...
Abstract: Single-Carrier Frequency-Domain Equalization (SC-FDE) and multi-carrier Orthogonal Frequency Division Multiplexing (OFDM) are two techniques to combat multipath fading in digital communications. This paper compares the BER performances of them for wh...
Abstract: In indoor environments, ultra-wide band signals suffer from dense multipath propagation and severe time dispersion. Rake reception is an important way to boost the performance of ultra-wide band receivers. With the assumption that BPSK modulation is ...
Abstract: A signal denoising algorithm based on singularity detection is introduced in this paper, It simplified the complicated linear interpolation operation needed in the 2-D image denoising so that the 2-D denoising is greatly simplified and it can also ge...
Abstract: By combining the Linearly Constrained Minimum Variance Beamformer(LCMVB) with the eigenspace-based beam former, this pnper presents the Eigenspace-based Linearly Constrained Minimum Variance Beamformer{ELCMVB). The ELCMVB first projects the presumed ...
Abstract: A novel nonuniform sampling digital spectrum processing method based on wavelet transform is studied in this paper. The fundamental principle of nonuniform sampling wavelet transform is introduced and the processing procedure is presented from the un...
Abstract: In this paper, LFM signal reconnaissance theory based on fractional Fourier transform is discussed firstly. Compared with bilinear transform, the fractional Fourier transform is a linear operator and it can eliminate the intercross terms. Hence, it h...
Abstract: Based on principle of orthogonal projection filtering, it is introduced firstly, the method of AM-FM interference excision using projection filtering in pseudo-random code fuzes is analyzed in detail. Moreover, the method in some cases is simulated. ...
Abstract: A new calculated method of the position area to radar is presented. The method is that the Circular Error Probability(CEP) of the smaller area is calculated using the parameters of the place of two and three radar devices. When CEP of some smaller ar...
Abstract: This paper first presents the unified network model associated antennas with loaded networks, which shows that the loaded circuit networks and the antennas (field networks) are unified by the generalized matrix Ohm’s law. Based on the theory of the u...
Abstract: In this paper, a new coding approach to remote sensing images is proposed according to the statistical characteristic of remote sensing images data. The approach is based on an improved embedded, zeroblock-based, image wavelet transform coding algori...
Abstract: Power consumption has to be taken into consideration in an applied SAR real-time processor. The power consumption is measured before and after clock-gating method had been applied to DSP, SBSRAM and FPGA of an air-borne SAR real-time preprocessor boa...
Abstract: The wavenumber domain algorithm (ur-k algorithm for short) has the ability to process wide-beam SAR data because it has the ability to handle the range-azimuth coupling correctly. However, because the traditional nj-k algorithm can not integrate with...
Abstract: Phase unwrapping is so important that it determines the precision of the DEM of INSAR directly. To improve the precision of phase unwrapping, a new method based on method of Goldstein is given. Qualification data are produced with the inconsistent po...
Abstract: The classification mechanism of the kernel-based methods in pattern recognition, i.e. SVMs, nonPCA, and nonLDA, are analyzed in detail in this paper. The range profiles of radar target are recognized by the kernel-based methods. The results of the si...
Abstract: Estimation of Distribution Algorithms (EDAs) available in continuous domains are based on non-generic Gaussian networks. The computational cost for learning this kind of networks is very great, moreover the low accuracy of Ihe joint pdf will be resul...
Abstract: Tracking fusion with dissimilar sensors, which is a challenge work in multisensor fusion, is studied. Under the condition of general correlated measurement noises, the centralized and distributed tracking fusion question is investigated based on line...
Abstract: The data structure in JPEG2000 compressed domain is firstly analyzed. The concept of information tree and a novel tree-distance measurement are then proposed. Finally, a new image retrieval method in JPEG2000 compressed domain is proposed. Experiment...
Abstract: A new blind intelligent image watermarking technique proposed in this paper adopts intelligent information disposal-independent component analysis. The characteristics of the human visual system are incorporated into the watermark embedding and a clo...
Abstract: After analyzing the classic 2-D steady-state trajectory method for multistage depressed collectors simulation and design and its limitation, a novel method of full three-dimensional (3-D) dynamic PIC simulation using MAFIA a three dimensional electro...
Abstract: This paper presents a improved K-NN algorithm. The CURE clustering is carried out to select the subset of the training set. It can reduce the volume of the training set and omit the outlier. Therefore it can lead both to computational efficiency and ...
Abstract: Based on Linear Frequency Modulated (LFM) pulse compression signal, a system which has two resolution with 1200MHz carrier and 200MHz and 66.7MHz bandwidth, is designed and implemented. According to the measurement results, the spurious signals invol...
Abstract: This paper presents a realization scheme based on shifting and adding operation, sub-expression, and multiplier module. First it gives the definition of partly-common sub-expression. Then it introduces a matrix used for searching proper partly-common...
Abstract: Based on a micro-payment model of Unbalanced One-way Binary Tree (UOBT), this paper proposes an efficient protocol for mutual authentication and electronic payment with the capability of arbitrating disputed bills. This protocal can protect subscribe...
Abstract: A new preconditioning method based on neighbor element which has distinct physical background is presented in this paper. The dominant information of impedance matrix is fully considered in the neighbor element preconditioner. The preconditioner is g...